Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SecuriteInfo.com.Program.RemoteAdminNET.1.367.20003.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
initial sample
|
||
3dfa4c.rbf (copy)
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
3dfa4e.rbf (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
3dfa4f.rbf (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
3dfa50.rbf (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
3dfa51.rbf (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
3dfa52.rbf (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Config.Msi\3dfa46.rbs
|
data
|
dropped
|
||
C:\Config.Msi\3dfa4b.rbs
|
data
|
dropped
|
||
C:\Config.Msi\3dfa53.rbs
|
data
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\Atera.AgentPackage.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\Atera.AgentCommunication.Models.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\Atera.AgentPackage.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\LiteDB.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\Polly.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\SharpSnmpLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\System.Runtime.InteropServices.RuntimeInformation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\System.ValueTuple.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace\AgentPackageMarketplace.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace\Atera.AgentPackage.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace\Atera.AgentPackages.CommonLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace\Atera.Utils.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\Atera.AgentPackage.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\Atera.AgentPackages.CommonLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\Atera.AgentPackages.ModelsV3.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\Atera.Utils.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\Dapper.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\ICSharpCode.SharpZipLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\Microsoft.ApplicationInsights.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\NLog.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\OpenHardwareMonitorLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\Polly.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\StructureMap.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\System.Buffers.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\System.Data.SQLite.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\System.Diagnostics.DiagnosticSource.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\System.Memory.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\System.Runtime.CompilerServices.Unsafe.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\System.Runtime.InteropServices.RuntimeInformation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\System.ValueTuple.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\x64\SQLite.Interop.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\x86\SQLite.Interop.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\AgentPackageOsUpdates.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\AgentPackageOsUpdates.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\Atera.AgentPackage.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\Atera.AgentPackages.CommonLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\Atera.AgentPackages.Exceptions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\Atera.AgentPackages.ModelsV3.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\Atera.Utils.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\CommunityToolkit.WinUI.Notifications.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\Interop.WUApiLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\Microsoft.ApplicationInsights.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\Microsoft.Win32.Primitives.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\Microsoft.Win32.TaskScheduler.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\NLog.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\Polly.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\RestartReminder.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\RestartReminderNotification.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\StructureMap.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.AppContext.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Buffers.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Collections.Concurrent.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Collections.NonGeneric.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Collections.Specialized.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Collections.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.ComponentModel.EventBasedAsync.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.ComponentModel.Primitives.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.ComponentModel.TypeConverter.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.ComponentModel.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Console.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Data.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Diagnostics.Contracts.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Diagnostics.Debug.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Diagnostics.DiagnosticSource.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Diagnostics.FileVersionInfo.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Diagnostics.Process.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Diagnostics.StackTrace.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Diagnostics.TextWriterTraceListener.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Diagnostics.Tools.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Diagnostics.TraceSource.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Diagnostics.Tracing.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Drawing.Primitives.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Dynamic.Runtime.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Globalization.Calendars.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Globalization.Extensions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Globalization.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.IO.Compression.ZipFile.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.IO.Compression.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.IO.FileSystem.DriveInfo.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.IO.FileSystem.Primitives.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.IO.FileSystem.Watcher.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.IO.FileSystem.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.IO.IsolatedStorage.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.IO.MemoryMappedFiles.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.IO.Pipes.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.IO.UnmanagedMemoryStream.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.IO.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Linq.Expressions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Linq.Parallel.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Linq.Queryable.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Linq.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Memory.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Net.Http.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Net.NameResolution.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Net.NetworkInformation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Net.Ping.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Net.Primitives.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Net.Requests.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Net.Security.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Net.Sockets.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Net.WebHeaderCollection.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Net.WebSockets.Client.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Net.WebSockets.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Numerics.Vectors.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.ObjectModel.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Reflection.Extensions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Reflection.Primitives.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Reflection.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Resources.Reader.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Resources.ResourceManager.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Resources.Writer.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.CompilerServices.Unsafe.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.CompilerServices.VisualC.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.Extensions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.Handles.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.InteropServices.RuntimeInformation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.InteropServices.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.Numerics.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.Serialization.Formatters.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.Serialization.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.Serialization.Primitives.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.Serialization.Xml.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Runtime.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Security.Claims.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Security.Cryptography.Algorithms.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Security.Cryptography.Csp.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Security.Cryptography.Encoding.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Security.Cryptography.Primitives.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Security.Cryptography.X509Certificates.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Security.Principal.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Security.SecureString.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Text.Encoding.Extensions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Text.Encoding.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Text.RegularExpressions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Threading.Overlapped.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Threading.Tasks.Parallel.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Threading.Tasks.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Threading.Thread.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Threading.ThreadPool.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Threading.Timer.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Threading.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.ValueTuple.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Xml.ReaderWriter.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Xml.XDocument.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Xml.XPath.XDocument.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Xml.XPath.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Xml.XmlDocument.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\System.Xml.XmlSerializer.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\netstandard.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\AgentPackageProgramManagement.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\Atera.AgentPackage.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\ThirdPartyPackageManager.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\chocolatey.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\log4net.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\Atera.AgentPackage.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\AgentPackageSystemTools.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\Atera.AgentPackage.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\IdleTimeFinder.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\Microsoft.ApplicationInsights.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\RunScriptAsUser.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\System.Buffers.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\System.Diagnostics.DiagnosticSource.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\System.Memory.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\System.Runtime.CompilerServices.Unsafe.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
modified
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\AgentPackageTicketing.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\Atera.AgentPackage.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\CommunityToolkit.WinUI.Notifications.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\EO.WebBrowser.WinForm.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\EO.WebBrowser.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\FormControlsLibrary.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\ICSharpCode.SharpZipLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\Microsoft.ApplicationInsights.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\QRCoder.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\System.Buffers.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\System.Data.SQLite.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\System.Memory.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\System.Numerics.Vectors.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\System.Runtime.CompilerServices.Unsafe.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\System.ValueTuple.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\TicketingNotifications.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\TicketingPackageExtensions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\TicketingTrayTMP.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\UserDetections.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\t2tWinFormAppBarLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\x64\SQLite.Interop.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\x86\SQLite.Interop.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\Atera.AgentPackage.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\Microsoft.Win32.TaskScheduler.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\System.ValueTuple.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\ToBeRemoved\AteraAgent.InstallLog
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\ToBeRemoved\AteraAgent.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\ToBeRemoved\BouncyCastle.Crypto.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\ToBeRemoved\ICSharpCode.SharpZipLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\ToBeRemoved\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\ToBeRemoved\Pubnub.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\ToBeRemoved\System.ValueTuple.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\ATERA Networks\AteraAgent\AteraAgent.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\ATERA Networks\AteraAgent\Pubnub.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files\ATERA Networks\AteraAgent\System.ValueTuple.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI14C4.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI14C4.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI14C4.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI16A.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI16A.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI16A.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI18BD.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSI1FA3.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI21B7.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI294A.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI2F94.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSI330F.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSI330F.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI330F.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI4F07.tmp
|
data
|
dropped
|
||
C:\Windows\Installer\MSI57D5.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
modified
|
||
C:\Windows\Installer\MSIFBAD.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
|
dropped
|
||
C:\Windows\Installer\MSIFBAD.tmp-\AlphaControlAgentInstallation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIFBAD.tmp-\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\inprogressinstallinfo.ipi
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\System32\InstallUtil.InstallLog
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\AteraSetupLog.txt
|
Unicode text, UTF-16, little-endian text, with very long lines (319), with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\SplashtopStreamer.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Temp\~DF07D540AE027F4656.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF0BA98394DFBAFEC5.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF1E29FC9B342B27CE.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF27045DF9BB3D83EC.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF2A5BC4EA07A7A256.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF3748246E0295C8E7.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF4090650E6245C6F2.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF50AE555E1AE6C734.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF566BF609044F45EB.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF7EC49C7F7F89DD72.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF8CD3DD11D85A5C11.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF8D23518F04E02162.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DF946B63CA5CEB85FD.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF9A8BC046147F428C.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFA7EEBB2557D24724.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFB1DAA7BE4628F397.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFF55CA7399CFD76B7.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Temp\~DFF85B65DD083C28D1.TMP
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
3dfa4d.rbf (copy)
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallState
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\Agent.Package.Watchdog.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.ini
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\dynamicfieldscaching.cch
|
data
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\information.cch
|
Unicode text, UTF-8 (with BOM) text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\update.cch
|
Unicode text, UTF-8 (with BOM) text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat.zip
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageHeartbeat\AgentPackageHeartbeat.ini
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller.zip
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageInternalPoller\AgentPackageInternalPoller.ini
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace.zip
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace\AgentPackageMarketplace.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMarketplace\AgentPackageMarketplace.ini
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring.zip
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.ini
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\package_2.db
|
SQLite 3.x database, last written using SQLite version 3040000, file counter 12, database pages 12, cookie 0xb, schema 4,
UTF-8, version-valid-for 12
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\package_2.db-journal
|
SQLite Rollback Journal
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates.zip
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\AgentPackageOsUpdates.Common.dll.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\AgentPackageOsUpdates.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\AgentPackageOsUpdates.ini
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\RestartReminder.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageOsUpdates\RestartReminderNotification.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement.zip
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\AgentPackageProgramManagement.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\AgentPackageProgramManagement.ini
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageProgramManagement\ThirdPartyPackageManager.dll.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageRuntimeInstaller.zip
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote.zip
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.ini
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\lh.txt
|
JSON data
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\log.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools.zip
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\AgentPackageSystemTools.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\AgentPackageSystemTools.ini
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\IdleTimeFinder.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSystemTools\RunScriptAsUser.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing.zip
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\AgentPackageTicketing.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\AgentPackageTicketing.ini
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\FormControlsLibrary.dll.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\TicketingNotifications.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\TicketingPackageExtensions.dll.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\TicketingTrayTMP.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageTicketing\UserDetections.dll.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent.zip
|
Zip archive data, at least v4.5 to extract, compression method=deflate
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.ini
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\ToBeRemoved\AteraAgent.InstallState
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\ToBeRemoved\AteraAgent.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\ToBeRemoved\log.txt
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
||
C:\Program Files\ATERA Networks\AteraAgent\AteraAgent.exe.config
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\regid.1991-06.com.microsoft\regid.1991-06.com.microsoft_Windows-10-Pro.swidtag
|
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AteraAgent.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Installer\3dfa45.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\3dfa47.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB},
Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\3dfa48.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: x64;1033, Revision Number: {911E9E2F-B38D-4D02-A148-5E49FC9D8943},
Create Time/Date: Wed Feb 28 10:52:04 2024, Last Saved Time/Date: Wed Feb 28 10:52:04 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\3dfa54.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: x64;1033, Revision Number: {911E9E2F-B38D-4D02-A148-5E49FC9D8943},
Create Time/Date: Wed Feb 28 10:52:04 2024, Last Saved Time/Date: Wed Feb 28 10:52:04 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Installer\MSI14C4.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSI14C4.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI14C4.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI16A.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSI16A.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI16A.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI18BE.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI191D.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI1A18.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI2FA5.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI3071.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI30EF.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI330F.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSI330F.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI330F.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI4F08.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI5003.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSI50FE.tmp
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIFBAD.tmp-\CustomAction.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Installer\MSIFBAD.tmp-\Microsoft.Deployment.WindowsInstaller.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\MSIFBAD.tmp-\System.Management.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Windows\Installer\SourceHash{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Installer\SourceHash{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Composite Document File V2 Document, Cannot read section info
|
dropped
|
||
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
|
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
modified
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
Certificate, Version=3
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
|
Certificate, Version=3
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
|
data
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageMonitoring.exe.log
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageSTRemote.exe.log
|
CSV text
|
dropped
|
||
C:\Windows\Temp\PreVer.log.txt
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\Windows\Temp\ateraAgentSetup64_1_8_7_2.msi
|
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation
Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the
logic and data required to install AteraAgent., Template: x64;1033, Revision Number: {911E9E2F-B38D-4D02-A148-5E49FC9D8943},
Create Time/Date: Wed Feb 28 10:52:04 2024, Last Saved Time/Date: Wed Feb 28 10:52:04 2024, Number of Pages: 200, Number of
Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
|
dropped
|
||
C:\Windows\Temp\~DF0010207FF71FD75D.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF2D5C45643A76E466.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF59FC06DCC638DD09.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF5C47CADC2729EAEB.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF601FBC5E9AAAA425.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF614609C49375AA7C.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF6596A5ABA7F5E2CF.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF6A96F64BD14C1AC3.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF75FDC0767A5B8C72.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF807EE35C7538DCC2.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF91664A3E98AE5DD8.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DF94F0F498C042208A.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFB5FCDA911672B3E2.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFB918E60495482294.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFCC921FB70814547E.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFCF2B6C7829CAB337.TMP
|
data
|
dropped
|
||
C:\Windows\Temp\~DFDFADD02CD7B61D28.TMP
|
data
|
dropped
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 397 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k NetworkService -p
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSIFBAD.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4062296 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k UnistackSvcGroup
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI16A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4063718 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k wsappx -p -s ClipSVC
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\system32\svchost.exe -k LocalService -s W32Time
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI14C4.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4068578 10 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="ilpilarsaomateus@gmail.com" /CompanyId="1"
/IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000Lu4JQIAZ" /AgentId="66902f0e-5571-47c0-8de5-86038d3e7b35"
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
|
||
C:\Windows\SysWOW64\rundll32.exe
|
rundll32.exe "C:\Windows\Installer\MSI330F.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4076312 32 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
66902f0e-5571-47c0-8de5-86038d3e7b35 "a7726a3f-8b3e-4e5c-93fd-b7293e973556" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000Lu4JQIAZ
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
66902f0e-5571-47c0-8de5-86038d3e7b35 "cd1ad75d-30e1-481a-b7d6-4d6b012e03f7" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000Lu4JQIAZ
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
66902f0e-5571-47c0-8de5-86038d3e7b35 "3f72da7d-d915-4f53-8bc1-de00eab8c542" agent-api.atera.com/Production 443 or8ixLi90Mf
"minimalIdentification" 001Q300000Lu4JQIAZ
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
66902f0e-5571-47c0-8de5-86038d3e7b35 "db753a87-56d5-4df4-b088-df029e1319dc" agent-api.atera.com/Production 443 or8ixLi90Mf
"identified" 001Q300000Lu4JQIAZ
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
66902f0e-5571-47c0-8de5-86038d3e7b35 "b27bbec1-8375-4d6e-a646-54dd514ea664" agent-api.atera.com/Production 443 or8ixLi90Mf
"generalinfo fromGui" 001Q300000Lu4JQIAZ
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c cscript "C:\Program Files (x86)\Microsoft Office\Office16\ospp.vbs" /dstatus
|
||
C:\Windows\System32\cscript.exe
|
cscript "C:\Program Files (x86)\Microsoft Office\Office16\ospp.vbs" /dstatus
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageSTRemote\AgentPackageSTRemote.exe" 66902f0e-5571-47c0-8de5-86038d3e7b35
"25d94b19-dd8c-444e-8649-b75dcdab378e" agent-api.atera.com/Production 443 or8ixLi90Mf "install eyJSbW1Db2RlIjoiaFpDREZQaEs3NW1KIn0="
001Q300000Lu4JQIAZ
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageMonitoring\AgentPackageMonitoring.exe" 66902f0e-5571-47c0-8de5-86038d3e7b35
"cb18c271-196a-4aaf-9ea1-03326a248300" agent-api.atera.com/Production 443 or8ixLi90Mf "syncprofile" 001Q300000Lu4JQIAZ
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k smphost
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe"
66902f0e-5571-47c0-8de5-86038d3e7b35 "62bbbd59-291d-44d5-8ada-88594b5f534e" agent-api.atera.com/Production 443 or8ixLi90Mf
"generalinfo" 001Q300000Lu4JQIAZ
|
||
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.exe
|
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageUpgradeAgent\AgentPackageUpgradeAgent.exe" 66902f0e-5571-47c0-8de5-86038d3e7b35
"153560a1-b70b-409f-affc-69982282c523" agent-api.atera.com/Production 443 or8ixLi90Mf "checkforupdates" 001Q300000Lu4JQIAZ
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c cscript "C:\Program Files (x86)\Microsoft Office\Office16\ospp.vbs" /dstatus
|
||
C:\Windows\System32\cscript.exe
|
cscript "C:\Program Files (x86)\Microsoft Office\Office16\ospp.vbs" /dstatus
|
||
C:\Windows\System32\msiexec.exe
|
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\SecuriteInfo.com.Program.RemoteAdminNET.1.367.20003.msi"
|
||
C:\Windows\System32\msiexec.exe
|
C:\Windows\system32\msiexec.exe /V
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding B5D92016C39FF7678052452FC1E699E8
|
||
C:\Windows\System32\SgrmBroker.exe
|
C:\Windows\system32\SgrmBroker.exe
|
||
C:\Windows\SysWOW64\msiexec.exe
|
C:\Windows\syswow64\MsiExec.exe -Embedding FE293C9828EFC6E5D88E7F26AF6615E9 E Global\MSI0000
|
||
C:\Windows\SysWOW64\net.exe
|
"NET" STOP AteraAgent
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\net1.exe
|
C:\Windows\system32\net1 STOP AteraAgent
|
||
C:\Windows\SysWOW64\taskkill.exe
|
"TaskKill.exe" /f /im AteraAgent.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sc.exe
|
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\sppsvc.exe
|
C:\Windows\system32\sppsvc.exe
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files\Windows Defender\MpCmdRun.exe
|
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
There are 46 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://ps.atera.com/agentpackagesmac/AgentPackageWindowsUpdate/24.6/AgentPackageWindowsUpdate.zip
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageSTRemote/16.0/AgentPackageSTRemote.zip
|
unknown
|
||
http://schemas.datacontract.org
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageMarketplace/1.6/AgentPackageMarketplace.zip
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=ab049951-757a-48f1-8723-61b58ab127f5
|
unknown
|
||
https://github.com/CommunityToolkit/WindowsCommunityToolkitP
|
unknown
|
||
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.12/AgentPackageAO
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageInternalPoller/15.9/AgentPackageInternalPoller.zip
|
unknown
|
||
https://ps.ateHH
|
unknown
|
||
https://nlog-project.org/
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageProgramManagement/24.9/AgentPackageProgramManageme
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/track-event
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=c0f6c0b0-dc8d-4d9d-a87f-1136ef0d8d0b
|
unknown
|
||
http://dl.google.com/googletalk/googletalk-setup.exe
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageUpgradeAgent/27.2/AgentPackageUpgradeAgent.zip?6
|
unknown
|
||
https://agent-api.PR
|
unknown
|
||
HTTPS://PS.ATERA.COM/AGENTPACKAGESNET45/AGENTPACKAGEMONITORING/36.9/AGENTPACKAGEMONITORING.ZIP
|
unknown
|
||
http://standards.iso.org/iso/19770/-2/2009/schema.xsd
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageMarketplace/1.6/AgentPackageMarketplace.zip
|
unknown
|
||
http://schemas.datacontract.org/2004/07/System.ServiceProcess
|
unknown
|
||
https://ps.atera.com/agentpackagescrossplatform/AgentPackageMonitoring/0.40/AgentPackageMonitoring.z
|
unknown
|
||
https://my.splashtop.com/csrs/win
|
unknown
|
||
http://wixtoolset.org
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.5/Agent.Package.Watchdog.zip
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/track-event;
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageRuntimeInstaller/13.0/AgentPackageRuntimeInstaller
|
unknown
|
||
http://acontrol.atera.com/
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/dynamic-fields/
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageSTRemote/23.4/AgentPackageSTRemote.zip
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageADRemote/6.0/AgentPackageADRemote.zip
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/66902f0e-5571-47c0-8de5
|
unknown
|
||
HTTPS://PS.ATERA.COM/AGENTPACKAGESNET45/AGENTPACKAGERUNTIMEINSTALLER/1.6/AGENTPACKAGERUNTIMEINSTALLE
|
unknown
|
||
http://my.splashtop.com
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageNetworkDiscovery/15.0/AgentPackageNetworkDiscovery
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.5/Agent.Package.Watchdog.zip?6aIkQo
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageSTRemote/23.4/AgentPackageSTRemote.ziph
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageHeartbeat/17.11/AgentPackageHeartbeat.zip
|
unknown
|
||
https://download.splashtop.com
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageTaskScheduler/17.2/AgentPackageTaskScheduler.zip
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Locations
|
unknown
|
||
https://agent-api.atera.com
|
unknown
|
||
https://www.nuget.org/packages/NLog.Web.AspNetCore
|
unknown
|
||
http://www.w3.oh
|
unknown
|
||
http://ps.atera.comO
|
unknown
|
||
https://ps.ateHhh
|
unknown
|
||
https://dynamic.t
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Transit
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageADRemote/6.0/AgentPackageADRemote.zip?6aIkQoLIi1
|
unknown
|
||
http://nlog-project.org/ws/
|
unknown
|
||
http://crl3.digice
|
unknown
|
||
http://nlog-project.org/ws/ILogReceiverServer/ProcessLogMessagesT
|
unknown
|
||
https://ps.atera.com/a
|
unknown
|
||
https://urn.to/r/sds_see
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageRuntimeInstaller/1.5/AgentPackageRuntimeInstaller.
|
unknown
|
||
https://urn.to/r/sds_see12https://urn.to/r/sds_see2
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageMonitoring/36.9/AgentPackageMonitoring.zip
|
unknown
|
||
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.12/AgentPackageAgentI
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=220604ff-7d82-4400-81a1-a9e4ac59a4ab
|
unknown
|
||
https://download.splashtop.com/csrs/Splashtop_Streamer_Win_DEPLOY_INSTALLER_v3.7.2.0.exe
|
unknown
|
||
https://my.splashtop.com
|
unknown
|
||
https://dev.virtualearth.net/REST/v1/Routes/Driving
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageProgramManagement/24.9/AgentPackageProgramManage
|
unknown
|
||
http://cacerts.digicert.
|
unknown
|
||
https://github.com/CommunityToolkit/WindowsCommunityToolkit
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageSTRemote/23.4/AgentPackageSTRemote.zip
|
unknown
|
||
https://system.data.sqlite.org/X
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageHeartbeat/16.9
|
unknown
|
||
http://www.abit.com.tw/
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/recurringCommandResult
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/AcknowledgeCommands
|
unknown
|
||
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=a59c9018-5d76-42b0-adb5-5e60d00da0f5
|
unknown
|
||
https://ps.atera.com/installers/splashtop/win/SplashtopStreamer.exe
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/AgentPackageTaskScheduler/13.0/AgentPackageTaskScheduler.zip
|
unknown
|
||
HTTPS://PS.ATERA.COM/AGENTPACKAGESNET45/AGENTPACKAGESTREMOTE/23.4/AGENTPACKAGESTREMOTE.ZIP
|
unknown
|
||
https://agent-api.P
|
unknown
|
||
http://www.w3.o
|
unknown
|
||
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
|
unknown
|
||
https://github.com/JamesNK/Newtonsoft.Json
|
unknown
|
||
https://agent-api.atera.com/PrhP
|
unknown
|
||
https://ps.atera.com/agentpackagesmac/Agent.Package.Availability/0.16/Agent.Package.Availability.zip
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageMarketplace/13.0/AgentPackageMarketplace.zip
|
unknown
|
||
https://dev.ditu.live.com/REST/v1/Transit/Stops/
|
unknown
|
||
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageUpgradeAgent/27.2/AgentPackageUpgradeAgent.zip
|
unknown
|
||
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
|
unknown
|
||
https://ps.atera.com/agentpackageswin/AgentPackageSTRemote/16.0/Agen
|
unknown
|
||
https://ps.pndsn
|
unknown
|
||
https://www.sqlite.org/copyright.html2
|
unknown
|
||
HTTPS://PS.ATERA.COM/AGENTPACKAGESNET45/AGENT.PACKAGE.WATCHDOG/1.5/AGENT.PACKAGE.WATCHDOG.ZIP
|
unknown
|
||
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
|
unknown
|
||
https://agent-api.atera.com/Production/Agent/guiComm
|
unknown
|
||
https://urn.to/r/sds_see23https://urn.to/r/sds_see1UInnerVerify
|
unknown
|
||
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.12/AgentPackageA
|
unknown
|
||
https://ps.atera.com/agentpackagesnet45/AgentPackageInternalPoller/23.8/AgentPackageInternalPoller.z
|
unknown
|
||
https://system.data.sqlite.org/
|
unknown
|
||
http://crl.micros
|
unknown
|
There are 90 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
40.119.152.241
|
unknown
|
United States
|
||
93.184.221.240
|
unknown
|
European Union
|
||
13.35.58.89
|
unknown
|
United States
|
||
35.157.63.229
|
unknown
|
United States
|
||
20.37.139.187
|
unknown
|
United States
|
||
2.19.126.163
|
unknown
|
European Union
|
||
13.35.58.124
|
unknown
|
United States
|
||
20.101.57.9
|
unknown
|
United States
|
||
35.71.184.3
|
unknown
|
United States
|
||
192.229.221.95
|
unknown
|
United States
|
||
13.35.58.7
|
unknown
|
United States
|
||
20.60.197.1
|
unknown
|
United States
|
There are 2 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
|
STATE
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
|
cval
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\3dfa46.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\3dfa46.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\ATERA Networks\AteraAgent\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files (x86)\ATERA Networks\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Features
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
7D0A237E2F2A7564CA141B792446E854
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
|
LastUsedSource
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0001
|
Owner
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0001
|
SessionHash
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0001
|
Sequence
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0001
|
RegFiles0000
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0001
|
RegFilesHash
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Config.Msi\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\3dfa4b.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\3dfa4b.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\TempPackages
|
C:\Windows\Installer\3dfa47.msi
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\3dfa53.rbs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
|
C:\Config.Msi\3dfa53.rbsLow
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
|
FF1292B61C97FBE4184B6C604D5EEB4F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
|
FF1292B61C97FBE4184B6C604D5EEB4F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
|
FF1292B61C97FBE4184B6C604D5EEB4F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
|
FF1292B61C97FBE4184B6C604D5EEB4F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
|
FF1292B61C97FBE4184B6C604D5EEB4F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
|
FF1292B61C97FBE4184B6C604D5EEB4F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
|
FF1292B61C97FBE4184B6C604D5EEB4F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
|
FF1292B61C97FBE4184B6C604D5EEB4F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files\ATERA Networks\AteraAgent\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
|
C:\Program Files\ATERA Networks\
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
LocalPackage
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
AuthorizedCDFPrefix
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
Comments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
Contact
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
HelpLink
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
HelpTelephone
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
InstallSource
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
ModifyPath
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
Readme
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
Size
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
URLInfoAbout
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
URLUpdateInfo
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
VersionMajor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
VersionMinor
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
WindowsInstaller
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
FF1292B61C97FBE4184B6C604D5EEB4F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\InstallProperties
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B2921FF-79C1-4EBF-81B4-C606D4E5BEF4}
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\FF1292B61C97FBE4184B6C604D5EEB4F
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\Features
|
INSTALLFOLDER_files_Feature
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\FF1292B61C97FBE4184B6C604D5EEB4F\Patches
|
AllPatches
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F
|
ProductName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F
|
PackageCode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F
|
Assignment
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F
|
AdvertiseFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F
|
InstanceType
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F
|
AuthorizedLUAApp
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F
|
DeploymentFlags
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
|
FF1292B61C97FBE4184B6C604D5EEB4F
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F\SourceList
|
PackageName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F\SourceList\Net
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F\SourceList\Media
|
1
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F
|
Clients
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\FF1292B61C97FBE4184B6C604D5EEB4F\SourceList
|
LastUsedSource
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0001
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
|
StringCacheGeneration
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0001
|
Sequence
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\Security
|
c688cf83-9945-5ff6-0e1e-1ff1f8a2ec9a
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\W32Time\Config
|
LastKnownGoodTime
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
|
AutoBackupLogFiles
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AteraAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
AccountId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
IntegratorLogin
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
CompanyId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
AgentId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
|
ServerName
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AlphaAgent
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
|
FileDirectory
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\ci.dll,-101
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\dnsapi.dll,-103
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-843
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\fveui.dll,-844
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\System32\wuaueng.dll,-400
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
|
||
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
|
@%SystemRoot%\system32\NgcRecovery.dll,-100
|
||
HKEY_USERS.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageUpgradeAgent
|
CommandID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageUpgradeAgent
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageUpgradeAgent
|
UsePassword
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageUpgradeAgent
|
IntervalSecs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageUpgradeAgent
|
DownloadUrl
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageUpgradeAgent
|
CheckSum
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageUpgradeAgent
|
Arguments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageTicketing
|
CommandID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageTicketing
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageTicketing
|
UsePassword
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageTicketing
|
IntervalSecs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageTicketing
|
DownloadUrl
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageTicketing
|
CheckSum
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageTicketing
|
Arguments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSTRemote
|
CommandID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSTRemote
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSTRemote
|
UsePassword
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSTRemote
|
IntervalSecs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSTRemote
|
DownloadUrl
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSTRemote
|
CheckSum
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSTRemote
|
Arguments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageAgentInformation
|
CommandID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageAgentInformation
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageAgentInformation
|
IntervalSecs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageAgentInformation
|
DownloadUrl
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageAgentInformation
|
CheckSum
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageAgentInformation
|
Arguments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageOsUpdates
|
CommandID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageOsUpdates
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageOsUpdates
|
IntervalSecs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageOsUpdates
|
DownloadUrl
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageOsUpdates
|
CheckSum
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageOsUpdates
|
Arguments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageProgramManagement
|
CommandID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageProgramManagement
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageProgramManagement
|
IntervalSecs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageProgramManagement
|
DownloadUrl
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageProgramManagement
|
CheckSum
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageProgramManagement
|
Arguments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageInternalPoller
|
CommandID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageInternalPoller
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageInternalPoller
|
UsePassword
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageInternalPoller
|
IntervalSecs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageInternalPoller
|
DownloadUrl
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageInternalPoller
|
CheckSum
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageInternalPoller
|
Arguments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageMonitoring
|
CommandID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageMonitoring
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageMonitoring
|
IntervalSecs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageMonitoring
|
DownloadUrl
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageMonitoring
|
CheckSum
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageMonitoring
|
Arguments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageHeartbeat
|
CommandID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageHeartbeat
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageHeartbeat
|
IntervalSecs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageHeartbeat
|
DownloadUrl
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageHeartbeat
|
CheckSum
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageHeartbeat
|
Arguments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSystemTools
|
CommandID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSystemTools
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSystemTools
|
IntervalSecs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSystemTools
|
DownloadUrl
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSystemTools
|
CheckSum
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageSystemTools
|
Arguments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageMarketplace
|
CommandID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageMarketplace
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageMarketplace
|
DownloadUrl
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageMarketplace
|
CheckSum
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageMarketplace
|
Arguments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageADRemote
|
CommandID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageADRemote
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageADRemote
|
IntervalSecs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageADRemote
|
DownloadUrl
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageADRemote
|
CheckSum
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageADRemote
|
Arguments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageRuntimeInstaller
|
CommandID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageRuntimeInstaller
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageRuntimeInstaller
|
IntervalSecs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageRuntimeInstaller
|
DownloadUrl
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageRuntimeInstaller
|
CheckSum
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\AgentPackageRuntimeInstaller
|
Arguments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\Agent.Package.Watchdog
|
CommandID
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\Agent.Package.Watchdog
|
Version
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\Agent.Package.Watchdog
|
IntervalSecs
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\Agent.Package.Watchdog
|
DownloadUrl
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\Agent.Package.Watchdog
|
CheckSum
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent\Packages\Agent.Package.Watchdog
|
Arguments
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageSTRemote_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform
|
ServiceSessionId
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageMonitoring_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageUpgradeAgent_RASMANCS
|
FileDirectory
|
There are 369 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
248AC190000
|
heap
|
page read and write
|
||
27DEC26C000
|
heap
|
page read and write
|
||
27DEC66C000
|
heap
|
page read and write
|
||
27D80539000
|
trusted library allocation
|
page read and write
|
||
2A342148000
|
heap
|
page read and write
|
||
2A329E61000
|
trusted library allocation
|
page read and write
|
||
1EE85220000
|
heap
|
page read and write
|
||
1D422C70000
|
heap
|
page read and write
|
||
248C5385000
|
heap
|
page read and write
|
||
248ACBD1000
|
trusted library allocation
|
page read and write
|
||
282B4E99000
|
trusted library allocation
|
page read and write
|
||
7FFB23B20000
|
unkown
|
page read and write
|
||
1F111BCB000
|
heap
|
page read and write
|
||
2A329C7F000
|
trusted library allocation
|
page read and write
|
||
27DEB230000
|
heap
|
page read and write
|
||
1D42338D000
|
trusted library allocation
|
page read and write
|
||
5234000
|
trusted library allocation
|
page read and write
|
||
18792DEF000
|
trusted library allocation
|
page read and write
|
||
2A329F68000
|
trusted library allocation
|
page read and write
|
||
27D80001000
|
trusted library allocation
|
page read and write
|
||
1EE9E2C8000
|
heap
|
page read and write
|
||
27D807EB000
|
trusted library allocation
|
page read and write
|
||
248C546E000
|
heap
|
page read and write
|
||
1D422C12000
|
unkown
|
page readonly
|
||
282B4E5C000
|
trusted library allocation
|
page read and write
|
||
282CD823000
|
heap
|
page read and write
|
||
187928C3000
|
trusted library allocation
|
page read and write
|
||
2A329149000
|
heap
|
page read and write
|
||
2A329FBD000
|
trusted library allocation
|
page read and write
|
||
7FFB23B20000
|
unkown
|
page read and write
|
||
248AC215000
|
heap
|
page read and write
|
||
282B4E8A000
|
trusted library allocation
|
page read and write
|
||
1D43C915000
|
heap
|
page read and write
|
||
2A32A141000
|
trusted library allocation
|
page read and write
|
||
7FFB23B20000
|
unkown
|
page read and write
|
||
18792851000
|
trusted library allocation
|
page read and write
|
||
18792A26000
|
trusted library allocation
|
page read and write
|
||
187AB1C0000
|
heap
|
page read and write
|
||
27D80299000
|
trusted library allocation
|
page read and write
|
||
27DEB1A9000
|
heap
|
page read and write
|
||
2069C85F000
|
trusted library allocation
|
page read and write
|
||
2A329CF6000
|
trusted library allocation
|
page read and write
|
||
1B35AEC5000
|
heap
|
page read and write
|
||
131ACD73000
|
trusted library allocation
|
page read and write
|
||
BE3C134000
|
stack
|
page read and write
|
||
248AC1D0000
|
heap
|
page read and write
|
||
7FFB23B20000
|
unkown
|
page read and write
|
||
2A3424DB000
|
heap
|
page read and write
|
||
1DD473A0000
|
heap
|
page read and write
|
||
2069BD9E000
|
heap
|
page read and write
|
||
2A328FD0000
|
heap
|
page read and write
|
||
1DD470F0000
|
heap
|
page read and write
|
||
248ACC3F000
|
trusted library allocation
|
page read and write
|
||
27DEC291000
|
heap
|
page read and write
|
||
29025B50000
|
heap
|
page read and write
|
||
2069BD80000
|
heap
|
page read and write
|
||
1D4232A1000
|
trusted library allocation
|
page read and write
|
||
27D80060000
|
trusted library allocation
|
page read and write
|
||
27D806BB000
|
trusted library allocation
|
page read and write
|
||
7FFB036E9000
|
unkown
|
page read and write
|
||
2A32A00B000
|
trusted library allocation
|
page read and write
|
||
1EE851E0000
|
heap
|
page read and write
|
||
1EE852CA000
|
heap
|
page read and write
|
||
187920EC000
|
heap
|
page read and write
|
||
1B35B4DB000
|
trusted library allocation
|
page read and write
|
||
27DEC6DB000
|
heap
|
page read and write
|
||
1B35A972000
|
unkown
|
page readonly
|
||
248ACC86000
|
trusted library allocation
|
page read and write
|
||
5191000
|
trusted library allocation
|
page read and write
|
||
248ACBCC000
|
trusted library allocation
|
page read and write
|
||
248ACAA3000
|
trusted library allocation
|
page read and write
|
||
27DEB15C000
|
heap
|
page read and write
|
||
1DD4710F000
|
heap
|
page read and write
|
||
4844000
|
trusted library allocation
|
page read and write
|
||
1DD479E3000
|
trusted library allocation
|
page read and write
|
||
2A329C08000
|
trusted library allocation
|
page read and write
|
||
41F4000
|
heap
|
page read and write
|
||
27DEC632000
|
heap
|
page read and write
|
||
1879213A000
|
heap
|
page read and write
|
||
2A3424C0000
|
heap
|
page read and write
|
||
18792897000
|
trusted library allocation
|
page read and write
|
||
248ACC3B000
|
trusted library allocation
|
page read and write
|
||
1B373BC0000
|
heap
|
page read and write
|
||
2A329DBE000
|
trusted library allocation
|
page read and write
|
||
2A34254E000
|
heap
|
page read and write
|
||
27D80102000
|
trusted library allocation
|
page read and write
|
||
7FFB0BB30000
|
unkown
|
page read and write
|
||
1F111CC0000
|
heap
|
page read and write
|
||
282CD490000
|
heap
|
page read and write
|
||
2069BDC1000
|
heap
|
page read and write
|
||
1851F601000
|
trusted library allocation
|
page read and write
|
||
BE3C335000
|
stack
|
page read and write
|
||
27DEB128000
|
heap
|
page read and write
|
||
1EE8523E000
|
heap
|
page read and write
|
||
282B4F4C000
|
trusted library allocation
|
page read and write
|
||
7FFB23B20000
|
unkown
|
page read and write
|
||
27D8033C000
|
trusted library allocation
|
page read and write
|
||
131ACDBF000
|
trusted library allocation
|
page read and write
|
||
131AC42B000
|
heap
|
page read and write
|
||
7FFB23B20000
|
unkown
|
page read and write
|
||
AC472F3000
|
stack
|
page read and write
|
||
2A329A41000
|
trusted library allocation
|
page read and write
|
||
2A329CE0000
|
trusted library allocation
|
page read and write
|
||
1DD47132000
|
heap
|
page read and write
|
||
282B4E84000
|
trusted library allocation
|
page read and write
|
||
BE3B935000
|
stack
|
page read and write
|
||
1851EE00000
|
heap
|
page read and write
|
||
2A329270000
|
heap
|
page read and write
|
||
2A329E4E000
|
trusted library allocation
|
page read and write
|
||
BE3C435000
|
stack
|
page read and write
|
||
282B4DD1000
|
trusted library allocation
|
page read and write
|
||
187928D3000
|
trusted library allocation
|
page read and write
|
||
282B4F02000
|
trusted library allocation
|
page read and write
|
||
27D804E5000
|
trusted library allocation
|
page read and write
|
||
27D8035B000
|
trusted library allocation
|
page read and write
|
||
1EE852AC000
|
heap
|
page read and write
|
||
187920CB000
|
heap
|
page read and write
|
||
27D80819000
|
trusted library allocation
|
page read and write
|
||
1B35B261000
|
trusted library allocation
|
page read and write
|
||
1D43C926000
|
heap
|
page read and write
|
||
7FFB23B20000
|
unkown
|
page read and write
|
||
282B3042000
|
unkown
|
page readonly
|
||
248ACC0C000
|
trusted library allocation
|
page read and write
|
||
282CD5E0000
|
heap
|
page read and write
|
||
27D802B1000
|
trusted library allocation
|
page read and write
|
||
2A342563000
|
heap
|
page read and write
|
||
248AC1CB000
|
heap
|
page read and write
|
||
27D80545000
|
trusted library allocation
|
page read and write
|
||
1B35B3D1000
|
trusted library allocation
|
page read and write
|
||
1D43C717000
|
heap
|
page read and write
|
||
248ACA11000
|
trusted library allocation
|
page read and write
|
||
1B35ABFD000
|
heap
|
page read and write
|
||
1B35ABB1000
|
heap
|
page read and write
|
||
2069BDCB000
|
heap
|
page read and write
|
||
1DD470F8000
|
heap
|
page read and write
|
||
248C52AD000
|
heap
|
page read and write
|
||
2069BBD2000
|
unkown
|
page readonly
|
||
1851F683000
|
trusted library allocation
|
page read and write
|
||
1EE85260000
|
heap
|
page read and write
|
||
1EE85A08000
|
trusted library allocation
|
page read and write
|
||
1EE85032000
|
unkown
|
page readonly
|
||
29025C50000
|
heap
|
page read and write
|
||
2A32A1A6000
|
trusted library allocation
|
page read and write
|
||
1851EE68000
|
heap
|
page read and write
|
||
2069BFB0000
|
heap
|
page read and write
|
||
27D80321000
|
trusted library allocation
|
page read and write
|
||
27DEC69C000
|
heap
|
page read and write
|
||
27D80724000
|
trusted library allocation
|
page read and write
|
||
2A329E50000
|
trusted library allocation
|
page read and write
|
||
131AC472000
|
heap
|
page read and write
|
||
2A32A0BA000
|
trusted library allocation
|
page read and write
|
||
1DD472C2000
|
unkown
|
page readonly
|
||
27D803D3000
|
trusted library allocation
|
page read and write
|
||
187920B0000
|
heap
|
page read and write
|
||
1851EEE9000
|
heap
|
page read and write
|
||
1851EE60000
|
heap
|
page read and write
|
||
A728B85000
|
stack
|
page read and write
|
||
282B4F36000
|
trusted library allocation
|
page read and write
|
||
29025B5B000
|
heap
|
page read and write
|
||
282B316E000
|
heap
|
page read and write
|
||
282B30EC000
|
heap
|
page read and write
|
||
2069C7E7000
|
trusted library allocation
|
page read and write
|
||
248AC490000
|
heap
|
page read and write
|
||
27D804E1000
|
trusted library allocation
|
page read and write
|
||
1D43CB6D000
|
heap
|
page read and write
|
||
131ACD47000
|
trusted library allocation
|
page read and write
|
||
1DD47175000
|
heap
|
page read and write
|
||
2069C7A1000
|
trusted library allocation
|
page read and write
|
||
2A32A19C000
|
trusted library allocation
|
page read and write
|
||
1D423198000
|
heap
|
page read and write
|
||
27D80232000
|
trusted library allocation
|
page read and write
|
||
282B33D0000
|
heap
|
page read and write
|
||
48F0000
|
heap
|
page read and write
|
||
282B4E59000
|
trusted library allocation
|
page read and write
|
||
1EE85991000
|
trusted library allocation
|
page read and write
|
||
27D805AD000
|
trusted library allocation
|
page read and write
|
||
1B35AD40000
|
heap
|
page read and write
|
||
27DEB1C0000
|
heap
|
page read and write
|
||
131AC431000
|
heap
|
page read and write
|
||
2A329CD3000
|
trusted library allocation
|
page read and write
|
||
2A32A04F000
|
trusted library allocation
|
page read and write
|
||
27D8085E000
|
trusted library allocation
|
page read and write
|
||
1DD4712C000
|
heap
|
page read and write
|
||
1D422ACC000
|
heap
|
page read and write
|
||
2A329EA8000
|
trusted library allocation
|
page read and write
|
||
1EE9E228000
|
heap
|
page read and write
|
||
2A329DDF000
|
trusted library allocation
|
page read and write
|
||
187AB3DD000
|
heap
|
page read and write
|
||
2A342100000
|
heap
|
page read and write
|
||
1F111BE3000
|
heap
|
page read and write
|
||
2A3425F7000
|
heap
|
page read and write
|
||
248ACB73000
|
trusted library allocation
|
page read and write
|
||
1D422772000
|
unkown
|
page readonly
|
||
2A34268D000
|
heap
|
page read and write
|
||
18792DAD000
|
trusted library allocation
|
page read and write
|
||
27DEB400000
|
heap
|
page read and write
|
||
29025C70000
|
heap
|
page read and write
|
||
27D803EB000
|
trusted library allocation
|
page read and write
|
||
27D80726000
|
trusted library allocation
|
page read and write
|
||
18792070000
|
heap
|
page read and write
|
||
2A32A0BC000
|
trusted library allocation
|
page read and write
|
||
187AB286000
|
heap
|
page read and write
|
||
24616A80000
|
heap
|
page read and write
|
||
27D8058E000
|
trusted library allocation
|
page read and write
|
||
27D803D9000
|
trusted library allocation
|
page read and write
|
||
47A1000
|
trusted library allocation
|
page read and write
|
||
282B4F05000
|
trusted library allocation
|
page read and write
|
||
27D802FE000
|
trusted library allocation
|
page read and write
|
||
2A342505000
|
heap
|
page read and write
|
||
1D422A40000
|
heap
|
page read and write
|
||
1B35B377000
|
trusted library allocation
|
page read and write
|
||
1EE85B96000
|
trusted library allocation
|
page read and write
|
||
131ACD01000
|
trusted library allocation
|
page read and write
|
||
282B3120000
|
heap
|
page read and write
|
||
2A32A056000
|
trusted library allocation
|
page read and write
|
||
27D8051E000
|
trusted library allocation
|
page read and write
|
||
27DEC64F000
|
heap
|
page read and write
|
||
2A329100000
|
heap
|
page read and write
|
||
1F111BC0000
|
heap
|
page read and write
|
||
4EEA000
|
heap
|
page read and write
|
||
1D422860000
|
heap
|
page read and write
|
||
27D80560000
|
trusted library allocation
|
page read and write
|
||
2A329E0C000
|
trusted library allocation
|
page read and write
|
||
2069C813000
|
trusted library allocation
|
page read and write
|
||
18792193000
|
heap
|
page read and write
|
||
1B373C55000
|
heap
|
page read and write
|
||
1D422A80000
|
heap
|
page read and write
|
||
27DEC617000
|
heap
|
page read and write
|
||
131AC6E0000
|
heap
|
page read and write
|
||
1851F673000
|
trusted library allocation
|
page read and write
|
||
BE3C229000
|
stack
|
page read and write
|
||
1D422A4C000
|
heap
|
page read and write
|
||
7FFAAC7E4000
|
trusted library allocation
|
page read and write
|
||
2A329F12000
|
trusted library allocation
|
page read and write
|
||
464A000
|
heap
|
page read and write
|
||
2A32913F000
|
heap
|
page read and write
|
||
27DEC610000
|
heap
|
page read and write
|
||
27D80543000
|
trusted library allocation
|
page read and write
|
||
1F111BE7000
|
heap
|
page read and write
|
||
27D803F0000
|
trusted library allocation
|
page read and write
|
||
2069C823000
|
trusted library allocation
|
page read and write
|
||
1DD47961000
|
trusted library allocation
|
page read and write
|
||
27DEB120000
|
heap
|
page read and write
|
||
282B3184000
|
heap
|
page read and write
|
||
BE3A0F5000
|
stack
|
page read and write
|
||
2A342905000
|
heap
|
page read and write
|
||
18792E36000
|
trusted library allocation
|
page read and write
|
||
29025B74000
|
heap
|
page read and write
|
||
282CD4D7000
|
heap
|
page read and write
|
||
1EE9E222000
|
heap
|
page read and write
|
||
2A3424CE000
|
heap
|
page read and write
|
||
1D422A86000
|
heap
|
page read and write
|
||
1F111CE0000
|
heap
|
page read and write
|
||
27D804D7000
|
trusted library allocation
|
page read and write
|
||
1D423841000
|
trusted library allocation
|
page read and write
|
||
282B4E82000
|
trusted library allocation
|
page read and write
|
||
206B4E60000
|
heap
|
page read and write
|
||
2A32918E000
|
heap
|
page read and write
|
||
131AC3F0000
|
heap
|
page read and write
|
||
2A329AAE000
|
trusted library allocation
|
page read and write
|
||
1851EE9D000
|
heap
|
page read and write
|
||
248AC275000
|
heap
|
page read and write
|
||
27D80353000
|
trusted library allocation
|
page read and write
|
||
248AC1AB000
|
heap
|
page read and write
|
||
2056C000000
|
heap
|
page read and write
|
||
2069BE0D000
|
heap
|
page read and write
|
||
2A3421CD000
|
heap
|
page read and write
|
||
1EE85B0D000
|
trusted library allocation
|
page read and write
|
||
131ACD83000
|
trusted library allocation
|
page read and write
|
||
1DD479D3000
|
trusted library allocation
|
page read and write
|
||
282B30E0000
|
heap
|
page read and write
|
||
187920FC000
|
heap
|
page read and write
|
||
27DEC317000
|
heap
|
page read and write
|
||
1B35AB70000
|
heap
|
page read and write
|
||
5163000
|
trusted library allocation
|
page read and write
|
||
7FFAAC890000
|
trusted library allocation
|
page read and write
|
||
206B4EEF000
|
heap
|
page read and write
|
||
2056CA89000
|
heap
|
page read and write
|
||
1D422C80000
|
unkown
|
page readonly
|
||
5B71000
|
trusted library allocation
|
page read and write
|
||
1F111B60000
|
heap
|
page read and write
|
||
131ACD3D000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC632000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7FD000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7FFAACDA0000
|
trusted library allocation
|
page read and write
|
||
282CD518000
|
heap
|
page read and write
|
||
7FFAAC6BC000
|
trusted library allocation
|
page execute and read and write
|
||
4F50000
|
trusted library allocation
|
page read and write
|
||
DC3F8FE000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
2056CADF000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
27D80817000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
2056CA91000
|
heap
|
page read and write
|
||
75D0000
|
trusted library allocation
|
page read and write
|
||
1D422D78000
|
unkown
|
page readonly
|
||
187AB33D000
|
heap
|
page read and write
|
||
7FFAAC808000
|
trusted library allocation
|
page read and write
|
||
1FCAC0C0000
|
heap
|
page read and write
|
||
2CE0AFE000
|
stack
|
page read and write
|
||
248C5364000
|
heap
|
page read and write
|
||
24BAEC45000
|
heap
|
page read and write
|
||
18A90C90000
|
heap
|
page read and write
|
||
27DEB3F5000
|
heap
|
page read and write
|
||
2F77000
|
heap
|
page read and write
|
||
5A571FD000
|
stack
|
page read and write
|
||
4886000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6E6000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
1DD47340000
|
heap
|
page execute and read and write
|
||
2CE0EFF000
|
stack
|
page read and write
|
||
7953CFE000
|
stack
|
page read and write
|
||
1ACC0460000
|
heap
|
page read and write
|
||
7FFAAC806000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
29515D00000
|
heap
|
page read and write
|
||
98800FE000
|
unkown
|
page readonly
|
||
1852F608000
|
trusted library allocation
|
page read and write
|
||
1ACC0463000
|
heap
|
page read and write
|
||
516C000
|
trusted library allocation
|
page execute and read and write
|
||
C8A297C000
|
stack
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
77AE000
|
stack
|
page read and write
|
||
2A329B05000
|
trusted library allocation
|
page read and write
|
||
9441FFE000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFAAC662000
|
trusted library allocation
|
page read and write
|
||
2A329B01000
|
trusted library allocation
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC990000
|
trusted library allocation
|
page execute and read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
25A1BD02000
|
heap
|
page read and write
|
||
450E000
|
stack
|
page read and write
|
||
248BCA11000
|
trusted library allocation
|
page read and write
|
||
248C522F000
|
heap
|
page read and write
|
||
131ACC6C000
|
heap
|
page read and write
|
||
9C8C7F6000
|
stack
|
page read and write
|
||
AC479FF000
|
stack
|
page read and write
|
||
248C5316000
|
heap
|
page read and write
|
||
1ACC045E000
|
heap
|
page read and write
|
||
20AD4980000
|
remote allocation
|
page read and write
|
||
5169000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACD10000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
187AB47B000
|
heap
|
page read and write
|
||
1851EDC0000
|
heap
|
page read and write
|
||
248AC920000
|
heap
|
page read and write
|
||
7FFAACA50000
|
trusted library allocation
|
page read and write
|
||
D1D3BFF000
|
stack
|
page read and write
|
||
2069C8CF000
|
trusted library allocation
|
page read and write
|
||
9441BFC000
|
stack
|
page read and write
|
||
2056CB50000
|
heap
|
page read and write
|
||
2A329C00000
|
trusted library allocation
|
page read and write
|
||
2F66000
|
heap
|
page read and write
|
||
5A56FFF000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
187AB383000
|
heap
|
page read and write
|
||
43D3000
|
trusted library allocation
|
page read and write
|
||
72CC000
|
heap
|
page read and write
|
||
67A8000
|
trusted library allocation
|
page read and write
|
||
2056C1F0000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
282B3064000
|
unkown
|
page readonly
|
||
282B32D0000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
3097000
|
heap
|
page read and write
|
||
1D422C75000
|
heap
|
page read and write
|
||
27AE000
|
heap
|
page read and write
|
||
6DBE000
|
stack
|
page read and write
|
||
7FFAAC823000
|
trusted library allocation
|
page read and write
|
||
98FFA7B000
|
stack
|
page read and write
|
||
187AB2C6000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
27D800CD000
|
trusted library allocation
|
page read and write
|
||
24BAEC13000
|
heap
|
page read and write
|
||
2056C03A000
|
heap
|
page read and write
|
||
1FCAF1D8000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8D0000
|
trusted library allocation
|
page read and write
|
||
3050000
|
heap
|
page read and write
|
||
DD353D1000
|
stack
|
page read and write
|
||
1EE851E5000
|
heap
|
page read and write
|
||
5272000
|
trusted library allocation
|
page read and write
|
||
7FFAAC82C000
|
trusted library allocation
|
page read and write
|
||
7FFAACA20000
|
trusted library allocation
|
page read and write
|
||
2A3292F5000
|
heap
|
page read and write
|
||
7FFAACB70000
|
trusted library allocation
|
page read and write
|
||
282B3124000
|
heap
|
page read and write
|
||
27D806A1000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
1ACC045B000
|
heap
|
page read and write
|
||
7FFAAC65B000
|
trusted library allocation
|
page execute and read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
2EB0000
|
trusted library allocation
|
page read and write
|
||
29515F02000
|
heap
|
page read and write
|
||
7FFAAC664000
|
trusted library allocation
|
page read and write
|
||
2A329B11000
|
trusted library allocation
|
page read and write
|
||
7584000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
246174A1000
|
heap
|
page read and write
|
||
5A56B34000
|
stack
|
page read and write
|
||
7FFAAC8D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC847000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
7FFAACCB0000
|
trusted library allocation
|
page execute and read and write
|
||
187AB2FC000
|
heap
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
18A90E68000
|
heap
|
page read and write
|
||
7FFAAC825000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
18792740000
|
trusted library allocation
|
page read and write
|
||
1D43BAB2000
|
unkown
|
page readonly
|
||
29516390000
|
trusted library allocation
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
7570000
|
trusted library allocation
|
page read and write
|
||
2056CBCA000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFAAC726000
|
trusted library allocation
|
page execute and read and write
|
||
1851EE9F000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
27D800D9000
|
trusted library allocation
|
page read and write
|
||
1FCAC248000
|
heap
|
page read and write
|
||
248C5310000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
1D43CB84000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC810000
|
trusted library allocation
|
page read and write
|
||
7FFAAC716000
|
trusted library allocation
|
page execute and read and write
|
||
4F03000
|
trusted library allocation
|
page execute and read and write
|
||
6D44000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
2056CA72000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
27D80595000
|
trusted library allocation
|
page read and write
|
||
282CD545000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
364B9FD000
|
stack
|
page read and write
|
||
2069C8E3000
|
trusted library allocation
|
page read and write
|
||
7FFAAC950000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
2A329E97000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
75C0000
|
trusted library allocation
|
page read and write
|
||
2069C8F1000
|
trusted library allocation
|
page read and write
|
||
187AB24D000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
1D4332A1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC643000
|
trusted library allocation
|
page read and write
|
||
1B35AEC0000
|
heap
|
page read and write
|
||
4AF0000
|
heap
|
page read and write
|
||
1D422770000
|
unkown
|
page readonly
|
||
29B0000
|
heap
|
page read and write
|
||
7FFAACC50000
|
trusted library allocation
|
page execute and read and write
|
||
29025DD0000
|
heap
|
page read and write
|
||
7FFAAC806000
|
trusted library allocation
|
page read and write
|
||
35A0000
|
heap
|
page read and write
|
||
27D800A7000
|
trusted library allocation
|
page read and write
|
||
18A90EA3000
|
heap
|
page read and write
|
||
286F000
|
stack
|
page read and write
|
||
2A329FE8000
|
trusted library allocation
|
page read and write
|
||
7C0697E000
|
stack
|
page read and write
|
||
2056CA21000
|
heap
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
1EE85B43000
|
trusted library allocation
|
page read and write
|
||
1ACC0443000
|
heap
|
page read and write
|
||
1ACC044C000
|
heap
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC84C000
|
trusted library allocation
|
page read and write
|
||
D4AFBFD000
|
stack
|
page read and write
|
||
246174E9000
|
heap
|
page read and write
|
||
1EE851B0000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
2056CA4D000
|
heap
|
page read and write
|
||
4F32000
|
trusted library allocation
|
page read and write
|
||
73D16000
|
unkown
|
page readonly
|
||
248AC1D6000
|
heap
|
page read and write
|
||
2461746D000
|
heap
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
1ACC044E000
|
heap
|
page read and write
|
||
24616B3A000
|
heap
|
page read and write
|
||
1851F580000
|
heap
|
page execute and read and write
|
||
1ACC04A0000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
248C534E000
|
heap
|
page read and write
|
||
1D43BD5E000
|
unkown
|
page readonly
|
||
246175CA000
|
heap
|
page read and write
|
||
6D60000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
1DD47AB5000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page execute and read and write
|
||
1851F050000
|
trusted library allocation
|
page read and write
|
||
7FFAAC64D000
|
trusted library allocation
|
page execute and read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
6BDE000
|
stack
|
page read and write
|
||
2056BFF0000
|
heap
|
page read and write
|
||
206B4E85000
|
heap
|
page read and write
|
||
7FFAACCA0000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
364AEFD000
|
stack
|
page read and write
|
||
1ACC0455000
|
heap
|
page read and write
|
||
131ACD3F000
|
trusted library allocation
|
page read and write
|
||
2069BDC3000
|
heap
|
page read and write
|
||
7FFAACCF0000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC860000
|
trusted library allocation
|
page execute and read and write
|
||
282B4F48000
|
trusted library allocation
|
page read and write
|
||
246175B8000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
25A1C402000
|
trusted library allocation
|
page read and write
|
||
248ACC76000
|
trusted library allocation
|
page read and write
|
||
7FFAAC68D000
|
trusted library allocation
|
page execute and read and write
|
||
6CD9000
|
trusted library allocation
|
page read and write
|
||
4694000
|
trusted library allocation
|
page read and write
|
||
27DEB350000
|
heap
|
page read and write
|
||
18792A1C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC65D000
|
trusted library allocation
|
page execute and read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8E0000
|
trusted library allocation
|
page read and write
|
||
131ACC36000
|
heap
|
page read and write
|
||
1D43BB54000
|
unkown
|
page readonly
|
||
248C5283000
|
heap
|
page read and write
|
||
7FFAAC8B0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC831000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
22115860000
|
heap
|
page read and write
|
||
2A32A054000
|
trusted library allocation
|
page read and write
|
||
2A329A94000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
1FCAF1A0000
|
heap
|
page read and write
|
||
27D800B3000
|
trusted library allocation
|
page read and write
|
||
7FFB23B25000
|
unkown
|
page readonly
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
D1D42FE000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
187AB202000
|
heap
|
page read and write
|
||
7FFAACA40000
|
trusted library allocation
|
page read and write
|
||
BE3AE3E000
|
stack
|
page read and write
|
||
7FFAAC684000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8C0000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page read and write
|
||
6C30000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
2069BF60000
|
heap
|
page execute and read and write
|
||
1D4332C1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC810000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFAACB60000
|
trusted library allocation
|
page read and write
|
||
7FFAACC60000
|
trusted library allocation
|
page read and write
|
||
364B5FE000
|
stack
|
page read and write
|
||
1EE85EE8000
|
trusted library allocation
|
page read and write
|
||
9C8CFFE000
|
unkown
|
page readonly
|
||
7550000
|
trusted library allocation
|
page read and write
|
||
2056CB42000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
1C53ED13000
|
heap
|
page read and write
|
||
2C99000
|
heap
|
page read and write
|
||
2A3298A0000
|
heap
|
page read and write
|
||
18A90EA7000
|
heap
|
page read and write
|
||
7FFAAC9A0000
|
trusted library allocation
|
page read and write
|
||
2069BDC9000
|
heap
|
page read and write
|
||
CE4D871000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
5BFFFFE000
|
stack
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
2056CA23000
|
heap
|
page read and write
|
||
2056CB54000
|
heap
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9A3000
|
trusted library allocation
|
page read and write
|
||
7FFAAC914000
|
trusted library allocation
|
page read and write
|
||
1B373E30000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
5B801FF000
|
stack
|
page read and write
|
||
282CD590000
|
heap
|
page execute and read and write
|
||
7FFAAC836000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
2F6F000
|
heap
|
page read and write
|
||
1DD47270000
|
trusted library allocation
|
page read and write
|
||
248ACA00000
|
heap
|
page execute and read and write
|
||
282CD600000
|
unkown
|
page readonly
|
||
7C05EAB000
|
stack
|
page read and write
|
||
A87EDFE000
|
stack
|
page read and write
|
||
2056C0B0000
|
heap
|
page read and write
|
||
27D800FD000
|
trusted library allocation
|
page read and write
|
||
187AB3B5000
|
heap
|
page read and write
|
||
7FFAAC6F0000
|
trusted library allocation
|
page execute and read and write
|
||
1C53EC00000
|
heap
|
page read and write
|
||
1ACC0451000
|
heap
|
page read and write
|
||
27D8068C000
|
trusted library allocation
|
page read and write
|
||
2E40000
|
trusted library section
|
page read and write
|
||
7FFAAC790000
|
trusted library allocation
|
page execute and read and write
|
||
1852F601000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7F0000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
4F10000
|
trusted library allocation
|
page read and write
|
||
339F000
|
stack
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6BC000
|
trusted library allocation
|
page execute and read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2069BDAA000
|
heap
|
page read and write
|
||
2769000
|
heap
|
page read and write
|
||
7FFAAC716000
|
trusted library allocation
|
page read and write
|
||
27D80051000
|
trusted library allocation
|
page read and write
|
||
18A90EE9000
|
heap
|
page read and write
|
||
7FFAAC820000
|
trusted library allocation
|
page read and write
|
||
18792750000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
98FFEFE000
|
unkown
|
page readonly
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
246174F4000
|
heap
|
page read and write
|
||
2056CA83000
|
heap
|
page read and write
|
||
2056CA23000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
2A341A70000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
27DEB3D0000
|
trusted library allocation
|
page read and write
|
||
246174F1000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A0000
|
trusted library allocation
|
page execute and read and write
|
||
1ACC045C000
|
heap
|
page read and write
|
||
27DEC65D000
|
heap
|
page read and write
|
||
7FFAAC7D3000
|
trusted library allocation
|
page read and write
|
||
43F0000
|
trusted library allocation
|
page read and write
|
||
1C53EC2B000
|
heap
|
page read and write
|
||
282CD563000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
248C52D7000
|
heap
|
page read and write
|
||
24617476000
|
heap
|
page read and write
|
||
27D80097000
|
trusted library allocation
|
page read and write
|
||
7FFAAC780000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC746000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC840000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
24BB0B70000
|
remote allocation
|
page read and write
|
||
7AEE000
|
stack
|
page read and write
|
||
24BAEC00000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
1EE9E2CB000
|
heap
|
page read and write
|
||
1B35AD45000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
5150000
|
trusted library allocation
|
page read and write
|
||
7FFAAC660000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
248C5278000
|
heap
|
page read and write
|
||
248C4A40000
|
trusted library allocation
|
page read and write
|
||
32F4000
|
heap
|
page read and write
|
||
57A5000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
1EE85B81000
|
trusted library allocation
|
page read and write
|
||
2056CBCC000
|
heap
|
page read and write
|
||
2A329A9C000
|
trusted library allocation
|
page read and write
|
||
1FCACB26000
|
heap
|
page read and write
|
||
7FFAAC652000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
291B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC859000
|
trusted library allocation
|
page read and write
|
||
2A339ABF000
|
trusted library allocation
|
page read and write
|
||
2A32A025000
|
trusted library allocation
|
page read and write
|
||
2056CA88000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
51ED000
|
trusted library allocation
|
page read and write
|
||
187920F2000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
BE3AD3D000
|
stack
|
page read and write
|
||
351E000
|
stack
|
page read and write
|
||
7FFAAC66D000
|
trusted library allocation
|
page execute and read and write
|
||
9C8CBFE000
|
unkown
|
page readonly
|
||
29515E48000
|
heap
|
page read and write
|
||
364B8FD000
|
stack
|
page read and write
|
||
246174A1000
|
heap
|
page read and write
|
||
A729DFC000
|
stack
|
page read and write
|
||
248C544B000
|
heap
|
page read and write
|
||
BE3A4FD000
|
stack
|
page read and write
|
||
4F37000
|
trusted library allocation
|
page execute and read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC66B000
|
trusted library allocation
|
page execute and read and write
|
||
5160000
|
trusted library allocation
|
page read and write
|
||
1FCAC287000
|
heap
|
page read and write
|
||
9442BFE000
|
stack
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
5B800FF000
|
stack
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2F7A000
|
heap
|
page read and write
|
||
498E000
|
stack
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
24617440000
|
heap
|
page read and write
|
||
331E000
|
stack
|
page read and write
|
||
2461759F000
|
heap
|
page read and write
|
||
5190EFC000
|
stack
|
page read and write
|
||
5190DFE000
|
stack
|
page read and write
|
||
1EE853C0000
|
heap
|
page read and write
|
||
18A90E52000
|
heap
|
page read and write
|
||
246174F4000
|
heap
|
page read and write
|
||
248C533E000
|
heap
|
page read and write
|
||
7FFAACBA0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC81E000
|
trusted library allocation
|
page read and write
|
||
98802FE000
|
unkown
|
page readonly
|
||
D5AB71000
|
stack
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7FFAAC683000
|
trusted library allocation
|
page read and write
|
||
1EE9E220000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
1851F5F0000
|
heap
|
page read and write
|
||
7FFAAC820000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
75A4000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7FFAAC68D000
|
trusted library allocation
|
page execute and read and write
|
||
BE3AB29000
|
stack
|
page read and write
|
||
7FFB23B22000
|
unkown
|
page readonly
|
||
7FFAAC800000
|
trusted library allocation
|
page read and write
|
||
7FFAAC716000
|
trusted library allocation
|
page execute and read and write
|
||
24BAEC2B000
|
heap
|
page read and write
|
||
364ACFF000
|
stack
|
page read and write
|
||
2DCE000
|
stack
|
page read and write
|
||
131ACBC0000
|
heap
|
page read and write
|
||
1DD472D8000
|
unkown
|
page readonly
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
2C08000
|
heap
|
page read and write
|
||
18792265000
|
heap
|
page read and write
|
||
DD35EFE000
|
stack
|
page read and write
|
||
1DD4714C000
|
heap
|
page read and write
|
||
2069BF00000
|
trusted library allocation
|
page read and write
|
||
AC47BFE000
|
stack
|
page read and write
|
||
CE4D27E000
|
stack
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC80E000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
1879288D000
|
trusted library allocation
|
page read and write
|
||
1EE8526A000
|
heap
|
page read and write
|
||
1EE85920000
|
heap
|
page execute and read and write
|
||
7583000
|
trusted library allocation
|
page read and write
|
||
24617547000
|
heap
|
page read and write
|
||
18A90F02000
|
trusted library allocation
|
page read and write
|
||
2056CA30000
|
heap
|
page read and write
|
||
2EE7000
|
trusted library allocation
|
page execute and read and write
|
||
7C065FE000
|
stack
|
page read and write
|
||
7FFAACA00000
|
trusted library allocation
|
page read and write
|
||
9C8C8FE000
|
unkown
|
page readonly
|
||
7FFAAC8B0000
|
trusted library allocation
|
page execute and read and write
|
||
27D80690000
|
trusted library allocation
|
page read and write
|
||
1FCAC248000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
246169C0000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
718E000
|
stack
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
49D0000
|
trusted library allocation
|
page execute and read and write
|
||
18A91019000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
282B310B000
|
heap
|
page read and write
|
||
2A3421F7000
|
heap
|
page read and write
|
||
1D422C30000
|
trusted library allocation
|
page read and write
|
||
D1D3FFE000
|
stack
|
page read and write
|
||
18792E14000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAACDC0000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7FFAAC700000
|
trusted library allocation
|
page read and write
|
||
CE4C9F7000
|
stack
|
page read and write
|
||
7FFAAC67D000
|
trusted library allocation
|
page execute and read and write
|
||
1EE9E28F000
|
heap
|
page read and write
|
||
18792E03000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
2461745D000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
2056C01B000
|
heap
|
page read and write
|
||
BE3BC3E000
|
stack
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
4833000
|
trusted library allocation
|
page read and write
|
||
364ADFE000
|
stack
|
page read and write
|
||
2A342590000
|
heap
|
page read and write
|
||
206AC7B1000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
282CD802000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
27D8066A000
|
trusted library allocation
|
page read and write
|
||
248C5424000
|
heap
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
2056CBBD000
|
heap
|
page read and write
|
||
131AC660000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
50B0000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
131AC680000
|
trusted library allocation
|
page read and write
|
||
1DD60205000
|
heap
|
page read and write
|
||
2A00000
|
heap
|
page read and write
|
||
CE4CCFE000
|
stack
|
page read and write
|
||
BE3B53E000
|
stack
|
page read and write
|
||
24617499000
|
heap
|
page read and write
|
||
2056CA20000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
24BAEC70000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2069BE0A000
|
heap
|
page read and write
|
||
1B35ABBB000
|
heap
|
page read and write
|
||
D1D46FE000
|
stack
|
page read and write
|
||
94424FD000
|
stack
|
page read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC860000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7E5000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFB23B20000
|
unkown
|
page read and write
|
||
7FFAAC850000
|
trusted library allocation
|
page read and write
|
||
CE4C8FE000
|
stack
|
page read and write
|
||
131AC4F0000
|
heap
|
page read and write
|
||
246175B4000
|
heap
|
page read and write
|
||
282B316A000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
6D23000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
1D422D20000
|
heap
|
page read and write
|
||
7570000
|
trusted library allocation
|
page read and write
|
||
7FFAAC66D000
|
trusted library allocation
|
page execute and read and write
|
||
282B3128000
|
heap
|
page read and write
|
||
2930000
|
heap
|
page read and write
|
||
24BAED28000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC746000
|
trusted library allocation
|
page execute and read and write
|
||
BE3A5FE000
|
stack
|
page read and write
|
||
7FFAAC860000
|
trusted library allocation
|
page read and write
|
||
1EE9E267000
|
heap
|
page read and write
|
||
1FCAC200000
|
heap
|
page read and write
|
||
1C53EC39000
|
heap
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
187AB355000
|
heap
|
page read and write
|
||
27D8064E000
|
trusted library allocation
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
1FCAF1A5000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
24616B30000
|
heap
|
page read and write
|
||
2056CBAE000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC856000
|
trusted library allocation
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
BE3A1FF000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFAAC694000
|
trusted library allocation
|
page read and write
|
||
18A91102000
|
heap
|
page read and write
|
||
2056CA22000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
2A329B09000
|
trusted library allocation
|
page read and write
|
||
2069BF20000
|
trusted library allocation
|
page read and write
|
||
43F4000
|
heap
|
page read and write
|
||
2E0E000
|
stack
|
page read and write
|
||
1ACC0431000
|
heap
|
page read and write
|
||
2461748D000
|
heap
|
page read and write
|
||
C8A2A7E000
|
unkown
|
page readonly
|
||
7FFAAC726000
|
trusted library allocation
|
page read and write
|
||
18A90ED4000
|
heap
|
page read and write
|
||
1D43C922000
|
heap
|
page read and write
|
||
2056CA91000
|
heap
|
page read and write
|
||
2FF7000
|
stack
|
page read and write
|
||
7FFAAC746000
|
trusted library allocation
|
page execute and read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC990000
|
trusted library allocation
|
page execute and read and write
|
||
4F14000
|
trusted library allocation
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
2056CBD1000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
33A7000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
D5AFFF000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
A87F07E000
|
unkown
|
page readonly
|
||
1EE9E2BB000
|
heap
|
page read and write
|
||
7FFAAC920000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
5BFFDF8000
|
stack
|
page read and write
|
||
1D423803000
|
trusted library allocation
|
page read and write
|
||
27D800AB000
|
trusted library allocation
|
page read and write
|
||
2056CA8D000
|
heap
|
page read and write
|
||
7FFAAC810000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
246175A8000
|
heap
|
page read and write
|
||
A87EC7D000
|
stack
|
page read and write
|
||
7FFAAC9F0000
|
trusted library allocation
|
page read and write
|
||
2069BE08000
|
heap
|
page read and write
|
||
7FFAAC8A6000
|
trusted library allocation
|
page read and write
|
||
7FFAAC76B000
|
trusted library allocation
|
page execute and read and write
|
||
1C53EC7F000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
246175A8000
|
heap
|
page read and write
|
||
7FFAAC716000
|
trusted library allocation
|
page read and write
|
||
D6A86FC000
|
stack
|
page read and write
|
||
131ACE55000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
18792E10000
|
trusted library allocation
|
page read and write
|
||
B8118FE000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
364AFFE000
|
stack
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2A32A130000
|
trusted library allocation
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
2056CBB6000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
1B35AB9B000
|
heap
|
page read and write
|
||
24BAED00000
|
heap
|
page read and write
|
||
282B4C60000
|
heap
|
page read and write
|
||
246175CB000
|
heap
|
page read and write
|
||
A87E87E000
|
unkown
|
page readonly
|
||
282CD7E0000
|
heap
|
page read and write
|
||
282B31F0000
|
heap
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
DD3647E000
|
stack
|
page read and write
|
||
7FFAAC830000
|
trusted library allocation
|
page read and write
|
||
7FFAAC850000
|
trusted library allocation
|
page read and write
|
||
7FFAAC664000
|
trusted library allocation
|
page read and write
|
||
EEDDBFF000
|
unkown
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7FFB23B16000
|
unkown
|
page readonly
|
||
18A90D90000
|
trusted library allocation
|
page read and write
|
||
1EE9E2BF000
|
heap
|
page read and write
|
||
27D800DD000
|
trusted library allocation
|
page read and write
|
||
7FFAAC822000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
5008000
|
trusted library allocation
|
page read and write
|
||
1DD47950000
|
heap
|
page execute and read and write
|
||
BE3BA3B000
|
stack
|
page read and write
|
||
7FFAAC84D000
|
trusted library allocation
|
page read and write
|
||
131ACC2C000
|
heap
|
page read and write
|
||
6D70000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
2C08000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
2BFC000
|
heap
|
page read and write
|
||
DD3637F000
|
stack
|
page read and write
|
||
7544000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7E3000
|
trusted library allocation
|
page read and write
|
||
282CD806000
|
heap
|
page read and write
|
||
1D43BBC0000
|
heap
|
page execute and read and write
|
||
187AB36E000
|
heap
|
page read and write
|
||
248C52C9000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
4865000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
2A329B0D000
|
trusted library allocation
|
page read and write
|
||
206B4E82000
|
heap
|
page read and write
|
||
1B35AB30000
|
heap
|
page read and write
|
||
7FFAAC640000
|
trusted library allocation
|
page read and write
|
||
187AB325000
|
heap
|
page read and write
|
||
1B35B4D8000
|
trusted library allocation
|
page read and write
|
||
131AC43B000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
248C52E2000
|
heap
|
page read and write
|
||
1D422DF5000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
2056CB49000
|
heap
|
page read and write
|
||
1EE85370000
|
trusted library allocation
|
page read and write
|
||
2056CAE4000
|
heap
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
4790000
|
heap
|
page execute and read and write
|
||
32DE000
|
stack
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7581000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
27D80634000
|
trusted library allocation
|
page read and write
|
||
2069C790000
|
heap
|
page execute and read and write
|
||
24616AA5000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
2056C0BA000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFAAC660000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
1C53EC13000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
B8117FE000
|
stack
|
page read and write
|
||
248BCA21000
|
trusted library allocation
|
page read and write
|
||
7FFAAC830000
|
trusted library allocation
|
page read and write
|
||
7FFAAC930000
|
trusted library allocation
|
page read and write
|
||
187AB222000
|
heap
|
page read and write
|
||
246174F8000
|
heap
|
page read and write
|
||
7A70000
|
remote allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
D5B3FF000
|
stack
|
page read and write
|
||
CE4D13E000
|
stack
|
page read and write
|
||
CE4D17E000
|
stack
|
page read and write
|
||
248C540E000
|
heap
|
page read and write
|
||
2A3424F8000
|
heap
|
page read and write
|
||
1EE8524A000
|
heap
|
page read and write
|
||
6D24000
|
trusted library allocation
|
page read and write
|
||
7FFAAC860000
|
trusted library allocation
|
page read and write
|
||
4F00000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
2FE1000
|
heap
|
page read and write
|
||
282C4DD1000
|
trusted library allocation
|
page read and write
|
||
28ED000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC890000
|
trusted library allocation
|
page execute and read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6D10000
|
trusted library allocation
|
page read and write
|
||
27D5000
|
heap
|
page read and write
|
||
A72A13F000
|
stack
|
page read and write
|
||
1851EE10000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
1ACC0444000
|
heap
|
page read and write
|
||
7FFB23B1D000
|
unkown
|
page readonly
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
DD35AFE000
|
stack
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page execute and read and write
|
||
72C6000
|
heap
|
page read and write
|
||
29515E00000
|
heap
|
page read and write
|
||
248C529D000
|
heap
|
page read and write
|
||
24616B79000
|
heap
|
page read and write
|
||
2F6E000
|
heap
|
page read and write
|
||
7FFAAC680000
|
trusted library allocation
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
2069BEA0000
|
heap
|
page read and write
|
||
28E3000
|
trusted library allocation
|
page execute and read and write
|
||
2056CA91000
|
heap
|
page read and write
|
||
73D1F000
|
unkown
|
page readonly
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7F350000
|
trusted library allocation
|
page execute and read and write
|
||
2056C06E000
|
heap
|
page read and write
|
||
A87EB7E000
|
unkown
|
page readonly
|
||
5BFF68D000
|
stack
|
page read and write
|
||
2C99000
|
heap
|
page read and write
|
||
7FFAAC7E0000
|
trusted library allocation
|
page read and write
|
||
248C523E000
|
heap
|
page read and write
|
||
27D8069B000
|
trusted library allocation
|
page read and write
|
||
364B0FE000
|
stack
|
page read and write
|
||
6D50000
|
trusted library allocation
|
page execute and read and write
|
||
D4AFCFE000
|
stack
|
page read and write
|
||
2A329C63000
|
trusted library allocation
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
2056CBC1000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
18792030000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
4B20000
|
trusted library allocation
|
page read and write
|
||
2F4F000
|
heap
|
page read and write
|
||
131AC6E5000
|
heap
|
page read and write
|
||
27DEB1A5000
|
heap
|
page read and write
|
||
29025B10000
|
heap
|
page read and write
|
||
2C92000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
27DEC220000
|
heap
|
page execute and read and write
|
||
7C0667E000
|
unkown
|
page readonly
|
||
7FFAAC890000
|
trusted library allocation
|
page execute and read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
4AC0000
|
trusted library allocation
|
page read and write
|
||
27DEB17D000
|
heap
|
page read and write
|
||
131AC520000
|
heap
|
page read and write
|
||
131AC510000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8C0000
|
trusted library allocation
|
page execute and read and write
|
||
6FC8EFE000
|
stack
|
page read and write
|
||
282CD7F8000
|
heap
|
page read and write
|
||
437E000
|
stack
|
page read and write
|
||
2C7C000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
2069BDC5000
|
heap
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
758E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC920000
|
trusted library allocation
|
page read and write
|
||
187AB312000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
4FF0000
|
heap
|
page readonly
|
||
79AE000
|
stack
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A0000
|
trusted library allocation
|
page read and write
|
||
2056CBB2000
|
heap
|
page read and write
|
||
7FFAAC67B000
|
trusted library allocation
|
page execute and read and write
|
||
20AD4200000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC900000
|
trusted library allocation
|
page execute and read and write
|
||
246175C9000
|
heap
|
page read and write
|
||
6D60000
|
trusted library allocation
|
page read and write
|
||
248C528C000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
257E000
|
stack
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2C13000
|
heap
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
7FFAAC716000
|
trusted library allocation
|
page read and write
|
||
7FFB23B16000
|
unkown
|
page readonly
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8AA000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7FFB23B22000
|
unkown
|
page readonly
|
||
248C5352000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
246174A1000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC905000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8B0000
|
trusted library allocation
|
page execute and read and write
|
||
2A32A136000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
BE3B23E000
|
stack
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
2461748D000
|
heap
|
page read and write
|
||
248ACC61000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
remote allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
248C5441000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
27DEB310000
|
heap
|
page read and write
|
||
7FFAAC806000
|
trusted library allocation
|
page read and write
|
||
2A329141000
|
heap
|
page read and write
|
||
2E80000
|
heap
|
page read and write
|
||
248AC8C0000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
BE3AA3E000
|
stack
|
page read and write
|
||
7FFAACC93000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
24617534000
|
heap
|
page read and write
|
||
131BCD0D000
|
trusted library allocation
|
page read and write
|
||
18792DEA000
|
trusted library allocation
|
page read and write
|
||
1EE85EE3000
|
trusted library allocation
|
page read and write
|
||
7FFAACA40000
|
trusted library allocation
|
page execute and read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFB036AA000
|
unkown
|
page readonly
|
||
51E0000
|
trusted library allocation
|
page read and write
|
||
1C53EC02000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
206B4E80000
|
heap
|
page read and write
|
||
75C0000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
248C5209000
|
heap
|
page read and write
|
||
2056C028000
|
heap
|
page read and write
|
||
1851F060000
|
heap
|
page read and write
|
||
282B3310000
|
heap
|
page read and write
|
||
DD35DFE000
|
stack
|
page read and write
|
||
7620000
|
heap
|
page execute and read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
2A3422C0000
|
unkown
|
page readonly
|
||
73D1D000
|
unkown
|
page read and write
|
||
3660000
|
heap
|
page read and write
|
||
7FFAAC69B000
|
trusted library allocation
|
page execute and read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page execute and read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
5BFF70E000
|
stack
|
page read and write
|
||
2498000
|
stack
|
page read and write
|
||
7FFAAC81A000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC800000
|
trusted library allocation
|
page read and write
|
||
2056CA21000
|
heap
|
page read and write
|
||
1EE85980000
|
heap
|
page read and write
|
||
248C5203000
|
heap
|
page read and write
|
||
DD361FE000
|
stack
|
page read and write
|
||
7FFAAC940000
|
trusted library allocation
|
page read and write
|
||
75B0000
|
trusted library allocation
|
page execute and read and write
|
||
24616AA0000
|
heap
|
page read and write
|
||
7FFAAC64D000
|
trusted library allocation
|
page execute and read and write
|
||
1ACC0320000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
131AC42D000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
2A329B19000
|
trusted library allocation
|
page read and write
|
||
7FFB23B01000
|
unkown
|
page execute read
|
||
364AAF1000
|
stack
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
18A91144000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
2461749D000
|
heap
|
page read and write
|
||
1DD601CC000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
1D422CC6000
|
unkown
|
page readonly
|
||
47EF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC650000
|
trusted library allocation
|
page read and write
|
||
1D423290000
|
heap
|
page execute and read and write
|
||
1EE9E170000
|
unkown
|
page readonly
|
||
248C524A000
|
heap
|
page read and write
|
||
1D422D82000
|
unkown
|
page readonly
|
||
4560000
|
heap
|
page read and write
|
||
2A329B25000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
DD360FE000
|
stack
|
page read and write
|
||
5143000
|
trusted library allocation
|
page read and write
|
||
7FFAAC716000
|
trusted library allocation
|
page read and write
|
||
DD358FF000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
248C5292000
|
heap
|
page read and write
|
||
2720000
|
heap
|
page read and write
|
||
7FFAAC68D000
|
trusted library allocation
|
page execute and read and write
|
||
1B35AD80000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
27D806A3000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2D0E000
|
stack
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
2056CA59000
|
heap
|
page read and write
|
||
7FFAAC700000
|
trusted library allocation
|
page execute and read and write
|
||
1D423275000
|
heap
|
page read and write
|
||
248C5454000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC829000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFB0BB32000
|
unkown
|
page readonly
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7581000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7FFAAC72C000
|
trusted library allocation
|
page execute and read and write
|
||
187AB477000
|
heap
|
page read and write
|
||
6CB0000
|
trusted library allocation
|
page read and write
|
||
2580000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAACA90000
|
trusted library allocation
|
page read and write
|
||
7FFAAC690000
|
trusted library allocation
|
page read and write
|
||
187AB267000
|
heap
|
page read and write
|
||
7FFAAC840000
|
trusted library allocation
|
page execute and read and write
|
||
246175C8000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7AF0000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
1EE9E2B8000
|
heap
|
page read and write
|
||
6DC0000
|
remote allocation
|
page read and write
|
||
DFD000
|
stack
|
page read and write
|
||
7FFAAC810000
|
trusted library allocation
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
248ACA91000
|
trusted library allocation
|
page read and write
|
||
1DD601D2000
|
heap
|
page read and write
|
||
BE3B639000
|
stack
|
page read and write
|
||
79EE000
|
stack
|
page read and write
|
||
2F38000
|
heap
|
page read and write
|
||
187AB2AE000
|
heap
|
page read and write
|
||
7FFAAC726000
|
trusted library allocation
|
page execute and read and write
|
||
A72A53B000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
1DD472E5000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
1851EEE4000
|
heap
|
page read and write
|
||
7FFAACB4D000
|
trusted library allocation
|
page read and write
|
||
2056CAE4000
|
heap
|
page read and write
|
||
7FFAAC663000
|
trusted library allocation
|
page read and write
|
||
2056CBAE000
|
heap
|
page read and write
|
||
27DEC630000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
18A90E13000
|
unkown
|
page read and write
|
||
27D800D5000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2F7C000
|
heap
|
page read and write
|
||
AC474FE000
|
stack
|
page read and write
|
||
2A3421EC000
|
heap
|
page read and write
|
||
7FFAACA10000
|
trusted library allocation
|
page read and write
|
||
2461748E000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
6F8E000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
7FFAAC64D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
364B1FE000
|
stack
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
2056CB44000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
2056C02E000
|
heap
|
page read and write
|
||
1851EEE6000
|
heap
|
page read and write
|
||
131AC515000
|
heap
|
page read and write
|
||
30AE000
|
stack
|
page read and write
|
||
C8A2B7E000
|
stack
|
page read and write
|
||
24616A88000
|
heap
|
page read and write
|
||
3550000
|
heap
|
page read and write
|
||
4B30000
|
heap
|
page execute and read and write
|
||
1DD47AA3000
|
trusted library allocation
|
page read and write
|
||
697E000
|
stack
|
page read and write
|
||
1B35AA10000
|
heap
|
page read and write
|
||
4FDE000
|
stack
|
page read and write
|
||
47FD000
|
trusted library allocation
|
page read and write
|
||
A7297E9000
|
stack
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
248AC640000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
18792A0E000
|
trusted library allocation
|
page read and write
|
||
20AD4980000
|
remote allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
2F30000
|
heap
|
page read and write
|
||
7FFAAC8E0000
|
trusted library allocation
|
page read and write
|
||
6D24000
|
trusted library allocation
|
page read and write
|
||
1D42383F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC820000
|
trusted library allocation
|
page read and write
|
||
24617432000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
1C53EC8C000
|
heap
|
page read and write
|
||
1EE95991000
|
trusted library allocation
|
page read and write
|
||
51D8000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
1EE9E16A000
|
unkown
|
page readonly
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFAAC860000
|
trusted library allocation
|
page execute and read and write
|
||
43FC000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC7E0000
|
trusted library allocation
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
1DD47390000
|
heap
|
page read and write
|
||
7B00000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
C8A2C7E000
|
unkown
|
page readonly
|
||
1D43BCB2000
|
unkown
|
page readonly
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7FFAAC66D000
|
trusted library allocation
|
page execute and read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
3DB15D000
|
stack
|
page read and write
|
||
7FFAAC880000
|
trusted library allocation
|
page read and write
|
||
1B35AB10000
|
heap
|
page read and write
|
||
327E000
|
stack
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2069C8CC000
|
trusted library allocation
|
page read and write
|
||
7FFAAC750000
|
trusted library allocation
|
page execute and read and write
|
||
AC477FF000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
1D422770000
|
unkown
|
page readonly
|
||
7FFAAC683000
|
trusted library allocation
|
page read and write
|
||
27DEB146000
|
heap
|
page read and write
|
||
1FCAC0E0000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
131ACE51000
|
trusted library allocation
|
page read and write
|
||
1DD60223000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
282CD7FC000
|
heap
|
page read and write
|
||
7FFAAC800000
|
trusted library allocation
|
page read and write
|
||
A72A67E000
|
stack
|
page read and write
|
||
7FFAACA60000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page execute and read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
BE3B13E000
|
stack
|
page read and write
|
||
187AB365000
|
heap
|
page read and write
|
||
1C53EC8F000
|
heap
|
page read and write
|
||
7FFAACC88000
|
trusted library allocation
|
page read and write
|
||
2A3292F0000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7FFB23B00000
|
unkown
|
page readonly
|
||
246174F4000
|
heap
|
page read and write
|
||
2069C73C000
|
unkown
|
page readonly
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
6C49000
|
trusted library allocation
|
page execute and read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
6C23000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
47E8000
|
trusted library allocation
|
page read and write
|
||
A87ED7E000
|
unkown
|
page readonly
|
||
2056BFF5000
|
heap
|
page read and write
|
||
24616B36000
|
heap
|
page read and write
|
||
282B4F42000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
27D80677000
|
trusted library allocation
|
page read and write
|
||
1851F030000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
2069C7DF000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
2056C027000
|
heap
|
page read and write
|
||
339C000
|
heap
|
page read and write
|
||
187AB330000
|
heap
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC730000
|
trusted library allocation
|
page execute and read and write
|
||
79542FE000
|
stack
|
page read and write
|
||
2056CA91000
|
heap
|
page read and write
|
||
74F0000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
248AC8A0000
|
heap
|
page execute and read and write
|
||
248AC160000
|
trusted library allocation
|
page read and write
|
||
7FFAAC880000
|
trusted library allocation
|
page execute and read and write
|
||
A7298FF000
|
stack
|
page read and write
|
||
73D00000
|
unkown
|
page readonly
|
||
1FCAC233000
|
heap
|
page read and write
|
||
1DD47A8C000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
2056C06E000
|
heap
|
page read and write
|
||
7FFAAC643000
|
trusted library allocation
|
page execute and read and write
|
||
3308000
|
heap
|
page read and write
|
||
6C43000
|
trusted library allocation
|
page read and write
|
||
9441AFE000
|
stack
|
page read and write
|
||
24616AA5000
|
heap
|
page read and write
|
||
7FFAAC840000
|
trusted library allocation
|
page read and write
|
||
18792080000
|
heap
|
page read and write
|
||
282CD7E9000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2BEE000
|
heap
|
page read and write
|
||
3160000
|
heap
|
page read and write
|
||
AC475FE000
|
stack
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
1EE85030000
|
unkown
|
page readonly
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
D1D40FF000
|
stack
|
page read and write
|
||
6DC0000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
2CE08FE000
|
stack
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
24617455000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFAAC756000
|
trusted library allocation
|
page execute and read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC670000
|
trusted library allocation
|
page read and write
|
||
3270000
|
heap
|
page read and write
|
||
2056CA2D000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC816000
|
trusted library allocation
|
page read and write
|
||
1D43BAB0000
|
unkown
|
page readonly
|
||
282B3040000
|
unkown
|
page readonly
|
||
1C53EC42000
|
heap
|
page read and write
|
||
24617432000
|
heap
|
page read and write
|
||
282B32F0000
|
heap
|
page read and write
|
||
1B35B3BD000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6FC000
|
trusted library allocation
|
page execute and read and write
|
||
2069BE80000
|
heap
|
page read and write
|
||
DC3F7FB000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC826000
|
trusted library allocation
|
page read and write
|
||
24616ABA000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
18A90EDB000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
CE4D47D000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
2F75000
|
heap
|
page read and write
|
||
24617493000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
187AB37B000
|
heap
|
page read and write
|
||
282B4BC0000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
2A329A00000
|
trusted library allocation
|
page read and write
|
||
187AB22C000
|
heap
|
page read and write
|
||
24617498000
|
heap
|
page read and write
|
||
7FFAAC820000
|
trusted library allocation
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page execute and read and write
|
||
2EE0000
|
trusted library allocation
|
page read and write
|
||
2056CA5D000
|
heap
|
page read and write
|
||
18792840000
|
heap
|
page execute and read and write
|
||
7953DFD000
|
stack
|
page read and write
|
||
1DD47210000
|
heap
|
page read and write
|
||
29515E16000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
1D4229D3000
|
trusted library allocation
|
page read and write
|
||
2056CAE1000
|
heap
|
page read and write
|
||
7FFAAC8F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
D1D3DFF000
|
stack
|
page read and write
|
||
7FFAAC68C000
|
trusted library allocation
|
page execute and read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
25A1BC13000
|
heap
|
page read and write
|
||
2A339A4E000
|
trusted library allocation
|
page read and write
|
||
1D422D30000
|
unkown
|
page readonly
|
||
D4AFAFE000
|
stack
|
page read and write
|
||
6D60000
|
trusted library allocation
|
page read and write
|
||
1ACC0380000
|
trusted library allocation
|
page read and write
|
||
1C53F370000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9B0000
|
trusted library allocation
|
page execute and read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
18A90E2B000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7545000
|
trusted library allocation
|
page read and write
|
||
24BAEE00000
|
heap
|
page read and write
|
||
2A329B1D000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
1DD46FE0000
|
heap
|
page read and write
|
||
7FFAACA80000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
7FFAAC825000
|
trusted library allocation
|
page read and write
|
||
7FFAAC960000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7FD000
|
trusted library allocation
|
page read and write
|
||
282B33B0000
|
heap
|
page read and write
|
||
D7D000
|
stack
|
page read and write
|
||
77EE000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
248ACC74000
|
trusted library allocation
|
page read and write
|
||
7FFAACC40000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
187920F6000
|
heap
|
page read and write
|
||
7FFAAC822000
|
trusted library allocation
|
page read and write
|
||
1DD601ED000
|
heap
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
776E000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
248C5334000
|
heap
|
page read and write
|
||
20AD4960000
|
trusted library allocation
|
page read and write
|
||
7C0627E000
|
unkown
|
page readonly
|
||
7FFAAC6BC000
|
trusted library allocation
|
page execute and read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
1D423821000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
248C5255000
|
heap
|
page read and write
|
||
D1D41FE000
|
stack
|
page read and write
|
||
1B35AD60000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
29025AF0000
|
heap
|
page read and write
|
||
73D01000
|
unkown
|
page execute read
|
||
7FFAAC825000
|
trusted library allocation
|
page read and write
|
||
187A2851000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
4460000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6EC000
|
trusted library allocation
|
page execute and read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
27DEB940000
|
heap
|
page read and write
|
||
6D00000
|
heap
|
page execute and read and write
|
||
2A32A184000
|
trusted library allocation
|
page read and write
|
||
C8A23DB000
|
stack
|
page read and write
|
||
A729CFC000
|
stack
|
page read and write
|
||
187AB1ED000
|
heap
|
page read and write
|
||
1D43CB6B000
|
heap
|
page read and write
|
||
2FC0000
|
heap
|
page read and write
|
||
7FFAAC890000
|
trusted library allocation
|
page read and write
|
||
2056CAE4000
|
heap
|
page read and write
|
||
9C8CEFE000
|
stack
|
page read and write
|
||
2A329283000
|
trusted library allocation
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
492F000
|
stack
|
page read and write
|
||
4780000
|
heap
|
page readonly
|
||
7FFAAC880000
|
trusted library allocation
|
page read and write
|
||
7C062FE000
|
stack
|
page read and write
|
||
7FFAAC802000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
4AD0000
|
trusted library allocation
|
page execute and read and write
|
||
187AB2C0000
|
heap
|
page read and write
|
||
18A90EC9000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6C70000
|
trusted library allocation
|
page read and write
|
||
7FFAAC632000
|
trusted library allocation
|
page read and write
|
||
7AAE000
|
stack
|
page read and write
|
||
75C0000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
A728FFE000
|
stack
|
page read and write
|
||
2A3290B0000
|
heap
|
page read and write
|
||
1DD5796D000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
1851EE86000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
18A90EB2000
|
heap
|
page read and write
|
||
7FFB23B01000
|
unkown
|
page execute read
|
||
7FFAAC650000
|
trusted library allocation
|
page read and write
|
||
2CFE000
|
unkown
|
page read and write
|
||
DD3623E000
|
stack
|
page read and write
|
||
2A3299F0000
|
heap
|
page execute and read and write
|
||
24616AAE000
|
heap
|
page read and write
|
||
2F59000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAACB74000
|
trusted library allocation
|
page read and write
|
||
7FFAAC80E000
|
trusted library allocation
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
29515E60000
|
heap
|
page read and write
|
||
24617536000
|
heap
|
page read and write
|
||
187AB352000
|
heap
|
page read and write
|
||
7FFAAC680000
|
trusted library allocation
|
page read and write
|
||
7FFAACBD0000
|
trusted library allocation
|
page read and write
|
||
A7291FC000
|
stack
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
2056CBC9000
|
heap
|
page read and write
|
||
7FF4058B0000
|
trusted library allocation
|
page execute and read and write
|
||
B8112FF000
|
stack
|
page read and write
|
||
6DC0000
|
remote allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
1D422C82000
|
unkown
|
page readonly
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
20AD4249000
|
heap
|
page read and write
|
||
282CD602000
|
unkown
|
page readonly
|
||
7FFAAC69C000
|
trusted library allocation
|
page execute and read and write
|
||
248ACFD8000
|
trusted library allocation
|
page read and write
|
||
6CB0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC780000
|
trusted library allocation
|
page execute and read and write
|
||
248BCA1E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC83B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC81A000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7FFAACC10000
|
trusted library allocation
|
page read and write
|
||
A7292FE000
|
stack
|
page read and write
|
||
248AC1EC000
|
heap
|
page read and write
|
||
7FFAAC670000
|
trusted library allocation
|
page read and write
|
||
6C4C000
|
trusted library allocation
|
page execute and read and write
|
||
24BAED13000
|
heap
|
page read and write
|
||
1D422C28000
|
unkown
|
page readonly
|
||
1C53EBE0000
|
heap
|
page read and write
|
||
131ACC51000
|
heap
|
page read and write
|
||
7FFB036F3000
|
unkown
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
6FCE000
|
stack
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
1F111DD0000
|
heap
|
page read and write
|
||
246175C0000
|
heap
|
page read and write
|
||
9C8D1FE000
|
unkown
|
page readonly
|
||
7FFAAC830000
|
trusted library allocation
|
page read and write
|
||
7C0677E000
|
stack
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7FFAAC850000
|
trusted library allocation
|
page read and write
|
||
1B35ABB5000
|
heap
|
page read and write
|
||
7EFF8000
|
trusted library allocation
|
page execute and read and write
|
||
27D800F3000
|
trusted library allocation
|
page read and write
|
||
274B000
|
stack
|
page read and write
|
||
7FFAAC780000
|
trusted library allocation
|
page execute and read and write
|
||
3370000
|
heap
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
2C1C000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFAAC67D000
|
trusted library allocation
|
page execute and read and write
|
||
2A32911D000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
33A3000
|
heap
|
page read and write
|
||
7FFAAC67D000
|
trusted library allocation
|
page execute and read and write
|
||
2BF4000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
27D8067F000
|
trusted library allocation
|
page read and write
|
||
7C06A7E000
|
unkown
|
page readonly
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
3DB47E000
|
stack
|
page read and write
|
||
2BDA000
|
heap
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFAAC827000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
2BFA000
|
heap
|
page read and write
|
||
7EF40000
|
trusted library allocation
|
page execute and read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6CC000
|
trusted library allocation
|
page execute and read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
2A329BF4000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2056C0FC000
|
heap
|
page read and write
|
||
BE3B829000
|
stack
|
page read and write
|
||
D4AFDFE000
|
stack
|
page read and write
|
||
1D43CBE7000
|
heap
|
page read and write
|
||
187AB481000
|
heap
|
page read and write
|
||
1ACC0453000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
24616B73000
|
heap
|
page read and write
|
||
CE4CF3A000
|
stack
|
page read and write
|
||
27D80645000
|
trusted library allocation
|
page read and write
|
||
7FFAAC807000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
246174A1000
|
heap
|
page read and write
|
||
7FFAAC85E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC980000
|
trusted library allocation
|
page read and write
|
||
7FFAAC644000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
1FCACA02000
|
heap
|
page read and write
|
||
27D0000
|
heap
|
page read and write
|
||
18A90F15000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFAAC760000
|
trusted library allocation
|
page execute and read and write
|
||
AC47EFE000
|
stack
|
page read and write
|
||
D5B0FE000
|
stack
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
18A91123000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
94428FC000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFAACB50000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
2A339A61000
|
trusted library allocation
|
page read and write
|
||
248ACA87000
|
trusted library allocation
|
page read and write
|
||
7FFAAC65D000
|
trusted library allocation
|
page execute and read and write
|
||
2F99000
|
heap
|
page read and write
|
||
AC476FC000
|
stack
|
page read and write
|
||
2056CB52000
|
heap
|
page read and write
|
||
27DEC6B9000
|
heap
|
page read and write
|
||
5A570FF000
|
stack
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
27DEB3F0000
|
heap
|
page read and write
|
||
4410000
|
trusted library allocation
|
page execute and read and write
|
||
683E000
|
stack
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
2F6A000
|
heap
|
page read and write
|
||
25A1BC00000
|
heap
|
page read and write
|
||
7FFAAC65D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC860000
|
trusted library allocation
|
page read and write
|
||
24617431000
|
heap
|
page read and write
|
||
B8119FF000
|
stack
|
page read and write
|
||
1851EF45000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7FFB23B25000
|
unkown
|
page readonly
|
||
2CE0CFE000
|
stack
|
page read and write
|
||
2FA5000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
1ACC0458000
|
heap
|
page read and write
|
||
AC47AFE000
|
stack
|
page read and write
|
||
131ACE43000
|
trusted library allocation
|
page read and write
|
||
18791F50000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC950000
|
trusted library allocation
|
page read and write
|
||
94429FE000
|
stack
|
page read and write
|
||
1FCACB02000
|
heap
|
page read and write
|
||
245B000
|
stack
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7FFB23B00000
|
unkown
|
page readonly
|
||
7FFAAC8B0000
|
trusted library allocation
|
page execute and read and write
|
||
187AB1DE000
|
heap
|
page read and write
|
||
7FFAAC663000
|
trusted library allocation
|
page execute and read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
187AB3A3000
|
heap
|
page read and write
|
||
782E000
|
stack
|
page read and write
|
||
50A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC830000
|
trusted library allocation
|
page read and write
|
||
2766000
|
heap
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
29515C20000
|
heap
|
page read and write
|
||
18792A11000
|
trusted library allocation
|
page read and write
|
||
754C000
|
trusted library allocation
|
page read and write
|
||
DD3633E000
|
stack
|
page read and write
|
||
2056CA91000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
50EA000
|
heap
|
page read and write
|
||
248AC1C9000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
20AD4259000
|
heap
|
page read and write
|
||
1D43BE20000
|
heap
|
page read and write
|
||
7FFAAC805000
|
trusted library allocation
|
page read and write
|
||
2A342710000
|
heap
|
page read and write
|
||
2A329B7E000
|
trusted library allocation
|
page read and write
|
||
27DEC860000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFAAC68B000
|
trusted library allocation
|
page execute and read and write
|
||
2FA0000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
2056CB5D000
|
heap
|
page read and write
|
||
7FFAAC660000
|
trusted library allocation
|
page read and write
|
||
A87E97E000
|
unkown
|
page readonly
|
||
282B33B5000
|
heap
|
page read and write
|
||
2C1B000
|
heap
|
page read and write
|
||
2A32A027000
|
trusted library allocation
|
page read and write
|
||
7FFAACB7F000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
693E000
|
stack
|
page read and write
|
||
7FFAACA30000
|
trusted library allocation
|
page read and write
|
||
2A342594000
|
heap
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
7FFAAC8C0000
|
trusted library allocation
|
page execute and read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
2056C0FB000
|
heap
|
page read and write
|
||
7FFB03550000
|
unkown
|
page readonly
|
||
2056CA7D000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
2A339A41000
|
trusted library allocation
|
page read and write
|
||
7FFAAC71C000
|
trusted library allocation
|
page execute and read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
D5B4FE000
|
stack
|
page read and write
|
||
7FFAAC830000
|
trusted library allocation
|
page read and write
|
||
D6A87FF000
|
unkown
|
page read and write
|
||
41D0000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2A342560000
|
heap
|
page read and write
|
||
24BAEB00000
|
heap
|
page read and write
|
||
D5AEFE000
|
stack
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
282CD5F3000
|
heap
|
page read and write
|
||
1EE852A9000
|
heap
|
page read and write
|
||
7FFB0BB35000
|
unkown
|
page readonly
|
||
24616AAE000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
271E000
|
stack
|
page read and write
|
||
4836000
|
trusted library allocation
|
page read and write
|
||
6CD4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC960000
|
trusted library allocation
|
page read and write
|
||
1F111BE6000
|
heap
|
page read and write
|
||
131ACC4E000
|
heap
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page execute and read and write
|
||
246174F4000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
1851EEA7000
|
heap
|
page read and write
|
||
7FFAAC8A0000
|
trusted library allocation
|
page read and write
|
||
7EF58000
|
trusted library allocation
|
page execute and read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC63D000
|
trusted library allocation
|
page execute and read and write
|
||
D4B07FE000
|
stack
|
page read and write
|
||
20AD41D0000
|
heap
|
page read and write
|
||
18A9101B000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
CE4C7FF000
|
stack
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC81C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC810000
|
trusted library allocation
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
7FFAACA20000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7F0000
|
trusted library allocation
|
page read and write
|
||
1D43BCB0000
|
unkown
|
page readonly
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
BE3A2FF000
|
stack
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC890000
|
trusted library allocation
|
page read and write
|
||
2A329AA6000
|
trusted library allocation
|
page read and write
|
||
44EE000
|
stack
|
page read and write
|
||
7FFAAC930000
|
trusted library allocation
|
page read and write
|
||
27DEC210000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFAAC81A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC664000
|
trusted library allocation
|
page read and write
|
||
2A329FF9000
|
trusted library allocation
|
page read and write
|
||
7FFAAC672000
|
trusted library allocation
|
page read and write
|
||
DD356FE000
|
stack
|
page read and write
|
||
187AB4A0000
|
heap
|
page read and write
|
||
1B36B261000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7953FFE000
|
stack
|
page read and write
|
||
7FFB0BB11000
|
unkown
|
page execute read
|
||
3DB57E000
|
stack
|
page read and write
|
||
274D000
|
heap
|
page read and write
|
||
2056CA21000
|
heap
|
page read and write
|
||
5A56EFE000
|
stack
|
page read and write
|
||
24BAEC5A000
|
heap
|
page read and write
|
||
2056CA91000
|
heap
|
page read and write
|
||
2EC0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
246175A7000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
7FFAAC970000
|
trusted library allocation
|
page read and write
|
||
A87E67E000
|
stack
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
187AB2B8000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
27DEC62B000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
1EE85042000
|
unkown
|
page readonly
|
||
7FFAAC750000
|
trusted library allocation
|
page execute and read and write
|
||
1C53F402000
|
heap
|
page read and write
|
||
1B35AB9E000
|
heap
|
page read and write
|
||
7FFAAC850000
|
trusted library allocation
|
page execute and read and write
|
||
422E000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
505C000
|
stack
|
page read and write
|
||
22115400000
|
heap
|
page read and write
|
||
2056CB4B000
|
heap
|
page read and write
|
||
282B3168000
|
heap
|
page read and write
|
||
47F1000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
27D8068A000
|
trusted library allocation
|
page read and write
|
||
7FFAAC890000
|
trusted library allocation
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
24617482000
|
heap
|
page read and write
|
||
7FFAACA30000
|
trusted library allocation
|
page read and write
|
||
248AC495000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
2A32A156000
|
trusted library allocation
|
page read and write
|
||
248C520F000
|
heap
|
page read and write
|
||
2D80000
|
heap
|
page read and write
|
||
1FCAF140000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
4F3B000
|
trusted library allocation
|
page execute and read and write
|
||
29515E32000
|
heap
|
page read and write
|
||
7FFAAC67D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC66D000
|
trusted library allocation
|
page execute and read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
24617434000
|
heap
|
page read and write
|
||
7FFAAC856000
|
trusted library allocation
|
page read and write
|
||
2A329DFC000
|
trusted library allocation
|
page read and write
|
||
1D43C91E000
|
heap
|
page read and write
|
||
187AB264000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
1D43CB40000
|
heap
|
page read and write
|
||
7FFAAC980000
|
trusted library allocation
|
page read and write
|
||
2A329AC8000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC820000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFAAC800000
|
trusted library allocation
|
page read and write
|
||
2A329188000
|
heap
|
page read and write
|
||
A7295FE000
|
stack
|
page read and write
|
||
24617449000
|
heap
|
page read and write
|
||
2C15000
|
heap
|
page read and write
|
||
7FFAAC970000
|
trusted library allocation
|
page read and write
|
||
7FFAAC825000
|
trusted library allocation
|
page read and write
|
||
7FFAAC840000
|
trusted library allocation
|
page read and write
|
||
29515E13000
|
heap
|
page read and write
|
||
24617430000
|
heap
|
page read and write
|
||
7FFAAC68C000
|
trusted library allocation
|
page execute and read and write
|
||
6C60000
|
trusted library allocation
|
page execute and read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
187AB21C000
|
heap
|
page read and write
|
||
4A94000
|
trusted library allocation
|
page read and write
|
||
6D2C000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
1C53F415000
|
heap
|
page read and write
|
||
24616B72000
|
heap
|
page read and write
|
||
7FFAAC82A000
|
trusted library allocation
|
page read and write
|
||
25A1BC28000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAACB40000
|
trusted library allocation
|
page read and write
|
||
7FFAAC816000
|
trusted library allocation
|
page read and write
|
||
7FFAAC830000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
282B4DC0000
|
heap
|
page execute and read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
20AD424A000
|
heap
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
BE3BD3A000
|
stack
|
page read and write
|
||
42DC000
|
stack
|
page read and write
|
||
2A34261C000
|
heap
|
page read and write
|
||
A72A23A000
|
stack
|
page read and write
|
||
7FFAAC940000
|
trusted library allocation
|
page read and write
|
||
7FFAAC664000
|
trusted library allocation
|
page read and write
|
||
7FFAAC884000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
4DD0000
|
heap
|
page read and write
|
||
18A90EAE000
|
heap
|
page read and write
|
||
75C0000
|
trusted library allocation
|
page read and write
|
||
2461748D000
|
heap
|
page read and write
|
||
49CE000
|
stack
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
D4AF8FF000
|
stack
|
page read and write
|
||
24616AAE000
|
heap
|
page read and write
|
||
2056C0BA000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7FFAACC30000
|
trusted library allocation
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
6CD5000
|
trusted library allocation
|
page read and write
|
||
2EB4000
|
trusted library allocation
|
page read and write
|
||
1B35ABF8000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
1EE959A1000
|
trusted library allocation
|
page read and write
|
||
1C53EC4D000
|
heap
|
page read and write
|
||
7FFAAC662000
|
trusted library allocation
|
page read and write
|
||
50FE000
|
stack
|
page read and write
|
||
7FFAACA40000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
1851EE90000
|
heap
|
page read and write
|
||
18792A15000
|
trusted library allocation
|
page read and write
|
||
6D31000
|
trusted library allocation
|
page read and write
|
||
7FFAAC810000
|
trusted library allocation
|
page execute and read and write
|
||
24BAEC02000
|
heap
|
page read and write
|
||
27D80679000
|
trusted library allocation
|
page read and write
|
||
7FFAAC803000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7FE000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
25A1C350000
|
trusted library allocation
|
page read and write
|
||
20AD4202000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
27DEC6AA000
|
heap
|
page read and write
|
||
248C53E4000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2A342900000
|
heap
|
page read and write
|
||
248C5416000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7FFAAC840000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7F6000
|
trusted library allocation
|
page read and write
|
||
7FFAAC65D000
|
trusted library allocation
|
page execute and read and write
|
||
1EE85030000
|
unkown
|
page readonly
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
2056CA8D000
|
heap
|
page read and write
|
||
24BB05F0000
|
trusted library allocation
|
page read and write
|
||
18792050000
|
heap
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
246175A2000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
1EE85280000
|
heap
|
page read and write
|
||
27D8063D000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A0000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
4B20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC910000
|
trusted library allocation
|
page read and write
|
||
18A90EE9000
|
heap
|
page read and write
|
||
18792A22000
|
trusted library allocation
|
page read and write
|
||
1851EDE0000
|
heap
|
page read and write
|
||
1ACC0470000
|
heap
|
page read and write
|
||
221154B8000
|
heap
|
page read and write
|
||
282B3140000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
18A91013000
|
heap
|
page read and write
|
||
7FFAAC890000
|
trusted library allocation
|
page execute and read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8F5000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC664000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6E6000
|
trusted library allocation
|
page read and write
|
||
94426FC000
|
stack
|
page read and write
|
||
1EE85B29000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8C0000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
2880000
|
heap
|
page read and write
|
||
131C55B0000
|
heap
|
page execute and read and write
|
||
1EE9E160000
|
unkown
|
page readonly
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
2069BDAC000
|
heap
|
page read and write
|
||
2069C7DD000
|
trusted library allocation
|
page read and write
|
||
513E000
|
stack
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
BE3B435000
|
stack
|
page read and write
|
||
1D423369000
|
trusted library allocation
|
page read and write
|
||
6C2D000
|
trusted library allocation
|
page execute and read and write
|
||
27D8063F000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
187AB2C2000
|
heap
|
page read and write
|
||
2056CA45000
|
heap
|
page read and write
|
||
7FFAAC880000
|
trusted library allocation
|
page read and write
|
||
1DD472C0000
|
unkown
|
page readonly
|
||
6C46000
|
trusted library allocation
|
page execute and read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
246175B5000
|
heap
|
page read and write
|
||
282CD694000
|
unkown
|
page readonly
|
||
A87E47D000
|
stack
|
page read and write
|
||
7545000
|
trusted library allocation
|
page read and write
|
||
4330000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
4225000
|
heap
|
page read and write
|
||
7FFAAC879000
|
trusted library allocation
|
page read and write
|
||
2A329275000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
221154B0000
|
heap
|
page read and write
|
||
EEDDCFF000
|
stack
|
page read and write
|
||
248C51FD000
|
heap
|
page read and write
|
||
1DD471F0000
|
heap
|
page read and write
|
||
7FFAAC68B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB036F4000
|
unkown
|
page readonly
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
AC473FE000
|
stack
|
page read and write
|
||
27D8065B000
|
trusted library allocation
|
page read and write
|
||
2056CA22000
|
heap
|
page read and write
|
||
2A342524000
|
heap
|
page read and write
|
||
282CD7D0000
|
heap
|
page execute and read and write
|
||
7FFAAC6F0000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
18A90EE9000
|
heap
|
page read and write
|
||
27D800D1000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
246174EA000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
131AC540000
|
heap
|
page read and write
|
||
2069BC80000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8D0000
|
trusted library allocation
|
page read and write
|
||
1EE852A7000
|
heap
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
7FFAAC900000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2056CA7D000
|
heap
|
page read and write
|
||
2056C0F5000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFAAC810000
|
trusted library allocation
|
page read and write
|
||
27D80296000
|
trusted library allocation
|
page read and write
|
||
7FFAAC662000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
24617469000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
18A9101B000
|
heap
|
page read and write
|
||
246175A5000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC806000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6BC000
|
trusted library allocation
|
page execute and read and write
|
||
1D43BBD2000
|
unkown
|
page readonly
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
282CD58C000
|
heap
|
page read and write
|
||
2A32A04D000
|
trusted library allocation
|
page read and write
|
||
7FFAAC880000
|
trusted library allocation
|
page read and write
|
||
2A342598000
|
heap
|
page read and write
|
||
1EE85AE2000
|
trusted library allocation
|
page read and write
|
||
27DEB3D3000
|
trusted library allocation
|
page read and write
|
||
514D000
|
trusted library allocation
|
page execute and read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2585000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC850000
|
trusted library allocation
|
page read and write
|
||
2A329260000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
1EE85AFA000
|
trusted library allocation
|
page read and write
|
||
1D422A6A000
|
heap
|
page read and write
|
||
7FFAAC674000
|
trusted library allocation
|
page read and write
|
||
BE3AEBE000
|
stack
|
page read and write
|
||
7FFAAC874000
|
trusted library allocation
|
page read and write
|
||
7FFAAC66D000
|
trusted library allocation
|
page execute and read and write
|
||
4A90000
|
trusted library allocation
|
page read and write
|
||
20AD4228000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
24BAEB20000
|
heap
|
page read and write
|
||
D1D3EFD000
|
stack
|
page read and write
|
||
1852F603000
|
trusted library allocation
|
page read and write
|
||
1EE853C5000
|
heap
|
page read and write
|
||
1DD47AB1000
|
trusted library allocation
|
page read and write
|
||
2E8E000
|
stack
|
page read and write
|
||
A87EA7E000
|
stack
|
page read and write
|
||
2056CA21000
|
heap
|
page read and write
|
||
7FFAAC830000
|
trusted library allocation
|
page read and write
|
||
4F04000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
2A342620000
|
heap
|
page read and write
|
||
24616B78000
|
heap
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
282CD588000
|
heap
|
page read and write
|
||
484A000
|
heap
|
page read and write
|
||
2F58000
|
heap
|
page read and write
|
||
246175B4000
|
heap
|
page read and write
|
||
4F1B000
|
heap
|
page read and write
|
||
7570000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
7FFAAC850000
|
trusted library allocation
|
page read and write
|
||
187AB1E9000
|
heap
|
page read and write
|
||
34DD000
|
stack
|
page read and write
|
||
7FFAAC670000
|
trusted library allocation
|
page read and write
|
||
A7293FF000
|
stack
|
page read and write
|
||
2056CA8D000
|
heap
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
7FFB23B22000
|
unkown
|
page readonly
|
||
187AB2D1000
|
heap
|
page read and write
|
||
3316000
|
heap
|
page read and write
|
||
22115430000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
43CD000
|
stack
|
page read and write
|
||
4AE0000
|
trusted library allocation
|
page read and write
|
||
94427FC000
|
stack
|
page read and write
|
||
1EE85EE6000
|
trusted library allocation
|
page read and write
|
||
282CD7ED000
|
heap
|
page read and write
|
||
1EE850D0000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC830000
|
trusted library allocation
|
page read and write
|
||
9442AFB000
|
stack
|
page read and write
|
||
2461754F000
|
heap
|
page read and write
|
||
24BAED02000
|
heap
|
page read and write
|
||
6CDC000
|
trusted library allocation
|
page read and write
|
||
7FFAAC67D000
|
trusted library allocation
|
page execute and read and write
|
||
187AB363000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
72A0000
|
heap
|
page read and write
|
||
1FCACB2A000
|
heap
|
page read and write
|
||
282CD56E000
|
heap
|
page read and write
|
||
2056C096000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
22115410000
|
heap
|
page read and write
|
||
46E0000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7A70000
|
remote allocation
|
page read and write
|
||
18792075000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
282B4F4A000
|
trusted library allocation
|
page read and write
|
||
1B35AAF0000
|
heap
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page execute and read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
1ACC043F000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC823000
|
trusted library allocation
|
page read and write
|
||
7FFAAC880000
|
trusted library allocation
|
page execute and read and write
|
||
A728EFE000
|
stack
|
page read and write
|
||
A7290FE000
|
stack
|
page read and write
|
||
7F0B8000
|
trusted library allocation
|
page execute and read and write
|
||
248C5356000
|
heap
|
page read and write
|
||
2A329200000
|
heap
|
page read and write
|
||
2056CAE4000
|
heap
|
page read and write
|
||
7FFAAC930000
|
trusted library allocation
|
page read and write
|
||
246175C5000
|
heap
|
page read and write
|
||
7FFAAC890000
|
trusted library allocation
|
page read and write
|
||
1D423810000
|
trusted library allocation
|
page read and write
|
||
4640000
|
heap
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
1D43CB68000
|
heap
|
page read and write
|
||
24616B6E000
|
heap
|
page read and write
|
||
2056C0F4000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
24617431000
|
heap
|
page read and write
|
||
2056C07D000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
2CE06F9000
|
stack
|
page read and write
|
||
248C53E6000
|
heap
|
page read and write
|
||
2F00000
|
trusted library allocation
|
page read and write
|
||
1ACC0461000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
131ACBB0000
|
heap
|
page read and write
|
||
1D422D32000
|
unkown
|
page readonly
|
||
7FFAAC660000
|
trusted library allocation
|
page read and write
|
||
187AB26F000
|
heap
|
page read and write
|
||
1C53EE00000
|
heap
|
page read and write
|
||
1D423363000
|
trusted library allocation
|
page read and write
|
||
75C0000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
2F66000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
4320000
|
trusted library allocation
|
page execute and read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
D4AF5AE000
|
stack
|
page read and write
|
||
6ECE000
|
stack
|
page read and write
|
||
364B2FA000
|
stack
|
page read and write
|
||
7FFAAC706000
|
trusted library allocation
|
page read and write
|
||
20AD4260000
|
heap
|
page read and write
|
||
4460000
|
trusted library allocation
|
page read and write
|
||
6D10000
|
trusted library allocation
|
page read and write
|
||
248AC213000
|
heap
|
page read and write
|
||
98803FE000
|
stack
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
248C5241000
|
heap
|
page read and write
|
||
AC47DFE000
|
stack
|
page read and write
|
||
27D8050C000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2056C0EE000
|
heap
|
page read and write
|
||
25A1BC02000
|
heap
|
page read and write
|
||
7FFAAC66D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC81F000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAACB80000
|
trusted library allocation
|
page execute and read and write
|
||
18792A24000
|
trusted library allocation
|
page read and write
|
||
7FFAAC910000
|
trusted library allocation
|
page read and write
|
||
7FFAAC820000
|
trusted library allocation
|
page read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page read and write
|
||
187AB343000
|
heap
|
page read and write
|
||
7FFAAC654000
|
trusted library allocation
|
page read and write
|
||
248ACBB3000
|
trusted library allocation
|
page read and write
|
||
6D60000
|
trusted library allocation
|
page read and write
|
||
DD35BFE000
|
stack
|
page read and write
|
||
24616D50000
|
heap
|
page read and write
|
||
2056CA27000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
A87EE7E000
|
unkown
|
page readonly
|
||
7FFAAC660000
|
trusted library allocation
|
page read and write
|
||
27DEB405000
|
heap
|
page read and write
|
||
7FFAACDB0000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
248C5246000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7FFB23B20000
|
unkown
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
98FFDFD000
|
stack
|
page read and write
|
||
28E4000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A0000
|
trusted library allocation
|
page execute and read and write
|
||
2056CBBC000
|
heap
|
page read and write
|
||
1D4229F0000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8E0000
|
trusted library allocation
|
page read and write
|
||
79540FE000
|
stack
|
page read and write
|
||
4874000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2C13000
|
heap
|
page read and write
|
||
18A91123000
|
heap
|
page read and write
|
||
2948000
|
stack
|
page read and write
|
||
1B35A97E000
|
unkown
|
page readonly
|
||
5264000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9C0000
|
trusted library allocation
|
page read and write
|
||
2069C692000
|
unkown
|
page readonly
|
||
131ACE2F000
|
trusted library allocation
|
page read and write
|
||
D4B06FD000
|
stack
|
page read and write
|
||
1D4332B1000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
1ACC0495000
|
heap
|
page read and write
|
||
18A90E00000
|
unkown
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
9441CFE000
|
stack
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
1FCAC2AD000
|
heap
|
page read and write
|
||
7FFAAC67D000
|
trusted library allocation
|
page execute and read and write
|
||
5B75000
|
trusted library allocation
|
page read and write
|
||
1D42382C000
|
trusted library allocation
|
page read and write
|
||
246175AC000
|
heap
|
page read and write
|
||
28A0000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
2C15000
|
heap
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
43F9000
|
trusted library allocation
|
page execute and read and write
|
||
73D00000
|
unkown
|
page readonly
|
||
27DEC6B4000
|
heap
|
page read and write
|
||
7FFAAC810000
|
trusted library allocation
|
page read and write
|
||
18A90EBA000
|
heap
|
page read and write
|
||
7FFAAC780000
|
trusted library allocation
|
page execute and read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
24617530000
|
heap
|
page read and write
|
||
1B35B3AC000
|
trusted library allocation
|
page read and write
|
||
1F111DD5000
|
heap
|
page read and write
|
||
1EE85890000
|
heap
|
page execute and read and write
|
||
1B373A42000
|
unkown
|
page readonly
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
2D00000
|
heap
|
page read and write
|
||
1FCAC302000
|
heap
|
page read and write
|
||
AC47CFE000
|
stack
|
page read and write
|
||
2461759F000
|
heap
|
page read and write
|
||
7FFAAC803000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
27DEB3A0000
|
trusted library allocation
|
page read and write
|
||
2E4F000
|
unkown
|
page read and write
|
||
7FFAAC663000
|
trusted library allocation
|
page execute and read and write
|
||
248ACA9F000
|
trusted library allocation
|
page read and write
|
||
248ACC82000
|
trusted library allocation
|
page read and write
|
||
4630000
|
heap
|
page read and write
|
||
7FFAAC68B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC872000
|
trusted library allocation
|
page read and write
|
||
1EE85B09000
|
trusted library allocation
|
page read and write
|
||
94425FC000
|
stack
|
page read and write
|
||
2B30000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
246174F4000
|
heap
|
page read and write
|
||
24617431000
|
heap
|
page read and write
|
||
1D43BA80000
|
heap
|
page read and write
|
||
7FFAAC910000
|
trusted library allocation
|
page read and write
|
||
7FFAAC822000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
CE4D97E000
|
stack
|
page read and write
|
||
7C06C7E000
|
unkown
|
page readonly
|
||
7FFAAC6E0000
|
trusted library allocation
|
page read and write
|
||
18537FD0000
|
heap
|
page execute and read and write
|
||
2B7E000
|
stack
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2A329C04000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
7B2F000
|
heap
|
page read and write
|
||
2056CAE4000
|
heap
|
page read and write
|
||
6C50000
|
trusted library allocation
|
page read and write
|
||
7FFAAC800000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8C0000
|
trusted library allocation
|
page execute and read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
2056CAE4000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
6D10000
|
trusted library allocation
|
page read and write
|
||
246174F4000
|
heap
|
page read and write
|
||
1DD47140000
|
heap
|
page read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
27DEC250000
|
heap
|
page read and write
|
||
27D903A9000
|
trusted library allocation
|
page read and write
|
||
2F4C000
|
heap
|
page read and write
|
||
27D800B7000
|
trusted library allocation
|
page read and write
|
||
7FFAAC684000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8C0000
|
trusted library allocation
|
page read and write
|
||
27DEBCD9000
|
heap
|
page read and write
|
||
D5B7FE000
|
stack
|
page read and write
|
||
A87E27E000
|
stack
|
page readonly
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
25A1BBE0000
|
heap
|
page read and write
|
||
187AB1D9000
|
heap
|
page read and write
|
||
2787000
|
stack
|
page read and write
|
||
2461749D000
|
heap
|
page read and write
|
||
7FFAAC634000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
2056CBAF000
|
heap
|
page read and write
|
||
2056C008000
|
heap
|
page read and write
|
||
67FC000
|
stack
|
page read and write
|
||
6CB0000
|
trusted library allocation
|
page read and write
|
||
9441DFE000
|
stack
|
page read and write
|
||
7FFAAC930000
|
trusted library allocation
|
page read and write
|
||
24617431000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
246174EF000
|
heap
|
page read and write
|
||
7FFAAC654000
|
trusted library allocation
|
page read and write
|
||
187AB23B000
|
heap
|
page read and write
|
||
477E000
|
stack
|
page read and write
|
||
9441EFE000
|
stack
|
page read and write
|
||
1FCACB32000
|
heap
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
7FFAAC660000
|
trusted library allocation
|
page read and write
|
||
1ACC042B000
|
heap
|
page read and write
|
||
7FFAAC633000
|
trusted library allocation
|
page execute and read and write
|
||
2A329AE0000
|
trusted library allocation
|
page read and write
|
||
25A1BBC0000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC664000
|
trusted library allocation
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
DD35CFD000
|
stack
|
page read and write
|
||
312E000
|
stack
|
page read and write
|
||
248C5414000
|
heap
|
page read and write
|
||
1EE9E20E000
|
unkown
|
page readonly
|
||
18A90F00000
|
trusted library allocation
|
page read and write
|
||
7C0687E000
|
unkown
|
page readonly
|
||
24616B0E000
|
heap
|
page read and write
|
||
7FFAAC653000
|
trusted library allocation
|
page execute and read and write
|
||
79544FD000
|
stack
|
page read and write
|
||
7FFAAC7D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC69C000
|
trusted library allocation
|
page execute and read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7FFAAC634000
|
trusted library allocation
|
page read and write
|
||
2056CBAE000
|
heap
|
page read and write
|
||
7FFB23B00000
|
unkown
|
page readonly
|
||
131AC439000
|
heap
|
page read and write
|
||
1D43BAF2000
|
unkown
|
page readonly
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC81C000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
2F50000
|
heap
|
page readonly
|
||
B8115FE000
|
stack
|
page read and write
|
||
7C0637E000
|
unkown
|
page readonly
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC770000
|
trusted library allocation
|
page execute and read and write
|
||
2F4B000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
24617433000
|
heap
|
page read and write
|
||
246174A1000
|
heap
|
page read and write
|
||
4F0D000
|
trusted library allocation
|
page execute and read and write
|
||
1EE8526C000
|
heap
|
page read and write
|
||
2461749D000
|
heap
|
page read and write
|
||
5BFFCFA000
|
stack
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
2753000
|
heap
|
page read and write
|
||
7FFAAC850000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2056C0B0000
|
heap
|
page read and write
|
||
7FFAAC645000
|
trusted library allocation
|
page read and write
|
||
7FFAAC800000
|
trusted library allocation
|
page read and write
|
||
2056C020000
|
heap
|
page read and write
|
||
18792260000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
248AC0F0000
|
heap
|
page read and write
|
||
44AE000
|
stack
|
page read and write
|
||
24617465000
|
heap
|
page read and write
|
||
7FFAAC900000
|
trusted library allocation
|
page read and write
|
||
30EF000
|
stack
|
page read and write
|
||
1B35ABD1000
|
heap
|
page read and write
|
||
248ACBB7000
|
trusted library allocation
|
page read and write
|
||
7FFAACC70000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A0000
|
trusted library allocation
|
page read and write
|
||
B8113FF000
|
stack
|
page read and write
|
||
1B35B54F000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
1C53EC25000
|
heap
|
page read and write
|
||
7FFAAC8F3000
|
trusted library allocation
|
page read and write
|
||
18A91100000
|
heap
|
page read and write
|
||
7FFAAC820000
|
trusted library allocation
|
page read and write
|
||
4FE0000
|
heap
|
page read and write
|
||
46C2000
|
trusted library allocation
|
page read and write
|
||
94422FC000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
269E000
|
stack
|
page read and write
|
||
1ACC046E000
|
heap
|
page read and write
|
||
7FFAAC7E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC653000
|
trusted library allocation
|
page read and write
|
||
248C521D000
|
heap
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
2A329B29000
|
trusted library allocation
|
page read and write
|
||
9C8D0FE000
|
stack
|
page read and write
|
||
1ACC0340000
|
heap
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
7FFB0BB26000
|
unkown
|
page readonly
|
||
46CB000
|
trusted library allocation
|
page execute and read and write
|
||
18A91002000
|
heap
|
page read and write
|
||
18A9101B000
|
heap
|
page read and write
|
||
333F000
|
stack
|
page read and write
|
||
73D16000
|
unkown
|
page readonly
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC80D000
|
trusted library allocation
|
page read and write
|
||
187AB24B000
|
heap
|
page read and write
|
||
5226000
|
trusted library allocation
|
page read and write
|
||
2A329760000
|
heap
|
page read and write
|
||
27BF000
|
heap
|
page read and write
|
||
2056CB30000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
468D000
|
trusted library allocation
|
page execute and read and write
|
||
6191000
|
trusted library allocation
|
page read and write
|
||
7FFAAC849000
|
trusted library allocation
|
page read and write
|
||
7FFAAC860000
|
trusted library allocation
|
page execute and read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
1EE85B85000
|
trusted library allocation
|
page read and write
|
||
74D0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC7EA000
|
trusted library allocation
|
page read and write
|
||
187AB1F3000
|
heap
|
page read and write
|
||
73D1D000
|
unkown
|
page read and write
|
||
187AB218000
|
heap
|
page read and write
|
||
94421FA000
|
stack
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
EEDDAFB000
|
stack
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
24BB0B70000
|
remote allocation
|
page read and write
|
||
24BAED17000
|
heap
|
page read and write
|
||
2056C0B6000
|
heap
|
page read and write
|
||
1ACC04A8000
|
heap
|
page read and write
|
||
2056CBC2000
|
heap
|
page read and write
|
||
32FC000
|
heap
|
page read and write
|
||
1D422980000
|
heap
|
page read and write
|
||
2EB3000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC7F0000
|
trusted library allocation
|
page read and write
|
||
20AD4980000
|
remote allocation
|
page read and write
|
||
2C9B000
|
heap
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC726000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7C05FAE000
|
stack
|
page read and write
|
||
4B71000
|
trusted library allocation
|
page read and write
|
||
D4AFFFA000
|
stack
|
page read and write
|
||
2A329E95000
|
trusted library allocation
|
page read and write
|
||
B8116FE000
|
stack
|
page read and write
|
||
41E0000
|
heap
|
page read and write
|
||
24616B7D000
|
heap
|
page read and write
|
||
1DD47A8F000
|
trusted library allocation
|
page read and write
|
||
1FCAF1D0000
|
heap
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A0000
|
trusted library allocation
|
page execute and read and write
|
||
98804FE000
|
unkown
|
page readonly
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
2C90000
|
heap
|
page read and write
|
||
2069BFB5000
|
heap
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
3665000
|
heap
|
page read and write
|
||
24F0000
|
heap
|
page read and write
|
||
4670000
|
trusted library allocation
|
page read and write
|
||
2056C0B1000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
A7294FE000
|
stack
|
page read and write
|
||
1C53ED00000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
BE3B03D000
|
stack
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2EBD000
|
trusted library allocation
|
page execute and read and write
|
||
248C533C000
|
heap
|
page read and write
|
||
2069BD60000
|
heap
|
page read and write
|
||
9C8CCFE000
|
stack
|
page read and write
|
||
2D85000
|
heap
|
page read and write
|
||
7FFB23B25000
|
unkown
|
page readonly
|
||
9C8CAFB000
|
stack
|
page read and write
|
||
2A329B82000
|
trusted library allocation
|
page read and write
|
||
27D807CB000
|
trusted library allocation
|
page read and write
|
||
27D804F7000
|
trusted library allocation
|
page read and write
|
||
7FFAAC643000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page read and write
|
||
6F0D000
|
stack
|
page read and write
|
||
131BCD11000
|
trusted library allocation
|
page read and write
|
||
248C5274000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
A87E77E000
|
unkown
|
page readonly
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFAACDE0000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
248C526F000
|
heap
|
page read and write
|
||
46B0000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
CE4D67B000
|
stack
|
page read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page read and write
|
||
1D43CB45000
|
heap
|
page read and write
|
||
187AB307000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
1879210E000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
20AD424F000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
1DD57971000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC670000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFAACAB0000
|
trusted library allocation
|
page execute and read and write
|
||
24617531000
|
heap
|
page read and write
|
||
7FFAAC826000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
248ACC5E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC880000
|
trusted library allocation
|
page read and write
|
||
1EE85320000
|
heap
|
page read and write
|
||
2056CA91000
|
heap
|
page read and write
|
||
7FFAAC64D000
|
trusted library allocation
|
page execute and read and write
|
||
4A00000
|
heap
|
page execute and read and write
|
||
57A1000
|
trusted library allocation
|
page read and write
|
||
1ACC04A3000
|
heap
|
page read and write
|
||
20AD4A02000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
364B6FE000
|
stack
|
page read and write
|
||
1D422DF0000
|
heap
|
page read and write
|
||
1ACC0481000
|
heap
|
page read and write
|
||
7FFAAC67D000
|
trusted library allocation
|
page execute and read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
2A339A53000
|
trusted library allocation
|
page read and write
|
||
772E000
|
stack
|
page read and write
|
||
131BCD01000
|
trusted library allocation
|
page read and write
|
||
2FBB000
|
stack
|
page read and write
|
||
7FFAAC8F0000
|
trusted library allocation
|
page read and write
|
||
1FCAC216000
|
heap
|
page read and write
|
||
A72AD7D000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
2A329280000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7C06B7E000
|
stack
|
page read and write
|
||
206B4ECB000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
20AD4240000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
6D21000
|
trusted library allocation
|
page read and write
|
||
CE4C6FF000
|
stack
|
page read and write
|
||
7FFAAC8C0000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7FFAACB30000
|
trusted library allocation
|
page read and write
|
||
1B373CE0000
|
heap
|
page execute and read and write
|
||
1D422940000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
2F2E000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
1879288F000
|
trusted library allocation
|
page read and write
|
||
7FFAAC642000
|
trusted library allocation
|
page read and write
|
||
5581000
|
trusted library allocation
|
page read and write
|
||
246175C0000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
1D422B23000
|
heap
|
page read and write
|
||
1ACC0400000
|
heap
|
page read and write
|
||
7F0A0000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC780000
|
trusted library allocation
|
page execute and read and write
|
||
187AB600000
|
heap
|
page read and write
|
||
2056CA8D000
|
heap
|
page read and write
|
||
2069BEE0000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
2A341A40000
|
trusted library allocation
|
page read and write
|
||
6D2E000
|
trusted library allocation
|
page read and write
|
||
20AD422B000
|
heap
|
page read and write
|
||
7FFAAC940000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
187AB466000
|
heap
|
page read and write
|
||
29515E52000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
D4B02FE000
|
stack
|
page read and write
|
||
246169D0000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
25A1BC25000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFAACA10000
|
trusted library allocation
|
page read and write
|
||
1DD47173000
|
heap
|
page read and write
|
||
D1D43FE000
|
stack
|
page read and write
|
||
1DD57961000
|
trusted library allocation
|
page read and write
|
||
2A32A13E000
|
trusted library allocation
|
page read and write
|
||
509D000
|
stack
|
page read and write
|
||
1FCAF170000
|
heap
|
page read and write
|
||
2910000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
24616AA4000
|
heap
|
page read and write
|
||
187921F0000
|
trusted library allocation
|
page read and write
|
||
D1D3CFF000
|
stack
|
page read and write
|
||
246174F4000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFAAC859000
|
trusted library allocation
|
page read and write
|
||
2C3C000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC840000
|
trusted library allocation
|
page read and write
|
||
7FFAAC850000
|
trusted library allocation
|
page read and write
|
||
2A32A194000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
A87E1FC000
|
stack
|
page read and write
|
||
187AB20A000
|
heap
|
page read and write
|
||
2F66000
|
heap
|
page read and write
|
||
431E000
|
stack
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7F368000
|
trusted library allocation
|
page execute and read and write
|
||
2A3428C0000
|
unkown
|
page readonly
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
2056CB31000
|
heap
|
page read and write
|
||
1DD473A5000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
20AD4231000
|
heap
|
page read and write
|
||
7FFAAC664000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
187AB421000
|
heap
|
page read and write
|
||
7FFAAC838000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7FFAAC840000
|
trusted library allocation
|
page read and write
|
||
2C08000
|
heap
|
page read and write
|
||
18A90E99000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAACB90000
|
trusted library allocation
|
page execute and read and write
|
||
248ACA9B000
|
trusted library allocation
|
page read and write
|
||
5190FFC000
|
stack
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
1ACC0350000
|
heap
|
page read and write
|
||
24616AAD000
|
heap
|
page read and write
|
||
2A34292C000
|
heap
|
page read and write
|
||
2A3421CA000
|
heap
|
page read and write
|
||
724E000
|
stack
|
page read and write
|
||
7FFAAC980000
|
trusted library allocation
|
page read and write
|
||
4460000
|
trusted library allocation
|
page read and write
|
||
1C53EC66000
|
heap
|
page read and write
|
||
24BB0B70000
|
remote allocation
|
page read and write
|
||
7FFAACC00000
|
trusted library allocation
|
page read and write
|
||
A87DC9B000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFB23B16000
|
unkown
|
page readonly
|
||
1ACC0433000
|
heap
|
page read and write
|
||
7FFAACD00000
|
trusted library allocation
|
page read and write
|
||
246175B4000
|
heap
|
page read and write
|
||
24616B79000
|
heap
|
page read and write
|
||
1ACC049C000
|
heap
|
page read and write
|
||
1B35B3B9000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
29C0000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
246174A1000
|
heap
|
page read and write
|
||
24616AEE000
|
heap
|
page read and write
|
||
7FFAAC65D000
|
trusted library allocation
|
page execute and read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
2056CA55000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6CE0000
|
trusted library allocation
|
page read and write
|
||
20AD4302000
|
heap
|
page read and write
|
||
2056CA7E000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC81A000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
2A32A186000
|
trusted library allocation
|
page read and write
|
||
1D422AC9000
|
heap
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
7FFAAC830000
|
trusted library allocation
|
page read and write
|
||
290B000
|
stack
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
248C522A000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
276B000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
248C51E0000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8A3000
|
trusted library allocation
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
44BE000
|
stack
|
page read and write
|
||
D4B03FE000
|
stack
|
page read and write
|
||
2CE07FF000
|
stack
|
page read and write
|
||
1ACC0457000
|
heap
|
page read and write
|
||
18A90E73000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
27DEB980000
|
trusted library allocation
|
page read and write
|
||
5180000
|
heap
|
page execute and read and write
|
||
248C5446000
|
heap
|
page read and write
|
||
7FFAAC84D000
|
trusted library allocation
|
page read and write
|
||
1B35AE30000
|
heap
|
page read and write
|
||
7FFAAC820000
|
trusted library allocation
|
page read and write
|
||
7FFAAC710000
|
trusted library allocation
|
page read and write
|
||
2BEF000
|
heap
|
page read and write
|
||
1DD47116000
|
heap
|
page read and write
|
||
5190C7F000
|
stack
|
page read and write
|
||
2A329AAA000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC684000
|
trusted library allocation
|
page read and write
|
||
22115865000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
24616B31000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
AC478FE000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
D5B6FE000
|
stack
|
page read and write
|
||
5BFFBFD000
|
stack
|
page read and write
|
||
7FFAAC670000
|
trusted library allocation
|
page read and write
|
||
248AC110000
|
heap
|
page read and write
|
||
2C13000
|
heap
|
page read and write
|
||
248C4D96000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
1FCAC237000
|
heap
|
page read and write
|
||
25A1BC40000
|
heap
|
page read and write
|
||
7FFAAC840000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFAAC684000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFB03551000
|
unkown
|
page execute read
|
||
1D422960000
|
heap
|
page read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6CC000
|
trusted library allocation
|
page execute and read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page read and write
|
||
D5B1FD000
|
stack
|
page read and write
|
||
20AD4260000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
2917000
|
trusted library allocation
|
page execute and read and write
|
||
BE3A6FE000
|
stack
|
page read and write
|
||
2A329DE5000
|
trusted library allocation
|
page read and write
|
||
9C8C47B000
|
stack
|
page read and write
|
||
4DCF000
|
stack
|
page read and write
|
||
2056CBCC000
|
heap
|
page read and write
|
||
282CD5F0000
|
heap
|
page read and write
|
||
4F9E000
|
stack
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7FFAAC810000
|
trusted library allocation
|
page read and write
|
||
1879288B000
|
trusted library allocation
|
page read and write
|
||
29515E6F000
|
heap
|
page read and write
|
||
2A3290D0000
|
heap
|
page read and write
|
||
7FFAACA20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC85A000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7FFAAC9D0000
|
trusted library allocation
|
page read and write
|
||
246169F0000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2A329121000
|
heap
|
page read and write
|
||
7FFAAC66D000
|
trusted library allocation
|
page execute and read and write
|
||
2A329AE3000
|
trusted library allocation
|
page read and write
|
||
1EE9E249000
|
heap
|
page read and write
|
||
1B35A970000
|
unkown
|
page readonly
|
||
7FFAAC8E0000
|
trusted library allocation
|
page read and write
|
||
24616AEE000
|
heap
|
page read and write
|
||
2056CBC9000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
187AB234000
|
heap
|
page read and write
|
||
187AB1B0000
|
heap
|
page execute and read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
B810FD9000
|
stack
|
page read and write
|
||
27DEB330000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
2F4E000
|
stack
|
page read and write
|
||
7FFAAC648000
|
trusted library allocation
|
page read and write
|
||
6FC8FFE000
|
stack
|
page read and write
|
||
4680000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC672000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFAAC663000
|
trusted library allocation
|
page execute and read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
187921D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC790000
|
trusted library allocation
|
page execute and read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
1B35B392000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
714D000
|
stack
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
2A329128000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
131ACD3B000
|
trusted library allocation
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
27D80657000
|
trusted library allocation
|
page read and write
|
||
4A4E000
|
stack
|
page read and write
|
||
7FFAAC6EC000
|
trusted library allocation
|
page execute and read and write
|
||
1FCAC213000
|
heap
|
page read and write
|
||
18792A1E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC654000
|
trusted library allocation
|
page read and write
|
||
24BAEC3D000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8E6000
|
trusted library allocation
|
page read and write
|
||
2BFB000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFAAC72C000
|
trusted library allocation
|
page execute and read and write
|
||
2A329240000
|
trusted library allocation
|
page read and write
|
||
2EEB000
|
trusted library allocation
|
page execute and read and write
|
||
27DEB167000
|
heap
|
page read and write
|
||
2461743A000
|
heap
|
page read and write
|
||
5223000
|
trusted library allocation
|
page read and write
|
||
1C53EC74000
|
heap
|
page read and write
|
||
7FFAAC630000
|
trusted library allocation
|
page read and write
|
||
7FFAAC690000
|
trusted library allocation
|
page read and write
|
||
DC3F6FF000
|
stack
|
page read and write
|
||
272A000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
1EE85350000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7ED000
|
trusted library allocation
|
page read and write
|
||
18A90E7A000
|
heap
|
page read and write
|
||
1D43B2D0000
|
trusted library allocation
|
page read and write
|
||
7953AFE000
|
stack
|
page read and write
|
||
131AC42F000
|
heap
|
page read and write
|
||
7FFAAC673000
|
trusted library allocation
|
page read and write
|
||
6D21000
|
trusted library allocation
|
page read and write
|
||
A87E57E000
|
unkown
|
page readonly
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
D4AF561000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
1B373A40000
|
unkown
|
page readonly
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7953EFF000
|
stack
|
page read and write
|
||
2056CADA000
|
heap
|
page read and write
|
||
246174A1000
|
heap
|
page read and write
|
||
7FFAAC680000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
2069C7DB000
|
trusted library allocation
|
page read and write
|
||
BE3A7FE000
|
stack
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
2F6A000
|
heap
|
page read and write
|
||
A72AA7E000
|
stack
|
page read and write
|
||
7FFAACDD0000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
BE3A3FE000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
483B000
|
trusted library allocation
|
page read and write
|
||
20AD41F0000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
32DA000
|
heap
|
page read and write
|
||
1D4239B8000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAACBB0000
|
trusted library allocation
|
page execute and read and write
|
||
1ACC0C02000
|
trusted library allocation
|
page read and write
|
||
7FFAAC684000
|
trusted library allocation
|
page read and write
|
||
1B36B271000
|
trusted library allocation
|
page read and write
|
||
7FFAAC716000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
1FCACB23000
|
heap
|
page read and write
|
||
355E000
|
stack
|
page read and write
|
||
7FFAACA70000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
2A329B21000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6E0000
|
trusted library allocation
|
page read and write
|
||
6195000
|
trusted library allocation
|
page read and write
|
||
7FFAAC673000
|
trusted library allocation
|
page execute and read and write
|
||
CE4CDF7000
|
stack
|
page read and write
|
||
4921000
|
heap
|
page read and write
|
||
73D1F000
|
unkown
|
page readonly
|
||
7FFAAC68B000
|
trusted library allocation
|
page execute and read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
D4AF5EE000
|
stack
|
page read and write
|
||
1C53ED02000
|
heap
|
page read and write
|
||
187AB30C000
|
heap
|
page read and write
|
||
2069C690000
|
unkown
|
page readonly
|
||
7FFAAC746000
|
trusted library allocation
|
page execute and read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
282B3380000
|
trusted library allocation
|
page read and write
|
||
2056CBC0000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC674000
|
trusted library allocation
|
page read and write
|
||
2A3421C8000
|
heap
|
page read and write
|
||
2BD0000
|
heap
|
page read and write
|
||
1DD472E0000
|
heap
|
page read and write
|
||
2461749D000
|
heap
|
page read and write
|
||
75C0000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
32B5000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
248C52E0000
|
heap
|
page read and write
|
||
2F83000
|
heap
|
page read and write
|
||
27D90001000
|
trusted library allocation
|
page read and write
|
||
27D90013000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7E3000
|
trusted library allocation
|
page read and write
|
||
7FFAACCE0000
|
trusted library allocation
|
page read and write
|
||
79541FE000
|
stack
|
page read and write
|
||
24616A9B000
|
heap
|
page read and write
|
||
27D9000E000
|
trusted library allocation
|
page read and write
|
||
7FFAAC69B000
|
trusted library allocation
|
page execute and read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2FDE000
|
heap
|
page read and write
|
||
1D42380B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC820000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7FFAAC82D000
|
trusted library allocation
|
page read and write
|
||
4683000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC68D000
|
trusted library allocation
|
page execute and read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
2056CA2A000
|
heap
|
page read and write
|
||
359E000
|
stack
|
page read and write
|
||
248AC0D0000
|
heap
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
282CD575000
|
heap
|
page read and write
|
||
A72A435000
|
stack
|
page read and write
|
||
488A000
|
trusted library allocation
|
page read and write
|
||
187AB38E000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6B80000
|
trusted library allocation
|
page execute and read and write
|
||
27D800C5000
|
trusted library allocation
|
page read and write
|
||
1D43CC0C000
|
heap
|
page read and write
|
||
1D4239B6000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
4570000
|
heap
|
page execute and read and write
|
||
2056CA40000
|
heap
|
page read and write
|
||
27DEC315000
|
heap
|
page read and write
|
||
7FFAAC6BC000
|
trusted library allocation
|
page execute and read and write
|
||
2744000
|
heap
|
page read and write
|
||
2056CBCF000
|
heap
|
page read and write
|
||
364B3FA000
|
stack
|
page read and write
|
||
522B000
|
trusted library allocation
|
page read and write
|
||
7FFAAC760000
|
trusted library allocation
|
page execute and read and write
|
||
1ACC045A000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
364ABFE000
|
stack
|
page read and write
|
||
7FFAAC935000
|
trusted library allocation
|
page read and write
|
||
1B36B2CB000
|
trusted library allocation
|
page read and write
|
||
27D80093000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFAAC920000
|
trusted library allocation
|
page read and write
|
||
131AC44B000
|
heap
|
page read and write
|
||
4AB0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
2A32A192000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC860000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
5585000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
7FFAAC800000
|
trusted library allocation
|
page read and write
|
||
7FFAAC840000
|
trusted library allocation
|
page read and write
|
||
7EFE0000
|
trusted library allocation
|
page execute and read and write
|
||
6D10000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC950000
|
trusted library allocation
|
page read and write
|
||
7FFAAC680000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
24BB0602000
|
trusted library allocation
|
page read and write
|
||
2056CAE8000
|
heap
|
page read and write
|
||
29515E02000
|
heap
|
page read and write
|
||
2056CB55000
|
heap
|
page read and write
|
||
2056CBCB000
|
heap
|
page read and write
|
||
248AC0C0000
|
heap
|
page read and write
|
||
246175BB000
|
heap
|
page read and write
|
||
46C0000
|
trusted library allocation
|
page read and write
|
||
6CD5000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8E6000
|
trusted library allocation
|
page read and write
|
||
7FFAAC67C000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8F0000
|
trusted library allocation
|
page read and write
|
||
246175C3000
|
heap
|
page read and write
|
||
246175A1000
|
heap
|
page read and write
|
||
2056CA7D000
|
heap
|
page read and write
|
||
DD35FFE000
|
stack
|
page read and write
|
||
1EE85830000
|
unkown
|
page readonly
|
||
7FFAACA30000
|
trusted library allocation
|
page read and write
|
||
364BAFF000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
4460000
|
trusted library allocation
|
page read and write
|
||
7FFAAC880000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
2461744D000
|
heap
|
page read and write
|
||
2056CBB5000
|
heap
|
page read and write
|
||
2A329B15000
|
trusted library allocation
|
page read and write
|
||
7FFAAC834000
|
trusted library allocation
|
page read and write
|
||
1D4229D0000
|
trusted library allocation
|
page read and write
|
||
CE4CE3F000
|
stack
|
page read and write
|
||
206AC7A1000
|
trusted library allocation
|
page read and write
|
||
7FFAAC756000
|
trusted library allocation
|
page execute and read and write
|
||
131ACCF0000
|
heap
|
page execute and read and write
|
||
2A329AE8000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6F6000
|
trusted library allocation
|
page read and write
|
||
7FFAACCC0000
|
trusted library allocation
|
page read and write
|
||
2A3428C2000
|
unkown
|
page readonly
|
||
2069BBD0000
|
unkown
|
page readonly
|
||
1DD47118000
|
heap
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
282B33D5000
|
heap
|
page read and write
|
||
98FFFFE000
|
stack
|
page read and write
|
||
7953791000
|
stack
|
page read and write
|
||
2F7C000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7570000
|
trusted library allocation
|
page read and write
|
||
1D422AA0000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFAAC810000
|
trusted library allocation
|
page read and write
|
||
7FFB23B16000
|
unkown
|
page readonly
|
||
18792135000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
246175B2000
|
heap
|
page read and write
|
||
131ACC69000
|
heap
|
page read and write
|
||
1B35AE00000
|
heap
|
page execute and read and write
|
||
7FFAAC820000
|
trusted library allocation
|
page read and write
|
||
27C5000
|
heap
|
page read and write
|
||
18A91000000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2CE0DFE000
|
stack
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
CE4D37E000
|
stack
|
page read and write
|
||
2069BEE5000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
1851F065000
|
heap
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
28D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8E0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC663000
|
trusted library allocation
|
page execute and read and write
|
||
1B35B397000
|
trusted library allocation
|
page read and write
|
||
7FFB23B01000
|
unkown
|
page execute read
|
||
206AC7AD000
|
trusted library allocation
|
page read and write
|
||
94419FF000
|
stack
|
page read and write
|
||
2F60000
|
heap
|
page read and write
|
||
1D43BBD0000
|
unkown
|
page readonly
|
||
1DD470C0000
|
heap
|
page read and write
|
||
27DEC6B6000
|
heap
|
page read and write
|
||
7FFAAC71C000
|
trusted library allocation
|
page execute and read and write
|
||
1D43BCA8000
|
unkown
|
page readonly
|
||
27DEC240000
|
heap
|
page execute and read and write
|
||
DC3F5FF000
|
stack
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
24617433000
|
heap
|
page read and write
|
||
7A70000
|
remote allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
98801FC000
|
stack
|
page read and write
|
||
D5B2FF000
|
stack
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6C1E000
|
stack
|
page read and write
|
||
2069BBD0000
|
unkown
|
page readonly
|
||
7FFAAC63D000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC860000
|
trusted library allocation
|
page read and write
|
||
43D0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC6AC000
|
trusted library allocation
|
page execute and read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
5170000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
246175BD000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
131AC310000
|
heap
|
page read and write
|
||
2056CBAF000
|
heap
|
page read and write
|
||
282C4DDF000
|
trusted library allocation
|
page read and write
|
||
248C5226000
|
heap
|
page read and write
|
||
1D42383B000
|
trusted library allocation
|
page read and write
|
||
18A9101B000
|
heap
|
page read and write
|
||
1ACC0462000
|
heap
|
page read and write
|
||
7FFAACCD0000
|
trusted library allocation
|
page read and write
|
||
A87E8FD000
|
stack
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7FFAAC940000
|
trusted library allocation
|
page read and write
|
||
1EE85B05000
|
trusted library allocation
|
page read and write
|
||
94423FB000
|
stack
|
page read and write
|
||
7FFAAC877000
|
trusted library allocation
|
page read and write
|
||
5BFFEFF000
|
stack
|
page read and write
|
||
4882000
|
trusted library allocation
|
page read and write
|
||
4AA0000
|
trusted library allocation
|
page read and write
|
||
20AD4225000
|
heap
|
page read and write
|
||
7FFAACBC0000
|
trusted library allocation
|
page execute and read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
25A1BC2B000
|
heap
|
page read and write
|
||
1DD60208000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAACBF0000
|
trusted library allocation
|
page read and write
|
||
4DE0000
|
heap
|
page read and write
|
||
1F111A80000
|
heap
|
page read and write
|
||
248C535A000
|
heap
|
page read and write
|
||
364B4FE000
|
stack
|
page read and write
|
||
2CE0BFE000
|
stack
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6D60000
|
trusted library allocation
|
page read and write
|
||
1D422D80000
|
unkown
|
page readonly
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
27D800AF000
|
trusted library allocation
|
page read and write
|
||
7FFAAC852000
|
trusted library allocation
|
page read and write
|
||
1851ECE0000
|
heap
|
page read and write
|
||
DC3F1AB000
|
stack
|
page read and write
|
||
24616AAE000
|
heap
|
page read and write
|
||
5276000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7F7000
|
trusted library allocation
|
page read and write
|
||
282CD4FA000
|
heap
|
page read and write
|
||
18A90CB0000
|
heap
|
page read and write
|
||
1C53F400000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
7FFAACD20000
|
trusted library allocation
|
page execute and read and write
|
||
A729A3E000
|
stack
|
page read and write
|
||
206B4F0D000
|
heap
|
page read and write
|
||
2F93000
|
heap
|
page read and write
|
||
27DEB890000
|
heap
|
page execute and read and write
|
||
1ACC0413000
|
heap
|
page read and write
|
||
1B35ADC0000
|
unkown
|
page readonly
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7FFAACAA0000
|
trusted library allocation
|
page read and write
|
||
248C5235000
|
heap
|
page read and write
|
||
1DD47250000
|
trusted library allocation
|
page read and write
|
||
187A2861000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
7953BFF000
|
stack
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
472E000
|
stack
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
246175AA000
|
heap
|
page read and write
|
||
7FFAAC870000
|
trusted library allocation
|
page read and write
|
||
7FFB23B19000
|
unkown
|
page readonly
|
||
2056CA24000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
131AC435000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2056C1D0000
|
heap
|
page read and write
|
||
7FFAAC880000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFAAC674000
|
trusted library allocation
|
page read and write
|
||
D4AF9FE000
|
stack
|
page read and write
|
||
A72A57E000
|
stack
|
page read and write
|
||
44C0000
|
heap
|
page execute and read and write
|
||
5190A7B000
|
stack
|
page read and write
|
||
7FFAAC850000
|
trusted library allocation
|
page read and write
|
||
27DEC258000
|
heap
|
page read and write
|
||
2056CA3D000
|
heap
|
page read and write
|
||
7FFAAC720000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC71C000
|
trusted library allocation
|
page execute and read and write
|
||
1FCAC268000
|
heap
|
page read and write
|
||
246174A1000
|
heap
|
page read and write
|
||
131ACE2C000
|
trusted library allocation
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
1DD60238000
|
heap
|
page read and write
|
||
7FFAAC810000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2056CBCD000
|
heap
|
page read and write
|
||
7FFAAC650000
|
trusted library allocation
|
page read and write
|
||
7584000
|
trusted library allocation
|
page read and write
|
||
5255000
|
trusted library allocation
|
page read and write
|
||
CE4D57D000
|
stack
|
page read and write
|
||
1D43B628000
|
heap
|
page read and write
|
||
2BBE000
|
stack
|
page read and write
|
||
73D01000
|
unkown
|
page execute read
|
||
248C536D000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
A728BCF000
|
stack
|
page read and write
|
||
1FCAF150000
|
heap
|
page read and write
|
||
2F73000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
A87EF7D000
|
stack
|
page read and write
|
||
2F8C000
|
heap
|
page read and write
|
||
2056CBB1000
|
heap
|
page read and write
|
||
D4B01FC000
|
stack
|
page read and write
|
||
D4B04FD000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
1EE85AE7000
|
trusted library allocation
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
1FCAC1F0000
|
trusted library allocation
|
page read and write
|
||
2F6B000
|
heap
|
page read and write
|
||
A7296F5000
|
stack
|
page read and write
|
||
29515E37000
|
heap
|
page read and write
|
||
7FFAAC6F6000
|
trusted library allocation
|
page read and write
|
||
2C15000
|
heap
|
page read and write
|
||
27D80643000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
2F4B000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
4270000
|
heap
|
page readonly
|
||
2A329A30000
|
heap
|
page execute and read and write
|
||
7FFAAC900000
|
trusted library allocation
|
page execute and read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
4400000
|
trusted library allocation
|
page read and write
|
||
46C5000
|
trusted library allocation
|
page execute and read and write
|
||
5140000
|
trusted library allocation
|
page read and write
|
||
1B373B00000
|
unkown
|
page readonly
|
||
7FFAAC68D000
|
trusted library allocation
|
page execute and read and write
|
||
761E000
|
stack
|
page read and write
|
||
2056CBB8000
|
heap
|
page read and write
|
||
29515C00000
|
heap
|
page read and write
|
||
49E0000
|
heap
|
page read and write
|
||
7FFB23B00000
|
unkown
|
page readonly
|
||
2069BDE1000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC670000
|
trusted library allocation
|
page read and write
|
||
1ACC045D000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
7FFAAC71C000
|
trusted library allocation
|
page execute and read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
2056CAE4000
|
heap
|
page read and write
|
||
A87E7FE000
|
stack
|
page read and write
|
||
4B60000
|
heap
|
page read and write
|
||
1B35A970000
|
unkown
|
page readonly
|
||
7FFAAC720000
|
trusted library allocation
|
page execute and read and write
|
||
D5B5FE000
|
stack
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
2056CB36000
|
heap
|
page read and write
|
||
1D422C10000
|
unkown
|
page readonly
|
||
1EE85268000
|
heap
|
page read and write
|
||
7FFAAC736000
|
trusted library allocation
|
page execute and read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
5166000
|
trusted library allocation
|
page execute and read and write
|
||
2056BFE0000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
248C5217000
|
heap
|
page read and write
|
||
D1D45FD000
|
stack
|
page read and write
|
||
7545000
|
trusted library allocation
|
page read and write
|
||
24BAEC86000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
2D0D000
|
stack
|
page read and write
|
||
DD359FD000
|
stack
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
282B3360000
|
trusted library allocation
|
page read and write
|
||
4380000
|
heap
|
page read and write
|
||
CE4D77D000
|
stack
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
4690000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
2069C8F5000
|
trusted library allocation
|
page read and write
|
||
248C5458000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFAAC94C000
|
trusted library allocation
|
page read and write
|
||
18A90EE7000
|
heap
|
page read and write
|
||
94418FF000
|
stack
|
page read and write
|
||
24616B7C000
|
heap
|
page read and write
|
||
27D80058000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8F0000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8B0000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7FFAAC830000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
527A000
|
trusted library allocation
|
page read and write
|
||
1D43BAD6000
|
unkown
|
page readonly
|
||
9441595000
|
stack
|
page read and write
|
||
187AB275000
|
heap
|
page read and write
|
||
3313000
|
heap
|
page read and write
|
||
D5B9FE000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
43E0000
|
trusted library allocation
|
page read and write
|
||
6CD5000
|
trusted library allocation
|
page read and write
|
||
248AC180000
|
trusted library allocation
|
page read and write
|
||
7FFAAC810000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
DD357FE000
|
stack
|
page read and write
|
||
1ACC0449000
|
heap
|
page read and write
|
||
1B35ABFA000
|
heap
|
page read and write
|
||
75A0000
|
trusted library allocation
|
page read and write
|
||
6D60000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC746000
|
trusted library allocation
|
page execute and read and write
|
||
18A91144000
|
heap
|
page read and write
|
||
2EA0000
|
trusted library allocation
|
page read and write
|
||
18A90EB7000
|
heap
|
page read and write
|
||
2069C5D0000
|
heap
|
page read and write
|
||
7FFAAC640000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
A72A33C000
|
stack
|
page read and write
|
||
1D43C93A000
|
heap
|
page read and write
|
||
1EE851F0000
|
heap
|
page read and write
|
||
D5B8FD000
|
stack
|
page read and write
|
||
7FFAAC910000
|
trusted library allocation
|
page read and write
|
||
1D43CB50000
|
heap
|
page read and write
|
||
7FFAAC920000
|
trusted library allocation
|
page execute and read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
79545FE000
|
stack
|
page read and write
|
||
7FFAAC960000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
364B7FE000
|
stack
|
page read and write
|
||
2056C02D000
|
heap
|
page read and write
|
||
1D43C91A000
|
heap
|
page read and write
|
||
728E000
|
stack
|
page read and write
|
||
248AC1DA000
|
heap
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
4420000
|
trusted library allocation
|
page read and write
|
||
7549000
|
trusted library allocation
|
page read and write
|
||
79543FF000
|
stack
|
page read and write
|
||
7FFAAC8D0000
|
trusted library allocation
|
page execute and read and write
|
||
206B4F0F000
|
heap
|
page read and write
|
||
6B90000
|
trusted library allocation
|
page read and write
|
||
306F000
|
stack
|
page read and write
|
||
282B3040000
|
unkown
|
page readonly
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
758C000
|
trusted library allocation
|
page read and write
|
||
1FCAC281000
|
heap
|
page read and write
|
||
248C5239000
|
heap
|
page read and write
|
||
1C53EEE0000
|
heap
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2A329A10000
|
heap
|
page execute and read and write
|
||
7FFAAC8B0000
|
trusted library allocation
|
page read and write
|
||
28F0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC840000
|
trusted library allocation
|
page execute and read and write
|
||
248ACBCA000
|
trusted library allocation
|
page read and write
|
||
2056CA91000
|
heap
|
page read and write
|
||
246175C0000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
A7299FD000
|
stack
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC673000
|
trusted library allocation
|
page execute and read and write
|
||
1D423190000
|
heap
|
page read and write
|
||
467B000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
1ACC046C000
|
heap
|
page read and write
|
||
7FFAAC8D0000
|
trusted library allocation
|
page read and write
|
||
25A1BBF0000
|
heap
|
page read and write
|
||
4581000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
1ACC0502000
|
heap
|
page read and write
|
||
24BAEC80000
|
heap
|
page read and write
|
||
9C8CDFE000
|
unkown
|
page readonly
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
6F4E000
|
stack
|
page read and write
|
||
CE4C3D0000
|
stack
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
27D80537000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
heap
|
page read and write
|
||
51F1000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
27D800BB000
|
trusted library allocation
|
page read and write
|
||
1ACC0468000
|
heap
|
page read and write
|
||
1D422A8C000
|
heap
|
page read and write
|
||
27D806AE000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC970000
|
trusted library allocation
|
page read and write
|
||
1D4239B2000
|
trusted library allocation
|
page read and write
|
||
7FFAAC8F0000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
248AC645000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC802000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
29025DD5000
|
heap
|
page read and write
|
||
D6A88FF000
|
stack
|
page read and write
|
||
1FCAC1C0000
|
heap
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
D4B00FA000
|
stack
|
page read and write
|
||
2F9E000
|
stack
|
page read and write
|
||
68FE000
|
stack
|
page read and write
|
||
6FC8BAD000
|
stack
|
page read and write
|
||
D1D3AF1000
|
stack
|
page read and write
|
||
18A90ED3000
|
heap
|
page read and write
|
||
7FFAACC91000
|
trusted library allocation
|
page read and write
|
||
1DD6023A000
|
heap
|
page read and write
|
||
94420FE000
|
stack
|
page read and write
|
||
282CD4FC000
|
heap
|
page read and write
|
||
CE4CAFE000
|
stack
|
page read and write
|
||
7FFAAC653000
|
trusted library allocation
|
page read and write
|
||
248C5261000
|
heap
|
page read and write
|
||
1851EEBD000
|
heap
|
page read and write
|
||
7FFAACA50000
|
trusted library allocation
|
page read and write
|
||
6C20000
|
trusted library allocation
|
page read and write
|
||
24616A91000
|
heap
|
page read and write
|
||
7FFAACB72000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
24616AEE000
|
heap
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
29516402000
|
trusted library allocation
|
page read and write
|
||
2056CA39000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
187AB255000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
2ECE000
|
stack
|
page read and write
|
||
246174A1000
|
heap
|
page read and write
|
||
4801000
|
trusted library allocation
|
page read and write
|
||
2056CAD9000
|
heap
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
7FFAAC890000
|
trusted library allocation
|
page execute and read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
7FFAAC68B000
|
trusted library allocation
|
page execute and read and write
|
||
27DEB219000
|
heap
|
page read and write
|
||
1D422AC7000
|
heap
|
page read and write
|
||
6C40000
|
trusted library allocation
|
page read and write
|
||
7FFAAC663000
|
trusted library allocation
|
page execute and read and write
|
||
4460000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7FFB23B20000
|
unkown
|
page read and write
|
||
7FFB0BB10000
|
unkown
|
page readonly
|
||
24BB05D0000
|
trusted library allocation
|
page read and write
|
||
1F111B80000
|
heap
|
page read and write
|
||
4F35000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC850000
|
trusted library allocation
|
page read and write
|
||
248C5259000
|
heap
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
1EE9E162000
|
unkown
|
page readonly
|
||
187AB20E000
|
heap
|
page read and write
|
||
4730000
|
heap
|
page read and write
|
||
6D40000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
27DEB161000
|
heap
|
page read and write
|
||
20AD4213000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
1D43BAF0000
|
unkown
|
page readonly
|
||
7FFAAC816000
|
trusted library allocation
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
6D20000
|
trusted library allocation
|
page read and write
|
||
1D422DC4000
|
unkown
|
page readonly
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC670000
|
trusted library allocation
|
page read and write
|
||
7FFAAC990000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFAACBE0000
|
trusted library allocation
|
page read and write
|
||
D4AFEFE000
|
stack
|
page read and write
|
||
1ACC0467000
|
heap
|
page read and write
|
||
24617437000
|
heap
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page read and write
|
||
7590000
|
trusted library allocation
|
page read and write
|
||
D4B05FF000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
27DEC668000
|
heap
|
page read and write
|
||
2A329FD5000
|
trusted library allocation
|
page read and write
|
||
1DD60180000
|
heap
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
7FFAAC7D0000
|
trusted library allocation
|
page read and write
|
||
4684000
|
trusted library allocation
|
page read and write
|
||
27D8007C000
|
trusted library allocation
|
page read and write
|
||
27D90021000
|
trusted library allocation
|
page read and write
|
||
282CD81F000
|
heap
|
page read and write
|
||
7FFAAC71C000
|
trusted library allocation
|
page execute and read and write
|
||
187AB317000
|
heap
|
page read and write
|
||
6D30000
|
trusted library allocation
|
page read and write
|
||
1DD4712E000
|
heap
|
page read and write
|
||
1DD47130000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
BE3AC3E000
|
stack
|
page read and write
|
||
2500000
|
heap
|
page read and write
|
||
46C7000
|
trusted library allocation
|
page execute and read and write
|
||
2056CA66000
|
heap
|
page read and write
|
||
7FFAACC20000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAAC82C000
|
trusted library allocation
|
page read and write
|
||
27DEB950000
|
trusted library allocation
|
page read and write
|
||
CE4D03E000
|
stack
|
page read and write
|
||
426E000
|
stack
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
27DEB3C0000
|
trusted library allocation
|
page read and write
|
||
7FFAACC80000
|
trusted library allocation
|
page read and write
|
||
2A32913D000
|
heap
|
page read and write
|
||
7FFAAC900000
|
trusted library allocation
|
page execute and read and write
|
||
454E000
|
stack
|
page read and write
|
||
24617450000
|
heap
|
page read and write
|
||
24616D55000
|
heap
|
page read and write
|
||
7FFAACB56000
|
trusted library allocation
|
page read and write
|
||
131AC416000
|
heap
|
page read and write
|
||
24616B3A000
|
heap
|
page read and write
|
||
1EE85B45000
|
trusted library allocation
|
page read and write
|
||
27D800C9000
|
trusted library allocation
|
page read and write
|
||
7591000
|
trusted library allocation
|
page read and write
|
||
7540000
|
trusted library allocation
|
page read and write
|
||
7FFAACA10000
|
trusted library allocation
|
page read and write
|
||
20AD44D0000
|
heap
|
page read and write
|
||
3555000
|
heap
|
page read and write
|
||
2A32915F000
|
heap
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
BE3A9F5000
|
stack
|
page read and write
|
||
7580000
|
trusted library allocation
|
page read and write
|
||
7560000
|
trusted library allocation
|
page read and write
|
||
29025A10000
|
heap
|
page read and write
|
||
1FCACB00000
|
heap
|
page read and write
|
||
7FFAAC70C000
|
trusted library allocation
|
page execute and read and write
|
||
2461743D000
|
heap
|
page read and write
|
||
7FFAAC680000
|
trusted library allocation
|
page read and write
|
||
1D423994000
|
trusted library allocation
|
page read and write
|
||
CE4CBFE000
|
stack
|
page read and write
|
||
D1D44FE000
|
stack
|
page read and write
|
||
2056CA91000
|
heap
|
page read and write
|
There are 3696 hidden memdumps, click here to show them.