IOC Report
9rSeCZbjZE.msi

loading gif

Files

File Path
Type
Category
Malicious
9rSeCZbjZE.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
initial sample
malicious
C:\Config.Msi\6788d3.rbs
data
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI8AD6.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSI8AD6.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI8AD6.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI90F1.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSI90F1.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI90F1.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIA257.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSIA257.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIA257.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIA873.tmp
data
dropped
malicious
C:\Windows\Installer\MSIBFA8.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
modified
malicious
C:\Windows\Installer\MSIBFA8.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIBFA8.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\System32\InstallUtil.InstallLog
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Windows\Temp\~DF03F7F4E9FB6913B4.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF329B2876A41199DB.TMP
data
dropped
malicious
C:\Windows\Temp\~DF605B4EFF8857F184.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF861F9EB41197E865.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF9BE70E11C712AC71.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DFE286531BC9E5DA5B.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallState
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.ini
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AteraAgent.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
CSV text
dropped
C:\Windows\Installer\6788d2.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\6788d4.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\MSI8AD6.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI8AD6.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI8AD6.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI90F1.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI90F1.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI90F1.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIA257.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSIA257.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIA257.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIA883.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIA8E2.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIA9DD.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIBFA8.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSIBFA8.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIBFA8.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SourceHash{E732A0D7-A2F2-4657-AC41-B19742648E45}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
Certificate, Version=3
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
Certificate, Version=3
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log
CSV text
dropped
C:\Windows\Temp\~DF2AC55C925B773F74.TMP
data
dropped
C:\Windows\Temp\~DF79FF23373A05C1F3.TMP
data
dropped
C:\Windows\Temp\~DF9D959851B3998715.TMP
data
dropped
C:\Windows\Temp\~DFEC06232194559246.TMP
data
dropped
C:\Windows\Temp\~DFECAFB6D246C1D17D.TMP
data
dropped
C:\Windows\Temp\~DFFF03F3AA2EBF4357.TMP
data
dropped
\Device\ConDrv
JSON data
dropped
There are 68 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI8AD6.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6786046 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI90F1.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6787359 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSIA257.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6791812 11 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="Moshe@nlc.co.il" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000MFxEPIA1" /AgentId="95230b78-0b09-4026-a7c5-5fe4c9d15b4c"
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSIBFA8.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_6799296 33 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 95230b78-0b09-4026-a7c5-5fe4c9d15b4c "172d5505-5af0-4cb3-8690-0091fd98422a" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000MFxEPIA1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 95230b78-0b09-4026-a7c5-5fe4c9d15b4c "5232f273-c62e-437a-a74a-dca82f700d20" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000MFxEPIA1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 95230b78-0b09-4026-a7c5-5fe4c9d15b4c "79c2d964-37c1-436b-8678-a4e34369f725" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000MFxEPIA1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 95230b78-0b09-4026-a7c5-5fe4c9d15b4c "63fd8206-ed43-4ef7-8433-4a2d0eb92cc2" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000MFxEPIA1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 95230b78-0b09-4026-a7c5-5fe4c9d15b4c "ac52b191-a405-4d89-8808-a9c06c02ac20" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000MFxEPIA1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 95230b78-0b09-4026-a7c5-5fe4c9d15b4c "05b46de6-24e7-4784-8ae7-29fe3f62e039" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000MFxEPIA1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 95230b78-0b09-4026-a7c5-5fe4c9d15b4c "72b97848-a05f-4dfa-a8b2-0f7698832a4d" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000MFxEPIA1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 95230b78-0b09-4026-a7c5-5fe4c9d15b4c "9b12e3ad-6f98-4af0-a9fc-ab8da217520c" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000MFxEPIA1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\9rSeCZbjZE.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 91E370BBCC1D3B173FA78F8D350BDC0E
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 94F3C551036B6C48A24EF7F120DCA15A E Global\MSI0000
C:\Windows\SysWOW64\net.exe
"NET" STOP AteraAgent
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 STOP AteraAgent
C:\Windows\SysWOW64\taskkill.exe
"TaskKill.exe" /f /im AteraAgent.exe
C:\Windows\System32\sc.exe
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
There are 24 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=8ad3dbb8-dc1b-4e34-9cfd-9bde8068a524&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
http://schemas.datacontract.org
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=6728aeeb-ea10-4200-b8f3-dc55e64f1910&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
http://crl.microsoft
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=12b69d45-e208-429e-a1ba-7a4685b8d33f&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=f8bbbde1-132d-4c8b-a3f7-92801d85c6f6&tr=42&tt=17278895971611335&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://agent-api.atera.com/Production/Agent/GetCommands)
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=3676162b-6928-4fd8-b93b-5b9fd57a4bc9&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://agent-api.atera.com/Production/Agent/track-event
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=52378df9-3005-41cc-99a3-005f1aea746b&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
http://dl.google.com/googletalk/googletalk-setup.exe
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=bf8cfa76-7e1e-40bc-8430-cbc98e2b9cf4&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=17243d50-1dca-4ab3-8ffd-cdd1f9da06cf
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=db56a22c-5f27-4d90-bb5f-c1c03b70a2f0&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://agent-api.atera.com/Production/Agent/GetCommands0
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=51f162c7-d222-4991-a832-8f92cc099f2b
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=0057edd1-fdd5-48b9-8810-4c380add5c94&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=78a683fe-d9e2-4a77-b254-ef31610e8e8a
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=bb15c2cd-6944-449d-a45c-725c69499a75&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://agent-api.atera.com/Production/Agent/
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=d54a26d4-9bd6-42e4-80a6-a4a4e3ba5c02&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
http://schemas.datacontract.org/2004/07/System.ServiceProcess
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=79393e20-2c61-46ac-ae9a-25b77ed36f5f
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=00b247cc-4cad-4ea9-8d05-ff45cdabe262&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.229
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=0e034632-921f-4c18-8631-e930e7781cdd&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
http://wixtoolset.org
unknown
https://agent-api.atera.com/Production
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=0b04195d-e261-4ae6-9124-2e9ef139c80e&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.5/Agent.Package.Watchdog.zip
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=9971de24-c245-46f4-9d3f-d02f38f0d7af&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://agent-api.atera.com/Production/Agent/GetCommandsFallback2
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=8a4128bc-8a19-4909-a1e6-b35d010bab34&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://agent-api.atera.com/Production/Agent/GetCommandsFallback0
unknown
https://ps.atera.com/agentpackageswin/AgentPackageRuntimeInstaller/13.0/AgentPackageRuntimeInstaller
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=41fc8591-dd69-4f5b-a48c-932e4462c851&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
http://acontrol.atera.com/
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=bca747a8-f8aa-4561-b240-83faa7e7e63d&tt=0&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e051bd32-0461-46bc-8f46-18bc35b67f58&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://agent-api.atera.com/Production/Agent/AgentStarting)
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageAgentInformation/37.9/AgentPackageAgentInformation
unknown
https://ps.pndsn.com
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=68d2cd14-add9-4c6c-a93e-77e26890884e
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=c3db43af-b183-4a52-8bab-34b9b35414fc&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageNetworkDiscovery/23.9/AgentPackageNetworkDiscove
unknown
http://agent-api.atera.com
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e72fe1fd-d99c-400f-8cf3-5c7c15cf01f0
unknown
http://schemas.datacontract.org/2004/07/
unknown
https://github.com/icsharpcode/SharpZipLib
unknown
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageAgentI
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=fa8df594-b53d-487d-a304-ba12fa5b05b3&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=ea22bbfe-080d-4cf3-a894-9d96c46b6665&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.229
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=2e5bb07e-44ac-4f12-8635-048ca789db44&tt=0&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=51f162c7-d222-4991-a832-8f92cc099f2b&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e6d10987-75b3-41c1-a771-6d1daf1f7e97&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=aba03e32-f581-41ec-8949-2ce94c13458d&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.229
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=16f10dd5-c904-4ca2-9553-772cf48281d3&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.atera.com/agentpackagesnet45/AgentPackageTaskScheduler/17.2/AgentPackageTaskScheduler.zip
unknown
https://ps.pndsn.co
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=c36b9e71-cfbf-49fb-af12-137d82096f5b&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=f1517159-0a09-4cba-8a1d-213d326612aa&tt=0&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://agent-api.atera.com
unknown
https://agent-api.atera.com/Production/Agent/AgentStarting
unknown
http://www.w3.oh
unknown
https://agent-api.atera.com/Production/Agent/GetCommands
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=526a1f2f-a5ab-4bde-a18e-298b4847f820&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=587dc040-7dcb-4e3f-a1ce-624d9532bced&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=249c43d7-88d8-467f-9b13-1cfc96512eed&tr=42&tt=17278895941555670&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=7d1d3776-a9ff-4157-bb82-b018697910e8&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=5c45c37a-efc4-492f-83b1-e18abf8aff03&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://agent-api.atera.com/
unknown
https://agent-api.atera.com/Production/Agent/GetCommandsFallbackp
unknown
https://agent-api.atera.com/Production/Agent/GetRecurringPackages
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.Availability/13.0/Agent.Package.Availability.zip
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=ca02cb15-9afc-4f4c-87ba-02c0d5b8b22e&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
http://cacerts.digicert.F
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=e081e7e0-a9d2-4109-9370-9c9c176afebd&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=f72e8789-8756-4d61-b645-903501079ede&tt=0&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.atera.com/agentpackagesmac/AgentPackageRuntimeInstaller/1.5/AgentPackageRuntimeInstaller.
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.Watchdog/13.0/Agent.Package.Watchdog.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=d5643216-616f-4378-8575-222d8fa4f458&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=5d17a2da-332b-4264-ba43-80ed873a75d5&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=4f5157e7-f4c6-446f-92dd-afae16e89968&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.atera.com/agentpackagesnet45/Agent.Package.Availability/0.16/Agent.Package.Availability.z
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=a8e97ced-6d99-4374-ba29-94890053de07&tt=0&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=d5a52dd9-092a-47a9-965a-6b556c722544
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=14dba20c-b22d-4871-8f59-85d736c9c8d6&tt=0&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e5a45665-f96e-48ac-9e65-cc9a23f1c43b&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=396ed718-c52f-4436-be61-3047cc7c4a72&tr=42&tt=17278895704154400&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.atera.com/agentpackagesmac/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
unknown
https://ps.atera.com/agentpackagesnet45/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95230b78-0b09-4026-a7c5-5fe4c9d15b4c/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=1d9a933c-b5be-47b9-a98d-bd9c82ae0d0b&uuid=95230b78-0b09-4026-a7c5-5fe4c9d15b4c
35.157.63.228
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=08b51ed0-2f58-4675-b289-2b6f9275c37c
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=8370432f-ad78-46cb-91a9-bb6b24dcdf0f
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=8e131c63-2299-4880-a366-a776a97dd0d3
unknown
https://www.newtonsoft.com/json
unknown
https://agent-api.atera.com/Production/Agent/Age
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ps.pndsn.com
35.157.63.229
d25btwd9wax8gu.cloudfront.net
13.35.58.104
fp2e7a.wpc.phicdn.net
192.229.221.95
ps.atera.com
unknown
agent-api.atera.com
unknown

IPs

IP
Domain
Country
Malicious
35.157.63.228
unknown
United States
35.157.63.229
ps.pndsn.com
United States
13.35.58.104
d25btwd9wax8gu.cloudfront.net
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6788d3.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6788d3.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\ATERA Networks\AteraAgent\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\ATERA Networks\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Features
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
AutoBackupLogFiles
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AteraAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
AccountId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
IntegratorLogin
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
CompanyId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
AgentId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
ServerName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AlphaAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
FileDirectory
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_USERS.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
FileDirectory
There are 137 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
232D77C5000
heap
page read and write
malicious
13A39330000
heap
page read and write
malicious
18F7E890000
heap
page read and write
malicious
29A8FCA0000
heap
page read and write
malicious
4879000
heap
page read and write
malicious
227F6C40000
heap
page read and write
malicious
1EF27180000
heap
page read and write
malicious
2CDA0C71000
trusted library allocation
page read and write
malicious
46E1000
trusted library allocation
page read and write
malicious
18F7F8F0000
heap
page read and write
malicious
24D00001000
trusted library allocation
page read and write
malicious
2278017C000
trusted library allocation
page read and write
malicious
13A39BA3000
trusted library allocation
page read and write
malicious
232D7748000
heap
page read and write
malicious
22780089000
trusted library allocation
page read and write
malicious
1BC31A40000
heap
page read and write
malicious
24D00083000
trusted library allocation
page read and write
malicious
13A393EE000
heap
page read and write
malicious
227F9000000
heap
page read and write
malicious
2CDA0350000
heap
page read and write
malicious
290FB8AB000
heap
page read and write
malicious
18F7E8CF000
heap
page read and write
malicious
29A8F9BC000
heap
page read and write
malicious
290FB919000
heap
page read and write
malicious
2CDA039D000
heap
page read and write
malicious
18F7E899000
heap
page read and write
malicious
2278008C000
trusted library allocation
page read and write
malicious
290FB890000
heap
page read and write
malicious
7FFD341B4000
trusted library allocation
page read and write
malicious
29A903F3000
trusted library allocation
page read and write
malicious
290800BF000
trusted library allocation
page read and write
malicious
290FBB40000
heap
page read and write
malicious
29A901B1000
trusted library allocation
page read and write
malicious
1BC19151000
trusted library allocation
page read and write
malicious
1BC18928000
heap
page read and write
malicious
2CDA0CB7000
trusted library allocation
page read and write
malicious
2CDA0570000
heap
page read and write
malicious
24D00047000
trusted library allocation
page read and write
malicious
1EF276E1000
trusted library allocation
page read and write
malicious
1EF27018000
heap
page read and write
malicious
44FD000
heap
page read and write
malicious
13A39339000
heap
page read and write
malicious
24D00073000
trusted library allocation
page read and write
malicious
290FB8D3000
heap
page read and write
malicious
18F7E8CD000
heap
page read and write
malicious
22780001000
trusted library allocation
page read and write
malicious
227F6A0B000
heap
page read and write
malicious
232D7F63000
trusted library allocation
page read and write
malicious
18F00083000
trusted library allocation
page read and write
malicious
29A9021A000
trusted library allocation
page read and write
malicious
1BC189A5000
heap
page read and write
malicious
232D7780000
heap
page read and write
malicious
4224000
heap
page read and write
malicious
227800B2000
trusted library allocation
page read and write
malicious
1BC19197000
trusted library allocation
page read and write
malicious
29AA8E42000
heap
page read and write
malicious
24D748A0000
heap
page read and write
malicious
227F6792000
unkown
page readonly
malicious
13A39B31000
trusted library allocation
page read and write
malicious
29080047000
trusted library allocation
page read and write
malicious
290FB940000
heap
page read and write
malicious
1EF2779F000
trusted library allocation
page read and write
malicious
29A8F8E0000
heap
page read and write
malicious
232D7F73000
trusted library allocation
page read and write
malicious
227F8FE0000
heap
page read and write
malicious
C7BF4F5000
stack
page read and write
malicious
4784000
trusted library allocation
page read and write
malicious
232D78B2000
unkown
page readonly
malicious
24D000BF000
trusted library allocation
page read and write
malicious
2CDA0310000
heap
page read and write
malicious
22780132000
trusted library allocation
page read and write
malicious
13A39378000
heap
page read and write
malicious
227F69E6000
heap
page read and write
malicious
2CDA0CE3000
trusted library allocation
page read and write
malicious
29A90833000
trusted library allocation
page read and write
malicious
29080083000
trusted library allocation
page read and write
malicious
4AC7000
trusted library allocation
page read and write
malicious
232D775B000
heap
page read and write
malicious
1EF27763000
trusted library allocation
page read and write
malicious
227F8FD0000
heap
page read and write
malicious
13A393B6000
heap
page read and write
malicious
2CDA0242000
unkown
page readonly
malicious
18F000BF000
trusted library allocation
page read and write
malicious
18F7E91B000
heap
page read and write
malicious
232D7690000
heap
page read and write
malicious
2CDA0CF3000
trusted library allocation
page read and write
malicious
1BC18920000
heap
page read and write
malicious
29080073000
trusted library allocation
page read and write
malicious
13A395F0000
heap
page read and write
malicious
1BC188C0000
heap
page read and write
malicious
227800B4000
trusted library allocation
page read and write
malicious
227F6A6F000
heap
page read and write
malicious
18F00047000
trusted library allocation
page read and write
malicious
13A39B77000
trusted library allocation
page read and write
malicious
18F00001000
trusted library allocation
page read and write
malicious
1EF26F99000
heap
page read and write
malicious
29A9030A000
trusted library allocation
page read and write
malicious
232D7EF1000
trusted library allocation
page read and write
malicious
13A3936C000
heap
page read and write
malicious
1EF27727000
trusted library allocation
page read and write
malicious
4049000
heap
page read and write
malicious
29A90B25000
trusted library allocation
page read and write
malicious
13A39BB3000
trusted library allocation
page read and write
malicious
24D75766000
heap
page read and write
malicious
29AA8D5D000
heap
page read and write
malicious
29AA8B39000
heap
page read and write
malicious
29080001000
trusted library allocation
page read and write
malicious
1BC1920F000
trusted library allocation
page read and write
malicious
1BC1893B000
heap
page read and write
malicious
18F7EA70000
heap
page read and write
malicious
1EF26FD1000
heap
page read and write
malicious
1BC191D3000
trusted library allocation
page read and write
malicious
24D747A4000
heap
page read and write
malicious
29A8F91E000
heap
page read and write
malicious
4A21000
trusted library allocation
page read and write
malicious
227F69E0000
heap
page read and write
malicious
2CDA0D2F000
trusted library allocation
page read and write
malicious
290FB8CB000
heap
page read and write
malicious
1BC18963000
heap
page read and write
malicious
13A39BEF000
trusted library allocation
page read and write
malicious
227F6AAD000
heap
page read and write
malicious
1BC1895B000
heap
page read and write
malicious
24D7475C000
heap
page read and write
malicious
24D74728000
heap
page read and write
malicious
290FB898000
heap
page read and write
malicious
1EF26FCB000
heap
page read and write
malicious
232D777C000
heap
page read and write
malicious
1EF26F90000
heap
page read and write
malicious
1EF27050000
heap
page read and write
malicious
1BC191C3000
trusted library allocation
page read and write
malicious
1EF27753000
trusted library allocation
page read and write
malicious
227F6A21000
heap
page read and write
malicious
29A8F870000
heap
page read and write
malicious
227F901D000
heap
page read and write
malicious
18F00073000
trusted library allocation
page read and write
malicious
24D74720000
heap
page read and write
malicious
232D7740000
heap
page read and write
malicious
13A3934B000
heap
page read and write
malicious
29A8F96A000
heap
page read and write
malicious
2CDA0240000
unkown
page readonly
7FFD340CC000
trusted library allocation
page execute and read and write
13A3936E000
heap
page read and write
7FFD34240000
trusted library allocation
page read and write
2CDB9538000
heap
page read and write
6EE0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
C7C0D29000
stack
page read and write
13A523D0000
heap
page read and write
26E5000
heap
page read and write
6ED0000
trusted library allocation
page read and write
7FFD34013000
trusted library allocation
page execute and read and write
65F0000
trusted library allocation
page read and write
4090000
trusted library allocation
page read and write
7FFD341C6000
trusted library allocation
page read and write
C7BFAFF000
stack
page read and write
6B30000
trusted library allocation
page read and write
6E09000
trusted library allocation
page execute and read and write
6B30000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
5B567FE000
stack
page read and write
4870000
trusted library allocation
page read and write
13A52391000
heap
page read and write
6AF0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
2FCE000
stack
page read and write
6EB0000
trusted library allocation
page read and write
117000
stack
page read and write
6B50000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD341E8000
trusted library allocation
page read and write
29AA9258000
heap
page read and write
7FFD34034000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
7FFD3401D000
trusted library allocation
page execute and read and write
6E90000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
4070000
trusted library allocation
page read and write
29A90B45000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD3406C000
trusted library allocation
page execute and read and write
6B30000
trusted library allocation
page read and write
2CDA0353000
heap
page read and write
1BC2915D000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD34209000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
18F7EA20000
trusted library allocation
page read and write
7F268000
trusted library allocation
page execute and read and write
312D000
heap
page read and write
2900000
heap
page read and write
6B10000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
13A39240000
heap
page read and write
1EF26FB6000
heap
page read and write
3655000
heap
page read and write
6B10000
trusted library allocation
page read and write
7FFD341EB000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
47F0000
heap
page read and write
6B10000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
29A8FBD0000
trusted library allocation
page read and write
C7C092C000
stack
page read and write
4731000
trusted library allocation
page read and write
7FFD34254000
trusted library allocation
page read and write
6E30000
trusted library allocation
page read and write
7FFD341C0000
trusted library allocation
page read and write
41DE000
stack
page read and write
29A8F966000
heap
page read and write
6EB0000
trusted library allocation
page read and write
7FFD34120000
trusted library allocation
page execute and read and write
C7C1D29000
stack
page read and write
6E90000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
22780178000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
FD64CFF000
stack
page read and write
6B40000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
29A5000
heap
page read and write
5B565FE000
stack
page read and write
1EF26DD0000
heap
page read and write
7FFD341D5000
trusted library allocation
page read and write
C7C1228000
stack
page read and write
29AA8EA1000
heap
page read and write
6B30000
trusted library allocation
page read and write
2D90000
heap
page read and write
18F7F98C000
heap
page read and write
46B3000
trusted library allocation
page read and write
232D74F0000
unkown
page readonly
3E5000
heap
page read and write
6E95000
trusted library allocation
page read and write
227F6840000
heap
page read and write
6ED0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
18F7E8B6000
heap
page read and write
7FFD33FF8000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
29A907BF000
trusted library allocation
page read and write
47D0000
heap
page read and write
2A1D000
heap
page read and write
6E90000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
2EBE000
stack
page read and write
6EC0000
trusted library allocation
page read and write
7FFD34014000
trusted library allocation
page read and write
1C145602000
heap
page read and write
6ED0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
2CDA06D0000
heap
page read and write
6B30000
trusted library allocation
page read and write
7FFD33FF4000
trusted library allocation
page read and write
227F8FE6000
heap
page read and write
7FFD33FFD000
trusted library allocation
page execute and read and write
6B30000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
4728000
trusted library allocation
page read and write
6E03000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD340B0000
trusted library allocation
page execute and read and write
6E90000
trusted library allocation
page read and write
7FFD3402D000
trusted library allocation
page execute and read and write
7FFD341CD000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
4B12000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD341AE000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
F4486FE000
stack
page read and write
4CE86FC000
stack
page read and write
A295AFF000
stack
page read and write
29AA8534000
heap
page read and write
29A8FBE3000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
A2957FE000
stack
page read and write
290FBA90000
heap
page read and write
6B30000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
44B87FE000
stack
page read and write
6B30000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
C7C2737000
stack
page read and write
708E000
stack
page read and write
6B50000
trusted library allocation
page read and write
2660000
heap
page read and write
7FFD343C0000
trusted library allocation
page read and write
7FFD3401D000
trusted library allocation
page execute and read and write
232D76E0000
heap
page read and write
29AA01BE000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
5B232FE000
stack
page read and write
227F6920000
heap
page read and write
2E7B000
heap
page read and write
7FFD34242000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
13A523A4000
heap
page read and write
6B40000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD34014000
trusted library allocation
page read and write
29AA8A40000
heap
page execute and read and write
3128000
heap
page read and write
C7BFE3E000
stack
page read and write
227F6A25000
heap
page read and write
6B40000
trusted library allocation
page read and write
6BD0000
remote allocation
page read and write
6B10000
trusted library allocation
page read and write
227F869B000
heap
page read and write
3391BFE000
stack
page read and write
6ED0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
A2960FD000
stack
page read and write
13A392F0000
trusted library allocation
page read and write
6A63000
trusted library allocation
page read and write
29A90BC5000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
C7C2E29000
stack
page read and write
4267000
trusted library allocation
page execute and read and write
7FFD34003000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
2912F190000
heap
page read and write
679E000
stack
page read and write
227F6960000
heap
page read and write
7FFD33FF0000
trusted library allocation
page read and write
4220000
trusted library allocation
page read and write
7FFD34014000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
29A90357000
trusted library allocation
page read and write
4834000
trusted library allocation
page read and write
1EF2768C000
heap
page read and write
2A1D000
heap
page read and write
C7C043D000
stack
page read and write
6E9C000
trusted library allocation
page read and write
6A5E000
stack
page read and write
7FFD34030000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
1EF27671000
heap
page read and write
2D40000
heap
page read and write
6ED0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
4660000
trusted library allocation
page read and write
29A90275000
trusted library allocation
page read and write
A2959FD000
stack
page read and write
560000
trusted library section
page read and write
32BE000
stack
page read and write
6EE0000
trusted library allocation
page read and write
6D0E000
stack
page read and write
2DFF000
unkown
page read and write
6E90000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
5395000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
7FFD34010000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
7FFD34010000
trusted library allocation
page read and write
7FFD341F5000
trusted library allocation
page read and write
13A393E5000
heap
page read and write
492E000
stack
page read and write
2A07000
heap
page read and write
6EF0000
trusted library allocation
page read and write
7FFD343E0000
trusted library allocation
page read and write
7FFD341D9000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
2CDA035B000
heap
page read and write
1EF26FEB000
heap
page read and write
C6B79FE000
stack
page read and write
A5A6CFD000
stack
page read and write
7FFD34270000
trusted library allocation
page execute and read and write
7FFD34110000
trusted library allocation
page execute and read and write
6ED0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
227F6A2D000
heap
page read and write
44B8BFE000
stack
page read and write
1BC192A1000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
24D0003B000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
5B22EFD000
stack
page read and write
6B10000
trusted library allocation
page read and write
C7C172C000
stack
page read and write
6B30000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD340F6000
trusted library allocation
page execute and read and write
6A0E000
stack
page read and write
6E90000
trusted library allocation
page read and write
2EB0000
heap
page read and write
6E90000
trusted library allocation
page read and write
3350000
heap
page read and write
7FFD34024000
trusted library allocation
page read and write
3265000
heap
page read and write
6B30000
trusted library allocation
page read and write
7FFD34227000
trusted library allocation
page read and write
48C000
heap
page read and write
2A70000
heap
page read and write
6EF0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD34230000
trusted library allocation
page read and write
F4480FE000
stack
page read and write
C7C2D3B000
stack
page read and write
232D78A0000
unkown
page readonly
5B563FE000
stack
page read and write
7FFD341D0000
trusted library allocation
page read and write
7FFD341E0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
C7BF7FE000
stack
page read and write
18F7F93A000
heap
page read and write
6E70000
trusted library allocation
page read and write
7FFD341B0000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
2CDA026C000
unkown
page readonly
227F86A4000
heap
page read and write
FD64DFE000
stack
page read and write
6EB0000
trusted library allocation
page read and write
7FFD34242000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD34014000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD3413B000
trusted library allocation
page execute and read and write
4840000
trusted library allocation
page read and write
FD644F1000
stack
page read and write
6EB0000
trusted library allocation
page read and write
29A907B9000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6AF5000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
29A90391000
trusted library allocation
page read and write
4CE7FFE000
stack
page read and write
6ED0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
4A68000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD341CC000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
29A9027D000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
29AA92C8000
heap
page read and write
7FFD3420E000
trusted library allocation
page read and write
29A90385000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
24D758E0000
heap
page execute and read and write
6AF0000
trusted library allocation
page read and write
18F0003B000
trusted library allocation
page read and write
7FFD341B6000
trusted library allocation
page read and write
44B8DFE000
stack
page read and write
6ED0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
13A39C85000
trusted library allocation
page read and write
29AA9294000
heap
page read and write
6B10000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
28F5000
heap
page read and write
29A907BD000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
29090001000
trusted library allocation
page read and write
29A90802000
trusted library allocation
page read and write
227F85A0000
heap
page read and write
A295BFE000
stack
page read and write
FD64FFD000
stack
page read and write
6670000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7FFD341F0000
trusted library allocation
page read and write
7FFD34240000
trusted library allocation
page read and write
56E1000
trusted library allocation
page read and write
7FFD34020000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
4F8000
heap
page read and write
7FFD341B3000
trusted library allocation
page read and write
5B22FFF000
stack
page read and write
29AA0232000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD341B6000
trusted library allocation
page read and write
352E000
stack
page read and write
6EB0000
trusted library allocation
page read and write
7FFD34410000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
4077000
trusted library allocation
page execute and read and write
7FFD34003000
trusted library allocation
page read and write
7FFD3406C000
trusted library allocation
page execute and read and write
6B40000
trusted library allocation
page read and write
C7C0E3E000
stack
page read and write
6810000
trusted library allocation
page read and write
4030000
heap
page read and write
29AA924A000
heap
page read and write
2CDA04E0000
heap
page read and write
6ED0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
C7C192C000
stack
page read and write
29A903DD000
trusted library allocation
page read and write
1EF27831000
trusted library allocation
page read and write
7FFD341E1000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7FFD341D5000
trusted library allocation
page read and write
29AA8DD3000
heap
page read and write
2CDB9513000
heap
page read and write
67F0000
trusted library allocation
page read and write
F448AFD000
stack
page read and write
6EB0000
trusted library allocation
page read and write
7FFD340BC000
trusted library allocation
page execute and read and write
6B40000
trusted library allocation
page read and write
7EEB8000
trusted library allocation
page execute and read and write
6E90000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD34222000
trusted library allocation
page read and write
29AA8AA5000
heap
page read and write
1EF276D0000
heap
page read and write
290FC0D0000
heap
page read and write
7FFD341E1000
trusted library allocation
page read and write
2CDA033D000
heap
page read and write
570000
heap
page read and write
6B30000
trusted library allocation
page read and write
29A90285000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
29A90A7D000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
7FFD34024000
trusted library allocation
page read and write
2690000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
26CB000
heap
page read and write
6B30000
trusted library allocation
page read and write
4E5000
heap
page read and write
6ED0000
trusted library allocation
page read and write
6870000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
18F7E8D9000
heap
page read and write
6B30000
trusted library allocation
page read and write
232F0858000
heap
page read and write
18F7F060000
heap
page read and write
6EB0000
trusted library allocation
page read and write
6ED1000
trusted library allocation
page read and write
70DC000
heap
page read and write
6E90000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
1EF26F50000
trusted library allocation
page read and write
24D7477C000
heap
page read and write
C6B80FE000
stack
page read and write
29AA8F48000
heap
page read and write
7FFD34208000
trusted library allocation
page read and write
7FFD340AC000
trusted library allocation
page execute and read and write
3650000
heap
page read and write
3280000
heap
page read and write
6E90000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
6BD0000
heap
page read and write
460000
heap
page read and write
6AF0000
trusted library allocation
page read and write
4255000
heap
page read and write
2937000
stack
page read and write
5B230FE000
stack
page read and write
290FC040000
heap
page execute and read and write
232D7786000
heap
page read and write
6EB0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
29AA9150000
unkown
page readonly
2CDA0500000
heap
page read and write
1EF27835000
trusted library allocation
page read and write
18F7EF90000
heap
page execute and read and write
1C145540000
heap
page read and write
390000
heap
page read and write
6B31000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
29A90BEE000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD3402B000
trusted library allocation
page execute and read and write
4ABB000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
4249000
heap
page read and write
7FFD34003000
trusted library allocation
page execute and read and write
4875000
trusted library allocation
page execute and read and write
6ED0000
trusted library allocation
page read and write
C7C1129000
stack
page read and write
6EE0000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
7FFD341CF000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
29AA8E80000
heap
page read and write
6EDE000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
29A8FC10000
heap
page read and write
7FFD3405C000
trusted library allocation
page execute and read and write
29AA9299000
heap
page read and write
6B30000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
2C3E000
stack
page read and write
6AF0000
trusted library allocation
page read and write
4221000
trusted library allocation
page read and write
7FFD340E6000
trusted library allocation
page execute and read and write
13A39B6D000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6D8E000
stack
page read and write
6EF0000
trusted library allocation
page read and write
7FFD34290000
trusted library allocation
page read and write
30FB000
heap
page read and write
1C1455A0000
trusted library allocation
page read and write
29AA8D94000
heap
page read and write
29AA9740000
heap
page read and write
6B10000
trusted library allocation
page read and write
290FCA10000
heap
page read and write
232D7EE0000
heap
page read and write
7FFD341D3000
trusted library allocation
page read and write
7FFD341E4000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD34222000
trusted library allocation
page read and write
261E000
stack
page read and write
7FFD34320000
trusted library allocation
page read and write
26A0000
heap
page read and write
6EB0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
190000
heap
page read and write
29AA8DE2000
heap
page read and write
30FF000
heap
page read and write
6B30000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
4360000
trusted library allocation
page execute and read and write
29A8F93E000
heap
page read and write
6D9E000
stack
page read and write
46D0000
heap
page read and write
6B30000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
C6B82FE000
stack
page read and write
29A90A61000
trusted library allocation
page read and write
C7C143C000
stack
page read and write
6ED0000
trusted library allocation
page read and write
227F6C45000
heap
page read and write
C6B7BFE000
stack
page read and write
7FFD34018000
trusted library allocation
page read and write
7FFD34222000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
2810000
heap
page read and write
6E20000
trusted library allocation
page execute and read and write
4280000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
C7C0A29000
stack
page read and write
6B40000
trusted library allocation
page read and write
7FFD34200000
trusted library allocation
page read and write
1EF26ED0000
heap
page read and write
6B40000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD34227000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
AD54C7E000
stack
page read and write
2BD0000
heap
page read and write
6B30000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
29A9035B000
trusted library allocation
page read and write
7FFD3401D000
trusted library allocation
page execute and read and write
6AF0000
trusted library allocation
page read and write
227F8500000
heap
page execute and read and write
47B4000
trusted library allocation
page read and write
18F0012C000
trusted library allocation
page read and write
7FFD34210000
trusted library allocation
page execute and read and write
6ED0000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
2912F410000
heap
page read and write
6B30000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
24D74E70000
heap
page execute and read and write
6B30000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
C7C263C000
stack
page read and write
232D8041000
trusted library allocation
page read and write
1EF27185000
heap
page read and write
1BC31A60000
heap
page read and write
18F7F9A8000
heap
page read and write
6E70000
trusted library allocation
page read and write
18F7EA75000
heap
page read and write
6AF0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
DB000
stack
page read and write
6B30000
trusted library allocation
page read and write
2DC0000
heap
page read and write
44B8AFE000
stack
page read and write
6B10000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
232D7860000
heap
page execute and read and write
356E000
stack
page read and write
18F7E916000
heap
page read and write
6B50000
trusted library allocation
page read and write
50D000
stack
page read and write
6B30000
trusted library allocation
page read and write
3117000
heap
page read and write
309E000
stack
page read and write
459F000
stack
page read and write
2908012F000
trusted library allocation
page read and write
7FFD341B6000
trusted library allocation
page read and write
227F6DE5000
heap
page read and write
6AF0000
trusted library allocation
page read and write
46B0000
trusted library allocation
page read and write
1BC1895F000
heap
page read and write
7FFD34220000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
7FFD34210000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7F3C0000
trusted library allocation
page execute and read and write
29A9026A000
trusted library allocation
page read and write
2C7E000
stack
page read and write
4CE7CFF000
stack
page read and write
7FFD34420000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
2908012C000
trusted library allocation
page read and write
63CC000
stack
page read and write
29A9031F000
trusted library allocation
page read and write
7FFD33FF8000
trusted library allocation
page read and write
6B34000
trusted library allocation
page read and write
2E03000
heap
page read and write
6B30000
trusted library allocation
page read and write
2BA0000
heap
page read and write
2DCA000
heap
page read and write
29A9034F000
trusted library allocation
page read and write
44A4000
trusted library allocation
page read and write
7FFD341E0000
trusted library allocation
page read and write
18F7E990000
heap
page read and write
4260000
trusted library allocation
page read and write
29AA01D1000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6809000
trusted library allocation
page execute and read and write
13A39B6B000
trusted library allocation
page read and write
407B000
trusted library allocation
page execute and read and write
6EB0000
trusted library allocation
page read and write
7FFD34310000
trusted library allocation
page read and write
410E000
stack
page read and write
6ED0000
trusted library allocation
page read and write
26D8000
heap
page read and write
6E99000
trusted library allocation
page read and write
4DA000
heap
page read and write
29A90389000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD3403D000
trusted library allocation
page execute and read and write
1BC18FD0000
heap
page execute and read and write
29A900E0000
heap
page read and write
6AF0000
trusted library allocation
page read and write
24D74766000
heap
page read and write
7FFD34260000
trusted library allocation
page read and write
7FFD341F5000
trusted library allocation
page read and write
4948000
trusted library allocation
page read and write
7FFD34002000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
44B84FE000
stack
page read and write
24D74EF0000
heap
page read and write
6EB0000
trusted library allocation
page read and write
29AA8A10000
heap
page execute and read and write
744E000
stack
page read and write
68CE000
stack
page read and write
C7C1E2C000
stack
page read and write
7F3D8000
trusted library allocation
page execute and read and write
2CDB93D0000
heap
page execute and read and write
6B10000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
7FFD34023000
trusted library allocation
page read and write
6AFC000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
290FB916000
heap
page read and write
5B22AF0000
stack
page read and write
6B30000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
1BC31AC0000
heap
page read and write
29080143000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
4240000
trusted library allocation
page read and write
7FFD34270000
trusted library allocation
page execute and read and write
7FFD340C6000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
6870000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
24D00143000
trusted library allocation
page read and write
29A90BBB000
trusted library allocation
page read and write
499C000
stack
page read and write
7FFD34240000
trusted library allocation
page execute and read and write
29A90809000
trusted library allocation
page read and write
7FFD34200000
trusted library allocation
page read and write
290FBAB0000
heap
page read and write
29A903D9000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
7FFD34204000
trusted library allocation
page read and write
4CE83FB000
stack
page read and write
13A524B0000
heap
page execute and read and write
7FFD34204000
trusted library allocation
page read and write
C7BFF29000
stack
page read and write
24D74880000
trusted library allocation
page read and write
7FFD34230000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD341B3000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
2CDA0CAD000
trusted library allocation
page read and write
7FFD34034000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6DF0000
heap
page execute and read and write
18F7E918000
heap
page read and write
FD649FE000
stack
page read and write
24D746E0000
heap
page read and write
4844000
trusted library allocation
page read and write
290FB8D1000
heap
page read and write
6B10000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
29A90A67000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
1BC188F0000
heap
page read and write
C6B7FFE000
stack
page read and write
6EB0000
trusted library allocation
page read and write
2F20000
heap
page read and write
6E90000
trusted library allocation
page read and write
227F85B0000
heap
page read and write
2997000
heap
page read and write
29A90BE3000
trusted library allocation
page read and write
2CDA0660000
trusted library allocation
page read and write
C6B7DFF000
stack
page read and write
13A52354000
heap
page read and write
24D75720000
heap
page read and write
7FFD341E4000
trusted library allocation
page read and write
2A9D000
stack
page read and write
640E000
stack
page read and write
29A907C1000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
30FC000
heap
page read and write
6AF0000
trusted library allocation
page read and write
13A392D0000
trusted library allocation
page read and write
2CDA0CAB000
trusted library allocation
page read and write
7FFD341CA000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
C7BFDE9000
stack
page read and write
6EB0000
trusted library allocation
page read and write
7FFD3404D000
trusted library allocation
page execute and read and write
6AF0000
trusted library allocation
page read and write
7FFD341F0000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
A5A7473000
stack
page read and write
7FFD34260000
trusted library allocation
page execute and read and write
232D7900000
heap
page read and write
6B10000
trusted library allocation
page read and write
29A9032B000
trusted library allocation
page read and write
C7C2329000
stack
page read and write
227F869F000
heap
page read and write
7FFD341CD000
trusted library allocation
page read and write
4CE85FC000
stack
page read and write
7FFD3420B000
trusted library allocation
page read and write
29A5000
heap
page read and write
2CDA0DC1000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
4A71000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
47C2000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
7FFD34250000
trusted library allocation
page read and write
1EF275D0000
heap
page read and write
6AF5000
trusted library allocation
page read and write
47C6000
trusted library allocation
page read and write
2278017A000
trusted library allocation
page read and write
32B0000
heap
page read and write
6EF0000
trusted library allocation
page read and write
1EF27013000
heap
page read and write
7FFD34206000
trusted library allocation
page read and write
7FFD341E0000
trusted library allocation
page execute and read and write
7FFD341F7000
trusted library allocation
page read and write
1C145570000
heap
page read and write
6B10000
trusted library allocation
page read and write
44CB000
trusted library allocation
page execute and read and write
7FFD341B0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7FFD341F9000
trusted library allocation
page read and write
7FFD341EB000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
7FFD34130000
trusted library allocation
page execute and read and write
7FFD34240000
trusted library allocation
page execute and read and write
FD650FE000
stack
page read and write
6EB0000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
29A90436000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
29A90BC1000
trusted library allocation
page read and write
29AA8E2C000
heap
page read and write
6B40000
trusted library allocation
page read and write
7FFD340A6000
trusted library allocation
page read and write
487B000
trusted library allocation
page execute and read and write
7FFD3404C000
trusted library allocation
page execute and read and write
710E000
stack
page read and write
6E90000
trusted library allocation
page read and write
6E94000
trusted library allocation
page read and write
13A39C5F000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6BD0000
remote allocation
page read and write
6EB0000
trusted library allocation
page read and write
2CDA0CAF000
trusted library allocation
page read and write
1EF27823000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
2CDA0520000
heap
page read and write
6E90000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
7FFD3403B000
trusted library allocation
page execute and read and write
290FBC55000
heap
page read and write
5B55FFE000
stack
page read and write
29AA8DBA000
heap
page read and write
13A39160000
heap
page read and write
2CDC000
stack
page read and write
4040000
trusted library allocation
page read and write
C7C292C000
stack
page read and write
6870000
trusted library allocation
page read and write
2997000
heap
page read and write
C7C132B000
stack
page read and write
2F28000
heap
page read and write
6AF0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
29AA8BFE000
unkown
page readonly
6ED0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
29A90327000
trusted library allocation
page read and write
FD648FD000
stack
page read and write
7FFD341E8000
trusted library allocation
page read and write
25DD000
stack
page read and write
6ED0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD340A6000
trusted library allocation
page read and write
33917FE000
stack
page read and write
6B40000
trusted library allocation
page read and write
A2956FE000
stack
page read and write
327D000
stack
page read and write
6B40000
trusted library allocation
page read and write
C7C0C28000
stack
page read and write
6B30000
trusted library allocation
page read and write
4CE79FE000
stack
page read and write
7FFD341C0000
trusted library allocation
page read and write
FD647FE000
stack
page read and write
6ED0000
trusted library allocation
page read and write
30E0000
heap
page read and write
4B06000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD34130000
trusted library allocation
page execute and read and write
7FFD341F0000
trusted library allocation
page read and write
1BC29151000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD341F7000
trusted library allocation
page read and write
7FFD33FFD000
trusted library allocation
page execute and read and write
29A90289000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD34239000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
2CDB0C7D000
trusted library allocation
page read and write
227F84A0000
heap
page read and write
7FFD343F0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
232D7905000
heap
page read and write
290FCABE000
heap
page read and write
18F0003F000
trusted library allocation
page read and write
6630000
trusted library allocation
page read and write
4A03000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
1BC31A58000
heap
page read and write
6ED0000
trusted library allocation
page read and write
29A90281000
trusted library allocation
page read and write
7FFD34200000
trusted library allocation
page read and write
7FFD34004000
trusted library allocation
page read and write
29A8F880000
heap
page read and write
6AF0000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
13A49B41000
trusted library allocation
page read and write
6AF5000
trusted library allocation
page read and write
290FB990000
heap
page read and write
29AA01B1000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
4CE75D4000
stack
page read and write
29AA8B11000
heap
page read and write
6AF0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
5B234FE000
stack
page read and write
7FFD341B2000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
4391000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
7FFD341F0000
trusted library allocation
page read and write
24D74600000
heap
page read and write
7FFD34033000
trusted library allocation
page read and write
2E10000
heap
page read and write
1EF275C0000
heap
page execute and read and write
6EB0000
trusted library allocation
page read and write
C7C1529000
stack
page read and write
1EF26F20000
heap
page read and write
6EE0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
2912F270000
heap
page read and write
6EF0000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD341D9000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
227F69B0000
trusted library allocation
page read and write
2A1B000
heap
page read and write
2CB0000
heap
page read and write
7FFD3402D000
trusted library allocation
page execute and read and write
7FFD342C0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
2980000
heap
page read and write
3050000
heap
page read and write
2DED000
heap
page read and write
6AF0000
trusted library allocation
page read and write
7EEA0000
trusted library allocation
page execute and read and write
6B30000
trusted library allocation
page read and write
4210000
heap
page read and write
6AF0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7FFD34209000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
1C14562B000
heap
page read and write
C7BF53F000
stack
page read and write
4510000
heap
page execute and read and write
6EE0000
trusted library allocation
page read and write
24D757A5000
heap
page read and write
C6B83FE000
stack
page read and write
6B50000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
7FFD341D2000
trusted library allocation
page read and write
7FFD342F0000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
232F0800000
heap
page execute and read and write
4A00000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
7FFD340D6000
trusted library allocation
page execute and read and write
317000
stack
page read and write
54B000
stack
page read and write
2A22000
heap
page read and write
7FFD34340000
trusted library allocation
page execute and read and write
24D0003D000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
461C000
stack
page read and write
4890000
trusted library allocation
page read and write
1EF2768E000
heap
page read and write
5B562FE000
stack
page read and write
6B31000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
290FB914000
heap
page read and write
290FCAA8000
heap
page read and write
7FFD34220000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
2DF8000
heap
page read and write
A2958FF000
stack
page read and write
7FFD34220000
trusted library allocation
page read and write
2DBE000
stack
page read and write
5B55EFE000
stack
page read and write
708E000
stack
page read and write
6B30000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
C7BFBE9000
stack
page read and write
6E90000
trusted library allocation
page read and write
7FFD341B5000
trusted library allocation
page read and write
7FFD33FF5000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6B00000
trusted library allocation
page read and write
6A70000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
41E0000
trusted library allocation
page execute and read and write
4044000
trusted library allocation
page read and write
4290000
heap
page readonly
6EB0000
trusted library allocation
page read and write
13A39260000
heap
page read and write
6B40000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
7FFD34003000
trusted library allocation
page read and write
7FFD34230000
trusted library allocation
page execute and read and write
426B000
trusted library allocation
page execute and read and write
6B30000
trusted library allocation
page read and write
32FF000
stack
page read and write
6EF0000
trusted library allocation
page read and write
1EF376E1000
trusted library allocation
page read and write
1BC18BB0000
heap
page read and write
6ED0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6A80000
trusted library allocation
page execute and read and write
7FFD341DE000
trusted library allocation
page read and write
5221000
trusted library allocation
page read and write
6A90000
trusted library allocation
page read and write
7FFD342B0000
trusted library allocation
page execute and read and write
6B30000
trusted library allocation
page read and write
7FFD34254000
trusted library allocation
page read and write
455E000
stack
page read and write
7FFD340A6000
trusted library allocation
page read and write
A295301000
stack
page read and write
7FFD34003000
trusted library allocation
page read and write
29AA8F45000
heap
page read and write
6B50000
trusted library allocation
page read and write
2A09000
heap
page read and write
7FFD34195000
trusted library allocation
page read and write
232F0894000
heap
page read and write
6E90000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
C7C1629000
stack
page read and write
6C00000
heap
page execute and read and write
7FFD34300000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
227F8FF4000
heap
page read and write
6EB0000
trusted library allocation
page read and write
29A9084D000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
29AA8FA0000
heap
page read and write
6B30000
trusted library allocation
page read and write
2E82000
heap
page read and write
7FFD34040000
trusted library allocation
page read and write
C7BF8FD000
stack
page read and write
7FFD34280000
trusted library allocation
page execute and read and write
7FFD341C6000
trusted library allocation
page read and write
3391EFF000
stack
page read and write
18F10011000
trusted library allocation
page read and write
1EF2780C000
trusted library allocation
page read and write
29A9080B000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
2CDA0D9F000
trusted library allocation
page read and write
659E000
stack
page read and write
6B30000
trusted library allocation
page read and write
30E8000
heap
page read and write
5B231FE000
stack
page read and write
5B22DFE000
stack
page read and write
2DB000
stack
page read and write
7FFD341C6000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
7FFD342A0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
311A000
heap
page read and write
7FFD341D2000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
C7C2A2C000
stack
page read and write
29A90A6B000
trusted library allocation
page read and write
232D75A0000
heap
page read and write
7FFD340E0000
trusted library allocation
page execute and read and write
29B0000
heap
page read and write
2CDA0D9C000
trusted library allocation
page read and write
18F7F992000
heap
page read and write
4ABE000
trusted library allocation
page read and write
4DC000
heap
page read and write
6EE0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6F30000
heap
page read and write
1BC1927C000
trusted library allocation
page read and write
2912F415000
heap
page read and write
477B000
trusted library allocation
page read and write
18F00151000
trusted library allocation
page read and write
2F4D000
stack
page read and write
290FBB20000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
1BC188D0000
heap
page read and write
24D75758000
heap
page read and write
380000
heap
page read and write
6B30000
trusted library allocation
page read and write
13A39374000
heap
page read and write
6B10000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD33FF5000
trusted library allocation
page read and write
42E000
stack
page read and write
7FFD34229000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
7FFD34018000
trusted library allocation
page read and write
A295EFE000
stack
page read and write
4A6F000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
29CD000
stack
page read and write
7FFD341F0000
trusted library allocation
page read and write
18F7E9B0000
heap
page read and write
2CDA06D5000
heap
page read and write
4043000
trusted library allocation
page execute and read and write
6ED0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
29A90BBD000
trusted library allocation
page read and write
7FFD34250000
trusted library allocation
page execute and read and write
7FFD34219000
trusted library allocation
page read and write
29AA8B50000
unkown
page readonly
7FFD34227000
trusted library allocation
page read and write
325F000
stack
page read and write
1C14566E000
heap
page read and write
232F0660000
unkown
page readonly
6800000
trusted library allocation
page read and write
29AA925C000
heap
page read and write
18F7E9E5000
heap
page read and write
6ED0000
trusted library allocation
page read and write
227F8420000
heap
page read and write
29A8F91C000
heap
page read and write
6AF0000
trusted library allocation
page read and write
4210000
heap
page execute and read and write
7FFD34220000
trusted library allocation
page read and write
7FFD34230000
trusted library allocation
page read and write
1BC18BB5000
heap
page read and write
6B30000
trusted library allocation
page read and write
C7C1029000
stack
page read and write
6AF0000
trusted library allocation
page read and write
29A90A81000
trusted library allocation
page read and write
C7C2F29000
stack
page read and write
4050000
trusted library allocation
page read and write
29A9080D000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
47A5000
trusted library allocation
page read and write
13A49B3D000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
227F6940000
heap
page read and write
6EA0000
trusted library allocation
page read and write
1BC29161000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
29AA8DB0000
heap
page read and write
29A8FBB0000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
7FFD34010000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
2ADF000
stack
page read and write
2908003B000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD341D5000
trusted library allocation
page read and write
24D7475A000
heap
page read and write
6B30000
trusted library allocation
page read and write
7FFD341D0000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
4CE80FE000
stack
page read and write
6B30000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
5A21000
trusted library allocation
page read and write
C6B7AFE000
stack
page read and write
29A90279000
trusted library allocation
page read and write
33918FE000
stack
page read and write
6B30000
trusted library allocation
page read and write
7FFD340DC000
trusted library allocation
page execute and read and write
6EE0000
trusted library allocation
page read and write
4CE87FA000
stack
page read and write
6E06000
trusted library allocation
page execute and read and write
4FFE000
stack
page read and write
6AF0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7FFD34220000
trusted library allocation
page execute and read and write
6ED0000
trusted library allocation
page read and write
232D778A000
heap
page read and write
25E0000
heap
page read and write
7FFD341C7000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
C7C252C000
stack
page read and write
26FA000
heap
page read and write
1EF27048000
heap
page read and write
7FFD3400D000
trusted library allocation
page execute and read and write
6B30000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
227F67B4000
unkown
page readonly
6AF0000
trusted library allocation
page read and write
7FFD34190000
trusted library allocation
page read and write
6BD0000
remote allocation
page read and write
C6B78F1000
stack
page read and write
C7C1B29000
stack
page read and write
7FFD34010000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
1BC1918F000
trusted library allocation
page read and write
25DE000
stack
page read and write
2984000
heap
page read and write
2CDA0DB3000
trusted library allocation
page read and write
7FFD341C0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD3411B000
trusted library allocation
page execute and read and write
24D74762000
heap
page read and write
7FFD343D0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
A5A757E000
unkown
page readonly
6EB0000
trusted library allocation
page read and write
29A90A7F000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
1BC19140000
heap
page read and write
404D000
trusted library allocation
page execute and read and write
29A90367000
trusted library allocation
page read and write
7FFD33FFD000
trusted library allocation
page execute and read and write
6DCD000
stack
page read and write
6ED0000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
3391DFD000
stack
page read and write
A5A7DFE000
stack
page read and write
6F00000
trusted library allocation
page execute and read and write
7105000
heap
page read and write
740E000
stack
page read and write
A2961FE000
stack
page read and write
6AF0000
trusted library allocation
page read and write
7FFD341F2000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
33D0000
heap
page read and write
6B30000
trusted library allocation
page read and write
7FFD34193000
trusted library allocation
page read and write
49DE000
stack
page read and write
24D10001000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
29A9037D000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD34220000
trusted library allocation
page read and write
7FFD33FF3000
trusted library allocation
page execute and read and write
6B30000
trusted library allocation
page read and write
2908003D000
trusted library allocation
page read and write
18F7F98E000
heap
page read and write
6ED0000
trusted library allocation
page read and write
44B7FE1000
stack
page read and write
6B30000
trusted library allocation
page read and write
7FFD34217000
trusted library allocation
page read and write
6FCE000
stack
page read and write
6ED0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
30FB000
heap
page read and write
6EB0000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
13A3937A000
heap
page read and write
2B5D000
stack
page read and write
6EE0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
29A90257000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD34219000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
29A907B7000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
227F8490000
heap
page execute and read and write
419E000
stack
page read and write
7FFD341D9000
trusted library allocation
page read and write
1EF26FD8000
heap
page read and write
7FFD340F6000
trusted library allocation
page execute and read and write
2A08000
heap
page read and write
6ED0000
trusted library allocation
page read and write
6B33000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
7FFD34250000
trusted library allocation
page execute and read and write
5B569FE000
stack
page read and write
6AF0000
trusted library allocation
page read and write
18F7EA40000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
1EF2771F000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD34200000
trusted library allocation
page read and write
232D8033000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
29A90BC3000
trusted library allocation
page read and write
29A9030F000
trusted library allocation
page read and write
29A90A85000
trusted library allocation
page read and write
28FB000
stack
page read and write
6EB0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
29AA8DCA000
heap
page read and write
29AA8E91000
heap
page read and write
6ED0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD341C0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
40E0000
heap
page readonly
7FFD34193000
trusted library allocation
page read and write
6A69000
trusted library allocation
page execute and read and write
7FFD34270000
trusted library allocation
page execute and read and write
7FFD341E0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD34229000
trusted library allocation
page read and write
29A9029A000
trusted library allocation
page read and write
4200000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
1BC1918D000
trusted library allocation
page read and write
C7C2C2C000
stack
page read and write
312B000
heap
page read and write
7FFD341C0000
trusted library allocation
page read and write
4494000
trusted library allocation
page read and write
2CDA06B2000
unkown
page readonly
6B10000
trusted library allocation
page read and write
29AA8E3A000
heap
page read and write
6B30000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD340A0000
trusted library allocation
page read and write
4493000
trusted library allocation
page execute and read and write
6EB0000
trusted library allocation
page read and write
7FFD341D5000
trusted library allocation
page read and write
1BC1918B000
trusted library allocation
page read and write
2DCE000
stack
page read and write
7FFD34034000
trusted library allocation
page read and write
180000
heap
page read and write
29AA8F4D000
heap
page read and write
18F7E8ED000
heap
page read and write
7FFD341B2000
trusted library allocation
page read and write
24D74760000
heap
page read and write
7FFD3400D000
trusted library allocation
page execute and read and write
6B30000
trusted library allocation
page read and write
7456000
heap
page read and write
7FFD340C0000
trusted library allocation
page execute and read and write
7FFD340D6000
trusted library allocation
page execute and read and write
6B10000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
29080151000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
24D74700000
heap
page read and write
6B3E000
trusted library allocation
page read and write
7FFD341E8000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
44B85FD000
stack
page read and write
232D7720000
trusted library allocation
page read and write
7FFD34022000
trusted library allocation
page read and write
44B89FE000
stack
page read and write
1BC31AD2000
heap
page read and write
7FFD341CA000
trusted library allocation
page read and write
29A9038D000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
A295CFE000
stack
page read and write
1EF376ED000
trusted library allocation
page read and write
24D1000D000
trusted library allocation
page read and write
13A39550000
heap
page read and write
6EE0000
trusted library allocation
page read and write
290FBA70000
heap
page read and write
6B30000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
232F0810000
heap
page read and write
6ED0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
2CDA0357000
heap
page read and write
C7BF63E000
stack
page read and write
45A8000
trusted library allocation
page read and write
24D0012C000
trusted library allocation
page read and write
7FFD34247000
trusted library allocation
page read and write
FD64EFE000
stack
page read and write
4B02000
trusted library allocation
page read and write
232D77C3000
heap
page read and write
C6B81FE000
stack
page read and write
18F7E8D5000
heap
page read and write
F447D91000
stack
page read and write
6EB0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
7FFD34250000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
7FFD34210000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
2E30000
heap
page read and write
6E90000
trusted library allocation
page read and write
7FFD34140000
trusted library allocation
page execute and read and write
6B50000
trusted library allocation
page read and write
290FBB45000
heap
page read and write
6EE0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
13A39280000
heap
page read and write
18F7F9AA000
heap
page read and write
6E90000
trusted library allocation
page read and write
1BC188C5000
heap
page read and write
6ED0000
trusted library allocation
page read and write
1EF26F25000
heap
page read and write
6B50000
trusted library allocation
page read and write
29A9034B000
trusted library allocation
page read and write
6E00000
trusted library allocation
page read and write
290FCC00000
heap
page execute and read and write
6B30000
trusted library allocation
page read and write
7FFD340D0000
trusted library allocation
page execute and read and write
C6B84FE000
stack
page read and write
FD64BFE000
stack
page read and write
46AE000
stack
page read and write
33912F1000
stack
page read and write
29A9035F000
trusted library allocation
page read and write
7FFD341F2000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
A295DFF000
stack
page read and write
227F87A0000
heap
page execute and read and write
6E90000
trusted library allocation
page read and write
7FFD3420E000
trusted library allocation
page read and write
333E000
stack
page read and write
46FD000
heap
page read and write
C6B7EFF000
stack
page read and write
6B40000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
24D74820000
heap
page read and write
4424000
heap
page read and write
13A523CC000
heap
page read and write
6B30000
trusted library allocation
page read and write
29A8F8A0000
heap
page read and write
6EB0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
70F2000
heap
page read and write
1BC1896B000
heap
page read and write
7FFD34012000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
13A39C81000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
29AA8D50000
heap
page read and write
6ED0000
trusted library allocation
page read and write
7FFD34110000
trusted library allocation
page execute and read and write
6E90000
trusted library allocation
page read and write
29A8F907000
heap
page read and write
44B86FE000
stack
page read and write
67DE000
stack
page read and write
6B10000
trusted library allocation
page read and write
7FFD341BD000
trusted library allocation
page read and write
2CDA0C60000
heap
page execute and read and write
7FFD340C6000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
45D0000
heap
page read and write
2CDA0398000
heap
page read and write
6B40000
trusted library allocation
page read and write
7FFD34210000
trusted library allocation
page execute and read and write
7FFD33FF3000
trusted library allocation
page execute and read and write
7FFD3402D000
trusted library allocation
page execute and read and write
6ED0000
trusted library allocation
page read and write
F4483FD000
stack
page read and write
6ED0000
trusted library allocation
page read and write
29A9029E000
trusted library allocation
page read and write
7FFD341B0000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
1C145628000
heap
page read and write
6E90000
trusted library allocation
page read and write
734E000
stack
page read and write
7FFD3401D000
trusted library allocation
page execute and read and write
6ED0000
trusted library allocation
page read and write
F4485FE000
stack
page read and write
5391000
trusted library allocation
page read and write
7FFD34260000
trusted library allocation
page execute and read and write
6B30000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
7FFD341E0000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
435F000
stack
page read and write
7FFD34210000
trusted library allocation
page execute and read and write
70D0000
heap
page read and write
29AA8A50000
heap
page read and write
6EE0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
33914FE000
stack
page read and write
6B40000
trusted library allocation
page read and write
45C0000
trusted library allocation
page execute and read and write
503F000
stack
page read and write
6B40000
trusted library allocation
page read and write
44B8CFD000
stack
page read and write
6EF0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD34217000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
13A523B4000
heap
page read and write
67E3000
trusted library allocation
page read and write
7FFD340D0000
trusted library allocation
page read and write
1C145622000
heap
page read and write
18F7E9F0000
heap
page read and write
1BC18967000
heap
page read and write
6AF0000
trusted library allocation
page read and write
7FFD340D0000
trusted library allocation
page execute and read and write
13A39B6F000
trusted library allocation
page read and write
1EF27045000
heap
page read and write
6B30000
trusted library allocation
page read and write
232F070C000
unkown
page readonly
6E90000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
1EF26F70000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
40F0000
heap
page read and write
6AF0000
trusted library allocation
page read and write
1EF26EF0000
heap
page read and write
227F868C000
heap
page read and write
6ED0000
trusted library allocation
page read and write
5A25000
trusted library allocation
page read and write
4CE82FC000
stack
page read and write
6B30000
trusted library allocation
page read and write
1BC18A20000
heap
page read and write
6B10000
trusted library allocation
page read and write
7470000
heap
page read and write
7FFD340D6000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
7FFD34400000
trusted library allocation
page read and write
7FFD340B6000
trusted library allocation
page read and write
2CDB0C71000
trusted library allocation
page read and write
6A60000
trusted library allocation
page read and write
7FFD34013000
trusted library allocation
page execute and read and write
6ED0000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
44E0000
heap
page read and write
2CDA02F0000
heap
page read and write
7FFD34209000
trusted library allocation
page read and write
7100000
heap
page read and write
6ED0000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
13A39B20000
heap
page read and write
48AA000
heap
page read and write
13A39C5C000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD3402D000
trusted library allocation
page execute and read and write
29AA8B52000
unkown
page readonly
7FFD341B2000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
69CE000
stack
page read and write
6ED0000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
24D74747000
heap
page read and write
67E0000
trusted library allocation
page read and write
7FFD340F6000
trusted library allocation
page execute and read and write
290FB8D5000
heap
page read and write
6B10000
trusted library allocation
page read and write
483D000
trusted library allocation
page execute and read and write
29A0000
heap
page read and write
29A903EE000
trusted library allocation
page read and write
4CE81FB000
stack
page read and write
6D4E000
stack
page read and write
4204000
trusted library allocation
page read and write
7FFD3422E000
trusted library allocation
page read and write
5B236FE000
stack
page read and write
227F8744000
unkown
page readonly
7FFD341D6000
trusted library allocation
page read and write
7FFD34013000
trusted library allocation
page execute and read and write
4CE88FE000
stack
page read and write
C7C2229000
stack
page read and write
6EE0000
trusted library allocation
page read and write
1C145600000
heap
page read and write
6EE0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
232D779C000
heap
page read and write
24D748A5000
heap
page read and write
6B10000
trusted library allocation
page read and write
C7C2B29000
stack
page read and write
6B20000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
7FFD340F6000
trusted library allocation
page execute and read and write
6B10000
trusted library allocation
page read and write
2CDA0355000
heap
page read and write
29A8F8C0000
heap
page read and write
7FFD34230000
trusted library allocation
page read and write
6EDC000
trusted library allocation
page read and write
232E7EF1000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
24D757C6000
heap
page read and write
6B10000
trusted library allocation
page read and write
24D74768000
heap
page read and write
7FFD341F5000
trusted library allocation
page read and write
2CDB94E4000
heap
page read and write
C7C1F29000
stack
page read and write
6AF0000
trusted library allocation
page read and write
6ED1000
trusted library allocation
page read and write
46BD000
trusted library allocation
page execute and read and write
7FFD3403B000
trusted library allocation
page execute and read and write
6AF0000
trusted library allocation
page read and write
C7C2438000
stack
page read and write
2CDB0C81000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7FFD34020000
trusted library allocation
page read and write
4370000
heap
page execute and read and write
7FFD33FF5000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
29AA9240000
heap
page read and write
7FFD341A0000
trusted library allocation
page read and write
2CA5000
heap
page read and write
1C14564B000
heap
page read and write
4CE84FE000
stack
page read and write
29A90333000
trusted library allocation
page read and write
5B561FD000
stack
page read and write
6E90000
trusted library allocation
page read and write
1BC19293000
trusted library allocation
page read and write
227F86B2000
unkown
page readonly
6B30000
trusted library allocation
page read and write
1EF2771D000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
2D8E000
unkown
page read and write
29A90A7B000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD341A0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
7FFD34200000
trusted library allocation
page read and write
29A90451000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD340B0000
trusted library allocation
page read and write
4A81000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
A295FFE000
stack
page read and write
6EB0000
trusted library allocation
page read and write
2C7D000
stack
page read and write
7FFD341D0000
trusted library allocation
page read and write
6ED4000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD34200000
trusted library allocation
page read and write
4310000
heap
page execute and read and write
7FFD34240000
trusted library allocation
page execute and read and write
29A8F92E000
heap
page read and write
290FBC50000
heap
page read and write
6E90000
trusted library allocation
page read and write
227F86A6000
heap
page read and write
6ED0000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
29A9044D000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
5B55BD1000
stack
page read and write
290FCA27000
heap
page read and write
6B30000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
5B566FE000
stack
page read and write
47D2000
trusted library allocation
page read and write
29A8F8FC000
heap
page read and write
6B10000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
C7C0129000
stack
page read and write
F448BFE000
stack
page read and write
6AF0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
1EF27590000
heap
page execute and read and write
6EB0000
trusted library allocation
page read and write
540000
heap
page read and write
2E05000
heap
page read and write
6ED0000
trusted library allocation
page read and write
C7C053C000
stack
page read and write
2A07000
heap
page read and write
6EF0000
trusted library allocation
page read and write
4A0D000
trusted library allocation
page execute and read and write
24D74840000
heap
page read and write
6B10000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
2CDB9526000
heap
page read and write
26CC000
heap
page read and write
1B0000
heap
page read and write
7FFD34280000
trusted library allocation
page read and write
C7C0628000
stack
page read and write
321E000
stack
page read and write
6ED4000
trusted library allocation
page read and write
2E67000
heap
page read and write
C7C1C2C000
stack
page read and write
18F10001000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
29A9044A000
trusted library allocation
page read and write
A5A68AB000
stack
page read and write
290FB976000
heap
page read and write
2DB0000
heap
page read and write
6B30000
trusted library allocation
page read and write
29A90343000
trusted library allocation
page read and write
498000
heap
page read and write
1BC31AEC000
heap
page read and write
1B5000
heap
page read and write
26D1000
heap
page read and write
4230000
trusted library allocation
page read and write
7FFD34195000
trusted library allocation
page read and write
227F86B0000
unkown
page readonly
297F000
heap
page read and write
6E90000
trusted library allocation
page read and write
44A0000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
7FFD34023000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
33913FE000
stack
page read and write
6750000
trusted library allocation
page read and write
6EE1000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
2CDA0560000
trusted library allocation
page read and write
4AC4000
trusted library allocation
page read and write
6B3C000
trusted library allocation
page read and write
70FA000
heap
page read and write
6E90000
trusted library allocation
page read and write
6E0E000
stack
page read and write
29A90379000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
232D7840000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD3406C000
trusted library allocation
page execute and read and write
7FFD34193000
trusted library allocation
page read and write
227F862D000
heap
page read and write
29A9028D000
trusted library allocation
page read and write
6AF4000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
29A90353000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
29A8F920000
heap
page read and write
4FBF000
stack
page read and write
1BC31AD4000
heap
page read and write
6E90000
trusted library allocation
page read and write
6A6C000
trusted library allocation
page execute and read and write
7FFD34023000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
4380000
heap
page read and write
6AF9000
trusted library allocation
page read and write
3E0000
heap
page read and write
7FFD341B6000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD340D6000
trusted library allocation
page execute and read and write
227F9017000
heap
page read and write
6AF0000
trusted library allocation
page read and write
493000
heap
page read and write
5B564FE000
stack
page read and write
6ED0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
227F868E000
heap
page read and write
2960000
heap
page read and write
2CDB9490000
heap
page read and write
6E90000
trusted library allocation
page read and write
7FFD34014000
trusted library allocation
page read and write
3126000
heap
page read and write
6B10000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
7FFD341B3000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
24D10011000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
24D757C4000
heap
page read and write
29AA8D76000
heap
page read and write
1BC31AEE000
heap
page read and write
6B20000
trusted library allocation
page read and write
18F7EFD0000
heap
page execute and read and write
49E0000
trusted library allocation
page execute and read and write
C7C003E000
stack
page read and write
41F0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7FFD3404C000
trusted library allocation
page execute and read and write
29A900EA000
heap
page read and write
6AF0000
trusted library allocation
page read and write
232D782B000
heap
page read and write
7FFD340C6000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
29A8FBE0000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD341C0000
trusted library allocation
page read and write
2912F370000
heap
page read and write
407A000
heap
page read and write
2CDA0AE0000
heap
page read and write
730E000
stack
page read and write
6B30000
trusted library allocation
page read and write
24D00155000
trusted library allocation
page read and write
7FFD34201000
trusted library allocation
page read and write
227F866C000
heap
page read and write
7FFD341AE000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
18F00155000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
33919FE000
stack
page read and write
6ED0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7FFD34023000
trusted library allocation
page execute and read and write
F4489FE000
stack
page read and write
6B20000
trusted library allocation
page read and write
13A395F5000
heap
page read and write
265E000
stack
page read and write
3260000
heap
page read and write
29A90216000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
2912F278000
heap
page read and write
7FFD3404C000
trusted library allocation
page execute and read and write
3391AFE000
stack
page read and write
29A90BBF000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
29AA8D6D000
heap
page read and write
6EB0000
trusted library allocation
page read and write
29A90805000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
290FB8ED000
heap
page read and write
6870000
trusted library allocation
page read and write
5B22CFE000
stack
page read and write
5B560FE000
stack
page read and write
6AD0000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
698E000
stack
page read and write
6ED0000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6BCE000
stack
page read and write
7F250000
trusted library allocation
page execute and read and write
46A000
heap
page read and write
24D0012F000
trusted library allocation
page read and write
FD646FF000
stack
page read and write
29AA81E0000
trusted library allocation
page read and write
F4482FF000
stack
page read and write
13A49B31000
trusted library allocation
page read and write
7FFD341C0000
trusted library allocation
page read and write
28F0000
heap
page read and write
6EB0000
trusted library allocation
page read and write
1EF27015000
heap
page read and write
13A5234A000
heap
page read and write
6AF0000
trusted library allocation
page read and write
1BC1897D000
heap
page read and write
290FBB00000
trusted library allocation
page read and write
298D000
heap
page read and write
6E90000
trusted library allocation
page read and write
7FFD341B0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
A5A727E000
stack
page readonly
6B50000
trusted library allocation
page read and write
7FFD3404B000
trusted library allocation
page execute and read and write
6E90000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD34234000
trusted library allocation
page read and write
7FFD34015000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD342D0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
29A2000
heap
page read and write
6ED0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD34110000
trusted library allocation
page execute and read and write
6EB0000
trusted library allocation
page read and write
7FFD341CA000
trusted library allocation
page read and write
29A901A0000
heap
page execute and read and write
6B30000
trusted library allocation
page read and write
4AF4000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD341F9000
trusted library allocation
page read and write
26AA000
heap
page read and write
29AA8E62000
heap
page read and write
C7C2029000
stack
page read and write
6ED0000
trusted library allocation
page read and write
4776000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
29A90807000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
7FFD3404C000
trusted library allocation
page execute and read and write
232E7F01000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD341D9000
trusted library allocation
page read and write
13A39555000
heap
page read and write
3109000
heap
page read and write
290FCA95000
heap
page read and write
6EB0000
trusted library allocation
page read and write
7FFD341C3000
trusted library allocation
page read and write
C7C212C000
stack
page read and write
6AF0000
trusted library allocation
page read and write
7FFD3401B000
trusted library allocation
page execute and read and write
4877000
trusted library allocation
page execute and read and write
6B30000
trusted library allocation
page execute and read and write
690E000
stack
page read and write
4A79000
heap
page read and write
2E20000
heap
page read and write
13A39C73000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD34034000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
18F7F942000
heap
page read and write
6ED0000
trusted library allocation
page read and write
7FFD34234000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page execute and read and write
7FFD341D2000
trusted library allocation
page read and write
2CDB9529000
heap
page read and write
6B70000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
29AA9268000
heap
page read and write
18F7E7A0000
heap
page read and write
6B30000
trusted library allocation
page read and write
6E0C000
trusted library allocation
page execute and read and write
7FFD34130000
trusted library allocation
page execute and read and write
7FFD341F9000
trusted library allocation
page read and write
29AA8D82000
heap
page read and write
7FFD33FF8000
trusted library allocation
page read and write
4A5000
heap
page read and write
6E90000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
7FFD341EA000
trusted library allocation
page read and write
29A90363000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
13A52300000
heap
page read and write
3117000
heap
page read and write
6B40000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
4CE7AFE000
stack
page read and write
C7BF9FE000
stack
page read and write
70CE000
stack
page read and write
3108000
heap
page read and write
6B10000
trusted library allocation
page read and write
29A90208000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6F20000
trusted library allocation
page read and write
56E5000
trusted library allocation
page read and write
714E000
stack
page read and write
29A90A65000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
4833000
trusted library allocation
page execute and read and write
2909000D000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
452E000
heap
page read and write
3391CFE000
stack
page read and write
232D8045000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
4CE7DFE000
stack
page read and write
6EF0000
trusted library allocation
page read and write
46AE000
stack
page read and write
C7BFCFE000
stack
page read and write
7FFD3420E000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
4741000
trusted library allocation
page read and write
FD645FF000
stack
page read and write
6B40000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD3403D000
trusted library allocation
page execute and read and write
7FFD341D2000
trusted library allocation
page read and write
7FFD341AE000
trusted library allocation
page read and write
7FFD34013000
trusted library allocation
page execute and read and write
6B30000
trusted library allocation
page read and write
4820000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
22790001000
trusted library allocation
page read and write
6610000
trusted library allocation
page read and write
2E0E000
stack
page read and write
6ED0000
trusted library allocation
page read and write
4773000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
29AA8B20000
heap
page read and write
232D7766000
heap
page read and write
1EF376F1000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
7FFD34193000
trusted library allocation
page read and write
2279000F000
trusted library allocation
page read and write
1C14565A000
heap
page read and write
7FFD341E1000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
29A8F924000
heap
page read and write
29A2000
heap
page read and write
7FFD33FF3000
trusted library allocation
page execute and read and write
F4488FE000
stack
page read and write
18F0003D000
trusted library allocation
page read and write
44B83FE000
stack
page read and write
4233000
trusted library allocation
page execute and read and write
29A90B3D000
trusted library allocation
page read and write
7FFD3411B000
trusted library allocation
page execute and read and write
AD5497D000
stack
page read and write
29A90A83000
trusted library allocation
page read and write
7FFD34200000
trusted library allocation
page read and write
6ED3000
trusted library allocation
page read and write
227F69D0000
trusted library allocation
page read and write
24D0003F000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD341E6000
trusted library allocation
page read and write
48E0000
heap
page read and write
4830000
trusted library allocation
page read and write
C6B7CFD000
stack
page read and write
5050000
heap
page read and write
6B40000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7FFD3407C000
trusted library allocation
page execute and read and write
6ED0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
C7C0828000
stack
page read and write
6AF0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
718E000
stack
page read and write
A5A717E000
unkown
page readonly
6EB0000
trusted library allocation
page read and write
7FFD34130000
trusted library allocation
page execute and read and write
6B30000
trusted library allocation
page read and write
25D7000
stack
page read and write
29AA8A30000
trusted library allocation
page read and write
312D000
heap
page read and write
6B30000
trusted library allocation
page read and write
7FFD341F7000
trusted library allocation
page read and write
7FFD341EA000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
29A903E2000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
7FFD340A6000
trusted library allocation
page read and write
4872000
trusted library allocation
page read and write
7FFD342E0000
trusted library allocation
page read and write
7FFD341F9000
trusted library allocation
page read and write
7FFD3411B000
trusted library allocation
page execute and read and write
29A9039A000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
44C7000
trusted library allocation
page execute and read and write
6EB0000
trusted library allocation
page read and write
4930000
heap
page readonly
6ED0000
trusted library allocation
page read and write
6AD0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
13A39356000
heap
page read and write
6AF0000
trusted library allocation
page read and write
29A90381000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
29AA8EDC000
heap
page read and write
6B10000
trusted library allocation
page read and write
290FCA31000
heap
page read and write
6B40000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
423D000
trusted library allocation
page execute and read and write
6ED0000
trusted library allocation
page read and write
3117000
heap
page read and write
6E90000
trusted library allocation
page read and write
1EF2771B000
trusted library allocation
page read and write
13A5230F000
heap
page read and write
5B22BFE000
stack
page read and write
6EE0000
trusted library allocation
page read and write
A5A6E7D000
stack
page read and write
6ED0000
trusted library allocation
page read and write
2DB5000
heap
page read and write
13A39A40000
heap
page execute and read and write
6EB0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
7FFD341CE000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD34270000
trusted library allocation
page execute and read and write
1BC18965000
heap
page read and write
6B30000
trusted library allocation
page read and write
1C145640000
heap
page read and write
F4481FF000
stack
page read and write
13A52359000
heap
page read and write
6B30000
trusted library allocation
page read and write
2739000
heap
page read and write
1C145702000
heap
page read and write
7FFD341B6000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
29A8FCA5000
heap
page read and write
65DE000
stack
page read and write
7FFD33FF3000
trusted library allocation
page execute and read and write
6EB0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
29A8FC15000
heap
page read and write
6ED0000
trusted library allocation
page read and write
4490000
trusted library allocation
page read and write
18F1000D000
trusted library allocation
page read and write
232D7695000
heap
page read and write
227F6A41000
heap
page read and write
232D76A0000
heap
page read and write
6E90000
trusted library allocation
page read and write
7FFD341E4000
trusted library allocation
page read and write
7FFD341D6000
trusted library allocation
page read and write
44B82FE000
stack
page read and write
6AF0000
trusted library allocation
page read and write
29AA81B0000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
7FFD341E6000
trusted library allocation
page read and write
70CF000
stack
page read and write
C7C282C000
stack
page read and write
7FFD34220000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
29AA01C3000
trusted library allocation
page read and write
7FF4C76C0000
trusted library allocation
page execute and read and write
6EB0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
2CA0000
heap
page read and write
1BC31A5A000
heap
page read and write
6A66000
trusted library allocation
page execute and read and write
6EE0000
trusted library allocation
page read and write
AD54D7F000
stack
page read and write
6B30000
trusted library allocation
page read and write
5B233FE000
stack
page read and write
6B30000
trusted library allocation
page read and write
13A393B4000
heap
page read and write
6ED0000
trusted library allocation
page read and write
2912F390000
heap
page read and write
6ED0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
18F0012F000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
4CE7EFE000
stack
page read and write
6B30000
trusted library allocation
page read and write
7FFD34260000
trusted library allocation
page execute and read and write
6B10000
trusted library allocation
page read and write
1BC18B30000
trusted library allocation
page read and write
7FFD34247000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD3401D000
trusted library allocation
page execute and read and write
29A90A69000
trusted library allocation
page read and write
29AA8EED000
heap
page read and write
7FFD34240000
trusted library allocation
page execute and read and write
A5A6F7E000
unkown
page readonly
7FFD34250000
trusted library allocation
page execute and read and write
F4484FE000
stack
page read and write
1BC192A5000
trusted library allocation
page read and write
FD64AFE000
stack
page read and write
6B30000
trusted library allocation
page read and write
7FFD34270000
trusted library allocation
page execute and read and write
29A90A63000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
C7C0B3B000
stack
page read and write
290FCAC0000
heap
page read and write
6EB0000
trusted library allocation
page read and write
29A90292000
trusted library allocation
page read and write
C7C0729000
stack
page read and write
6EE0000
trusted library allocation
page read and write
6870000
trusted library allocation
page read and write
4A10000
heap
page execute and read and write
6ED0000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
2B1D000
stack
page read and write
42A0000
heap
page read and write
7FFD341D2000
trusted library allocation
page read and write
C7C183C000
stack
page read and write
6B70000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
C7C0267000
stack
page read and write
29A907BB000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
7FFD340C6000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFD340CC000
trusted library allocation
page execute and read and write
7FFD3420B000
trusted library allocation
page read and write
6620000
trusted library allocation
page execute and read and write
6B30000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
33915FE000
stack
page read and write
6EF4000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
2CDA06C8000
unkown
page readonly
29A90323000
trusted library allocation
page read and write
7FFD3400D000
trusted library allocation
page execute and read and write
6AF0000
trusted library allocation
page read and write
7450000
heap
page read and write
1C145560000
heap
page read and write
4480000
trusted library allocation
page read and write
6E10000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
40DE000
stack
page read and write
6AF0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
C7C02BE000
stack
page read and write
2DE4000
heap
page read and write
6B30000
trusted library allocation
page read and write
7FFD341F9000
trusted library allocation
page read and write
4A7D000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
704E000
stack
page read and write
6EB0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
6F30000
remote allocation
page read and write
24D74705000
heap
page read and write
227F86A2000
heap
page read and write
232D801C000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
29A9032F000
trusted library allocation
page read and write
7FFD34195000
trusted library allocation
page read and write
7FFD3400D000
trusted library allocation
page execute and read and write
7FFD341D5000
trusted library allocation
page read and write
509000
heap
page read and write
6B10000
trusted library allocation
page read and write
227F84A3000
heap
page read and write
2CDA0371000
heap
page read and write
40CE000
stack
page read and write
4234000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
3290000
heap
page read and write
24D00151000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
5B235FD000
stack
page read and write
4AE5000
trusted library allocation
page read and write
7FA48000
trusted library allocation
page execute and read and write
7FFD341D0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
232D76C0000
heap
page read and write
7FFD3413B000
trusted library allocation
page execute and read and write
227F6A69000
heap
page read and write
4CE78FE000
stack
page read and write
5B568FD000
stack
page read and write
311C000
heap
page read and write
48DE000
stack
page read and write
29AA9152000
unkown
page readonly
4AB3000
trusted library allocation
page read and write
7FFD341E0000
trusted library allocation
page read and write
1C145679000
heap
page read and write
6EB0000
trusted library allocation
page read and write
29AA8EB7000
heap
page read and write
26C3000
heap
page read and write
7FFD340C0000
trusted library allocation
page read and write
232F0662000
unkown
page readonly
6ED0000
trusted library allocation
page read and write
7FFD340D6000
trusted library allocation
page execute and read and write
6EF0000
trusted library allocation
page read and write
2908003F000
trusted library allocation
page read and write
6E95000
trusted library allocation
page read and write
35EF000
stack
page read and write
1BC18946000
heap
page read and write
6EB0000
trusted library allocation
page read and write
29A9033B000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
1EF2780F000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
46C0000
trusted library allocation
page read and write
C7C303C000
stack
page read and write
7FFD33FFD000
trusted library allocation
page execute and read and write
1EF2765F000
heap
page read and write
5225000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
2CDA0DC5000
trusted library allocation
page read and write
6DE0000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD3402D000
trusted library allocation
page execute and read and write
6ED0000
trusted library allocation
page read and write
6820000
trusted library allocation
page execute and read and write
29A9033F000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
18F7E9E0000
heap
page read and write
7FFD341EB000
trusted library allocation
page read and write
7454000
heap
page read and write
6B30000
trusted library allocation
page read and write
7FFD3401D000
trusted library allocation
page execute and read and write
227F6790000
unkown
page readonly
6B30000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6670000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
2C9C000
stack
page read and write
29A90212000
trusted library allocation
page read and write
7FA30000
trusted library allocation
page execute and read and write
6AF0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
7FFD33FF2000
trusted library allocation
page read and write
7FFD34296000
trusted library allocation
page read and write
7FFD34020000
trusted library allocation
page read and write
44C2000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
7FFD34030000
trusted library allocation
page read and write
227F8FFC000
heap
page read and write
6B40000
trusted library allocation
page read and write
13A3938C000
heap
page read and write
2717000
heap
page read and write
6AF0000
trusted library allocation
page read and write
29090011000
trusted library allocation
page read and write
7FFD341CE000
trusted library allocation
page read and write
7FFD341FD000
trusted library allocation
page read and write
7FFD341D6000
trusted library allocation
page read and write
44F0000
trusted library allocation
page read and write
694E000
stack
page read and write
4860000
heap
page read and write
7FFD34015000
trusted library allocation
page read and write
1BC187E0000
heap
page read and write
29A9031B000
trusted library allocation
page read and write
6F8D000
stack
page read and write
7FFD34044000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
7FFD34201000
trusted library allocation
page read and write
2725000
heap
page read and write
6ED0000
trusted library allocation
page read and write
1C145613000
heap
page read and write
C7C0F3F000
stack
page read and write
6B30000
trusted library allocation
page read and write
232F08BE000
heap
page read and write
18F7E972000
heap
page read and write
29A90B47000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
7FFD34330000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
4500000
heap
page readonly
33916FD000
stack
page read and write
484000
heap
page read and write
6EB0000
trusted library allocation
page read and write
C7C1A29000
stack
page read and write
413E000
stack
page read and write
6A20000
heap
page read and write
7FFD341E6000
trusted library allocation
page read and write
7FFD340C0000
trusted library allocation
page read and write
1EF2766C000
heap
page read and write
6B50000
trusted library allocation
page read and write
7FFD34260000
trusted library allocation
page execute and read and write
227F8FEB000
heap
page read and write
6EE0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E95000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
232D801F000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
29080155000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7FFD34106000
trusted library allocation
page execute and read and write
7FFD34250000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
A5A7E7E000
unkown
page readonly
227F6DE0000
heap
page read and write
6ED0000
trusted library allocation
page read and write
18F00143000
trusted library allocation
page read and write
7FFD3406C000
trusted library allocation
page execute and read and write
6B10000
trusted library allocation
page read and write
29A9024E000
trusted library allocation
page read and write
680C000
trusted library allocation
page execute and read and write
6B30000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
29A90296000
trusted library allocation
page read and write
1BC18B50000
trusted library allocation
page read and write
7FFD34250000
trusted library allocation
page execute and read and write
3124000
heap
page read and write
6E90000
trusted library allocation
page read and write
232E7EFD000
trusted library allocation
page read and write
6B54000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
7FFD34234000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
7FFD3422E000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6F30000
remote allocation
page read and write
7FFD3400D000
trusted library allocation
page execute and read and write
465E000
stack
page read and write
6ED0000
trusted library allocation
page read and write
6B50000
trusted library allocation
page read and write
473D000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
7FFD341AE000
trusted library allocation
page read and write
7FFD3402D000
trusted library allocation
page execute and read and write
6E90000
trusted library allocation
page read and write
1C145E02000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
7FFD34200000
trusted library allocation
page read and write
6B60000
trusted library allocation
page execute and read and write
6B30000
trusted library allocation
page read and write
24D74D10000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6B10000
trusted library allocation
page read and write
6B41000
trusted library allocation
page read and write
22780172000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6AF0000
trusted library allocation
page read and write
6B34000
trusted library allocation
page read and write
F4487FE000
stack
page read and write
6ED0000
trusted library allocation
page read and write
65E0000
heap
page execute and read and write
29A90313000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
42EE000
stack
page read and write
7FFD34110000
trusted library allocation
page execute and read and write
6EE0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
44C0000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFD341CA000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
44C5000
trusted library allocation
page execute and read and write
29A90395000
trusted library allocation
page read and write
7FFD341B5000
trusted library allocation
page read and write
7FFD34209000
trusted library allocation
page read and write
29A90317000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
296A000
heap
page read and write
227F8641000
heap
page read and write
A5A707E000
stack
page read and write
6EF0000
trusted library allocation
page read and write
29AA9640000
heap
page read and write
1BC1927F000
trusted library allocation
page read and write
32B8000
heap
page read and write
6EE0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
449D000
trusted library allocation
page execute and read and write
6ED0000
trusted library allocation
page read and write
7FFD34229000
trusted library allocation
page read and write
44B88FE000
stack
page read and write
1BC31A30000
heap
page execute and read and write
472F000
trusted library allocation
page read and write
6DDE000
stack
page read and write
3230000
heap
page read and write
4CE7BFC000
stack
page read and write
29AA8DD9000
heap
page read and write
4AB6000
trusted library allocation
page read and write
7FFD34014000
trusted library allocation
page read and write
7FFD34000000
trusted library allocation
page read and write
2CDA0575000
heap
page read and write
6EE0000
trusted library allocation
page read and write
7FFD34240000
trusted library allocation
page execute and read and write
7FFD34208000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
1EF26EB0000
heap
page read and write
7FFD341E0000
trusted library allocation
page read and write
227F6790000
unkown
page readonly
290FB8B6000
heap
page read and write
6EE0000
trusted library allocation
page read and write
6F30000
remote allocation
page read and write
There are 2614 hidden memdumps, click here to show them.