IOC Report
registration.msi

loading gif

Files

File Path
Type
Category
Malicious
registration.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
initial sample
malicious
C:\Config.Msi\41c383.rbs
data
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIC4F9.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSIC4F9.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSICAE6.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSICAE6.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIE1CA.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSIE1CA.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIE49A.tmp
data
dropped
malicious
C:\Windows\Installer\MSIFFD7.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
modified
malicious
C:\Windows\Installer\MSIFFD7.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\System32\InstallUtil.InstallLog
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Windows\Temp\~DF21C9A09377CDFE9B.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF2D3E5DF2735593AB.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF3BCE62784648DF98.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF4630E950FA28A864.TMP
data
dropped
malicious
C:\Windows\Temp\~DF510E6906F6ABC59A.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DFF883924653294067.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallState
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.ini
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AteraAgent.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
CSV text
dropped
C:\Windows\Installer\41c382.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\41c384.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\MSIC4F9.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSIC4F9.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIC4F9.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIC4F9.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSICAE6.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSICAE6.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSICAE6.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSICAE6.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIE1CA.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSIE1CA.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIE1CA.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIE1CA.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIE49B.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIE596.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIE6C0.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIFFD7.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSIFFD7.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIFFD7.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIFFD7.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SourceHash{E732A0D7-A2F2-4657-AC41-B19742648E45}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1A374813EDB1A6631387E414D3E73232
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\329B6147266C1E26CD774EA22B79EC2E
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BA74182F76F15A9CF514DEF352303C95
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
Certificate, Version=3
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
Certificate, Version=3
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1A374813EDB1A6631387E414D3E73232
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\329B6147266C1E26CD774EA22B79EC2E
data
modified
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BA74182F76F15A9CF514DEF352303C95
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log
CSV text
dropped
C:\Windows\Temp\~DF7E61EBA641E00834.TMP
data
dropped
C:\Windows\Temp\~DF8486836D499D5DEC.TMP
data
dropped
C:\Windows\Temp\~DFAB9013E4DC96505C.TMP
data
dropped
C:\Windows\Temp\~DFC333FC5749C6A673.TMP
data
dropped
C:\Windows\Temp\~DFD8178A5030869E62.TMP
data
dropped
C:\Windows\Temp\~DFFD5FBDE6FB652FC4.TMP
data
dropped
\Device\ConDrv
JSON data
dropped
There are 75 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSIC4F9.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4310406 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSICAE6.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4311812 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSIE1CA.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4317703 11 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="1vf5mpi5iyis@upsnab.net" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000Kh41eIAB" /AgentId="95fbc98a-3c27-44ae-84cf-9e3acc292491"
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSIFFD7.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4325359 33 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 95fbc98a-3c27-44ae-84cf-9e3acc292491 "e8d80795-1e07-47b3-9c87-186f671b6a15" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000Kh41eIAB
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 95fbc98a-3c27-44ae-84cf-9e3acc292491 "84e6126d-3464-4d76-9c19-0160eafb16a0" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000Kh41eIAB
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 95fbc98a-3c27-44ae-84cf-9e3acc292491 "e3e24934-4319-48e9-bf87-d4583f7e9574" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000Kh41eIAB
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 95fbc98a-3c27-44ae-84cf-9e3acc292491 "bafe3b2c-3bd0-4df3-abe5-6f6b048de27b" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000Kh41eIAB
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 95fbc98a-3c27-44ae-84cf-9e3acc292491 "5da68ded-3041-4a37-bb29-975445cce246" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000Kh41eIAB
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\registration.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 3D043D01D69573A731BD32BF0EBA042E
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding ED6036EDFA306B6AD29B763B80D7974F E Global\MSI0000
C:\Windows\SysWOW64\net.exe
"NET" STOP AteraAgent
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 STOP AteraAgent
C:\Windows\SysWOW64\taskkill.exe
"TaskKill.exe" /f /im AteraAgent.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 17 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95fbc98a-3c27-44ae-84cf-9e3acc292491/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=5acd82f0-57ae-41e0-85e3-b5cb80ee27df&tr=31&tt=17324433379477685&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
https://agent-api.atera.com/Production/Agent/GetCommands8
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e39b01e5-dc44-47cf-a0d2-d7bead94718e
unknown
http://schemas.datacontract.org
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/38.0/AgentPackageAgentInformation.zip?w8Q4MxnxsTU+y3lbIKhb1p3E6E9NGNGr43vM7ggjDRD5G9cDVa0pn3fF3kInqamc
108.158.75.12
https://agent-api.atera.com/Production/Agent/GetCommands)
unknown
https://agent-api.atera.com/Production/Agent/track-event
unknown
http://dl.google.com/googletalk/googletalk-setup.exe
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=8dec4445-c0f5-4b3e-90c5-b0e958ca91da&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.199
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95fbc98a-3c27-44ae-84cf-9e3acc292491/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=b554e624-5e74-4caa-b7de-790b1533e993&tr=31&tt=17324434350865773&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=b46022d7-cbaa-40b8-8c72-fd984bb21007&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
https://agent-api.atera.com/Production/Agent/
unknown
http://schemas.datacontract.org/2004/07/System.ServiceProcess
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=05ecc6e5-ecbe-426c-b21f-2f414d78087e
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95fbc98a-3c27-44ae-84cf-9e3acc292491/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=e695b199-cbc9-44ed-b89a-77707fde66b0&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
http://wixtoolset.org
unknown
https://agent-api.atera.com/Production
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95fbc98a-3c27-44ae-84cf-9e3acc292491/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=e3aa32f8-3a58-4ef4-b289-b05205d0c00e&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
https://agent-api.atera.com/Production/Agent/GetCommandsFallback0
unknown
https://ps.atera.com/agentpackageswin/AgentPackageRuntimeInstaller/13.0/AgentPackageRuntimeInstaller
unknown
http://acontrol.atera.com/
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95fbc98a
unknown
https://agent-api.atera.com/Production/Agent/AgentStarting)
unknown
https://ps.pndsn.com
unknown
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesce
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageNetworkDiscovery/23.9/AgentPackageNetworkDiscove
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95fbc98a-3c27-44ae-84cf-9e3acc292491/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=57719228-a14b-4385-bc90-4fb880778c52&tt=0&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.199
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=12ab6b1a-a82d-4206-b67b-cf0ecb23de70&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
http://agent-api.atera.com
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=dd31cbca-11f7-438d-95d1-0103076c3b19&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
http://schemas.datacontract.org/2004/07/
unknown
http://microsoft.co
unknown
https://github.com/icsharpcode/SharpZipLib
unknown
https://ps.atera.com/agentpackageswin/AgentPackageNetworkDiscovery/15.0/AgentPackageNetworkDiscovery
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e10b719b-981a-446e-ba23-7c69d7f94ded&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageAgentI
unknown
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
unknown
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=9ead68d6-bdd5-4770-a068-8d3fb261cd22&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.199
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95fbc98a-3c27-44ae-84cf
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=6369cfb0-4b84-4f4d-9006-15859c206f1e
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageTaskScheduler/17.2/AgentPackageTaskScheduler.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=3af72751-dbe9-4596-b6ee-6d67e84a5830
unknown
https://agent-api.atera.com
unknown
https://agent-api.atera.com/Production/Agent/AgentStarting
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=c7890d66-5dda-44b9-9266-433341b69fe6
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95fbc98a-3c27-44ae-84cf-9e3acc292491/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=b748dd63-e45c-4e56-a14e-2acb4546abf0&tr=31&tt=17324434315367656&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
http://www.w3.oh
unknown
https://agent-api.atera.com/Production/Agent/GetCommands
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95fbc98a-3c27-44ae-84cf-9e3acc292491/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=2437e5c2-c49a-46e7-85a0-5bd5b0f3e346&tt=0&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=61d95b76-5b67-4486-9f2d-f8d365c1f79d
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=9ead68d6-bdd5-4770-a068-8d3fb261cd22
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=50e4cbc2-cc27-4e42-b044-8c7a8b8e200d
unknown
https://agent-api.atera.com/
unknown
https://agent-api.atera.com/Production/Agent/GetRecurringPackages
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.Availability/13.0/Agent.Package.Availability.zip
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95fbc98a-3c27-44ae-84cf-9e3acc292491/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=44d081ca-4526-4116-82b9-755899f28369&tt=0&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
https://ps.atera.com/agentpackagesmac/AgentPackageRuntimeInstaller/1.5/AgentPackageRuntimeInstaller.
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.Watchdog/13.0/Agent.Package.Watchdog.zip
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95fbc98a-3c27-44ae-84cf-9e3acc292491/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=8a545e8a-5ca3-4586-95ee-223486bad101&tr=31&tt=17324433411580562&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=b02e1ef0-ec67-47b3-a61c-d81850d0d964
unknown
https://ps.atera.com/agentpackagesnet45/Agent.Package.Availability/0.16/Agent.Package.Availability.z
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95fbc98a-3c27-44ae-84cf-9e3acc292491/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=15951373-2c36-4fa8-affe-36f2ec07b81f&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
https://ps.pndsn.com/v2T
unknown
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesnection
unknown
https://ps.atera.com/agentpackagesmac/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
unknown
https://ps.atera.com/agentpackagesnet45/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
unknown
https://ps.atera.com/agentpackagesmac/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=9264d1e3-b040-4685-8c12-22cc4dee131b
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95fbc98a-3c27-44ae-84cf-9e3acc292491/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=939e5a96-d596-4e59-936e-7ae5d28307cc&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
https://www.newtonsoft.com/json
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=af5bf701-7249-45e5-86be-19d8d9c83003&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
https://agent-api.atera.com/Production/Agent/Age
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95fbc98a-3c27-44ae-84cf-9e3acc292491/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=d06e9be8-9779-43f1-a370-eed925135e8d&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95fbc98a-3c27-44ae-84cf-9e3acc292491/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=15a8e400-4d66-4396-85a9-a52c47560c82&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
https://ps.atera.com/agentpackageswin/AgentPackageHeartbeat/16.9
unknown
http://wixtoolset.org/news/
unknown
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf
unknown
https://ps.atera.com/agentpackageswin/AgentPackageAgentInformation/22.7/AgentPackageAgentInformation
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=aa11bfe9-8289-42c2-be65-d6291fd164cf&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95fbc98a-3c27-44ae-84cf-9e3acc292491/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=92f4880d-dc2f-4ace-a46f-d9a0bf4fb400&tr=33&tt=17324434578282801&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.199
https://agent-api.aterD
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageNetworkDiscovery/13.0/AgentPackageNetworkDiscovery
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95fbc98a-3c27-44ae-84cf-9e3acc292491/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=3dabc9ca-50ca-4769-82eb-40791913b06c&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=3f56d55c-6ba5-4af1-9be1-2dea66d5d0f7&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
https://ps.atera.com/agentpackageswin/Agent.Package.IotPoc/13.0/Agent.Package.IotPoc.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=1ddb02cf-39da-4196-a130-53d484e9194d&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/95fbc98a-3c27-44ae-84cf-9e3acc292491/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=6d5cfce1-b215-4be8-a3eb-65f371d376ce&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
https://ps.atera.com/agentpackagesmac/AgentPackageTaskScheduler/13.0/AgentPackageTaskScheduler.zip
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageAgentInformation/38.0/AgentPackageAgentInformation
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=cc4be31c-7bd0-4546-8157-021785aaabf9&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=a550ee73-b0e6-4203-86b7-33ebef664c1d&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
https://agent-api.P
unknown
http://www.w3.o
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=7ad0a761-601d-4dfb-892a-87e5a80d8cfd&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/95fbc98a-3c27-44ae-84cf-9e3acc292491/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=1c583dbc-af1e-4d45-80f1-003dabe8eea7&tt=0&uuid=95fbc98a-3c27-44ae-84cf-9e3acc292491
13.232.67.198
https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/38.0/AgentPackageAgentInformati
unknown
https://agent-api.atera.com/Production/Agent/GetCommandsFallback
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ps.pndsn.com
13.232.67.198
bg.microsoft.map.fastly.net
199.232.214.172
s-part-0035.t-0009.t-msedge.net
13.107.246.63
d25btwd9wax8gu.cloudfront.net
108.158.75.12
fp2e7a.wpc.phicdn.net
192.229.221.95
windowsupdatebg.s.llnwi.net
178.79.238.128
ps.atera.com
unknown
agent-api.atera.com
unknown

IPs

IP
Domain
Country
Malicious
13.232.67.198
ps.pndsn.com
United States
13.232.67.199
unknown
United States
108.158.75.12
d25btwd9wax8gu.cloudfront.net
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\41c383.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\41c383.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\ATERA Networks\AteraAgent\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\ATERA Networks\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Features
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
AutoBackupLogFiles
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AteraAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
AccountId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
IntegratorLogin
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
CompanyId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
AgentId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
ServerName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AlphaAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
FileDirectory
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_USERS.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
FileDirectory
There are 137 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1D0B92EA000
heap
page read and write
malicious
D20C6F5000
stack
page read and write
malicious
140BF2C9000
heap
page read and write
malicious
1FE48A20000
heap
page read and write
malicious
140BF2DB000
heap
page read and write
malicious
140BF5B0000
heap
page read and write
malicious
140BF30D000
heap
page read and write
malicious
1FE49192000
unkown
page readonly
malicious
2A87ED50000
heap
page read and write
malicious
1BB81170000
heap
page read and write
malicious
1FE61AB0000
heap
page read and write
malicious
2A865C98000
heap
page read and write
malicious
140BFBE3000
trusted library allocation
page read and write
malicious
1D0BADE9000
trusted library allocation
page read and write
malicious
1D0B928B000
heap
page read and write
malicious
1BB81821000
trusted library allocation
page read and write
malicious
1AD7AC9D000
heap
page read and write
malicious
1D0B8FF2000
unkown
page readonly
malicious
2A866713000
trusted library allocation
page read and write
malicious
140BFBF3000
trusted library allocation
page read and write
malicious
1D0D375F000
heap
page read and write
malicious
25E6D89F000
heap
page read and write
malicious
25E00566000
trusted library allocation
page read and write
malicious
1D0BAE12000
trusted library allocation
page read and write
malicious
1FE48CD0000
heap
page read and write
malicious
25E007B7000
trusted library allocation
page read and write
malicious
25E6ED9A000
heap
page read and write
malicious
2A866703000
trusted library allocation
page read and write
malicious
1BB818A3000
trusted library allocation
page read and write
malicious
1AD00047000
trusted library allocation
page read and write
malicious
1BB81893000
trusted library allocation
page read and write
malicious
4400000
heap
page read and write
malicious
2A865C90000
heap
page read and write
malicious
1D0B92C1000
heap
page read and write
malicious
25E6DA90000
heap
page read and write
malicious
2A866020000
heap
page read and write
malicious
1FE492A3000
trusted library allocation
page read and write
malicious
1FE48962000
unkown
page readonly
malicious
25E6EE6A000
heap
page read and write
malicious
1AD000BF000
trusted library allocation
page read and write
malicious
2A87EE13000
heap
page read and write
malicious
1BB811F5000
heap
page read and write
malicious
1FE492B3000
trusted library allocation
page read and write
malicious
1D0BAE14000
trusted library allocation
page read and write
malicious
1AD7AC69000
heap
page read and write
malicious
25E6D8EA000
heap
page read and write
malicious
1D0BAEDC000
trusted library allocation
page read and write
malicious
140BF2FD000
heap
page read and write
malicious
25E0006B000
trusted library allocation
page read and write
malicious
140BF2C0000
heap
page read and write
malicious
2A865CCC000
heap
page read and write
malicious
1D0BADEC000
trusted library allocation
page read and write
malicious
46FC000
heap
page read and write
malicious
1FE49231000
trusted library allocation
page read and write
malicious
1BB811B5000
heap
page read and write
malicious
25E6D860000
heap
page read and write
malicious
1AD7AF60000
heap
page read and write
malicious
1D0B9220000
heap
page read and write
malicious
1D0BAE92000
trusted library allocation
page read and write
malicious
1FE48A60000
heap
page read and write
malicious
1FE48AAC000
heap
page read and write
malicious
25E00242000
trusted library allocation
page read and write
malicious
1AD7AC9F000
heap
page read and write
malicious
2A8666D7000
trusted library allocation
page read and write
malicious
2A865D13000
heap
page read and write
malicious
47E4000
trusted library allocation
page read and write
malicious
4A31000
trusted library allocation
page read and write
malicious
2A86674F000
trusted library allocation
page read and write
malicious
1AD00001000
trusted library allocation
page read and write
malicious
7FFD34254000
trusted library allocation
page read and write
malicious
1D0B92A1000
heap
page read and write
malicious
1FE48A66000
heap
page read and write
malicious
25E6D960000
heap
page read and write
malicious
1D0BAE1A000
trusted library allocation
page read and write
malicious
1D0D3456000
heap
page read and write
malicious
140BFBB7000
trusted library allocation
page read and write
malicious
4B8F000
heap
page read and write
malicious
1BB818DF000
trusted library allocation
page read and write
malicious
1D0BAD61000
trusted library allocation
page read and write
malicious
25E00001000
trusted library allocation
page read and write
malicious
1D0B9260000
heap
page read and write
malicious
2A866691000
trusted library allocation
page read and write
malicious
140BF346000
heap
page read and write
malicious
1BB81380000
heap
page read and write
malicious
1BB81179000
heap
page read and write
malicious
2A865CE0000
heap
page read and write
malicious
1AD7AC60000
heap
page read and write
malicious
1BB811AD000
heap
page read and write
malicious
1D0D3700000
heap
page read and write
malicious
1AD00073000
trusted library allocation
page read and write
malicious
1BB81867000
trusted library allocation
page read and write
malicious
25E6EDB0000
heap
page read and write
malicious
4C02000
heap
page read and write
malicious
25E004C0000
trusted library allocation
page read and write
malicious
1D0B9266000
heap
page read and write
malicious
140BFB71000
trusted library allocation
page read and write
malicious
4AD4000
trusted library allocation
page read and write
malicious
1D0BAEC6000
trusted library allocation
page read and write
malicious
1AD7ACE6000
heap
page read and write
malicious
1D0B927F000
heap
page read and write
malicious
2A865CAB000
heap
page read and write
malicious
140BFC2F000
trusted library allocation
page read and write
malicious
4741000
trusted library allocation
page read and write
malicious
1AD00083000
trusted library allocation
page read and write
malicious
25E6D8BF000
heap
page read and write
malicious
1BB9A15A000
heap
page read and write
malicious
25E00838000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
7FFD34186000
trusted library allocation
page execute and read and write
7FFD34090000
trusted library allocation
page read and write
5BE000
unkown
page read and write
7FFD342E4000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
2EC8000
stack
page read and write
6A80000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
4623000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
2C6D000
heap
page read and write
46F0000
trusted library allocation
page read and write
25E6EAB3000
heap
page read and write
7FFD3424E000
trusted library allocation
page read and write
7FFD341C0000
trusted library allocation
page execute and read and write
6D80000
trusted library allocation
page read and write
1D0CAD6F000
trusted library allocation
page read and write
25E10081000
trusted library allocation
page read and write
2A8665B0000
unkown
page readonly
7FFD34270000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
6D84000
trusted library allocation
page read and write
140BF5B5000
heap
page read and write
49F0000
trusted library allocation
page read and write
2F04000
heap
page read and write
6D80000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
2F80000
heap
page read and write
6D70000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
1D0D3560000
unkown
page readonly
6D80000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
45C0000
trusted library section
page read and write
1BB81730000
trusted library allocation
page read and write
25E001A2000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
2A8766A1000
trusted library allocation
page read and write
25E000E2000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4C2E000
stack
page read and write
49F0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
2925FB000
stack
page read and write
4DFC000
trusted library allocation
page execute and read and write
140BF305000
heap
page read and write
6A80000
trusted library allocation
page read and write
7FFD342D2000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
25E00836000
trusted library allocation
page read and write
1D0B92A3000
heap
page read and write
46F0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
7FFD3415C000
trusted library allocation
page execute and read and write
D20ECE9000
stack
page read and write
4710000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
7FFD342B0000
trusted library allocation
page execute and read and write
3075000
heap
page read and write
25E6F2C4000
heap
page read and write
6D90000
trusted library allocation
page read and write
4BC0000
heap
page read and write
3238000
heap
page read and write
1D0D3724000
heap
page read and write
1FE48A68000
heap
page read and write
6D80000
trusted library allocation
page read and write
140BFBAB000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
2A8665E3000
unkown
page readonly
4710000
trusted library allocation
page read and write
2A866634000
unkown
page readonly
4C00000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
D20D8FE000
stack
page read and write
1AD7AD46000
heap
page read and write
4A10000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
25E6F26B000
heap
page read and write
296A000
heap
page read and write
6D80000
trusted library allocation
page read and write
7FFD342C2000
trusted library allocation
page read and write
1AD00143000
trusted library allocation
page read and write
25E6EDD2000
heap
page read and write
4A10000
trusted library allocation
page read and write
1BB81270000
heap
page read and write
6A80000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
AE1C1FE000
stack
page read and write
7EF78000
trusted library allocation
page execute and read and write
4710000
trusted library allocation
page read and write
2F6A1FE000
stack
page read and write
2F18000
heap
page read and write
2A87EDD1000
heap
page read and write
25E004E4000
trusted library allocation
page read and write
7FFD34272000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
6C00000
remote allocation
page read and write
25E6EF1E000
heap
page read and write
49F0000
trusted library allocation
page read and write
7FFD34140000
trusted library allocation
page read and write
D20FAE9000
stack
page read and write
72EE000
stack
page read and write
7FFD3409D000
trusted library allocation
page execute and read and write
49F0000
trusted library allocation
page read and write
D20DEE9000
stack
page read and write
4710000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
4870000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
1D0B92AF000
heap
page read and write
6FFE000
stack
page read and write
2BD0000
heap
page read and write
6D90000
trusted library allocation
page read and write
1FE48A4A000
heap
page read and write
6D80000
trusted library allocation
page read and write
2A87ED8C000
heap
page read and write
4710000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
720E000
stack
page read and write
25E0010D000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
D20F6F8000
stack
page read and write
4710000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
6E20000
remote allocation
page read and write
291FFC000
stack
page read and write
6DB0000
trusted library allocation
page execute and read and write
6D80000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
25E6F29D000
heap
page read and write
49F0000
trusted library allocation
page read and write
25E6EDCE000
heap
page read and write
2A60000
heap
page read and write
6D80000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
7FFD342A0000
trusted library allocation
page read and write
7FFD340FC000
trusted library allocation
page execute and read and write
9D67DFE000
stack
page read and write
4BF0000
heap
page read and write
25E00195000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
3280000
heap
page read and write
7FFD342C0000
trusted library allocation
page execute and read and write
6D80000
trusted library allocation
page read and write
7FFD34240000
trusted library allocation
page read and write
D20C3FF000
stack
page read and write
46D4000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
2F69EFE000
stack
page read and write
2F85000
heap
page read and write
4A10000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
1D0D34A2000
heap
page read and write
5A35000
trusted library allocation
page read and write
6D83000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
7FFD340B4000
trusted library allocation
page read and write
4C07000
trusted library allocation
page execute and read and write
48CE000
stack
page read and write
6D80000
trusted library allocation
page read and write
1FE61A32000
unkown
page readonly
7FFD3423E000
trusted library allocation
page read and write
487D000
trusted library allocation
page execute and read and write
4850000
trusted library allocation
page execute and read and write
7FFD342B9000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
7FFD340A2000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
48FC000
heap
page read and write
4CF0000
heap
page read and write
4710000
trusted library allocation
page read and write
7FFD34250000
trusted library allocation
page execute and read and write
4B30000
heap
page read and write
4A10000
trusted library allocation
page read and write
2A866618000
unkown
page readonly
1AD7AC86000
heap
page read and write
7FFD342B0000
trusted library allocation
page read and write
1AD7B140000
heap
page read and write
7FFD342E0000
trusted library allocation
page execute and read and write
46F0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
3000000
heap
page read and write
7200000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
7F230000
trusted library allocation
page execute and read and write
9D679FE000
stack
page read and write
4710000
trusted library allocation
page read and write
7FFD34350000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
6A84000
trusted library allocation
page read and write
7170000
heap
page execute and read and write
4710000
trusted library allocation
page read and write
1AD7B3E0000
heap
page read and write
7FFD3414C000
trusted library allocation
page execute and read and write
7FFD342C0000
trusted library allocation
page execute and read and write
49F0000
trusted library allocation
page read and write
4590000
trusted library allocation
page read and write
1FE48CA0000
trusted library allocation
page read and write
7FFD341C0000
trusted library allocation
page execute and read and write
2E10000
heap
page read and write
49F0000
trusted library allocation
page read and write
25E6E1C0000
heap
page execute and read and write
7FFD34297000
trusted library allocation
page read and write
1FE48C10000
heap
page read and write
52DBEFE000
stack
page read and write
25D0000
heap
page read and write
7FFD34279000
trusted library allocation
page read and write
1FE491A8000
unkown
page readonly
6D81000
trusted library allocation
page read and write
1D0B9180000
heap
page read and write
140BF309000
heap
page read and write
46D0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
2A1A000
heap
page read and write
4710000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
25E007AB000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
7FFD34280000
trusted library allocation
page read and write
2F71000
heap
page read and write
25E0072A000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
1FE59231000
trusted library allocation
page read and write
7FFD34289000
trusted library allocation
page read and write
446E000
stack
page read and write
46F0000
trusted library allocation
page read and write
25E6F25B000
heap
page read and write
7FFD342B0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
4700000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
25E6DA95000
heap
page read and write
AE1BFFE000
stack
page read and write
4710000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
7FFD340A3000
trusted library allocation
page read and write
25E001AA000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
25E00832000
trusted library allocation
page read and write
2A70000
heap
page read and write
4A10000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
4C70000
heap
page readonly
6D80000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
D20F4E9000
stack
page read and write
7FFD34233000
trusted library allocation
page read and write
2D7E000
stack
page read and write
6DA0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
2950000
heap
page read and write
4710000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
2F69FFE000
stack
page read and write
4710000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
7FFD340CD000
trusted library allocation
page execute and read and write
7FFD34284000
trusted library allocation
page read and write
7FFD342F6000
trusted library allocation
page read and write
25E00828000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
70C0000
trusted library allocation
page execute and read and write
6D80000
trusted library allocation
page read and write
25E6EE62000
heap
page read and write
46D0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
25E6E059000
heap
page read and write
2F6A2FD000
stack
page read and write
52DBBFE000
stack
page read and write
D20EBE9000
stack
page read and write
4710000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
49F9000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
1BB91821000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
25E6D8A1000
heap
page read and write
1BB8194F000
trusted library allocation
page read and write
25E6F750000
heap
page read and write
7FFD342D0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
7FFD34240000
trusted library allocation
page read and write
1AD7ACA3000
heap
page read and write
4B22000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
7340000
heap
page read and write
6D80000
trusted library allocation
page read and write
25E009D1000
trusted library allocation
page read and write
140BFC9C000
trusted library allocation
page read and write
BFB8AFF000
stack
page read and write
4720000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
2C0E000
stack
page read and write
715E000
stack
page read and write
6D80000
trusted library allocation
page read and write
1FE61A56000
unkown
page readonly
4710000
trusted library allocation
page read and write
1AD7ACAB000
heap
page read and write
49F0000
trusted library allocation
page read and write
4780000
heap
page read and write
4B16000
trusted library allocation
page read and write
D20C9FE000
stack
page read and write
4710000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
7FFD341B0000
trusted library allocation
page execute and read and write
25E6D8A7000
heap
page read and write
2C40000
heap
page read and write
6A80000
trusted library allocation
page read and write
472D000
heap
page read and write
1AD7BDD0000
heap
page read and write
1FE61A43000
unkown
page readonly
25E6D87B000
heap
page read and write
291AFE000
stack
page read and write
6D80000
trusted library allocation
page read and write
1FE48AA7000
heap
page read and write
140BFC9F000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
461E000
stack
page read and write
1D0D3714000
heap
page read and write
6D90000
trusted library allocation
page read and write
2A8666CB000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
2A866480000
heap
page read and write
1BB81750000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
25E002C4000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
7FFD342C7000
trusted library allocation
page read and write
1FE61B47000
heap
page read and write
6D80000
trusted library allocation
page read and write
5D45000
trusted library allocation
page read and write
1FE49190000
unkown
page readonly
7FFD34310000
trusted library allocation
page execute and read and write
6DA0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
29259320000
heap
page read and write
4710000
trusted library allocation
page read and write
25E6DAA0000
heap
page read and write
46F0000
trusted library allocation
page read and write
D20D3E9000
stack
page read and write
4580000
trusted library allocation
page execute and read and write
2919FE000
stack
page read and write
46D0000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
1D0D3712000
heap
page read and write
7FFD340BD000
trusted library allocation
page execute and read and write
6AA0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
1AD7BF80000
heap
page execute and read and write
2C64000
heap
page read and write
2A8667D3000
trusted library allocation
page read and write
291CFE000
stack
page read and write
7FFD34470000
trusted library allocation
page read and write
6D80000
trusted library allocation
page execute and read and write
2AA5000
heap
page read and write
25E6EA99000
heap
page read and write
6D80000
trusted library allocation
page read and write
2EEA000
heap
page read and write
7FFD342C0000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
2920FB000
stack
page read and write
2F69AFE000
stack
page read and write
4BC3000
trusted library allocation
page execute and read and write
46F0000
trusted library allocation
page read and write
1AD7B130000
trusted library allocation
page read and write
1FE48960000
unkown
page readonly
290E000
stack
page read and write
46F0000
trusted library allocation
page read and write
25E6EE65000
heap
page read and write
6D80000
trusted library allocation
page read and write
25E001B6000
trusted library allocation
page read and write
7FFD3428B000
trusted library allocation
page read and write
49D0000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
4700000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
6D8C000
trusted library allocation
page read and write
25E6EF90000
heap
page read and write
D20FEFD000
stack
page read and write
7FFD340AD000
trusted library allocation
page execute and read and write
4710000
trusted library allocation
page read and write
7FFD34080000
trusted library allocation
page read and write
4B12000
trusted library allocation
page read and write
7FFD34250000
trusted library allocation
page read and write
2A87EDA4000
heap
page read and write
49F0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
1AD7B145000
heap
page read and write
6D80000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
2D1A000
heap
page read and write
6D80000
trusted library allocation
page read and write
140BF2A0000
heap
page read and write
6D80000
trusted library allocation
page read and write
7FFD34156000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
1AD0003D000
trusted library allocation
page read and write
2918FC000
stack
page read and write
25E00080000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
1FE5923D000
trusted library allocation
page read and write
25E0020F000
trusted library allocation
page read and write
7FFD342F0000
trusted library allocation
page execute and read and write
1BB81971000
trusted library allocation
page read and write
1D0D3420000
heap
page read and write
25E6DA40000
heap
page read and write
D20F7EA000
stack
page read and write
2A8665C2000
unkown
page readonly
4710000
trusted library allocation
page read and write
7FFD34250000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4970000
trusted library allocation
page read and write
25E10021000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
4BCD000
trusted library allocation
page execute and read and write
3237000
heap
page read and write
7FFD340AD000
trusted library allocation
page execute and read and write
D20F9EC000
stack
page read and write
D20E9E9000
stack
page read and write
6D80000
trusted library allocation
page read and write
291EFD000
stack
page read and write
46D0000
trusted library allocation
page read and write
25E00560000
trusted library allocation
page read and write
6EBE000
stack
page read and write
1AD0012C000
trusted library allocation
page read and write
46B0000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
5741000
trusted library allocation
page read and write
6D91000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
7FFD342B0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
D20E8EC000
stack
page read and write
4720000
trusted library allocation
page read and write
2C2B000
heap
page read and write
2928FE000
stack
page read and write
49D0000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
2C82000
heap
page read and write
6DC0000
trusted library allocation
page read and write
4B9D000
trusted library allocation
page execute and read and write
7FFD3422A000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
D20E0E8000
stack
page read and write
4720000
trusted library allocation
page read and write
2A22000
heap
page read and write
423E000
stack
page read and write
46D0000
trusted library allocation
page read and write
1AD7BE1D000
heap
page read and write
6D80000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
1BB9182D000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
7FFD34295000
trusted library allocation
page read and write
71A0000
trusted library allocation
page read and write
1BB8194C000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
7FFD34480000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
1BB81975000
trusted library allocation
page read and write
2CFE000
heap
page read and write
4E40000
trusted library allocation
page read and write
25E6EC3E000
unkown
page readonly
25E6F2E5000
heap
page read and write
25E6E1D0000
trusted library allocation
page read and write
4405000
trusted library allocation
page execute and read and write
25E6EF23000
heap
page read and write
25E00724000
trusted library allocation
page read and write
2A866638000
unkown
page readonly
4A10000
trusted library allocation
page read and write
1AD7ACA7000
heap
page read and write
1FE48E95000
heap
page read and write
6D80000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
2C85000
heap
page read and write
7FFD34262000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
2550000
heap
page read and write
7FFD34390000
trusted library allocation
page read and write
711E000
stack
page read and write
1D0BAD50000
heap
page execute and read and write
1D0D3732000
heap
page read and write
49F0000
trusted library allocation
page read and write
2A865C40000
heap
page read and write
46F0000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
7FFD342F0000
trusted library allocation
page execute and read and write
43C0000
trusted library allocation
page read and write
7FFD34300000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
AE1BDFE000
stack
page read and write
4E40000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
249B000
stack
page read and write
4710000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
4D8F000
heap
page read and write
6D90000
trusted library allocation
page read and write
2F30000
heap
page read and write
4710000
trusted library allocation
page read and write
452C000
stack
page read and write
46F0000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
910000
heap
page read and write
43CD000
trusted library allocation
page execute and read and write
4730000
heap
page execute and read and write
6D80000
trusted library allocation
page read and write
140BFCC1000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
25E004DE000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
7FFD34266000
trusted library allocation
page read and write
7FFD34256000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
7FFD34146000
trusted library allocation
page read and write
25E000A1000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
46DC000
trusted library allocation
page read and write
7FFD3425D000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
7FFD34430000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
25E007DF000
trusted library allocation
page read and write
2A866636000
unkown
page readonly
7FFD34150000
trusted library allocation
page execute and read and write
25E001B2000
trusted library allocation
page read and write
BFB8BFF000
stack
page read and write
484C000
stack
page read and write
4710000
trusted library allocation
page read and write
7160000
trusted library allocation
page read and write
2E5B000
stack
page read and write
7FFD340AD000
trusted library allocation
page execute and read and write
6DA0000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
4CEE000
stack
page read and write
6D80000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
7FFD342D7000
trusted library allocation
page read and write
1FE61A9A000
unkown
page readonly
46D0000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
D20EDE9000
stack
page read and write
4660000
trusted library allocation
page execute and read and write
D20CAFD000
stack
page read and write
2A87EE90000
heap
page execute and read and write
7FFD342D0000
trusted library allocation
page execute and read and write
4710000
trusted library allocation
page read and write
2F47000
heap
page read and write
4C0B000
trusted library allocation
page execute and read and write
7FFD341C0000
trusted library allocation
page execute and read and write
6D80000
trusted library allocation
page read and write
4721000
trusted library allocation
page read and write
25E6EA9C000
heap
page read and write
6D80000
trusted library allocation
page read and write
BFB95FE000
stack
page read and write
25E000D2000
trusted library allocation
page read and write
140D8324000
heap
page read and write
7FFD340B4000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
736E000
stack
page read and write
46D0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
3010000
heap
page read and write
6D80000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
49D0000
trusted library allocation
page read and write
29259420000
heap
page read and write
291BFE000
stack
page read and write
7FFD342B0000
trusted library allocation
page read and write
1BB81780000
heap
page read and write
7FFD34245000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4966000
trusted library allocation
page execute and read and write
6D90000
trusted library allocation
page read and write
1AD7AE30000
heap
page read and write
27F7000
stack
page read and write
4A10000
trusted library allocation
page read and write
72CE000
stack
page read and write
2A866680000
heap
page execute and read and write
2A87EDFB000
heap
page read and write
7FFD34240000
trusted library allocation
page read and write
1D0B90A0000
heap
page read and write
1D0B9225000
heap
page read and write
4710000
trusted library allocation
page read and write
1AD7BE90000
heap
page read and write
4720000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
25D5000
heap
page read and write
4710000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
25E6F293000
heap
page read and write
6D80000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
7FFD34156000
trusted library allocation
page execute and read and write
6D90000
trusted library allocation
page read and write
46B0000
trusted library allocation
page read and write
25CE000
stack
page read and write
1D0B92A9000
heap
page read and write
140D8396000
heap
page read and write
1D0D351B000
heap
page read and write
140BF2E6000
heap
page read and write
7310000
heap
page read and write
7FFD34420000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
1AD7B110000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
D20DAEA000
stack
page read and write
6D80000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
25E6EEBF000
heap
page read and write
140D84C0000
heap
page execute and read and write
7FFD340C4000
trusted library allocation
page read and write
7355000
heap
page read and write
25E001BE000
trusted library allocation
page read and write
7FFD3408D000
trusted library allocation
page execute and read and write
1AD7AF65000
heap
page read and write
4710000
trusted library allocation
page read and write
4649000
trusted library allocation
page execute and read and write
2BFB000
heap
page read and write
7022000
heap
page read and write
49F0000
trusted library allocation
page read and write
25E6F298000
heap
page read and write
31E8000
heap
page read and write
7FFD341BB000
trusted library allocation
page execute and read and write
7FFD340AD000
trusted library allocation
page execute and read and write
7FFD340A4000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
9D67CFE000
stack
page read and write
49F0000
trusted library allocation
page read and write
5E85000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
25E007AF000
trusted library allocation
page read and write
47CE000
stack
page read and write
7FFD34240000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
7FFD34093000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
7FFD34294000
trusted library allocation
page read and write
52DB8FD000
stack
page read and write
6E20000
heap
page read and write
6D90000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4D41000
trusted library allocation
page read and write
71C0000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
1FE48AA9000
heap
page read and write
9D677FE000
stack
page read and write
4AC6000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
2B4F000
stack
page read and write
7380000
heap
page read and write
7FFD34291000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
7FFD343A0000
trusted library allocation
page execute and read and write
4720000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
25E6ED90000
heap
page read and write
731A000
heap
page read and write
AE1C2FE000
stack
page read and write
7FFD34220000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
2F695E1000
stack
page read and write
140CFB81000
trusted library allocation
page read and write
4BC4000
trusted library allocation
page read and write
31D3000
heap
page read and write
2FA5000
heap
page read and write
6C00000
remote allocation
page read and write
D20C829000
stack
page read and write
25E6E020000
heap
page execute and read and write
6FCE000
stack
page read and write
4710000
trusted library allocation
page read and write
4B93000
trusted library allocation
page execute and read and write
4710000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
25E6F090000
heap
page execute and read and write
25E00826000
trusted library allocation
page read and write
2540000
heap
page read and write
46F0000
trusted library allocation
page read and write
D20EFEC000
stack
page read and write
6D7E000
stack
page read and write
25E6EE67000
heap
page read and write
292596F5000
heap
page read and write
6DA0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
2A865E80000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
D20D1FD000
stack
page read and write
6D80000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
2916FE000
stack
page read and write
1AD7BE86000
heap
page read and write
D20E7EC000
stack
page read and write
46D0000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
7FFD34092000
trusted library allocation
page read and write
6D81000
trusted library allocation
page read and write
4A20000
heap
page execute and read and write
4710000
trusted library allocation
page read and write
570000
heap
page read and write
6DA0000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
7FFD34270000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
D20E1E8000
stack
page read and write
6D80000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
9D680FE000
stack
page read and write
46D0000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
2F6A3FE000
stack
page read and write
44A0000
heap
page read and write
496E000
stack
page read and write
4710000
trusted library allocation
page read and write
2C27000
heap
page read and write
7FFD34094000
trusted library allocation
page read and write
1FE61C30000
heap
page execute and read and write
2A8667BC000
trusted library allocation
page read and write
7FFD34082000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
BFB8FFE000
stack
page read and write
25E0055B000
trusted library allocation
page read and write
25E0082C000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
4470000
heap
page readonly
4BD0000
trusted library allocation
page read and write
25E6DA60000
heap
page read and write
46F3000
trusted library allocation
page execute and read and write
6A80000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4711000
trusted library allocation
page read and write
7FFD34070000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
D20DFE8000
stack
page read and write
4A00000
trusted library allocation
page read and write
7FFD34120000
trusted library allocation
page read and write
AE1BEFF000
stack
page read and write
5A31000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
46D5000
trusted library allocation
page read and write
D20F0E9000
stack
page read and write
4A8D000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
43C4000
trusted library allocation
page read and write
4CDC000
stack
page read and write
25E6EEB7000
heap
page read and write
25E6F250000
heap
page read and write
4710000
trusted library allocation
page read and write
915000
heap
page read and write
7FFD34276000
trusted library allocation
page read and write
D20F1E9000
stack
page read and write
46F0000
trusted library allocation
page read and write
7FFD34330000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
7FFD3413C000
trusted library allocation
page execute and read and write
6DA0000
trusted library allocation
page read and write
2A865C00000
heap
page read and write
25E00206000
trusted library allocation
page read and write
25E6EB20000
trusted library allocation
page read and write
1FE59241000
trusted library allocation
page read and write
1BB81385000
heap
page read and write
7FFD34280000
trusted library allocation
page read and write
25E6F162000
unkown
page readonly
7FFD340C0000
trusted library allocation
page read and write
4700000
trusted library allocation
page read and write
1D0B91D0000
heap
page read and write
46D0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
4C6F000
stack
page read and write
4646000
trusted library allocation
page execute and read and write
2D06000
heap
page read and write
4710000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
7FFD34300000
trusted library allocation
page execute and read and write
1BB811AB000
heap
page read and write
AE1C0FF000
stack
page read and write
6D80000
trusted library allocation
page read and write
294E000
stack
page read and write
1FE49381000
trusted library allocation
page read and write
7FFD34150000
trusted library allocation
page read and write
734A000
heap
page read and write
2F69DFE000
stack
page read and write
4710000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
4805000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
7FFD3408D000
trusted library allocation
page execute and read and write
2923FC000
stack
page read and write
4727000
trusted library allocation
page execute and read and write
4720000
trusted library allocation
page read and write
25E10001000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
52DBFFD000
stack
page read and write
4710000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
7FFD340FC000
trusted library allocation
page execute and read and write
6D80000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
7FFD34160000
trusted library allocation
page execute and read and write
6D80000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
1FE61A02000
unkown
page readonly
25E6EF8D000
heap
page read and write
1FE61B61000
heap
page read and write
1D0D34C9000
heap
page read and write
7FFD342D0000
trusted library allocation
page read and write
BFB87F1000
stack
page read and write
4710000
trusted library allocation
page read and write
25E003D4000
trusted library allocation
page read and write
2F0C000
heap
page read and write
4710000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6FBE000
stack
page read and write
4710000
trusted library allocation
page read and write
25E00189000
trusted library allocation
page read and write
4AF5000
trusted library allocation
page read and write
6D3E000
stack
page read and write
25E00067000
trusted library allocation
page read and write
7FFD340B3000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
2A865BF0000
heap
page read and write
7FFD342D0000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
1AD1000D000
trusted library allocation
page read and write
25E6F301000
heap
page read and write
6D80000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
2B70000
heap
page read and write
7FFD34130000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
7FFD34440000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
7FFD34243000
trusted library allocation
page read and write
1D0BAED8000
trusted library allocation
page read and write
25E6F27F000
heap
page read and write
6DC0000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
25E6EDF6000
heap
page read and write
1AD7AC30000
heap
page read and write
4720000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
2A866621000
unkown
page readonly
6DA0000
trusted library allocation
page read and write
1BB9A19A000
heap
page read and write
4710000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
46E0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
1FE48CD5000
heap
page read and write
4710000
trusted library allocation
page read and write
4880000
heap
page read and write
46F0000
trusted library allocation
page read and write
7FFD3422C000
trusted library allocation
page read and write
2CEB000
heap
page read and write
292594B0000
heap
page read and write
7FFD34233000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
2F69CFE000
stack
page read and write
46D0000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
7FFD340C4000
trusted library allocation
page read and write
25E000C1000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
292594B8000
heap
page read and write
1AD10011000
trusted library allocation
page read and write
7FFD342A0000
trusted library allocation
page read and write
31B0000
heap
page read and write
1D0B91A0000
heap
page read and write
7FFD34300000
trusted library allocation
page execute and read and write
6D90000
trusted library allocation
page read and write
7FFD342D0000
trusted library allocation
page read and write
440B000
trusted library allocation
page execute and read and write
46B0000
trusted library allocation
page read and write
2A86661F000
unkown
page readonly
4720000
trusted library allocation
page read and write
25E0054E000
trusted library allocation
page read and write
7FFD341CB000
trusted library allocation
page execute and read and write
45F0000
heap
page read and write
49F0000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
4640000
trusted library allocation
page read and write
1FE4935C000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
7FFD34280000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
1FE61B42000
heap
page read and write
6DA0000
trusted library allocation
page read and write
1AD7ACBD000
heap
page read and write
1D0BAEDA000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
46D5000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
D20CDFE000
stack
page read and write
25E6D886000
heap
page read and write
140BF3F0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6E1E000
stack
page read and write
46F0000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
1D0B8FF0000
unkown
page readonly
700E000
heap
page read and write
6D80000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
7FFD34281000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
7FFD34290000
trusted library allocation
page read and write
25E004E0000
trusted library allocation
page read and write
1BB81196000
heap
page read and write
1FE48960000
unkown
page readonly
50C000
stack
page read and write
1AD7B5A0000
heap
page execute and read and write
4BC0000
trusted library allocation
page read and write
140CFB7D000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
4740000
trusted library allocation
page read and write
1FE61A6B000
unkown
page readonly
4A10000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
703D000
heap
page read and write
1FE48A64000
heap
page read and write
7FFD34250000
trusted library allocation
page read and write
52DB5FF000
stack
page read and write
4A10000
trusted library allocation
page read and write
25E6EDF8000
heap
page read and write
7FFD34235000
trusted library allocation
page read and write
4630000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
25E1000E000
trusted library allocation
page read and write
25E6EA16000
heap
page read and write
7FFD34093000
trusted library allocation
page execute and read and write
6D80000
trusted library allocation
page read and write
BFB92FE000
stack
page read and write
7FFD342A9000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
7FFD340C4000
trusted library allocation
page read and write
D20D0E9000
stack
page read and write
46F0000
trusted library allocation
page read and write
4725000
trusted library allocation
page execute and read and write
2BBE000
stack
page read and write
4407000
trusted library allocation
page execute and read and write
25E6E200000
trusted library allocation
page read and write
4B94000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
2A8665D2000
unkown
page readonly
49F0000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
3212000
heap
page read and write
4B90000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
46D5000
trusted library allocation
page read and write
3140000
heap
page read and write
6D80000
trusted library allocation
page read and write
7164000
trusted library allocation
page read and write
25E00558000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
1FE49220000
heap
page read and write
30EF000
stack
page read and write
6D80000
trusted library allocation
page read and write
4E20000
heap
page execute and read and write
46F0000
trusted library allocation
page read and write
140BFCB3000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
25E0016D000
trusted library allocation
page read and write
2B0D000
stack
page read and write
2BE0000
heap
page read and write
46D0000
trusted library allocation
page read and write
AE1B7FE000
stack
page read and write
9D681FD000
stack
page read and write
49F0000
trusted library allocation
page read and write
1FE61A67000
unkown
page readonly
2960000
heap
page read and write
3010000
heap
page read and write
49AF000
stack
page read and write
46D0000
trusted library allocation
page read and write
25E6DC65000
heap
page read and write
43C3000
trusted library allocation
page execute and read and write
6D80000
trusted library allocation
page read and write
4E02000
heap
page read and write
4710000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
140BF450000
heap
page read and write
4A10000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
2F9D000
stack
page read and write
25E0072E000
trusted library allocation
page read and write
25E0023A000
trusted library allocation
page read and write
7FFD342D4000
trusted library allocation
page read and write
7190000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
7FFD340A0000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
7FFD34084000
trusted library allocation
page read and write
D1A9ABC000
stack
page read and write
6D90000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
1AD7BE4F000
heap
page read and write
7FFD342E0000
trusted library allocation
page execute and read and write
7FFD340CD000
trusted library allocation
page execute and read and write
46F0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
7FFD34290000
trusted library allocation
page read and write
1FE61A89000
unkown
page readonly
1D0D34CD000
heap
page read and write
25E007A7000
trusted library allocation
page read and write
7F028000
trusted library allocation
page execute and read and write
49F0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
25E001BA000
trusted library allocation
page read and write
4488000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
D20DCFB000
stack
page read and write
D1A9BBF000
stack
page read and write
7200000
trusted library allocation
page read and write
5745000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
4963000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
7FFD34290000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
2F0F000
stack
page read and write
4710000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
4C33000
heap
page read and write
7FFD341B0000
trusted library allocation
page execute and read and write
43D4000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
1FE61A70000
unkown
page readonly
4710000
trusted library allocation
page read and write
25E00203000
trusted library allocation
page read and write
7FFD342E0000
trusted library allocation
page execute and read and write
7FFD340AD000
trusted library allocation
page execute and read and write
49F5000
trusted library allocation
page read and write
4700000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
45D0000
trusted library section
page read and write
2B90000
heap
page read and write
7FFD340B3000
trusted library allocation
page read and write
4DD3000
trusted library allocation
page read and write
7FFD340A4000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
71CD000
stack
page read and write
2A876691000
trusted library allocation
page read and write
4B80000
trusted library section
page read and write
7FFD34230000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
7FF410460000
trusted library allocation
page execute and read and write
1D0D348E000
heap
page read and write
2A8666CF000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
9D67FFE000
stack
page read and write
1D0B91D5000
heap
page read and write
6D80000
trusted library allocation
page read and write
308E000
stack
page read and write
49F0000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
6F00000
heap
page execute and read and write
46F0000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
7FFD34280000
trusted library allocation
page execute and read and write
6D80000
trusted library allocation
page read and write
1BB9A222000
heap
page read and write
2E98000
stack
page read and write
1FE4935F000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
496C000
trusted library allocation
page execute and read and write
7FFD34260000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
7FFD3425D000
trusted library allocation
page read and write
25E000DE000
trusted library allocation
page read and write
D20F3EC000
stack
page read and write
2E8E000
stack
page read and write
4710000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
2B0E000
stack
page read and write
4710000
trusted library allocation
page read and write
25E00304000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
2F25000
heap
page read and write
7FFD340BB000
trusted library allocation
page execute and read and write
4A10000
trusted library allocation
page read and write
7FFD34298000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
4A2E000
stack
page read and write
6A80000
trusted library allocation
page read and write
25E00830000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
1BB81140000
heap
page read and write
7FFD340CB000
trusted library allocation
page execute and read and write
49F0000
trusted library allocation
page read and write
7FFD34243000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
25E00090000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
4CE0000
trusted library allocation
page execute and read and write
1D0D372F000
heap
page read and write
7FFD34190000
trusted library allocation
page execute and read and write
4BB0000
heap
page read and write
25E6EF86000
heap
page read and write
46F0000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
2A20000
heap
page read and write
25E000D6000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page read and write
140CFB71000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
7FFD340AB000
trusted library allocation
page execute and read and write
4710000
trusted library allocation
page read and write
25E001AE000
trusted library allocation
page read and write
25E6F140000
heap
page read and write
7FFD34275000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
45DE000
stack
page read and write
2A865CDA000
heap
page read and write
6D80000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
7FFD340EC000
trusted library allocation
page execute and read and write
4B80000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
4860000
trusted library allocation
page read and write
1BB9A150000
heap
page read and write
4720000
trusted library allocation
page read and write
2A866649000
unkown
page readonly
318E000
stack
page read and write
1D0D375D000
heap
page read and write
46D0000
trusted library allocation
page read and write
25E007DB000
trusted library allocation
page read and write
7FFD340BD000
trusted library allocation
page execute and read and write
1AD7BE21000
heap
page read and write
6D80000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
7FFD34266000
trusted library allocation
page read and write
29A3000
heap
page read and write
1D0CAD61000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
347F000
stack
page read and write
6D80000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
45E0000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
1BB81370000
heap
page read and write
4A10000
trusted library allocation
page read and write
7FFD3424E000
trusted library allocation
page read and write
7FFD34216000
trusted library allocation
page read and write
1D0B91E0000
heap
page read and write
4C70000
heap
page readonly
BFB94FD000
stack
page read and write
95E000
stack
page read and write
1FE48BF0000
heap
page read and write
6D80000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
D20E2E9000
stack
page read and write
25E00185000
trusted library allocation
page read and write
4402000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
27BB000
stack
page read and write
46F4000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
1D0D35F4000
unkown
page readonly
46D0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
D20D7FC000
stack
page read and write
46D0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
7FFD340A8000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
4ACB000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
140D832A000
heap
page read and write
6A80000
trusted library allocation
page read and write
4700000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
47D3000
trusted library allocation
page read and write
D20E4EB000
stack
page read and write
7FFD34098000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
4C20000
trusted library allocation
page read and write
4AC3000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
4D30000
heap
page execute and read and write
7330000
heap
page read and write
7FFD340A2000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
29A5000
heap
page read and write
46F0000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
1FE61B27000
heap
page read and write
726E000
stack
page read and write
1FE61A87000
unkown
page readonly
25E6DF83000
trusted library allocation
page read and write
BFB8EFF000
stack
page read and write
1AD7AC9B000
heap
page read and write
6D80000
trusted library allocation
page read and write
7EF60000
trusted library allocation
page execute and read and write
4710000
trusted library allocation
page read and write
1BB81963000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
33A0000
heap
page read and write
6D80000
trusted library allocation
page read and write
25E6EB92000
unkown
page readonly
4720000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
7F248000
trusted library allocation
page execute and read and write
2A21000
heap
page read and write
46F0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
140BF301000
heap
page read and write
140BFBAF000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
1D0D3710000
heap
page read and write
46F0000
trusted library allocation
page read and write
7FFD34450000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
7FFD3426A000
trusted library allocation
page read and write
6E20000
remote allocation
page read and write
46F0000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
7FFD342B9000
trusted library allocation
page read and write
140D82E0000
heap
page read and write
31E1000
heap
page read and write
7FFD34299000
trusted library allocation
page read and write
704E000
stack
page read and write
7FFD34186000
trusted library allocation
page execute and read and write
4A78000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
2D07000
heap
page read and write
46F0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
1FE61A72000
unkown
page readonly
49F0000
trusted library allocation
page read and write
2ACF000
stack
page read and write
4710000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
2A865D8A000
heap
page read and write
49F0000
trusted library allocation
page read and write
7FFD34340000
trusted library allocation
page read and write
49F5000
trusted library allocation
page read and write
327D000
stack
page read and write
4720000
trusted library allocation
page read and write
4711000
trusted library allocation
page read and write
AE1B6F1000
stack
page read and write
7FFD340BD000
trusted library allocation
page execute and read and write
43B0000
trusted library allocation
page read and write
1BB9A1E8000
heap
page read and write
1FE61A54000
unkown
page readonly
25E000A6000
trusted library allocation
page read and write
4643000
trusted library allocation
page read and write
6F8D000
stack
page read and write
7FA40000
trusted library allocation
page execute and read and write
7FFD34290000
trusted library allocation
page read and write
1BB811BB000
heap
page read and write
471E000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
52DB7FE000
stack
page read and write
2A87ED68000
heap
page read and write
4710000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4990000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
1AD10001000
trusted library allocation
page read and write
3190000
heap
page read and write
7FFD34270000
trusted library allocation
page read and write
700E000
stack
page read and write
1FE61A21000
unkown
page readonly
4791000
trusted library allocation
page read and write
D20CEFE000
stack
page read and write
7FFD34210000
trusted library allocation
page read and write
25E6EF89000
heap
page read and write
BFB93FF000
stack
page read and write
6D90000
trusted library allocation
page read and write
140BFCC5000
trusted library allocation
page read and write
25E007EF000
trusted library allocation
page read and write
7FFD34280000
trusted library allocation
page read and write
4A91000
trusted library allocation
page read and write
2BCE000
stack
page read and write
6DA0000
trusted library allocation
page read and write
1AD7BE8E000
heap
page read and write
1FE61A6E000
unkown
page readonly
7F010000
trusted library allocation
page execute and read and write
6D80000
trusted library allocation
page read and write
25E00191000
trusted library allocation
page read and write
25E00564000
trusted library allocation
page read and write
2A87EDFF000
heap
page read and write
7FFD34080000
trusted library allocation
page read and write
1FE61A83000
unkown
page readonly
140BF455000
heap
page read and write
46D9000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
D20D9E9000
stack
page read and write
4A10000
trusted library allocation
page read and write
25E6EE89000
heap
page read and write
2A87ED77000
heap
page read and write
46D0000
trusted library allocation
page read and write
2FA0000
heap
page read and write
1D0BACA3000
heap
page read and write
46F0000
trusted library allocation
page read and write
4710000
trusted library allocation
page execute and read and write
462D000
trusted library allocation
page execute and read and write
140BF410000
trusted library allocation
page read and write
25E007A9000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
1D0BACB0000
heap
page read and write
140BF31D000
heap
page read and write
7FFD3426D000
trusted library allocation
page read and write
31DB000
heap
page read and write
25E00058000
trusted library allocation
page read and write
140D82F6000
heap
page read and write
1BB9A2D0000
heap
page execute and read and write
49F0000
trusted library allocation
page read and write
7FFD342E0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
140D82E3000
heap
page read and write
46F0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
4B04000
trusted library allocation
page read and write
2BFB000
heap
page read and write
7FFD340FC000
trusted library allocation
page execute and read and write
25E001A6000
trusted library allocation
page read and write
7180000
trusted library allocation
page read and write
7FFD34260000
trusted library allocation
page read and write
1FE61AAC000
unkown
page readonly
4710000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
4714000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
1D0D34FC000
heap
page read and write
7FFD34230000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
9D676F1000
stack
page read and write
25E6F28F000
heap
page read and write
7FFD340A3000
trusted library allocation
page read and write
4960000
trusted library allocation
page read and write
6B3E000
stack
page read and write
5E81000
trusted library allocation
page read and write
44EE000
stack
page read and write
2A8665F4000
unkown
page readonly
4A10000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
25E0082A000
trusted library allocation
page read and write
AE1B8FE000
stack
page read and write
1BB811B9000
heap
page read and write
490E000
stack
page read and write
D20F5E9000
stack
page read and write
7FFD3415C000
trusted library allocation
page execute and read and write
6D80000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
3520000
heap
page read and write
D20E5EB000
stack
page read and write
52DB9FE000
stack
page read and write
730E000
stack
page read and write
4710000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
1D0D3508000
heap
page read and write
7370000
heap
page execute and read and write
1AD00155000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
2F699FE000
stack
page read and write
1D0D378D000
heap
page read and write
7FFD34176000
trusted library allocation
page execute and read and write
6D90000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
BFB90FE000
stack
page read and write
31BA000
heap
page read and write
7FFD34285000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
7FFD34150000
trusted library allocation
page read and write
7FFD341A0000
trusted library allocation
page execute and read and write
1FE48C30000
heap
page read and write
1D0B9014000
unkown
page readonly
46D0000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
34FF000
stack
page read and write
1BB81120000
heap
page read and write
7FFD34299000
trusted library allocation
page read and write
7FFD34083000
trusted library allocation
page execute and read and write
4710000
trusted library allocation
page read and write
1BB81040000
heap
page read and write
7FFD340C0000
trusted library allocation
page read and write
25E007E7000
trusted library allocation
page read and write
2922FC000
stack
page read and write
2A865CEC000
heap
page read and write
6CBE000
stack
page read and write
46F0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
25E00232000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
7FFD340A0000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
4B70000
heap
page read and write
D20F2EC000
stack
page read and write
9D682FE000
stack
page read and write
4950000
trusted library allocation
page read and write
1D0D34EA000
heap
page read and write
2A8667E1000
trusted library allocation
page read and write
7FFD340DC000
trusted library allocation
page execute and read and write
46F0000
trusted library allocation
page read and write
49ED000
stack
page read and write
6C00000
remote allocation
page read and write
4710000
trusted library allocation
page read and write
D20D2FF000
stack
page read and write
46D0000
trusted library allocation
page read and write
4A8F000
stack
page read and write
4720000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
7FFD342A9000
trusted library allocation
page read and write
6D8E000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
25E6EDE9000
heap
page read and write
25E007E3000
trusted library allocation
page read and write
D1A9EFE000
stack
page read and write
6D80000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6E20000
remote allocation
page read and write
6D84000
trusted library allocation
page read and write
7FFD34223000
trusted library allocation
page read and write
7FFD340A3000
trusted library allocation
page execute and read and write
7FFD34166000
trusted library allocation
page execute and read and write
4A10000
trusted library allocation
page read and write
4E30000
trusted library allocation
page read and write
7FFD34320000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
1AD0003B000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
7FFD342A0000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
7FFD34230000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
6DA4000
trusted library allocation
page read and write
7FFD34094000
trusted library allocation
page read and write
7FFD34380000
trusted library allocation
page read and write
7FFD342A0000
trusted library allocation
page read and write
2F13000
heap
page read and write
2F69BFD000
stack
page read and write
2A86661A000
unkown
page readonly
140BFBAD000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
25E6F160000
unkown
page readonly
6D90000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
4714000
trusted library allocation
page read and write
52DBAFF000
stack
page read and write
6D80000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
2C4A000
heap
page read and write
1D0B9250000
trusted library allocation
page read and write
25E6DF70000
trusted library allocation
page read and write
7FFD34246000
trusted library allocation
page read and write
7FFD34186000
trusted library allocation
page execute and read and write
49F0000
trusted library allocation
page read and write
1FE61A85000
unkown
page readonly
D20EEE9000
stack
page read and write
2CD0000
heap
page read and write
4710000
trusted library allocation
page read and write
7FFD340CB000
trusted library allocation
page execute and read and write
31DC000
heap
page read and write
BFB8CFE000
stack
page read and write
A2F000
stack
page read and write
4710000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
25E007AD000
trusted library allocation
page read and write
960000
heap
page read and write
6A80000
trusted library allocation
page read and write
2A865E60000
trusted library allocation
page read and write
D20C73F000
stack
page read and write
49F0000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
1BB8185B000
trusted library allocation
page read and write
6A90000
trusted library allocation
page execute and read and write
2F698FE000
stack
page read and write
7FFD34136000
trusted library allocation
page read and write
2998000
heap
page read and write
4390000
trusted library section
page read and write
1D0D3562000
unkown
page readonly
2A865C20000
heap
page read and write
7FFD34260000
trusted library allocation
page read and write
1D0D3736000
heap
page read and write
7FFD340B0000
trusted library allocation
page read and write
4420000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
9D67AFD000
stack
page read and write
7FFD34130000
trusted library allocation
page execute and read and write
A6E000
stack
page read and write
6D80000
trusted library allocation
page read and write
24D7000
stack
page read and write
6D80000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
7FFD340BD000
trusted library allocation
page execute and read and write
D20D6FC000
stack
page read and write
46F0000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
4650000
trusted library allocation
page read and write
7FFD342F0000
trusted library allocation
page execute and read and write
2926FA000
stack
page read and write
6D80000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
25E000DA000
trusted library allocation
page read and write
9D67BFE000
stack
page read and write
2BC0000
heap
page read and write
7FFD34160000
trusted library allocation
page execute and read and write
6D80000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
1BB8185F000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
47A1000
trusted library allocation
page read and write
25E6DC60000
heap
page read and write
25E00434000
trusted library allocation
page read and write
7FFD34235000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
7FFD3425E000
trusted library allocation
page read and write
7FFD34156000
trusted library allocation
page read and write
25E0072C000
trusted library allocation
page read and write
49FC000
trusted library allocation
page read and write
2A865EE0000
heap
page read and write
4A10000
trusted library allocation
page read and write
2A865EE5000
heap
page read and write
7FFD342BE000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
2A865CB6000
heap
page read and write
6DA0000
trusted library allocation
page read and write
7FFD342F0000
trusted library allocation
page execute and read and write
2EE0000
heap
page read and write
7FFD34370000
trusted library allocation
page read and write
4600000
heap
page read and write
25E6F2CD000
heap
page read and write
25E6F27D000
heap
page read and write
6D80000
trusted library allocation
page read and write
31DB000
heap
page read and write
1BB811CD000
heap
page read and write
6D90000
trusted library allocation
page read and write
1BB9A1B9000
heap
page read and write
25E6E064000
heap
page read and write
2A16000
heap
page read and write
46D0000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
2A8665C6000
unkown
page readonly
4A10000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
1BB811B1000
heap
page read and write
2914F5000
stack
page read and write
7FFD3427A000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
AE1BBFE000
stack
page read and write
43F0000
heap
page read and write
46D0000
trusted library allocation
page read and write
25E6F650000
heap
page read and write
4720000
trusted library allocation
page read and write
7FFD342AE000
trusted library allocation
page read and write
25E0083A000
trusted library allocation
page read and write
4431000
heap
page read and write
6D80000
trusted library allocation
page read and write
29259400000
heap
page read and write
4720000
trusted library allocation
page read and write
140BF180000
heap
page read and write
AE1BCFE000
stack
page read and write
1D0D373C000
heap
page read and write
46F0000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
7FFD34220000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
D20CCFF000
stack
page read and write
4A10000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
25E001C2000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
2A865CD2000
heap
page read and write
6D80000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
7FFD34093000
trusted library allocation
page execute and read and write
1FE48A10000
heap
page read and write
1D0D3530000
heap
page execute and read and write
1AD00151000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
47DB000
trusted library allocation
page read and write
1FE48A80000
heap
page read and write
4710000
trusted library allocation
page read and write
5FE000
unkown
page read and write
4710000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
D20D47E000
stack
page read and write
6D70000
trusted library allocation
page read and write
4DF9000
trusted library allocation
page execute and read and write
D20EAEC000
stack
page read and write
6D90000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
2A8D000
stack
page read and write
46F0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
3310000
heap
page read and write
4710000
trusted library allocation
page read and write
4E10000
trusted library allocation
page execute and read and write
6D90000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
7FFD340B0000
trusted library allocation
page read and write
7FFD34126000
trusted library allocation
page read and write
4BE0000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
25E6E9D0000
heap
page read and write
46F0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
6C30000
heap
page execute and read and write
6D80000
trusted library allocation
page read and write
1FE49385000
trusted library allocation
page read and write
7FFD34233000
trusted library allocation
page read and write
4832000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
25E10013000
trusted library allocation
page read and write
47D6000
trusted library allocation
page read and write
7FFD34252000
trusted library allocation
page read and write
2C26000
heap
page read and write
4A10000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
7FFD342A7000
trusted library allocation
page read and write
480E000
stack
page read and write
6D80000
trusted library allocation
page read and write
4BCB000
trusted library allocation
page execute and read and write
7FFD342E0000
trusted library allocation
page execute and read and write
6D80000
trusted library allocation
page read and write
7033000
heap
page read and write
D20CFF5000
stack
page read and write
6D80000
trusted library allocation
page read and write
1FE61A13000
unkown
page readonly
46FD000
trusted library allocation
page execute and read and write
D20CBFE000
stack
page read and write
2A866605000
unkown
page readonly
49F0000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
1FE61A15000
unkown
page readonly
298D000
heap
page read and write
46D0000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
25E007B1000
trusted library allocation
page read and write
464C000
trusted library allocation
page execute and read and write
6D80000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
1BB81810000
heap
page execute and read and write
4704000
trusted library allocation
page read and write
2A8665C4000
unkown
page readonly
25E00092000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
3233000
heap
page read and write
140D8393000
heap
page read and write
4D2D000
stack
page read and write
25E6E050000
heap
page read and write
46F0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
52DB6FF000
stack
page read and write
49F4000
trusted library allocation
page read and write
25E00834000
trusted library allocation
page read and write
7FFD340EC000
trusted library allocation
page execute and read and write
4A10000
trusted library allocation
page read and write
2D0A000
heap
page read and write
BFB91FE000
stack
page read and write
1FE61B4C000
heap
page read and write
25E6F268000
heap
page read and write
6D80000
trusted library allocation
page read and write
1BB9A206000
heap
page read and write
4722000
trusted library allocation
page read and write
1FE48CC0000
heap
page execute and read and write
46F0000
trusted library allocation
page read and write
7FFD34260000
trusted library allocation
page read and write
2F6A0FE000
stack
page read and write
6D90000
trusted library allocation
page read and write
2BE8000
heap
page read and write
3525000
heap
page read and write
6D90000
trusted library allocation
page read and write
2C77000
heap
page read and write
49F0000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
9D67EFE000
stack
page read and write
7FFD342C0000
trusted library allocation
page read and write
2A866632000
unkown
page readonly
46D0000
trusted library allocation
page read and write
52DC0FE000
stack
page read and write
7FFD34266000
trusted library allocation
page read and write
3070000
heap
page read and write
33EE000
stack
page read and write
2B70000
heap
page read and write
49F0000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
4CA0000
heap
page read and write
4710000
trusted library allocation
page read and write
4980000
trusted library allocation
page execute and read and write
2A865D76000
heap
page read and write
4710000
trusted library allocation
page read and write
4A81000
trusted library allocation
page read and write
4814000
trusted library allocation
page read and write
1FE49373000
trusted library allocation
page read and write
7FFD34270000
trusted library allocation
page read and write
6F4E000
stack
page read and write
4C6E000
stack
page read and write
46D0000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
722E000
stack
page read and write
46F0000
trusted library allocation
page read and write
7FFD342B0000
trusted library allocation
page execute and read and write
46F0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
2A8667BF000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
1D0D3550000
heap
page execute and read and write
25E0005A000
trusted library allocation
page read and write
4E81000
trusted library allocation
page read and write
322B000
heap
page read and write
5D41000
trusted library allocation
page read and write
7FFD340A3000
trusted library allocation
page execute and read and write
7FFD34257000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
7FFD34240000
trusted library allocation
page read and write
4788000
trusted library allocation
page read and write
90E000
stack
page read and write
2A86664B000
unkown
page readonly
292596F0000
heap
page read and write
732E000
stack
page read and write
6D80000
trusted library allocation
page read and write
4DE0000
trusted library allocation
page read and write
7FFD34290000
trusted library allocation
page read and write
6C00000
heap
page read and write
4710000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
49F5000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
479D000
trusted library allocation
page read and write
2CD8000
heap
page read and write
4A10000
trusted library allocation
page read and write
7FFD340A3000
trusted library allocation
page execute and read and write
72AE000
stack
page read and write
2BE0000
heap
page read and write
4720000
trusted library allocation
page read and write
2A8666CD000
trusted library allocation
page read and write
25E00726000
trusted library allocation
page read and write
1FE4898C000
unkown
page readonly
D20E3F7000
stack
page read and write
2A8667E5000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
2F45000
heap
page read and write
4710000
trusted library allocation
page read and write
4570000
heap
page read and write
4969000
trusted library allocation
page execute and read and write
2A866025000
heap
page read and write
46D0000
trusted library allocation
page read and write
43A0000
trusted library section
page read and write
4A10000
trusted library allocation
page read and write
7FFD340A4000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
2C18000
heap
page read and write
4720000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
4670000
trusted library allocation
page read and write
D20E6E9000
stack
page read and write
4720000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
6A80000
trusted library allocation
page read and write
4873000
trusted library allocation
page read and write
7FFD3409B000
trusted library allocation
page execute and read and write
4710000
trusted library allocation
page read and write
25E004BA000
trusted library allocation
page read and write
7FFD34288000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
25E6EF5B000
heap
page read and write
1FE48E90000
heap
page read and write
6D80000
trusted library allocation
page read and write
31F6000
heap
page read and write
4710000
trusted library allocation
page read and write
9D678FE000
stack
page read and write
43D0000
trusted library allocation
page read and write
2915FE000
stack
page read and write
4E00000
trusted library allocation
page read and write
1AD0003F000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
4750000
heap
page readonly
7FFD342A0000
trusted library allocation
page execute and read and write
1D0BAED2000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
2C18000
heap
page read and write
291DFE000
stack
page read and write
1AD7ACAD000
heap
page read and write
7FFD34260000
trusted library allocation
page read and write
25E6DF80000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
7FFD3426D000
trusted library allocation
page read and write
7FFD3409D000
trusted library allocation
page execute and read and write
25E00728000
trusted library allocation
page read and write
25E6DF50000
trusted library allocation
page read and write
7FFD34140000
trusted library allocation
page execute and read and write
4BC0000
trusted library allocation
page read and write
7FFD34073000
trusted library allocation
page execute and read and write
4710000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
6EFF000
stack
page read and write
46F0000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
33F0000
heap
page read and write
6D80000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
6C7E000
stack
page read and write
1D0D34ED000
heap
page read and write
4D40000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
25E00063000
trusted library allocation
page read and write
339E000
stack
page read and write
6D80000
trusted library allocation
page read and write
471C000
trusted library allocation
page read and write
9EE000
stack
page read and write
6D90000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
7FFD34360000
trusted library allocation
page read and write
1D0B9230000
trusted library allocation
page read and write
4370000
heap
page read and write
4A10000
trusted library allocation
page read and write
1D0D3720000
heap
page read and write
49F0000
trusted library allocation
page read and write
4D8E000
stack
page read and write
4A10000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
25E003D6000
trusted library allocation
page read and write
70D0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
7FFD340AD000
trusted library allocation
page execute and read and write
7FFD34250000
trusted library allocation
page read and write
2E4F000
stack
page read and write
4710000
trusted library allocation
page read and write
25E6F2A7000
heap
page read and write
4A10000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
6DC0000
trusted library allocation
page read and write
1BB81375000
heap
page read and write
46F0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
2927FC000
stack
page read and write
4620000
trusted library allocation
page read and write
2917FE000
stack
page read and write
49F0000
trusted library allocation
page read and write
3500000
heap
page read and write
4710000
trusted library allocation
page read and write
25E0020A000
trusted library allocation
page read and write
25E007D9000
trusted library allocation
page read and write
25E00440000
trusted library allocation
page read and write
1BB9A208000
heap
page read and write
25E6EB90000
unkown
page readonly
2C24000
heap
page read and write
7FA58000
trusted library allocation
page execute and read and write
46F0000
trusted library allocation
page read and write
AE1B9FE000
stack
page read and write
494E000
stack
page read and write
49F0000
trusted library allocation
page read and write
7FFD34275000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
7FFD34146000
trusted library allocation
page read and write
D20DBE9000
stack
page read and write
4710000
trusted library allocation
page read and write
7FFD34090000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
25E000CA000
trusted library allocation
page read and write
140BFA10000
heap
page read and write
6D80000
trusted library allocation
page read and write
1FE48C80000
trusted library allocation
page read and write
456E000
stack
page read and write
49F0000
trusted library allocation
page read and write
1D0B8FF0000
unkown
page readonly
7FFD340A5000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
4822000
trusted library allocation
page read and write
7FFD340CC000
trusted library allocation
page execute and read and write
25E6EDE2000
heap
page read and write
4713000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page read and write
7FFD342A0000
trusted library allocation
page read and write
1AD7AE50000
heap
page read and write
BFB8DFD000
stack
page read and write
7FFD342F0000
trusted library allocation
page read and write
1D0BAC20000
heap
page read and write
49F0000
trusted library allocation
page read and write
30A5000
heap
page read and write
3588000
heap
page read and write
52DBCFE000
stack
page read and write
25E0018D000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
7FFD3409D000
trusted library allocation
page execute and read and write
4768000
trusted library allocation
page read and write
D20DDE9000
stack
page read and write
2924FE000
stack
page read and write
6D90000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
4710000
trusted library allocation
page read and write
478F000
trusted library allocation
page read and write
2A87EE0F000
heap
page read and write
140BF280000
heap
page read and write
7FFD34460000
trusted library allocation
page read and write
71B0000
trusted library allocation
page execute and read and write
4A10000
trusted library allocation
page read and write
2DBE000
stack
page read and write
4710000
trusted library allocation
page read and write
4DCE000
stack
page read and write
7FFD3429B000
trusted library allocation
page read and write
6AFE000
stack
page read and write
D20D5FD000
stack
page read and write
4A10000
trusted library allocation
page read and write
4D3E000
stack
page read and write
2A87669D000
trusted library allocation
page read and write
1FE61A69000
unkown
page readonly
25E000CE000
trusted library allocation
page read and write
140BF260000
heap
page read and write
52DBDFE000
stack
page read and write
2E8B000
stack
page read and write
7FFD34276000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
140D82FE000
heap
page read and write
25E000C5000
trusted library allocation
page read and write
4CC000
stack
page read and write
6D80000
trusted library allocation
page read and write
1BB8185D000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
25E0082E000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
1D0B92A7000
heap
page read and write
140BFB60000
heap
page execute and read and write
4A10000
trusted library allocation
page read and write
49F0000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
7FFD34270000
trusted library allocation
page read and write
4E70000
heap
page read and write
2DF0000
heap
page read and write
30A0000
heap
page read and write
7FFD34176000
trusted library allocation
page execute and read and write
4710000
trusted library allocation
page read and write
52DB4F1000
stack
page read and write
46D0000
trusted library allocation
page read and write
4826000
trusted library allocation
page read and write
1AD7AC40000
heap
page read and write
6AA0000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
1AD0012F000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
7FFD34095000
trusted library allocation
page read and write
7FFD342A9000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
AE1BAFD000
stack
page read and write
2A86661C000
unkown
page readonly
46D0000
trusted library allocation
page read and write
4BC7000
trusted library allocation
page execute and read and write
4710000
trusted library allocation
page read and write
1BB91831000
trusted library allocation
page read and write
7FFD34256000
trusted library allocation
page read and write
7FFD34282000
trusted library allocation
page read and write
4720000
trusted library allocation
page read and write
7000000
heap
page read and write
1D0BACA0000
heap
page read and write
4720000
trusted library allocation
page read and write
6CFE000
stack
page read and write
3580000
heap
page read and write
7FFD340A0000
trusted library allocation
page read and write
2984000
heap
page read and write
7FFD34156000
trusted library allocation
page read and write
7FFD3412C000
trusted library allocation
page execute and read and write
2A866616000
unkown
page readonly
4E40000
trusted library allocation
page read and write
7FFD3407D000
trusted library allocation
page execute and read and write
4A7F000
trusted library allocation
page read and write
7FFD34074000
trusted library allocation
page read and write
6D80000
trusted library allocation
page read and write
25E6F311000
heap
page read and write
46F0000
trusted library allocation
page read and write
25E6F260000
heap
page read and write
49F0000
trusted library allocation
page read and write
472B000
trusted library allocation
page execute and read and write
2AA0000
heap
page read and write
46D0000
trusted library allocation
page read and write
There are 2314 hidden memdumps, click here to show them.