IOC Report
Guidelines_for_Citizen_Safety.msi

loading gif

Files

File Path
Type
Category
Malicious
Guidelines_for_Citizen_Safety.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
initial sample
malicious
C:\Config.Msi\6c6862.rbs
data
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI6A36.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSI6A36.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI7013.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSI7013.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI87B3.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSI87B3.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI8A82.tmp
data
dropped
malicious
C:\Windows\Installer\MSIA9F5.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSIA9F5.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\System32\InstallUtil.InstallLog
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Windows\Temp\~DF9340E6CB357EA061.TMP
data
dropped
malicious
C:\Windows\Temp\~DF975FD2E2CDD5436E.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DFB8E4C2B6BEE736E9.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DFC5872F544B03548F.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DFD5E723F7AA2005AD.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DFE1D8FD4611557514.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallState
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.ini
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AteraAgent.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
CSV text
dropped
C:\Windows\Installer\6c6861.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\6c6863.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\MSI6A36.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI6A36.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI6A36.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI6A36.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI7013.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI7013.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI7013.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI7013.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI87B3.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI87B3.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI87B3.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI87B3.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI8A93.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI8B30.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI8C79.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIA9F5.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSIA9F5.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIA9F5.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIA9F5.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SourceHash{E732A0D7-A2F2-4657-AC41-B19742648E45}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1A374813EDB1A6631387E414D3E73232
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
data
modified
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BA74182F76F15A9CF514DEF352303C95
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
Certificate, Version=3
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
Certificate, Version=3
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1A374813EDB1A6631387E414D3E73232
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BA74182F76F15A9CF514DEF352303C95
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log
CSV text
dropped
C:\Windows\Temp\~DF42B9C6EAEAA644A5.TMP
data
modified
C:\Windows\Temp\~DF575961BC4E9CA65E.TMP
data
dropped
C:\Windows\Temp\~DF6A1563904250F70E.TMP
data
dropped
C:\Windows\Temp\~DF758395496BA8A518.TMP
data
dropped
C:\Windows\Temp\~DFA23B2DCAA65163F4.TMP
data
dropped
C:\Windows\Temp\~DFE81B0F49C0EE8808.TMP
data
dropped
\Device\ConDrv
JSON data
dropped
There are 75 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI6A36.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7105375 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI7013.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7106625 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI87B3.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7112656 11 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="paul.fraxom@yzistanbul.me" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000Kso2pIAB" /AgentId="2094f497-2e94-42f0-b27c-add7e377a9d2"
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSIA9F5.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7121500 33 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 2094f497-2e94-42f0-b27c-add7e377a9d2 "6be74508-e40c-4e94-a6e8-129eac28e456" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000Kso2pIAB
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 2094f497-2e94-42f0-b27c-add7e377a9d2 "76e20853-e7dd-41ac-a560-28cfe22d3466" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000Kso2pIAB
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 2094f497-2e94-42f0-b27c-add7e377a9d2 "209f7be2-df48-4eff-a817-c4dc20cdcd81" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000Kso2pIAB
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Guidelines_for_Citizen_Safety.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding DA0792725E6113A4C2EFC78428B5F22F
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding F2302B5C45E6CFD0540EEC21654A91D9 E Global\MSI0000
C:\Windows\SysWOW64\net.exe
"NET" STOP AteraAgent
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 STOP AteraAgent
C:\Windows\SysWOW64\taskkill.exe
"TaskKill.exe" /f /im AteraAgent.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 13 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://ps.atera.com/agentpackagesmac/AgentPackageWindowsUpdate/24.6/AgentPackageWindowsUpdate.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=3a79d35f-3aae-426f-91c8-7d16143c1d7a&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
13.232.67.198
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesckNTIALBACKOFF02ceca8-a958-11e5-bd8
unknown
http://schemas.datacontract.org
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/2094f497-2e94-42f0-b27c-add7e377a9d2/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=c6f3c309-b378-4eb6-be20-6f03325c221f&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
13.232.67.198
https://ps.atera.com/agentpackagesnet45/AgentPackageMarketplace/1.6/AgentPackageMarketplace.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=2a252f8a-196a-412e-bfc9-292322230586&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
13.232.67.198
https://agent-api.atera.com/Production/Agent/GetCommands)
unknown
https://agent-api.atera.com/Production/Agent/track-event
unknown
http://dl.google.com/googletalk/googletalk-setup.exe
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageADRemote/6.0/AgentPackageADRemote.zip
unknown
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageA0H
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/2094f497-2e94-42f0-b27c-add7e377a9d2/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=618f72e2-0dcf-4d40-b59c-d773fc1ae2ba&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
13.232.67.198
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=21b072dc-59f8-4574-823e-a233b13880ce&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
13.232.67.198
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/2094f497
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/2094f497-2e94-42f0-b27c-add7e377a9d2/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=f5557641-16d5-42d0-befc-2c3fa49ec144&tt=0&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
13.232.67.198
https://ps.pndsn.com/v2/presence/sub_key/subX
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/2094f497-2e94-42f0-b27c-add7e377a9d2/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=ec94d306-e989-460d-a2a2-e676241f4153&tr=31&tt=17324433440942418&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
13.232.67.198
https://agent-api.atera.com/Production/Agent/
unknown
http://schemas.datacontract.org/2004/07/System.ServiceProcess
unknown
http://wixtoolset.org
unknown
https://agent-api.atera.com/Production
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/2094f497-2e94-42f0-b27c-add7e377a9d2/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=5b5ff814-67d7-4f31-988a-3021f6dcca17&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
13.232.67.198
https://agent-api.aterDZ
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/2094f497-2e94-42f0-b27c-add7e377a9d2/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=78d657fe-250a-4458-990e-8db1804a62a6&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
13.232.67.198
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/20
unknown
https://ps.atera.com/agentpackageswin/AgentPackageRuntimeInstaller/13.0/AgentPackageRuntimeInstaller
unknown
http://acontrol.atera.com/
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/2094f497-2e94-42f0-b27c-add7e377a9d2/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=5c21410a-40ef-453f-8c5e-f80e3c3a9e9b&tr=31&tt=17324434351531129&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
13.232.67.198
https://agent-api.atera.com/Production/Agent/AgentStarting)
unknown
https://ps.pndsn.com
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageADRemote/6.0/AgentPackageADRemote.zip
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/2094
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/2094f497-2e94-42f0-b27c
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageNetworkDiscovery/23.9/AgentPackageNetworkDiscove
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=7cbe7b17-7f3f-4c8d-9d62-c19102ed6fde&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
13.232.67.198
http://agent-api.atera.com
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageSystemTools/27.8/AgentPackageSystemTools.zip
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/2094f497-2e94-42f0-b27c-add7e377a9d2/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=9cb19796-6c2e-41ce-9126-598ecc9d33d5&tt=0&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
13.232.67.198
http://schemas.datacontract.org/2004/07/
unknown
https://github.com/icsharpcode/SharpZipLib
unknown
https://ps.atera.com/agentpackageswin/AgentPackageNetworkDiscovery/15.0/AgentPackageNetworkDiscovery
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=2a252f8a-196a-412e-bfc9-292322230586
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=19414362-703b-464a-b6c7-07f45d92c533&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
13.232.67.198
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageAgentI
unknown
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=19414362-703b-464a-b6c7-07f45d92c533
unknown
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
unknown
https://agent-api.atera.com/Production/Agent/AcknowledgeCommands0H
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageTaskScheduler/17.2/AgentPackageTaskScheduler.zip
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageTicketing/30.1/AgentPackageTicketing.zip
unknown
https://agent-api.atera.com
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=03f53b61-ad6b-486d-8509-b0e195faf765&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
13.232.67.198
https://agent-api.atera.com/Production/Agent/AgentStarting
unknown
http://www.w3.oh
unknown
https://agent-api.atera.com/Production/Agent/GetCommands
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=b3f74bb1-6c6f-4d46-bcd1-dababeae95b1
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=2bb33ca5-3446-47a7-8747-dbbe274b3fa8
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/2094f497-2e94-42f0-b27c-add7e377a9d2/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=101aac48-536c-4c37-8daf-2942910eb004&tt=0&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
13.232.67.198
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=2bb33ca5-3446-47a7-8747-dbbe274b3fa8&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
13.232.67.198
https://agent-api.atera.com/
unknown
https://agent-api.atera.com/Production/Agent/GetRecurringPackages
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.Availability/13.0/Agent.Package.Availability.zip
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-1p
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=bf4acf61-3ccb-481c-8428-f2b8078e60c9&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
13.232.67.198
https://ps.atera.com/agentpackagesmac/AgentPackageRuntimeInstaller/1.5/AgentPackageRuntimeInstaller.
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.Watchdog/13.0/Agent.Package.Watchdog.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=b619f5c8-c13b-4e86-88e3-ba75e0e2aa5f
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=03f53b61-ad6b-486d-8509-b0e195faf765
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/38.0/AgentPackageAgentInformation.zip?7eC/6UeVMT2yOja7rugNNkxRTCpJ1tREDX7f6JkZ3OlpG2NJMgnOjIB/dqEJPBcv
108.158.75.93
https://ps.atera.com/agentpackagesnet45/Agent.Package.Availability/0.16/Agent.Package.Availability.z
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=b3f74bb1-6c6f-4d46-bcd1-dababeae95b1&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
13.232.67.198
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/2094f497-2e94-42f0-b27c-add7e377a9d2/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=b225017a-a518-407e-ba60-89916d0db242&tt=0&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
13.232.67.198
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/2094f497-2e94-42f0-b27c-add7e377a9d2/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=ebb1f16f-c11d-4880-8816-8b8ea69a0ee1&tr=31&tt=17324434182234301&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
13.232.67.198
https://ps.atera.com/agentpackagesnet45/AgentPackageHeartbeat/17.14/AgentPackageHeartbeat.zip0H
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageUpgradeAgent/27.6/AgentPackageUpgradeAgent.zip
unknown
https://ps.atera.com/agentpackagesmac/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
unknown
https://ps.atera.com/agentpackagesnet45/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
unknown
https://ps.atera.com/agentpackagesmac/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/2094f497-2e94-42f0-b27c-add7e377a9d2/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=b22252c6-c37c-49ec-8023-03bf78fe353a&tr=31&tt=17324434035400814&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
13.232.67.198
https://www.newtonsoft.com/json
unknown
https://agent-api.atera.com/Production/Agent/Age
unknown
http://wixtoolset.org/news/
unknown
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=21b072dc-59f8-4574-823e-a233b13880ce
unknown
https://ps.atera.com/agentpackageswin/AgentPackageAgentInformation/22.7/AgentPackageAgentInformation
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageOsUpdates/20.9/AgentPackageOsUpdates.zip
unknown
https://agent-api.aterD
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageNetworkDiscovery/13.0/AgentPackageNetworkDiscovery
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.IotPoc/13.0/Agent.Package.IotPoc.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=9d2bb483-a1d5-41c5-b567-c3f48ab6ed2c
unknown
https://agent-api.atera.com/Production/Agent/AcknowledgeCommands
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageTaskScheduler/13.0/AgentPackageTaskScheduler.zip
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageAgentInformation/38.0/AgentPackageAgentInformation
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/2094f497-2e94-42f0-b27c-add7e377a9d2/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=28392dc4-8934-4e46-983c-9a044d541e87&uuid=2094f497-2e94-42f0-b27c-add7e377a9d2
13.232.67.198
https://agent-api.P
unknown
http://www.w3.o
unknown
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageA
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ps.pndsn.com
13.232.67.198
bg.microsoft.map.fastly.net
199.232.210.172
s-part-0035.t-0009.t-msedge.net
13.107.246.63
d25btwd9wax8gu.cloudfront.net
108.158.75.93
fp2e7a.wpc.phicdn.net
192.229.221.95
windowsupdatebg.s.llnwi.net
178.79.238.0
ps.atera.com
unknown
agent-api.atera.com
unknown
time.windows.com
unknown

IPs

IP
Domain
Country
Malicious
108.158.75.93
d25btwd9wax8gu.cloudfront.net
United States
13.232.67.198
ps.pndsn.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6c6862.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6c6862.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\ATERA Networks\AteraAgent\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\ATERA Networks\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Features
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
AutoBackupLogFiles
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AteraAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
AccountId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
IntegratorLogin
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
CompanyId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
AgentId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
ServerName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AlphaAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
FileDirectory
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_USERS.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
FileDirectory
There are 135 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4726000
heap
page read and write
malicious
18896E70000
heap
page read and write
malicious
7FFB23AF0000
unkown
page read and write
malicious
2AC4FE22000
unkown
page readonly
malicious
188970C0000
heap
page read and write
malicious
188979FA000
trusted library allocation
page read and write
malicious
1588008C000
trusted library allocation
page read and write
malicious
2C453663000
trusted library allocation
page read and write
malicious
18896E78000
heap
page read and write
malicious
20EC378B000
heap
page read and write
malicious
188AFF9F000
heap
page read and write
malicious
18897FD3000
trusted library allocation
page read and write
malicious
158EC7A2000
unkown
page readonly
malicious
20EC40C3000
trusted library allocation
page read and write
malicious
20EC410F000
trusted library allocation
page read and write
malicious
2C452CC9000
heap
page read and write
malicious
2AC4FF4C000
heap
page read and write
malicious
7FFAAB4E4000
trusted library allocation
page read and write
malicious
15880135000
trusted library allocation
page read and write
malicious
188979BC000
trusted library allocation
page read and write
malicious
20EC3800000
heap
page read and write
malicious
158EF00F000
heap
page read and write
malicious
47E1000
trusted library allocation
page read and write
malicious
49D8000
heap
page read and write
malicious
20EC4051000
trusted library allocation
page read and write
malicious
2AC50642000
unkown
page readonly
malicious
2C453673000
trusted library allocation
page read and write
malicious
20EC40D3000
trusted library allocation
page read and write
malicious
18897F00000
trusted library allocation
page read and write
malicious
2AC50120000
heap
page read and write
malicious
188978D7000
trusted library allocation
page read and write
malicious
7FFB23AF0000
unkown
page read and write
malicious
44B9000
heap
page read and write
malicious
4119000
heap
page read and write
malicious
4BF4000
trusted library allocation
page read and write
malicious
158800B2000
trusted library allocation
page read and write
malicious
2C452D01000
heap
page read and write
malicious
2C4536AF000
trusted library allocation
page read and write
malicious
18897B47000
trusted library allocation
page read and write
malicious
4B51000
trusted library allocation
page read and write
malicious
2AC50701000
trusted library allocation
page read and write
malicious
20EC39E0000
heap
page read and write
malicious
15880089000
trusted library allocation
page read and write
malicious
158EC911000
heap
page read and write
malicious
20EC37AB000
heap
page read and write
malicious
188B003D000
heap
page read and write
malicious
2C4535F1000
trusted library allocation
page read and write
malicious
158EC97D000
heap
page read and write
malicious
15880166000
trusted library allocation
page read and write
malicious
1588017C000
trusted library allocation
page read and write
malicious
158800C9000
trusted library allocation
page read and write
malicious
20EC3770000
heap
page read and write
malicious
15880001000
trusted library allocation
page read and write
malicious
2C452CC0000
heap
page read and write
malicious
18896E20000
heap
page read and write
malicious
158EC8F4000
heap
page read and write
malicious
158ECC70000
heap
page read and write
malicious
2C453637000
trusted library allocation
page read and write
malicious
7FFB23AF0000
unkown
page read and write
malicious
7FFB23AF0000
unkown
page read and write
malicious
15880132000
trusted library allocation
page read and write
malicious
2AC50783000
trusted library allocation
page read and write
malicious
1889776E000
trusted library allocation
page read and write
malicious
4887000
trusted library allocation
page read and write
malicious
4329CF5000
stack
page read and write
malicious
2AC4FF00000
heap
page read and write
malicious
158EED07000
heap
page read and write
malicious
20EC37B3000
heap
page read and write
malicious
158EEC90000
heap
page read and write
malicious
18897944000
trusted library allocation
page read and write
malicious
2AC4FF09000
heap
page read and write
malicious
18897B33000
trusted library allocation
page read and write
malicious
18896EF4000
heap
page read and write
malicious
18896EAD000
heap
page read and write
malicious
7FFB23AF0000
unkown
page read and write
malicious
2C46BD60000
heap
page read and write
malicious
158ECB50000
heap
page read and write
malicious
158800BA000
trusted library allocation
page read and write
malicious
20EC4097000
trusted library allocation
page read and write
malicious
2C452D4A000
heap
page read and write
malicious
2C452F10000
heap
page read and write
malicious
158800B4000
trusted library allocation
page read and write
malicious
18897701000
trusted library allocation
page read and write
malicious
188B0344000
heap
page read and write
malicious
18897806000
trusted library allocation
page read and write
malicious
2C452CFD000
heap
page read and write
malicious
2AC4FEC0000
heap
page read and write
malicious
158EED7B000
heap
page read and write
malicious
158EC8D0000
heap
page read and write
malicious
188979E8000
trusted library allocation
page read and write
malicious
2AC50773000
trusted library allocation
page read and write
malicious
284B000
stack
page read and write
6BC0000
remote allocation
page read and write
46FC000
trusted library allocation
page execute and read and write
4790000
trusted library allocation
page read and write
7FFAAB350000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
188AFF8C000
heap
page read and write
6B20000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
7FFAAB506000
trusted library allocation
page read and write
6F20000
trusted library allocation
page read and write
49D0000
heap
page read and write
7FFAAB4E0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
7FFAAB540000
trusted library allocation
page execute and read and write
6F00000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
4770000
trusted library allocation
page read and write
2DE4000
heap
page read and write
4790000
trusted library allocation
page read and write
432A0FD000
stack
page read and write
6EF0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
E1D8AFE000
stack
page read and write
47B0000
trusted library allocation
page read and write
432A8FD000
stack
page read and write
48A5000
trusted library allocation
page read and write
2AC50855000
trusted library allocation
page read and write
23F0000
heap
page read and write
4B10000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
7FFAAB35D000
trusted library allocation
page execute and read and write
7FFAAB520000
trusted library allocation
page read and write
43F0CFE000
stack
page read and write
47B0000
trusted library allocation
page read and write
2AC69034000
heap
page read and write
6EC0000
trusted library allocation
page read and write
20EDC903000
heap
page read and write
6EC0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
7FFAAB650000
trusted library allocation
page read and write
67EE000
stack
page read and write
2AC500F0000
heap
page read and write
6EE0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
2C452CE6000
heap
page read and write
47D0000
heap
page read and write
7FFAAB580000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
432A3FE000
stack
page read and write
432B7E7000
stack
page read and write
4B10000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
158EEFFD000
heap
page read and write
20EC4040000
heap
page read and write
76E000
stack
page read and write
6B20000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
188970B0000
trusted library allocation
page read and write
2AC68F7C000
unkown
page readonly
6F00000
trusted library allocation
page read and write
4320000
trusted library allocation
page read and write
7FFAAB4E6000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
18897FAA000
trusted library allocation
page read and write
4AB0000
trusted library allocation
page read and write
188977D4000
trusted library allocation
page read and write
9DD000
stack
page read and write
6EE0000
trusted library allocation
page read and write
2AC5082F000
trusted library allocation
page read and write
43EE000
stack
page read and write
465E000
stack
page read and write
6EE0000
trusted library allocation
page read and write
545000
heap
page read and write
6EF0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
7FFAAB35D000
trusted library allocation
page execute and read and write
5435000
trusted library allocation
page read and write
7FFAAB34D000
trusted library allocation
page execute and read and write
4720000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
41C9DFE000
stack
page read and write
1889778C000
trusted library allocation
page read and write
6B2C000
trusted library allocation
page read and write
7FFAAB590000
trusted library allocation
page read and write
158EEFE4000
heap
page read and write
6B20000
trusted library allocation
page read and write
7FFAAB4FD000
trusted library allocation
page read and write
4926000
heap
page read and write
188977EC000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
188977CC000
trusted library allocation
page read and write
1A1142E8000
heap
page read and write
158EE5C0000
heap
page execute and read and write
7FFAAB4FE000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
457F000
stack
page read and write
2F0C000
heap
page read and write
6EC0000
trusted library allocation
page read and write
46F3000
trusted library allocation
page read and write
990000
heap
page read and write
47B0000
trusted library allocation
page read and write
6DA0000
trusted library allocation
page read and write
483D000
trusted library allocation
page read and write
18896EAF000
heap
page read and write
6EE0000
trusted library allocation
page read and write
487E000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
432AFFC000
stack
page read and write
6B30000
trusted library allocation
page read and write
48B4000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
41F0000
trusted library allocation
page execute and read and write
7FFAAB570000
trusted library allocation
page read and write
7FFAAB406000
trusted library allocation
page execute and read and write
4B10000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
18896EB7000
heap
page read and write
C48000
heap
page read and write
29E0000
heap
page read and write
6EC0000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
7FFAAB363000
trusted library allocation
page read and write
7EED0000
trusted library allocation
page execute and read and write
4790000
trusted library allocation
page read and write
2D8E000
stack
page read and write
4710000
trusted library allocation
page execute and read and write
709E000
stack
page read and write
6B20000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
1889789F000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
2C452CA0000
heap
page read and write
432A5E9000
stack
page read and write
158EE5B0000
heap
page execute and read and write
4AE0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
504E000
stack
page read and write
47B0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
43F06FB000
stack
page read and write
6B20000
trusted library allocation
page read and write
2970000
heap
page read and write
6B40000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
158EC850000
heap
page read and write
4700000
trusted library allocation
page read and write
3165000
heap
page read and write
6B20000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
2C46BDF2000
heap
page read and write
2E80000
trusted library allocation
page read and write
2AC4FE4C000
unkown
page readonly
6EC0000
trusted library allocation
page read and write
7E0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
432ADE7000
stack
page read and write
4B10000
trusted library allocation
page read and write
7FFAAB509000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4588000
trusted library allocation
page read and write
15880178000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
2E58000
heap
page read and write
7FFAAB4E0000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
2C45362D000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
18897040000
heap
page read and write
6B20000
trusted library allocation
page read and write
18897FBD000
trusted library allocation
page read and write
70A0000
heap
page read and write
4610000
heap
page read and write
6EE0000
trusted library allocation
page read and write
4329E37000
stack
page read and write
18897580000
heap
page execute and read and write
7FFAAB353000
trusted library allocation
page read and write
295E000
stack
page read and write
20EC3700000
heap
page read and write
1889776A000
trusted library allocation
page read and write
6D1E000
stack
page read and write
6B20000
trusted library allocation
page read and write
3162000
heap
page read and write
47B0000
trusted library allocation
page read and write
43F05FE000
stack
page read and write
6EC0000
trusted library allocation
page read and write
46DE000
stack
page read and write
7FFAAB344000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
7FFAAB36D000
trusted library allocation
page execute and read and write
18897F57000
trusted library allocation
page read and write
D50000
heap
page read and write
6EE0000
trusted library allocation
page read and write
20EC408B000
trusted library allocation
page read and write
188977DC000
trusted library allocation
page read and write
6B44000
trusted library allocation
page read and write
7FFAAB4E0000
trusted library allocation
page read and write
44BB000
trusted library allocation
page execute and read and write
2CF5000
heap
page read and write
4B10000
trusted library allocation
page read and write
6B23000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
2EEA000
heap
page read and write
7FFAAB33D000
trusted library allocation
page execute and read and write
6B20000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
43F15FE000
stack
page read and write
6B20000
trusted library allocation
page read and write
432C5FE000
stack
page read and write
6EF0000
trusted library allocation
page read and write
2D60000
trusted library allocation
page read and write
CB0CCFE000
stack
page read and write
2FB2000
heap
page read and write
6EC0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
7FFAAB503000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
2C4635FD000
trusted library allocation
page read and write
188976A0000
heap
page execute and read and write
7FFAAB32D000
trusted library allocation
page execute and read and write
6B21000
trusted library allocation
page read and write
188A770E000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
4828000
trusted library allocation
page read and write
18897F53000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
495E000
stack
page read and write
6EE0000
trusted library allocation
page read and write
158EC860000
heap
page read and write
2F22000
heap
page read and write
4329FFF000
stack
page read and write
41C95FF000
stack
page read and write
4B10000
trusted library allocation
page read and write
7FFAAB320000
trusted library allocation
page read and write
43F16FB000
stack
page read and write
158EEFC6000
heap
page read and write
6EE0000
trusted library allocation
page read and write
2CD000
stack
page read and write
6EE0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
188979B6000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
158EEFD8000
heap
page read and write
7FFAAB324000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
158ECAE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
7FFAAB3FC000
trusted library allocation
page execute and read and write
6ED0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
7FFAAB370000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
188A7701000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
2D63000
trusted library allocation
page execute and read and write
47B0000
trusted library allocation
page read and write
4770000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
188977A1000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
188978D3000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
4AB000
stack
page read and write
4790000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
7AF000
stack
page read and write
6EE0000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
188A7713000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6D50000
trusted library allocation
page execute and read and write
6B20000
trusted library allocation
page read and write
4BE6000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
188B03A6000
heap
page read and write
6B20000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
18896E95000
heap
page read and write
20EDC8F2000
heap
page read and write
20EC3796000
heap
page read and write
6F00000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
432B9FF000
stack
page read and write
6B30000
trusted library allocation
page read and write
188B0852000
heap
page read and write
43F04FE000
stack
page read and write
6EC0000
trusted library allocation
page read and write
2BB433D000
stack
page read and write
6B20000
trusted library allocation
page read and write
48C6000
trusted library allocation
page read and write
4BD8000
heap
page read and write
7FFAAB34D000
trusted library allocation
page execute and read and write
6F00000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
2C452D47000
heap
page read and write
18896E50000
heap
page read and write
188977E0000
trusted library allocation
page read and write
41C9AFE000
stack
page read and write
188B03E4000
heap
page read and write
4790000
trusted library allocation
page read and write
414A000
heap
page read and write
48C2000
trusted library allocation
page read and write
67AE000
stack
page read and write
47B0000
trusted library allocation
page read and write
46F9000
trusted library allocation
page execute and read and write
4B10000
trusted library allocation
page read and write
7FFAAB4FC000
trusted library allocation
page read and write
7FFAAB4F3000
trusted library allocation
page read and write
7FFAAB610000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
41C94FE000
stack
page read and write
6EE0000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
7FFAAB34D000
trusted library allocation
page execute and read and write
76C000
heap
page read and write
6B30000
trusted library allocation
page read and write
7450000
heap
page read and write
4790000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
27FE000
stack
page read and write
6EF0000
trusted library allocation
page read and write
7FFAAB354000
trusted library allocation
page read and write
20EDC893000
heap
page read and write
14B000
stack
page read and write
29B0000
heap
page read and write
29BF000
stack
page read and write
6B30000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
18897FEC000
trusted library allocation
page read and write
45E0000
heap
page read and write
18897ED0000
trusted library allocation
page read and write
2EC5000
trusted library allocation
page execute and read and write
6EC0000
trusted library allocation
page read and write
490E000
stack
page read and write
6B20000
trusted library allocation
page read and write
2E90000
trusted library allocation
page read and write
4760000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
7FFAAB5B0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
2910000
heap
page read and write
703000
heap
page read and write
6B20000
trusted library allocation
page read and write
2C45362B000
trusted library allocation
page read and write
6F5D000
stack
page read and write
6EE0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
73C0000
remote allocation
page read and write
7FFAAB3F6000
trusted library allocation
page read and write
20EC408F000
trusted library allocation
page read and write
7FFAAB730000
trusted library allocation
page read and write
7FFAAB3E0000
trusted library allocation
page read and write
188977D8000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
479C000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
7FFAAB505000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6F20000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
7FFAAB559000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
4330000
trusted library allocation
page execute and read and write
41C97FD000
stack
page read and write
28D0000
heap
page read and write
6B20000
trusted library allocation
page read and write
46F6000
trusted library allocation
page execute and read and write
7FFAAB4F0000
trusted library allocation
page read and write
4795000
trusted library allocation
page read and write
158ECC75000
heap
page read and write
44EA000
heap
page read and write
7FFAAB660000
trusted library allocation
page read and write
E1D8CFE000
stack
page read and write
2BB477E000
stack
page read and write
6EE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
4AA3000
trusted library allocation
page read and write
7FFAAB470000
trusted library allocation
page execute and read and write
6EE0000
trusted library allocation
page read and write
158EED49000
heap
page read and write
6B20000
trusted library allocation
page read and write
20EDC870000
heap
page read and write
18896ECD000
heap
page read and write
6B20000
trusted library allocation
page read and write
2D4E000
stack
page read and write
6B20000
trusted library allocation
page read and write
2F24000
heap
page read and write
4790000
trusted library allocation
page read and write
43F08FE000
stack
page read and write
4B40000
heap
page read and write
6EE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
7FFAAB560000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
41C9181000
stack
page read and write
6EF0000
trusted library allocation
page read and write
630000
heap
page read and write
7FFAAB530000
trusted library allocation
page read and write
CB0C9FE000
stack
page read and write
7FFAAB333000
trusted library allocation
page execute and read and write
4790000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
188B041A000
heap
page read and write
6B31000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
1A114100000
heap
page read and write
2DE0000
heap
page read and write
4B10000
trusted library allocation
page read and write
2C452D45000
heap
page read and write
6EE0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
7FFAAB3F0000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
188B03B3000
heap
page read and write
6EE0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
2F1E000
stack
page read and write
60E000
stack
page read and write
6EC0000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
7FF430210000
trusted library allocation
page execute and read and write
7FFAAB342000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
311E000
unkown
page read and write
2C46BE0F000
heap
page read and write
6B40000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
4720000
heap
page read and write
6DA0000
trusted library allocation
page read and write
1889778F000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
18896E30000
heap
page read and write
4790000
trusted library allocation
page read and write
188978C3000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6F20000
trusted library allocation
page read and write
2C452D07000
heap
page read and write
432B3E9000
stack
page read and write
47B0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
432B8F7000
stack
page read and write
73D0D000
unkown
page read and write
20EC37CB000
heap
page read and write
4B15000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
717E000
stack
page read and write
43299CF000
stack
page read and write
733E000
stack
page read and write
3144000
heap
page read and write
2C453741000
trusted library allocation
page read and write
6F10000
trusted library allocation
page execute and read and write
1A114200000
heap
page read and write
6B20000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
20EC37B7000
heap
page read and write
158EED1F000
heap
page read and write
4A2E000
stack
page read and write
6EC0000
trusted library allocation
page read and write
7FFAAB570000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
CB0C3FE000
stack
page read and write
6EE0000
trusted library allocation
page read and write
41EC000
stack
page read and write
6B20000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
2AC68ED0000
unkown
page readonly
6EE0000
trusted library allocation
page read and write
7FFAAB5A0000
trusted library allocation
page execute and read and write
188977FC000
trusted library allocation
page read and write
18897A33000
trusted library allocation
page read and write
43F12FD000
stack
page read and write
6EF0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
705E000
stack
page read and write
57E5000
trusted library allocation
page read and write
2D51000
heap
page read and write
6F20000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
7F298000
trusted library allocation
page execute and read and write
6EE0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
2AC4FF03000
heap
page read and write
7FFAAB520000
trusted library allocation
page read and write
7FFAAB500000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
73CF1000
unkown
page execute read
6EC0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
D0C000
stack
page read and write
73CF0000
unkown
page readonly
6EE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
CB0C5FE000
stack
page read and write
6EE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
20EDC872000
heap
page read and write
3168000
heap
page read and write
426D000
stack
page read and write
682E000
stack
page read and write
47B0000
trusted library allocation
page read and write
4FCE000
stack
page read and write
540000
heap
page read and write
73D0F000
unkown
page readonly
6D40000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
7477000
heap
page read and write
6F04000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6EF1000
trusted library allocation
page read and write
7FFAAB3DC000
trusted library allocation
page execute and read and write
6B20000
trusted library allocation
page read and write
188977E8000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
158EE530000
heap
page execute and read and write
432A4FE000
stack
page read and write
44B5000
trusted library allocation
page execute and read and write
680000
heap
page read and write
18897600000
heap
page execute and read and write
7FFAAB374000
trusted library allocation
page read and write
316C000
heap
page read and write
2C46BD96000
heap
page read and write
6B20000
trusted library allocation
page read and write
7FFAAB37B000
trusted library allocation
page execute and read and write
6EE0000
trusted library allocation
page read and write
2C452D1D000
heap
page read and write
6EC0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4390000
heap
page execute and read and write
2E40000
heap
page read and write
6EE0000
trusted library allocation
page read and write
479B000
trusted library allocation
page execute and read and write
7FFAAB3F0000
trusted library allocation
page execute and read and write
7FFAAB4FA000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
70CD000
heap
page read and write
59E1000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
18897AF7000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
73C0000
remote allocation
page read and write
6B30000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
743E000
stack
page read and write
4790000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
20EDC907000
heap
page read and write
4A7E000
stack
page read and write
188B0782000
heap
page read and write
7FFAAB35D000
trusted library allocation
page execute and read and write
432AEFF000
stack
page read and write
7FFAAB5C0000
trusted library allocation
page read and write
432B5F4000
stack
page read and write
6B20000
trusted library allocation
page read and write
188B0740000
unkown
page readonly
1589000F000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
6D60000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
72E000
stack
page read and write
6EC0000
trusted library allocation
page read and write
7FFAAB330000
trusted library allocation
page read and write
158EC915000
heap
page read and write
6B40000
trusted library allocation
page read and write
4BE3000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
2E34000
heap
page read and write
7FFAAB5F0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
2DB0000
heap
page read and write
6EE0000
trusted library allocation
page read and write
158ECB90000
heap
page read and write
7FFAAB550000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
2AC500D0000
heap
page read and write
6B20000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
158EED43000
heap
page read and write
6B20000
trusted library allocation
page read and write
43F17FA000
stack
page read and write
7FFAAB3E0000
trusted library allocation
page execute and read and write
6B30000
trusted library allocation
page read and write
24D000
stack
page read and write
6B20000
trusted library allocation
page read and write
7F600000
trusted library allocation
page execute and read and write
6B20000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
18897F89000
trusted library allocation
page read and write
43F0BFE000
stack
page read and write
188978BF000
trusted library allocation
page read and write
239E000
stack
page read and write
4790000
trusted library allocation
page read and write
188B04E7000
heap
page read and write
7FFAAB540000
trusted library allocation
page read and write
5B51000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
2D90000
heap
page read and write
7FFAAB350000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
18897766000
trusted library allocation
page read and write
7FFAAB590000
trusted library allocation
page execute and read and write
6B20000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
7FFAAB530000
trusted library allocation
page read and write
7FFAAB569000
trusted library allocation
page read and write
4C36000
trusted library allocation
page read and write
7FFAAB50E000
trusted library allocation
page read and write
7FFAAB400000
trusted library allocation
page read and write
7FFAAB620000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
7FFAAB3F6000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
E1D83FE000
stack
page read and write
6B40000
trusted library allocation
page read and write
20ED405D000
trusted library allocation
page read and write
E1D8EFE000
stack
page read and write
6F7E000
stack
page read and write
4A09000
heap
page read and write
6F9E000
stack
page read and write
6B30000
trusted library allocation
page read and write
20EC39E5000
heap
page read and write
508F000
stack
page read and write
4340000
trusted library allocation
page read and write
4757000
heap
page read and write
6B20000
trusted library allocation
page read and write
49BE000
stack
page read and write
7FFAAB520000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4AA6000
trusted library allocation
page execute and read and write
7FFAAB400000
trusted library allocation
page execute and read and write
4B10000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
73FE000
stack
page read and write
47B0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
57E1000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
7FFAAB5A0000
trusted library allocation
page execute and read and write
4A90000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
188977A3000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
43F11FC000
stack
page read and write
4790000
trusted library allocation
page read and write
2EA0000
trusted library allocation
page read and write
7FFAAB5A0000
trusted library allocation
page execute and read and write
6B30000
trusted library allocation
page read and write
4AD0000
trusted library allocation
page read and write
2AC6900B000
heap
page read and write
6B40000
trusted library allocation
page read and write
2AC4FE20000
unkown
page readonly
4790000
trusted library allocation
page read and write
188B0742000
unkown
page readonly
432C0FD000
stack
page read and write
4790000
trusted library allocation
page read and write
6CDF000
stack
page read and write
31C0000
heap
page read and write
432B6FE000
stack
page read and write
6B20000
trusted library allocation
page read and write
4210000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
188977E4000
trusted library allocation
page read and write
707E000
stack
page read and write
6B20000
trusted library allocation
page read and write
158EED76000
heap
page read and write
6B50000
trusted library allocation
page execute and read and write
6EC0000
trusted library allocation
page read and write
188B0516000
heap
page read and write
6B20000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
5B55000
trusted library allocation
page read and write
20EDC919000
heap
page read and write
20ED4051000
trusted library allocation
page read and write
432BAFA000
stack
page read and write
4B10000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
2AC4FEEA000
heap
page read and write
6EE4000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
47FE000
stack
page read and write
47B0000
trusted library allocation
page read and write
4C32000
trusted library allocation
page read and write
7FFAAB36B000
trusted library allocation
page execute and read and write
2EC0000
trusted library allocation
page read and write
9E0000
heap
page read and write
4960000
trusted library allocation
page read and write
2AC4FF05000
heap
page read and write
7FFAAB4D0000
trusted library allocation
page read and write
432BFFC000
stack
page read and write
6B20000
trusted library allocation
page read and write
7FFAAB4E3000
trusted library allocation
page read and write
188AF730000
trusted library allocation
page read and write
7FFAAB4D0000
trusted library allocation
page read and write
6D20000
trusted library allocation
page read and write
CCC000
stack
page read and write
4319000
trusted library allocation
page execute and read and write
4B19000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
158EC91F000
heap
page read and write
6B20000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
2EC2000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
2AC502F0000
heap
page read and write
2C453745000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
2C46BDED000
heap
page read and write
45DC000
stack
page read and write
6B20000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
4010000
heap
page read and write
4B15000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
15880172000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
188979A2000
trusted library allocation
page read and write
20EC3940000
trusted library allocation
page read and write
2DDE000
unkown
page read and write
3320000
heap
page read and write
7FFAAB580000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
3FF0000
trusted library allocation
page read and write
20EC3960000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
6D0000
heap
page read and write
4790000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
4300000
trusted library allocation
page read and write
7FFAAB510000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
330E000
stack
page read and write
6EC0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
7FFAAB352000
trusted library allocation
page read and write
2D4E000
heap
page read and write
6EC0000
trusted library allocation
page read and write
3FB0000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
18897A35000
trusted library allocation
page read and write
6EEE000
trusted library allocation
page read and write
20EC3B45000
heap
page read and write
6B20000
trusted library allocation
page read and write
2D0D000
stack
page read and write
7FFAAB333000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
41C9CFE000
stack
page read and write
6EE0000
trusted library allocation
page read and write
43F0FFE000
stack
page read and write
6EE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
18897F55000
trusted library allocation
page read and write
158EEFEB000
heap
page read and write
2C453000000
trusted library allocation
page read and write
432C4FE000
stack
page read and write
2DD8000
heap
page read and write
6B30000
trusted library allocation
page read and write
7FFAAB720000
trusted library allocation
page read and write
2AC60711000
trusted library allocation
page read and write
43F07FE000
stack
page read and write
6F20000
trusted library allocation
page read and write
414E000
stack
page read and write
4B10000
trusted library allocation
page read and write
7EEE8000
trusted library allocation
page execute and read and write
2AC506F0000
heap
page execute and read and write
4310000
trusted library allocation
page read and write
73D06000
unkown
page readonly
2AC502E0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
2AC505F0000
heap
page read and write
432C8FE000
stack
page read and write
188B084F000
heap
page read and write
6B20000
trusted library allocation
page read and write
18897F59000
trusted library allocation
page read and write
3156000
heap
page read and write
7FFAAB360000
trusted library allocation
page read and write
73C0000
remote allocation
page read and write
7FFAAB580000
trusted library allocation
page read and write
158EEEC4000
unkown
page readonly
158EC7C4000
unkown
page readonly
4AE0000
trusted library allocation
page read and write
158EC880000
heap
page read and write
4B10000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
7FFAAB3AC000
trusted library allocation
page execute and read and write
6EE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
E1D82F1000
stack
page read and write
7FFAAB322000
trusted library allocation
page read and write
20EC3990000
heap
page execute and read and write
491E000
stack
page read and write
7FFB23AD1000
unkown
page execute read
47B0000
trusted library allocation
page read and write
2AC69002000
heap
page read and write
6B20000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
7FFAAB510000
trusted library allocation
page execute and read and write
4870000
trusted library allocation
page execute and read and write
6EE0000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
41C99FF000
stack
page read and write
6FC000
heap
page read and write
2D53000
heap
page read and write
2FA0000
heap
page read and write
6B30000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
7FFAAB4E6000
trusted library allocation
page read and write
6EE1000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
7FFB23AF5000
unkown
page readonly
432A2FE000
stack
page read and write
6EE0000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
2F18000
heap
page read and write
43F13FC000
stack
page read and write
6F00000
trusted library allocation
page read and write
41C98FF000
stack
page read and write
6EE0000
trusted library allocation
page read and write
49C0000
heap
page read and write
4A8D000
trusted library allocation
page execute and read and write
188977BD000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
2960000
heap
page read and write
7FFAAB550000
trusted library allocation
page read and write
2C452E90000
heap
page read and write
6B20000
trusted library allocation
page read and write
4530000
heap
page execute and read and write
550000
heap
page read and write
6B20000
trusted library allocation
page read and write
2C452F00000
trusted library allocation
page read and write
432BDFB000
stack
page read and write
6EC0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
7FFAAB36D000
trusted library allocation
page execute and read and write
6EF0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4000000
heap
page readonly
6EE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
2F76000
heap
page read and write
6B30000
trusted library allocation
page read and write
7FFAAB600000
trusted library allocation
page read and write
7FFAAB550000
trusted library allocation
page execute and read and write
6EF0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
E1D87FF000
stack
page read and write
7FFAAB39C000
trusted library allocation
page execute and read and write
7FFAAB500000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
313D000
heap
page read and write
6B20000
trusted library allocation
page read and write
158EEFCF000
heap
page read and write
188B03A0000
heap
page read and write
73D06000
unkown
page readonly
6EF0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
20EC36E0000
heap
page read and write
2C4635F1000
trusted library allocation
page read and write
4A30000
heap
page execute and read and write
6EF0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
451E000
stack
page read and write
158EC975000
heap
page read and write
6EE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
4964000
trusted library allocation
page read and write
432B2FB000
stack
page read and write
18897F16000
trusted library allocation
page read and write
716000
heap
page read and write
7FFAAB4ED000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
2947000
stack
page read and write
2AC4FE20000
unkown
page readonly
4B10000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
772000
heap
page read and write
6F00000
trusted library allocation
page read and write
4B20000
heap
page read and write
6EC0000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
2770000
heap
page read and write
7FFAAB400000
trusted library allocation
page execute and read and write
2887000
stack
page read and write
158EEE30000
unkown
page readonly
4220000
heap
page read and write
20EC417C000
trusted library allocation
page read and write
4319000
heap
page read and write
6C0000
heap
page read and write
1A114560000
heap
page read and write
497C000
stack
page read and write
47B0000
trusted library allocation
page read and write
2AC50843000
trusted library allocation
page read and write
2AC60701000
trusted library allocation
page read and write
2E3D000
heap
page read and write
2AC500B0000
heap
page read and write
47C0000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
432AA34000
stack
page read and write
432A6E9000
stack
page read and write
6EF0000
trusted library allocation
page read and write
4603000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
469E000
stack
page read and write
2975000
heap
page read and write
188B0590000
heap
page read and write
2AC4FF48000
heap
page read and write
6EC0000
trusted library allocation
page read and write
1A1142E0000
heap
page read and write
158ECAC0000
trusted library allocation
page read and write
2CFA000
heap
page read and write
6B20000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
432AA7F000
stack
page read and write
4B10000
trusted library allocation
page read and write
432C2FE000
stack
page read and write
6B20000
trusted library allocation
page read and write
158ECB25000
heap
page read and write
73CF1000
unkown
page execute read
6B20000
trusted library allocation
page read and write
7FFAAB4F0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
2AC4FF0D000
heap
page read and write
4794000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
188B0854000
heap
page read and write
20EDC8A6000
heap
page read and write
4AF0000
heap
page execute and read and write
6EE0000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
4910000
heap
page readonly
6EE0000
trusted library allocation
page read and write
CB0C4FE000
stack
page read and write
7FFAAB37D000
trusted library allocation
page execute and read and write
7FFAAB4D7000
trusted library allocation
page read and write
7FFAAB410000
trusted library allocation
page execute and read and write
188B0460000
heap
page read and write
4BAD000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
2C452C90000
heap
page read and write
6B20000
trusted library allocation
page read and write
188B03DE000
heap
page read and write
18897FE5000
trusted library allocation
page read and write
18897FF0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
188978CF000
trusted library allocation
page read and write
7FFAAB440000
trusted library allocation
page execute and read and write
432BEF7000
stack
page read and write
8AD000
stack
page read and write
6B20000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4213000
trusted library allocation
page read and write
188B0780000
heap
page read and write
4C24000
trusted library allocation
page read and write
487B000
trusted library allocation
page read and write
43F0AFE000
stack
page read and write
158EED72000
heap
page read and write
6B20000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
73D0F000
unkown
page readonly
4790000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
4AA9000
trusted library allocation
page execute and read and write
2DE6000
heap
page read and write
4C42000
trusted library allocation
page read and write
2D50000
trusted library allocation
page read and write
D55000
heap
page read and write
20EC37F2000
heap
page read and write
4799000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
6DDE000
stack
page read and write
6B30000
trusted library allocation
page read and write
7FFAAB3D0000
trusted library allocation
page read and write
7FFAAB540000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6EE3000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
188AF700000
trusted library allocation
page read and write
188AFFBF000
heap
page read and write
3120000
heap
page read and write
4B10000
trusted library allocation
page read and write
7FFAAB416000
trusted library allocation
page execute and read and write
6A0000
heap
page read and write
4B10000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
2F9E000
stack
page read and write
6EC0000
trusted library allocation
page read and write
758000
heap
page read and write
6F00000
trusted library allocation
page read and write
4F8F000
stack
page read and write
4B14000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
7FFAAB343000
trusted library allocation
page execute and read and write
4AE0000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
46B9000
heap
page read and write
48DE000
stack
page read and write
41C9FFE000
stack
page read and write
18897F51000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
4400000
heap
page read and write
432ACFD000
stack
page read and write
6EC0000
trusted library allocation
page read and write
7E4000
trusted library allocation
page read and write
7FFAAB560000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
CB0CDFE000
stack
page read and write
431C000
trusted library allocation
page execute and read and write
4790000
trusted library allocation
page read and write
7FFAAB510000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
E1D85FF000
stack
page read and write
C3E000
stack
page read and write
18897FB7000
trusted library allocation
page read and write
4BA1000
trusted library allocation
page read and write
158EC971000
heap
page read and write
4790000
trusted library allocation
page read and write
7440000
heap
page read and write
6EC0000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
4873000
trusted library allocation
page read and write
7FFAAB510000
trusted library allocation
page read and write
E1D88FF000
stack
page read and write
4764000
trusted library allocation
page read and write
432C7FE000
stack
page read and write
4B10000
trusted library allocation
page read and write
7FFAAB536000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
20EC417F000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
7FFAAB426000
trusted library allocation
page execute and read and write
6EE0000
trusted library allocation
page read and write
2AC50125000
heap
page read and write
2C453085000
heap
page read and write
6B20000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
4B9F000
trusted library allocation
page read and write
7FFAAB364000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
7FFB23AD0000
unkown
page readonly
6B20000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
188B0340000
heap
page read and write
6EE0000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
7FFAAB5E0000
trusted library allocation
page execute and read and write
1A114565000
heap
page read and write
7FFAAB740000
trusted library allocation
page read and write
CB0C8FE000
stack
page read and write
2CFD000
heap
page read and write
2E94000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
7FFAAB426000
trusted library allocation
page execute and read and write
7E3000
trusted library allocation
page execute and read and write
7FFAAB332000
trusted library allocation
page read and write
6B21000
trusted library allocation
page read and write
2CDA000
heap
page read and write
18897EC6000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
2AC505E0000
trusted library allocation
page read and write
6BBE000
stack
page read and write
6B30000
trusted library allocation
page read and write
4928000
trusted library allocation
page read and write
7FFAAB460000
trusted library allocation
page execute and read and write
6B30000
trusted library allocation
page read and write
18897090000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
2DCC000
heap
page read and write
6B20000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
7FFAAB540000
trusted library allocation
page execute and read and write
158EEE32000
unkown
page readonly
6B20000
trusted library allocation
page read and write
188AFF72000
heap
page read and write
6EC0000
trusted library allocation
page read and write
7FFAAB640000
trusted library allocation
page read and write
432B4E9000
stack
page read and write
49BE000
stack
page read and write
4B10000
trusted library allocation
page read and write
7FFAAB34D000
trusted library allocation
page execute and read and write
6EE0000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
2D64000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
4BB1000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
432B0FD000
stack
page read and write
432CAFE000
stack
page read and write
6F00000
trusted library allocation
page read and write
2BB467F000
stack
page read and write
158EC91B000
heap
page read and write
7FFAAB670000
trusted library allocation
page execute and read and write
6B20000
trusted library allocation
page read and write
329E000
stack
page read and write
188B0383000
heap
page read and write
4790000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6B2E000
trusted library allocation
page read and write
4795000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
70C9000
heap
page read and write
3FD0000
trusted library allocation
page read and write
29DE000
stack
page read and write
325E000
stack
page read and write
274E000
stack
page read and write
188B04EA000
heap
page read and write
4B10000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4AC0000
trusted library allocation
page execute and read and write
2DB5000
heap
page read and write
18897ED2000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
188AFF70000
heap
page read and write
6EF0000
trusted library allocation
page read and write
1A1141E0000
heap
page read and write
4797000
trusted library allocation
page execute and read and write
158EC959000
heap
page read and write
2D03000
heap
page read and write
6B20000
trusted library allocation
page read and write
2F04000
heap
page read and write
45E0000
trusted library allocation
page execute and read and write
7FFAAB570000
trusted library allocation
page execute and read and write
47B0000
trusted library allocation
page read and write
48D2000
trusted library allocation
page read and write
C40000
heap
page read and write
7FFAAB340000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
462F000
stack
page read and write
2350000
heap
page read and write
7FFAAB560000
trusted library allocation
page read and write
7FFAAB550000
trusted library allocation
page read and write
2AC5082C000
trusted library allocation
page read and write
188977C8000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
72FD000
stack
page read and write
6B20000
trusted library allocation
page read and write
2D09000
heap
page read and write
158EEFDA000
heap
page read and write
7FFAAB406000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
44B0000
trusted library allocation
page read and write
4AAC000
trusted library allocation
page execute and read and write
3FD7000
trusted library allocation
page execute and read and write
4790000
trusted library allocation
page read and write
18897C55000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
7D0000
trusted library allocation
page read and write
41C9BFF000
stack
page read and write
4C15000
trusted library allocation
page read and write
4840000
heap
page readonly
6B20000
trusted library allocation
page read and write
6BC0000
remote allocation
page read and write
4750000
trusted library allocation
page read and write
2DFE000
stack
page read and write
47B0000
trusted library allocation
page read and write
42FE000
stack
page read and write
47B0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
7FFAAB505000
trusted library allocation
page read and write
6BC0000
heap
page read and write
4B10000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
2AC68ED2000
unkown
page readonly
158EEFC0000
heap
page read and write
4BEB000
trusted library allocation
page read and write
460D000
trusted library allocation
page execute and read and write
7FFAAB37C000
trusted library allocation
page execute and read and write
6B20000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
432CBFD000
stack
page read and write
6B20000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
18897690000
trusted library allocation
page read and write
18897F4F000
trusted library allocation
page read and write
188977D0000
trusted library allocation
page read and write
1F0000
heap
page read and write
6EE0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
7FFAAB4F0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6B60000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
5CF000
stack
page read and write
2AC4FEED000
heap
page read and write
4790000
trusted library allocation
page read and write
483F000
stack
page read and write
CB0CEFE000
stack
page read and write
7FFAAB436000
trusted library allocation
page execute and read and write
6EF0000
trusted library allocation
page read and write
E1D89FE000
stack
page read and write
4B10000
trusted library allocation
page read and write
2AC50640000
unkown
page readonly
47B0000
trusted library allocation
page read and write
158EC931000
heap
page read and write
4730000
heap
page execute and read and write
6B20000
trusted library allocation
page read and write
2D17000
heap
page read and write
6EE0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
7FFAAB3FC000
trusted library allocation
page execute and read and write
E1D86FD000
stack
page read and write
7FFAAB36B000
trusted library allocation
page execute and read and write
432A7FF000
stack
page read and write
4790000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
158EC8FC000
heap
page read and write
313B000
heap
page read and write
2C463601000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
7FFAAB4F0000
trusted library allocation
page read and write
7FFAAB6F0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
2EA4000
trusted library allocation
page read and write
432ABFD000
stack
page read and write
6B30000
trusted library allocation
page read and write
4E7000
stack
page read and write
47B0000
trusted library allocation
page read and write
45BE000
stack
page read and write
47B0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
7FFAAB460000
trusted library allocation
page execute and read and write
6EC0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
7F280000
trusted library allocation
page execute and read and write
29C0000
heap
page read and write
70BE000
stack
page read and write
2C452D03000
heap
page read and write
47B0000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
44B7000
trusted library allocation
page execute and read and write
2E9D000
trusted library allocation
page execute and read and write
2E56000
heap
page read and write
6EE0000
trusted library allocation
page read and write
4795000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
4329D3E000
stack
page read and write
6EC0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4D0000
heap
page read and write
6EF0000
trusted library allocation
page read and write
4520000
heap
page readonly
18897AF9000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
18896E8B000
heap
page read and write
2B65000
heap
page read and write
6B40000
trusted library allocation
page read and write
20EC37F4000
heap
page read and write
7FFAAB4DD000
trusted library allocation
page read and write
4200000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
4A80000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
20EC37AF000
heap
page read and write
47B0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
E1D84FE000
stack
page read and write
6EE0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
20EC4193000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
432C9FC000
stack
page read and write
47B0000
trusted library allocation
page read and write
2EC7000
trusted library allocation
page execute and read and write
7F148000
trusted library allocation
page execute and read and write
6EE0000
trusted library allocation
page read and write
2AC69032000
heap
page read and write
6EE0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6ED000
stack
page read and write
4884000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
7FFAAB550000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
7FFAAB340000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
7FFAAB364000
trusted library allocation
page read and write
42AE000
stack
page read and write
6D9D000
stack
page read and write
432C6FE000
stack
page read and write
6EF0000
trusted library allocation
page read and write
CB0CBFE000
stack
page read and write
47B0000
trusted library allocation
page read and write
7E0000
heap
page read and write
4790000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
CB0C2F1000
stack
page read and write
188B051E000
heap
page read and write
4790000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
7FFAAB530000
trusted library allocation
page read and write
188978C7000
trusted library allocation
page read and write
43F02F4000
stack
page read and write
6B24000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
7FFAAB530000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6F20000
trusted library allocation
page read and write
2C46BDBC000
heap
page read and write
2C45371C000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
158EED5F000
heap
page read and write
6B20000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
2AC502F5000
heap
page read and write
4790000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
713E000
stack
page read and write
6B20000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
42B0000
heap
page execute and read and write
6EF0000
trusted library allocation
page read and write
4770000
trusted library allocation
page read and write
2C452F15000
heap
page read and write
6F00000
trusted library allocation
page read and write
2D74000
trusted library allocation
page read and write
2AC68FD8000
heap
page read and write
20ED4061000
trusted library allocation
page read and write
2AC68F80000
heap
page read and write
6EE0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
18897FBF000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
188AFFC2000
heap
page read and write
6B20000
trusted library allocation
page read and write
7FFAAB510000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
4AA0000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
7FFAAB5B0000
trusted library allocation
page execute and read and write
18897ECE000
trusted library allocation
page read and write
4B98000
trusted library allocation
page read and write
2C45362F000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
6EE4000
trusted library allocation
page read and write
18897ECA000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
CB0C6FD000
stack
page read and write
6EF0000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
4831000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
2C3E000
stack
page read and write
6B20000
trusted library allocation
page read and write
43F03FE000
stack
page read and write
4790000
trusted library allocation
page read and write
2DA0000
heap
page read and write
6F4000
heap
page read and write
6EC0000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
188B011E000
unkown
page readonly
158EC7A0000
unkown
page readonly
CB0C7FE000
stack
page read and write
4841000
trusted library allocation
page read and write
3140000
heap
page read and write
7FFAAB344000
trusted library allocation
page read and write
6D30000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
188A7721000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
2C453080000
heap
page read and write
7FFAAB343000
trusted library allocation
page execute and read and write
2D70000
trusted library allocation
page read and write
2C453733000
trusted library allocation
page read and write
18897B41000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6B70000
trusted library allocation
page read and write
7ED000
trusted library allocation
page execute and read and write
6EF0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
158ECBE0000
heap
page read and write
18897FEA000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
18897EC2000
trusted library allocation
page read and write
188A7782000
trusted library allocation
page read and write
7FFAAB40C000
trusted library allocation
page execute and read and write
2C453060000
heap
page read and write
6B20000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFAAB630000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
756000
heap
page read and write
4B10000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
2AC4FF21000
heap
page read and write
6B20000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
188971A3000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4431000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
58E000
stack
page read and write
23E0000
heap
page read and write
7FFAAB4C3000
trusted library allocation
page read and write
188AFA84000
heap
page read and write
6EF0000
trusted library allocation
page read and write
7FFAAB360000
trusted library allocation
page read and write
7FFAAB5C6000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
2D57000
heap
page read and write
E1D8BFE000
stack
page read and write
188B0072000
unkown
page readonly
6B20000
trusted library allocation
page read and write
18897FB9000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
7FFAAB516000
trusted library allocation
page read and write
2ECB000
trusted library allocation
page execute and read and write
92E000
stack
page read and write
188B0407000
heap
page read and write
43F10FC000
stack
page read and write
47B0000
trusted library allocation
page read and write
7FFAAB38C000
trusted library allocation
page execute and read and write
2D90000
heap
page read and write
158EC8A0000
heap
page read and write
432A1FF000
stack
page read and write
6EE0000
trusted library allocation
page read and write
44D0000
trusted library allocation
page read and write
7FFAAB450000
trusted library allocation
page execute and read and write
6EC0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
18897FBB000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
6DA000
heap
page read and write
6B20000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
7FFAAB500000
trusted library allocation
page read and write
6EEC000
trusted library allocation
page read and write
23DE000
stack
page read and write
47B0000
trusted library allocation
page read and write
20EC408D000
trusted library allocation
page read and write
4880000
trusted library allocation
page read and write
188970C5000
heap
page read and write
31BE000
stack
page read and write
6B20000
trusted library allocation
page read and write
4763000
trusted library allocation
page execute and read and write
6EE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
7FFAAB540000
trusted library allocation
page execute and read and write
432B1E9000
stack
page read and write
7FFAAB340000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page execute and read and write
2F83000
heap
page read and write
47B0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
7FFAAB500000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
4420000
heap
page read and write
6EF0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
1889800E000
trusted library allocation
page read and write
188B04D5000
heap
page read and write
6B20000
trusted library allocation
page read and write
188B0B80000
heap
page read and write
6B20000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
7FFAAB570000
trusted library allocation
page execute and read and write
44B2000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
188B07FE000
heap
page read and write
2AC50658000
unkown
page readonly
6EE0000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
158EF00A000
heap
page read and write
4790000
trusted library allocation
page read and write
188B078E000
heap
page read and write
6EF0000
trusted library allocation
page read and write
7FFAAB35B000
trusted library allocation
page execute and read and write
4B10000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
2B60000
heap
page read and write
49E1000
trusted library allocation
page read and write
187000
stack
page read and write
4876000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
2C4535E0000
heap
page execute and read and write
45F0000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
188B0454000
heap
page read and write
188978CB000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
E1D8DFD000
stack
page read and write
6B40000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
6D5E000
stack
page read and write
7FFAAB5D0000
trusted library allocation
page read and write
20EC41A1000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
7FFAAB334000
trusted library allocation
page read and write
2918000
heap
page read and write
73D0D000
unkown
page read and write
7FFAAB33D000
trusted library allocation
page execute and read and write
4790000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
59E5000
trusted library allocation
page read and write
7FFB23AE6000
unkown
page readonly
47B0000
trusted library allocation
page read and write
7FFAAB344000
trusted library allocation
page read and write
1889775B000
trusted library allocation
page read and write
2C46BE80000
heap
page execute and read and write
6EE0000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
28E0000
heap
page read and write
6B30000
trusted library allocation
page read and write
2C45371F000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
18897F63000
trusted library allocation
page read and write
49D0000
trusted library allocation
page execute and read and write
6EE0000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
43F14FC000
stack
page read and write
7F618000
trusted library allocation
page execute and read and write
18897FEE000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
3156000
heap
page read and write
41C9EFD000
stack
page read and write
47B0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
188B0784000
heap
page read and write
6EE0000
trusted library allocation
page read and write
18897ECC000
trusted library allocation
page read and write
20EC3720000
heap
page read and write
49C0000
heap
page execute and read and write
4790000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
432BCFD000
stack
page read and write
6EE0000
trusted library allocation
page read and write
7FFAAB354000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6B24000
trusted library allocation
page read and write
158EF001000
heap
page read and write
6EE1000
trusted library allocation
page read and write
4B15000
trusted library allocation
page read and write
6A5000
heap
page read and write
6B20000
trusted library allocation
page read and write
70FE000
stack
page read and write
6B30000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
20EC37B1000
heap
page read and write
4790000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
290B000
stack
page read and write
7FFAAB530000
trusted library allocation
page read and write
7FFAAB700000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
20EC3B40000
heap
page read and write
6B20000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
9F0000
heap
page read and write
7FFAAB560000
trusted library allocation
page execute and read and write
6EE0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
4A83000
trusted library allocation
page read and write
20EDC88E000
heap
page read and write
4790000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFAAB340000
trusted library allocation
page read and write
7FFAAB4C0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
432BBE9000
stack
page read and write
20EC36D0000
heap
page read and write
6B30000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page execute and read and write
47B0000
trusted library allocation
page read and write
188B0070000
unkown
page readonly
6B30000
trusted library allocation
page read and write
2C452EB0000
heap
page read and write
20EDC91B000
heap
page read and write
6EC0000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
7FFAAB3D6000
trusted library allocation
page read and write
4890000
heap
page read and write
18897F12000
trusted library allocation
page read and write
2AC6901F000
heap
page read and write
20EDC887000
heap
page read and write
6B20000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
686E000
stack
page read and write
2AC50851000
trusted library allocation
page read and write
7FFAAB580000
trusted library allocation
page execute and read and write
4B1C000
trusted library allocation
page read and write
7FFAAB525000
trusted library allocation
page read and write
30D0000
heap
page read and write
6EF0000
trusted library allocation
page read and write
188B0508000
heap
page read and write
6B20000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
46E0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
188977A8000
trusted library allocation
page read and write
7FFAAB4E0000
trusted library allocation
page read and write
482F000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
7FFAAB3F0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
49E0000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
188971D0000
heap
page read and write
2D6D000
trusted library allocation
page execute and read and write
4970000
heap
page execute and read and write
43F0DFD000
stack
page read and write
188B0363000
heap
page read and write
6B20000
trusted library allocation
page read and write
7FFAAB34B000
trusted library allocation
page execute and read and write
3FDB000
trusted library allocation
page execute and read and write
6B20000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
7FFAAB350000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
2E72000
heap
page read and write
6EC0000
trusted library allocation
page read and write
7FFAAB353000
trusted library allocation
page execute and read and write
7FFAAB520000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
18897FE8000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
43F0EFB000
stack
page read and write
158EC7A0000
unkown
page readonly
2AC69130000
heap
page execute and read and write
7FFAAB590000
trusted library allocation
page execute and read and write
6B30000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
2AC4FFD0000
heap
page read and write
4790000
trusted library allocation
page read and write
15890001000
trusted library allocation
page read and write
2C452D09000
heap
page read and write
6B30000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
68AE000
stack
page read and write
43F09FE000
stack
page read and write
20EC41A5000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
158ECB63000
heap
page read and write
70D2000
heap
page read and write
6EE0000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
7FFAAB4FF000
trusted library allocation
page read and write
41C96FE000
stack
page read and write
6EE0000
trusted library allocation
page read and write
7F130000
trusted library allocation
page execute and read and write
7FFAAB520000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
418F000
stack
page read and write
7FFAAB710000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
2F74000
heap
page read and write
6B30000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
188976F0000
heap
page read and write
CB0CAFE000
stack
page read and write
6EE0000
trusted library allocation
page read and write
188971A0000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
7FFAAB52D000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
20EDC9C0000
heap
page execute and read and write
6EC0000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
64F000
stack
page read and write
188971D5000
heap
page read and write
4790000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
6EF0000
trusted library allocation
page read and write
7FFAAB3EC000
trusted library allocation
page execute and read and write
6EE0000
trusted library allocation
page read and write
158ECB20000
heap
page read and write
2EE0000
heap
page read and write
7FFAAB323000
trusted library allocation
page execute and read and write
2E93000
trusted library allocation
page execute and read and write
4B10000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page read and write
4600000
trusted library allocation
page read and write
2DAA000
heap
page read and write
73CF0000
unkown
page readonly
6B40000
trusted library allocation
page read and write
476D000
trusted library allocation
page execute and read and write
6BC0000
remote allocation
page read and write
1588017A000
trusted library allocation
page read and write
7FFAAB35D000
trusted library allocation
page execute and read and write
158EED8C000
heap
page read and write
6B40000
trusted library allocation
page read and write
2F7E000
heap
page read and write
6EE0000
trusted library allocation
page read and write
2CD0000
heap
page read and write
47B0000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
2C46BE11000
heap
page read and write
500F000
stack
page read and write
7FFB23AF2000
unkown
page readonly
158ECB60000
heap
page read and write
158EEFEF000
heap
page read and write
2DC3000
heap
page read and write
7FFAAB39C000
trusted library allocation
page execute and read and write
6EE0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
7FFAAB539000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4790000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
4770000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
6B40000
trusted library allocation
page read and write
188B0888000
heap
page read and write
6EE0000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
4B10000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
2AC6070D000
trusted library allocation
page read and write
7FFAAB3E6000
trusted library allocation
page read and write
6F00000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
7FFAAB560000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
There are 2065 hidden memdumps, click here to show them.