IOC Report
file_66efd0132ceed.msi

loading gif

Files

File Path
Type
Category
Malicious
file_66efd0132ceed.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
initial sample
malicious
C:\Config.Msi\6def8f.rbs
data
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI2EE0.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
modified
malicious
C:\Windows\Installer\MSI2EE0.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIC7E.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSIC7E.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIEE0.tmp
data
dropped
malicious
C:\Windows\Installer\MSIF0D6.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSIF0D6.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIF626.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSIF626.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\System32\InstallUtil.InstallLog
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Windows\Temp\~DF49B5C2D0F32FF272.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF7C5DF2A1FD1395B7.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DFB427C4F2E911224E.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DFBC946715E876F51D.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DFC63CC543F8C13A3F.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DFD9E785709C7D5F3E.TMP
data
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallState
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.ini
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AteraAgent.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
CSV text
dropped
C:\Windows\Installer\6def8e.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\6def90.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\MSI10B8.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI2EE0.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI2EE0.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI2EE0.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI2EE0.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIC7E.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSIC7E.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIC7E.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIC7E.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIEF1.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIF0D6.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSIF0D6.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIF0D6.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIF0D6.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIF5F.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIF626.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSIF626.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIF626.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIF626.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SourceHash{E732A0D7-A2F2-4657-AC41-B19742648E45}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Logs\SIH\SIH.20241124.051537.161.1.etl
data
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\Windows\SoftwareDistribution\SLS\522D76A4-93E1-47F8-B8CE-07C937AD1A1E\TMP382F.tmp
Microsoft Cabinet archive data, single, 462 bytes, 1 file, at 0x44 +Utf "environment.xml", flags 0x4, ID 31944, number 1, extra bytes 20 in head, 1 datablock, 0x1 compression
dropped
C:\Windows\SoftwareDistribution\SLS\522D76A4-93E1-47F8-B8CE-07C937AD1A1E\sls.cab
Microsoft Cabinet archive data, single, 7826 bytes, 1 file, at 0x44 +Utf "environment.cab", flags 0x4, ID 53283, number 1, extra bytes 20 in head, 1 datablock, 0x1 compression
dropped
C:\Windows\SoftwareDistribution\SLS\E7A50285-D08D-499D-9FF8-180FDC2332BC\TMP4720.tmp
Microsoft Cabinet archive data, single, 858 bytes, 1 file, at 0x44 +Utf "environment.xml", flags 0x4, ID 12183, number 1, extra bytes 20 in head, 1 datablock, 0x1 compression
dropped
C:\Windows\SoftwareDistribution\SLS\E7A50285-D08D-499D-9FF8-180FDC2332BC\sls.cab
Microsoft Cabinet archive data, single, 11149 bytes, 1 file, at 0x44 +Utf "environment.cab", flags 0x4, ID 18779, number 1, extra bytes 20 in head, 1 datablock, 0x1 compression
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
Certificate, Version=3
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
Certificate, Version=3
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
data
modified
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log
CSV text
dropped
C:\Windows\Temp\~DF153A81F8E5617DA6.TMP
data
dropped
C:\Windows\Temp\~DF2E4E1DC579E3B4C5.TMP
data
dropped
C:\Windows\Temp\~DF37DBF58920B9BE9D.TMP
data
dropped
C:\Windows\Temp\~DF85566ED1D909C207.TMP
data
dropped
C:\Windows\Temp\~DF9967FFED004E597F.TMP
data
dropped
C:\Windows\Temp\~DFC4B55DEFAAFEE2FC.TMP
data
dropped
\Device\ConDrv
JSON data
dropped
There are 75 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSIF0D6.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7205156 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSIF626.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7206484 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSIC7E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7212171 11 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="veronicacc@ilsamexico.com" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000LzG3lIAF" /AgentId="d15def5a-efb4-4303-98c9-cf62501a24d9"
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI2EE0.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_7220984 33 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" d15def5a-efb4-4303-98c9-cf62501a24d9 "eac8115e-5d3a-4a50-9055-1d945ab05897" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000LzG3lIAF
malicious
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" d15def5a-efb4-4303-98c9-cf62501a24d9 "a6f75002-7e52-4050-bf2e-b05386661724" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000LzG3lIAF
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" d15def5a-efb4-4303-98c9-cf62501a24d9 "832c3a8d-c1ac-4e47-a5dd-e5330b8175f2" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000LzG3lIAF
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\file_66efd0132ceed.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 799218A43054AFC7292CF5EAEECA0917
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 3732F891DB04E80DEAE37B187BFD9D4C E Global\MSI0000
C:\Windows\SysWOW64\net.exe
"NET" STOP AteraAgent
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 STOP AteraAgent
C:\Windows\SysWOW64\taskkill.exe
"TaskKill.exe" /f /im AteraAgent.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\SIHClient.exe
C:\Windows\System32\sihclient.exe /cv sXgXgx6V+U2s/Rk0DSIwWw.0.2
C:\Windows\System32\sc.exe
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 16 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://schemas.datacontract.org
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a-efb4-4303-98c9-cf62501a24d9/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=1b1043f4-4037-4343-9561-1316ef9829bf&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=9e43bce9-1db6-46f2-9171-f572e6753fbc&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://agent-api.atera.com/Production/Agent/track-event
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=28ed73a9-9db5-44d7-acaf-721c9a49ce4c&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
http://dl.google.com/googletalk/googletalk-setup.exe
unknown
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesscribe
unknown
https://agent-api.atera.com/Production/Agent/Agent
unknown
https://agent-api.atera.com/Production/Agent/
unknown
http://schemas.datacontract.org/2004/07/System.ServiceProcess
unknown
http://wixtoolset.org
unknown
https://agent-api.atera.com/Production
unknown
https://agent-api.atera.com/Production/Agent/GetCommandsFallback0
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=7ad76688-4452-435a-8518-58b2eaee9c6b&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://ps.atera.com/agentpackageswin/AgentPackageRuntimeInstaller/13.0/AgentPackageRuntimeInstaller
unknown
http://acontrol.atera.com/
unknown
https://ps.pndsn.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=6c6b49c3-4df6-4101-91fb-684d4f16fd73&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://ps.atera.com/agentpackagesnet45/AgentPackageNetworkDiscovery/23.9/AgentPackageNetworkDiscove
unknown
http://agent-api.atera.com
unknown
http://schemas.datacontract.org/2004/07/
unknown
https://github.com/icsharpcode/SharpZipLib
unknown
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageAgentI
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a-efb4-4303-98c9-cf62501a24d9/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=2f81232c-ba3d-448d-ad5c-71e3d13e104d&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
unknown
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/d15def5a-efb4-4303-98c9
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e7ba127d-faea-46b0-8bfc-b1b2fcc38621&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/d15def5a-efb4-4303-98c9-cf62501a24d9/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=958b96e4-e399-41e9-8d58-0d1deb75a616&tr=33&tt=17324434048824613&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageTaskScheduler/17.2/AgentPackageTaskScheduler.zip
unknown
https://ps.atera.com/agentpackagesmac/Agent.Package.Availability/0
unknown
https://agent-api.atera.com
unknown
https://agent-api.atera.com/Production/Agent/AgentStarting
unknown
http://www.w3.oh
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=e7ba127d-faea-46b0-8bfc-b1b2fcc38621
unknown
https://agent-api.atera.com/Production/Agent/GetCommands
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=3baba941-f261-496a-b933-9bd308fa7c86&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=d88a8beb-580c-4eae-be4b-b07e69debebd
unknown
https://agent-api.atera.com/
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a-efb4-4303-98c9-cf62501a24d9/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=bbab8eac-80d9-4b85-82f6-9bd41fbab092&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a-efb4-4303-98c9-cf62501a24d9/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=04a73581-89d2-414b-b671-e3efd26147f3&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://agent-api.atera.com/Production/Agent/GetRecurringPackages
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.Availability/13.0/Agent.Package.Availability.zip
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/38.0/AgentPackageAgentInformation.zip?ooiAewSNq46iHqMptNhaEhfX2X8bbCxVwRliPM24sW+tjAzbftGD6UpEklYpoosk
108.158.75.93
https://ps.atera.com/agentpackagesmac/AgentPackageRuntimeInstaller/1.5/AgentPackageRuntimeInstaller.
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.Watchdog/13.0/Agent.Package.Watchdog.zip
unknown
https://ps.atera.com/agentpackagesnet45/Agent.Package.Availability/0.16/Agent.Package.Availability.z
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a-efb4-4303-98c9-cf62501a24d9/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=deedb6f3-d7ab-40dc-bc11-0b1184a6d22a&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=55ef0378-bd34-4bdb-83d2-4cef98847c3b
unknown
https://ps.atera.com/agentpackagesmac/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
unknown
https://ps.atera.com/agentpackagesnet45/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=f2b2651c-4fd7-4f48-bd8b-32fdf2d1d2f4&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://ps.atera.com/agentpackagesmac/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
unknown
https://www.newtonsoft.com/json
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/d15def5a-efb4-4303-98c9-cf62501a24d9/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=0b7f434f-4e93-4de1-96e0-b290421338b8&tt=0&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a-efb4-4303-98c9-cf62501a24d9/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=be00bfee-7c6d-496b-a7d0-fdd77a8acffb&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
http://wixtoolset.org/news/
unknown
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf
unknown
https://ps.atera.com/agentpackageswin/AgentPackageAgentInformation/22.7/AgentPackageAgentInformation
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/d15def5a-efb4-4303-98c9-cf62501a24d9/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=35924d94-0058-4718-9b1f-2ddd57458183&tt=0&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://agent-api.aterD
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageNetworkDiscovery/13.0/AgentPackageNetworkDiscovery
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=75a7f166-9092-405a-aa00-38a9a77e5eae&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://ps.atera.com/agentpackageswin/Agent.Package.IotPoc/13.0/Agent.Package.IotPoc.zip
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/d15def5a-efb4-4303-98c9-cf62501a24d9/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=85c15caa-37cb-46fd-a6ee-c8729985b9f4&tr=33&tt=17324434200461240&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesseTaskFactory9
unknown
https://agent-api.atera.comx
unknown
https://agent-api.atera.com/Pro
unknown
https://agent-api.atera.com/Production/Agent/AcknowledgeCommands
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageTaskScheduler/13.0/AgentPackageTaskScheduler.zip
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageAgentInformation/38.0/AgentPackageAgentInformation
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=9b2f45ce-12e9-4161-ad72-09f2e15b84d0&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/d15def5a-efb4-4303-98c9-cf62501a24d9/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=ccc99601-6851-4238-90a7-17abb94d8a97&tt=0&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://agent-api.P
unknown
http://www.w3.o
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/38.0/AgentPackageAgentInformati
unknown
https://agent-api.atera.com/Production/Agent/GetCommandsFallback
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageRuntimeInstaller/1.6/AgentPackageRuntimeInstalle
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a-efb4-4303-98c9-cf62501a24d9/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=da1cc509-7766-41b3-99b4-204f1ef88690&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
http://ps.pndsn.com
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/d15def5a-efb4-4303-98c9-cf62501a24d9/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=30c82597-9c84-4489-895a-c306fe08576d&tr=33&tt=17324433474242351&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=ff2dd1d9-885a-46fe-8e7f-5a540ad227d3&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://github.com/JamesNK/Newtonsoft.Json
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=55ef0378-bd34-4bdb-83d2-4cef98847c3b&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a-efb4-4303-98c9-cf62501a24d9/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=a3aed830-4538-4a0c-8880-b4e93ae94626&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a-efb4-4303-98c9-cf62501a24d9/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=1043b6b4-24c3-4b2c-8715-05fa1152bb8e&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://ps.atera.com/agentpackagesmac/Agent.Package.Availability/0.16/Agent.Package.Availability.zip
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/d15def5a-efb4-4303-98c9-cf62501a24d9/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=2cd035b5-493b-42ef-8a0c-7668843cdc0d&tr=33&tt=17324433453164358&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a-efb4-4303-98c9-cf62501a24d9/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=2d3ae8ae-040f-464c-8cba-7d2785f40888&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=d88a8beb-580c-4eae-be4b-b07e69debebd&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/d15def5a-efb4-4303-98c9-cf62501a24d9/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=392754e5-9d09-4f5e-8c18-73d91936b641&tt=0&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesd
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=1525893c-da1a-47f1-9090-c6703d359f6f&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=f087f5f2-7b58-49f6-808f-3ff0a062bb98&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/d15def5a-efb4-4303-98c9-cf62501a24d9/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=0b5482b4-128a-47b8-9bcd-b0f99b563300&uuid=d15def5a-efb4-4303-98c9-cf62501a24d9
13.232.67.199
https://agent-api.atera.com/Production/Agent/CommandResult
unknown
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf8
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ps.pndsn.com
13.232.67.199
bg.microsoft.map.fastly.net
199.232.214.172
d25btwd9wax8gu.cloudfront.net
108.158.75.93
fp2e7a.wpc.phicdn.net
192.229.221.95
windowsupdatebg.s.llnwi.net
178.79.238.0
ps.atera.com
unknown
agent-api.atera.com
unknown

IPs

IP
Domain
Country
Malicious
108.158.75.93
d25btwd9wax8gu.cloudfront.net
United States
13.232.67.199
ps.pndsn.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6def8f.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\6def8f.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\ATERA Networks\AteraAgent\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\ATERA Networks\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Features
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
AutoBackupLogFiles
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AteraAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
AccountId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
IntegratorLogin
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
CompanyId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
AgentId
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
ServerName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AlphaAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
FileDirectory
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_USERS.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
FileDirectory
There are 145 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
29100073000
trusted library allocation
page read and write
malicious
258CC663000
trusted library allocation
page read and write
malicious
2917DF5A000
heap
page read and write
malicious
43FA000
heap
page read and write
malicious
258CBDB0000
heap
page read and write
malicious
1F37F4A9000
heap
page read and write
malicious
1F37DE50000
heap
page read and write
malicious
258CC5E1000
trusted library allocation
page read and write
malicious
2917DED0000
heap
page read and write
malicious
258CC627000
trusted library allocation
page read and write
malicious
2D237E20000
heap
page read and write
malicious
2917DF0D000
heap
page read and write
malicious
2D239779000
trusted library allocation
page read and write
malicious
20DDCB50000
heap
page read and write
malicious
2D2397A2000
trusted library allocation
page read and write
malicious
4BB4000
trusted library allocation
page read and write
malicious
291000BF000
trusted library allocation
page read and write
malicious
20DDD293000
trusted library allocation
page read and write
malicious
258CBDB9000
heap
page read and write
malicious
2D237BE3000
heap
page read and write
malicious
1F37DE58000
heap
page read and write
malicious
2D23986C000
trusted library allocation
page read and write
malicious
2D237B50000
heap
page read and write
malicious
2917DEB0000
heap
page read and write
malicious
2917DEEB000
heap
page read and write
malicious
4B11000
trusted library allocation
page read and write
malicious
1F30006B000
trusted library allocation
page read and write
malicious
1F37DE6B000
heap
page read and write
malicious
2917DED9000
heap
page read and write
malicious
7FFB4AA14000
trusted library allocation
page read and write
malicious
1F37EF26000
heap
page read and write
malicious
258CBDF2000
heap
page read and write
malicious
1F300266000
trusted library allocation
page read and write
malicious
2D2397A4000
trusted library allocation
page read and write
malicious
20DDC8A1000
heap
page read and write
malicious
2D237B72000
heap
page read and write
malicious
1F37DE8C000
heap
page read and write
malicious
2D23977C000
trusted library allocation
page read and write
malicious
1F37DE20000
heap
page read and write
malicious
258CC653000
trusted library allocation
page read and write
malicious
258CC0A0000
heap
page read and write
malicious
1F37DED6000
heap
page read and write
malicious
2D237902000
unkown
page readonly
malicious
2D2521C9000
heap
page read and write
malicious
2D237B93000
heap
page read and write
malicious
20DDC860000
heap
page read and write
malicious
258CBE35000
heap
page read and write
malicious
20DDC8B0000
heap
page read and write
malicious
2D251DB0000
heap
page read and write
malicious
52F4000
trusted library allocation
page read and write
malicious
258CBDCC000
heap
page read and write
malicious
2D239822000
trusted library allocation
page read and write
malicious
1F37DDF0000
heap
page read and write
malicious
258CC69F000
trusted library allocation
page read and write
malicious
2D237B5C000
heap
page read and write
malicious
20DDC8EE000
heap
page read and write
malicious
1F37F310000
heap
page read and write
malicious
1F37F838000
heap
page read and write
malicious
2D2396F1000
trusted library allocation
page read and write
malicious
467A000
heap
page read and write
malicious
258CBDEC000
heap
page read and write
malicious
1F37DF0E000
heap
page read and write
malicious
2D2397AA000
trusted library allocation
page read and write
malicious
29100001000
trusted library allocation
page read and write
malicious
20DDD283000
trusted library allocation
page read and write
malicious
4911000
heap
page read and write
malicious
4F60000
heap
page read and write
malicious
1F300001000
trusted library allocation
page read and write
malicious
20DDD211000
trusted library allocation
page read and write
malicious
29100047000
trusted library allocation
page read and write
malicious
B9A8CF5000
stack
page read and write
malicious
29100083000
trusted library allocation
page read and write
malicious
2D252140000
heap
page read and write
malicious
20DDC6C2000
unkown
page readonly
malicious
20DDCB32000
unkown
page readonly
malicious
2D2397B9000
trusted library allocation
page read and write
malicious
5251000
trusted library allocation
page read and write
malicious
7FFB4A89B000
trusted library allocation
page execute and read and write
2D2521AA000
heap
page read and write
98B000
stack
page read and write
28DD20A8000
heap
page read and write
6F70000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6CCDDFE000
stack
page read and write
DD921FC000
stack
page read and write
6F30000
trusted library allocation
page read and write
B9A90FD000
stack
page read and write
3365000
heap
page read and write
6F90000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
4F60000
heap
page readonly
6F70000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
C76000
heap
page read and write
6F70000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
7FFB4AB60000
trusted library allocation
page read and write
2D237B7E000
heap
page read and write
DD91AFE000
stack
page read and write
B9A983E000
stack
page read and write
6F70000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
3280000
heap
page read and write
7FFB4AA80000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
20DDD070000
heap
page read and write
5190000
trusted library allocation
page read and write
7FFB4A880000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
5190000
heap
page read and write
1F37F710000
unkown
page readonly
6F80000
trusted library allocation
page read and write
28DD1DD0000
heap
page read and write
4910000
trusted library allocation
page read and write
28DD2080000
heap
page read and write
945797D000
stack
page read and write
6CCCF11000
stack
page read and write
4930000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
28DD14C1000
heap
page read and write
51D0000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
FA0000
trusted library allocation
page read and write
E7C000
heap
page read and write
45B0000
heap
page read and write
6F80000
trusted library allocation
page read and write
1F37F400000
heap
page read and write
51B0000
trusted library allocation
page read and write
49D0000
heap
page readonly
6F90000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
798E000
stack
page read and write
2D252150000
heap
page read and write
6F30000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
28DD1507000
heap
page read and write
6F70000
trusted library allocation
page read and write
1F3000A3000
trusted library allocation
page read and write
4430000
trusted library allocation
page execute and read and write
6F70000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
7FFB4AA90000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
2D237B99000
heap
page read and write
1F3001EA000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
46AB000
heap
page read and write
BDAEFFE000
stack
page read and write
5B11000
trusted library allocation
page read and write
51D4000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
2D237B95000
heap
page read and write
20DED221000
trusted library allocation
page read and write
28DD150A000
heap
page read and write
753B000
heap
page read and write
6F70000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
29100151000
trusted library allocation
page read and write
28DD1DEC000
heap
page read and write
51E0000
trusted library allocation
page read and write
7FFB4AA8E000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
794D000
stack
page read and write
6F30000
trusted library allocation
page read and write
DD914FE000
stack
page read and write
28DD209C000
heap
page read and write
258CBD90000
heap
page read and write
51E0000
trusted library allocation
page read and write
28DD1DCD000
heap
page read and write
455E000
stack
page read and write
29110001000
trusted library allocation
page read and write
CB7D1FE000
stack
page read and write
5190000
trusted library allocation
page read and write
7FFB4AA70000
trusted library allocation
page execute and read and write
32A0000
heap
page read and write
6F50000
trusted library allocation
page read and write
DD91BFB000
stack
page read and write
7FFB4A8EC000
trusted library allocation
page execute and read and write
43F0000
trusted library allocation
page read and write
7FFB4A87D000
trusted library allocation
page execute and read and write
2D251E38000
heap
page read and write
6F70000
trusted library allocation
page read and write
6CCD6FE000
stack
page read and write
51D0000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
28DD14C2000
heap
page read and write
6F50000
trusted library allocation
page read and write
7FFB4A88D000
trusted library allocation
page execute and read and write
45B000
stack
page read and write
6F50000
trusted library allocation
page read and write
529F000
trusted library allocation
page read and write
2D239650000
heap
page read and write
7FFB4AB90000
trusted library allocation
page read and write
28DD2087000
heap
page read and write
7FF44D2B0000
trusted library allocation
page execute and read and write
4F78000
trusted library allocation
page read and write
2910012C000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
28DD12F0000
heap
page read and write
CB7CDFE000
stack
page read and write
6F70000
trusted library allocation
page read and write
28DD1DEC000
heap
page read and write
6F50000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
351B000
heap
page read and write
5210000
trusted library allocation
page read and write
28DD14C6000
heap
page read and write
BDAFAFE000
stack
page read and write
B9AB97E000
stack
page read and write
6F70000
trusted library allocation
page read and write
2D239653000
heap
page read and write
7FFB4AA40000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
20DED211000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
7FFB4AA2D000
trusted library allocation
page read and write
51D3000
trusted library allocation
page read and write
7FFB4AA70000
trusted library allocation
page execute and read and write
7FFB4AB70000
trusted library allocation
page read and write
1F300560000
trusted library allocation
page read and write
7FFB4AA4A000
trusted library allocation
page read and write
2910012F000
trusted library allocation
page read and write
94575B7000
stack
page read and write
17B974E8000
heap
page read and write
1F37F509000
heap
page read and write
7FFB4AA60000
trusted library allocation
page read and write
7010000
heap
page read and write
B9ABA7E000
stack
page read and write
1F37EF23000
heap
page read and write
35B0000
heap
page read and write
33AF000
stack
page read and write
1F37F712000
unkown
page readonly
47DD000
stack
page read and write
51D0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
CBD000
stack
page read and write
258CC5D0000
heap
page execute and read and write
6F30000
trusted library allocation
page read and write
B9AAA78000
stack
page read and write
7FFB4AB16000
trusted library allocation
page read and write
7FFB4AAC0000
trusted library allocation
page read and write
1F300210000
trusted library allocation
page read and write
1F3008D5000
trusted library allocation
page read and write
7FFB4AB10000
trusted library allocation
page read and write
5050000
heap
page read and write
51B0000
trusted library allocation
page read and write
1F3008AF000
trusted library allocation
page read and write
1F30051B000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
1F30055A000
trusted library allocation
page read and write
1F3008DF000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
31AB000
heap
page read and write
305D000
stack
page read and write
7FFB4A990000
trusted library allocation
page execute and read and write
1F3001B0000
trusted library allocation
page read and write
DAB000
trusted library allocation
page execute and read and write
6F70000
trusted library allocation
page read and write
31AA000
heap
page read and write
51E0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
1F300756000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
2D2396E0000
heap
page read and write
51D0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
1F3001B8000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
28DD152D000
heap
page read and write
6F50000
trusted library allocation
page read and write
4820000
trusted library allocation
page execute and read and write
51B0000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
9457B7E000
stack
page read and write
4BE4000
trusted library allocation
page read and write
258CBEA9000
heap
page read and write
51D0000
trusted library allocation
page read and write
4560000
heap
page execute and read and write
6F70000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
1F30077C000
trusted library allocation
page read and write
6CCD8FE000
stack
page read and write
319A000
heap
page read and write
1F3008B3000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
34E0000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
7FFB4AA40000
trusted library allocation
page execute and read and write
6F50000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
28DD1DFE000
heap
page read and write
28DD2087000
heap
page read and write
28DD1507000
heap
page read and write
34FA000
heap
page read and write
6F70000
trusted library allocation
page read and write
28DD14C1000
heap
page read and write
1F300754000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
34F0000
heap
page read and write
6F70000
trusted library allocation
page read and write
28DD208E000
heap
page read and write
7FFB4A8A0000
trusted library allocation
page read and write
1F37F3ED000
heap
page read and write
DD915FE000
stack
page read and write
7FFB4AC80000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
752C000
heap
page read and write
1F37F3C1000
heap
page read and write
5324000
trusted library allocation
page read and write
DD925FA000
stack
page read and write
20DDC9A0000
heap
page read and write
6F80000
trusted library allocation
page read and write
6F74000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
32C0000
heap
page read and write
51B0000
trusted library allocation
page read and write
4B5F000
trusted library allocation
page read and write
2D239690000
heap
page execute and read and write
DD920FD000
stack
page read and write
7FFB4AA90000
trusted library allocation
page execute and read and write
2D237BB4000
heap
page read and write
5190000
trusted library allocation
page read and write
1F37F85F000
heap
page read and write
1F3000D4000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
DD926FD000
stack
page read and write
5B15000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
7F2A8000
trusted library allocation
page execute and read and write
CC5000
heap
page read and write
6F50000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
2D2521E8000
heap
page read and write
F0D000
stack
page read and write
258CC731000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
4680000
trusted library allocation
page read and write
B9ABC7C000
stack
page read and write
58B5000
trusted library allocation
page read and write
1F37DE25000
heap
page read and write
6F70000
trusted library allocation
page read and write
700E000
stack
page read and write
28DD1E0A000
heap
page read and write
7FFB4A8AB000
trusted library allocation
page execute and read and write
7FFB4A883000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
6FB0000
trusted library allocation
page read and write
28DD1476000
heap
page read and write
7FFB4AAB0000
trusted library allocation
page read and write
F10000
trusted library allocation
page execute and read and write
28DD1441000
heap
page read and write
6F70000
trusted library allocation
page read and write
7FFB4AA68000
trusted library allocation
page read and write
4880000
trusted library allocation
page read and write
28DD148E000
heap
page read and write
519C000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
7539000
heap
page read and write
B9AB47C000
stack
page read and write
51F0000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
7FFB4ABB0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
1F37F84B000
heap
page read and write
51D0000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
258CBE0C000
heap
page read and write
6F50000
trusted library allocation
page read and write
7FFB4AA99000
trusted library allocation
page read and write
7FFB4AC40000
trusted library allocation
page read and write
7D0000
heap
page read and write
6F30000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
7FFB4AAA2000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
481E000
stack
page read and write
6F50000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
5195000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
46A0000
trusted library allocation
page read and write
4BA3000
trusted library allocation
page read and write
28DD1507000
heap
page read and write
6F50000
trusted library allocation
page read and write
28DD14AA000
heap
page read and write
6F50000
trusted library allocation
page read and write
28DD208A000
heap
page read and write
4AE0000
heap
page read and write
7FFB4A940000
trusted library allocation
page execute and read and write
20DDD1DC000
unkown
page readonly
7FFB4A9B0000
trusted library allocation
page execute and read and write
B9A8FFE000
stack
page read and write
51E0000
trusted library allocation
page read and write
7FFB4A86D000
trusted library allocation
page execute and read and write
28DD16F5000
heap
page read and write
7FC48000
trusted library allocation
page execute and read and write
BDAF8FE000
stack
page read and write
6F70000
trusted library allocation
page read and write
51D1000
trusted library allocation
page read and write
31C8000
heap
page read and write
B5E000
stack
page read and write
51B0000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
28DD1DCA000
heap
page read and write
6F39000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
510C000
trusted library allocation
page execute and read and write
1F3008EC000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
258CBDD7000
heap
page read and write
BDAF3FF000
stack
page read and write
6F50000
trusted library allocation
page read and write
7FFB4A8BB000
trusted library allocation
page execute and read and write
6F50000
trusted library allocation
page read and write
1F37F3FD000
heap
page read and write
E0E000
stack
page read and write
51D0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
1F3000A8000
trusted library allocation
page read and write
44D0000
heap
page execute and read and write
51B0000
trusted library allocation
page read and write
441C000
trusted library allocation
page execute and read and write
4DB7000
trusted library allocation
page execute and read and write
2D237BA3000
heap
page read and write
7C0000
heap
page read and write
7FFB4AAA0000
trusted library allocation
page read and write
6FA0000
trusted library allocation
page execute and read and write
DD923FE000
stack
page read and write
28DD1434000
heap
page read and write
6F50000
trusted library allocation
page read and write
F20000
heap
page read and write
6F50000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
327D000
stack
page read and write
5190000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
2D251E6B000
heap
page read and write
31C8000
heap
page read and write
28DD1DFE000
heap
page read and write
6F50000
trusted library allocation
page read and write
1F3007F8000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
1F37F3D3000
heap
page read and write
51E0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
1F30077E000
trusted library allocation
page read and write
7FFB4A8BC000
trusted library allocation
page execute and read and write
7FFB4AA36000
trusted library allocation
page read and write
2917EF24000
heap
page read and write
28DD1DFF000
heap
page read and write
B9A94FE000
stack
page read and write
6F50000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
1F300903000
trusted library allocation
page read and write
31A0000
heap
page read and write
1F300058000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
4BF2000
trusted library allocation
page read and write
4E5E000
stack
page read and write
DD917FE000
stack
page read and write
51D0000
trusted library allocation
page read and write
509E000
stack
page read and write
20DDC8EB000
heap
page read and write
6F30000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
28DD152D000
heap
page read and write
2D237E25000
heap
page read and write
6F30000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
DA7000
trusted library allocation
page execute and read and write
6FB0000
trusted library allocation
page read and write
7FFB4A926000
trusted library allocation
page read and write
7FFB4A950000
trusted library allocation
page execute and read and write
6F70000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
1F300809000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
258CBEB0000
heap
page read and write
DD911FE000
stack
page read and write
6F50000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
1F3000DC000
trusted library allocation
page read and write
1F300263000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
4FE0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
20DDD200000
heap
page execute and read and write
1F37E140000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
50DE000
stack
page read and write
43F3000
trusted library allocation
page read and write
28DD1E07000
heap
page read and write
B9A9F2B000
stack
page read and write
6F30000
trusted library allocation
page read and write
28DD144D000
heap
page read and write
1F300750000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
52A1000
trusted library allocation
page read and write
B9A8E2D000
stack
page read and write
7FFB4A883000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
28DD14AA000
heap
page read and write
20DDD33C000
trusted library allocation
page read and write
B9AB57C000
stack
page read and write
51D0000
trusted library allocation
page read and write
32D0000
heap
page read and write
50F0000
heap
page execute and read and write
28DD1DAF000
heap
page read and write
7FFB4A89D000
trusted library allocation
page execute and read and write
51B0000
trusted library allocation
page read and write
7FFB4AA61000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
1F37E790000
trusted library allocation
page read and write
B9A9C3C000
stack
page read and write
5190000
trusted library allocation
page read and write
778E000
stack
page read and write
51D0000
trusted library allocation
page read and write
31C4000
heap
page read and write
C55000
heap
page read and write
6F70000
trusted library allocation
page read and write
B9A9D3D000
stack
page read and write
36E0000
heap
page read and write
51E0000
trusted library allocation
page read and write
3080000
heap
page read and write
28DD1476000
heap
page read and write
6F70000
trusted library allocation
page read and write
DD910FE000
stack
page read and write
B9A9729000
stack
page read and write
51D0000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
1F310021000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
55C1000
trusted library allocation
page read and write
28DD1DC1000
heap
page read and write
5190000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
2D237CA0000
heap
page execute and read and write
28DD1DC1000
heap
page read and write
5190000
trusted library allocation
page read and write
7FFB4AC50000
trusted library allocation
page read and write
7FFB4AAF0000
trusted library allocation
page execute and read and write
2917DF17000
heap
page read and write
6F50000
trusted library allocation
page read and write
1F30074C000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
7FFB4AAE0000
trusted library allocation
page execute and read and write
1F37DEAC000
heap
page read and write
2D237CE0000
heap
page execute and read and write
2917DF11000
heap
page read and write
258CBFF0000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
28DD1DB2000
heap
page read and write
2917EF8B000
heap
page read and write
6F50000
trusted library allocation
page read and write
B9AB677000
stack
page read and write
6F50000
trusted library allocation
page read and write
28DD1DCA000
heap
page read and write
3290000
heap
page read and write
1F37EE50000
heap
page read and write
7FFB4AA35000
trusted library allocation
page read and write
2D251F52000
unkown
page readonly
7FFB4A894000
trusted library allocation
page read and write
20DDCAC0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
5109000
trusted library allocation
page execute and read and write
4DB5000
trusted library allocation
page execute and read and write
5190000
trusted library allocation
page read and write
1F31000E000
trusted library allocation
page read and write
20DF59EA000
heap
page read and write
7EE28000
trusted library allocation
page execute and read and write
B9A93FF000
stack
page read and write
258E4F0E000
heap
page read and write
4BAB000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
7FFB4AA4C000
trusted library allocation
page read and write
3514000
heap
page read and write
491B000
trusted library allocation
page execute and read and write
6F70000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
6FB0000
trusted library allocation
page read and write
50CE000
stack
page read and write
47E4000
trusted library allocation
page read and write
1F37F3F1000
heap
page read and write
6F70000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
2D23986A000
trusted library allocation
page read and write
1F3008D7000
trusted library allocation
page read and write
7FFB4A916000
trusted library allocation
page read and write
1F37E1B5000
heap
page read and write
51D0000
trusted library allocation
page read and write
7FFB4A936000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
51C0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
30CE000
unkown
page read and write
6F80000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
7AA6000
heap
page read and write
6F70000
trusted library allocation
page read and write
1F37F3B5000
heap
page read and write
20DDC8A6000
heap
page read and write
D73000
trusted library allocation
page execute and read and write
6F50000
trusted library allocation
page read and write
1F37F3E1000
heap
page read and write
DD913FB000
stack
page read and write
2917EF29000
heap
page read and write
7FFB4A864000
trusted library allocation
page read and write
1F3008DB000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
C40000
heap
page read and write
503E000
stack
page read and write
1F3001A0000
trusted library allocation
page read and write
31BA000
heap
page read and write
20DDC94F000
heap
page read and write
6F70000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6F73000
trusted library allocation
page read and write
17B97775000
heap
page read and write
7FFB4AA50000
trusted library allocation
page read and write
6EC000
heap
page read and write
6F90000
trusted library allocation
page read and write
5298000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
7FFB4AA64000
trusted library allocation
page read and write
7FFB4AA80000
trusted library allocation
page execute and read and write
6F30000
trusted library allocation
page read and write
D7D000
trusted library allocation
page execute and read and write
51D0000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
477E000
stack
page read and write
6F70000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
E89000
heap
page read and write
6F70000
trusted library allocation
page read and write
7FFB4AA77000
trusted library allocation
page read and write
48B1000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
5230000
heap
page read and write
55C5000
trusted library allocation
page read and write
510000
heap
page read and write
2F9D000
stack
page read and write
51B0000
trusted library allocation
page read and write
2D251FE4000
unkown
page readonly
51F0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
2D237B40000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
28DD14AA000
heap
page read and write
6F90000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
595000
heap
page read and write
20DDC960000
heap
page read and write
510F000
stack
page read and write
6F70000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
1F300544000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
74FE000
stack
page read and write
44B0000
heap
page read and write
51B0000
trusted library allocation
page read and write
28DD144A000
heap
page read and write
28DD14AA000
heap
page read and write
28DD20A2000
heap
page read and write
20DDD130000
unkown
page readonly
51B0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
7AC7000
heap
page read and write
CB2000
heap
page read and write
673000
heap
page read and write
51D0000
trusted library allocation
page read and write
2917E6B0000
heap
page execute and read and write
B9ABD7C000
stack
page read and write
6F30000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
7FFB4AA40000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
7FFB4ABA0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
1F300178000
trusted library allocation
page read and write
1F3000E0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
1F30077A000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
28DD1DC5000
heap
page read and write
5336000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
7FFB4AAC0000
trusted library allocation
page execute and read and write
2D237BDB000
heap
page read and write
683000
heap
page read and write
51B0000
trusted library allocation
page read and write
34D0000
trusted library allocation
page read and write
28DD14B0000
heap
page read and write
6F90000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
258CC61D000
trusted library allocation
page read and write
31C0000
heap
page read and write
51B0000
trusted library allocation
page read and write
7FFB4AAA0000
trusted library allocation
page execute and read and write
51F0000
trusted library allocation
page read and write
B9AA87F000
stack
page read and write
713E000
stack
page read and write
28DD14C6000
heap
page read and write
7FFB4A920000
trusted library allocation
page read and write
20DF5A86000
heap
page read and write
6F80000
trusted library allocation
page read and write
28DD1DD0000
heap
page read and write
7FFB4AAD0000
trusted library allocation
page execute and read and write
2D2521B1000
heap
page read and write
6F30000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
5100000
trusted library allocation
page read and write
4B11000
heap
page read and write
258CBDF8000
heap
page read and write
69BE000
stack
page read and write
4480000
trusted library allocation
page read and write
7FFB4A910000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
4DD0000
trusted library allocation
page read and write
B9A91FE000
stack
page read and write
7FFB4AAC0000
trusted library allocation
page execute and read and write
1F37F560000
heap
page read and write
7FFB4AB00000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
1F3000A1000
trusted library allocation
page read and write
487A000
heap
page read and write
7FFB4A890000
trusted library allocation
page read and write
7FFB4ABC0000
trusted library allocation
page execute and read and write
51B0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
1F37E5D7000
heap
page read and write
1F37E7C0000
trusted library allocation
page read and write
7FFB4AA59000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
2D2521BA000
heap
page read and write
6F80000
trusted library allocation
page read and write
5240000
heap
page execute and read and write
6F70000
trusted library allocation
page read and write
6CCD7FE000
stack
page read and write
51D0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
28DD1492000
heap
page read and write
30DE000
stack
page read and write
51B0000
trusted library allocation
page read and write
B9AAB68000
stack
page read and write
51D0000
trusted library allocation
page read and write
7FFB4AA13000
trusted library allocation
page read and write
764D000
stack
page read and write
46A7000
trusted library allocation
page execute and read and write
51D0000
trusted library allocation
page read and write
28DD14C6000
heap
page read and write
1F37E170000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
28DD14AA000
heap
page read and write
7FFB4AA13000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
2D237900000
unkown
page readonly
6F80000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
B9AB37E000
stack
page read and write
258DC5F1000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
1F300780000
trusted library allocation
page read and write
6C70000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
7FFB4A8A4000
trusted library allocation
page read and write
DD916FE000
stack
page read and write
7500000
heap
page read and write
6F80000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
7FFB4A882000
trusted library allocation
page read and write
28DD1507000
heap
page read and write
6F70000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
28DD1DCE000
heap
page read and write
7FFB4AAD0000
trusted library allocation
page execute and read and write
319A000
heap
page read and write
6F50000
trusted library allocation
page read and write
34E4000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
20DDC6C0000
unkown
page readonly
51B0000
trusted library allocation
page read and write
67C000
heap
page read and write
51B0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
28DD1DC9000
heap
page read and write
28DD1DFE000
heap
page read and write
6F30000
trusted library allocation
page read and write
2D251E4F000
heap
page read and write
6F90000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
28DD14C6000
heap
page read and write
1F3008E1000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
1F37F110000
unkown
page readonly
1F37E780000
heap
page execute and read and write
B9F000
stack
page read and write
1F37F112000
unkown
page readonly
51D0000
trusted library allocation
page read and write
7FFB4AA20000
trusted library allocation
page read and write
2D2521BE000
heap
page read and write
B9AAC7B000
stack
page read and write
7FFB4A990000
trusted library allocation
page execute and read and write
258CC735000
trusted library allocation
page read and write
258E4F20000
heap
page read and write
6C50000
trusted library allocation
page execute and read and write
51C0000
trusted library allocation
page read and write
6251000
trusted library allocation
page read and write
20DDC88B000
heap
page read and write
7FFB4AA40000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
52AD000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
31BA000
heap
page read and write
6F70000
trusted library allocation
page read and write
7FFB4A88B000
trusted library allocation
page execute and read and write
51F0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
7FFB4AA30000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
7FFB4AA10000
trusted library allocation
page read and write
51A0000
trusted library allocation
page read and write
7FFB4AAB4000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
7FFB4A956000
trusted library allocation
page execute and read and write
7FFB4A87D000
trusted library allocation
page execute and read and write
6F30000
trusted library allocation
page read and write
BDAF4FE000
stack
page read and write
6C40000
trusted library allocation
page read and write
1F30074E000
trusted library allocation
page read and write
B9AA57E000
stack
page read and write
51D0000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
258CBE9A000
heap
page read and write
29110011000
trusted library allocation
page read and write
4720000
heap
page readonly
4E1E000
stack
page read and write
28DD14C2000
heap
page read and write
1F3001EE000
trusted library allocation
page read and write
F7E000
stack
page read and write
6F80000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
28DD1DFF000
heap
page read and write
1F37DE30000
heap
page read and write
28DD13F0000
heap
page read and write
D74000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
28DD1464000
heap
page read and write
C0E000
stack
page read and write
7FFB4AAA7000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
3487000
heap
page read and write
6CCDBFE000
stack
page read and write
48A0000
heap
page execute and read and write
7FFB4A946000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
7FFB4A862000
trusted library allocation
page read and write
258DC5E1000
trusted library allocation
page read and write
7FFB4AA53000
trusted library allocation
page read and write
2917DF2D000
heap
page read and write
7FFB4AC60000
trusted library allocation
page read and write
6F74000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
7FFB4A930000
trusted library allocation
page execute and read and write
6F50000
trusted library allocation
page read and write
28DD14C6000
heap
page read and write
51D0000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
20DDD132000
unkown
page readonly
51D0000
trusted library allocation
page read and write
B9A8D3E000
stack
page read and write
6F70000
trusted library allocation
page read and write
1F3001AC000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
4B61000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
2D2521A7000
heap
page read and write
7FFB4A8CC000
trusted library allocation
page execute and read and write
498E000
stack
page read and write
334E000
stack
page read and write
51D0000
trusted library allocation
page read and write
258E4E70000
heap
page read and write
1F37DE9A000
heap
page read and write
51D0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
E94000
heap
page read and write
7FFB4AA2D000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
258E4E60000
heap
page execute and read and write
28DD1507000
heap
page read and write
B9AA13D000
stack
page read and write
20DDC8E9000
heap
page read and write
28DD1493000
heap
page read and write
51E0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
1F300219000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
20DDC88E000
heap
page read and write
51D0000
trusted library allocation
page read and write
7FFB4AA60000
trusted library allocation
page read and write
4C02000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
5195000
trusted library allocation
page read and write
DD91EFC000
stack
page read and write
6F50000
trusted library allocation
page read and write
7FFB4AAE0000
trusted library allocation
page execute and read and write
51D0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
28DD14C1000
heap
page read and write
694000
heap
page read and write
3535000
heap
page read and write
28DD1437000
heap
page read and write
61E000
stack
page read and write
51D0000
trusted library allocation
page read and write
6EA9000
trusted library allocation
page execute and read and write
4810000
heap
page read and write
CB7C9FE000
stack
page read and write
6F70000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
17B97490000
heap
page read and write
28DD14C1000
heap
page read and write
258CC4F0000
heap
page read and write
6F30000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
6FB0000
trusted library allocation
page read and write
17B974E0000
heap
page read and write
6F70000
trusted library allocation
page read and write
3140000
heap
page read and write
51D0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
51DC000
trusted library allocation
page read and write
28DD1DB6000
heap
page read and write
DD91FFC000
stack
page read and write
6F50000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
28DD152D000
heap
page read and write
6F80000
trusted library allocation
page read and write
F15000
heap
page read and write
CB7CBFE000
stack
page read and write
6F34000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
E94000
heap
page read and write
2917DF55000
heap
page read and write
CB7CCFD000
stack
page read and write
6F60000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
7FFB4A940000
trusted library allocation
page read and write
7FFB4AA52000
trusted library allocation
page read and write
28DD2098000
heap
page read and write
6F70000
trusted library allocation
page read and write
7FFB4A872000
trusted library allocation
page read and write
28DD1476000
heap
page read and write
2FF0000
heap
page read and write
6F90000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
7FFB4AA46000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
6CCD4FE000
stack
page read and write
7FFB4A946000
trusted library allocation
page execute and read and write
4670000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
B9A993D000
stack
page read and write
2D2521A3000
heap
page read and write
6F80000
trusted library allocation
page read and write
7FFB4AA15000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
2917DF57000
heap
page read and write
6F50000
trusted library allocation
page read and write
7FFB4AA3E000
trusted library allocation
page read and write
498000
stack
page read and write
4F91000
heap
page read and write
6F50000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
5195000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
4480000
trusted library allocation
page read and write
753F000
heap
page read and write
6F50000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
351D000
heap
page read and write
487E000
stack
page read and write
6F80000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
B9AC07D000
stack
page read and write
73BD000
stack
page read and write
FBE000
stack
page read and write
5190000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
3180000
heap
page read and write
6F50000
trusted library allocation
page read and write
5332000
trusted library allocation
page read and write
B9AAD7B000
stack
page read and write
335E000
stack
page read and write
7FFB4AA30000
trusted library allocation
page read and write
359E000
stack
page read and write
5190000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
17B97470000
heap
page read and write
6F90000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
4912000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
B9AA275000
stack
page read and write
6F7E000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
471E000
stack
page read and write
4DBB000
trusted library allocation
page execute and read and write
6F80000
trusted library allocation
page read and write
5315000
trusted library allocation
page read and write
3480000
heap
page read and write
6C70000
trusted library allocation
page read and write
46AB000
trusted library allocation
page execute and read and write
4AF0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
650000
heap
page read and write
51F0000
trusted library allocation
page read and write
CB7CFFE000
stack
page read and write
BDAF2FD000
stack
page read and write
6F80000
trusted library allocation
page read and write
E50000
heap
page read and write
51D0000
trusted library allocation
page read and write
1F300784000
trusted library allocation
page read and write
2D251F50000
unkown
page readonly
31C8000
heap
page read and write
20DDD361000
trusted library allocation
page read and write
B9ABB7D000
stack
page read and write
51D0000
trusted library allocation
page read and write
3685000
heap
page read and write
7010000
remote allocation
page read and write
6EA0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
6EA6000
trusted library allocation
page execute and read and write
2D2521D8000
heap
page read and write
7FFB4A920000
trusted library allocation
page execute and read and write
4420000
trusted library allocation
page read and write
331F000
stack
page read and write
1F30088D000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
4BF6000
trusted library allocation
page read and write
3528000
heap
page read and write
5103000
trusted library allocation
page read and write
3110000
heap
page read and write
2D239862000
trusted library allocation
page read and write
518F000
stack
page read and write
C6A000
heap
page read and write
7FFB4A93C000
trusted library allocation
page execute and read and write
6F50000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
7FFB4AA50000
trusted library allocation
page read and write
7FFB4A87D000
trusted library allocation
page execute and read and write
47ED000
trusted library allocation
page execute and read and write
1F3000F8000
trusted library allocation
page read and write
7FFB4A976000
trusted library allocation
page execute and read and write
51B0000
trusted library allocation
page read and write
28DD152D000
heap
page read and write
B9A9AB7000
stack
page read and write
6F30000
trusted library allocation
page read and write
1F3000CC000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
7AAC000
heap
page read and write
1F37E5C0000
heap
page read and write
51D0000
trusted library allocation
page read and write
7FFB4A884000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
1F3001B4000
trusted library allocation
page read and write
B10000
heap
page read and write
1F3000AD000
trusted library allocation
page read and write
28DD14AD000
heap
page read and write
2917E070000
heap
page read and write
2D2496F1000
trusted library allocation
page read and write
CC0000
heap
page read and write
2D237D05000
heap
page read and write
28DD14C6000
heap
page read and write
6F30000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
BDAF1FE000
stack
page read and write
6F70000
trusted library allocation
page read and write
7AA0000
heap
page read and write
66CDC7E000
stack
page read and write
C5D000
heap
page read and write
1F37E020000
heap
page read and write
6F30000
trusted library allocation
page read and write
31C6000
heap
page read and write
7F6A0000
trusted library allocation
page execute and read and write
75CE000
stack
page read and write
2D237924000
unkown
page readonly
28DD2090000
heap
page read and write
1F3008AD000
trusted library allocation
page read and write
7FFB4AA50000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
E1E000
stack
page read and write
442B000
heap
page read and write
6F30000
trusted library allocation
page read and write
3145000
heap
page read and write
7FFB4A860000
trusted library allocation
page read and write
7FFB4A92C000
trusted library allocation
page execute and read and write
6F70000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6CCD3FE000
stack
page read and write
20DDCAE0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
E5A000
heap
page read and write
5190000
trusted library allocation
page read and write
1F37F846000
heap
page read and write
51B0000
trusted library allocation
page read and write
77CE000
stack
page read and write
6F80000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
5170000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
20DF5AB4000
heap
page read and write
4884000
trusted library allocation
page read and write
338E000
stack
page read and write
688000
heap
page read and write
6F30000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
DD90DB5000
stack
page read and write
7FFB4A883000
trusted library allocation
page execute and read and write
5342000
trusted library allocation
page read and write
C64000
heap
page read and write
28DD1492000
heap
page read and write
1F37EF70000
heap
page execute and read and write
51D0000
trusted library allocation
page read and write
2D237A90000
heap
page read and write
6F70000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
29100155000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
1F30089D000
trusted library allocation
page read and write
1F37E1B0000
heap
page read and write
20DDCAB0000
heap
page read and write
6F70000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
28DD14D8000
heap
page read and write
1F300562000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
1F37E173000
trusted library allocation
page read and write
2910003B000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
1F300513000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
7010000
remote allocation
page read and write
7FFB4AA50000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
4673000
trusted library allocation
page execute and read and write
51D0000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
2917E020000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
45FA000
heap
page read and write
51B0000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
E6F000
heap
page read and write
7A8F000
stack
page read and write
50E0000
trusted library allocation
page read and write
BDAF5FE000
stack
page read and write
7FFB4A873000
trusted library allocation
page execute and read and write
6F50000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
7FFB4A894000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
33B7000
heap
page read and write
6F60000
trusted library allocation
page read and write
319C000
heap
page read and write
6CCDAFE000
stack
page read and write
6C60000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
4B58000
trusted library allocation
page read and write
28DD1DEC000
heap
page read and write
6F50000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
28DD1507000
heap
page read and write
1F37DE00000
heap
page read and write
6F70000
trusted library allocation
page read and write
1F300557000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
FB0000
heap
page read and write
5190000
trusted library allocation
page read and write
33B0000
heap
page read and write
6F70000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
B9AA03D000
stack
page read and write
3400000
heap
page read and write
1F3000E4000
trusted library allocation
page read and write
7FFB4AA89000
trusted library allocation
page read and write
7FFB4AC70000
trusted library allocation
page read and write
94578FE000
stack
page read and write
4940000
heap
page execute and read and write
2D251E13000
heap
page read and write
5230000
remote allocation
page read and write
51B0000
trusted library allocation
page read and write
28DD1DA7000
heap
page read and write
17B97770000
heap
page read and write
7FFB4AA1D000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
1F37F1BE000
unkown
page readonly
28DD148C000
heap
page read and write
20DDC770000
heap
page read and write
4917000
trusted library allocation
page execute and read and write
6F90000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
E73000
heap
page read and write
6F80000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
344E000
stack
page read and write
6F70000
trusted library allocation
page read and write
B9A963E000
stack
page read and write
6CCD5FD000
stack
page read and write
1F37EFA0000
heap
page execute and read and write
51D0000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
E5F000
stack
page read and write
258CC010000
trusted library allocation
page read and write
28DD1DBB000
heap
page read and write
6F50000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
47D0000
trusted library allocation
page read and write
1F300801000
trusted library allocation
page read and write
28DD208E000
heap
page read and write
258CC085000
heap
page read and write
28DD14C6000
heap
page read and write
7FFB4AB30000
trusted library allocation
page execute and read and write
1F3008E8000
trusted library allocation
page read and write
66CDD7E000
stack
page read and write
5190000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
7FFB4A878000
trusted library allocation
page read and write
7FFB4A88D000
trusted library allocation
page execute and read and write
28DD152D000
heap
page read and write
28DD14C6000
heap
page read and write
1F3006E8000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
28DD14C6000
heap
page read and write
28DD1DD6000
heap
page read and write
B9AAE78000
stack
page read and write
51D0000
trusted library allocation
page read and write
47E0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
4480000
trusted library allocation
page read and write
4DB2000
trusted library allocation
page read and write
7FFB4AB50000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
2D251E8D000
heap
page read and write
7FFB4AA40000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
28DD2190000
heap
page read and write
6F30000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
4890000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
1F300782000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
1F300063000
trusted library allocation
page read and write
4A7E000
stack
page read and write
6F60000
trusted library allocation
page read and write
6F35000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
6DD000
heap
page read and write
4AF3000
trusted library allocation
page read and write
2917DE80000
heap
page read and write
28DD209F000
heap
page read and write
51D0000
trusted library allocation
page read and write
71FD000
stack
page read and write
51B0000
trusted library allocation
page read and write
7508000
heap
page read and write
7FFB4AA23000
trusted library allocation
page read and write
6F10000
trusted library allocation
page read and write
5DE000
stack
page read and write
28DD1507000
heap
page read and write
7FFB4AA60000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
1F37EF4B000
heap
page read and write
51D0000
trusted library allocation
page read and write
7FFB4A8A0000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
2D237B20000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
CB7D4FE000
stack
page read and write
28DD1310000
heap
page read and write
5190000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
51C0000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
4E60000
heap
page read and write
6F70000
trusted library allocation
page read and write
7AD4000
heap
page read and write
28DD1452000
heap
page read and write
1F37F502000
heap
page read and write
6F30000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
1F3002A1000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
2917DEB5000
heap
page read and write
6F30000
trusted library allocation
page read and write
B9AA679000
stack
page read and write
6F30000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
7FFB4A966000
trusted library allocation
page execute and read and write
6F70000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
28DD152D000
heap
page read and write
51D0000
trusted library allocation
page read and write
28DD1492000
heap
page read and write
51D0000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
758000
stack
page read and write
51D0000
trusted library allocation
page read and write
7FFB4AA8D000
trusted library allocation
page read and write
7FFB4A863000
trusted library allocation
page execute and read and write
51C0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
20DDD33F000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
1F3000FA000
trusted library allocation
page read and write
B9AB877000
stack
page read and write
6F70000
trusted library allocation
page read and write
3180000
heap
page read and write
5190000
trusted library allocation
page read and write
451E000
stack
page read and write
7FFB4AA90000
trusted library allocation
page read and write
28DD208A000
heap
page read and write
6F70000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
B9AA47B000
stack
page read and write
2917DF15000
heap
page read and write
5230000
remote allocation
page read and write
6EAC000
trusted library allocation
page execute and read and write
6F50000
trusted library allocation
page read and write
1F300638000
trusted library allocation
page read and write
590000
heap
page read and write
51B0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
B9A9E27000
stack
page read and write
5190000
trusted library allocation
page read and write
1F3008E3000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
28DD1DEC000
heap
page read and write
28DD2083000
heap
page read and write
1F37DED4000
heap
page read and write
B9AB77D000
stack
page read and write
2D237D00000
heap
page read and write
6F80000
trusted library allocation
page read and write
CAE000
heap
page read and write
6F90000
trusted library allocation
page read and write
2917DD80000
heap
page read and write
6F30000
trusted library allocation
page read and write
1F30008F000
trusted library allocation
page read and write
28DD1DB4000
heap
page read and write
3490000
heap
page read and write
51F0000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
4674000
trusted library allocation
page read and write
4AFD000
trusted library allocation
page execute and read and write
6F3C000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
3170000
heap
page read and write
73FF000
stack
page read and write
6F50000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
B9A997F000
unkown
page read and write
51D0000
trusted library allocation
page read and write
7FFB4AA6B000
trusted library allocation
page read and write
2917DFB6000
heap
page read and write
5190000
trusted library allocation
page read and write
1F30055C000
trusted library allocation
page read and write
7EE10000
trusted library allocation
page execute and read and write
6F70000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
28DD1DA0000
heap
page read and write
1F3008EA000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
5170000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
7FFB4AC90000
trusted library allocation
page read and write
6CCD9FE000
stack
page read and write
317E000
stack
page read and write
7FFB4A8B0000
trusted library allocation
page read and write
20DDC6EC000
unkown
page readonly
28DD20A6000
heap
page read and write
2910003F000
trusted library allocation
page read and write
20DF5A84000
heap
page read and write
B9A92FE000
stack
page read and write
7FFB4AAB0000
trusted library allocation
page read and write
258CC70C000
trusted library allocation
page read and write
51D1000
trusted library allocation
page read and write
1F30055E000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
DDE000
stack
page read and write
1F3001A8000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
66CD93D000
stack
page read and write
9457A7B000
stack
page read and write
4A3C000
stack
page read and write
3187000
heap
page read and write
5190000
trusted library allocation
page read and write
5120000
trusted library allocation
page execute and read and write
51D0000
trusted library allocation
page read and write
693E000
stack
page read and write
51D0000
trusted library allocation
page read and write
28DD1DA5000
heap
page read and write
28DD1DC2000
heap
page read and write
DC0000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
2917E000000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
DD91DFD000
stack
page read and write
6F30000
trusted library allocation
page read and write
258CC0A5000
heap
page read and write
51D0000
trusted library allocation
page read and write
1F300180000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
20DDCB55000
heap
page read and write
51B0000
trusted library allocation
page read and write
7FFB4A956000
trusted library allocation
page execute and read and write
51D0000
trusted library allocation
page read and write
28DD1E0D000
heap
page read and write
4D90000
trusted library allocation
page read and write
5230000
remote allocation
page read and write
7FFB4A890000
trusted library allocation
page read and write
20DDCB48000
unkown
page readonly
2DDC000
stack
page read and write
4B00000
heap
page read and write
4DB0000
trusted library allocation
page read and write
2D251E84000
heap
page read and write
B9ABE7D000
stack
page read and write
2D237AD0000
heap
page read and write
7F6B8000
trusted library allocation
page execute and read and write
51D0000
trusted library allocation
page read and write
28DD1E1D000
heap
page read and write
ECC000
stack
page read and write
1F3000D0000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
52E3000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
4B6D000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
4A80000
trusted library allocation
page execute and read and write
6F70000
trusted library allocation
page read and write
17B97460000
heap
page read and write
7FFB4AAC0000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
20DF59C0000
heap
page execute and read and write
6F80000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
20DED21D000
trusted library allocation
page read and write
7FFB4AA70000
trusted library allocation
page read and write
5199000
trusted library allocation
page read and write
52E6000
trusted library allocation
page read and write
28DD1507000
heap
page read and write
258CC723000
trusted library allocation
page read and write
258CBDF0000
heap
page read and write
2D251EAE000
heap
page read and write
6F80000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
5200000
trusted library allocation
page execute and read and write
1F300803000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
49E8000
trusted library allocation
page read and write
52B1000
trusted library allocation
page read and write
28DD152D000
heap
page read and write
7030000
heap
page execute and read and write
6F7C000
trusted library allocation
page read and write
28DD1439000
heap
page read and write
51D0000
trusted library allocation
page read and write
7FFB4A875000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
303C000
stack
page read and write
51D0000
trusted library allocation
page read and write
BDAF6FE000
stack
page read and write
1F300519000
trusted library allocation
page read and write
28DD1463000
heap
page read and write
4915000
trusted library allocation
page execute and read and write
7FFB4AA80000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
28DD14AD000
heap
page read and write
5190000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
20DDCAB5000
heap
page read and write
6F70000
trusted library allocation
page read and write
6C2E000
stack
page read and write
6F30000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
7FFB4AA55000
trusted library allocation
page read and write
E60000
heap
page readonly
51D0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
5210000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
4BD5000
trusted library allocation
page read and write
7FFB4AA36000
trusted library allocation
page read and write
28DD1DFE000
heap
page read and write
6F80000
trusted library allocation
page read and write
28DD2000000
heap
page read and write
C30000
heap
page read and write
363E000
stack
page read and write
7FFB4AA20000
trusted library allocation
page read and write
717E000
stack
page read and write
7FFB4AA90000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
7FFB4AA80000
trusted library allocation
page read and write
D70000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
6C30000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
DD924FB000
stack
page read and write
6F70000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
1F3007FF000
trusted library allocation
page read and write
2917E570000
heap
page read and write
28DD1DD2000
heap
page read and write
6F90000
trusted library allocation
page read and write
7FFB4A870000
trusted library allocation
page read and write
774E000
stack
page read and write
F30000
trusted library allocation
page read and write
1F30051D000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
E10000
heap
page read and write
C30000
heap
page read and write
2917DFD0000
heap
page read and write
580000
heap
page read and write
5190000
trusted library allocation
page read and write
33EE000
stack
page read and write
7A4E000
stack
page read and write
6F70000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
5040000
trusted library allocation
page read and write
B9AA369000
stack
page read and write
6F70000
trusted library allocation
page read and write
1F300547000
trusted library allocation
page read and write
7FFB4A89D000
trusted library allocation
page execute and read and write
51E0000
trusted library allocation
page read and write
47F4000
trusted library allocation
page read and write
7FFB4AB20000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
1F3000C8000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
1F3008DD000
trusted library allocation
page read and write
467D000
trusted library allocation
page execute and read and write
7FFB4AA70000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6FB0000
trusted library allocation
page read and write
7FFB4AA80000
trusted library allocation
page read and write
2D2379B0000
heap
page read and write
51B0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
508F000
stack
page read and write
5170000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
28DD2082000
heap
page read and write
28DD1E15000
heap
page read and write
4FCC000
stack
page read and write
33DE000
stack
page read and write
1F310001000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
319E000
heap
page read and write
6F70000
trusted library allocation
page read and write
9457AFE000
stack
page read and write
6F70000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6CCDCFD000
stack
page read and write
28DD1DB4000
heap
page read and write
6F50000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
36E5000
heap
page read and write
28DD1492000
heap
page read and write
1F30024D000
trusted library allocation
page read and write
258DC5ED000
trusted library allocation
page read and write
7FFB4AA89000
trusted library allocation
page read and write
7FFB4A893000
trusted library allocation
page read and write
31BA000
heap
page read and write
28DD1DCA000
heap
page read and write
5190000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
1F300805000
trusted library allocation
page read and write
7FFB4A930000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
31CF000
heap
page read and write
34E3000
trusted library allocation
page execute and read and write
CB7D3FD000
stack
page read and write
7FFB4A893000
trusted library allocation
page execute and read and write
51D0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
2D251E74000
heap
page read and write
51B0000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
28DD2097000
heap
page read and write
6C90000
heap
page execute and read and write
2D252237000
heap
page read and write
6F70000
trusted library allocation
page read and write
4ADE000
stack
page read and write
6F80000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
4B71000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
7ADF000
heap
page read and write
51D0000
trusted library allocation
page read and write
4480000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
65A000
heap
page read and write
51E0000
trusted library allocation
page read and write
CB7C8F1000
stack
page read and write
6F80000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
C3A000
heap
page read and write
28DD150A000
heap
page read and write
51D0000
trusted library allocation
page read and write
71B000
stack
page read and write
5190000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
29100143000
trusted library allocation
page read and write
7FFB4AA55000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
F8E000
stack
page read and write
2D2521C5000
heap
page read and write
2D251E20000
heap
page read and write
5190000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6FB0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
6F71000
trusted library allocation
page read and write
35BE000
stack
page read and write
5190000
trusted library allocation
page read and write
28DD1430000
heap
page read and write
6F70000
trusted library allocation
page read and write
28DD14D8000
heap
page read and write
2D239868000
trusted library allocation
page read and write
28DD152D000
heap
page read and write
6F70000
trusted library allocation
page execute and read and write
6F50000
trusted library allocation
page read and write
1F37F50B000
heap
page read and write
51B0000
trusted library allocation
page read and write
1F300517000
trusted library allocation
page read and write
DD91CFC000
stack
page read and write
1F37F38C000
heap
page read and write
6F30000
trusted library allocation
page read and write
9457BFD000
stack
page read and write
6F30000
trusted library allocation
page read and write
28DD2084000
heap
page read and write
6F70000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
7AC0000
heap
page read and write
5190000
trusted library allocation
page read and write
7FFB4AA30000
trusted library allocation
page read and write
6F71000
trusted library allocation
page read and write
7FFB4A980000
trusted library allocation
page execute and read and write
51D0000
trusted library allocation
page read and write
B9A95E9000
stack
page read and write
F70000
heap
page read and write
51B0000
trusted library allocation
page read and write
46C0000
heap
page read and write
28DD2085000
heap
page read and write
51B0000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
BED000
stack
page read and write
7FFB4A91C000
trusted library allocation
page execute and read and write
9C7000
stack
page read and write
34ED000
trusted library allocation
page execute and read and write
7FFB4A88D000
trusted library allocation
page execute and read and write
51D0000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
4419000
trusted library allocation
page execute and read and write
51D0000
trusted library allocation
page read and write
28DD1DA2000
heap
page read and write
51D0000
trusted library allocation
page read and write
2D2521F1000
heap
page read and write
697E000
stack
page read and write
51B0000
trusted library allocation
page read and write
6E8E000
stack
page read and write
20DDD353000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
6F90000
trusted library allocation
page read and write
7FFB4AA96000
trusted library allocation
page read and write
7FFB4AB40000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
20DDC980000
heap
page read and write
51B0000
trusted library allocation
page read and write
1F300807000
trusted library allocation
page read and write
514E000
stack
page read and write
28DD14C6000
heap
page read and write
5210000
trusted library allocation
page read and write
6EA3000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
47F0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F35000
trusted library allocation
page read and write
45C1000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
3538000
heap
page read and write
6F35000
trusted library allocation
page read and write
2D252192000
heap
page read and write
CB7CEFF000
stack
page read and write
5190000
trusted library allocation
page read and write
28DD20A6000
heap
page read and write
5106000
trusted library allocation
page execute and read and write
7FFB4A8AD000
trusted library allocation
page execute and read and write
DD919FE000
stack
page read and write
6F70000
trusted library allocation
page read and write
7FC30000
trusted library allocation
page execute and read and write
5190000
trusted library allocation
page read and write
1F310081000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
1F3008E6000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
20DDCB30000
unkown
page readonly
E97000
heap
page read and write
51F0000
trusted library allocation
page read and write
BDAF9FD000
stack
page read and write
1F310013000
trusted library allocation
page read and write
28DD1DCA000
heap
page read and write
7FFB4AA27000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
7FFB4A94C000
trusted library allocation
page execute and read and write
51E0000
trusted library allocation
page read and write
258CBDEE000
heap
page read and write
2917F010000
heap
page execute and read and write
51D0000
trusted library allocation
page execute and read and write
51D0000
trusted library allocation
page read and write
7FFB4AA79000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
28DD1437000
heap
page read and write
28DD1DD0000
heap
page read and write
28DD152D000
heap
page read and write
28DD143B000
heap
page read and write
6F80000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
2D237B56000
heap
page read and write
28DD208B000
heap
page read and write
5190000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
51E0000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
3680000
heap
page read and write
28DD152D000
heap
page read and write
6F80000
trusted library allocation
page read and write
94579FF000
stack
page read and write
6F90000
trusted library allocation
page read and write
7FFB4AA46000
trusted library allocation
page read and write
4830000
trusted library allocation
page read and write
3360000
heap
page read and write
51E0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
1F3000D8000
trusted library allocation
page read and write
2D2496FF000
trusted library allocation
page read and write
4440000
trusted library allocation
page read and write
BDAEEF1000
stack
page read and write
F6F000
stack
page read and write
51F4000
trusted library allocation
page read and write
B9AA97F000
stack
page read and write
51B0000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
7FFB4AA55000
trusted library allocation
page read and write
1F3000BF000
trusted library allocation
page read and write
7FFB4AAD0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
2D2521DC000
heap
page read and write
7FFB4AA2E000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
4BA6000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
35B6000
heap
page read and write
6F70000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6255000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
28DD1507000
heap
page read and write
7FFB4AA36000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
2917EEE0000
heap
page read and write
2917DE60000
heap
page read and write
3190000
heap
page read and write
7FFB4A89D000
trusted library allocation
page execute and read and write
51D0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6CCD2FE000
stack
page read and write
DD912FF000
stack
page read and write
6F70000
trusted library allocation
page read and write
20DDC8C2000
heap
page read and write
6F30000
trusted library allocation
page read and write
1F37E730000
unkown
page read and write
6F30000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
7FFB4AA00000
trusted library allocation
page read and write
1F300081000
trusted library allocation
page read and write
7FFB4A873000
trusted library allocation
page execute and read and write
6F70000
trusted library allocation
page read and write
7FFB4AA60000
trusted library allocation
page read and write
1F3008C5000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
2D237BDD000
heap
page read and write
5220000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
CB7D0FE000
stack
page read and write
5190000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
7FFB4A894000
trusted library allocation
page read and write
7FFB4A99B000
trusted library allocation
page execute and read and write
BDAF0FE000
stack
page read and write
500000
heap
page read and write
7FFB4AAD0000
trusted library allocation
page execute and read and write
31CA000
heap
page read and write
51E0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
1F300752000
trusted library allocation
page read and write
28DD16F0000
heap
page read and write
1F37E160000
trusted library allocation
page read and write
7FFB4A884000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
B15000
heap
page read and write
1F30054D000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
7FFB4AAA0000
trusted library allocation
page read and write
7010000
remote allocation
page read and write
1F300515000
trusted library allocation
page read and write
1F37F362000
heap
page read and write
28DD14C6000
heap
page read and write
6F70000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
DD918FE000
stack
page read and write
6F50000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
71BE000
stack
page read and write
51F0000
trusted library allocation
page read and write
2917DEF6000
heap
page read and write
51D0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
20DF59D0000
heap
page read and write
2917E075000
heap
page read and write
28DD14AD000
heap
page read and write
7FFB4A9A0000
trusted library allocation
page execute and read and write
1F37F800000
heap
page read and write
51D0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
7FFB4A880000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
7FFB4A8B4000
trusted library allocation
page read and write
2D237900000
unkown
page readonly
7FFB4A926000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
D20000
heap
page read and write
6F50000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
7FFB4AAB0000
trusted library allocation
page read and write
47E3000
trusted library allocation
page execute and read and write
28DD1507000
heap
page read and write
C2E000
stack
page read and write
6F81000
trusted library allocation
page read and write
74BE000
stack
page read and write
28DD1507000
heap
page read and write
28DD1492000
heap
page read and write
6F50000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
2D237AB0000
heap
page read and write
7F290000
trusted library allocation
page execute and read and write
7FFB4A8DC000
trusted library allocation
page execute and read and write
2D237B9B000
heap
page read and write
51D0000
trusted library allocation
page read and write
28DD150A000
heap
page read and write
6F70000
trusted library allocation
page read and write
258CC70F000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
D80000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
49CE000
stack
page read and write
6F94000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page execute and read and write
310F000
unkown
page read and write
7FFB4A8CC000
trusted library allocation
page execute and read and write
28DD1DC4000
heap
page read and write
4730000
heap
page read and write
258CBCB0000
heap
page read and write
4FF0000
heap
page read and write
6F90000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
1F3000E8000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
258CC61B000
trusted library allocation
page read and write
7FFB4AB80000
trusted library allocation
page read and write
CB7CAFE000
stack
page read and write
CB7D2FE000
stack
page read and write
1F37EE9F000
heap
page read and write
7FFB4AA32000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
28DD14C2000
heap
page read and write
51B0000
trusted library allocation
page read and write
4942000
heap
page read and write
5160000
heap
page read and write
2D2521EC000
heap
page read and write
5190000
trusted library allocation
page read and write
7FFB4AA10000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
D60000
trusted library allocation
page read and write
52EB000
trusted library allocation
page read and write
51E1000
trusted library allocation
page read and write
1F37F371000
heap
page read and write
6F70000
trusted library allocation
page read and write
1F300640000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
258CC61F000
trusted library allocation
page read and write
258CC080000
heap
page read and write
4480000
trusted library allocation
page read and write
BDAF7FE000
stack
page read and write
5190000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
258E4EBE000
heap
page read and write
1F300549000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
1F37F3CA000
heap
page read and write
7FFB4A88D000
trusted library allocation
page execute and read and write
B9AB07C000
stack
page read and write
6F30000
trusted library allocation
page read and write
28DD1DD9000
heap
page read and write
945787E000
stack
page read and write
51B0000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
1F3006EE000
trusted library allocation
page read and write
E70000
heap
page read and write
6F70000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
345F000
stack
page read and write
51D0000
trusted library allocation
page read and write
5194000
trusted library allocation
page read and write
1F37EF60000
trusted library allocation
page read and write
DD922FC000
stack
page read and write
45AE000
stack
page read and write
51D0000
trusted library allocation
page read and write
E89000
heap
page read and write
51D4000
trusted library allocation
page read and write
2D2395D0000
heap
page read and write
51DE000
trusted library allocation
page read and write
2D251E86000
heap
page read and write
BC0000
heap
page read and write
51D0000
trusted library allocation
page read and write
1F300067000
trusted library allocation
page read and write
3130000
heap
page read and write
F67000
stack
page read and write
1F30054F000
trusted library allocation
page read and write
28DD208A000
heap
page read and write
6F70000
trusted library allocation
page read and write
7FFB4AA4A000
trusted library allocation
page read and write
6F30000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
1F37F347000
heap
page read and write
51B0000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
E97000
heap
page read and write
6FC0000
trusted library allocation
page read and write
504D000
trusted library allocation
page execute and read and write
7FFB4A8AD000
trusted library allocation
page execute and read and write
33CE000
stack
page read and write
5190000
trusted library allocation
page read and write
20DDD365000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
20DDC6C0000
unkown
page readonly
2917EFA7000
heap
page read and write
28DD1DD6000
heap
page read and write
7FFB4A870000
trusted library allocation
page read and write
F2B000
stack
page read and write
6F30000
trusted library allocation
page read and write
1F30054B000
trusted library allocation
page read and write
51F0000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
4A90000
trusted library allocation
page read and write
2910003D000
trusted library allocation
page read and write
7520000
heap
page read and write
4410000
trusted library allocation
page read and write
7ACD000
heap
page read and write
51B0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
58B1000
trusted library allocation
page read and write
2911000D000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
B9AA77D000
stack
page read and write
51E0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
1F30005B000
trusted library allocation
page read and write
1F37FC00000
heap
page read and write
51D0000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
1F3001A4000
trusted library allocation
page read and write
20DDC8A8000
heap
page read and write
28DD152D000
heap
page read and write
6F70000
trusted library allocation
page read and write
6F50000
trusted library allocation
page read and write
5043000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
51D0000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
760E000
stack
page read and write
352E000
stack
page read and write
7FFB4A874000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page execute and read and write
51E0000
trusted library allocation
page read and write
258CBED0000
heap
page read and write
723E000
stack
page read and write
51D0000
trusted library allocation
page read and write
There are 2229 hidden memdumps, click here to show them.