IOC Report
ReceitaFederal-consulta-yFZMA-45896_v.3_35687.msi

loading gif

Files

File Path
Type
Category
Malicious
ReceitaFederal-consulta-yFZMA-45896_v.3_35687.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
initial sample
malicious
C:\Config.Msi\5b113c.rbs
data
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI1264.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSI1264.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI1766.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSI1766.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI2D41.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSI2D41.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI2FB3.tmp
data
dropped
malicious
C:\Windows\Installer\MSI489E.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
modified
malicious
C:\Windows\Installer\MSI489E.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\System32\InstallUtil.InstallLog
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Windows\Temp\~DF31BE93D7FB3585D0.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF552422D476BA62BF.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF5892DD4D99EE3C15.TMP
data
dropped
malicious
C:\Windows\Temp\~DF906A73D282F9BD42.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DFBEDEA443DEFE141C.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DFD7B20DF7F70954E9.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallState
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.ini
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AteraAgent.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
CSV text
dropped
C:\Windows\Installer\5b113b.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\5b113d.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\MSI1264.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI1264.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI1264.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI1264.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI1766.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI1766.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI1766.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI1766.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI2D41.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI2D41.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI2D41.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI2D41.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI2FC4.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI3022.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI30EE.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI489E.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI489E.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI489E.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI489E.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SourceHash{E732A0D7-A2F2-4657-AC41-B19742648E45}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BA74182F76F15A9CF514DEF352303C95
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
Certificate, Version=3
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
Certificate, Version=3
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
data
modified
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BA74182F76F15A9CF514DEF352303C95
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log
CSV text
dropped
C:\Windows\System32\wbem\Performance\WmiApRpl_new.h
ASCII text, with CRLF line terminators
modified
C:\Windows\Temp\~DF01E4E76D878D1653.TMP
data
dropped
C:\Windows\Temp\~DF0426518AB89A8377.TMP
data
dropped
C:\Windows\Temp\~DF2CA74992EDE38C80.TMP
data
dropped
C:\Windows\Temp\~DF5FF21C21BB2C0656.TMP
data
dropped
C:\Windows\Temp\~DFA010BDBBBF13E899.TMP
data
dropped
C:\Windows\Temp\~DFECD76EAE3C39B413.TMP
data
dropped
\Device\ConDrv
JSON data
dropped
There are 74 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI1264.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5968562 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI1766.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5969828 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI2D41.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5975390 11 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="lauraclima92@gmail.com" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000MAUEiIAP" /AgentId="ca4f6eb7-da88-4119-8d72-16266eeb5dd4"
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI489E.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_5982406 33 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" ca4f6eb7-da88-4119-8d72-16266eeb5dd4 "40d7881e-bac7-4bc1-a310-af4ec03e6c5c" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000MAUEiIAP
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" ca4f6eb7-da88-4119-8d72-16266eeb5dd4 "4d432fbf-e66a-4222-84c5-bc3b68a3273b" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000MAUEiIAP
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" ca4f6eb7-da88-4119-8d72-16266eeb5dd4 "47be830f-d7d7-401a-87fc-8b93e37bf80a" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000MAUEiIAP
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\ReceitaFederal-consulta-yFZMA-45896_v.3_35687.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding BEDEEE6C5E800683486D45882C70B787
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding F32542BB014FEC02096438D522414E5D E Global\MSI0000
C:\Windows\SysWOW64\net.exe
"NET" STOP AteraAgent
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 STOP AteraAgent
C:\Windows\SysWOW64\taskkill.exe
"TaskKill.exe" /f /im AteraAgent.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WMIADAP.exe
wmiadap.exe /F /T /R
There are 14 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://ps.atera.com/agentpackagesmac/AgentPackageWindowsUpdate/24.6/AgentPackageWindowsUpdate.zip
unknown
https://ps.atera.com/agentpackageswin/AgentPackageSTRemote/16.0/AgentPackageSTRemote.zip
unknown
http://schemas.datacontract.org
unknown
https://ps.atera.com/agentpackageswin/AgentPackageMonitoring/22.0/AgentPackageMonitoring.zip
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageMarketplace/1.6/AgentPackageMarketplace.zip
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=0f23dd88-0fc7-4a6a-9b6f-a8e42f785442&tt=0&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
13.232.67.198
https://ps.atera.com/agentpackagesmac/AgentPackageInternalPoller/13.0/AgentPackageInternalPoller.zip
unknown
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesected.
unknown
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesseTaskFactory/sub-c-a02ceca8-a958-1
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ca4f6eb7-da88-4119-8d72
unknown
https://ps.atera.com/agentpackageswin/AgentPackageInternalPoller/15.9/AgentPackageInternalPoller.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=c89efe78-d68a-44aa-b962-a0da30029aef&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
13.232.67.198
https://ps.atera.com/agentpackageswin/AgentPackageUpgradeAgent/22.1/AgentPackageUpgradeAgent.zip
unknown
https://agent-api.atera.com/Production/Agent/track-event
unknown
http://dl.google.com/googletalk/googletalk-setup.exe
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageADRemote/6.0/AgentPackageADRemote.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=0b64e705-668e-465a-845d-ea16cbb2791c&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
13.232.67.198
https://ps.atera.com/agentpackagesmac/AgentPackageMarketplace/1.6/AgentPackageMarketplace.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=69f1cfdc-a5c4-4346-9133-ec4ebbe57718&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
13.232.67.198
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=a0accb58-72c6-4bcd-b5e6-5bf070d2bbb5&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
13.232.67.198
https://agent-api.atera.com/Production/Agent/
unknown
http://schemas.datacontract.org/2004/07/System.ServiceProcess
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=59dc8d89-7bee-4d36-a28b-270400da27e0&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
13.232.67.198
http://wixtoolset.org
unknown
https://agent-api.atera.com/Production
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageSystemTools/27.8/AgentPackageSystemTools.zip
unknown
https://ps.atera.com/agentpackageswin/AgentPackageRuntimeInstaller/13.0/AgentPackageRuntimeInstaller
unknown
http://acontrol.atera.com/
unknown
https://ps.pndsn.com
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageADRemote/6.0/AgentPackageADRemote.zip
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ca4f6eb7
unknown
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesseTaskFactorya02ceca8-a958-11e5-bd8
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageNetworkDiscovery/23.9/AgentPackageNetworkDiscove
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=2d83b3c6-7779-408a-91cc-201421fcc115&tr=31&tt=17324434371950064&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
13.232.67.198
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=432189bc-183c-4c40-a56b-6e5a68b3917f&tr=31&tt=17324433983044696&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
13.232.67.198
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=83d4ff7e-819b-463d-a1d8-c1180d5bfe08
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageMonitoring/37.8/AgentPackageMonitoring.zip
unknown
http://agent-api.atera.com
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageSystemTools/27.8/AgentPackageSystemTools.zip
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=b092b222-e28c-4cbf-b2ce-1ad35a4da96f&tr=31&tt=17324434136474401&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
13.232.67.198
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=87de8078-9f58-41e2-9c51-2e34fbeb83af&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
13.232.67.198
https://agent-api.atera.com/Production/Agent/GetRecurrin
unknown
http://schemas.datacontract.org/2004/07/
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=3eaa9905-10e5-43ca-a5ec-3f04289fa0f4&tt=0&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
13.232.67.198
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=7abf71f1-a15a-4c21-a35a-f3e49209c1fb&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
13.232.67.198
https://github.com/icsharpcode/SharpZipLib
unknown
https://ps.atera.com/agentpackageswin/AgentPackageNetworkDiscovery/15.0/AgentPackageNetworkDiscovery
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=9887171e-f6b2-4985-868a-76f8a9ac9c69&tr=31&tt=17324433983044696&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
13.232.67.198
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageAgentI
unknown
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
unknown
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageHeartbeat/17.11/AgentPackageHeartbeat.zip
unknown
http://ciCertTrustedimeStampingCA.cr0$
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageTaskScheduler/17.2/AgentPackageTaskScheduler.zip
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageTicketing/30.1/AgentPackageTicketing.zip
unknown
https://agent-api.atera.com
unknown
https://agent-api.atera.com/Production/Agent/AgentStarting
unknown
http://www.w3.oh
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=8dc1d376-2e7b-4680-b35a-6e4e965362d5&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
13.232.67.198
https://agent-api.atera.com/Production/Agent/GetCommands
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=8d3291ed-c39f-4716-80d8-7d0a2db2f535&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
13.232.67.198
https://ps.atera.com/agentpackageswin/AgentPackageTicketing/18.9/AgentPackageTicketing.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=b90d88ed-90a0-4d85-a3f0-2431379878e6&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
13.232.67.198
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=af1c8f78-a8fb-4782-9e02-8522647fac57
unknown
https://ps.atera.com/agentpackageswin/AgentPackageHeartbeat/16.9/AgentPackageHeartbeat.zip
unknown
https://agent-api.atera.com/
unknown
https://agent-api.atera.com/Production/Agent/GetRecurringPackages
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.Availability/13.0/Agent.Package.Availability.zip
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageRuntimeInstaller/1.5/AgentPackageRuntimeInstaller.
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.Watchdog/13.0/Agent.Package.Watchdog.zip
unknown
https://agent-api.atera.com/Production/Agent/GetRecurringPackagesiChannelSubscribeRequestk.server.
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=ab4cb35d-22c9-4fd4-8e1d-46a28fd23be0&tr=31&tt=17324433393200501&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
13.232.67.198
https://ps.atera.com/agentpackagesnet45/Agent.Package.Availability/0.16/Agent.Package.Availability.z
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=49524d65-4fb1-4bb1-9c7b-f5d3e2dbe3f7&tr=31&tt=17324433418622730&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
13.232.67.198
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=af1c8f78-a8fb-4782-9e02-8522647fac57&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
13.232.67.198
https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/38.0/AgentPackageAgentInformation.zip?yFk+9uu9aja3RXZs7wXkvbKodLamRoX+E2lNjbQETmCf6sqL8+70SxX20aW8U680
108.158.75.12
https://ps.atera.com/agentpackagesnet45/AgentPackageUpgradeAgent/27.6/AgentPackageUpgradeAgent.zip
unknown
https://ps.atera.com/agentpackagesmac/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
unknown
https://ps.atera.com/agentpackagesnet45/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
unknown
https://ps.atera.com/agentpackagesmac/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageSTRemote/24.2/AgentPackageSTRemote.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=c89efe78-d68a-44aa-b962-a0da30029aef
unknown
https://www.newtonsoft.com/json
unknown
https://ps.atera.com/agentpackageswin/AgentPackageHeartbeat/16.9
unknown
http://wixtoolset.org/news/
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=e628df81-96dc-46ed-9afe-0cd2a51d1679&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
13.232.67.198
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ca4f6eb7-da88-4119-8d72-16266eeb5dd4/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=0162374f-2552-479f-be18-4b11df053a72&tt=0&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
13.232.67.198
https://ps.atera.com/agentpackageswin/AgentPackageAgentInformation/22.7/AgentPackageAgentInformation
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageOsUpdates/20.9/AgentPackageOsUpdates.zip
unknown
https://agent-api.aterD
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageNetworkDiscovery/13.0/AgentPackageNetworkDiscovery
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.IotPoc/13.0/Agent.Package.IotPoc.zip
unknown
https://agent-api.atera.com/Pro
unknown
https://agent-api.atera.com/Production/Agent/AcknowledgeCommands
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageTaskScheduler/13.0/AgentPackageTaskScheduler.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=65e5bee7-d50d-4689-beb6-7331ad74953a&uuid=ca4f6eb7-da88-4119-8d72-16266eeb5dd4
13.232.67.198
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ps.pndsn.com
13.232.67.198
bg.microsoft.map.fastly.net
199.232.214.172
d25btwd9wax8gu.cloudfront.net
108.158.75.12
fp2e7a.wpc.phicdn.net
192.229.221.95
windowsupdatebg.s.llnwi.net
178.79.238.0
ps.atera.com
unknown
agent-api.atera.com
unknown

IPs

IP
Domain
Country
Malicious
13.232.67.198
ps.pndsn.com
United States
108.158.75.12
d25btwd9wax8gu.cloudfront.net
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\5b113c.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\5b113c.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\ATERA Networks\AteraAgent\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\ATERA Networks\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Features
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
AutoBackupLogFiles
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AteraAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
AccountId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
IntegratorLogin
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
CompanyId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
AgentId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
ServerName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AlphaAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
FileDirectory
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_USERS.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
FileDirectory
There are 135 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4431000
trusted library allocation
page read and write
malicious
1DA9D403000
trusted library allocation
page read and write
malicious
1CAEF92B000
heap
page read and write
malicious
14C228FB000
heap
page read and write
malicious
4374000
trusted library allocation
page read and write
malicious
17748910000
heap
page read and write
malicious
1CAEF8E0000
heap
page read and write
malicious
294806F6000
trusted library allocation
page read and write
malicious
1CAF0860000
heap
page read and write
malicious
14C08440000
heap
page read and write
malicious
294806B5000
trusted library allocation
page read and write
malicious
1DA9D3D7000
trusted library allocation
page read and write
malicious
14C09F29000
trusted library allocation
page read and write
malicious
40CE000
heap
page read and write
malicious
1CAEF8A0000
heap
page read and write
malicious
2948006E000
trusted library allocation
page read and write
malicious
14C080CC000
heap
page read and write
malicious
1DA9CBD9000
heap
page read and write
malicious
29480702000
trusted library allocation
page read and write
malicious
14C09F52000
trusted library allocation
page read and write
malicious
14C0A01C000
trusted library allocation
page read and write
malicious
14C22890000
heap
page read and write
malicious
17749143000
trusted library allocation
page read and write
malicious
294E9A78000
heap
page read and write
malicious
294EAA7C000
heap
page read and write
malicious
14C09FD2000
trusted library allocation
page read and write
malicious
294EAEAF000
heap
page read and write
malicious
1DA9CBF0000
heap
page read and write
malicious
1DA9CC0C000
heap
page read and write
malicious
4D48000
heap
page read and write
malicious
29480001000
trusted library allocation
page read and write
malicious
14C09F5A000
trusted library allocation
page read and write
malicious
17748BC0000
heap
page read and write
malicious
1DA9CBD0000
heap
page read and write
malicious
1DA9CC10000
heap
page read and write
malicious
14C08130000
heap
page read and write
malicious
42D1000
trusted library allocation
page read and write
malicious
1CA80047000
trusted library allocation
page read and write
malicious
294801DF000
trusted library allocation
page read and write
malicious
17748CC2000
unkown
page readonly
malicious
14C07FF2000
unkown
page readonly
malicious
14C080E3000
heap
page read and write
malicious
1CAEFB70000
heap
page read and write
malicious
1DA9D391000
trusted library allocation
page read and write
malicious
1DA9CB60000
heap
page read and write
malicious
17748963000
heap
page read and write
malicious
14C09F54000
trusted library allocation
page read and write
malicious
14C09BF0000
heap
page read and write
malicious
2948013F000
trusted library allocation
page read and write
malicious
1DA9D44F000
trusted library allocation
page read and write
malicious
294E9AAC000
heap
page read and write
malicious
17748FF0000
heap
page read and write
malicious
294806C7000
trusted library allocation
page read and write
malicious
14C080A0000
heap
page read and write
malicious
14C09CE1000
heap
page read and write
malicious
29480684000
trusted library allocation
page read and write
malicious
177486B2000
unkown
page readonly
malicious
1CAEF8A9000
heap
page read and write
malicious
14C080A6000
heap
page read and write
malicious
44D4000
trusted library allocation
page read and write
malicious
177490C1000
trusted library allocation
page read and write
malicious
1DA9D413000
trusted library allocation
page read and write
malicious
294E9AF6000
heap
page read and write
malicious
2948029A000
trusted library allocation
page read and write
malicious
17748955000
heap
page read and write
malicious
177489A0000
heap
page read and write
malicious
1CA800BF000
trusted library allocation
page read and write
malicious
1CA80073000
trusted library allocation
page read and write
malicious
294E98B0000
heap
page read and write
malicious
1CA80083000
trusted library allocation
page read and write
malicious
4AA0000
heap
page read and write
malicious
294EADC0000
heap
page read and write
malicious
C589D95000
stack
page read and write
malicious
1DA9CC55000
heap
page read and write
malicious
294E9A10000
heap
page read and write
malicious
294E9A70000
heap
page read and write
malicious
7FF886A94000
trusted library allocation
page read and write
malicious
14C09EA1000
trusted library allocation
page read and write
malicious
1CAEF8DE000
heap
page read and write
malicious
4240000
heap
page read and write
malicious
17749133000
trusted library allocation
page read and write
malicious
14C09F2C000
trusted library allocation
page read and write
malicious
29480538000
trusted library allocation
page read and write
malicious
1CA80001000
trusted library allocation
page read and write
malicious
6690000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
294EB2EA000
heap
page read and write
6660000
trusted library allocation
page read and write
6860000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
7FF886AA0000
trusted library allocation
page read and write
6844000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
67D4000
trusted library allocation
page read and write
29480647000
trusted library allocation
page read and write
1774895B000
heap
page read and write
294800DE000
trusted library allocation
page read and write
14C083C0000
heap
page read and write
7FF886AE0000
trusted library allocation
page read and write
14C09C79000
heap
page read and write
2E00000
heap
page read and write
6660000
trusted library allocation
page read and write
C58A9E9000
stack
page read and write
544000
heap
page read and write
294807A8000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
C58A128000
stack
page read and write
6850000
trusted library allocation
page read and write
7FF886920000
trusted library allocation
page read and write
32A5000
heap
page read and write
67D0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
4CD4000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
4ACB000
trusted library allocation
page execute and read and write
6660000
trusted library allocation
page read and write
29480135000
trusted library allocation
page read and write
1CAF091B000
heap
page read and write
29480848000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
5F8000
heap
page read and write
6840000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
4340000
trusted library allocation
page execute and read and write
6690000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
C58AFFD000
stack
page read and write
6690000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
4266000
trusted library allocation
page execute and read and write
294805A4000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6720000
remote allocation
page read and write
6670000
trusted library allocation
page read and write
7FF886CA0000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
7FF886AD0000
trusted library allocation
page read and write
17748880000
heap
page read and write
6840000
trusted library allocation
page read and write
54A000
heap
page read and write
6850000
trusted library allocation
page read and write
7FF886980000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
7FF8868FD000
trusted library allocation
page execute and read and write
55F000
heap
page read and write
2B98000
stack
page read and write
684E000
stack
page read and write
C58B6F1000
stack
page read and write
6680000
trusted library allocation
page read and write
436D000
trusted library allocation
page execute and read and write
4010000
trusted library allocation
page read and write
510000
heap
page read and write
4271000
heap
page read and write
6640000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
4D07000
trusted library allocation
page execute and read and write
6850000
trusted library allocation
page read and write
1DAAD391000
trusted library allocation
page read and write
4990000
trusted library allocation
page read and write
4CF000
unkown
page read and write
6680000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
598A331000
stack
page read and write
6680000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
2EC7B7F000
stack
page read and write
1FF5EFE000
stack
page read and write
6680000
trusted library allocation
page read and write
294E9ABA000
heap
page read and write
29480654000
trusted library allocation
page read and write
413C000
stack
page read and write
6A8E000
stack
page read and write
4994000
trusted library allocation
page read and write
294807AE000
trusted library allocation
page read and write
14C080E5000
heap
page read and write
17748D95000
heap
page read and write
2BAE000
stack
page read and write
6680000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
294EAE48000
heap
page read and write
6840000
trusted library allocation
page read and write
51B000
heap
page read and write
6860000
trusted library allocation
page read and write
EDD9FE000
stack
page read and write
6840000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
294805C6000
trusted library allocation
page read and write
41CB000
trusted library allocation
page execute and read and write
1CAEF720000
heap
page read and write
1DA9D4E5000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
C58C1FB000
stack
page read and write
3150000
heap
page read and write
6680000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
1DA9D3CF000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
1CAEF982000
heap
page read and write
1CA90011000
trusted library allocation
page read and write
29480392000
trusted library allocation
page read and write
7FF886AB7000
trusted library allocation
page read and write
68A0000
heap
page read and write
622000
heap
page read and write
6840000
trusted library allocation
page read and write
42A8000
trusted library allocation
page read and write
8CE000
stack
page read and write
6640000
trusted library allocation
page read and write
1FF64FC000
stack
page read and write
671E000
stack
page read and write
6820000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
7FF886914000
trusted library allocation
page read and write
7290000
trusted library allocation
page read and write
294EB600000
heap
page read and write
6840000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
C58C6FA000
stack
page read and write
6820000
trusted library allocation
page read and write
1DA9CC12000
heap
page read and write
7FF886AD5000
trusted library allocation
page read and write
599000
heap
page read and write
4017000
trusted library allocation
page execute and read and write
6680000
trusted library allocation
page read and write
441E000
stack
page read and write
67D0000
trusted library allocation
page read and write
43A4000
trusted library allocation
page read and write
29480508000
trusted library allocation
page read and write
4270000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
4269000
trusted library allocation
page execute and read and write
4366000
trusted library allocation
page read and write
4AC0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
29480406000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
4D7E000
stack
page read and write
6660000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
7FF886A9E000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6860000
trusted library allocation
page read and write
72C0000
trusted library allocation
page execute and read and write
C58C9FD000
stack
page read and write
7FF886904000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
4CD0000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
7FF886B50000
trusted library allocation
page execute and read and write
6840000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6645000
trusted library allocation
page read and write
67AE000
stack
page read and write
6820000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
BB9B8FD000
stack
page read and write
6A0E000
stack
page read and write
6840000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
67D5000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
294EAFA2000
heap
page read and write
6840000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
1DAB5BFF000
heap
page read and write
2948065A000
trusted library allocation
page read and write
7FF886AA0000
trusted library allocation
page read and write
6860000
trusted library allocation
page read and write
14C082A0000
heap
page read and write
4263000
trusted library allocation
page read and write
14C07FF0000
unkown
page readonly
294EB28F000
heap
page read and write
6820000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
294800AA000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
7FF886AC6000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
7FF88693C000
trusted library allocation
page execute and read and write
6660000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
C58AEFD000
stack
page read and write
1DA9D4BF000
trusted library allocation
page read and write
3180000
heap
page read and write
2E30000
heap
page read and write
66A0000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
1FF63FE000
stack
page read and write
7F998000
trusted library allocation
page execute and read and write
2948069B000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
7FF886AB0000
trusted library allocation
page read and write
7FF886AAD000
trusted library allocation
page read and write
6644000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
294800DA000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
1FF62FB000
stack
page read and write
7FF43FA20000
trusted library allocation
page execute and read and write
6C1D000
heap
page read and write
6860000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
7FF8869A6000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
7FF8868E0000
trusted library allocation
page read and write
29480852000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6860000
trusted library allocation
page read and write
294801BD000
trusted library allocation
page read and write
7FF886AD0000
trusted library allocation
page read and write
2F89000
heap
page read and write
6690000
trusted library allocation
page read and write
4DC0000
heap
page readonly
4160000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
294EB23F000
heap
page read and write
6840000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
4ABE000
stack
page read and write
1DA9CB90000
heap
page read and write
2ECE000
stack
page read and write
7FF886AE0000
trusted library allocation
page read and write
3066000
heap
page read and write
4A7D000
stack
page read and write
6640000
trusted library allocation
page read and write
1CC000
stack
page read and write
6690000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
54C000
heap
page read and write
177590CD000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
4420000
heap
page read and write
6680000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6670000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
584000
heap
page read and write
4516000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
29490081000
trusted library allocation
page read and write
C58B9FF000
stack
page read and write
6680000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
7FF886AC0000
trusted library allocation
page read and write
29480344000
trusted library allocation
page read and write
4D30000
heap
page read and write
294E99B0000
heap
page read and write
6844000
trusted library allocation
page read and write
598B0FD000
stack
page read and write
6820000
trusted library allocation
page read and write
40FF000
heap
page read and write
7FF886902000
trusted library allocation
page read and write
1DAB5BE9000
heap
page read and write
6860000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
3290000
heap
page read and write
294EA180000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
4290000
heap
page execute and read and write
6840000
trusted library allocation
page read and write
C58C3F3000
stack
page read and write
6840000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
7FF886BF0000
trusted library allocation
page read and write
40FF000
stack
page read and write
69E000
stack
page read and write
6670000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6880000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
72AC000
trusted library allocation
page execute and read and write
2EC7A7C000
stack
page read and write
6691000
trusted library allocation
page read and write
7FF886904000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
5A3000
heap
page read and write
3088000
heap
page read and write
7FF8868FB000
trusted library allocation
page execute and read and write
6840000
trusted library allocation
page read and write
668E000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
74AF000
stack
page read and write
6840000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
4194000
trusted library allocation
page read and write
710000
trusted library allocation
page read and write
2948028A000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
C58BBFF000
stack
page read and write
58C000
heap
page read and write
7FF886B20000
trusted library allocation
page read and write
598B1FE000
stack
page read and write
6840000
trusted library allocation
page read and write
17748CD8000
unkown
page readonly
4B80000
heap
page readonly
C58AAFF000
stack
page read and write
1CAEFE90000
heap
page read and write
6660000
trusted library allocation
page read and write
48CE000
stack
page read and write
6840000
trusted library allocation
page read and write
2948066E000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
560000
heap
page read and write
7FF8869D6000
trusted library allocation
page execute and read and write
66C0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
294800A5000
trusted library allocation
page read and write
14C08310000
trusted library allocation
page read and write
1EE000
stack
page read and write
7FF886B80000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
2C2F000
stack
page read and write
41C7000
trusted library allocation
page execute and read and write
2F0E000
stack
page read and write
4180000
trusted library allocation
page read and write
C58C7F7000
stack
page read and write
4395000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
14C07FF0000
unkown
page readonly
6690000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
7FF886AF0000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
75E000
stack
page read and write
6640000
trusted library allocation
page read and write
6860000
trusted library allocation
page read and write
14C228CC000
heap
page read and write
2EC7C7E000
stack
page read and write
4290000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
59D000
stack
page read and write
4EB0000
heap
page read and write
7FF8868D4000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
508000
heap
page read and write
1CAEF8EA000
heap
page read and write
6840000
trusted library allocation
page read and write
4098000
trusted library allocation
page read and write
401B000
trusted library allocation
page execute and read and write
6690000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6720000
remote allocation
page read and write
497000
stack
page read and write
C58D8FC000
stack
page read and write
6680000
trusted library allocation
page read and write
1DAB5BB0000
heap
page read and write
7FF886AB6000
trusted library allocation
page read and write
7FF8869A0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
7FF886A76000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
4B2E000
stack
page read and write
4D00000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
720000
heap
page read and write
67D0000
trusted library allocation
page read and write
C58A3FD000
stack
page read and write
6840000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
7FF8869E6000
trusted library allocation
page execute and read and write
6850000
trusted library allocation
page read and write
7FF886913000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
880000
heap
page read and write
6840000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
3FF4000
trusted library allocation
page read and write
4363000
trusted library allocation
page read and write
7FF886AC6000
trusted library allocation
page read and write
431F000
trusted library allocation
page read and write
7FDE0000
trusted library allocation
page execute and read and write
6820000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
294EA020000
heap
page execute and read and write
6640000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
4410000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
276E000
stack
page read and write
6860000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
2948084E000
trusted library allocation
page read and write
7FF886900000
trusted library allocation
page read and write
7FF886A8C000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
BB9BFFD000
stack
page read and write
C58A8E9000
stack
page read and write
294806A3000
trusted library allocation
page read and write
7FF886B10000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
294800E2000
trusted library allocation
page read and write
2948005C000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
44D0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
14C09CE5000
heap
page read and write
7FF886B60000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6860000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
4C70000
heap
page read and write
6660000
trusted library allocation
page read and write
8CD000
trusted library allocation
page execute and read and write
6820000
trusted library allocation
page read and write
14C228C8000
heap
page read and write
7FF88698C000
trusted library allocation
page execute and read and write
6680000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
72B0000
trusted library allocation
page read and write
C58AD7E000
stack
page read and write
6680000
trusted library allocation
page read and write
294808F6000
trusted library allocation
page read and write
EDDAFE000
stack
page read and write
4AA0000
trusted library allocation
page read and write
C58CCFC000
stack
page read and write
C58BCFA000
stack
page read and write
7FF886B20000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
29480712000
trusted library allocation
page read and write
306F000
heap
page read and write
304A000
heap
page read and write
BB9C0FE000
stack
page read and write
6690000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
87D000
stack
page read and write
400000
heap
page read and write
7FF886B10000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
294806A1000
trusted library allocation
page read and write
C58D9FE000
stack
page read and write
2948040C000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
7FF8868E2000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
74C0000
heap
page read and write
6690000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
1DAAD3A1000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
43C2000
trusted library allocation
page read and write
177486B0000
unkown
page readonly
6690000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
294EAF5C000
heap
page read and write
6860000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
1CAF08D5000
heap
page read and write
6840000
trusted library allocation
page read and write
6C4A000
heap
page read and write
6820000
trusted library allocation
page read and write
177488F0000
trusted library allocation
page read and write
17748BC5000
heap
page read and write
50F000
stack
page read and write
2948006A000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
7FF886A10000
trusted library allocation
page execute and read and write
6850000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
2E75000
heap
page read and write
2948084C000
trusted library allocation
page read and write
294800EE000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
545000
heap
page read and write
1FF61FD000
stack
page read and write
544000
heap
page read and write
6680000
trusted library allocation
page read and write
1CAEF825000
heap
page read and write
6840000
trusted library allocation
page read and write
BB9B4F1000
stack
page read and write
6680000
trusted library allocation
page read and write
742E000
stack
page read and write
177486DC000
unkown
page readonly
6840000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
2E20000
heap
page read and write
7FF886A8A000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
1CAEF820000
heap
page read and write
6660000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
1CAEF800000
heap
page read and write
7FF88695C000
trusted library allocation
page execute and read and write
6840000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
7FF886990000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
14C0A01A000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
63E000
stack
page read and write
6660000
trusted library allocation
page read and write
6880000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
7FF886990000
trusted library allocation
page execute and read and write
14C081A0000
heap
page read and write
1A0000
heap
page read and write
6680000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6645000
trusted library allocation
page read and write
177590C1000
trusted library allocation
page read and write
BB9B7FE000
stack
page read and write
294EB319000
heap
page read and write
7FF8869AC000
trusted library allocation
page execute and read and write
6680000
trusted library allocation
page read and write
C58A03E000
stack
page read and write
6840000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
294807B4000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
14C08445000
heap
page read and write
14C226A3000
heap
page read and write
7FF886A90000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
7FF886A93000
trusted library allocation
page read and write
598A6FE000
stack
page read and write
422E000
stack
page read and write
294808F1000
trusted library allocation
page read and write
54F000
heap
page read and write
583000
heap
page read and write
6640000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
42CE000
heap
page read and write
6860000
trusted library allocation
page read and write
3020000
heap
page read and write
6820000
trusted library allocation
page read and write
425E000
stack
page read and write
6660000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
7FF886B00000
trusted library allocation
page read and write
29480658000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
29490001000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
14C226B2000
unkown
page readonly
294EAEE1000
heap
page read and write
6684000
trusted library allocation
page read and write
C58D3FC000
stack
page read and write
294EAFA0000
heap
page read and write
2948040E000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
29480408000
trusted library allocation
page read and write
95E000
stack
page read and write
6681000
trusted library allocation
page read and write
1FF68FB000
stack
page read and write
6C33000
heap
page read and write
6640000
trusted library allocation
page read and write
7FF8868F4000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
60F000
heap
page read and write
1FF65FC000
stack
page read and write
6820000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
4CA0000
heap
page read and write
432D000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
177618A0000
unkown
page readonly
67D0000
trusted library allocation
page read and write
1DA9CE55000
heap
page read and write
6680000
trusted library allocation
page read and write
6860000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
C58D7FE000
stack
page read and write
6680000
trusted library allocation
page read and write
6DE4000
heap
page read and write
2949000E000
trusted library allocation
page read and write
294801D5000
trusted library allocation
page read and write
4478000
trusted library allocation
page read and write
2F7C000
heap
page read and write
6690000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
7FF8869B6000
trusted library allocation
page execute and read and write
4960000
trusted library section
page read and write
6890000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
7FF8868ED000
trusted library allocation
page execute and read and write
7FF886903000
trusted library allocation
page read and write
1DA9CBB0000
heap
page read and write
6840000
trusted library allocation
page read and write
EDDFFE000
stack
page read and write
6840000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
2948051C000
trusted library allocation
page read and write
4CA0000
heap
page read and write
1CAEF8E8000
heap
page read and write
6820000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
7FF886CD0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
C58BAE9000
stack
page read and write
7FF8868D0000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
67DC000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
C58CDF8000
stack
page read and write
294800D2000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
7FF886B30000
trusted library allocation
page execute and read and write
447F000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
9B000
stack
page read and write
6640000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
2948084A000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
43F0000
heap
page execute and read and write
1DA9D4D3000
trusted library allocation
page read and write
7FF886BD0000
trusted library allocation
page read and write
C58B4F5000
stack
page read and write
4481000
trusted library allocation
page read and write
500000
heap
page read and write
4440000
heap
page read and write
67D0000
trusted library allocation
page read and write
14C226A0000
heap
page read and write
6680000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
294E99E5000
heap
page read and write
14C228A0000
heap
page read and write
2948065C000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
7FF88693C000
trusted library allocation
page execute and read and write
14C228DC000
heap
page read and write
67D0000
trusted library allocation
page read and write
421E000
stack
page read and write
6660000
trusted library allocation
page read and write
7F4A8000
trusted library allocation
page execute and read and write
598AAFE000
stack
page read and write
7FF886AD0000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
4940000
heap
page read and write
6820000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
694E000
stack
page read and write
6660000
trusted library allocation
page read and write
4321000
trusted library allocation
page read and write
1FF5CFE000
stack
page read and write
151C56E5000
heap
page read and write
6840000
trusted library allocation
page read and write
4190000
trusted library allocation
page read and write
6870000
trusted library allocation
page execute and read and write
67D0000
trusted library allocation
page read and write
4280000
heap
page readonly
6DCE000
stack
page read and write
6840000
trusted library allocation
page read and write
EDDEFE000
stack
page read and write
6820000
trusted library allocation
page read and write
598ACFE000
stack
page read and write
7FF8868ED000
trusted library allocation
page execute and read and write
6640000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
307C000
heap
page read and write
66A0000
trusted library allocation
page read and write
C58D2F7000
stack
page read and write
6680000
trusted library allocation
page read and write
6860000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
2948028E000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
14C082C0000
heap
page read and write
4190000
heap
page read and write
6640000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
433E000
stack
page read and write
6840000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
419D000
trusted library allocation
page execute and read and write
6680000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
1DA9D380000
heap
page execute and read and write
6680000
trusted library allocation
page read and write
C58BDF7000
stack
page read and write
67D0000
trusted library allocation
page read and write
294801C5000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
598AFFE000
stack
page read and write
6680000
trusted library allocation
page read and write
7FF886B70000
trusted library allocation
page execute and read and write
6840000
trusted library allocation
page read and write
7FF886CB0000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
4AD1000
heap
page read and write
29490021000
trusted library allocation
page read and write
4012000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6860000
trusted library allocation
page read and write
1DA9CC53000
heap
page read and write
7F7A0000
trusted library allocation
page execute and read and write
6820000
trusted library allocation
page read and write
7FF886900000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
294806F4000
trusted library allocation
page read and write
7FF8868E4000
trusted library allocation
page read and write
7FF88699C000
trusted library allocation
page execute and read and write
1DA9CBEC000
heap
page read and write
6850000
trusted library allocation
page read and write
14C228C1000
heap
page read and write
BB9BCFE000
stack
page read and write
1CAEF99B000
heap
page read and write
2A60000
heap
page read and write
4CDD000
trusted library allocation
page execute and read and write
6680000
trusted library allocation
page read and write
14C08280000
heap
page read and write
7FF886B10000
trusted library allocation
page read and write
6ACD000
stack
page read and write
67D0000
trusted library allocation
page read and write
4E6D000
stack
page read and write
6680000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
4E70000
trusted library allocation
page execute and read and write
4360000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
14C09CF0000
heap
page read and write
294800E6000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
7FF886A80000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
7FF886B50000
trusted library allocation
page execute and read and write
407E000
stack
page read and write
6683000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
151C5440000
heap
page read and write
EDDBFD000
stack
page read and write
6660000
trusted library allocation
page read and write
73EE000
stack
page read and write
1FF60FE000
stack
page read and write
6680000
trusted library allocation
page read and write
140000
heap
page read and write
44C3000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
7FF886AF0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
294EB1C2000
unkown
page readonly
6843000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
537000
heap
page read and write
C58BFFD000
stack
page read and write
294805DE000
trusted library allocation
page read and write
4170000
heap
page execute and read and write
67D0000
trusted library allocation
page read and write
C58B2FA000
stack
page read and write
4C40000
trusted library allocation
page read and write
BB9BDFE000
stack
page read and write
6860000
trusted library allocation
page read and write
500000
heap
page read and write
67D0000
trusted library allocation
page read and write
294EAEF6000
heap
page read and write
7FF8868E3000
trusted library allocation
page execute and read and write
2E10000
heap
page read and write
14C0A012000
trusted library allocation
page read and write
4D0000
heap
page read and write
6720000
heap
page read and write
6840000
trusted library allocation
page read and write
42A0000
trusted library allocation
page read and write
7FF8869B6000
trusted library allocation
page read and write
66A4000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
1DA9CA80000
heap
page read and write
7310000
trusted library allocation
page read and write
4400000
trusted library allocation
page execute and read and write
6840000
trusted library allocation
page read and write
294E9AF4000
heap
page read and write
17748D90000
heap
page read and write
6660000
trusted library allocation
page read and write
6880000
trusted library allocation
page read and write
151C5540000
heap
page read and write
6660000
trusted library allocation
page read and write
7FF8868ED000
trusted library allocation
page execute and read and write
45B000
stack
page read and write
2A78000
heap
page read and write
6864000
trusted library allocation
page read and write
4331000
trusted library allocation
page read and write
1CAF0919000
heap
page read and write
72A0000
trusted library allocation
page read and write
7F7B8000
trusted library allocation
page execute and read and write
6840000
trusted library allocation
page read and write
C58ABFD000
stack
page read and write
D7000
stack
page read and write
17748940000
heap
page read and write
294E99F0000
heap
page read and write
66A0000
trusted library allocation
page read and write
4386000
trusted library allocation
page execute and read and write
6840000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
7FF886B56000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
5E65000
trusted library allocation
page read and write
7FF886AF0000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
7FF8869B0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
3027000
heap
page read and write
41E0000
trusted library allocation
page read and write
294EAADF000
heap
page read and write
6680000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
60E000
heap
page read and write
7FF886A9D000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
4180000
trusted library allocation
page read and write
1774904B000
heap
page read and write
6690000
trusted library allocation
page read and write
C58D0FA000
stack
page read and write
5A5000
heap
page read and write
4318000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
4C30000
trusted library allocation
page execute and read and write
14C22690000
heap
page execute and read and write
499D000
trusted library allocation
page execute and read and write
6680000
trusted library allocation
page read and write
7FF886B19000
trusted library allocation
page read and write
1DA9CB65000
heap
page read and write
68A0000
remote allocation
page read and write
6841000
trusted library allocation
page read and write
4522000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
308E000
stack
page read and write
6690000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
1FF56F4000
stack
page read and write
6680000
trusted library allocation
page read and write
29480652000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
294EABC0000
unkown
page readonly
6640000
trusted library allocation
page read and write
EDDCFE000
stack
page read and write
BB9BAFE000
stack
page read and write
455F000
stack
page read and write
6860000
trusted library allocation
page read and write
7FF886910000
trusted library allocation
page read and write
1CAF0780000
heap
page execute and read and write
30DF000
heap
page read and write
6820000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
294805D8000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
1FF5BFE000
stack
page read and write
6840000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
C58C4FC000
stack
page read and write
67D0000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
587000
heap
page read and write
14C228A7000
heap
page read and write
6840000
trusted library allocation
page read and write
449E000
stack
page read and write
2A70000
heap
page read and write
7FF886996000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
56C000
heap
page read and write
6850000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
151C5568000
heap
page read and write
4C60000
trusted library allocation
page read and write
4D20000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
890000
heap
page read and write
67D0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
C58C2FE000
stack
page read and write
7FF8868D3000
trusted library allocation
page execute and read and write
690D000
stack
page read and write
7FF886924000
trusted library allocation
page read and write
7FF886B30000
trusted library allocation
page read and write
4B70000
heap
page read and write
6850000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
4D0B000
trusted library allocation
page execute and read and write
6680000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
1774904D000
heap
page read and write
2D00000
heap
page read and write
7FF886C00000
trusted library allocation
page execute and read and write
6850000
trusted library allocation
page read and write
4150000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
1CAEF928000
heap
page read and write
6840000
trusted library allocation
page read and write
72D0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
294EAE00000
heap
page read and write
7FF886AF0000
trusted library allocation
page read and write
4193000
trusted library allocation
page execute and read and write
294EAE46000
heap
page read and write
810000
heap
page read and write
6840000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
2D20000
heap
page read and write
6680000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
294EA170000
heap
page read and write
6850000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
4363000
trusted library allocation
page read and write
1DA9CCB8000
heap
page read and write
41A4000
trusted library allocation
page read and write
1CAEF8C7000
heap
page read and write
1CA8003D000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
14C08103000
heap
page read and write
6820000
trusted library allocation
page read and write
6E0000
heap
page read and write
6680000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
294806C1000
trusted library allocation
page read and write
7FF8868E0000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
2E40000
heap
page read and write
6860000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
4D79000
heap
page read and write
6680000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
294EAADD000
heap
page read and write
4B6E000
stack
page read and write
610000
heap
page read and write
6840000
trusted library allocation
page read and write
294E9A8B000
heap
page read and write
6840000
trusted library allocation
page read and write
294EABC2000
unkown
page readonly
41A0000
trusted library allocation
page read and write
2B5B000
stack
page read and write
6680000
trusted library allocation
page read and write
294EAC6E000
unkown
page readonly
4C70000
heap
page read and write
6640000
trusted library allocation
page read and write
6684000
trusted library allocation
page read and write
17761A70000
heap
page execute and read and write
8D0000
heap
page read and write
6690000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
540000
heap
page read and write
67D0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
7FF8868F2000
trusted library allocation
page read and write
4D30000
heap
page execute and read and write
598A8FE000
stack
page read and write
7FDF8000
trusted library allocation
page execute and read and write
6690000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
294EAA99000
heap
page read and write
14C19EAF000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
294800CA000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6E10000
heap
page read and write
7FF8869A0000
trusted library allocation
page execute and read and write
6850000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
EDE1FE000
stack
page read and write
6820000
trusted library allocation
page read and write
4D40000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
177486B0000
unkown
page readonly
6840000
trusted library allocation
page read and write
7FF886AD0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
4CD3000
trusted library allocation
page execute and read and write
6660000
trusted library allocation
page read and write
29480656000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
52D1000
trusted library allocation
page read and write
587000
heap
page read and write
1DA9CE50000
heap
page read and write
6880000
trusted library allocation
page read and write
294EB010000
heap
page read and write
7FF886A93000
trusted library allocation
page read and write
4CBE000
stack
page read and write
6660000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
7FF886AB5000
trusted library allocation
page read and write
68A0000
remote allocation
page read and write
6820000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
294EB2D2000
heap
page read and write
4BED000
stack
page read and write
7FF886AB0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
547000
heap
page read and write
7FF886AF9000
trusted library allocation
page read and write
6860000
trusted library allocation
page read and write
1A5000
heap
page read and write
68A0000
remote allocation
page read and write
1FF59FE000
stack
page read and write
17748760000
heap
page read and write
67D0000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
294EAEEC000
heap
page read and write
2D9B000
stack
page read and write
6840000
trusted library allocation
page read and write
29480534000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
7FF88691B000
trusted library allocation
page execute and read and write
7FF886B09000
trusted library allocation
page read and write
4CE0000
trusted library allocation
page read and write
7FF8869A0000
trusted library allocation
page execute and read and write
C589DDF000
stack
page read and write
427F000
stack
page read and write
6660000
trusted library allocation
page read and write
7280000
trusted library allocation
page read and write
1774895F000
heap
page read and write
BB9B9FE000
stack
page read and write
17748CF0000
heap
page read and write
C58B3F2000
stack
page read and write
6820000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
67D5000
trusted library allocation
page read and write
1CAEF850000
heap
page read and write
6640000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
51B000
heap
page read and write
67D0000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
C58A4FE000
stack
page read and write
6640000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
2FB0000
heap
page read and write
7FF886ABD000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
43B6000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
294E9A40000
trusted library allocation
page read and write
17748860000
heap
page read and write
1776194C000
unkown
page readonly
6680000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
4E50000
heap
page execute and read and write
BB9BEFE000
stack
page read and write
4CC0000
trusted library allocation
page read and write
7FF8868F0000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
6681000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
7FF886B10000
trusted library allocation
page execute and read and write
294EB2D8000
heap
page read and write
150000
heap
page read and write
1CA80155000
trusted library allocation
page read and write
4E61000
trusted library allocation
page read and write
6851000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
4C2E000
stack
page read and write
6649000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
151C56E0000
heap
page read and write
67D0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
1CA8003B000
trusted library allocation
page read and write
6810000
trusted library allocation
page read and write
32A0000
heap
page read and write
6CCE000
stack
page read and write
6660000
trusted library allocation
page read and write
17748FA0000
heap
page read and write
29480412000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
17748840000
heap
page read and write
294E99E0000
heap
page read and write
6840000
trusted library allocation
page read and write
1CA9000D000
trusted library allocation
page read and write
7F490000
trusted library allocation
page execute and read and write
664C000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
1DA9D3CB000
trusted library allocation
page read and write
7FF886AE0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
426C000
trusted library allocation
page execute and read and write
451E000
stack
page read and write
8C3000
trusted library allocation
page execute and read and write
6841000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
EDE0FE000
stack
page read and write
6820000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
177490B0000
heap
page execute and read and write
6680000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
14C09CD1000
heap
page read and write
2948038E000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
4993000
trusted library allocation
page execute and read and write
294EAF66000
heap
page read and write
4390000
heap
page read and write
C58A5FF000
stack
page read and write
1DAB5C6A000
heap
page read and write
6840000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
6C8E000
stack
page read and write
6640000
trusted library allocation
page read and write
2F73000
heap
page read and write
17748CC0000
unkown
page readonly
7FF8868E3000
trusted library allocation
page execute and read and write
EDE3FE000
stack
page read and write
66A0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
4C54000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
7FF886AA0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
4383000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
684E000
trusted library allocation
page read and write
29480054000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
7FF88690B000
trusted library allocation
page execute and read and write
27B0000
heap
page read and write
29480378000
trusted library allocation
page read and write
29480410000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
490F000
stack
page read and write
294EA1B0000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6E1A000
heap
page read and write
6660000
trusted library allocation
page read and write
7FF886AAE000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
85E000
stack
page read and write
6670000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
C58CEF7000
stack
page read and write
294E9ACC000
heap
page read and write
684C000
trusted library allocation
page read and write
4D5000
heap
page read and write
6640000
trusted library allocation
page read and write
1FF66FE000
stack
page read and write
4260000
trusted library allocation
page read and write
1DAAD39D000
trusted library allocation
page read and write
1DA9CC16000
heap
page read and write
2E70000
heap
page read and write
560000
heap
page read and write
6840000
trusted library allocation
page read and write
29480066000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
7FF88692B000
trusted library allocation
page execute and read and write
7FF886903000
trusted library allocation
page execute and read and write
4491000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
51F000
heap
page read and write
2E1E000
stack
page read and write
5F6000
heap
page read and write
6720000
remote allocation
page read and write
5EC5000
trusted library allocation
page read and write
294807A6000
trusted library allocation
page read and write
14C09E50000
heap
page execute and read and write
436B000
trusted library allocation
page read and write
4230000
heap
page read and write
6680000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6830000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
C58AD2A000
stack
page read and write
67D0000
trusted library allocation
page read and write
EDDDFE000
stack
page read and write
6DF000
stack
page read and write
6680000
trusted library allocation
page read and write
C58A7FE000
stack
page read and write
67D0000
trusted library allocation
page read and write
7FF886990000
trusted library allocation
page read and write
605000
heap
page read and write
6C0F000
stack
page read and write
14C0812B000
heap
page read and write
6840000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
7FF886ABE000
trusted library allocation
page read and write
4389000
trusted library allocation
page execute and read and write
29480682000
trusted library allocation
page read and write
73AF000
stack
page read and write
2948037C000
trusted library allocation
page read and write
4080000
heap
page readonly
6C10000
heap
page read and write
14C09C77000
heap
page read and write
5E61000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6860000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
5EC1000
trusted library allocation
page read and write
41C5000
trusted library allocation
page execute and read and write
7FF886B00000
trusted library allocation
page execute and read and write
67D0000
trusted library allocation
page read and write
49A0000
heap
page read and write
7FF886B10000
trusted library allocation
page read and write
7FF8868F3000
trusted library allocation
page read and write
668C000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
29480637000
trusted library allocation
page read and write
C58D1FC000
stack
page read and write
294801C1000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
7FF886AC0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
79E000
stack
page read and write
41C2000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
1CA90001000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
7FF886B30000
trusted library allocation
page execute and read and write
7FF8869C6000
trusted library allocation
page execute and read and write
3077000
heap
page read and write
4AC7000
trusted library allocation
page execute and read and write
6820000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6A4E000
stack
page read and write
6660000
trusted library allocation
page read and write
4AFE000
stack
page read and write
6840000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
14C08014000
unkown
page readonly
6680000
trusted library allocation
page read and write
EDD5B1000
stack
page read and write
6820000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
7FF886C90000
trusted library allocation
page read and write
4140000
trusted library allocation
page execute and read and write
6680000
trusted library allocation
page read and write
14C09CA1000
heap
page read and write
6820000
trusted library allocation
page read and write
1CA8003F000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
C58CBFC000
stack
page read and write
6680000
trusted library allocation
page read and write
7FF886AC0000
trusted library allocation
page execute and read and write
42A0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
EDD8FF000
stack
page read and write
1FF67FB000
stack
page read and write
6640000
trusted library allocation
page read and write
7FF886B60000
trusted library allocation
page execute and read and write
579000
heap
page read and write
7FF886AC0000
trusted library allocation
page read and write
2F8F000
stack
page read and write
294E9FD0000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
8C0000
trusted library allocation
page read and write
7FF886A00000
trusted library allocation
page execute and read and write
294E9AB2000
heap
page read and write
1DA9CDF0000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
7FF886986000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
7FF886996000
trusted library allocation
page read and write
14C226B0000
unkown
page readonly
EDE2FD000
stack
page read and write
6640000
trusted library allocation
page read and write
7FF886B30000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
294EB1C0000
unkown
page readonly
7FF8869BC000
trusted library allocation
page execute and read and write
177491EC000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
7FF88690D000
trusted library allocation
page execute and read and write
29480718000
trusted library allocation
page read and write
30E0000
heap
page read and write
5BC000
heap
page read and write
7310000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
80E000
stack
page read and write
3FF0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
43DE000
stack
page read and write
6820000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
598AEFE000
stack
page read and write
7FF886C80000
trusted library allocation
page read and write
4512000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
4E80000
heap
page execute and read and write
7FF886AD0000
trusted library allocation
page execute and read and write
67D0000
trusted library allocation
page read and write
C58B1FE000
stack
page read and write
5BC000
heap
page read and write
6840000
trusted library allocation
page read and write
14C0A018000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
7FF886CC0000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
294801DB000
trusted library allocation
page read and write
1DA9D250000
heap
page read and write
7FF8869B0000
trusted library allocation
page execute and read and write
6820000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
BB9B6FE000
stack
page read and write
7FF886A70000
trusted library allocation
page read and write
723E000
stack
page read and write
1CAEF8FE000
heap
page read and write
6660000
trusted library allocation
page read and write
177618A2000
unkown
page readonly
1DA9D3CD000
trusted library allocation
page read and write
294EAE05000
heap
page read and write
7FF886AA3000
trusted library allocation
page read and write
48D000
unkown
page read and write
6840000
trusted library allocation
page read and write
7FF886A90000
trusted library allocation
page read and write
2DD8000
stack
page read and write
6680000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
7FF886904000
trusted library allocation
page read and write
30CE000
stack
page read and write
BB9B5FE000
stack
page read and write
6660000
trusted library allocation
page read and write
6880000
trusted library allocation
page read and write
7FF88699C000
trusted library allocation
page execute and read and write
14C080ED000
heap
page read and write
6850000
trusted library allocation
page read and write
C58D6FC000
stack
page read and write
653000
heap
page read and write
6680000
trusted library allocation
page execute and read and write
6680000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
1CAEF830000
heap
page read and write
2F5A000
heap
page read and write
7FF8868F4000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
7FF886A90000
trusted library allocation
page read and write
294802E2000
trusted library allocation
page read and write
6645000
trusted library allocation
page read and write
56A000
heap
page read and write
2CBE000
stack
page read and write
66A0000
trusted library allocation
page read and write
4370000
trusted library allocation
page read and write
7FF886BA0000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
44C6000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
7FF88690D000
trusted library allocation
page execute and read and write
6840000
trusted library allocation
page read and write
7FF886AC0000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
4980000
trusted library allocation
page read and write
41DD000
stack
page read and write
6680000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
294801A9000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
4CFD000
stack
page read and write
4AE0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
1CAEF99E000
heap
page read and write
177491EF000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
7FF8868E4000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
445F000
stack
page read and write
6850000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
1774899C000
heap
page read and write
5435000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
58C000
heap
page read and write
294EAF97000
heap
page read and write
7FF886AE0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
177488D0000
trusted library allocation
page read and write
294E9A60000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
C58B7FB000
stack
page read and write
14C083D0000
heap
page read and write
6660000
trusted library allocation
page read and write
44F5000
trusted library allocation
page read and write
7310000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
C58CAFC000
stack
page read and write
7FF886B50000
trusted library allocation
page read and write
7FF886A20000
trusted library allocation
page execute and read and write
6840000
trusted library allocation
page read and write
14C09E90000
heap
page execute and read and write
7FF8868E0000
trusted library allocation
page read and write
52D5000
trusted library allocation
page read and write
2948038A000
trusted library allocation
page read and write
7FF88692D000
trusted library allocation
page execute and read and write
6660000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
7FF8869C6000
trusted library allocation
page execute and read and write
294EA150000
heap
page execute and read and write
6B0F000
stack
page read and write
294804E6000
trusted library allocation
page read and write
29480710000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
7FF88694C000
trusted library allocation
page execute and read and write
6660000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
14C19EA1000
trusted library allocation
page read and write
4F48000
heap
page read and write
17749215000
trusted library allocation
page read and write
6B0E000
stack
page read and write
6640000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
294E9A96000
heap
page read and write
6680000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
416D000
trusted library allocation
page execute and read and write
7FF88690D000
trusted library allocation
page execute and read and write
29480716000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
7FF886A80000
trusted library allocation
page read and write
7FF886BB0000
trusted library allocation
page read and write
6740000
heap
page execute and read and write
6640000
trusted library allocation
page read and write
C58B0EA000
stack
page read and write
7FF88692C000
trusted library allocation
page execute and read and write
1CAEF926000
heap
page read and write
29480626000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
C58B5FA000
stack
page read and write
1DA9CC2C000
heap
page read and write
1CA8012F000
trusted library allocation
page read and write
579000
heap
page read and write
294805C2000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
294EAA00000
heap
page read and write
7FF8868F0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
7FF886B40000
trusted library allocation
page execute and read and write
7FF886A80000
trusted library allocation
page read and write
1FF5DFE000
stack
page read and write
294E9990000
heap
page read and write
3040000
heap
page read and write
294E9FD3000
trusted library allocation
page read and write
7FF886AA6000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
14C08330000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
294801C9000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
294EAA1F000
heap
page read and write
2F50000
heap
page read and write
1CAEFB50000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
598ABFE000
stack
page read and write
1DA9CBF7000
heap
page read and write
7FF886AF0000
trusted library allocation
page execute and read and write
66A0000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
2C3D000
stack
page read and write
6680000
trusted library allocation
page read and write
4030000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
294EAEA4000
heap
page read and write
1DAB5C6E000
heap
page read and write
6850000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
67D5000
trusted library allocation
page read and write
7FF886900000
trusted library allocation
page read and write
7FF886B00000
trusted library allocation
page execute and read and write
4B3F000
stack
page read and write
6860000
trusted library allocation
page read and write
4EA0000
heap
page execute and read and write
1FF58FE000
stack
page read and write
29480850000
trusted library allocation
page read and write
17749030000
heap
page read and write
54B000
heap
page read and write
6640000
trusted library allocation
page read and write
66B0000
trusted library allocation
page execute and read and write
7FF88691D000
trusted library allocation
page execute and read and write
294808F4000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
1DA9D4E1000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
4560000
heap
page read and write
6680000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
3140000
heap
page read and write
6680000
trusted library allocation
page read and write
294806BB000
trusted library allocation
page read and write
8C4000
trusted library allocation
page read and write
584000
heap
page read and write
6840000
trusted library allocation
page read and write
294EB2F2000
heap
page read and write
1CA80151000
trusted library allocation
page read and write
69CE000
stack
page read and write
6820000
trusted library allocation
page read and write
3185000
heap
page read and write
151C5560000
heap
page read and write
1CA8012C000
trusted library allocation
page read and write
C58C5FD000
stack
page read and write
42FC000
stack
page read and write
6840000
trusted library allocation
page read and write
1774893D000
heap
page read and write
294801CD000
trusted library allocation
page read and write
7FF8868FD000
trusted library allocation
page execute and read and write
7FF886A90000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6ACD000
stack
page read and write
6640000
trusted library allocation
page read and write
C58B8E9000
stack
page read and write
6820000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
14C09CBD000
heap
page read and write
7FF88691D000
trusted library allocation
page execute and read and write
67D0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
1DA9CDD0000
trusted library allocation
page read and write
6860000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
7FF886B00000
trusted library allocation
page read and write
1FF57FE000
stack
page read and write
6660000
trusted library allocation
page read and write
44DF000
stack
page read and write
1CAEFB75000
heap
page read and write
1FF5AFC000
stack
page read and write
6690000
trusted library allocation
page read and write
6DD0000
heap
page read and write
6690000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
294800D6000
trusted library allocation
page read and write
294EAEF0000
heap
page read and write
7283000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
4504000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
1CAF0900000
heap
page read and write
598A7FE000
stack
page read and write
7FF886AA0000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
C58D5FD000
stack
page read and write
1CAF08A8000
heap
page read and write
6850000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6860000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
438C000
trusted library allocation
page execute and read and write
6860000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
C58A6FE000
stack
page read and write
294808EE000
trusted library allocation
page read and write
7FF886A95000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
7FF886AE0000
trusted library allocation
page read and write
294EA0E0000
heap
page execute and read and write
66D0000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
67B0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
2948036C000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
29490013000
trusted library allocation
page read and write
294806A5000
trusted library allocation
page read and write
7FF8868FD000
trusted library allocation
page execute and read and write
6BCE000
stack
page read and write
6840000
trusted library allocation
page execute and read and write
6840000
trusted library allocation
page read and write
7FF886BC0000
trusted library allocation
page read and write
2F83000
heap
page read and write
6690000
trusted library allocation
page read and write
29480374000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
563000
heap
page read and write
4163000
trusted library allocation
page read and write
4D0000
heap
page read and write
17748975000
heap
page read and write
6E00000
heap
page read and write
294E9A15000
heap
page read and write
294EA50F000
heap
page read and write
29480414000
trusted library allocation
page read and write
2D25000
heap
page read and write
6680000
trusted library allocation
page read and write
72A9000
trusted library allocation
page execute and read and write
151C5520000
heap
page read and write
BB9BBFE000
stack
page read and write
294804EA000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
68CF000
stack
page read and write
294800A1000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
6880000
trusted library allocation
page read and write
1CA80143000
trusted library allocation
page read and write
688E000
stack
page read and write
14C228AD000
heap
page read and write
6640000
trusted library allocation
page read and write
7FF886B20000
trusted library allocation
page execute and read and write
6660000
trusted library allocation
page read and write
960000
heap
page read and write
746E000
stack
page read and write
7FF886B40000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
7F980000
trusted library allocation
page execute and read and write
7FF88690D000
trusted library allocation
page execute and read and write
448D000
trusted library allocation
page read and write
1DAB5CC0000
heap
page execute and read and write
6860000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
598ADFE000
stack
page read and write
6680000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
7FF886B40000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
2948008E000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
1DA9CB70000
heap
page read and write
14C083C5000
heap
page read and write
405000
heap
page read and write
6680000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
294802E4000
trusted library allocation
page read and write
7FF8868E2000
trusted library allocation
page read and write
1FF5FFE000
stack
page read and write
6690000
trusted library allocation
page read and write
4E2C000
stack
page read and write
29480714000
trusted library allocation
page read and write
7FF886A00000
trusted library allocation
page execute and read and write
294800CE000
trusted library allocation
page read and write
6650000
trusted library allocation
page read and write
548000
heap
page read and write
6680000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
7FF886AB0000
trusted library allocation
page read and write
294EB200000
heap
page read and write
6680000
trusted library allocation
page read and write
7FF886A83000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
1DAB5C2A000
heap
page read and write
6660000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
2948069D000
trusted library allocation
page read and write
51C000
heap
page read and write
42C0000
heap
page read and write
6690000
trusted library allocation
page read and write
4280000
trusted library allocation
page execute and read and write
6860000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
727E000
stack
page read and write
17749203000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
C58BEE9000
stack
page read and write
736E000
stack
page read and write
66A0000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
7FF886AB0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
294800BC000
trusted library allocation
page read and write
294806BF000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
4015000
trusted library allocation
page execute and read and write
6850000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
294EAFB1000
heap
page read and write
7FF8868F0000
trusted library allocation
page read and write
7FF886B40000
trusted library allocation
page execute and read and write
67D0000
trusted library allocation
page read and write
7FF8868F3000
trusted library allocation
page execute and read and write
14C228A9000
heap
page read and write
67D0000
trusted library allocation
page read and write
7FF886ABD000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
67D9000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
294800EA000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
5431000
trusted library allocation
page read and write
537000
heap
page read and write
29480368000
trusted library allocation
page read and write
41C0000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
14C22744000
unkown
page readonly
1CAEFB30000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
C58CFFC000
stack
page read and write
6660000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
14C09CE9000
heap
page read and write
6840000
trusted library allocation
page read and write
1DA9D4BC000
trusted library allocation
page read and write
294EAE2D000
heap
page read and write
4D20000
trusted library allocation
page execute and read and write
6640000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
29480680000
trusted library allocation
page read and write
6D8E000
stack
page read and write
177590D1000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
4DBE000
stack
page read and write
67D0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6860000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
7FF8868DD000
trusted library allocation
page execute and read and write
7FF88690B000
trusted library allocation
page execute and read and write
6660000
trusted library allocation
page read and write
40B0000
heap
page read and write
2FD7000
heap
page read and write
6680000
trusted library allocation
page read and write
14C228B8000
heap
page read and write
6850000
trusted library allocation
page read and write
4350000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
C58A2FF000
stack
page read and write
6690000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
7FF8869C0000
trusted library allocation
page execute and read and write
67D0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
294801D1000
trusted library allocation
page read and write
2F96000
heap
page read and write
6680000
trusted library allocation
page read and write
177489F9000
heap
page read and write
18C000
stack
page read and write
6660000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
1CAF0030000
heap
page execute and read and write
6840000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
C58C0FC000
stack
page read and write
1CAEF8EE000
heap
page read and write
6840000
trusted library allocation
page read and write
7FF8869F0000
trusted library allocation
page execute and read and write
6840000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
7FF886B00000
trusted library allocation
page read and write
14C080E9000
heap
page read and write
C58C8F7000
stack
page read and write
6820000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6860000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
294EA130000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
17749211000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6660000
trusted library allocation
page read and write
42A0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
7FF886BE0000
trusted library allocation
page read and write
6820000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
7FF886B90000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6850000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
43B2000
trusted library allocation
page read and write
66A0000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
44CB000
trusted library allocation
page read and write
6840000
trusted library allocation
page read and write
6E1B000
heap
page read and write
6680000
trusted library allocation
page read and write
67D0000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
6680000
trusted library allocation
page read and write
440000
heap
page read and write
598A9FD000
stack
page read and write
6680000
trusted library allocation
page read and write
There are 2081 hidden memdumps, click here to show them.