IOC Report
e0#U05ea.msi

loading gif

Files

File Path
Type
Category
Malicious
e0#U05ea.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
initial sample
malicious
C:\Config.Msi\3f7202.rbs
data
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI7358.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSI7358.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI7984.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSI7984.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI9172.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSI9172.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI9422.tmp
data
dropped
malicious
C:\Windows\Installer\MSIB318.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
modified
malicious
C:\Windows\Installer\MSIB318.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\System32\InstallUtil.InstallLog
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Windows\Temp\~DF47766066B75C798D.TMP
data
dropped
malicious
C:\Windows\Temp\~DF6A4DE52DC2399F9D.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF7B5BC7245F2550A2.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF92B08A0855196A93.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF9D0DB2C030910D25.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DFD6287FB4F7B1D804.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallState
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.ini
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AteraAgent.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
CSV text
dropped
C:\Windows\Installer\3f7201.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\3f7203.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\MSI7358.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI7358.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI7358.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI7358.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI7984.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI7984.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI7984.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI7984.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI9172.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI9172.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI9172.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI9172.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI9433.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI94B1.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI9638.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIB318.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSIB318.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIB318.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIB318.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SourceHash{E732A0D7-A2F2-4657-AC41-B19742648E45}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1A374813EDB1A6631387E414D3E73232
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\329B6147266C1E26CD774EA22B79EC2E
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BA74182F76F15A9CF514DEF352303C95
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
Certificate, Version=3
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
Certificate, Version=3
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1A374813EDB1A6631387E414D3E73232
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\329B6147266C1E26CD774EA22B79EC2E
data
modified
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BA74182F76F15A9CF514DEF352303C95
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log
CSV text
dropped
C:\Windows\Temp\~DF610224CE4F91896E.TMP
data
dropped
C:\Windows\Temp\~DFA53762D421BE0DA2.TMP
data
dropped
C:\Windows\Temp\~DFAFB3817246595346.TMP
data
dropped
C:\Windows\Temp\~DFE0A875DB61BC3BA3.TMP
data
dropped
C:\Windows\Temp\~DFED5477949DBBDA3C.TMP
data
dropped
C:\Windows\Temp\~DFF36E3B3E3AD7D070.TMP
data
dropped
\Device\ConDrv
JSON data
dropped
There are 77 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI7358.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4158531 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI7984.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4159906 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI9172.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4166015 11 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="pjt145.chef@elbayrak.com" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000O3Ui7IAF" /AgentId="883f7d62-963d-4a4e-aadf-4ee8e577d238"
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSIB318.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4174625 33 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 883f7d62-963d-4a4e-aadf-4ee8e577d238 "eb7ae0f0-01c0-4bb5-a03a-e6b63b26697d" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000O3Ui7IAF
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 883f7d62-963d-4a4e-aadf-4ee8e577d238 "bc5dfe9b-e2bb-4515-b3e1-7877603aa96e" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000O3Ui7IAF
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 883f7d62-963d-4a4e-aadf-4ee8e577d238 "16904213-f096-40ec-9bf1-11c4695deea3" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000O3Ui7IAF
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\e0#U05ea.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 2C828FCE33DD8E11A4DB652C16749A7F
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 383888C60FE94E71DA4676E44D32717F E Global\MSI0000
C:\Windows\SysWOW64\net.exe
"NET" STOP AteraAgent
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 STOP AteraAgent
C:\Windows\SysWOW64\taskkill.exe
"TaskKill.exe" /f /im AteraAgent.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 13 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/883f7d62-963d-4a4e-aadf-4ee8e577d238/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=9b35e03f-9217-47fc-883e-376a0acf1a33&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
13.232.67.198
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/883f7d62-963d-4a4e-aadf-4ee8e577d238/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=0fdd6a07-21a5-4251-94a9-7ec5786af820&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
13.232.67.198
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=5951d75d-4aae-498f-8cfe-2d2684bcac30&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
13.232.67.198
http://schemas.datacontract.org
unknown
https://ps.atera.com/agentpackageswin/AgentPackageMonitoring/22.0/AgentPackageMonitoring.zip
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageMarketplace/1.6/AgentPackageMarketplace.zip
unknown
https://agent-api.atera.com/Production/Agent/GetCommands)
unknown
https://agent-api.atera.com/Production/Agent/track-event
unknown
http://dl.google.com/googletalk/googletalk-setup.exe
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=0c8fe399-28d9-41a3-bf50-c77a672f47cf&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
13.232.67.198
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=dc3922f5-35d6-4f94-b311-0484e4bd5995
unknown
https://agent-api.atera.com/Production/Agent/
unknown
http://schemas.datacontract.org/2004/07/System.ServiceProcess
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/883f7d62-963d-4a4e-aadf-4ee8e577d238/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=e5b922ff-1087-45ae-bfaa-92dac2278cbc&tr=31&tt=17324434221501574&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
13.232.67.198
http://wixtoolset.org
unknown
https://agent-api.atera.com/Production
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=dc3922f5-35d6-4f94-b311-0484e4bd5995&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
13.232.67.198
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/883f7d62-963d-4a4e-aadf-4ee8e577d238/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=8cf06a91-99a7-45cd-a779-b72be96870d7&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
13.232.67.198
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=12f3eadc-4137-4969-a630-9caae86b52c8&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
13.232.67.198
https://ps.atera.com/agentpackageswin/AgentPackageRuntimeInstaller/13.0/AgentPackageRuntimeInstaller
unknown
http://acontrol.atera.com/
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/883f7d62-963d-4a4e-aadf-4ee8e577d238/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=58b95c89-793e-4183-b4ec-622b28949278&tt=0&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
13.232.67.198
https://agent-api.atera.com/Production/Agent/AgentStarting)
unknown
https://ps.pndsn.com
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageADRemote/6.0/AgentPackageADRemote.zip
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageNetworkDiscovery/23.9/AgentPackageNetworkDiscove
unknown
https://agent-api.aterDn
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageMonitoring/37.8/AgentPackageMonitoring.zip
unknown
http://agent-api.atera.com
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageSystemTools/27.8/AgentPackageSystemTools.zip
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/883f7d62-963d-4a4e-aadf-4ee8e577d238/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=828d2fae-bb40-4bf1-b7d4-c9f95f35880c&tt=0&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
13.232.67.198
http://schemas.datacontract.org/2004/07/
unknown
https://github.com/icsharpcode/SharpZipLib
unknown
https://ps.atera.com/agentpackageswin/AgentPackageNetworkDiscovery/15.0/AgentPackageNetworkDiscovery
unknown
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageAgentI
unknown
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
unknown
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/883f7d62-963d-4a4e-aadf-4ee8e577d238/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=de3a19ac-393b-475a-b5ce-07c61aa216d9&tr=31&tt=17324433440133815&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
13.232.67.198
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=484b7669-faad-46fb-95da-3f494fe71338&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
13.232.67.198
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageTaskScheduler/17.2/AgentPackageTaskScheduler.zip
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageTicketing/30.1/AgentPackageTicketing.zip
unknown
https://agent-api.atera.com
unknown
https://agent-api.atera.com/Production/Agent/AgentStarting
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=2aed862e-2eee-4460-94f8-67ced20c3e98
unknown
http://www.w3.oh
unknown
https://agent-api.atera.com/Production/Agent/GetCommands
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/883f7d62-963d-4a4e-aadf-4ee8e577d238/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=9dbdf105-b22b-42a8-a293-ef3c50c5b89f&tr=31&tt=17324433466351848&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
13.232.67.198
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=4e6de541-ebdf-48b4-adc4-f35ddb9ca4eb&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
13.232.67.198
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/883f7d62-963d-4a4e-aadf-4ee8e577d238/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=a714345f-6069-463f-b471-b79c49409a31&tr=31&tt=17324434221501574&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
13.232.67.198
https://agent-api.atera.com/
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=09996451-139e-4d4e-87e9-c03841f30e76&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
13.232.67.198
https://agent-api.atera.com/Production/Agent/GetRecurringPackages
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.Availability/13.0/Agent.Package.Availability.zip
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageRuntimeInstaller/1.5/AgentPackageRuntimeInstaller.
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.Watchdog/13.0/Agent.Package.Watchdog.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=0c8fe399-28d9-41a3-bf50-c77a672f47cf
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=d7638603-5a9e-4a0e-a726-ea2723946dc6&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
13.232.67.198
https://ps.atera.com/agentpackagesnet45/Agent.Package.Availability/0.16/Agent.Package.Availability.z
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/38.0/AgentPackageAgentInformation.zip?MXEuqxTtBtfd+dFjSfn8PupuPxKD+CNuASOYt6ySpA3SYMBPBbjiPgfcFSHiAA/v
108.158.75.93
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/883f7d62-963d-4a4e-aadf-4ee8e577d238/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=ae447775-3f27-4878-8dac-a944634d4b04&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
13.232.67.198
https://ps.atera.com/agentpackagesnet45/AgentPackageUpgradeAgent/27.6/AgentPackageUpgradeAgent.zip
unknown
https://ps.atera.com/agentpackagesmac/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
unknown
https://ps.atera.com/agentpackagesnet45/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
unknown
https://ps.atera.com/agentpackagesmac/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=5951d75d-4aae-498f-8cfe-2d2684bcac30
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=12f3eadc-4137-4969-a630-9caae86b52c8
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=459bf948-52b5-4158-a1ed-7acb5a150d74&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
13.232.67.198
https://www.newtonsoft.com/json
unknown
https://ps.atera.com/agentpackageswin/AgentPackageHeartbeat/16.9
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=d7638603-5a9e-4a0e-a726-ea2723946dc6
unknown
http://wixtoolset.org/news/
unknown
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf
unknown
https://ps.atera.com/agentpackageswin/AgentPackageAgentInformation/22.7/AgentPackageAgentInformation
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageOsUpdates/20.9/AgentPackageOsUpdates.zip
unknown
https://agent-api.aterD
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageNetworkDiscovery/13.0/AgentPackageNetworkDiscovery
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.IotPoc/13.0/Agent.Package.IotPoc.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=2aed862e-2eee-4460-94f8-67ced20c3e98&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
13.232.67.198
https://agent-api.atera.com/Production/Agent/AcknowledgeCommands
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageTaskScheduler/13.0/AgentPackageTaskScheduler.zip
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageAgentInformation/38.0/AgentPackageAgentInformation
unknown
http://www.w3.o
unknown
https://ps.atera.com
unknown
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageA
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/38.0/AgentPackageAgentInformati
unknown
https://agent-api.atera.com/Production/Agent/GetCommandsFallback
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/883f7d62-963d-4a4e-aadf
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/883f7d62-963d-4a4e-aadf-4ee8e577d238/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=53a672d4-64e8-41a4-b6a2-cf6f70a93e3a&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
13.232.67.198
https://ps.atera.com/agentpackagesnet45/AgentPackageRuntimeInstaller/1.6/AgentPackageRuntimeInstalle
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageHeartbeat/17.14/AgentPackageHeartbeat.zip
unknown
http://ps.pndsn.com
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/883f7d62-963d-4a4e-aadf-4ee8e577d238/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=c81cc1d6-c362-4d28-bb00-1ffac3b99a1b&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
13.232.67.198
https://github.com/JamesNK/Newtonsoft.Json
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/883f7d62-963d-4a4e-aadf-4ee8e577d238/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=be904d3c-4208-46ed-ab86-e69008a35a81&uuid=883f7d62-963d-4a4e-aadf-4ee8e577d238
13.232.67.198
https://ps.atera.com/agentpackagesmac/Agent.Package.Availability/0.16/Agent.Package.Availability.zip
unknown
https://ps.atera.com/agentpackagesmac/Agent.Package.Watchdog/1.7/A
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ps.pndsn.com
13.232.67.198
bg.microsoft.map.fastly.net
199.232.214.172
d25btwd9wax8gu.cloudfront.net
108.158.75.93
fp2e7a.wpc.phicdn.net
192.229.221.95
windowsupdatebg.s.llnwi.net
178.79.238.0
ps.atera.com
unknown
agent-api.atera.com
unknown

IPs

IP
Domain
Country
Malicious
108.158.75.93
d25btwd9wax8gu.cloudfront.net
United States
13.232.67.198
ps.pndsn.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\3f7202.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\3f7202.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\ATERA Networks\AteraAgent\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\ATERA Networks\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Features
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
AutoBackupLogFiles
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AteraAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
AccountId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
IntegratorLogin
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
CompanyId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
AgentId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
ServerName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AlphaAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
FileDirectory
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_USERS.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
FileDirectory
There are 135 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
17A800B4000
trusted library allocation
page read and write
malicious
7FF7BFD24000
trusted library allocation
page read and write
malicious
4884000
trusted library allocation
page read and write
malicious
2917AA98000
heap
page read and write
malicious
19F996FA000
trusted library allocation
page read and write
malicious
20BD2632000
heap
page read and write
malicious
19F997CA000
trusted library allocation
page read and write
malicious
20BD2558000
heap
page read and write
malicious
17A80001000
trusted library allocation
page read and write
malicious
19FB20D0000
heap
page read and write
malicious
19F99511000
trusted library allocation
page read and write
malicious
19FB2120000
heap
page read and write
malicious
171C13A0000
heap
page read and write
malicious
171C1B73000
trusted library allocation
page read and write
malicious
20BD256B000
heap
page read and write
malicious
17AE9BD6000
heap
page read and write
malicious
44F1000
heap
page read and write
malicious
19F9957D000
trusted library allocation
page read and write
malicious
19FB2232000
heap
page read and write
malicious
20BD25D1000
heap
page read and write
malicious
291619C9000
heap
page read and write
malicious
291619FB000
heap
page read and write
malicious
291619C0000
heap
page read and write
malicious
20BD258B000
heap
page read and write
malicious
20BD2E57000
trusted library allocation
page read and write
malicious
29161A4B000
heap
page read and write
malicious
4255000
heap
page read and write
malicious
171C13EE000
heap
page read and write
malicious
20BD258D000
heap
page read and write
malicious
17A8008C000
trusted library allocation
page read and write
malicious
17AE76E6000
heap
page read and write
malicious
29162111000
trusted library allocation
page read and write
malicious
171C1AF1000
trusted library allocation
page read and write
malicious
44C4000
heap
page read and write
malicious
29162183000
trusted library allocation
page read and write
malicious
47E1000
trusted library allocation
page read and write
malicious
5081000
trusted library allocation
page read and write
malicious
17AE9DC0000
heap
page read and write
malicious
19FB22CC000
heap
page read and write
malicious
8AB22F5000
stack
page read and write
malicious
19F98C2D000
heap
page read and write
malicious
17AE76A0000
heap
page read and write
malicious
5127000
trusted library allocation
page read and write
malicious
171DA1B2000
unkown
page readonly
malicious
29161980000
heap
page read and write
malicious
17AE776E000
heap
page read and write
malicious
19F98CC3000
heap
page read and write
malicious
19F98CF0000
heap
page read and write
malicious
29162193000
trusted library allocation
page read and write
malicious
291621CF000
trusted library allocation
page read and write
malicious
20BD2E83000
trusted library allocation
page read and write
malicious
17A80132000
trusted library allocation
page read and write
malicious
19F99BF5000
trusted library allocation
page read and write
malicious
17A800BA000
trusted library allocation
page read and write
malicious
19F99AFB000
trusted library allocation
page read and write
malicious
17A80089000
trusted library allocation
page read and write
malicious
17A800B2000
trusted library allocation
page read and write
malicious
171C14D0000
heap
page read and write
malicious
19F98BF0000
heap
page read and write
malicious
4FB9000
heap
page read and write
malicious
17AE7572000
unkown
page readonly
malicious
19F98F80000
heap
page read and write
malicious
29162157000
trusted library allocation
page read and write
malicious
17AE9DF8000
heap
page read and write
malicious
17A8017C000
trusted library allocation
page read and write
malicious
20BD2830000
heap
page read and write
malicious
20BD2ECF000
trusted library allocation
page read and write
malicious
19F98C0C000
heap
page read and write
malicious
171C1B63000
trusted library allocation
page read and write
malicious
19FB1C27000
heap
page read and write
malicious
20BD2E93000
trusted library allocation
page read and write
malicious
171C11B2000
unkown
page readonly
malicious
17AE9B5B000
heap
page read and write
malicious
17AE7720000
heap
page read and write
malicious
F3860F1000
stack
page read and write
malicious
17AE76E0000
heap
page read and write
malicious
171C1360000
heap
page read and write
malicious
17AE9E0F000
heap
page read and write
malicious
19F98C77000
heap
page read and write
malicious
20BD2550000
heap
page read and write
malicious
20BD2E11000
trusted library allocation
page read and write
malicious
29161A82000
heap
page read and write
malicious
17AE772F000
heap
page read and write
malicious
19FB2146000
heap
page read and write
4780000
trusted library allocation
page read and write
46CC000
trusted library allocation
page execute and read and write
462FEFC000
stack
page read and write
47B0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
2727000
heap
page read and write
47A0000
trusted library allocation
page read and write
17AE7741000
heap
page read and write
47A0000
trusted library allocation
page read and write
8AB453A000
stack
page read and write
19F996EE000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
7FF7BFD79000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
35D0000
heap
page read and write
2A1E000
stack
page read and write
7590000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
25E5000
heap
page read and write
75E0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7FF7BFD65000
trusted library allocation
page read and write
28D7000
heap
page read and write
47A0000
trusted library allocation
page read and write
19FB216D000
heap
page read and write
19F999A7000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
7FF7BFD40000
trusted library allocation
page read and write
19F995D6000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
483D000
trusted library allocation
page read and write
749E000
stack
page read and write
291620E0000
heap
page execute and read and write
7FF7BFD13000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
19F99596000
trusted library allocation
page read and write
17B9ACC8000
heap
page read and write
75E0000
trusted library allocation
page read and write
5154000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
2BA3000
trusted library allocation
page execute and read and write
75D0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
7FF7BFD80000
trusted library allocation
page read and write
385B000
trusted library allocation
page execute and read and write
4780000
trusted library allocation
page read and write
2A46000
heap
page read and write
75E0000
trusted library allocation
page read and write
19FB2590000
heap
page read and write
46F1000
heap
page read and write
75D0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
28E9000
heap
page read and write
4730000
trusted library allocation
page read and write
7B63000
heap
page read and write
2BA4000
trusted library allocation
page read and write
6790000
trusted library allocation
page read and write
20BD2835000
heap
page read and write
7610000
heap
page execute and read and write
46F0000
trusted library allocation
page read and write
7FF7BFD33000
trusted library allocation
page read and write
7FF7BFD4E000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
56563FE000
stack
page read and write
75D0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
6D5D000
stack
page read and write
75D0000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
7FF7BFB94000
trusted library allocation
page read and write
29FE000
stack
page read and write
19FB215D000
heap
page read and write
75F0000
trusted library allocation
page read and write
7FF7BFC30000
trusted library allocation
page execute and read and write
6B00000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
4530000
heap
page readonly
7FF7BFC50000
trusted library allocation
page execute and read and write
45CC000
stack
page read and write
3608000
heap
page read and write
75B0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
29B0000
heap
page read and write
7FF7BFB92000
trusted library allocation
page read and write
5048000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
7FF7BFB7D000
trusted library allocation
page execute and read and write
75E0000
trusted library allocation
page read and write
7FF7BFD80000
trusted library allocation
page execute and read and write
452F000
stack
page read and write
47A0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
2A03000
heap
page read and write
7FF7BFD32000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
171C138D000
heap
page read and write
19F98F70000
trusted library allocation
page read and write
8AB423A000
stack
page read and write
4780000
trusted library allocation
page read and write
4660000
trusted library allocation
page read and write
7450000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
7A5E000
stack
page read and write
4750000
trusted library allocation
page read and write
2A85000
heap
page read and write
F386BFD000
stack
page read and write
3614000
heap
page read and write
35DA000
heap
page read and write
8AB2D35000
stack
page read and write
4780000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
29161BE5000
heap
page read and write
20BEB790000
heap
page execute and read and write
47A0000
trusted library allocation
page read and write
19F9981F000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7F808000
trusted library allocation
page execute and read and write
47A0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
7595000
trusted library allocation
page read and write
7FF7BFEA0000
trusted library allocation
page execute and read and write
369C000
heap
page read and write
47B0000
trusted library allocation
page read and write
3405000
heap
page read and write
7FF7BFDA0000
trusted library allocation
page read and write
368A000
heap
page read and write
171DA3A9000
heap
page read and write
4750000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
8AB323C000
stack
page read and write
4750000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
19FA9523000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
7FF7BFD80000
trusted library allocation
page read and write
75E1000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
44E4000
trusted library allocation
page read and write
7FF7BFB70000
trusted library allocation
page read and write
46303FD000
stack
page read and write
6083FFE000
stack
page read and write
47A0000
trusted library allocation
page read and write
28A0000
heap
page read and write
75D0000
trusted library allocation
page read and write
6BD0000
remote allocation
page read and write
171C13AB000
heap
page read and write
8AB343E000
stack
page read and write
75E0000
trusted library allocation
page read and write
3823000
trusted library allocation
page execute and read and write
20BD2E4D000
trusted library allocation
page read and write
19F995E6000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
7F008000
trusted library allocation
page execute and read and write
7FF7BFC4C000
trusted library allocation
page execute and read and write
4873000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
293D000
heap
page read and write
47A0000
trusted library allocation
page read and write
46C6000
trusted library allocation
page execute and read and write
47A0000
trusted library allocation
page read and write
171DA360000
heap
page read and write
19F99E2A000
trusted library allocation
page read and write
20FC000
stack
page read and write
2C4E000
stack
page read and write
4750000
trusted library allocation
page read and write
464E000
stack
page read and write
4750000
trusted library allocation
page read and write
11247E000
stack
page read and write
75D0000
trusted library allocation
page read and write
171C16C5000
heap
page read and write
4780000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
7FF7BFDD0000
trusted library allocation
page execute and read and write
4750000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
6A8E000
stack
page read and write
47B0000
trusted library allocation
page read and write
7FF7BFC9B000
trusted library allocation
page execute and read and write
75E0000
trusted library allocation
page read and write
7FF7BFB75000
trusted library allocation
page read and write
8AB3627000
stack
page read and write
7590000
trusted library allocation
page read and write
8AB3D29000
stack
page read and write
47A0000
trusted library allocation
page read and write
2735000
heap
page read and write
6880000
heap
page execute and read and write
47A0000
trusted library allocation
page read and write
7FF7BFD90000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
7FF7BFD35000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
7FF7BFD10000
trusted library allocation
page read and write
7FF7BFDD0000
trusted library allocation
page execute and read and write
7590000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
4700000
heap
page execute and read and write
7FF7BFD30000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
19F995B7000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
20BD2740000
heap
page read and write
23BD000
stack
page read and write
2557000
stack
page read and write
19F99340000
heap
page execute and read and write
75D0000
trusted library allocation
page read and write
46D0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
2A7B000
heap
page read and write
4560000
trusted library allocation
page execute and read and write
432E000
stack
page read and write
7590000
trusted library allocation
page read and write
5655FFE000
stack
page read and write
2A5F000
heap
page read and write
46306FC000
stack
page read and write
47A0000
trusted library allocation
page read and write
17A90001000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
29161AA6000
heap
page read and write
19FB218B000
heap
page read and write
4780000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
7FF7BFB9D000
trusted library allocation
page execute and read and write
19F99629000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
F3864FD000
stack
page read and write
47A0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
19F99DF8000
trusted library allocation
page read and write
3850000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
19FB1ED2000
unkown
page readonly
47A3000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
6BCE000
stack
page read and write
47A0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
7FF7BFBCC000
trusted library allocation
page execute and read and write
17AE9E0B000
heap
page read and write
47A0000
trusted library allocation
page read and write
7FF7BFB73000
trusted library allocation
page execute and read and write
56566FE000
stack
page read and write
50E1000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
17AE9E07000
heap
page read and write
171C14D5000
heap
page read and write
5172000
trusted library allocation
page read and write
8AB30BE000
stack
page read and write
4380000
trusted library allocation
page execute and read and write
17AE9333000
heap
page read and write
19F99DF2000
trusted library allocation
page read and write
5124000
trusted library allocation
page read and write
3857000
trusted library allocation
page execute and read and write
7FF7BFB80000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
2A19000
heap
page read and write
19FB21A3000
heap
page read and write
6083DFF000
stack
page read and write
29172121000
trusted library allocation
page read and write
29E0000
heap
page read and write
4750000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
19F99AEF000
trusted library allocation
page read and write
11210D000
stack
page read and write
75B0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
2840000
heap
page read and write
19F98C4D000
heap
page read and write
4750000
trusted library allocation
page read and write
4711000
trusted library allocation
page read and write
6AA0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
2A60000
heap
page read and write
3810000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
26AF000
stack
page read and write
19F99975000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
7FF7BFDE0000
trusted library allocation
page execute and read and write
2B30000
heap
page readonly
4780000
trusted library allocation
page read and write
46309FB000
stack
page read and write
4780000
trusted library allocation
page read and write
2885000
heap
page read and write
6A90000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
7FF7BFC20000
trusted library allocation
page read and write
17AE92F0000
heap
page execute and read and write
2BDB000
trusted library allocation
page execute and read and write
75D0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
17AE9E6A000
heap
page read and write
F3869FE000
stack
page read and write
7620000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
26A0000
heap
page read and write
75E0000
trusted library allocation
page read and write
7FF7BFD56000
trusted library allocation
page read and write
7FF7BFD55000
trusted library allocation
page read and write
2BAD000
trusted library allocation
page execute and read and write
2BD2000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
7FF7BFF30000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
19F98F65000
heap
page read and write
171C13EB000
heap
page read and write
47B0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
323B000
stack
page read and write
75B0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
56565FD000
stack
page read and write
4750000
trusted library allocation
page read and write
46304FC000
stack
page read and write
7FF7BFD2A000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
7FF7BFB83000
trusted library allocation
page read and write
19F999A3000
trusted library allocation
page read and write
21EF000
unkown
page read and write
20BD27B0000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
8AB4337000
stack
page read and write
7590000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
19F99BF1000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
7FF7BFBB0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
7FF7BFC2C000
trusted library allocation
page execute and read and write
47A0000
trusted library allocation
page read and write
171DA260000
unkown
page readonly
47B0000
trusted library allocation
page read and write
7FF7BFC56000
trusted library allocation
page execute and read and write
29EA000
heap
page read and write
19F996E6000
trusted library allocation
page read and write
3824000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
2930000
heap
page read and write
2BD0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
8AB26FD000
stack
page read and write
70BC000
stack
page read and write
7FF7BFD76000
trusted library allocation
page read and write
19F995D2000
trusted library allocation
page read and write
4680000
trusted library allocation
page execute and read and write
75B0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7620000
trusted library allocation
page read and write
7FF7BFC40000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
56562FE000
stack
page read and write
46301FC000
stack
page read and write
6D1E000
stack
page read and write
75D0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
7FF7BFD89000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
462FDFB000
stack
page read and write
7FF7BFC20000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
171DA310000
heap
page read and write
7FF7BFD20000
trusted library allocation
page read and write
7075000
heap
page read and write
47AE000
trusted library allocation
page read and write
297D000
stack
page read and write
171C1460000
heap
page read and write
7590000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
4755000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
2850000
heap
page read and write
4780000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
4FF0000
heap
page execute and read and write
47A0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
6CDE000
stack
page read and write
43A0000
trusted library allocation
page read and write
7FF7BFD10000
trusted library allocation
page read and write
3663000
heap
page read and write
171DA420000
heap
page execute and read and write
75B0000
trusted library allocation
page read and write
19F99D18000
trusted library allocation
page read and write
8AB4737000
stack
page read and write
20BEB6AA000
heap
page read and write
75B0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
8AB4937000
stack
page read and write
171C13A9000
heap
page read and write
7590000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
7FF7BFD4A000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
2A88000
heap
page read and write
171DA31A000
heap
page read and write
6081000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
2880000
heap
page read and write
75B0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7620000
trusted library allocation
page read and write
29161A09000
heap
page read and write
75B0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
7FF7BFD80000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
19F9959C000
trusted library allocation
page read and write
8AB233E000
stack
page read and write
75E0000
trusted library allocation
page read and write
7FF7BFDC0000
trusted library allocation
page execute and read and write
7590000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
19F99D16000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
42FF000
stack
page read and write
47B0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
57E5000
trusted library allocation
page read and write
48B4000
trusted library allocation
page read and write
6BD0000
remote allocation
page read and write
2917AACF000
heap
page read and write
26F5000
heap
page read and write
171C13E9000
heap
page read and write
7FF41B700000
trusted library allocation
page execute and read and write
53D1000
trusted library allocation
page read and write
8AB353F000
stack
page read and write
75B0000
trusted library allocation
page read and write
19FB1540000
trusted library allocation
page read and write
48D2000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
171DA30C000
unkown
page readonly
7FF7BFD50000
trusted library allocation
page execute and read and write
6870000
heap
page read and write
29162240000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
17AE9DEB000
heap
page read and write
7B9D000
heap
page read and write
75D0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
19F996F6000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
37D0000
heap
page read and write
19F999F9000
trusted library allocation
page read and write
17AE772D000
heap
page read and write
5145000
trusted library allocation
page read and write
267D000
stack
page read and write
4780000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
2AE0000
heap
page read and write
75E0000
trusted library allocation
page read and write
19F98C17000
heap
page read and write
251B000
stack
page read and write
29161A07000
heap
page read and write
47A0000
trusted library allocation
page read and write
7FF7BFDC0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
19FB217E000
heap
page read and write
75D0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
2CA5000
heap
page read and write
75E0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
19F996D0000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
7FF7BFD8E000
trusted library allocation
page read and write
465D000
trusted library allocation
page execute and read and write
19FB219F000
heap
page read and write
171DA37D000
heap
page read and write
5113000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
171C1C1F000
trusted library allocation
page read and write
19F98CB8000
heap
page read and write
26F0000
heap
page read and write
4780000
trusted library allocation
page read and write
28AA000
heap
page read and write
289D000
stack
page read and write
F386AFE000
stack
page read and write
47B0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
7510000
trusted library allocation
page read and write
47AC000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
19F99E18000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
19F997C4000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
19F98DD0000
heap
page read and write
3820000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
20BEB657000
heap
page read and write
46C0000
trusted library allocation
page read and write
3689000
heap
page read and write
19F996EA000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
2A0C000
heap
page read and write
75E0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
7FF7BFD52000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
19F993C0000
heap
page read and write
3612000
heap
page read and write
7FF7BFB74000
trusted library allocation
page read and write
171D1AF1000
trusted library allocation
page read and write
462FCFE000
stack
page read and write
47B0000
trusted library allocation
page read and write
7594000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
48A5000
trusted library allocation
page read and write
7FF7BFDF0000
trusted library allocation
page read and write
7FF7BFD70000
trusted library allocation
page read and write
19F98F73000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
5060000
heap
page read and write
69CE000
stack
page read and write
19F99DF0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
382D000
trusted library allocation
page execute and read and write
75D0000
trusted library allocation
page read and write
17B9AC30000
heap
page read and write
47B0000
trusted library allocation
page read and write
7FF7BFDA0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
29161BC0000
trusted library allocation
page read and write
7FF7BFB94000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
28B7000
heap
page read and write
7FF7BFD70000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7FF7BFBBB000
trusted library allocation
page execute and read and write
47A0000
trusted library allocation
page read and write
6083CFD000
stack
page read and write
4780000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
6083AFE000
stack
page read and write
4455000
heap
page read and write
47A0000
trusted library allocation
page read and write
7B60000
heap
page read and write
448F000
stack
page read and write
47A0000
trusted library allocation
page read and write
17AE7769000
heap
page read and write
38A0000
heap
page read and write
7FF7BFD10000
trusted library allocation
page read and write
47C4000
trusted library allocation
page read and write
17AE7723000
heap
page read and write
20BD2638000
heap
page read and write
75D0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
171C11B0000
unkown
page readonly
7FF7BFDC0000
trusted library allocation
page execute and read and write
701E000
stack
page read and write
75B0000
trusted library allocation
page read and write
19FB2195000
heap
page read and write
7590000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
27B000
stack
page read and write
47A0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
67B0000
trusted library allocation
page execute and read and write
4780000
trusted library allocation
page read and write
6B8E000
stack
page read and write
47A0000
trusted library allocation
page read and write
428E000
stack
page read and write
75B0000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
75C0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
F3868FE000
stack
page read and write
35FC000
heap
page read and write
171DA1C8000
unkown
page readonly
2B3E000
stack
page read and write
75D0000
trusted library allocation
page read and write
7FF7BFB8D000
trusted library allocation
page execute and read and write
7FF7BFD3D000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
17AE93D4000
unkown
page readonly
75B0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
7FF7BFD90000
trusted library allocation
page execute and read and write
19F996A4000
trusted library allocation
page read and write
46DE000
stack
page read and write
7600000
trusted library allocation
page execute and read and write
29172111000
trusted library allocation
page read and write
674E000
stack
page read and write
75D0000
trusted library allocation
page read and write
28B0000
heap
page read and write
47A0000
trusted library allocation
page read and write
2C90000
heap
page read and write
171C11DC000
unkown
page readonly
4522000
heap
page read and write
2935000
heap
page read and write
75F0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
20BD2540000
heap
page read and write
5162000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
7FF7BFB72000
trusted library allocation
page read and write
19F999AB000
trusted library allocation
page read and write
50D1000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
4FEA000
heap
page read and write
789E000
stack
page read and write
7FF7BFB9B000
trusted library allocation
page execute and read and write
75B0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
2810000
heap
page read and write
17A9000F000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7FF7BFE00000
trusted library allocation
page read and write
171C1480000
heap
page read and write
25D0000
heap
page read and write
7590000
trusted library allocation
page read and write
7A1D000
stack
page read and write
47A0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
4755000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7FF7BFE50000
trusted library allocation
page read and write
29161BD3000
trusted library allocation
page read and write
5655EFD000
stack
page read and write
29162060000
heap
page execute and read and write
6D9E000
stack
page read and write
8AB28FE000
stack
page read and write
7590000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
29BE000
stack
page read and write
8AB3829000
stack
page read and write
4780000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
44ED000
trusted library allocation
page execute and read and write
4750000
trusted library allocation
page read and write
378E000
stack
page read and write
75D0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
7530000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
19FB24E0000
unkown
page readonly
19F996C8000
trusted library allocation
page read and write
8AB3F3F000
stack
page read and write
20BD2720000
heap
page read and write
29162100000
heap
page read and write
7590000
trusted library allocation
page read and write
7BA6000
heap
page read and write
7FF7BFD40000
trusted library allocation
page read and write
7FF7BFDF0000
trusted library allocation
page execute and read and write
75DC000
trusted library allocation
page read and write
17AE9DE7000
heap
page read and write
2A48000
heap
page read and write
47B0000
trusted library allocation
page read and write
171DA3AB000
heap
page read and write
2A63000
heap
page read and write
46300FE000
stack
page read and write
369C000
heap
page read and write
60839FE000
stack
page read and write
2B90000
heap
page read and write
25CE000
stack
page read and write
29A7000
heap
page read and write
19F99575000
trusted library allocation
page read and write
F3862FE000
stack
page read and write
47B1000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7FF7BFB78000
trusted library allocation
page read and write
46C3000
trusted library allocation
page read and write
2A7C000
heap
page read and write
75B0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
8AB4D3C000
stack
page read and write
4790000
trusted library allocation
page read and write
70AE000
heap
page read and write
462F6FB000
stack
page read and write
7FF7BFC2C000
trusted library allocation
page execute and read and write
7500000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
6BD0000
heap
page read and write
2A65000
heap
page read and write
7630000
trusted library allocation
page read and write
17AE9240000
heap
page read and write
19F98E10000
heap
page read and write
7590000
trusted library allocation
page read and write
259B000
stack
page read and write
75D0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
19F999F5000
trusted library allocation
page read and write
19F99D14000
trusted library allocation
page read and write
7FF7BFD64000
trusted library allocation
page read and write
7FF7BFD50000
trusted library allocation
page execute and read and write
2C50000
heap
page read and write
4750000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
7FF7BFD13000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
7EFE8000
trusted library allocation
page execute and read and write
75D0000
trusted library allocation
page read and write
8AB25FE000
stack
page read and write
4750000
trusted library allocation
page read and write
7FF7BFDA2000
trusted library allocation
page read and write
370D000
stack
page read and write
7FF7BFC56000
trusted library allocation
page execute and read and write
292E000
heap
page read and write
46C4000
heap
page read and write
4780000
trusted library allocation
page read and write
37CE000
stack
page read and write
47A0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
2AA0000
heap
page read and write
47A0000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
42B0000
heap
page execute and read and write
47A0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
7FF7BFD50000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
19F98C37000
heap
page read and write
75D0000
trusted library allocation
page read and write
2916214D000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
7FF7BFD4E000
trusted library allocation
page read and write
7FF7BFD50000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
29161A46000
heap
page read and write
4750000
trusted library allocation
page read and write
17AE7650000
heap
page read and write
4780000
trusted library allocation
page read and write
171DA262000
unkown
page readonly
29161930000
heap
page read and write
75D0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7FF7BFE10000
trusted library allocation
page execute and read and write
8AB2C3E000
stack
page read and write
17AE770B000
heap
page read and write
75D0000
trusted library allocation
page read and write
76C0000
remote allocation
page read and write
6B30000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
8AB2AFE000
stack
page read and write
7590000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
2AD3000
trusted library allocation
page execute and read and write
75D0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
3AD000
stack
page read and write
7FF7BFD27000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
7FF7BFB90000
trusted library allocation
page read and write
7FF7BFF50000
trusted library allocation
page read and write
20BE2E1D000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
75C0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
5655CFF000
stack
page read and write
75D0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
F3863FE000
stack
page read and write
8AB3A2A000
stack
page read and write
75D0000
trusted library allocation
page read and write
44F0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
19F99D12000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
17AE78C0000
trusted library allocation
page read and write
19F999A5000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
7EFF0000
trusted library allocation
page execute and read and write
7FF7BFC30000
trusted library allocation
page execute and read and write
7FF7BFD89000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
8AB2BF5000
stack
page read and write
750C000
trusted library allocation
page execute and read and write
47A0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
19F996CC000
trusted library allocation
page read and write
7FF7BFB7D000
trusted library allocation
page execute and read and write
20BEB6CD000
heap
page read and write
171C16C0000
heap
page read and write
6F1D000
stack
page read and write
47A0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
7509000
trusted library allocation
page execute and read and write
5715000
trusted library allocation
page read and write
2A88000
heap
page read and write
4517000
trusted library allocation
page execute and read and write
3852000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
19F9956A000
trusted library allocation
page read and write
7FF7BFBCC000
trusted library allocation
page execute and read and write
47A1000
trusted library allocation
page read and write
75C0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
8AB3B3B000
stack
page read and write
19FB22BF000
heap
page read and write
2916214B000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
7FF7BFB70000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
19FA958F000
trusted library allocation
page read and write
46308FC000
stack
page read and write
4750000
trusted library allocation
page read and write
2917AA88000
heap
page read and write
75B0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
7FF7BFDB0000
trusted library allocation
page read and write
19FB2370000
heap
page read and write
75D0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
4548000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
74DE000
stack
page read and write
75D0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
17AE9E4C000
heap
page read and write
4390000
trusted library allocation
page read and write
19FB24E2000
unkown
page readonly
75B0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
19F995DE000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
19F99B8B000
trusted library allocation
page read and write
56561FE000
stack
page read and write
47A0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
19F98C3B000
heap
page read and write
7FF7BFB9B000
trusted library allocation
page execute and read and write
70FD000
stack
page read and write
7FF7BFB90000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
29AE000
stack
page read and write
7FF7BFD6B000
trusted library allocation
page read and write
4286000
heap
page read and write
75D0000
trusted library allocation
page read and write
785E000
stack
page read and write
2850000
heap
page read and write
47B0000
trusted library allocation
page read and write
75D1000
trusted library allocation
page read and write
20BD2E4B000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
11257E000
stack
page read and write
60842FE000
stack
page read and write
75B0000
trusted library allocation
page read and write
7FF7BFDA0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
2B07000
trusted library allocation
page execute and read and write
7520000
trusted library allocation
page execute and read and write
7FF7BFC46000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7FF7BFC2C000
trusted library allocation
page execute and read and write
171C1C33000
trusted library allocation
page read and write
7FF7BFD45000
trusted library allocation
page read and write
60841FE000
stack
page read and write
19F98C75000
heap
page read and write
19F99DF6000
trusted library allocation
page read and write
462FAFF000
stack
page read and write
7590000
trusted library allocation
page read and write
20BD25AB000
heap
page read and write
7FF7BFDB0000
trusted library allocation
page read and write
436F000
stack
page read and write
75B0000
trusted library allocation
page read and write
7FF7BFB93000
trusted library allocation
page execute and read and write
17AE7594000
unkown
page readonly
2800000
heap
page read and write
4754000
trusted library allocation
page read and write
2C00000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
17AE76D0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page execute and read and write
75A0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
3400000
heap
page read and write
7FF7BFC26000
trusted library allocation
page read and write
7FF7BFB80000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
7570000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
17AE9330000
heap
page read and write
70A0000
heap
page read and write
4790000
trusted library allocation
page read and write
2160000
heap
page read and write
17B9ACB0000
heap
page read and write
75B0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
7F7F0000
trusted library allocation
page execute and read and write
75D4000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
17AE7920000
heap
page execute and read and write
4780000
trusted library allocation
page read and write
487B000
trusted library allocation
page read and write
19FB1BD0000
heap
page read and write
4750000
trusted library allocation
page read and write
8AB443C000
stack
page read and write
47A0000
trusted library allocation
page read and write
7FF7BFD6D000
trusted library allocation
page read and write
171C1260000
heap
page read and write
75F0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
60844FE000
stack
page read and write
171C13A3000
heap
page read and write
705E000
stack
page read and write
7FF7BFE70000
trusted library allocation
page read and write
2A90000
heap
page read and write
7590000
trusted library allocation
page read and write
266E000
stack
page read and write
47B0000
trusted library allocation
page read and write
293F000
stack
page read and write
7FF7BFBEC000
trusted library allocation
page execute and read and write
75F0000
trusted library allocation
page read and write
17AE7670000
heap
page read and write
46E0000
trusted library allocation
page execute and read and write
4780000
trusted library allocation
page read and write
75D4000
trusted library allocation
page read and write
74F0000
trusted library allocation
page read and write
270B000
heap
page read and write
19F98F85000
heap
page read and write
75D0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
7FF7BFC30000
trusted library allocation
page execute and read and write
7FF7BFD2E000
trusted library allocation
page read and write
17B9AC40000
heap
page read and write
4750000
trusted library allocation
page read and write
7FF7BFD46000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
2BD7000
trusted library allocation
page execute and read and write
75B0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
26F8000
heap
page read and write
4780000
trusted library allocation
page read and write
2A40000
heap
page read and write
7FF7BFBCC000
trusted library allocation
page execute and read and write
17A80172000
trusted library allocation
page read and write
7B5E000
stack
page read and write
43C0000
heap
page read and write
75D0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
20BE2E11000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
17AE9DDF000
heap
page read and write
20BEB6A4000
heap
page read and write
7FF7BFB9D000
trusted library allocation
page execute and read and write
75D0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
19F996A0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
330000
heap
page read and write
47A0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
3671000
heap
page read and write
47A0000
trusted library allocation
page read and write
511B000
trusted library allocation
page read and write
26F0000
heap
page read and write
75F0000
trusted library allocation
page read and write
75D1000
trusted library allocation
page read and write
19F995EE000
trusted library allocation
page read and write
46307FA000
stack
page read and write
47A0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
27BE000
stack
page read and write
29DE000
stack
page read and write
171D1AFD000
trusted library allocation
page read and write
29E0000
heap
page read and write
4750000
trusted library allocation
page read and write
3608000
heap
page read and write
17B9ACC0000
heap
page read and write
7FF7BFB83000
trusted library allocation
page read and write
7B1E000
stack
page read and write
75B0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
2A70000
heap
page read and write
75D0000
trusted library allocation
page read and write
20BD2DE0000
heap
page execute and read and write
4780000
trusted library allocation
page read and write
17AE9B7E000
heap
page read and write
75F0000
trusted library allocation
page read and write
2739000
heap
page read and write
47A0000
trusted library allocation
page read and write
19FB1F7E000
unkown
page readonly
8AB4637000
stack
page read and write
29161985000
heap
page read and write
75F0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
678E000
stack
page read and write
47A0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
171C1690000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
7FF7BFB8D000
trusted library allocation
page execute and read and write
463D000
stack
page read and write
7FF7BFB72000
trusted library allocation
page read and write
60843FE000
stack
page read and write
35F3000
heap
page read and write
75D0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
20BD2E00000
heap
page read and write
47A0000
trusted library allocation
page read and write
19F99B09000
trusted library allocation
page read and write
2BB0000
trusted library allocation
page read and write
26EE000
stack
page read and write
7FF7BFD60000
trusted library allocation
page read and write
8AB4B29000
stack
page read and write
4730000
trusted library allocation
page read and write
46BE000
stack
page read and write
75D0000
trusted library allocation
page read and write
2960000
heap
page read and write
7FF7BFC20000
trusted library allocation
page read and write
19F99564000
trusted library allocation
page read and write
43D1000
trusted library allocation
page read and write
7FF7BFB73000
trusted library allocation
page execute and read and write
19FB1ED0000
unkown
page readonly
270B000
heap
page read and write
47B0000
trusted library allocation
page read and write
32B0000
heap
page read and write
47B0000
trusted library allocation
page read and write
7FF7BFB9D000
trusted library allocation
page execute and read and write
4780000
trusted library allocation
page read and write
7F148000
trusted library allocation
page execute and read and write
20BEB630000
heap
page read and write
171D1B01000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
2A26000
heap
page read and write
20BD2F65000
trusted library allocation
page read and write
7FF7BFD60000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
7FF7BFBAD000
trusted library allocation
page execute and read and write
75B0000
trusted library allocation
page read and write
7FF7BFDF6000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
19F99579000
trusted library allocation
page read and write
6083BFE000
stack
page read and write
75D0000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
2ADD000
trusted library allocation
page execute and read and write
7FF7BFDD0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
19F99E20000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
7FF7BFB73000
trusted library allocation
page execute and read and write
4780000
trusted library allocation
page read and write
21F0000
heap
page read and write
47A0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
20BD27D0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
7B93000
heap
page read and write
75B0000
trusted library allocation
page read and write
19F99D2E000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
6BD0000
remote allocation
page read and write
7590000
trusted library allocation
page read and write
320000
heap
page read and write
75D0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
20BD2F61000
trusted library allocation
page read and write
374D000
stack
page read and write
75D0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
20BD2595000
heap
page read and write
7590000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
2A6C000
heap
page read and write
75D0000
trusted library allocation
page read and write
171C1670000
trusted library allocation
page read and write
462F9FE000
stack
page read and write
171C1C1C000
trusted library allocation
page read and write
7FF7BFD16000
trusted library allocation
page read and write
19F98F50000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
27FE000
stack
page read and write
2BFF000
stack
page read and write
75E0000
trusted library allocation
page read and write
5070000
heap
page read and write
19F99D1C000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
19F99E1B000
trusted library allocation
page read and write
19F99621000
trusted library allocation
page read and write
5655BFF000
stack
page read and write
4780000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
47D0000
heap
page execute and read and write
19FB222B000
heap
page read and write
47A1000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
4380000
heap
page read and write
4580000
heap
page read and write
47A0000
trusted library allocation
page read and write
3671000
heap
page read and write
75B0000
trusted library allocation
page read and write
19F9979E000
trusted library allocation
page read and write
29161A1D000
heap
page read and write
17AE7570000
unkown
page readonly
75B0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
45D0000
heap
page readonly
6B30000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
7FF7BFD80000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
76C0000
heap
page read and write
7FF7BFD40000
trusted library allocation
page read and write
68CE000
stack
page read and write
7FF7BFB90000
trusted library allocation
page read and write
25C0000
heap
page read and write
4790000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
3663000
heap
page read and write
256D000
stack
page read and write
47A0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
171DA3BE000
heap
page read and write
4750000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
4570000
trusted library allocation
page read and write
2917AABA000
heap
page read and write
7620000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
171C11B0000
unkown
page readonly
36A5000
heap
page read and write
75B0000
trusted library allocation
page read and write
7FF7BFC26000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
29161920000
heap
page read and write
4780000
trusted library allocation
page read and write
8AB403A000
stack
page read and write
47A0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
6B30000
trusted library allocation
page read and write
437E000
stack
page read and write
4750000
trusted library allocation
page read and write
7FF7BFD60000
trusted library allocation
page read and write
F3865FE000
stack
page read and write
47B0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
17B9AC60000
heap
page read and write
690E000
stack
page read and write
3689000
heap
page read and write
20BD2760000
heap
page read and write
29161A03000
heap
page read and write
20BE2E21000
trusted library allocation
page read and write
2737000
heap
page read and write
4780000
trusted library allocation
page read and write
56560FE000
stack
page read and write
2AE1000
heap
page read and write
75F0000
trusted library allocation
page read and write
25E0000
heap
page read and write
75B0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
4760000
trusted library allocation
page read and write
7595000
trusted library allocation
page read and write
35F0000
heap
page read and write
7590000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
7BAF000
heap
page read and write
75D0000
trusted library allocation
page read and write
70AD000
heap
page read and write
4750000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
8AB373C000
stack
page read and write
7FF7BFD33000
trusted library allocation
page read and write
3830000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
368B000
heap
page read and write
4FEE000
stack
page read and write
17AE9AF0000
heap
page read and write
2B7E000
stack
page read and write
47A0000
trusted library allocation
page read and write
7093000
heap
page read and write
7590000
trusted library allocation
page read and write
19FA951E000
trusted library allocation
page read and write
7FF7BFD77000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
7FF7BFC56000
trusted library allocation
page execute and read and write
2B20000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
20BD2815000
heap
page read and write
7FF7BFD20000
trusted library allocation
page read and write
7FF7BFE40000
trusted library allocation
page read and write
46E0000
trusted library allocation
page read and write
3612000
heap
page read and write
4780000
trusted library allocation
page read and write
457E000
stack
page read and write
171C16A0000
heap
page read and write
7570000
trusted library allocation
page read and write
19F995CD000
trusted library allocation
page read and write
4510000
trusted library allocation
page read and write
451B000
trusted library allocation
page execute and read and write
75B0000
trusted library allocation
page read and write
7FF7BFB74000
trusted library allocation
page read and write
44E3000
trusted library allocation
page execute and read and write
2A5E000
stack
page read and write
75D0000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
7FF7BFC90000
trusted library allocation
page execute and read and write
4780000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
2AD4000
trusted library allocation
page read and write
51B9000
heap
page read and write
46302FC000
stack
page read and write
4750000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
50C8000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
8AB3931000
stack
page read and write
F3861FE000
stack
page read and write
75B0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
462F2F5000
stack
page read and write
4780000
trusted library allocation
page read and write
7FF7BFF40000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
53D5000
trusted library allocation
page read and write
29161BA0000
trusted library allocation
page read and write
28DC000
heap
page read and write
4580000
heap
page read and write
4780000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
17A8017A000
trusted library allocation
page read and write
29161950000
heap
page read and write
2916223C000
trusted library allocation
page read and write
19F98DF0000
heap
page read and write
4831000
trusted library allocation
page read and write
7FF7BFB94000
trusted library allocation
page read and write
781E000
stack
page read and write
8AB29FF000
stack
page read and write
47A0000
trusted library allocation
page read and write
17AE9342000
unkown
page readonly
2B50000
heap
page read and write
28CF000
heap
page read and write
19FA9511000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
19FB2920000
heap
page read and write
75E0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
6AC0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
462F4FE000
stack
page read and write
7FF7BFB94000
trusted library allocation
page read and write
20BD2F3F000
trusted library allocation
page read and write
7FF7BFD12000
trusted library allocation
page read and write
25ED000
stack
page read and write
4780000
trusted library allocation
page read and write
19F996E1000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page execute and read and write
6B30000
trusted library allocation
page read and write
20BD2F3C000
trusted library allocation
page read and write
2A5F000
heap
page read and write
4750000
trusted library allocation
page read and write
19FA9531000
trusted library allocation
page read and write
8AB4C37000
stack
page read and write
7590000
trusted library allocation
page read and write
7FF7BFD2D000
trusted library allocation
page read and write
7FF7BFE30000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
7506000
trusted library allocation
page execute and read and write
171DA3B1000
heap
page read and write
43C0000
heap
page read and write
4750000
trusted library allocation
page read and write
2CA0000
heap
page read and write
7503000
trusted library allocation
page read and write
8AB3E3E000
stack
page read and write
47B0000
trusted library allocation
page read and write
17A80178000
trusted library allocation
page read and write
5655AF1000
stack
page read and write
75D0000
trusted library allocation
page read and write
45CE000
stack
page read and write
7FF7BFC76000
trusted library allocation
page execute and read and write
7FF7BFC26000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
20BD2591000
heap
page read and write
75E0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
2940000
heap
page read and write
4780000
trusted library allocation
page read and write
7EFD0000
trusted library allocation
page execute and read and write
7FF7BFBA3000
trusted library allocation
page read and write
2B05000
heap
page read and write
75D0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
2B0B000
trusted library allocation
page execute and read and write
7590000
trusted library allocation
page read and write
19F993D5000
heap
page read and write
75D0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
20BD2576000
heap
page read and write
7FF7BFB70000
trusted library allocation
page read and write
75D3000
trusted library allocation
page read and write
171C1C41000
trusted library allocation
page read and write
74ED000
trusted library allocation
page execute and read and write
4750000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
7FF7BFBB4000
trusted library allocation
page read and write
7BA6000
heap
page read and write
467E000
stack
page read and write
7FF7BFCB0000
trusted library allocation
page execute and read and write
47A0000
trusted library allocation
page read and write
6F5E000
stack
page read and write
75D0000
trusted library allocation
page read and write
35EF000
heap
page read and write
462F3FE000
stack
page read and write
19F995F2000
trusted library allocation
page read and write
19FB2255000
heap
page read and write
8AB27FF000
stack
page read and write
47A0000
trusted library allocation
page read and write
7FF7BFD36000
trusted library allocation
page read and write
7FF7BFD30000
trusted library allocation
page read and write
75F4000
trusted library allocation
page read and write
7FF7BFB8D000
trusted library allocation
page execute and read and write
4841000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
171DA1B0000
unkown
page readonly
19FB2576000
heap
page read and write
6083EFE000
stack
page read and write
28BE000
stack
page read and write
7FF7BFD90000
trusted library allocation
page execute and read and write
7FF7BFD40000
trusted library allocation
page read and write
19F996F2000
trusted library allocation
page read and write
7FF7BFB9B000
trusted library allocation
page execute and read and write
482F000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
462F5FF000
stack
page read and write
8AB2428000
stack
page read and write
57E1000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
20BD2810000
heap
page read and write
7590000
trusted library allocation
page read and write
7595000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
2BE0000
heap
page read and write
679C000
trusted library allocation
page execute and read and write
7FF7BFDB0000
trusted library allocation
page execute and read and write
20BD2F53000
trusted library allocation
page read and write
19FB1EA0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
7FF7BFDC0000
trusted library allocation
page execute and read and write
7FF7BFC26000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
19F99500000
heap
page execute and read and write
47B0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
6B00000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
19F999A9000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
8AB3C3C000
stack
page read and write
4750000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
7FF7BFDA7000
trusted library allocation
page read and write
19FB2230000
heap
page read and write
7FF7BFBBD000
trusted library allocation
page execute and read and write
47B0000
trusted library allocation
page read and write
4876000
trusted library allocation
page read and write
5166000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
7FF7BFF70000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
2BD5000
trusted library allocation
page execute and read and write
2A78000
heap
page read and write
47A0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
6085000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
46305FD000
stack
page read and write
75B0000
trusted library allocation
page read and write
19F995AD000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
20BC000
stack
page read and write
75D0000
trusted library allocation
page read and write
6800000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
29161990000
heap
page read and write
4750000
trusted library allocation
page read and write
43A0000
heap
page read and write
75D0000
trusted library allocation
page read and write
43B0000
trusted library allocation
page read and write
7FF7BFD70000
trusted library allocation
page read and write
7FF7BFD60000
trusted library allocation
page read and write
2917211D000
trusted library allocation
page read and write
7FF7BFE90000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
19F9991F000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
7FF7BFBCC000
trusted library allocation
page execute and read and write
47B0000
trusted library allocation
page read and write
8AB4837000
stack
page read and write
75D0000
trusted library allocation
page read and write
5116000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
3277000
stack
page read and write
4750000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
5711000
trusted library allocation
page read and write
7FF7BFD68000
trusted library allocation
page read and write
20BD2E4F000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
7FF7BFB7D000
trusted library allocation
page execute and read and write
75D0000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
29161BE0000
heap
page read and write
19F99DED000
trusted library allocation
page read and write
60838F1000
stack
page read and write
75D0000
trusted library allocation
page read and write
2B00000
trusted library allocation
page read and write
17AE76A5000
heap
page read and write
759C000
trusted library allocation
page read and write
17AE7940000
heap
page read and write
76BE000
stack
page read and write
2AD0000
trusted library allocation
page read and write
19F99D3C000
trusted library allocation
page read and write
19F99790000
trusted library allocation
page read and write
171DA3D5000
heap
page read and write
3834000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
5655DFE000
stack
page read and write
7FF7BFB7D000
trusted library allocation
page execute and read and write
7FF7BFD70000
trusted library allocation
page read and write
252E000
stack
page read and write
19FB224B000
heap
page read and write
75D0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
2BB4000
trusted library allocation
page read and write
171C13C1000
heap
page read and write
4750000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
17AE9DD0000
heap
page read and write
19F995DA000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
433C000
stack
page read and write
4828000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
462F8FE000
stack
page read and write
47A0000
trusted library allocation
page read and write
19F99E1E000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
4755000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
29A0000
heap
page read and write
7599000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
8AB333D000
stack
page read and write
2A12000
heap
page read and write
4750000
trusted library allocation
page read and write
4630AFE000
stack
page read and write
4750000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
75DE000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
7FF7BFDD0000
trusted library allocation
page execute and read and write
47A0000
trusted library allocation
page read and write
17AE9340000
unkown
page readonly
28C6000
heap
page read and write
7FF7BFB90000
trusted library allocation
page read and write
6C40000
heap
page execute and read and write
20BEB648000
heap
page read and write
77DE000
stack
page read and write
47B0000
trusted library allocation
page read and write
256F000
stack
page read and write
4750000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
6AB0000
trusted library allocation
page execute and read and write
19FB2183000
heap
page read and write
171DA38F000
heap
page read and write
75B0000
trusted library allocation
page read and write
7FF7BFDB4000
trusted library allocation
page read and write
19FB2143000
heap
page read and write
76C0000
remote allocation
page read and write
7FF7BFE80000
trusted library allocation
page read and write
3880000
trusted library allocation
page read and write
67A0000
trusted library allocation
page read and write
19F995E2000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page read and write
7FF7BFD59000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
19F9990D000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
F3866FE000
stack
page read and write
25D7000
stack
page read and write
47A0000
trusted library allocation
page read and write
46E4000
trusted library allocation
page read and write
4770000
heap
page execute and read and write
47A0000
trusted library allocation
page read and write
2B40000
heap
page read and write
7620000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
44D0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
19FB1510000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
7B9C000
heap
page read and write
7590000
trusted library allocation
page read and write
7FF7BFD20000
trusted library allocation
page read and write
7570000
trusted library allocation
page read and write
60840FE000
stack
page read and write
75B0000
trusted library allocation
page read and write
75C0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
7FF7BFDA9000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
8AB2F3D000
stack
page read and write
47A0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
171C138A000
heap
page read and write
291D000
stack
page read and write
75F0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
6B20000
trusted library allocation
page execute and read and write
47A0000
trusted library allocation
page read and write
44E0000
trusted library allocation
page read and write
2917AA40000
heap
page read and write
698E000
stack
page read and write
503E000
stack
page read and write
7FF7BFF20000
trusted library allocation
page read and write
7FF7BFE20000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
2B90000
trusted library allocation
page read and write
76C0000
remote allocation
page read and write
7FF7BFC90000
trusted library allocation
page execute and read and write
75D0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
19FB1EB0000
heap
page execute and read and write
47A0000
trusted library allocation
page read and write
F3867FE000
stack
page read and write
47A0000
trusted library allocation
page read and write
475C000
trusted library allocation
page read and write
2736000
heap
page read and write
47A0000
trusted library allocation
page read and write
2AE0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
19F99DF4000
trusted library allocation
page read and write
171C1AE0000
heap
page execute and read and write
47A0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
19F99797000
trusted library allocation
page read and write
17AE9BAF000
heap
page read and write
7590000
trusted library allocation
page read and write
7620000
trusted library allocation
page read and write
17AE9BEB000
heap
page read and write
75E0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
685E000
stack
page read and write
4750000
trusted library allocation
page read and write
3855000
trusted library allocation
page execute and read and write
47A0000
trusted library allocation
page read and write
42EF000
stack
page read and write
47A0000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
17AE9420000
heap
page execute and read and write
74E3000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
3890000
heap
page readonly
7FF7BFC56000
trusted library allocation
page execute and read and write
75E0000
trusted library allocation
page read and write
70B0000
heap
page read and write
4750000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
7FF7BFD2C000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
17AE9BC4000
heap
page read and write
4790000
trusted library allocation
page read and write
7FF7BFF60000
trusted library allocation
page read and write
7FF7BFD30000
trusted library allocation
page read and write
70AB000
heap
page read and write
47A0000
trusted library allocation
page read and write
19F98F30000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
462F7FE000
stack
page read and write
75D0000
trusted library allocation
page read and write
7FF7BFD36000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
7FF7BFC90000
trusted library allocation
page execute and read and write
75D0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
460E000
stack
page read and write
2727000
heap
page read and write
7F130000
trusted library allocation
page execute and read and write
8AB2E3E000
stack
page read and write
43A3000
trusted library allocation
page read and write
17AE7570000
unkown
page readonly
7FF7BFD90000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
17B9ACB5000
heap
page read and write
19F99996000
trusted library allocation
page read and write
2A85000
heap
page read and write
19F99D1A000
trusted library allocation
page read and write
694E000
stack
page read and write
47C0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
20BEB684000
heap
page read and write
4759000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
21AE000
unkown
page read and write
6B40000
trusted library allocation
page read and write
767E000
stack
page read and write
47A0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
7FF7BFB74000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
19F997C8000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
19F98F60000
heap
page read and write
17AE7727000
heap
page read and write
4780000
trusted library allocation
page read and write
273A000
heap
page read and write
7590000
trusted library allocation
page read and write
29161BD0000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
4530000
trusted library allocation
page read and write
75E0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
17AE7630000
heap
page read and write
17AE9DF4000
heap
page read and write
47A0000
trusted library allocation
page read and write
2A78000
heap
page read and write
4780000
trusted library allocation
page read and write
7FF7BFB8D000
trusted library allocation
page execute and read and write
8AB413D000
stack
page read and write
47A0000
trusted library allocation
page read and write
47A4000
trusted library allocation
page read and write
56564FE000
stack
page read and write
47A0000
trusted library allocation
page read and write
20BD2578000
heap
page read and write
75B0000
trusted library allocation
page read and write
462FFFB000
stack
page read and write
75D0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
19F995EA000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
17AE9BD2000
heap
page read and write
7590000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
7FF7BFDA0000
trusted library allocation
page read and write
19FB2520000
heap
page read and write
19F98C10000
heap
page read and write
17AE7620000
heap
page read and write
171C1C45000
trusted library allocation
page read and write
48C6000
trusted library allocation
page read and write
50CF000
trusted library allocation
page read and write
50DD000
trusted library allocation
page read and write
7B79000
heap
page read and write
6799000
trusted library allocation
page execute and read and write
47B0000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
47C0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
75B0000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
2B95000
heap
page read and write
7FF7BFDE0000
trusted library allocation
page read and write
4670000
heap
page read and write
75B0000
trusted library allocation
page read and write
4780000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
20BD263A000
heap
page read and write
47A0000
trusted library allocation
page read and write
2B7000
stack
page read and write
75E0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
19F995B2000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
47B0000
trusted library allocation
page read and write
7FF7BFE60000
trusted library allocation
page read and write
4690000
trusted library allocation
page read and write
67C0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
7070000
heap
page read and write
4730000
trusted library allocation
page read and write
4880000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
7FF7BFB94000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
7440000
trusted library allocation
page execute and read and write
4780000
trusted library allocation
page read and write
19F99821000
trusted library allocation
page read and write
7FF7BFB73000
trusted library allocation
page execute and read and write
4780000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
7FF7BFD61000
trusted library allocation
page read and write
3860000
heap
page read and write
262F000
stack
page read and write
291619E6000
heap
page read and write
75B0000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
48C2000
trusted library allocation
page read and write
4653000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
7FF7BFD2D000
trusted library allocation
page read and write
2830000
heap
page read and write
75B0000
trusted library allocation
page read and write
462FBFF000
stack
page read and write
4780000
trusted library allocation
page read and write
4650000
trusted library allocation
page read and write
7FF7BFD15000
trusted library allocation
page read and write
75D0000
trusted library allocation
page read and write
4750000
trusted library allocation
page read and write
171C1340000
heap
page read and write
2916214F000
trusted library allocation
page read and write
8AB3075000
stack
page read and write
3390000
heap
page read and write
707F000
heap
page read and write
46C9000
trusted library allocation
page execute and read and write
28A0000
heap
page read and write
17AE7945000
heap
page read and write
4750000
trusted library allocation
page read and write
47A4000
trusted library allocation
page read and write
19F996DC000
trusted library allocation
page read and write
17AE9220000
heap
page read and write
3614000
heap
page read and write
44F5000
heap
page read and write
2A4A000
heap
page read and write
7FF7BFC90000
trusted library allocation
page execute and read and write
47B0000
trusted library allocation
page read and write
47A0000
trusted library allocation
page read and write
There are 2057 hidden memdumps, click here to show them.