IOC Report
Digital.msi

loading gif

Files

File Path
Type
Category
Malicious
Digital.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
initial sample
malicious
C:\Config.Msi\3ac318.rbs
data
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI1EC.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
modified
malicious
C:\Windows\Installer\MSI1EC.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIC52A.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSIC52A.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIC932.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSIC932.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIE1CC.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSIE1CC.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIE5D4.tmp
data
dropped
malicious
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\System32\InstallUtil.InstallLog
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Windows\Temp\~DF104FF017AE6A1734.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF355F8EAD7962411B.TMP
data
dropped
malicious
C:\Windows\Temp\~DF46B34C8187FE8435.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF9363D06770D8B98C.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DFC8300526DF6F0731.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DFD18BD80E6999656A.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallState
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.ini
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AteraAgent.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
CSV text
dropped
C:\Windows\Installer\3ac317.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\3ac319.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\MSI1EC.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI1EC.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI1EC.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI1EC.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIC52A.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSIC52A.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIC52A.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIC52A.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIC932.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSIC932.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIC932.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIC932.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIE1CC.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSIE1CC.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIE1CC.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIE1CC.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIE5E5.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIE77C.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIE8F4.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\SourceHash{E732A0D7-A2F2-4657-AC41-B19742648E45}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1A374813EDB1A6631387E414D3E73232
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
Certificate, Version=3
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
Certificate, Version=3
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1A374813EDB1A6631387E414D3E73232
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
data
modified
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log
CSV text
dropped
C:\Windows\Temp\~DF2F5CF61F78B7C72C.TMP
data
dropped
C:\Windows\Temp\~DF8B31338E51F5C954.TMP
data
dropped
C:\Windows\Temp\~DFA7A5AB13A50B57AB.TMP
data
dropped
C:\Windows\Temp\~DFA7BDA1A0996A04C0.TMP
data
dropped
C:\Windows\Temp\~DFEB1960233CE81796.TMP
data
dropped
C:\Windows\Temp\~DFF9D2FD9DAB3A6013.TMP
data
dropped
\Device\ConDrv
JSON data
dropped
There are 72 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k UnistackSvcGroup
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSIC52A.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_3851687 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSIC932.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_3852625 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSIE1CC.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_3858921 11 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="Salim.Jami@korektel.com" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q300000KANvwIAH" /AgentId="1db40f91-941c-4bcb-961d-1fe2982e82b6"
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI1EC.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_3867125 33 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 1db40f91-941c-4bcb-961d-1fe2982e82b6 "ef2508c1-c717-4567-98db-ad739433a027" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000KANvwIAH
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 1db40f91-941c-4bcb-961d-1fe2982e82b6 "4b724461-d5de-45b3-918d-01f1dd7fb803" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000KANvwIAH
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 1db40f91-941c-4bcb-961d-1fe2982e82b6 "bba6296f-630c-4728-badb-dcac66c37446" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q300000KANvwIAH
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\SgrmBroker.exe
C:\Windows\system32\SgrmBroker.exe
C:\Windows\System32\sppsvc.exe
C:\Windows\system32\sppsvc.exe
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\Digital.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding BDCEB15B695F7B18E5D384CA0657056F
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 698B2CE5FB46AC99A05489DBEDC6273F E Global\MSI0000
C:\Windows\SysWOW64\net.exe
"NET" STOP AteraAgent
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 STOP AteraAgent
C:\Windows\SysWOW64\taskkill.exe
"TaskKill.exe" /f /im AteraAgent.exe
C:\Windows\System32\sc.exe
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
There are 21 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://schemas.datacontract.org
unknown
https://dev.ditu.live.com/REST/v1/Routes/
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageMarketplace/1.6/AgentPackageMarketplace.zip
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=04073794-9b1a-456b-85fe-6eca65797754
unknown
http://crl3.x
unknown
https://agent-api.atera.com/Production/Agent/track-event
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=9912033a-6573-4ca2-b350-37c2bc6e22e9
unknown
http://dl.google.com/googletalk/googletalk-setup.exe
unknown
https://agent-api.PR
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/1db40f91-941c-4bcb-961d-1fe2982e82b6/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=948125fe-e3cf-42ab-ba34-976a3adf5c80&tr=31&tt=17324434434497982&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=b56d0227-452e-4f76-a77a-378f095d9d38
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=c825a3a8-4a36-49ab-b7b0-21c3250f6f58&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/1db40f91-941c-4bcb-961d-1fe2982e82b6/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=307e4b22-ae8f-4dc7-a619-34b637c0b56b&tt=0&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
https://ps.atera.com/agentpackageswin/AgentPackageAgentI
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=b56d0227-452e-4f76-a77a-378f095d9d38&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/1db40f91-941c-4bcb-961d-1fe2982e82b6/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=8bd2666e-deba-4537-9847-826117c775e9&tr=31&tt=17324434870174992&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://agent-api.atera.com/Production/Agent/
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=2babaf61-1d7c-4750-9d20-d0f3040d8dce
unknown
http://schemas.datacontract.org/2004/07/System.ServiceProcess
unknown
https://agent-api.atera.com/Production/Agent/GetCommandsFallback)
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/1db40f91-941c-4bcb-961d-1fe2982e82b6/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=2f5b9f56-7551-421b-9316-301f6079e99e&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/1db40f91-941c-4bcb-961d-1fe2982e82b6/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=0b567b7d-02ab-4d8f-b457-87226ecdada3&tt=0&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
http://wixtoolset.org
unknown
https://agent-api.atera.com/Production
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=1549cfbe-4797-4e9b-87ba-b39ddfdb0c6e
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=2babaf61-1d7c-4750-9d20-d0f3040d8dce&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/1db40f91-941c-4bcb-961d-1fe2982e82b6/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=d2f98d58-ae77-41cb-bf75-a12c39413b70&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=cead9e07-0918-4110-bf73-0cde7886e764&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
https://agent-api.atera.com/Production/Agent/GetCommandsFallback0
unknown
https://ps.atera.com/agentpackageswin/AgentPackageRuntimeInstaller/13.0/AgentPackageRuntimeInstaller
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=f0169ba0-1470-42de-a8c0-d3acdded414b&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
http://acontrol.atera.com/
unknown
https://ps.atera.com/agentpackagesmac/Agent
unknown
https://agent-api.atera.com/Production/Agent/AgentStarting)
unknown
https://ps.pndsn.com
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/1db40f91-941c-4bcb-961d-1fe2982e82b6/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=d7610938-0dca-439e-ac79-774f3c321e97&tr=31&tt=17324433839841529&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
https://ps.atera.com/agentpackagesnet45/AgentPackageADRemote/6.0/AgentPackageADRemote.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=9debe3d6-bd60-48d8-8f32-cac259735cf3
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=1549cfbe-4797-4e9b-87ba-b39ddfdb0c6e&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://agent-api.aterDj
unknown
http://www.bingmapsportal.com
unknown
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageNetworkDiscovery/23.9/AgentPackageNetworkDiscove
unknown
http://agent-api.atera.com
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageSystemTools/27.8/AgentPackageSystemTools.zip
unknown
https://agent-api.atera.com/Production/Agent/GetRecurrin
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdv?pv=1&r=
unknown
http://schemas.datacontract.org/2004/07/
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/1db40f91-941c-4bcb-961d-1fe2982e82b6/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=0f2fcab0-36f7-497d-80c2-ed154ce143d7&tr=31&tt=17324434434497982&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
https://github.com/icsharpcode/SharpZipLib
unknown
https://ps.atera.com/agentpackageswin/AgentPackageNetworkDiscovery/15.0/AgentPackageNetworkDiscovery
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageAgentI
unknown
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
unknown
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/1db40f91-941c-4bcb-961d-1fe2982e82b6/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=81ad481d-fe32-40f1-a575-ff3213b02a54&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
unknown
https://agent-api.atera.com/Production/Agent/Acknowl
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://ecn.dev.virtualearth.net/REST/V1/MapControlConfiguration/native/
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageTaskScheduler/17.2/AgentPackageTaskScheduler.zip
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageTicketing/30.1/AgentPackageTicketing.zip
unknown
https://agent-api.atera.com
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/1db40f91-941c-4bcb-961d-1fe2982e82b6/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=21b3579c-1a7e-42af-89a3-d62561119c3f&tr=31&tt=17324433862201175&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
unknown
https://ps.pndsn.com/v22
unknown
https://agent-api.atera.com/Production/Agent/AgentStarting
unknown
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageA3RuZ
unknown
http://www.w3.oh
unknown
https://agent-api.atera.com/Production/Agent/GetCommands
unknown
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageA3
unknown
https://dynamic.t
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/1db40f91-941c-4bcb-961d-1fe2982e82b6/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=262560da-847d-4155-9198-8e4ffcd1509c&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
https://agent-api.atera.com/
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/1db40f91-941c-4bcb-961d-1fe2982e82b6/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=a9364c7f-76bc-44d5-9e4a-9e20b519e5f6&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/1db40f91-941c-4bcb-961d-1fe2982e82b6/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=de127575-77e7-4719-a128-017012d14d11&tt=0&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
https://agent-api.atera.com/Production/Agent/GetRecurringPackages
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.Availability/13.0/Agent.Package.Availability.zip
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=6c5142d1-8eb7-4c24-9754-9b429320ed0d
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=86b5c6de-7733-4db5-b81f-7d902ad87fa7&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/1db40f91-941c-4bcb-961d-1fe2982e82b6/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=c1164d1e-bc30-4eb8-888a-782a294ae896&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/1db40f91-941c-4bcb-961d-1fe2982e82b6/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=95a8cc07-d7ac-4863-aa59-e133b0947fc6&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=cead9e07-0918-4110-bf73-0cde7886e764
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=86b5c6de-7733-4db5-b81f-7d902ad87fa7
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=6c5142d1-8eb7-4c24-9754-9b429320ed0d&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageRuntimeInstaller/1.5/AgentPackageRuntimeInstaller.
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.Watchdog/13.0/Agent.Package.Watchdog.zip
unknown
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
https://ps.atera.com/agentpackagesnet45/Agent.Package.Availability/0.16/Agent.Package.Availability.z
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/ch
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/1db40f91-941c-4bcb-961d-1fe2982e82b6/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=c29a5fd2-a31e-449c-a116-6640bd437f2a&uuid=1db40f91-941c-4bcb-961d-1fe2982e82b6
13.232.67.198
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ps.pndsn.com
13.232.67.198
bg.microsoft.map.fastly.net
199.232.214.172
d25btwd9wax8gu.cloudfront.net
108.158.75.4
fp2e7a.wpc.phicdn.net
192.229.221.95
windowsupdatebg.s.llnwi.net
178.79.238.0
ps.atera.com
unknown
agent-api.atera.com
unknown

IPs

IP
Domain
Country
Malicious
108.158.75.4
d25btwd9wax8gu.cloudfront.net
United States
13.232.67.198
ps.pndsn.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
STATE
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\WMI\Security
c688cf83-9945-5ff6-0e1e-1ff1f8a2ec9a
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\SoftwareProtectionPlatform
ServiceSessionId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\3ac318.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\3ac318.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\ATERA Networks\AteraAgent\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\ATERA Networks\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Features
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
AutoBackupLogFiles
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AteraAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
AccountId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
IntegratorLogin
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
CompanyId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
AgentId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
ServerName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AlphaAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
FileDirectory
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_USERS.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
FileDirectory
There are 139 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1E819F5E000
trusted library allocation
page read and write
malicious
206FF2D0000
heap
page read and write
malicious
21780073000
trusted library allocation
page read and write
malicious
217EFE95000
heap
page read and write
malicious
206FF290000
heap
page read and write
malicious
1E819804000
trusted library allocation
page read and write
malicious
1E81976F000
trusted library allocation
page read and write
malicious
1E819F76000
trusted library allocation
page read and write
malicious
2078017C000
trusted library allocation
page read and write
malicious
207E71B2000
heap
page read and write
malicious
29FBE59D000
heap
page read and write
malicious
1E819027000
heap
page read and write
malicious
1E831ED0000
heap
page read and write
malicious
217EFE18000
heap
page read and write
malicious
29FBE63B000
heap
page read and write
malicious
1E819FBB000
trusted library allocation
page read and write
malicious
206FF31C000
heap
page read and write
malicious
217800BF000
trusted library allocation
page read and write
malicious
207E7092000
unkown
page readonly
malicious
1E832370000
heap
page read and write
malicious
1E819701000
trusted library allocation
page read and write
malicious
207E7170000
heap
page read and write
malicious
1E8198DA000
trusted library allocation
page read and write
malicious
29FBE5A7000
heap
page read and write
malicious
217EFE59000
heap
page read and write
malicious
217F0000000
heap
page read and write
malicious
217EFE10000
heap
page read and write
malicious
1AB33B5000
stack
page read and write
malicious
7FFE7D194000
trusted library allocation
page read and write
malicious
20680681000
trusted library allocation
page read and write
malicious
1E818F20000
heap
page read and write
malicious
207E74D0000
heap
page read and write
malicious
1E818ED0000
heap
page read and write
malicious
1E819F7C000
trusted library allocation
page read and write
malicious
1E8199BE000
trusted library allocation
page read and write
malicious
206FF2E1000
heap
page read and write
malicious
29FBEEAF000
trusted library allocation
page read and write
malicious
207800B4000
trusted library allocation
page read and write
malicious
20780132000
trusted library allocation
page read and write
malicious
1E818FA0000
heap
page read and write
malicious
207E7192000
heap
page read and write
malicious
29FBE5E4000
heap
page read and write
malicious
20698E50000
heap
page read and write
malicious
1E832810000
heap
page read and write
malicious
1E8323A9000
heap
page read and write
malicious
5031000
trusted library allocation
page read and write
malicious
20780089000
trusted library allocation
page read and write
malicious
206FF510000
heap
page read and write
malicious
4A61000
trusted library allocation
page read and write
malicious
48B4000
heap
page read and write
malicious
1E818FDC000
heap
page read and write
malicious
4B07000
trusted library allocation
page read and write
malicious
1E819DFC000
trusted library allocation
page read and write
malicious
207E9560000
heap
page read and write
malicious
29FBEE73000
trusted library allocation
page read and write
malicious
207E98D0000
heap
page read and write
malicious
29FBE7B0000
heap
page read and write
malicious
1E819F53000
trusted library allocation
page read and write
malicious
217EFE2B000
heap
page read and write
malicious
4895000
heap
page read and write
malicious
29FBE569000
heap
page read and write
malicious
1E8323E3000
heap
page read and write
malicious
1E819962000
trusted library allocation
page read and write
malicious
206FF412000
unkown
page readonly
malicious
50D4000
trusted library allocation
page read and write
malicious
1E819FB3000
trusted library allocation
page read and write
malicious
4E3E000
heap
page read and write
malicious
217EFE4D000
heap
page read and write
malicious
1E819E39000
trusted library allocation
page read and write
malicious
1E81905D000
heap
page read and write
malicious
29FBEE37000
trusted library allocation
page read and write
malicious
1E831FC2000
heap
page read and write
malicious
207800B2000
trusted library allocation
page read and write
malicious
207E715C000
heap
page read and write
malicious
20680703000
trusted library allocation
page read and write
malicious
1E819F3A000
trusted library allocation
page read and write
malicious
21780001000
trusted library allocation
page read and write
malicious
29FBEDF1000
trusted library allocation
page read and write
malicious
206806F3000
trusted library allocation
page read and write
malicious
207E992C000
heap
page read and write
malicious
20780001000
trusted library allocation
page read and write
malicious
21780047000
trusted library allocation
page read and write
malicious
29FBE560000
heap
page read and write
malicious
4814000
heap
page read and write
malicious
206FF102000
unkown
page readonly
malicious
29FBEE63000
trusted library allocation
page read and write
malicious
207E71E0000
heap
page read and write
malicious
1E818FFC000
heap
page read and write
malicious
2078008C000
trusted library allocation
page read and write
malicious
1E819F50000
trusted library allocation
page read and write
malicious
21780083000
trusted library allocation
page read and write
malicious
207E7150000
heap
page read and write
malicious
207800BA000
trusted library allocation
page read and write
malicious
7420000
trusted library allocation
page read and write
29FBEF33000
trusted library allocation
page read and write
490F000
stack
page read and write
7430000
trusted library allocation
page read and write
4AF3000
trusted library allocation
page read and write
7460000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
B6B1FE000
stack
page read and write
7420000
trusted library allocation
page read and write
BECCBFE000
stack
page read and write
73E0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
1E3B9450000
heap
page read and write
6EA0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
206807D1000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
1AB52F4000
stack
page read and write
6E90000
trusted library allocation
page read and write
1AB3DFE000
stack
page read and write
206FF2F1000
heap
page read and write
217F0010000
trusted library allocation
page read and write
4B04000
trusted library allocation
page read and write
1AB5EFE000
stack
page read and write
7400000
trusted library allocation
page read and write
1E3B9458000
heap
page read and write
1E819C07000
trusted library allocation
page read and write
4E20000
heap
page read and write
6E90000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
5112000
trusted library allocation
page read and write
DC622FE000
unkown
page readonly
6E50000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
C4A000
heap
page read and write
7420000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
DC625FE000
stack
page read and write
C40000
heap
page read and write
B6B3FD000
stack
page read and write
1E3B946E000
heap
page read and write
73E0000
trusted library allocation
page read and write
7FFE7D100000
trusted library allocation
page execute and read and write
7FFE7D004000
trusted library allocation
page read and write
49E0000
heap
page read and write
6E50000
trusted library allocation
page read and write
1E819F72000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
7FFE7D1C0000
trusted library allocation
page execute and read and write
8D7000
stack
page read and write
7FFE7CFE3000
trusted library allocation
page execute and read and write
7FFE7CFE0000
trusted library allocation
page read and write
1AB39FD000
stack
page read and write
1E819B9B000
trusted library allocation
page read and write
4B9E000
stack
page read and write
6E90000
trusted library allocation
page read and write
1E819D34000
trusted library allocation
page read and write
145B1C7F000
heap
page read and write
73E0000
trusted library allocation
page read and write
9D0000
heap
page read and write
6E70000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
29FBE586000
heap
page read and write
7420000
trusted library allocation
page read and write
28969E00000
heap
page read and write
7FFE7D000000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
1E83220E000
unkown
page readonly
6E50000
trusted library allocation
page read and write
6EA1000
trusted library allocation
page read and write
1E819EA1000
trusted library allocation
page read and write
BECC0FF000
stack
page read and write
79CE000
heap
page read and write
1E83243D000
heap
page read and write
46FD000
trusted library allocation
page execute and read and write
7400000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
207E9657000
heap
page read and write
BECC6FE000
stack
page read and write
1E831700000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
FE0000
heap
page read and write
6E70000
trusted library allocation
page read and write
1E3B945B000
heap
page read and write
7FFE7D196000
trusted library allocation
page read and write
1E8323DC000
heap
page read and write
7420000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
49C3000
trusted library allocation
page read and write
1E8197A7000
trusted library allocation
page read and write
1AB54FD000
stack
page read and write
303D000
stack
page read and write
217EFFE0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
4E6F000
heap
page read and write
6E90000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
4A36000
trusted library allocation
page execute and read and write
6EA0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
C82000
heap
page read and write
EE9A57E000
unkown
page readonly
1D5E5F60000
heap
page read and write
1E819FA5000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
E5D000
stack
page read and write
7DF6AFD000
stack
page read and write
7420000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
6EF0000
heap
page read and write
1E3B948B000
heap
page read and write
7420000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
28969C30000
heap
page read and write
6E90000
trusted library allocation
page read and write
4A3C000
trusted library allocation
page execute and read and write
7423000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
342B000
trusted library allocation
page execute and read and write
6E70000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
7FFE7D0B0000
trusted library allocation
page execute and read and write
7FFE7D3B0000
trusted library allocation
page read and write
145B36A0000
remote allocation
page read and write
7400000
trusted library allocation
page read and write
4B46000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
4AA8000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
79DE000
heap
page read and write
6E70000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
145B1C2B000
heap
page read and write
30F9000
heap
page read and write
7160000
heap
page execute and read and write
7420000
trusted library allocation
page read and write
1D5E5D80000
heap
page read and write
1E829713000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
CEA000
heap
page read and write
6E50000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
1E3B9330000
heap
page read and write
4A10000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E10000
trusted library allocation
page read and write
1E819F74000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
6E9C000
trusted library allocation
page read and write
1E818F90000
trusted library allocation
page read and write
DC61EFE000
unkown
page readonly
1E3B943A000
heap
page read and write
EE99A7E000
stack
page readonly
7FFE7D076000
trusted library allocation
page read and write
207E98E0000
heap
page read and write
4790000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
207E7196000
heap
page read and write
1E3B946B000
heap
page read and write
6E90000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7FFE7D193000
trusted library allocation
page read and write
34B6000
heap
page read and write
7400000
trusted library allocation
page read and write
49B0000
heap
page execute and read and write
1AB4EED000
stack
page read and write
1AB51FF000
stack
page read and write
6E70000
trusted library allocation
page read and write
4FF0000
heap
page execute and read and write
49E0000
heap
page execute and read and write
3120000
heap
page read and write
6E70000
trusted library allocation
page read and write
7FFE7D1D0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
1E8197BD000
trusted library allocation
page read and write
29FBEE2D000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7EEC8000
trusted library allocation
page execute and read and write
1E3B9452000
heap
page read and write
207E70B4000
unkown
page readonly
7FFE7D160000
trusted library allocation
page read and write
1AB3728000
stack
page read and write
6EF0000
heap
page execute and read and write
73E0000
trusted library allocation
page read and write
3505000
heap
page read and write
318E000
stack
page read and write
C20000
heap
page read and write
73E0000
trusted library allocation
page read and write
217EFE6D000
heap
page read and write
7FFE7CFC4000
trusted library allocation
page read and write
EDE000
stack
page read and write
7FFE7D190000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
2079000F000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
CC0000
heap
page read and write
4750000
trusted library allocation
page read and write
1E3B9C02000
trusted library allocation
page read and write
C70000
heap
page read and write
7430000
trusted library allocation
page read and write
49F1000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
7FFE7D2BC000
trusted library allocation
page read and write
2178003D000
trusted library allocation
page read and write
6DDE000
stack
page read and write
BECC9FE000
stack
page read and write
5078000
trusted library allocation
page read and write
4AD0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
CEE000
heap
page read and write
6E90000
trusted library allocation
page read and write
72CE000
stack
page read and write
6E90000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
7FFE7D096000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
1E832411000
heap
page read and write
6E70000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
79DA000
heap
page read and write
6E90000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
7FFE7CFF4000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7F568000
trusted library allocation
page execute and read and write
6E90000
trusted library allocation
page read and write
3400000
heap
page read and write
1D5E5E68000
heap
page read and write
7FFE7D0B6000
trusted library allocation
page execute and read and write
7420000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
7FFE7D1D0000
trusted library allocation
page read and write
31F0000
heap
page read and write
207E73C0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
1E819E42000
trusted library allocation
page read and write
3527000
heap
page read and write
73E0000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
206805C0000
heap
page execute and read and write
1E819B97000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
1E3B9486000
heap
page read and write
1E3B948E000
heap
page read and write
6E90000
trusted library allocation
page read and write
24206A8C000
heap
page read and write
7420000
trusted library allocation
page read and write
30E9000
heap
page read and write
6E70000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
207E719A000
heap
page read and write
7DF70FE000
stack
page read and write
46F5000
trusted library allocation
page execute and read and write
24206920000
heap
page read and write
6E70000
trusted library allocation
page read and write
91650FB000
stack
page read and write
1E8197CF000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
7FFE7D1A0000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
5104000
trusted library allocation
page read and write
700E000
stack
page read and write
7DF6FFE000
stack
page read and write
6E90000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7FFE7D0A0000
trusted library allocation
page execute and read and write
1E3B9470000
heap
page read and write
7420000
trusted library allocation
page read and write
464E000
stack
page read and write
702E000
stack
page read and write
6E50000
trusted library allocation
page read and write
91647FE000
stack
page read and write
217F05F0000
heap
page execute and read and write
7DF69FE000
stack
page read and write
6E70000
trusted library allocation
page read and write
3422000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
1E3B943A000
heap
page read and write
7430000
trusted library allocation
page read and write
207E7380000
heap
page read and write
46A0000
trusted library allocation
page read and write
74FE000
stack
page read and write
6E90000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
7421000
trusted library allocation
page read and write
1E832537000
heap
page read and write
6EB0000
trusted library allocation
page read and write
1E831A84000
heap
page read and write
6E90000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
ABB3EFD000
stack
page read and write
7420000
trusted library allocation
page read and write
207E7320000
heap
page read and write
7400000
trusted library allocation
page read and write
1E8197DB000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
498E000
stack
page read and write
73E0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
1AB47FE000
stack
page read and write
73E0000
trusted library allocation
page read and write
7424000
trusted library allocation
page read and write
1AB48E9000
stack
page read and write
6EB0000
trusted library allocation
page read and write
CDC000
heap
page read and write
6E70000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
2F60000
heap
page read and write
7FFE7D00D000
trusted library allocation
page execute and read and write
2DFC000
stack
page read and write
74BE000
stack
page read and write
6ED0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
496E000
stack
page read and write
6E90000
trusted library allocation
page read and write
7FFE7CFFD000
trusted library allocation
page execute and read and write
30FB000
heap
page read and write
73E0000
trusted library allocation
page read and write
7FFE7D19D000
trusted library allocation
page read and write
1E83244D000
heap
page read and write
1D5E6125000
heap
page read and write
1E3B9360000
heap
page read and write
6E50000
trusted library allocation
page read and write
3420000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
206FF455000
heap
page read and write
1E8198BE000
trusted library allocation
page read and write
9DE000
stack
page read and write
7FFE7D1A6000
trusted library allocation
page read and write
207E7340000
heap
page read and write
7400000
trusted library allocation
page read and write
5A61000
trusted library allocation
page read and write
1E8199AF000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
4990000
trusted library allocation
page execute and read and write
6E90000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
4A33000
trusted library allocation
page read and write
CA9000
heap
page read and write
6E90000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
1E3B9442000
heap
page read and write
EE99FFD000
stack
page read and write
7FFE7D1E0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
5091000
trusted library allocation
page read and write
1E832C10000
heap
page read and write
4B25000
trusted library allocation
page read and write
6EF0000
remote allocation
page read and write
7420000
trusted library allocation
page read and write
91654FC000
stack
page read and write
206FF100000
unkown
page readonly
4760000
trusted library allocation
page read and write
217F0145000
heap
page read and write
73E0000
trusted library allocation
page read and write
7FFE7D080000
trusted library allocation
page execute and read and write
CB8000
heap
page read and write
7FFE7D00D000
trusted library allocation
page execute and read and write
7430000
trusted library allocation
page read and write
29FBE4D0000
heap
page read and write
33FD000
trusted library allocation
page execute and read and write
6E90000
trusted library allocation
page read and write
20780178000
trusted library allocation
page read and write
EE9A07E000
unkown
page readonly
7420000
trusted library allocation
page read and write
145B1C00000
heap
page read and write
1E3B9475000
heap
page read and write
7420000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
9C0000
heap
page read and write
7500000
heap
page read and write
1E819E46000
trusted library allocation
page read and write
EE9A77D000
stack
page read and write
207E717C000
heap
page read and write
3190000
heap
page read and write
7400000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
207E98F0000
heap
page read and write
6EA0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
2F90000
heap
page read and write
7420000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
4B40000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
7DF6EFE000
stack
page read and write
3485000
heap
page read and write
217F00F0000
heap
page read and write
6EB0000
trusted library allocation
page read and write
206FF5CC000
unkown
page readonly
20680490000
trusted library allocation
page read and write
7470000
trusted library allocation
page read and write
1AB53E9000
stack
page read and write
6E70000
trusted library allocation
page read and write
EE9A87E000
unkown
page readonly
6E50000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
29FBEF45000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
7FFE7D003000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7FFE7D180000
trusted library allocation
page read and write
29FBE500000
heap
page read and write
ABB36FF000
stack
page read and write
7400000
trusted library allocation
page read and write
1E8195F0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
3528000
heap
page read and write
2EA7000
stack
page read and write
1E818F10000
heap
page read and write
1E81989A000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
1E832860000
heap
page read and write
1E83252B000
heap
page read and write
29FBE8E5000
heap
page read and write
7430000
trusted library allocation
page read and write
500C000
trusted library allocation
page execute and read and write
34A8000
heap
page read and write
6E94000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
29FBEE2F000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
59F1000
trusted library allocation
page read and write
49C0000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
1E819E94000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
24206A4B000
heap
page read and write
6EB4000
trusted library allocation
page read and write
1E818F25000
heap
page read and write
7420000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
494C000
stack
page read and write
6DC0000
trusted library allocation
page execute and read and write
6E90000
trusted library allocation
page read and write
28969E37000
heap
page read and write
217F0140000
heap
page read and write
6E60000
trusted library allocation
page read and write
4A30000
trusted library allocation
page read and write
7FFE7D220000
trusted library allocation
page read and write
1E819B9F000
trusted library allocation
page read and write
965000
heap
page read and write
33AF000
stack
page read and write
6E90000
trusted library allocation
page read and write
3541000
heap
page read and write
73E0000
trusted library allocation
page read and write
7FFE7D250000
trusted library allocation
page execute and read and write
6EA0000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
4FCE000
stack
page read and write
6E90000
trusted library allocation
page read and write
BECC5FF000
stack
page read and write
7420000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
4A20000
heap
page read and write
73E0000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
C9D000
heap
page read and write
34B3000
heap
page read and write
C7C000
heap
page read and write
6E50000
trusted library allocation
page read and write
744E000
heap
page read and write
6E5C000
trusted library allocation
page read and write
7FFE7CFFD000
trusted library allocation
page execute and read and write
F40000
heap
page read and write
21780151000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
3130000
heap
page read and write
70CF000
stack
page read and write
46F7000
trusted library allocation
page execute and read and write
1E819F2A000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
1E8328B4000
heap
page read and write
7400000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
CDA000
heap
page read and write
7FFE7D014000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
29FCEDFD000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
1E819E4A000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
217EFE36000
heap
page read and write
6E70000
trusted library allocation
page read and write
F90000
heap
page read and write
7420000
trusted library allocation
page read and write
1E8324D8000
heap
page read and write
C5A000
heap
page read and write
7420000
trusted library allocation
page read and write
7FFE7D200000
trusted library allocation
page read and write
507F000
trusted library allocation
page read and write
24206B13000
heap
page read and write
6E70000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
1E8198CA000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
30CB000
heap
page read and write
1E819D36000
trusted library allocation
page read and write
30F6000
heap
page read and write
7FFE7D230000
trusted library allocation
page execute and read and write
714E000
stack
page read and write
4AFE000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
1E8197A2000
trusted library allocation
page read and write
49B4000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
29FBE740000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
20698EC8000
heap
page read and write
6E70000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
DC624FE000
unkown
page readonly
7FFE7D2D0000
trusted library allocation
page read and write
1E832451000
heap
page read and write
7420000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
7FAE8000
trusted library allocation
page execute and read and write
1AB3AFE000
stack
page read and write
7420000
trusted library allocation
page read and write
7FFE7D190000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
76DE000
stack
page read and write
1E819E12000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
145B36A0000
remote allocation
page read and write
6E70000
trusted library allocation
page read and write
1E3B9457000
heap
page read and write
48D0000
heap
page readonly
6FEE000
stack
page read and write
6E90000
trusted library allocation
page read and write
850117E000
unkown
page readonly
1E832552000
heap
page read and write
6E70000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
145B1BA0000
heap
page read and write
6E50000
trusted library allocation
page read and write
7FFE7CFC0000
trusted library allocation
page read and write
6E55000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
7FFE7D1D0000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
7FFE7CFF4000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
710E000
stack
page read and write
7400000
trusted library allocation
page read and write
1AB3EE9000
stack
page read and write
32C7000
heap
page read and write
1E819670000
heap
page execute and read and write
6E50000
trusted library allocation
page read and write
7FFE7D260000
trusted library allocation
page execute and read and write
7420000
trusted library allocation
page read and write
1AB45FC000
stack
page read and write
1E819025000
heap
page read and write
4763000
trusted library allocation
page execute and read and write
7FFE7D170000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
1AB46EA000
stack
page read and write
73E0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
7FFE7D220000
trusted library allocation
page execute and read and write
9164EFB000
stack
page read and write
207E7430000
heap
page read and write
7FFE7CFE2000
trusted library allocation
page read and write
24206A64000
heap
page read and write
1E3B942B000
heap
page read and write
6EB0000
trusted library allocation
page read and write
7FFE7D0AC000
trusted library allocation
page execute and read and write
7420000
trusted library allocation
page read and write
4C20000
heap
page read and write
7FFE7D0A0000
trusted library allocation
page execute and read and write
4A50000
heap
page read and write
7440000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
46BD000
trusted library allocation
page execute and read and write
7420000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
4AD9000
trusted library allocation
page execute and read and write
6E90000
trusted library allocation
page read and write
47B0000
heap
page read and write
7420000
trusted library allocation
page read and write
6E80000
trusted library allocation
page read and write
347A000
heap
page read and write
6E90000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
1E3B9448000
heap
page read and write
7400000
trusted library allocation
page read and write
ABB34FF000
stack
page read and write
7FFE7CFE3000
trusted library allocation
page execute and read and write
29FBE5BD000
heap
page read and write
7FFE7D190000
trusted library allocation
page read and write
145B3802000
trusted library allocation
page read and write
24207215000
heap
page read and write
6E50000
trusted library allocation
page read and write
91657FE000
stack
page read and write
7420000
trusted library allocation
page read and write
1E832580000
trusted library allocation
page read and write
4A2E000
stack
page read and write
7420000
trusted library allocation
page read and write
BECC1FE000
stack
page read and write
7400000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
3390000
heap
page read and write
329E000
stack
page read and write
7FFE7D210000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
1E3B94A8000
heap
page read and write
6E70000
trusted library allocation
page read and write
1E819E6A000
trusted library allocation
page read and write
9164AFF000
stack
page read and write
6DE0000
trusted library allocation
page execute and read and write
73E0000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
29FBEDC0000
heap
page execute and read and write
6EA0000
trusted library allocation
page read and write
7FFE7D200000
trusted library allocation
page execute and read and write
1E819D38000
trusted library allocation
page read and write
1E831730000
trusted library allocation
page read and write
1E3B9441000
heap
page read and write
6E54000
trusted library allocation
page read and write
46B0000
heap
page read and write
6EA0000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
EE9A47D000
stack
page read and write
7400000
trusted library allocation
page read and write
2178012F000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
91656FD000
stack
page read and write
73E4000
trusted library allocation
page read and write
29FD7726000
heap
page read and write
512F000
stack
page read and write
30CD000
heap
page read and write
7430000
trusted library allocation
page read and write
29FBE5AB000
heap
page read and write
7420000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
1E8197CB000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
1E3B9400000
heap
page read and write
7400000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
1E829701000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
207E9550000
heap
page execute and read and write
EE9A17E000
unkown
page readonly
7420000
trusted library allocation
page read and write
1E8197EB000
trusted library allocation
page read and write
1E8198BA000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
206FF100000
unkown
page readonly
7FFE7CFF3000
trusted library allocation
page execute and read and write
6E90000
trusted library allocation
page read and write
7FFE7D370000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
29FD7728000
heap
page read and write
1E819F6C000
trusted library allocation
page read and write
1AB40FF000
stack
page read and write
6E90000
trusted library allocation
page read and write
1E818F50000
heap
page read and write
6E50000
trusted library allocation
page read and write
7FFE7D1E0000
trusted library allocation
page read and write
207E9909000
heap
page read and write
30B8000
heap
page read and write
6EB0000
trusted library allocation
page read and write
29FBE632000
heap
page read and write
5000000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
207E7090000
unkown
page readonly
7440000
trusted library allocation
page read and write
B40000
heap
page read and write
7FFE7D1F0000
trusted library allocation
page execute and read and write
7FFE7D01D000
trusted library allocation
page execute and read and write
E1F000
stack
page read and write
7400000
trusted library allocation
page read and write
1E3B9467000
heap
page read and write
7420000
trusted library allocation
page read and write
ABB3CFF000
stack
page read and write
29FBEDE0000
heap
page read and write
B30000
heap
page read and write
7440000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
145B1D13000
heap
page read and write
28969C50000
heap
page read and write
207E717A000
heap
page read and write
217EFDC0000
heap
page read and write
6E90000
trusted library allocation
page read and write
DC626FE000
unkown
page readonly
6E50000
trusted library allocation
page read and write
6E00000
trusted library allocation
page read and write
46D0000
heap
page read and write
1E832660000
heap
page read and write
1E8197E7000
trusted library allocation
page read and write
206807AF000
trusted library allocation
page read and write
1E3B945D000
heap
page read and write
6EA0000
trusted library allocation
page read and write
21780155000
trusted library allocation
page read and write
1E819E44000
trusted library allocation
page read and write
1E819FAB000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7FFE7D183000
trusted library allocation
page read and write
7FFE7CFFB000
trusted library allocation
page execute and read and write
850147E000
unkown
page readonly
7DF68FE000
stack
page read and write
6EA0000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
516E000
stack
page read and write
4BDF000
stack
page read and write
73E0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
2178003F000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
217F0E20000
heap
page read and write
7400000
trusted library allocation
page read and write
1E8197E3000
trusted library allocation
page read and write
91651FE000
stack
page read and write
C99C7FE000
stack
page read and write
1E8324EF000
heap
page read and write
207E96F4000
unkown
page readonly
6E90000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
1E8198C6000
trusted library allocation
page read and write
C7A000
heap
page read and write
206FF12C000
unkown
page readonly
6E90000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
49CD000
trusted library allocation
page execute and read and write
145B1C81000
heap
page read and write
ABB3AFE000
stack
page read and write
6E70000
trusted library allocation
page read and write
ABB37FD000
stack
page read and write
ABB39FF000
stack
page read and write
6E70000
trusted library allocation
page read and write
7FFE7CFE3000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7F240000
trusted library allocation
page execute and read and write
7420000
trusted library allocation
page execute and read and write
1E818FBB000
heap
page read and write
4F0C000
stack
page read and write
6EA0000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
91658FA000
stack
page read and write
6E00000
trusted library allocation
page read and write
1D5E5E60000
heap
page read and write
C55000
heap
page read and write
1E819E84000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
CBA000
heap
page read and write
1E818F15000
heap
page read and write
6EB0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
1E818F30000
heap
page read and write
CF6000
heap
page read and write
6DD0000
trusted library allocation
page read and write
335E000
stack
page read and write
1E8195E0000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
850157E000
stack
page read and write
29FBED10000
heap
page execute and read and write
7FFE7CFE2000
trusted library allocation
page read and write
F8E000
stack
page read and write
7400000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
217EFE55000
heap
page read and write
7400000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
7431000
trusted library allocation
page read and write
21780143000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
1E8324DD000
heap
page read and write
30D0000
heap
page read and write
7420000
trusted library allocation
page read and write
207E9612000
heap
page read and write
7FFE7D240000
trusted library allocation
page execute and read and write
1E829780000
trusted library allocation
page read and write
742C000
trusted library allocation
page read and write
30F7000
heap
page read and write
7FFE7D17A000
trusted library allocation
page read and write
7FFE7D1A0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
79EB000
heap
page read and write
7420000
trusted library allocation
page read and write
468E000
stack
page read and write
49C0000
trusted library allocation
page read and write
7FFE7CFC3000
trusted library allocation
page execute and read and write
7424000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
1E81975C000
trusted library allocation
page read and write
6E94000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
1E3B946D000
heap
page read and write
6E50000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
24206C00000
heap
page read and write
C95000
heap
page read and write
7420000
trusted library allocation
page read and write
1E819F6A000
trusted library allocation
page read and write
49D0000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
1E819859000
trusted library allocation
page read and write
46FB000
trusted library allocation
page execute and read and write
73E0000
trusted library allocation
page read and write
1E8324F5000
heap
page read and write
30A0000
heap
page read and write
7420000
trusted library allocation
page read and write
1E3B9413000
heap
page read and write
EE999FD000
stack
page read and write
6E70000
trusted library allocation
page read and write
CA2000
heap
page read and write
7420000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
5009000
trusted library allocation
page execute and read and write
7420000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
73EC000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
6E55000
trusted library allocation
page read and write
980000
heap
page read and write
8500AFB000
stack
page read and write
28969F02000
heap
page read and write
7FFE7D210000
trusted library allocation
page read and write
1AB38FE000
stack
page read and write
6E90000
trusted library allocation
page read and write
7FFE7CFED000
trusted library allocation
page execute and read and write
7420000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
1E832162000
unkown
page readonly
4A39000
trusted library allocation
page execute and read and write
73E5000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
1E3B944D000
heap
page read and write
1E818FE6000
heap
page read and write
7420000
trusted library allocation
page read and write
145B1BE0000
trusted library allocation
page read and write
7FFE7CFE4000
trusted library allocation
page read and write
1AB5BFD000
stack
page read and write
1E8199BA000
trusted library allocation
page read and write
769D000
stack
page read and write
73E0000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
1E81976B000
trusted library allocation
page read and write
741E000
heap
page read and write
73E0000
trusted library allocation
page read and write
4ABD000
trusted library allocation
page read and write
206807D5000
trusted library allocation
page read and write
6ED0000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
217F0D70000
heap
page read and write
6E70000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
EE9948B000
stack
page read and write
1E3B946C000
heap
page read and write
7FFE7CFF0000
trusted library allocation
page read and write
33A0000
heap
page read and write
7420000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
1E819E9D000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
48C6000
heap
page read and write
7430000
trusted library allocation
page read and write
950000
heap
page read and write
6E70000
trusted library allocation
page read and write
20690681000
trusted library allocation
page read and write
4880000
heap
page read and write
46F0000
trusted library allocation
page read and write
7FFE7D18E000
trusted library allocation
page read and write
ABB3FFE000
stack
page read and write
303C000
stack
page read and write
DC623FE000
stack
page read and write
7400000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
3470000
heap
page read and write
5010000
trusted library allocation
page read and write
1E3B945A000
heap
page read and write
29FBEF1C000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
217EFDA0000
heap
page read and write
4797000
trusted library allocation
page execute and read and write
207E964C000
heap
page read and write
1E819A0D000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
4900000
heap
page execute and read and write
6E91000
trusted library allocation
page read and write
1E3B9477000
heap
page read and write
2FE0000
heap
page read and write
207E7090000
unkown
page readonly
6EA0000
trusted library allocation
page read and write
30B0000
heap
page read and write
7420000
trusted library allocation
page read and write
4840000
trusted library allocation
page read and write
6E93000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
46E0000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
1E819D3A000
trusted library allocation
page read and write
5003000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
1E83242F000
heap
page read and write
7400000
trusted library allocation
page read and write
7450000
trusted library allocation
page execute and read and write
1AB3CFE000
stack
page read and write
4AC0000
trusted library allocation
page read and write
1AB4DFB000
stack
page read and write
207E994B000
heap
page read and write
6E70000
trusted library allocation
page read and write
7FFE7D000000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
29FBE4E0000
heap
page read and write
6E90000
trusted library allocation
page read and write
7FFE7D1A0000
trusted library allocation
page read and write
21790001000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
206FF428000
unkown
page readonly
6DF0000
trusted library allocation
page read and write
3460000
trusted library allocation
page execute and read and write
6EA0000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
1AB55FC000
stack
page read and write
91652FC000
stack
page read and write
51AF000
stack
page read and write
3400000
trusted library allocation
page read and write
7FFE7D3C0000
trusted library allocation
page read and write
CFA000
heap
page read and write
29FCEDF1000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
3404000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
4C31000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
8501C7E000
unkown
page readonly
7420000
trusted library allocation
page read and write
29FD76C8000
heap
page read and write
7FFE7D03C000
trusted library allocation
page execute and read and write
46F2000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
7FFE7D1E0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
24206A41000
heap
page read and write
7FFE7D0A0000
trusted library allocation
page read and write
348F000
heap
page read and write
DC61FFE000
unkown
page readonly
6E90000
trusted library allocation
page execute and read and write
1E819FAF000
trusted library allocation
page read and write
207E7190000
heap
page read and write
7FFE7CFF3000
trusted library allocation
page read and write
7DF6BFF000
stack
page read and write
7DF72FE000
stack
page read and write
4E6E000
stack
page read and write
9164CFE000
stack
page read and write
207E719E000
heap
page read and write
1E3B944C000
heap
page read and write
1E819E73000
trusted library allocation
page read and write
1E831F1C000
heap
page read and write
6E90000
trusted library allocation
page read and write
1E81978C000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
742E000
trusted library allocation
page read and write
90B000
stack
page read and write
1E819E24000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
ABB35FE000
stack
page read and write
73E0000
trusted library allocation
page read and write
7FFE7D280000
trusted library allocation
page read and write
3205000
heap
page read and write
145B1D17000
heap
page read and write
48FE000
stack
page read and write
206FF3B0000
heap
page read and write
73E0000
trusted library allocation
page read and write
1E819F68000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
6DAE000
stack
page read and write
6E90000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
7410000
heap
page read and write
7420000
trusted library allocation
page read and write
7FFE7D1F0000
trusted library allocation
page execute and read and write
6E50000
trusted library allocation
page read and write
325D000
stack
page read and write
6EA0000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7390000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
4ADC000
trusted library allocation
page execute and read and write
24206A02000
heap
page read and write
4EAE000
stack
page read and write
6E90000
trusted library allocation
page read and write
DC620FE000
stack
page read and write
206FF2D7000
heap
page read and write
940000
heap
page read and write
29FBE760000
trusted library allocation
page read and write
4FE0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
49BC000
stack
page read and write
7460000
trusted library allocation
page read and write
50C6000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
5C35000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
7FAD0000
trusted library allocation
page execute and read and write
BECCAFE000
stack
page read and write
7FFE7CFFD000
trusted library allocation
page execute and read and write
207E98E4000
heap
page read and write
7420000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
1AB60FE000
stack
page read and write
207E7360000
heap
page read and write
6E90000
trusted library allocation
page read and write
1E831F9E000
heap
page read and write
7FFE7D110000
trusted library allocation
page execute and read and write
508D000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
73F0000
trusted library allocation
page read and write
1E819E96000
trusted library allocation
page read and write
1E819AED000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
29FBEF41000
trusted library allocation
page read and write
6E80000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
2F2E000
stack
page read and write
217F0E18000
heap
page read and write
7420000
trusted library allocation
page read and write
3030000
heap
page read and write
9164FFC000
stack
page read and write
6E90000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
207E71DB000
heap
page read and write
7440000
trusted library allocation
page read and write
7FFE7D390000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
33B0000
heap
page read and write
2179000D000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
4AAF000
trusted library allocation
page read and write
1E819C0D000
trusted library allocation
page read and write
DEF000
stack
page read and write
6E50000
trusted library allocation
page read and write
1E8324DA000
heap
page read and write
7FFE7D1B0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
2178012C000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6E59000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
73E5000
trusted library allocation
page read and write
1E3B9497000
heap
page read and write
91645FE000
stack
page read and write
7FFE7D1F0000
trusted library allocation
page read and write
5C31000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
5116000
trusted library allocation
page read and write
7FFE7D07C000
trusted library allocation
page execute and read and write
7420000
trusted library allocation
page read and write
B6AE7B000
stack
page read and write
217EFD80000
heap
page read and write
207E74D5000
heap
page read and write
4B34000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
7441000
heap
page read and write
1AB3BFE000
stack
page read and write
6E90000
trusted library allocation
page read and write
7DF66F1000
stack
page read and write
1E8327D2000
unkown
page readonly
7FFE7D380000
trusted library allocation
page read and write
7FFE7CFD4000
trusted library allocation
page read and write
7445000
heap
page read and write
799E000
stack
page read and write
46B4000
trusted library allocation
page read and write
7FFE7D08C000
trusted library allocation
page execute and read and write
7FFE7CFED000
trusted library allocation
page execute and read and write
73E9000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
7FFE7D1F0000
trusted library allocation
page read and write
1E819A0B000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
1E819F70000
trusted library allocation
page read and write
DC61E7E000
stack
page read and write
6EA0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
1E3B945E000
heap
page read and write
7420000
trusted library allocation
page read and write
1D5E5F80000
heap
page read and write
79EB000
heap
page read and write
6E50000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
2DCD000
stack
page read and write
1E8197FA000
trusted library allocation
page read and write
C50000
heap
page read and write
850167E000
unkown
page readonly
7FFE7D183000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
7FFE7D00D000
trusted library allocation
page execute and read and write
48E5000
heap
page read and write
207E9639000
heap
page read and write
7430000
heap
page read and write
C1A000
heap
page read and write
7FFE7D00B000
trusted library allocation
page execute and read and write
3425000
trusted library allocation
page execute and read and write
48CE000
stack
page read and write
4F4E000
stack
page read and write
7FFE7D1F0000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7421000
trusted library allocation
page read and write
7500000
remote allocation
page read and write
6E90000
trusted library allocation
page read and write
7510000
heap
page execute and read and write
2D4D000
stack
page read and write
7420000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
1E819FA7000
trusted library allocation
page read and write
4900000
trusted library allocation
page execute and read and write
73E0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
20690691000
trusted library allocation
page read and write
1E819E40000
trusted library allocation
page read and write
7F258000
trusted library allocation
page execute and read and write
6E90000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
1E819F6E000
trusted library allocation
page read and write
1AB4BF5000
stack
page read and write
ABB3141000
stack
page read and write
1E8198C2000
trusted library allocation
page read and write
7FFE7D200000
trusted library allocation
page read and write
7FFE7D1C0000
trusted library allocation
page execute and read and write
C88000
heap
page read and write
7FFE7D240000
trusted library allocation
page execute and read and write
4A6E000
stack
page read and write
7400000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
BECC4FE000
stack
page read and write
7FFE7CFDD000
trusted library allocation
page execute and read and write
7FFE7D200000
trusted library allocation
page read and write
30E9000
heap
page read and write
7420000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
331E000
unkown
page read and write
7FFE7D250000
trusted library allocation
page read and write
C3F000
heap
page read and write
73E0000
trusted library allocation
page read and write
207E98EC000
heap
page read and write
7FFE7D240000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
1AB4FF7000
stack
page read and write
7440000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
20680670000
heap
page read and write
7430000
trusted library allocation
page read and write
C10000
heap
page read and write
1D5E6120000
heap
page read and write
28969E52000
heap
page read and write
6E90000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
EE99C7D000
stack
page read and write
6EB0000
trusted library allocation
page read and write
9164DFE000
stack
page read and write
6E90000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
7FFE7D090000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
3505000
heap
page read and write
7FFE7CFFD000
trusted library allocation
page execute and read and write
4764000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
91644F5000
stack
page read and write
6EB0000
trusted library allocation
page read and write
1AB363F000
stack
page read and write
3700000
heap
page read and write
145B1C02000
heap
page read and write
704F000
stack
page read and write
6E90000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
353A000
heap
page read and write
7440000
trusted library allocation
page read and write
46C0000
trusted library allocation
page read and write
206FF318000
heap
page read and write
7430000
trusted library allocation
page read and write
6E00000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
350E000
heap
page read and write
EE99D7E000
unkown
page readonly
7440000
trusted library allocation
page read and write
1E82970E000
trusted library allocation
page read and write
1E819E64000
trusted library allocation
page read and write
1E819D32000
trusted library allocation
page read and write
24206900000
heap
page read and write
145B1BB0000
heap
page read and write
2EAE000
stack
page read and write
6EA0000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
4AB1000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
4B00000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
494E000
stack
page read and write
6EA0000
trusted library allocation
page read and write
1E3B9449000
heap
page read and write
7FFE7D190000
trusted library allocation
page read and write
4B40000
trusted library allocation
page read and write
476D000
trusted library allocation
page execute and read and write
1E832590000
heap
page execute and read and write
7430000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
1E3B9390000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7F550000
trusted library allocation
page execute and read and write
6EB0000
trusted library allocation
page read and write
1AB5CFE000
stack
page read and write
6ED0000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
3480000
heap
page read and write
29FBE520000
heap
page read and write
7420000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
2EEE000
stack
page read and write
6E50000
trusted library allocation
page read and write
207E7385000
heap
page read and write
AC7000
stack
page read and write
7FFE7D1F9000
trusted library allocation
page read and write
7FFE7D220000
trusted library allocation
page read and write
217EFEF9000
heap
page read and write
7430000
trusted library allocation
page read and write
7FFE7D230000
trusted library allocation
page execute and read and write
7FFE7D1AD000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
4845000
heap
page read and write
7420000
trusted library allocation
page read and write
91649FE000
stack
page read and write
7FFE7D190000
trusted library allocation
page read and write
7FFE7D0C6000
trusted library allocation
page execute and read and write
332E000
stack
page read and write
24206A00000
heap
page read and write
4C1E000
stack
page read and write
217EFCA0000
heap
page read and write
24207200000
heap
page read and write
795E000
stack
page read and write
6E70000
trusted library allocation
page read and write
4690000
heap
page read and write
1AB56FC000
stack
page read and write
6E90000
trusted library allocation
page read and write
960000
heap
page read and write
7420000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
145B36A0000
remote allocation
page read and write
6E80000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
947000
stack
page read and write
7400000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
28969E02000
heap
page read and write
7440000
trusted library allocation
page read and write
326E000
stack
page read and write
7420000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
24206A22000
heap
page read and write
6E90000
trusted library allocation
page read and write
206FF2DB000
heap
page read and write
5081000
trusted library allocation
page read and write
28969E5F000
heap
page read and write
7FFE7D04C000
trusted library allocation
page execute and read and write
785D000
stack
page read and write
3138000
heap
page read and write
7400000
trusted library allocation
page read and write
850197E000
stack
page read and write
28969E48000
heap
page read and write
7400000
trusted library allocation
page read and write
145B3670000
trusted library allocation
page read and write
7FFE7D1AD000
trusted library allocation
page read and write
1E819B9D000
trusted library allocation
page read and write
4FD3000
trusted library allocation
page read and write
7FFE7CFE0000
trusted library allocation
page read and write
4770000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
7FFE7D090000
trusted library allocation
page execute and read and write
7FFE7D220000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
1AB49ED000
stack
page read and write
3200000
heap
page read and write
79DE000
heap
page read and write
1E8195F3000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
1E8323DE000
heap
page read and write
DC627FE000
stack
page read and write
7FFE7D1A0000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
3427000
trusted library allocation
page execute and read and write
503E000
heap
page read and write
7420000
trusted library allocation
page read and write
6E91000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
7FFE7D1E9000
trusted library allocation
page read and write
1E819FAD000
trusted library allocation
page read and write
1E8197D3000
trusted library allocation
page read and write
1AB4CFA000
stack
page read and write
6E90000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7FFE7CFD2000
trusted library allocation
page read and write
32EE000
stack
page read and write
1E819B95000
trusted library allocation
page read and write
4AB3000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
7FFE7CFD0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
28969D30000
heap
page read and write
761E000
stack
page read and write
3040000
heap
page read and write
6E70000
trusted library allocation
page read and write
6E9E000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
EE99F7E000
unkown
page readonly
2069068D000
trusted library allocation
page read and write
7500000
remote allocation
page read and write
EE9A67E000
unkown
page readonly
8501A7E000
unkown
page readonly
3100000
heap
page read and write
1E3B945C000
heap
page read and write
1E3B9502000
heap
page read and write
73E0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
1E8327D0000
unkown
page readonly
6035000
trusted library allocation
page read and write
4850000
heap
page readonly
1AB4AE9000
stack
page read and write
7390000
trusted library allocation
page read and write
7FFE7D166000
trusted library allocation
page read and write
CB7000
heap
page read and write
7FFE7D230000
trusted library allocation
page read and write
79D9000
heap
page read and write
6E70000
trusted library allocation
page read and write
206804B0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
217F0DB0000
heap
page read and write
7400000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
1E819E9F000
trusted library allocation
page read and write
1E3B944A000
heap
page read and write
33D0000
heap
page read and write
7FFE7D09C000
trusted library allocation
page execute and read and write
EE9A27E000
stack
page read and write
7460000
trusted library allocation
page read and write
7FFE7CFE0000
trusted library allocation
page read and write
48B0000
trusted library allocation
page read and write
7FFE7D246000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
C57000
heap
page read and write
7FFE7D17C000
trusted library allocation
page read and write
7FFE7D03C000
trusted library allocation
page execute and read and write
207E7433000
heap
page read and write
206FF450000
heap
page read and write
20780172000
trusted library allocation
page read and write
29FD7672000
heap
page read and write
349C000
heap
page read and write
7420000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
145B1C40000
heap
page read and write
7FFE7CFE4000
trusted library allocation
page read and write
1E819FA9000
trusted library allocation
page read and write
5020000
heap
page read and write
1E3B9435000
heap
page read and write
6EA0000
trusted library allocation
page read and write
46B0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
46F0000
trusted library allocation
page read and write
339F000
stack
page read and write
46F4000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
28969D60000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
9164BFE000
stack
page read and write
1AB58FC000
stack
page read and write
7400000
trusted library allocation
page read and write
91653FC000
stack
page read and write
6E90000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
50CB000
trusted library allocation
page read and write
1E3B9436000
heap
page read and write
33F0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
1E819786000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
1E819F19000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
3395000
heap
page read and write
49D0000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
7FFE7CFDD000
trusted library allocation
page execute and read and write
6E50000
trusted library allocation
page read and write
207E7156000
heap
page read and write
73E0000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page read and write
2896A602000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
7FFE7D180000
trusted library allocation
page read and write
24206A2B000
heap
page read and write
29FBE7B5000
heap
page read and write
7FFE7D1D0000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
7FFE7CFF0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
4827000
trusted library allocation
page execute and read and write
7420000
trusted library allocation
page read and write
DAE000
stack
page read and write
6EA0000
trusted library allocation
page read and write
7FFE7D01C000
trusted library allocation
page execute and read and write
2178003B000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
C98000
heap
page read and write
3380000
heap
page read and write
1E8197AC000
trusted library allocation
page read and write
3490000
heap
page read and write
207E991F000
heap
page read and write
7FFE7D100000
trusted library allocation
page execute and read and write
6E90000
trusted library allocation
page read and write
4AB0000
trusted library allocation
page read and write
1E3B9463000
heap
page read and write
6EA0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
BECC3FD000
stack
page read and write
6EA0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
7FFE7D1E0000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
7460000
trusted library allocation
page read and write
7FFE7CFD0000
trusted library allocation
page read and write
7FFE7D2E0000
trusted library allocation
page read and write
BECC8FE000
stack
page read and write
6E70000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
145B1C63000
heap
page read and write
FDE000
stack
page read and write
1E3B948E000
heap
page read and write
28969E13000
heap
page read and write
6E90000
trusted library allocation
page read and write
29FBEE2B000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
207E9662000
unkown
page readonly
73E0000
trusted library allocation
page read and write
EE99E7E000
stack
page read and write
6E70000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
C4E000
stack
page read and write
7420000
trusted library allocation
page read and write
1E3B9350000
heap
page read and write
6ED0000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
7FFE7D004000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7FFE7D290000
trusted library allocation
page read and write
29FBEF1F000
trusted library allocation
page read and write
207E98F6000
heap
page read and write
206FF2DD000
heap
page read and write
1E8197D7000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7FFE7CFF2000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
207E8DA0000
heap
page read and write
7430000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
24206B02000
heap
page read and write
207E9902000
heap
page read and write
73E0000
trusted library allocation
page read and write
20790001000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
3040000
heap
page read and write
7420000
trusted library allocation
page read and write
1E819D30000
trusted library allocation
page read and write
4A95000
heap
page read and write
73E0000
trusted library allocation
page read and write
1E3B9462000
heap
page read and write
6D6E000
stack
page read and write
CD7000
heap
page read and write
1AB4328000
stack
page read and write
6E90000
trusted library allocation
page read and write
7FFE7D1B6000
trusted library allocation
page read and write
34B6000
heap
page read and write
1E832160000
unkown
page readonly
1E819D56000
trusted library allocation
page read and write
7FFE7CFE4000
trusted library allocation
page read and write
4AF6000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6E55000
trusted library allocation
page read and write
321E000
stack
page read and write
7420000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
708E000
stack
page read and write
6EA0000
trusted library allocation
page read and write
2F00000
heap
page read and write
7FFE7D1B0000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
7FFE7D09C000
trusted library allocation
page execute and read and write
6E70000
trusted library allocation
page read and write
1E83240D000
heap
page read and write
7FFE7D02C000
trusted library allocation
page execute and read and write
6E50000
trusted library allocation
page read and write
206807AC000
trusted library allocation
page read and write
C99C6FF000
stack
page read and write
5A65000
trusted library allocation
page read and write
34A8000
heap
page read and write
7DF6DFE000
stack
page read and write
6E90000
trusted library allocation
page read and write
7FFE7D0D6000
trusted library allocation
page execute and read and write
207E7480000
heap
page read and write
50C3000
trusted library allocation
page read and write
7FFE7D0C6000
trusted library allocation
page execute and read and write
91659FE000
stack
page read and write
1E819E68000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
B6B2FC000
stack
page read and write
24206A71000
heap
page read and write
73E5000
trusted library allocation
page read and write
B6B07C000
stack
page read and write
7420000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
C9E000
heap
page read and write
6E70000
trusted library allocation
page read and write
7FFE7D1C0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7FFE7D1D5000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
206FF522000
unkown
page readonly
7FFE7D173000
trusted library allocation
page read and write
4B40000
trusted library allocation
page read and write
B6B4FC000
stack
page read and write
7440000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
20680530000
heap
page execute and read and write
EE9A5FE000
stack
page read and write
6E90000
trusted library allocation
page read and write
7FFE7D1B0000
trusted library allocation
page read and write
207E7440000
heap
page execute and read and write
7400000
trusted library allocation
page read and write
1E8197DF000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
1E831FF0000
heap
page execute and read and write
217F0F10000
heap
page execute and read and write
7FFE7D210000
trusted library allocation
page read and write
79B2000
heap
page read and write
6EA0000
trusted library allocation
page read and write
7FFE7D1B6000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
7FFE7D00B000
trusted library allocation
page execute and read and write
7400000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7FFE7D086000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
51B0000
heap
page read and write
C99C3FD000
stack
page read and write
48CF000
stack
page read and write
7400000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
3450000
heap
page readonly
6EA0000
trusted library allocation
page read and write
1E81995A000
trusted library allocation
page read and write
29FBE8E0000
heap
page read and write
4AE0000
trusted library allocation
page read and write
4EB8000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
1AB59FC000
stack
page read and write
7420000
trusted library allocation
page read and write
7FFE7D1C0000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
4A14000
heap
page read and write
1E3B944B000
heap
page read and write
7420000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
1E818EE0000
heap
page read and write
73E0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
4B40000
trusted library allocation
page read and write
7FFE7D0F0000
trusted library allocation
page execute and read and write
206FF410000
unkown
page readonly
46C4000
trusted library allocation
page read and write
1E3B944E000
heap
page read and write
7FFE7D1B0000
trusted library allocation
page read and write
1E819B99000
trusted library allocation
page read and write
6031000
trusted library allocation
page read and write
28969E34000
heap
page read and write
7400000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
30CB000
heap
page read and write
6E90000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
ABB38FE000
stack
page read and write
6E90000
trusted library allocation
page read and write
145B1D02000
heap
page read and write
6E70000
trusted library allocation
page read and write
2078017A000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
4910000
trusted library allocation
page read and write
ABB3DFE000
stack
page read and write
7430000
trusted library allocation
page read and write
4868000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
46F3000
trusted library allocation
page execute and read and write
7430000
trusted library allocation
page read and write
49AE000
stack
page read and write
7430000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
50F5000
trusted library allocation
page read and write
7FFE7D270000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
91646FE000
stack
page read and write
DC621FE000
unkown
page readonly
217F0DFC000
heap
page read and write
73E0000
trusted library allocation
page read and write
1AB57FE000
stack
page read and write
7370000
trusted library allocation
page execute and read and write
7400000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
207E994F000
heap
page read and write
7DF71FD000
stack
page read and write
217F0DFF000
heap
page read and write
7420000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
1AB41FD000
stack
page read and write
73E0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
4840000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
28969E16000
heap
page read and write
7420000
trusted library allocation
page read and write
4B42000
trusted library allocation
page read and write
4AC1000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
3493000
heap
page read and write
7FFE7D180000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
145B1D00000
heap
page read and write
1E819EA4000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
4FDD000
trusted library allocation
page execute and read and write
6E70000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
1E8197A0000
trusted library allocation
page read and write
4A00000
trusted library allocation
page execute and read and write
6DB0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
31ED000
unkown
page read and write
1E8196F0000
heap
page read and write
6E50000
trusted library allocation
page read and write
488E000
stack
page read and write
7FFE7D1C0000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
59F5000
trusted library allocation
page read and write
4A40000
trusted library allocation
page read and write
7380000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
789F000
stack
page read and write
207E9943000
heap
page read and write
73E0000
trusted library allocation
page read and write
4920000
heap
page execute and read and write
49FD000
stack
page read and write
4AB4000
heap
page read and write
6E90000
trusted library allocation
page read and write
740F000
stack
page read and write
7460000
trusted library allocation
page read and write
6EF0000
remote allocation
page read and write
7430000
trusted library allocation
page read and write
DC61F7E000
stack
page read and write
91655FC000
stack
page read and write
33E0000
trusted library allocation
page read and write
C74000
heap
page read and write
6E50000
trusted library allocation
page read and write
7FFE7D210000
trusted library allocation
page execute and read and write
6EB0000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
206FF1B0000
heap
page read and write
A8B000
stack
page read and write
BECC7FE000
stack
page read and write
6E70000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
7FFE7D090000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
4AAD000
stack
page read and write
206FF515000
heap
page read and write
1AB3FE9000
stack
page read and write
207E73E0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
4B52000
trusted library allocation
page read and write
21790011000
trusted library allocation
page read and write
4AFB000
trusted library allocation
page read and write
24206A91000
heap
page read and write
350E000
heap
page read and write
73E0000
trusted library allocation
page read and write
1E818FC6000
heap
page read and write
6E90000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
7DF6CFE000
stack
page read and write
1E3B9431000
heap
page read and write
207E95E4000
heap
page read and write
217F0E1D000
heap
page read and write
6E90000
trusted library allocation
page read and write
473F000
stack
page read and write
145B1C13000
heap
page read and write
1E8198D6000
trusted library allocation
page read and write
6FAF000
stack
page read and write
79A0000
heap
page read and write
7400000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
207E9660000
unkown
page readonly
1E831EF2000
heap
page read and write
1E819FBD000
trusted library allocation
page read and write
1E8197C7000
trusted library allocation
page read and write
5006000
trusted library allocation
page execute and read and write
7420000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
207E7140000
heap
page read and write
1AB5FFE000
stack
page read and write
7400000
trusted library allocation
page read and write
7FFE7D01B000
trusted library allocation
page execute and read and write
6E50000
trusted library allocation
page read and write
33D5000
heap
page read and write
6E90000
trusted library allocation
page read and write
206FF520000
unkown
page readonly
7FFE7D1E0000
trusted library allocation
page read and write
206FF390000
heap
page read and write
4950000
heap
page readonly
7420000
trusted library allocation
page read and write
6EF0000
remote allocation
page read and write
6E90000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6E80000
trusted library allocation
page read and write
1E829721000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
91648FC000
stack
page read and write
7420000
trusted library allocation
page read and write
1E8328AF000
heap
page read and write
7420000
trusted library allocation
page read and write
50EE000
stack
page read and write
32C0000
heap
page read and write
33F3000
trusted library allocation
page execute and read and write
6EA0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
206807C3000
trusted library allocation
page read and write
7DF67FE000
stack
page read and write
7FFE7D170000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7FFE7D1D0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
850137B000
stack
page read and write
1AB44FD000
stack
page read and write
7FFE7D2B0000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
32DE000
stack
page read and write
1E819767000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
34B3000
heap
page read and write
8501B7E000
stack
page read and write
7FFE7D0A6000
trusted library allocation
page execute and read and write
6E50000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
24206A13000
heap
page read and write
7430000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
482B000
trusted library allocation
page execute and read and write
7FFE7D209000
trusted library allocation
page read and write
7FFE7D096000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
7FFE7D200000
trusted library allocation
page execute and read and write
BECBDB1000
stack
page read and write
C36000
heap
page read and write
1E819DF6000
trusted library allocation
page read and write
7FFE7D180000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
1E8198CE000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
1E819F64000
trusted library allocation
page read and write
479B000
trusted library allocation
page execute and read and write
89B000
stack
page read and write
7420000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
985000
heap
page read and write
E3B000
stack
page read and write
7FFE7D080000
trusted library allocation
page read and write
49A0000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7FFE7D010000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
1E819CD9000
trusted library allocation
page read and write
33F4000
trusted library allocation
page read and write
1E3B9461000
heap
page read and write
7FFE7CFED000
trusted library allocation
page execute and read and write
765E000
stack
page read and write
20698F28000
heap
page read and write
7420000
trusted library allocation
page read and write
73CE000
stack
page read and write
207E9629000
heap
page read and write
30F9000
heap
page read and write
CDE000
heap
page read and write
7440000
trusted library allocation
page read and write
4820000
trusted library allocation
page read and write
7FFE7D070000
trusted library allocation
page read and write
7FFE7D230000
trusted library allocation
page execute and read and write
73E0000
trusted library allocation
page read and write
29FD7670000
heap
page read and write
7430000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
7FFE7D1B5000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
3440000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
7FFE7CFEB000
trusted library allocation
page execute and read and write
7420000
trusted library allocation
page read and write
207E94E0000
heap
page execute and read and write
6E10000
trusted library allocation
page read and write
207E98FE000
heap
page read and write
46B3000
trusted library allocation
page execute and read and write
24207090000
trusted library allocation
page read and write
7EEB0000
trusted library allocation
page execute and read and write
3060000
heap
page read and write
BECC2FE000
stack
page read and write
145B1C6F000
heap
page read and write
1AB5AFE000
stack
page read and write
24206A38000
heap
page read and write
73E0000
trusted library allocation
page read and write
DC6227E000
stack
page read and write
1E819E02000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
7FFE7D2C0000
trusted library allocation
page read and write
29FCEE01000
trusted library allocation
page read and write
1E3B945F000
heap
page read and write
4700000
trusted library allocation
page read and write
206FF3D0000
heap
page read and write
6E90000
trusted library allocation
page read and write
DC61B4B000
stack
page read and write
73E0000
trusted library allocation
page read and write
7430000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
EE9A0FE000
stack
page read and write
7430000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
7FFE7D3A0000
trusted library allocation
page read and write
331F000
stack
page read and write
50AF000
stack
page read and write
6E50000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
1E3B9468000
heap
page read and write
6E50000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
7FFE7D0A6000
trusted library allocation
page read and write
4B40000
trusted library allocation
page read and write
1E8198D2000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
29FD7707000
heap
page read and write
7FFE7D1A7000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
145B1B80000
heap
page read and write
6E50000
trusted library allocation
page read and write
7FFE7CFCD000
trusted library allocation
page execute and read and write
7FFE7D19E000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
1AB50FE000
stack
page read and write
730E000
stack
page read and write
6E90000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6EA0000
trusted library allocation
page read and write
6EB0000
trusted library allocation
page read and write
7040000
heap
page read and write
6E50000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
6E50000
trusted library allocation
page read and write
1AB33FF000
stack
page read and write
7410000
trusted library allocation
page read and write
506E000
stack
page read and write
6EB0000
trusted library allocation
page read and write
8501076000
stack
page read and write
7400000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
206FF2BD000
heap
page read and write
6E90000
trusted library allocation
page read and write
7FFE7D0E0000
trusted library allocation
page execute and read and write
4710000
heap
page read and write
24206B00000
heap
page read and write
24207202000
heap
page read and write
6EC0000
trusted library allocation
page execute and read and write
6EA0000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
1AB437E000
stack
page read and write
79EC000
heap
page read and write
6E90000
trusted library allocation
page read and write
7FFE7D2F0000
trusted library allocation
page execute and read and write
73E0000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
7500000
remote allocation
page read and write
7FFE7D2A0000
trusted library allocation
page read and write
7420000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
207E992A000
heap
page read and write
206FF2BA000
heap
page read and write
4F8E000
stack
page read and write
7FFE7CFF0000
trusted library allocation
page read and write
6E70000
trusted library allocation
page read and write
217EFE4F000
heap
page read and write
6E90000
trusted library allocation
page read and write
7FF44B1B0000
trusted library allocation
page execute and read and write
6E90000
trusted library allocation
page read and write
1E819E06000
trusted library allocation
page read and write
7460000
trusted library allocation
page read and write
217F0DD9000
heap
page read and write
ABB3BFE000
stack
page read and write
7400000
trusted library allocation
page read and write
353A000
heap
page read and write
7430000
trusted library allocation
page read and write
7FFE7D185000
trusted library allocation
page read and write
217F0005000
heap
page read and write
4AF0000
trusted library allocation
page execute and read and write
7FFE7D1AD000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
217EFE51000
heap
page read and write
29FBE59B000
heap
page read and write
B45000
heap
page read and write
1E81A008000
trusted library allocation
page read and write
6E90000
trusted library allocation
page read and write
49B0000
trusted library allocation
page read and write
5122000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
7FFE7CFD3000
trusted library allocation
page execute and read and write
217F0E11000
heap
page read and write
6E90000
trusted library allocation
page read and write
7444000
trusted library allocation
page read and write
There are 2234 hidden memdumps, click here to show them.