IOC Report
ListaItensVistoriaCorpodeBombeirosObrigatorio.msi

loading gif

Files

File Path
Type
Category
Malicious
ListaItensVistoriaCorpodeBombeirosObrigatorio.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
initial sample
malicious
C:\Config.Msi\47e055.rbs
data
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallLog
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\BouncyCastle.Crypto.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\ICSharpCode.SharpZipLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Atera.AgentPackage.Common.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Pubnub.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI1EAC.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
modified
malicious
C:\Windows\Installer\MSI1EAC.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIE1AC.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSIE1AC.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIE3EF.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSIE3EF.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIFDA2.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows, InstallShield self-extracting archive
dropped
malicious
C:\Windows\Installer\MSIFDA2.tmp-\AlphaControlAgentInstallation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Installer\MSIFFF5.tmp
data
dropped
malicious
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\System32\InstallUtil.InstallLog
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Windows\Temp\~DF249BEF134D41FAF6.TMP
data
dropped
malicious
C:\Windows\Temp\~DF4CDBAE97BB9B291A.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF6E1821419CBD92E5.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF7D6DF77431214178.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DF809BDB3C3038939A.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Windows\Temp\~DFC62927D95770B6A7.TMP
Composite Document File V2 Document, Cannot read section info
dropped
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.InstallState
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation.zip
Zip archive data, at least v4.5 to extract, compression method=deflate
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.ini
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\ATERA Networks\AteraAgent\log.txt
ASCII text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AteraAgent.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\rundll32.exe.log
CSV text
dropped
C:\Windows\Installer\47e054.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\47e056.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Code page: 1252, Title: Installation Database, Subject: AteraAgent, Author: Atera networks, Keywords: Installer, Comments: This installer database contains the logic and data required to install AteraAgent., Template: Intel;1033, Revision Number: {721AD955-79FD-4019-BBF5-9DCC4C1175BB}, Create Time/Date: Wed Feb 28 10:52:02 2024, Last Saved Time/Date: Wed Feb 28 10:52:02 2024, Number of Pages: 200, Number of Words: 6, Name of Creating Application: Windows Installer XML Toolset (3.11.2.4516), Security: 2
dropped
C:\Windows\Installer\MSI17E.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI1EAC.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSI1EAC.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI1EAC.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI1EAC.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSI5.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI74.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSIE1AC.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSIE1AC.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIE1AC.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIE1AC.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIE3EF.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSIE3EF.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIE3EF.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIE3EF.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIFDA2.tmp-\CustomAction.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Installer\MSIFDA2.tmp-\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIFDA2.tmp-\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\MSIFDA2.tmp-\System.Management.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Installer\SourceHash{E732A0D7-A2F2-4657-AC41-B19742648E45}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\1A374813EDB1A6631387E414D3E73232
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BA74182F76F15A9CF514DEF352303C95
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C56C4404C4DEF0DC88E5FCD9F09CB2F1
Certificate, Version=3
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2E248BEDDBB2D85122423C41028BFD4
Certificate, Version=3
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\1A374813EDB1A6631387E414D3E73232
data
modified
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\698460A0B6E60F2F602361424D832905_8BB23D43DE574E82F2BEE0DF0EC47EEB
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\8EC9B1D0ABBD7F98B401D425828828CE_DEB07B5578A606ED6489DDA2E357A944
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BA74182F76F15A9CF514DEF352303C95
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C56C4404C4DEF0DC88E5FCD9F09CB2F1
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C8E534EE129F27D55460CE17FD628216_1130D9B25898B0DB0D4F04DC5B93F141
data
dropped
C:\Windows\System32\config\systemprofile\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F2E248BEDDBB2D85122423C41028BFD4
data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\AgentPackageAgentInformation.exe.log
CSV text
dropped
C:\Windows\Temp\~DF349BA5819DF2EED8.TMP
data
dropped
C:\Windows\Temp\~DF72606B8D49D27887.TMP
data
dropped
C:\Windows\Temp\~DF7CF9D7145FB2BD29.TMP
data
dropped
C:\Windows\Temp\~DF902835E2B889D7DB.TMP
data
dropped
C:\Windows\Temp\~DFCBE2A7A22823B788.TMP
data
dropped
C:\Windows\Temp\~DFF75EAB7BA0250139.TMP
data
dropped
\Device\ConDrv
JSON data
dropped
There are 73 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSIE1AC.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4710906 2 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.GenerateAgentId
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSIE3EF.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4711453 6 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiStart
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSIFDA2.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4718015 11 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ShouldContinueInstallation
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe" /i /IntegratorLogin="comunicado@gestorempresas.digital" /CompanyId="1" /IntegratorLoginUI="" /CompanyIdUI="" /FolderId="" /AccountId="001Q3000006YrPqIAK" /AgentId="036a7bb6-e9ab-4003-820d-512fa1b48707"
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\AteraAgent.exe"
malicious
C:\Windows\SysWOW64\rundll32.exe
rundll32.exe "C:\Windows\Installer\MSI1EAC.tmp",zzzzInvokeManagedCustomActionOutOfProc SfxCA_4726484 33 AlphaControlAgentInstallation!AlphaControlAgentInstallation.CustomActions.ReportMsiEnd
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 036a7bb6-e9ab-4003-820d-512fa1b48707 "947f5ffd-2187-4fed-88a8-f6375fd81e42" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q3000006YrPqIAK
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 036a7bb6-e9ab-4003-820d-512fa1b48707 "d33bc958-4922-4182-b68f-3483e8de9f0d" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q3000006YrPqIAK
malicious
C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe
"C:\Program Files (x86)\ATERA Networks\AteraAgent\Packages\AgentPackageAgentInformation\AgentPackageAgentInformation.exe" 036a7bb6-e9ab-4003-820d-512fa1b48707 "74b28cea-d314-412b-b1ac-0c6c5fd129c1" agent-api.atera.com/Production 443 or8ixLi90Mf "minimalIdentification" 001Q3000006YrPqIAK
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\ListaItensVistoriaCorpodeBombeirosObrigatorio.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 399844DB614D5E1E27E49AAF003F570D
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 04E8F29C9872C7FAF44877CCF53966A9 E Global\MSI0000
C:\Windows\SysWOW64\net.exe
"NET" STOP AteraAgent
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\net1.exe
C:\Windows\system32\net1 STOP AteraAgent
C:\Windows\SysWOW64\taskkill.exe
"TaskKill.exe" /f /im AteraAgent.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
"C:\Windows\System32\sc.exe" failure AteraAgent reset= 600 actions= restart/25000
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 13 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://ps.atera.com/agentpackagesmac/AgentPackageWindowsUpdate/24.6/AgentPackageWindowsUpdate.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=d564941f-31f4-4f1e-8cfa-ab39104c2c32&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
http://schemas.datacontract.org
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageMarketplace/1.6/AgentPackageMarketplace.zip
unknown
http://www.microsoft.co
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=025e58c1-51ad-4981-aee3-45a08882b1fd&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
https://agent-api.atera.com/Production/Agent/track-event
unknown
http://dl.google.com/googletalk/googletalk-setup.exe
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/036a7bb6-e9ab-4003-820d-512fa1b48707/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=6c5d24e4-0b70-422e-83c6-48afa7e568d5&tt=0&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
unknown
https://agent-api.atera.com/Production/Agent/
unknown
http://schemas.datacontract.org/2004/07/System.ServiceProcess
unknown
http://wixtoolset.org
unknown
https://agent-api.atera.com/Production
unknown
https://ps.atera.com/agentpackageswin/AgentPackageRuntimeInstaller/13.0/AgentPackageRuntimeInstaller
unknown
http://acontrol.atera.com/
unknown
https://ps.pndsn.com
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/036a7bb6-e9ab-4003-820d-512fa1b48707/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=f5d904fa-4ebd-4e88-9d51-8bf1316d9b84&tr=33&tt=17324439817091491&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
https://ps.atera.com/agentpackagesnet45/AgentPackageADRemote/6.0/AgentPackageADRemote.zip
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageNetworkDiscovery/23.9/AgentPackageNetworkDiscove
unknown
http://agent-api.atera.com
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageSystemTools/27.8/AgentPackageSystemTools.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=254b40c1-e391-4dc5-a3fc-b4191829120e
unknown
http://schemas.datacontract.org/2004/07/
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=beca1352-9fbb-4086-9d34-96d86fc42e76
unknown
https://github.com/icsharpcode/SharpZipLib
unknown
https://ps.atera.com/agentpackageswin/AgentPackageNetworkDiscovery/15.0/AgentPackageNetworkDiscovery
unknown
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageAgentI
unknown
https://ps.atera.com/agentpackagesnet45/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
unknown
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/036a7bb6-e9ab-4003-820d-512fa1b48707/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=98e68274-5d6c-46f9-8e1c-6ac34eaaed9f&tr=33&tt=17324439817091491&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=27575d4d-f049-4af3-98fd-29c9ab567af2
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageTaskScheduler/17.2/AgentPackageTaskScheduler.zip
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageTicketing/30.1/AgentPackageTicketing.zip
unknown
https://agent-api.atera.com
unknown
https://agent-api.atera.com/Production/Agent/AgentStarting
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/036a7bb6-e9ab-4003-820d-512fa1b48707/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=b0e0aedc-7feb-42fd-9d01-6a81d3a7a14a&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=af9dd924-082e-4d82-abb8-ee5a0258cedd&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
http://www.w3.oh
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/036a7bb6
unknown
https://agent-api.atera.com/Production/Agent/GetCommands
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/036a7bb6-e9ab-4003-820d-512fa1b48707/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=4e8081eb-de73-414b-8c17-81b909623b91&tt=0&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/036a7bb6-e9ab-H
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/036a7bb6-e9ab-4003-820d-512fa1b48707/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=49582081-0068-4f70-b5a7-3884c66622b6&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
https://agent-api.atera.com/
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/036a7bb6-e9ab-4003-820d-512fa1b48707/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=47d3572d-5ec1-4a16-8b18-b7c076a038fc&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
https://agent-api.atera.com/Production/Agent/GetRecurringPackages
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.Availability/13.0/Agent.Package.Availability.zip
unknown
https://www.newtonsoft.com/jsonschema
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/036a7bb6-e9ab-4003-820d-512fa1b48707/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=c1866262-6dbe-4127-848d-fdd2fb9c798a&tt=0&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=beca1352-9fbb-4086-9d34-96d86fc42e76&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/036a7bb6-e9ab-4003-820d-512fa1b48707/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=10b48a2e-94d5-4663-b23c-61fa3a71d716&tt=0&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
http://cacerts.digicerZ
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageRuntimeInstaller/1.5/AgentPackageRuntimeInstaller.
unknown
https://ps.atera.com/agentpackageswin/Agent.Package.Watchdog/13.0/Agent.Package.Watchdog.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=985e6a88-0b57-4d38-a817-216eb6ef36a4&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=fc5b0f0f-6a56-401f-80e9-8be81399a636&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=fbc5619b-ff2b-4cc2-bf14-e4eb42ae8834
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=fbc5619b-ff2b-4cc2-bf14-e4eb42ae8834&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
https://ps.atera.com/agentpackagesnet45/Agent.Package.Availability/0.16/Agent.Package.Availability.z
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=d564941f-31f4-4f1e-8cfa-ab39104c2c32
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/036a7bb6-e9ab-4003-820d-512fa1b48707/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=7e86a2c4-8170-4152-af60-04b88101e9d5&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=30556299-8b6f-404b-8ffa-af2979283dda&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
https://ps.atera.com/agentpackagesnet45/AgentPackageUpgradeAgent/27.6/AgentPackageUpgradeAgent.zip
unknown
https://ps.atera.com/agentpackagesmac/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
unknown
https://ps.atera.com/agentpackagesnet45/Agent.Package.IotPoc/0.2/Agent.Package.IotPoc.zip
unknown
https://ps.atera.com/agentpackagesmac/Agent.Package.Watchdog/1.7/Agent.Package.Watchdog.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=985e6a88-0b57-4d38-a817-216eb6ef36a4
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/036a7bb6-e9ab-4003-820d-512fa1b48707/heartbeat?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=13748a53-9ba4-4d0b-89eb-106bb5773f70&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
https://www.newtonsoft.com/json
unknown
https://agent-api.atera.com/Production/Agent/Age
unknown
http://wixtoolset.org/news/
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/036a7bb6-e9ab-4003-820d
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=b1f9d30a-4d02-478f-8a1f-0bd9525f8618
unknown
https://ps.atera.com/agentpackageswin/AgentPackageAgentInformation/22.7/AgentPackageAgentInformation
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/036a7bb6-e9ab-4003-820d-512fa1b48707/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=52166139-0835-47a8-ba03-8e3021aadb32&tr=33&tt=17324439964531271&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
https://ps.atera.com/agentpackagesnet45/AgentPackageOsUpdates/20.9/AgentPackageOsUpdates.zip
unknown
https://agent-api.aterD
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageNetworkDiscovery/13.0/AgentPackageNetworkDiscovery
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/036a7bb6-e9ab-4003-820d-512fa1b48707/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=7cb6273b-9aee-4659-b8d3-39f4cff22a24&tt=0&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
https://ps.atera.com/agentpackageswin/Agent.Package.IotPoc/13.0/Agent.Package.IotPoc.zip
unknown
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=198af10c-e838-4982-a564-e08a82a398e4
unknown
https://ps.pndsn.com/v
unknown
https://agent-api.atera.com/Production/Agent/AcknowledgeCommands
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/channel/036a7bb6-e9ab-4003-820d-512fa1b48707/leave?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=19e1beb7-925e-45d7-a87b-447402156469&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
https://ps.atera.com/agentpackagesmac/AgentPackageTaskScheduler/13.0/AgentPackageTaskScheduler.zip
unknown
https://ps.atera.com/agentpackagesmac/AgentPackageAgentInformation/38.0/AgentPackageAgentInformation
unknown
http://msdn.microsoft.K/
unknown
https://agent-api.P
unknown
http://www.w3.o
unknown
https://ps.pndsn.com/v2/presence/sub_key/sub-c-a02ceca8-a958-11e5-bd8c-061~=
unknown
https://ps.atera.com/agentpackagescrossplatform/AgentPackageAgentInformation/1.13/AgentPackageA
unknown
https://ps.atera.com/agentpackagesnet45/AgentPackageAgentInformation/38.0/AgentPackageAgentInformati
unknown
https://agent-api.atera.com/Production/Agent/GetCommandsFallback
unknown
https://ps.pndsn.com/v2/subscribe/sub-c-a02ceca8-a958-11e5-bd8c-0619f8945a4f/036a7bb6-e9ab-4003-820d-512fa1b48707/0?heartbeat=93&pnsdk=NET45CSharp6.13.0.0&requestid=9dbd0473-c525-491a-8cab-a2fddc92f86f&tr=33&tt=17324439224725513&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=b1f9d30a-4d02-478f-8a1f-0bd9525f8618&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
https://ps.pndsn.com/time/0?pnsdk=NET45CSharp6.13.0.0&requestid=254b40c1-e391-4dc5-a3fc-b4191829120e&uuid=036a7bb6-e9ab-4003-820d-512fa1b48707
13.232.67.199
https://ps.atera.com/agentpackagesnet45/AgentPackageRuntimeInstaller/1.6/AgentPackageRuntimeInstalle
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ps.pndsn.com
13.232.67.199
bg.microsoft.map.fastly.net
199.232.210.172
d25btwd9wax8gu.cloudfront.net
108.158.75.46
fp2e7a.wpc.phicdn.net
192.229.221.95
ps.atera.com
unknown
agent-api.atera.com
unknown

IPs

IP
Domain
Country
Malicious
13.232.67.199
ps.pndsn.com
United States
108.158.75.46
d25btwd9wax8gu.cloudfront.net
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\47e055.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\47e055.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB9EFD7FDAF9AD115987000E181661F5
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\CD868C8CE5A308147ABB306D829266BC
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\C32B8CE0327C1E141950B4C9C2AD4DA7
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\1D9B1B1F0B1FC024D9390FE4B94D97D5
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\007F59F54ACD08842B2D98A10E6D1E3A
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\AB25C26F7C51D3C4AA2BED5600F46956
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01010F83113E72A4C81AD77422D2F947
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Components\01D9DC4B27DFC0340B543A11D3CEBE07
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\ATERA Networks\AteraAgent\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Program Files (x86)\ATERA Networks\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
LocalPackage
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Size
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
AuthorizedCDFPrefix
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Comments
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
HelpTelephone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
InstallSource
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
ModifyPath
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Readme
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Size
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
EstimatedSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
WindowsInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\InstallProperties
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{E732A0D7-A2F2-4657-AC41-B19742648E45}
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Features\7D0A237E2F2A7564CA141B792446E854
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Features
INSTALLFOLDER_files_Feature
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\7D0A237E2F2A7564CA141B792446E854\Patches
AllPatches
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
ProductName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
PackageCode
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Language
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Version
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Assignment
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
AdvertiseFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
InstanceType
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
AuthorizedLUAApp
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
DeploymentFlags
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\UpgradeCodes\25F46F8180ECF4345A1FA7A8935DE9AE
7D0A237E2F2A7564CA141B792446E854
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
PackageName
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Net
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList\Media
1
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854
Clients
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\Installer\Products\7D0A237E2F2A7564CA141B792446E854\SourceList
LastUsedSource
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\MUI\StringCacheSettings
StringCacheGeneration
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\rundll32_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
AutoBackupLogFiles
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AteraAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
AccountId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
IntegratorLogin
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
CompanyId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
AgentId
HKEY_LOCAL_MACHINE\SOFTWARE\ATERA Networks\AlphaAgent
ServerName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\AlphaAgent
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AteraAgent_RASMANCS
FileDirectory
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERS.DEFAULT\Software\Classes\Local Settings\MuiCache\1f\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
HKEY_USERS.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates\7B0F360B775F76C94A12CA48445AA2D2A875701C
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DDFB16CD4931C973A2037D3FC83A4D7D775D05E4
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\AgentPackageAgentInformation_RASMANCS
FileDirectory
There are 135 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1C717BB1000
trusted library allocation
page read and write
malicious
1DD52F31000
trusted library allocation
page read and write
malicious
1A39A57E000
heap
page read and write
malicious
1A3FF3A0000
heap
page read and write
malicious
1A0DA9DB000
heap
page read and write
malicious
1A39A5A6000
heap
page read and write
malicious
1A0DB121000
trusted library allocation
page read and write
malicious
1A3FF316000
heap
page read and write
malicious
1A0DA9BB000
heap
page read and write
malicious
1A0DB1DF000
trusted library allocation
page read and write
malicious
281D9151000
trusted library allocation
page read and write
malicious
1A3FF0A2000
unkown
page readonly
malicious
1DD526AD000
heap
page read and write
malicious
1C717172000
unkown
page readonly
malicious
1DD5300E000
trusted library allocation
page read and write
malicious
1C717300000
heap
page read and write
malicious
1DD52E9E000
trusted library allocation
page read and write
malicious
1A39A530000
heap
page read and write
malicious
281D881B000
heap
page read and write
malicious
1A381B05000
trusted library allocation
page read and write
malicious
1A39A32A000
heap
page read and write
malicious
4534000
trusted library allocation
page read and write
malicious
1DD524C0000
heap
page read and write
malicious
1DD52E31000
trusted library allocation
page read and write
malicious
1C717580000
heap
page read and write
malicious
1DD6B502000
heap
page read and write
malicious
1A0DAC00000
heap
page read and write
malicious
1A381B4C000
trusted library allocation
page read and write
malicious
1C717391000
heap
page read and write
malicious
41B7000
heap
page read and write
malicious
1A3819D1000
trusted library allocation
page read and write
malicious
1A3FF372000
heap
page read and write
malicious
4B2C000
heap
page read and write
malicious
1A3FF310000
heap
page read and write
malicious
1A381A8A000
trusted library allocation
page read and write
malicious
42E1000
trusted library allocation
page read and write
malicious
1DD53091000
trusted library allocation
page read and write
malicious
1C717522000
unkown
page readonly
malicious
1DD6B9A0000
heap
page read and write
malicious
1DD6B5C0000
heap
page read and write
malicious
281D8BA0000
heap
page read and write
malicious
1A381B36000
trusted library allocation
page read and write
malicious
1A3FF331000
heap
page read and write
malicious
1A381A59000
trusted library allocation
page read and write
malicious
281D87E0000
heap
page read and write
malicious
7FF848B34000
trusted library allocation
page read and write
malicious
1A0DA9A0000
heap
page read and write
malicious
1A0DAA5B000
heap
page read and write
malicious
1A3FF580000
heap
page read and write
malicious
281D9197000
trusted library allocation
page read and write
malicious
1A0DB167000
trusted library allocation
page read and write
malicious
281D87E9000
heap
page read and write
malicious
281D91D3000
trusted library allocation
page read and write
malicious
281D920F000
trusted library allocation
page read and write
malicious
1DD52670000
heap
page read and write
malicious
1DD53132000
trusted library allocation
page read and write
malicious
1C717C33000
trusted library allocation
page read and write
malicious
1A0DB1A3000
trusted library allocation
page read and write
malicious
1A0DB193000
trusted library allocation
page read and write
malicious
1DD52860000
heap
page read and write
malicious
1A381B02000
trusted library allocation
page read and write
malicious
1DD6BA70000
heap
page read and write
malicious
17E17C5000
stack
page read and write
malicious
4491000
trusted library allocation
page read and write
malicious
1A0DAA23000
heap
page read and write
malicious
1A381A84000
trusted library allocation
page read and write
malicious
281D8825000
heap
page read and write
malicious
1C717C23000
trusted library allocation
page read and write
malicious
4384000
trusted library allocation
page read and write
malicious
1C71730C000
heap
page read and write
malicious
281D91C3000
trusted library allocation
page read and write
malicious
281D8869000
heap
page read and write
malicious
45AE000
heap
page read and write
malicious
1A381A5C000
trusted library allocation
page read and write
malicious
1DD526F8000
heap
page read and write
malicious
1A0DA9A8000
heap
page read and write
malicious
1A3FF352000
heap
page read and write
malicious
1C717344000
heap
page read and write
malicious
1A381A99000
trusted library allocation
page read and write
malicious
1DD526CD000
heap
page read and write
malicious
281D8FF9000
heap
page read and write
malicious
409F000
heap
page read and write
malicious
1A381A82000
trusted library allocation
page read and write
malicious
66B0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
7FF848960000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
6790000
heap
page read and write
1DD52FF2000
trusted library allocation
page read and write
82BF0FF000
stack
page read and write
4200000
trusted library allocation
page read and write
4170000
heap
page readonly
4390000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
47E000
stack
page read and write
281D9095000
heap
page read and write
847000
heap
page read and write
2A00000
heap
page read and write
6700000
trusted library allocation
page read and write
7FF848B60000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
1C717490000
trusted library allocation
page read and write
17E21FE000
stack
page read and write
4523000
trusted library allocation
page read and write
281D8B60000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
7130000
trusted library allocation
page execute and read and write
1A0F3A08000
heap
page read and write
66F0000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
40CB000
trusted library allocation
page execute and read and write
2828000
heap
page read and write
66B0000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
26D0000
trusted library allocation
page read and write
70ED000
stack
page read and write
27A0000
heap
page read and write
7FF848B4D000
trusted library allocation
page read and write
1DD6BF03000
heap
page read and write
1DD52C83000
heap
page read and write
43E0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
3F80000
trusted library allocation
page read and write
1DD62EB2000
trusted library allocation
page read and write
45DF000
heap
page read and write
43E0000
trusted library allocation
page read and write
17E3737000
stack
page read and write
66F0000
trusted library allocation
page read and write
7FF848A66000
trusted library allocation
page execute and read and write
2AEA000
heap
page read and write
4587000
trusted library allocation
page execute and read and write
7FF8489BC000
trusted library allocation
page execute and read and write
66F0000
trusted library allocation
page read and write
7FF848973000
trusted library allocation
page read and write
7FF848B46000
trusted library allocation
page read and write
692E000
stack
page read and write
43E0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
4BFE000
stack
page read and write
2605000
heap
page read and write
43E0000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page read and write
7FF848A40000
trusted library allocation
page execute and read and write
43E0000
trusted library allocation
page read and write
1DD52ED4000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
ABAA4FE000
stack
page read and write
43E0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
1DD6B80E000
unkown
page readonly
26F9000
heap
page read and write
17E3131000
stack
page read and write
6720000
trusted library allocation
page execute and read and write
66D0000
trusted library allocation
page read and write
7389DFE000
stack
page read and write
1DD53002000
trusted library allocation
page read and write
1C730322000
unkown
page readonly
7FF8489AB000
trusted library allocation
page execute and read and write
1DD5325E000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
7FF848BE0000
trusted library allocation
page execute and read and write
4310000
trusted library allocation
page read and write
6CB9000
heap
page read and write
1DD53761000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
1A39A150000
heap
page execute and read and write
40D0000
heap
page read and write
4B90000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
40C7000
trusted library allocation
page execute and read and write
17E3E31000
stack
page read and write
66D0000
trusted library allocation
page read and write
1DD6B530000
heap
page read and write
66F0000
trusted library allocation
page read and write
17E2D3B000
stack
page read and write
4390000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
7FF848B23000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
4203000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
1DD52690000
heap
page read and write
69CE000
stack
page read and write
66F0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
ABAAEFE000
stack
page read and write
43E0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
1C7304AA000
heap
page read and write
66F0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
A5E000
unkown
page read and write
66F0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
82BEFFE000
stack
page read and write
1A3FF0A0000
unkown
page readonly
41E8000
heap
page read and write
43F0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
10A05FF000
stack
page read and write
7FF848B55000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
7388AF5000
stack
page read and write
6700000
trusted library allocation
page read and write
42AE000
stack
page read and write
855000
heap
page read and write
66D0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
7FF848A1C000
trusted library allocation
page execute and read and write
66B0000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
1DD5310D000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
6C84000
heap
page read and write
1DD62E51000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
17E3D3B000
stack
page read and write
43F0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
1DD62E3E000
trusted library allocation
page read and write
7FC88000
trusted library allocation
page execute and read and write
66F0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
1DD53415000
trusted library allocation
page read and write
ABAAAFE000
stack
page read and write
66F0000
trusted library allocation
page read and write
7FF84896D000
trusted library allocation
page execute and read and write
7FF848980000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
1DD6BEF6000
heap
page read and write
43E0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
1DD6BB87000
heap
page read and write
66D0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
4BB0000
trusted library allocation
page read and write
4AE000
stack
page read and write
43C0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
43E3000
trusted library allocation
page read and write
281D918D000
trusted library allocation
page read and write
6714000
trusted library allocation
page read and write
66E0000
trusted library allocation
page read and write
4090000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
7FF848BB0000
trusted library allocation
page execute and read and write
1DD53268000
trusted library allocation
page read and write
7FF848B1D000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
1831CD00000
heap
page read and write
43E0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
7FF848BD0000
trusted library allocation
page execute and read and write
43F0000
trusted library allocation
page read and write
2EE0000
heap
page read and write
43C0000
trusted library allocation
page read and write
17E3F3C000
stack
page read and write
43E0000
trusted library allocation
page read and write
45B0000
trusted library allocation
page read and write
66B5000
trusted library allocation
page read and write
66F3000
trusted library allocation
page read and write
28C0000
heap
page read and write
43E0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
281D8DA5000
heap
page read and write
2741000
heap
page read and write
43E0000
trusted library allocation
page read and write
26EE000
heap
page read and write
40A0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
7FF848B10000
trusted library allocation
page read and write
7FF848A16000
trusted library allocation
page read and write
1DD52FFA000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
1A39A553000
heap
page read and write
4390000
trusted library allocation
page read and write
72CE000
stack
page read and write
43F0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
1DD52F2F000
trusted library allocation
page read and write
84B000
heap
page read and write
66FE000
trusted library allocation
page read and write
6AFE000
stack
page read and write
43E0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
7FF848AE3000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
2837000
heap
page read and write
4B97000
trusted library allocation
page execute and read and write
43F0000
trusted library allocation
page read and write
43C6000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
1DD52F08000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
1DD52660000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
7FF848B10000
trusted library allocation
page read and write
4CF357F000
stack
page read and write
43E0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
5785000
trusted library allocation
page read and write
7FF84894D000
trusted library allocation
page execute and read and write
1A0DAAA0000
heap
page read and write
2EE0000
heap
page read and write
17E1CFE000
stack
page read and write
66D0000
trusted library allocation
page read and write
147000
stack
page read and write
6700000
trusted library allocation
page read and write
1A0DAD85000
heap
page read and write
7FF84897D000
trusted library allocation
page execute and read and write
4390000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
1C71734B000
heap
page read and write
7FF848C20000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
1DD6B760000
unkown
page readonly
43E0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
2704000
heap
page read and write
1C7174B0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
281D8B40000
trusted library allocation
page read and write
1DD52E20000
heap
page execute and read and write
4330000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
4580000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
1DD6BB96000
heap
page read and write
66D0000
trusted library allocation
page read and write
7FF848A26000
trusted library allocation
page execute and read and write
66D0000
trusted library allocation
page read and write
1A0F3A16000
heap
page read and write
4C80000
heap
page read and write
66D0000
trusted library allocation
page read and write
4331000
trusted library allocation
page read and write
82B000
heap
page read and write
1DD53326000
trusted library allocation
page read and write
6701000
trusted library allocation
page read and write
1C71719C000
unkown
page readonly
43F0000
trusted library allocation
page read and write
42B0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
678E000
stack
page read and write
7FF848B80000
trusted library allocation
page read and write
7FF848A10000
trusted library allocation
page read and write
7FF848B20000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
7FF848942000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
5C95000
trusted library allocation
page read and write
7FF848B10000
trusted library allocation
page read and write
281F1A10000
heap
page execute and read and write
43E0000
trusted library allocation
page read and write
7FF848C90000
trusted library allocation
page execute and read and write
447E000
stack
page read and write
6700000
trusted library allocation
page read and write
48FF000
stack
page read and write
66F0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
6C6E000
stack
page read and write
4400000
trusted library allocation
page read and write
4510000
heap
page read and write
43EC000
trusted library allocation
page read and write
4553000
trusted library allocation
page execute and read and write
7FF84896D000
trusted library allocation
page execute and read and write
66F0000
trusted library allocation
page read and write
427C000
trusted library allocation
page execute and read and write
1DD6BEBF000
heap
page read and write
66B0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
7FF848D50000
trusted library allocation
page read and write
1DD52843000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
734E000
stack
page read and write
43E0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
7FF848B56000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
70AE000
stack
page read and write
1DD6B9DE000
heap
page read and write
66F0000
trusted library allocation
page read and write
66B5000
trusted library allocation
page read and write
7FF848A80000
trusted library allocation
page execute and read and write
279F000
heap
page read and write
43C0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
69AF000
stack
page read and write
1A0DB15B000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
6CC0000
heap
page read and write
66D0000
trusted library allocation
page read and write
7FF848984000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
7119000
trusted library allocation
page execute and read and write
66F0000
trusted library allocation
page read and write
1DD52F14000
trusted library allocation
page read and write
ABAA3FE000
stack
page read and write
1C730483000
heap
page read and write
1DD52E9A000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
6B30000
trusted library allocation
page execute and read and write
7FF848B20000
trusted library allocation
page read and write
1A0DAC20000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
855000
heap
page read and write
4395000
trusted library allocation
page read and write
1A39A59C000
heap
page read and write
43F0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
1DD6B762000
unkown
page readonly
4400000
trusted library allocation
page read and write
281D8821000
heap
page read and write
1A0F3AD0000
heap
page execute and read and write
66F0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
2F9F000
heap
page read and write
4764000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
4CF367E000
stack
page read and write
6B6F000
stack
page read and write
1DD6BE96000
heap
page read and write
43C0000
trusted library allocation
page read and write
4CF347D000
stack
page read and write
66B0000
trusted library allocation
page read and write
10A01FE000
stack
page read and write
1C717BA0000
heap
page read and write
1DD6AE60000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
7FF848D20000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
43E1000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
724F000
stack
page read and write
4400000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
7060000
trusted library allocation
page read and write
1A3FF270000
heap
page read and write
43C0000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
2737000
heap
page read and write
1DD526F6000
heap
page read and write
4D2C000
heap
page read and write
29D0000
heap
page execute and read and write
41F0000
trusted library allocation
page read and write
1DD6BB20000
heap
page read and write
1DD53496000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
27C3000
heap
page read and write
43E0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
7FF848B70000
trusted library allocation
page read and write
1A0F39BF000
heap
page read and write
6B4E000
stack
page read and write
7FF848B70000
trusted library allocation
page read and write
1C7303D0000
heap
page read and write
66D0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
1A0F3A4D000
heap
page read and write
27C6000
heap
page read and write
66F0000
trusted library allocation
page read and write
1C730485000
heap
page read and write
422E000
stack
page read and write
10B000
stack
page read and write
43E0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
6630000
trusted library allocation
page read and write
2F40000
heap
page read and write
43C0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
71B0000
heap
page read and write
7FF848B50000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
6CA0000
heap
page read and write
43E0000
trusted library allocation
page read and write
1DD52F04000
trusted library allocation
page read and write
31BD000
stack
page read and write
2C7E000
stack
page read and write
66F0000
trusted library allocation
page read and write
3F60000
heap
page read and write
43F0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
1C717515000
heap
page read and write
4420000
trusted library allocation
page read and write
17E26BE000
stack
page read and write
6700000
trusted library allocation
page read and write
284C000
heap
page read and write
1C7303DB000
heap
page read and write
7100000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
4554000
trusted library allocation
page read and write
17E27BE000
unkown
page read and write
43C0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
2B2B000
heap
page read and write
1C717400000
heap
page read and write
7FF848960000
trusted library allocation
page read and write
31FD000
stack
page read and write
4390000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
29FD000
stack
page read and write
281D8806000
heap
page read and write
7FF848964000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
2A6F000
stack
page read and write
1DD6BB7F000
heap
page read and write
1A39A314000
heap
page read and write
17E1EFE000
stack
page read and write
ABAABFE000
stack
page read and write
4400000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
1C717170000
unkown
page readonly
7FF848B60000
trusted library allocation
page execute and read and write
1DD5300A000
trusted library allocation
page read and write
1DD534A7000
trusted library allocation
page read and write
2F60000
heap
page read and write
4540000
trusted library allocation
page read and write
1C730320000
unkown
page readonly
43E0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
283B000
stack
page read and write
4430000
trusted library allocation
page read and write
7FF848A30000
trusted library allocation
page read and write
66B9000
trusted library allocation
page read and write
7FF848B59000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
1A381B4A000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
1A39A57A000
heap
page read and write
1C717D01000
trusted library allocation
page read and write
17E3C37000
stack
page read and write
1DD6BDA2000
unkown
page readonly
66D0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
7FF848964000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
7FF848B60000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
7FF848B80000
trusted library allocation
page read and write
26EC000
heap
page read and write
66B0000
trusted library allocation
page read and write
73891FE000
stack
page read and write
1A0F39E3000
heap
page read and write
82B000
heap
page read and write
66F0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
6730000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
1A39A336000
heap
page read and write
7180000
trusted library allocation
page read and write
1831CCF5000
heap
page read and write
1DD52ED0000
trusted library allocation
page read and write
10A09FE000
stack
page read and write
66F0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
1C717538000
unkown
page readonly
4B60000
trusted library allocation
page read and write
66F4000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
54C000
stack
page read and write
43E0000
trusted library allocation
page read and write
1A3FF590000
unkown
page readonly
1DD52F0C000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
7FF8489A0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
281D9293000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
43D0000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
284C000
heap
page read and write
26CA000
heap
page read and write
43C0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
29B5000
heap
page read and write
2705000
trusted library allocation
page execute and read and write
66F0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
73895FC000
stack
page read and write
4400000
trusted library allocation
page read and write
1E0000
heap
page read and write
66D0000
trusted library allocation
page read and write
1DD6BB62000
heap
page read and write
5C91000
trusted library allocation
page read and write
7F698000
trusted library allocation
page execute and read and write
43E0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
7FF848BE0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
66B5000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
6CCF000
heap
page read and write
66F0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
17E2F37000
stack
page read and write
429F000
heap
page read and write
66F0000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
1C71738E000
heap
page read and write
43E0000
trusted library allocation
page read and write
66FC000
trusted library allocation
page read and write
1A0EB12D000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
26E4000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
1DD53167000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
7FF4579C0000
trusted library allocation
page execute and read and write
7FF84895D000
trusted library allocation
page execute and read and write
43F0000
trusted library allocation
page read and write
7FF848B60000
trusted library allocation
page execute and read and write
66B0000
trusted library allocation
page read and write
66E0000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
1A39A321000
heap
page read and write
1DD52EB3000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
4370000
trusted library allocation
page read and write
70F0000
trusted library allocation
page read and write
281D8740000
heap
page read and write
7389CFC000
stack
page read and write
7FF848B60000
trusted library allocation
page execute and read and write
1DD52640000
trusted library allocation
page read and write
66C0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
7FF848980000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
1DD53262000
trusted library allocation
page read and write
ABAA8FF000
stack
page read and write
66D0000
trusted library allocation
page read and write
70F3000
trusted library allocation
page read and write
7FF848A00000
trusted library allocation
page execute and read and write
4390000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
4590000
heap
page read and write
43C0000
trusted library allocation
page read and write
412E000
stack
page read and write
66B0000
trusted library allocation
page read and write
1DD6BF13000
heap
page read and write
26D4000
trusted library allocation
page read and write
1831CBF0000
heap
page read and write
1A39A545000
heap
page read and write
6700000
trusted library allocation
page read and write
ABA9F31000
stack
page read and write
7FF848A36000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
F0E000
stack
page read and write
6710000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
329E000
stack
page read and write
4B50000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
855000
heap
page read and write
66B0000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
7FF848983000
trusted library allocation
page execute and read and write
7FF848A46000
trusted library allocation
page execute and read and write
66D0000
trusted library allocation
page read and write
1A39A310000
heap
page read and write
4B63000
trusted library allocation
page execute and read and write
48BE000
stack
page read and write
43E0000
trusted library allocation
page read and write
73899FC000
stack
page read and write
66B0000
trusted library allocation
page read and write
82BEDFE000
stack
page read and write
52E5000
trusted library allocation
page read and write
4420000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
7FF848B40000
trusted library allocation
page read and write
1DD6BA24000
heap
page read and write
43E0000
trusted library allocation
page read and write
4093000
trusted library allocation
page execute and read and write
2600000
heap
page read and write
1A3FF40E000
heap
page read and write
1DD52FFE000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
2707000
heap
page read and write
1DD53322000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
2707000
trusted library allocation
page execute and read and write
43E4000
trusted library allocation
page read and write
1DD52EBE000
trusted library allocation
page read and write
433D000
trusted library allocation
page read and write
7FF8489AD000
trusted library allocation
page execute and read and write
6700000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
7FF848B5E000
trusted library allocation
page read and write
281D883B000
heap
page read and write
1DD6BDA0000
unkown
page readonly
4273000
trusted library allocation
page read and write
2F03000
heap
page read and write
281D882B000
heap
page read and write
45FE000
stack
page read and write
66F0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
1C717440000
heap
page read and write
66F0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
2F18000
heap
page read and write
73893FE000
stack
page read and write
6710000
trusted library allocation
page read and write
7FF848C50000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
17E303C000
stack
page read and write
66B0000
trusted library allocation
page read and write
7FF848BB0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
1A39A325000
heap
page read and write
4400000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
7FF848B23000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
44D8000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
7FF848A80000
trusted library allocation
page execute and read and write
1A39A240000
heap
page read and write
7FF848B80000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
1DD52EFC000
trusted library allocation
page read and write
1DD52865000
heap
page read and write
66B0000
trusted library allocation
page read and write
26E0000
heap
page read and write
43E0000
trusted library allocation
page read and write
71C0000
heap
page execute and read and write
4400000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
82BE7FE000
stack
page read and write
7FF848B30000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
1A3FF585000
heap
page read and write
66B0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
6730000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
1DD53260000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
3020000
heap
page read and write
43E000
stack
page read and write
42BD000
trusted library allocation
page execute and read and write
1DD52F2D000
trusted library allocation
page read and write
7FF848C10000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
4410000
trusted library allocation
page execute and read and write
43D2000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
2670000
heap
page read and write
738A0FE000
stack
page read and write
73898FC000
stack
page read and write
1C717CDF000
trusted library allocation
page read and write
17E3629000
stack
page read and write
4390000
trusted library allocation
page read and write
1DD52610000
heap
page read and write
1C717220000
heap
page read and write
1A0DB263000
trusted library allocation
page read and write
ADE000
stack
page read and write
66F0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
281D918F000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
82BE9FE000
stack
page read and write
43C0000
trusted library allocation
page read and write
1A0EB131000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
1DD6B960000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
7FF848982000
trusted library allocation
page read and write
7FC70000
trusted library allocation
page execute and read and write
4390000
trusted library allocation
page read and write
10A07FE000
stack
page read and write
6700000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
7FF848B90000
trusted library allocation
page execute and read and write
43E0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
270B000
trusted library allocation
page execute and read and write
6CBB000
heap
page read and write
2690000
heap
page read and write
66F0000
trusted library allocation
page read and write
1A0F3A34000
heap
page read and write
66B4000
trusted library allocation
page read and write
7FF84898B000
trusted library allocation
page execute and read and write
41DC000
stack
page read and write
2CE0000
heap
page read and write
4390000
trusted library allocation
page read and write
4270000
trusted library allocation
page read and write
32F0000
heap
page read and write
40C5000
trusted library allocation
page execute and read and write
43E0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
4920000
heap
page read and write
4390000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
6730000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
7FF848984000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
4370000
trusted library allocation
page read and write
82D000
heap
page read and write
43C0000
trusted library allocation
page read and write
7FF848A3C000
trusted library allocation
page execute and read and write
7FF848BC0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
281D881F000
heap
page read and write
1A39A59E000
heap
page read and write
1A39A540000
heap
page read and write
43E0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
1DD52FCE000
trusted library allocation
page read and write
696E000
stack
page read and write
2B12000
heap
page read and write
6CA0000
heap
page read and write
17E263E000
stack
page read and write
4420000
trusted library allocation
page read and write
2AAE000
stack
page read and write
43E0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
7F8E0000
trusted library allocation
page execute and read and write
66D0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
4370000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
4640000
heap
page readonly
7FF848B90000
trusted library allocation
page read and write
2B46000
heap
page read and write
66B0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
7FF848B1A000
trusted library allocation
page read and write
2F89000
heap
page read and write
4404000
trusted library allocation
page read and write
17E2E29000
stack
page read and write
1DD52E8B000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
1DD6B5F0000
heap
page execute and read and write
43C0000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
6C70000
heap
page read and write
4390000
trusted library allocation
page read and write
4690000
heap
page read and write
66F0000
trusted library allocation
page read and write
1831CCD0000
heap
page read and write
17E233F000
stack
page read and write
82BE8FE000
stack
page read and write
1DD6BF07000
heap
page read and write
4C50000
heap
page readonly
43E0000
trusted library allocation
page read and write
82BEAFD000
stack
page read and write
281D8BA5000
heap
page read and write
4B6D000
trusted library allocation
page execute and read and write
17E3B39000
stack
page read and write
7FF848BC0000
trusted library allocation
page execute and read and write
43E0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
73896FB000
stack
page read and write
1DD6BEFD000
heap
page read and write
66F0000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
1A39A2C3000
heap
page read and write
2DFE000
stack
page read and write
1A3FF510000
heap
page read and write
66F0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
1A0EB121000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
A9E000
stack
page read and write
17E1DFD000
stack
page read and write
4280000
heap
page read and write
43E0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
1A3919D1000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
73890FF000
stack
page read and write
7FF848BE6000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
1A0F39A0000
heap
page read and write
6700000
trusted library allocation
page read and write
7FF848980000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
1C0000
heap
page read and write
43E0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
ABAA9FE000
stack
page read and write
7FF848B3E000
trusted library allocation
page read and write
4526000
trusted library allocation
page read and write
43E0000
trusted library allocation
page execute and read and write
1DD5268C000
heap
page read and write
43E0000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
7FF848B99000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
43B0000
heap
page execute and read and write
66F0000
trusted library allocation
page execute and read and write
6700000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
1DD53419000
trusted library allocation
page read and write
43B4000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
2F79000
heap
page read and write
281D927F000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
26E5000
heap
page read and write
43F0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
4670000
trusted library allocation
page execute and read and write
4760000
trusted library allocation
page read and write
1DD52F23000
trusted library allocation
page read and write
1C717D05000
trusted library allocation
page read and write
281D8866000
heap
page read and write
2B5F000
heap
page read and write
82BF1FD000
stack
page read and write
43C0000
trusted library allocation
page read and write
7FF848970000
trusted library allocation
page read and write
1A39A2FA000
heap
page read and write
43F0000
trusted library allocation
page read and write
44ED000
trusted library allocation
page read and write
855000
heap
page read and write
2700000
trusted library allocation
page read and write
463F000
stack
page read and write
7FF84898B000
trusted library allocation
page execute and read and write
7FF8489A4000
trusted library allocation
page read and write
321E000
stack
page read and write
43C0000
trusted library allocation
page read and write
4C3E000
stack
page read and write
42D0000
heap
page read and write
1A3FF0A0000
unkown
page readonly
43E0000
trusted library allocation
page read and write
27B9000
heap
page read and write
281D8770000
heap
page read and write
4576000
trusted library allocation
page read and write
6C2E000
stack
page read and write
6740000
trusted library allocation
page read and write
7FF84898D000
trusted library allocation
page execute and read and write
4550000
trusted library allocation
page read and write
281E9151000
trusted library allocation
page read and write
1A0DB15F000
trusted library allocation
page read and write
1A3FF358000
heap
page read and write
43E0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
7388FFF000
stack
page read and write
7FF848B90000
trusted library allocation
page read and write
26C0000
trusted library allocation
page read and write
6BA0000
heap
page execute and read and write
3F90000
heap
page read and write
43E0000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
82BF2FE000
stack
page read and write
7FF848984000
trusted library allocation
page read and write
44F0000
trusted library section
page read and write
6700000
trusted library allocation
page read and write
2F7B000
heap
page read and write
66B0000
trusted library allocation
page read and write
1C73045F000
heap
page read and write
7FF848962000
trusted library allocation
page read and write
281D92A5000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
1DD526AF000
heap
page read and write
6700000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
1A39A2A8000
heap
page read and write
43F1000
trusted library allocation
page read and write
6B8E000
stack
page read and write
43D0000
trusted library allocation
page read and write
5781000
trusted library allocation
page read and write
2E3B000
stack
page read and write
66B0000
trusted library allocation
page read and write
1A0F3A31000
heap
page read and write
1C717CF3000
trusted library allocation
page read and write
73892FE000
stack
page read and write
7FF848B30000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
7389BFC000
stack
page read and write
66D0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
4C91000
trusted library allocation
page read and write
17E403D000
stack
page read and write
6C10000
remote allocation
page read and write
6C90000
heap
page read and write
6730000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
1C71738C000
heap
page read and write
43C0000
trusted library allocation
page read and write
1DD6BA28000
heap
page read and write
4400000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
73897FE000
stack
page read and write
7FF84899D000
trusted library allocation
page execute and read and write
5495000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
437B000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
1A0DAAE0000
heap
page read and write
6700000
trusted library allocation
page read and write
281D8FF0000
heap
page read and write
66F0000
trusted library allocation
page read and write
1A3FF39B000
heap
page read and write
66E0000
trusted library allocation
page read and write
7F680000
trusted library allocation
page execute and read and write
1A3819B0000
heap
page execute and read and write
43F0000
trusted library allocation
page read and write
6C10000
remote allocation
page read and write
6CCD000
heap
page read and write
4260000
trusted library allocation
page read and write
7FF848A60000
trusted library allocation
page execute and read and write
1DD6BB70000
heap
page read and write
7FF84896D000
trusted library allocation
page execute and read and write
58C000
stack
page read and write
66F0000
trusted library allocation
page read and write
31B0000
heap
page read and write
43E0000
trusted library allocation
page read and write
6629000
trusted library allocation
page execute and read and write
40C0000
trusted library allocation
page read and write
2ED0000
heap
page read and write
7FF848964000
trusted library allocation
page read and write
66BC000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
7FF848B06000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
2F74000
heap
page read and write
17E393D000
stack
page read and write
7050000
trusted library allocation
page execute and read and write
66B0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
7FF848B50000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
1DD53417000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
7FF848B20000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
7388BFE000
stack
page read and write
43F0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
4380000
trusted library allocation
page read and write
2E78000
stack
page read and write
1A0DB271000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
7FF848A3C000
trusted library allocation
page execute and read and write
66D0000
trusted library allocation
page read and write
7FF848C30000
trusted library allocation
page read and write
3555000
heap
page read and write
281D92A1000
trusted library allocation
page read and write
27AC000
heap
page read and write
43C0000
trusted library allocation
page read and write
1DD525C0000
heap
page read and write
1C730411000
heap
page read and write
43E0000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
7FF848B00000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
7FF84899C000
trusted library allocation
page execute and read and write
43E0000
trusted library allocation
page read and write
4582000
trusted library allocation
page read and write
41E0000
trusted library allocation
page execute and read and write
1C717520000
unkown
page readonly
17E22E9000
stack
page read and write
43F0000
trusted library allocation
page read and write
452B000
trusted library allocation
page read and write
7FF8489AB000
trusted library allocation
page execute and read and write
1A3919DF000
trusted library allocation
page read and write
7388DFE000
stack
page read and write
17E3329000
stack
page read and write
43E0000
trusted library allocation
page read and write
277B000
heap
page read and write
1DD525A0000
heap
page read and write
281D9099000
heap
page read and write
43F0000
trusted library allocation
page read and write
475E000
stack
page read and write
68CE000
stack
page read and write
66D0000
trusted library allocation
page read and write
25E5000
heap
page read and write
ABAA6FD000
stack
page read and write
1DD52F10000
trusted library allocation
page read and write
7FF848A66000
trusted library allocation
page execute and read and write
2702000
trusted library allocation
page read and write
1DD53121000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
4373000
trusted library allocation
page read and write
7FF848BA0000
trusted library allocation
page execute and read and write
1A3FF350000
heap
page read and write
43E0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
7FF848B25000
trusted library allocation
page read and write
2779000
heap
page read and write
6700000
trusted library allocation
page read and write
317F000
stack
page read and write
66B0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
7FF848B26000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
284C000
heap
page read and write
4395000
trusted library allocation
page read and write
1DD6B5BE000
heap
page read and write
6710000
trusted library allocation
page read and write
40E0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
4555000
trusted library allocation
page read and write
6790000
remote allocation
page read and write
66F0000
trusted library allocation
page read and write
1A39A230000
heap
page read and write
32DE000
stack
page read and write
7FF848B4D000
trusted library allocation
page read and write
10A00F1000
stack
page read and write
4390000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
7F6B8000
trusted library allocation
page execute and read and write
4390000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
7180000
trusted library allocation
page read and write
40C2000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
1A0DA8B0000
heap
page read and write
43E0000
trusted library allocation
page read and write
10A04FD000
stack
page read and write
7FF848AF0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
26F9000
heap
page read and write
6710000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
698D000
stack
page read and write
43C0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
1DD52ED9000
trusted library allocation
page read and write
85B000
heap
page read and write
66F0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
1A3FF150000
heap
page read and write
66B0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
7180000
trusted library allocation
page read and write
4376000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
7F6A0000
trusted library allocation
page execute and read and write
66F0000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
1DD53485000
trusted library allocation
page read and write
44E1000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
2780000
heap
page read and write
4BE000
stack
page read and write
6700000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
6C8F000
stack
page read and write
1DD52FCA000
trusted library allocation
page read and write
82BE6F0000
stack
page read and write
66F0000
trusted library allocation
page read and write
2704000
heap
page read and write
43E0000
trusted library allocation
page read and write
29F0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
1DD6BAAE000
heap
page read and write
47AE000
heap
page read and write
66F0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
AE0000
heap
page read and write
1C717CDC000
trusted library allocation
page read and write
7FF848A40000
trusted library allocation
page execute and read and write
66F0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
17E353E000
stack
page read and write
4560000
trusted library allocation
page read and write
1A3FF624000
unkown
page readonly
6CCD000
heap
page read and write
4390000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
29A0000
heap
page read and write
1DD6BA4F000
heap
page read and write
2EEA000
heap
page read and write
66D0000
trusted library allocation
page read and write
7FF848D10000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
7FF848B30000
trusted library allocation
page read and write
1DD6B4F0000
heap
page read and write
82F000
heap
page read and write
7FF848963000
trusted library allocation
page execute and read and write
66F0000
trusted library allocation
page read and write
281D88D1000
heap
page read and write
1DD6B4FE000
heap
page read and write
66D0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
2F0C000
heap
page read and write
66F0000
trusted library allocation
page read and write
66F1000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
855000
heap
page read and write
32F7000
heap
page read and write
66B0000
trusted library allocation
page read and write
7FF848C80000
trusted library allocation
page read and write
7FF8489DC000
trusted library allocation
page execute and read and write
7FF8489F6000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
1DD534A5000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
7180000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
7FF848B70000
trusted library allocation
page read and write
29E0000
trusted library allocation
page execute and read and write
1A0DB275000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
7FF8489DC000
trusted library allocation
page execute and read and write
4390000
trusted library allocation
page read and write
7389EFB000
stack
page read and write
43E0000
trusted library allocation
page read and write
26E0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
2F12000
heap
page read and write
43F0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
7FF848943000
trusted library allocation
page execute and read and write
7FF84898D000
trusted library allocation
page execute and read and write
2741000
heap
page read and write
7180000
trusted library allocation
page read and write
4320000
trusted library allocation
page execute and read and write
10A08FE000
stack
page read and write
6CCC000
stack
page read and write
6710000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
7FF848B70000
trusted library allocation
page read and write
82BEBFF000
stack
page read and write
43E0000
trusted library allocation
page read and write
2EC0000
heap
page read and write
7FF848C00000
trusted library allocation
page execute and read and write
7389FFB000
stack
page read and write
690E000
stack
page read and write
281D9075000
heap
page read and write
47FF000
stack
page read and write
4420000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
1C71732C000
heap
page read and write
29B0000
heap
page read and write
7FF8489F0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
1831CD28000
heap
page read and write
7FF848B30000
trusted library allocation
page read and write
2AE0000
heap
page read and write
17E2B2D000
stack
page read and write
1C717170000
unkown
page readonly
43E0000
trusted library allocation
page read and write
1A3FF33C000
heap
page read and write
1DD534A1000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
7FF848940000
trusted library allocation
page read and write
7FF848B79000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
1DD6BA60000
heap
page read and write
1DD6BEA6000
heap
page read and write
266E000
stack
page read and write
1DD53266000
trusted library allocation
page read and write
6B80000
trusted library allocation
page read and write
2853000
heap
page read and write
281D918B000
trusted library allocation
page read and write
4399000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
7FF848B50000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
346F000
stack
page read and write
43E0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
17E3229000
stack
page read and write
66B0000
trusted library allocation
page read and write
7FF848B75000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
7FF848BA0000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
278E000
heap
page read and write
43E0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
4781000
trusted library allocation
page read and write
7FF848983000
trusted library allocation
page execute and read and write
7FF848BA0000
trusted library allocation
page execute and read and write
4390000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
1A3FF515000
heap
page read and write
66F0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
817000
heap
page read and write
852000
heap
page read and write
7FF848B20000
trusted library allocation
page read and write
43D0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
1DD52C70000
heap
page read and write
1DD53494000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
2F68000
heap
page read and write
1DD6B970000
heap
page execute and read and write
43E0000
trusted library allocation
page read and write
1DD52697000
heap
page read and write
1DD6BABC000
heap
page read and write
6B10000
trusted library allocation
page read and write
5D0000
heap
page read and write
7FF848B00000
trusted library allocation
page read and write
6650000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
6B00000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
1C727BC1000
trusted library allocation
page read and write
1831CCF0000
heap
page read and write
43E0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
1DD53006000
trusted library allocation
page read and write
17E2C2A000
stack
page read and write
1A3819C0000
heap
page read and write
1A0DA9E3000
heap
page read and write
43E0000
trusted library allocation
page read and write
281E915D000
trusted library allocation
page read and write
6C10000
remote allocation
page read and write
1A0DAD80000
heap
page read and write
1DD53411000
trusted library allocation
page read and write
4328000
trusted library allocation
page read and write
1A3817F0000
trusted library allocation
page read and write
7FF848D40000
trusted library allocation
page read and write
26ED000
heap
page read and write
7388CFF000
stack
page read and write
1DD52FF6000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
1A381960000
heap
page read and write
66F0000
trusted library allocation
page read and write
4279000
trusted library allocation
page execute and read and write
1DD52E96000
trusted library allocation
page read and write
1DD53165000
trusted library allocation
page read and write
43C2000
trusted library allocation
page read and write
7FF848B20000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
68AF000
stack
page read and write
66F0000
trusted library allocation
page read and write
26C0000
heap
page read and write
7FF848980000
trusted library allocation
page read and write
4420000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
7FF848B90000
trusted library allocation
page read and write
847000
heap
page read and write
7FF848990000
trusted library allocation
page read and write
6626000
trusted library allocation
page execute and read and write
4680000
trusted library allocation
page read and write
26DD000
trusted library allocation
page execute and read and write
1A0DAD00000
heap
page execute and read and write
1A3FF592000
unkown
page readonly
4341000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
1A39A2A5000
heap
page read and write
1DD534A3000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
7FF848960000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
7FF848BA0000
trusted library allocation
page execute and read and write
17E1B3D000
stack
page read and write
1A39A31D000
heap
page read and write
43E4000
trusted library allocation
page read and write
1A0DAAC0000
heap
page read and write
10A03FE000
stack
page read and write
460000
heap
page read and write
4390000
trusted library allocation
page read and write
1C717585000
heap
page read and write
7FF848BC0000
trusted library allocation
page read and write
25EE000
stack
page read and write
1A3FF230000
heap
page read and write
1A381B48000
trusted library allocation
page read and write
1DD52EF8000
trusted library allocation
page read and write
1DD534D3000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
1DD5340F000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
7FF84897D000
trusted library allocation
page execute and read and write
7FF848B40000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
1A3FF35C000
heap
page read and write
43E0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
7FF848A20000
trusted library allocation
page execute and read and write
7FF848B00000
trusted library allocation
page read and write
7FF848A36000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
7FF848B40000
trusted library allocation
page read and write
1A0DB24F000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
847000
heap
page read and write
66B0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
1DD5349F000
trusted library allocation
page read and write
2B0C000
heap
page read and write
2737000
heap
page read and write
66D0000
trusted library allocation
page read and write
487F000
stack
page read and write
43C0000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
17E293D000
stack
page read and write
7FF8489FC000
trusted library allocation
page execute and read and write
66F0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
7FF848B17000
trusted library allocation
page read and write
458B000
trusted library allocation
page execute and read and write
66F0000
trusted library allocation
page read and write
7FF848B30000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
1A39A555000
heap
page read and write
425E000
stack
page read and write
6B20000
trusted library allocation
page read and write
43BF000
stack
page read and write
5491000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
416E000
stack
page read and write
43C0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
730E000
stack
page read and write
7140000
trusted library allocation
page read and write
1C7173E9000
heap
page read and write
84A000
heap
page read and write
67A0000
heap
page execute and read and write
5D5000
heap
page read and write
66D0000
trusted library allocation
page read and write
1C730590000
heap
page execute and read and write
43F0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
6D0E000
stack
page read and write
1A0F3A1B000
heap
page read and write
66B0000
trusted library allocation
page read and write
1DD6BA09000
heap
page read and write
29AE000
stack
page read and write
43B7000
heap
page read and write
43C0000
trusted library allocation
page read and write
1DD5310A000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
281D8750000
heap
page read and write
66D0000
trusted library allocation
page read and write
662C000
trusted library allocation
page execute and read and write
281D9097000
heap
page read and write
4390000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
694E000
stack
page read and write
44DF000
trusted library allocation
page read and write
ABAACFE000
stack
page read and write
6730000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
430E000
stack
page read and write
711C000
trusted library allocation
page execute and read and write
7FF848C40000
trusted library allocation
page read and write
68ED000
stack
page read and write
7FF848B40000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
26ED000
heap
page read and write
43E0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
27A4000
heap
page read and write
4420000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
810000
heap
page read and write
66F0000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
1DD526BB000
heap
page read and write
43C0000
trusted library allocation
page read and write
720E000
stack
page read and write
66B0000
trusted library allocation
page read and write
2E00000
heap
page read and write
52E1000
trusted library allocation
page read and write
1A0DA9E7000
heap
page read and write
6700000
trusted library allocation
page read and write
41EC000
stack
page read and write
4390000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
2F9A000
heap
page read and write
7FF848D30000
trusted library allocation
page read and write
857000
heap
page read and write
66F0000
trusted library allocation
page read and write
4188000
trusted library allocation
page read and write
17E383F000
stack
page read and write
7FF848BA0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
281D927C000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
7FF848AA0000
trusted library allocation
page execute and read and write
7FF84899D000
trusted library allocation
page execute and read and write
6710000
trusted library allocation
page read and write
278A000
heap
page read and write
43C0000
trusted library allocation
page read and write
1C727BBD000
trusted library allocation
page read and write
27C3000
heap
page read and write
281D8DA0000
heap
page read and write
66F0000
trusted library allocation
page read and write
728E000
stack
page read and write
4276000
trusted library allocation
page execute and read and write
43E0000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
40A4000
trusted library allocation
page read and write
1DD62E31000
trusted library allocation
page read and write
7FF84896B000
trusted library allocation
page execute and read and write
66B0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
2F90000
heap
page read and write
1DD6B9FC000
heap
page read and write
43C0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
7FF848B1C000
trusted library allocation
page read and write
ABAA2FE000
stack
page read and write
43E0000
trusted library allocation
page read and write
7120000
trusted library allocation
page read and write
43D0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
1DD6BEB2000
heap
page read and write
4770000
heap
page execute and read and write
800000
heap
page read and write
7FF848963000
trusted library allocation
page execute and read and write
2837000
heap
page read and write
43C0000
trusted library allocation
page read and write
1DD6BE9E000
heap
page read and write
30D0000
heap
page read and write
409D000
trusted library allocation
page execute and read and write
66F0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
1A3817D0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
7FF8489A4000
trusted library allocation
page read and write
6730000
trusted library allocation
page read and write
2741000
heap
page read and write
7FF8489A0000
trusted library allocation
page read and write
471E000
stack
page read and write
25E0000
heap
page read and write
7F8F8000
trusted library allocation
page execute and read and write
1DD52EED000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
3250000
heap
page read and write
1DD52F00000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
2795000
heap
page read and write
1A0DABF0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
4500000
heap
page read and write
3025000
heap
page read and write
4390000
trusted library allocation
page read and write
17E3429000
stack
page read and write
1A381B42000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
1A0DA9C8000
heap
page read and write
43E0000
trusted library allocation
page read and write
2F26000
heap
page read and write
1DD530EF000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
3550000
heap
page read and write
4400000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
7388EFC000
stack
page read and write
1A3FF360000
heap
page read and write
281D9140000
heap
page read and write
1A39A54D000
heap
page read and write
43E0000
trusted library allocation
page read and write
281D90F0000
heap
page execute and read and write
6620000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
1B0000
heap
page read and write
2B28000
heap
page read and write
43C0000
trusted library allocation
page read and write
6690000
trusted library allocation
page read and write
7FF848A46000
trusted library allocation
page execute and read and write
43E0000
trusted library allocation
page read and write
7FF848953000
trusted library allocation
page read and write
10A0BFE000
stack
page read and write
7FF848B50000
trusted library allocation
page read and write
10A0AFF000
stack
page read and write
66D0000
trusted library allocation
page read and write
7FF848944000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
6B2E000
stack
page read and write
43E0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
262D000
stack
page read and write
7FF848C60000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
2737000
heap
page read and write
6C8A000
heap
page read and write
66F0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
1A39A56F000
heap
page read and write
66B0000
trusted library allocation
page read and write
1A0DA9DF000
heap
page read and write
66F0000
trusted library allocation
page read and write
1A0DA9FB000
heap
page read and write
4390000
trusted library allocation
page read and write
43A5000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
4400000
trusted library allocation
page read and write
26E1000
heap
page read and write
7FF848C70000
trusted library allocation
page read and write
1A39A0D0000
heap
page execute and read and write
4390000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
6790000
remote allocation
page read and write
7FF848982000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
1A0DAD70000
heap
page read and write
6700000
trusted library allocation
page read and write
2E8F000
stack
page read and write
66F0000
trusted library allocation
page read and write
26AE000
stack
page read and write
7FF848BF0000
trusted library allocation
page read and write
ABAADFD000
stack
page read and write
26D3000
trusted library allocation
page execute and read and write
4094000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
7FF848A1C000
trusted library allocation
page execute and read and write
43C0000
trusted library allocation
page read and write
17E247B000
stack
page read and write
4395000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
7FF848B70000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
1A39A560000
heap
page read and write
2F45000
heap
page read and write
6CB9000
heap
page read and write
4B64000
trusted library allocation
page read and write
7FF848AFE000
trusted library allocation
page read and write
1F0000
heap
page read and write
7FF848B80000
trusted library allocation
page read and write
44F1000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
A1E000
unkown
page read and write
1DD53413000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
1C717B00000
heap
page execute and read and write
66D0000
trusted library allocation
page read and write
2F68000
heap
page read and write
4390000
trusted library allocation
page read and write
177000
stack
page read and write
1C730481000
heap
page read and write
66F0000
trusted library allocation
page read and write
46DE000
stack
page read and write
281D8827000
heap
page read and write
43E0000
trusted library allocation
page read and write
7FF848984000
trusted library allocation
page read and write
2704000
heap
page read and write
426E000
stack
page read and write
4390000
trusted library allocation
page read and write
4B70000
trusted library allocation
page read and write
7110000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
7FF848A16000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
3270000
heap
page read and write
1A0DAC05000
heap
page read and write
66F0000
trusted library allocation
page read and write
1A0F3A36000
heap
page read and write
66F0000
trusted library allocation
page read and write
26F9000
heap
page read and write
7FF848B3D000
trusted library allocation
page read and write
4480000
heap
page read and write
6710000
trusted library allocation
page read and write
27B9000
heap
page read and write
66F0000
trusted library allocation
page read and write
1DD6B9B7000
heap
page read and write
2707000
heap
page read and write
43E0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
7FF848A20000
trusted library allocation
page execute and read and write
66B0000
trusted library allocation
page read and write
7FF848A30000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
ABAA7FF000
stack
page read and write
17E2A3D000
stack
page read and write
43E0000
trusted library allocation
page read and write
3280000
heap
page read and write
43E0000
trusted library allocation
page read and write
483E000
stack
page read and write
66F0000
trusted library allocation
page read and write
313D000
stack
page read and write
6690000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
7FF84898D000
trusted library allocation
page execute and read and write
43F0000
trusted library allocation
page read and write
7FF848AA0000
trusted library allocation
page execute and read and write
1C717420000
heap
page read and write
1DD53264000
trusted library allocation
page read and write
1DD6BE9A000
heap
page read and write
1C717353000
heap
page read and write
43E0000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
4210000
heap
page execute and read and write
7FF848B06000
trusted library allocation
page read and write
420D000
trusted library allocation
page execute and read and write
6B40000
trusted library allocation
page read and write
4394000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
42C0000
trusted library allocation
page read and write
6640000
trusted library allocation
page execute and read and write
1A3FF250000
heap
page read and write
82BECFE000
stack
page read and write
7FF8489BC000
trusted library allocation
page execute and read and write
66F1000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
1DD5308C000
trusted library allocation
page read and write
455D000
trusted library allocation
page execute and read and write
6700000
trusted library allocation
page read and write
276E000
stack
page read and write
4B9B000
trusted library allocation
page execute and read and write
6700000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
7389AFD000
stack
page read and write
66F0000
trusted library allocation
page read and write
281E9161000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
7FF848B80000
trusted library allocation
page execute and read and write
66B0000
trusted library allocation
page read and write
6710000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
1A39A233000
heap
page read and write
7FF848BD0000
trusted library allocation
page execute and read and write
66B0000
trusted library allocation
page read and write
13B000
stack
page read and write
1DD6B9EA000
heap
page read and write
66D0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
1A39A56A000
heap
page read and write
66D0000
trusted library allocation
page read and write
43EE000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
82BEEFE000
stack
page read and write
66F0000
trusted library allocation
page read and write
1DD525E0000
heap
page read and write
66F0000
trusted library allocation
page read and write
31D0000
heap
page read and write
66B0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
66B0000
trusted library allocation
page read and write
7FF8489AD000
trusted library allocation
page execute and read and write
43C0000
trusted library allocation
page read and write
2DED000
stack
page read and write
66F4000
trusted library allocation
page read and write
1DD52840000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
439C000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
2707000
heap
page read and write
6710000
trusted library allocation
page read and write
2877000
stack
page read and write
66D0000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
2A2E000
stack
page read and write
66D0000
trusted library allocation
page read and write
4B5D000
heap
page read and write
7FF848B03000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
307D000
stack
page read and write
66F0000
trusted library allocation
page read and write
17E20FE000
stack
page read and write
6C4E000
stack
page read and write
1C717510000
heap
page read and write
66F0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
1DD6B9C0000
heap
page read and write
10A06FE000
stack
page read and write
66F0000
trusted library allocation
page read and write
1DD6BE90000
heap
page read and write
66B0000
trusted library allocation
page read and write
42CE000
stack
page read and write
1C717365000
heap
page read and write
43F0000
trusted library allocation
page read and write
1C7303CC000
unkown
page readonly
66E0000
trusted library allocation
page read and write
7FF848A10000
trusted library allocation
page read and write
4C40000
heap
page execute and read and write
6700000
trusted library allocation
page read and write
4B40000
heap
page read and write
43E0000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
43C0000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
4572000
trusted library allocation
page read and write
ABAA5FF000
stack
page read and write
43E1000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
27C6000
heap
page read and write
43E0000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
17E1FFE000
stack
page read and write
7FF848993000
trusted library allocation
page read and write
10A02FF000
stack
page read and write
853000
heap
page read and write
7FF848BB0000
trusted library allocation
page execute and read and write
2B04000
heap
page read and write
1831CD20000
heap
page read and write
6790000
remote allocation
page read and write
432F000
trusted library allocation
page read and write
1DD52615000
heap
page read and write
1DD6AE30000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
29B8000
trusted library allocation
page read and write
2660000
heap
page read and write
43F0000
trusted library allocation
page read and write
2770000
heap
page readonly
10A0CFE000
stack
page read and write
2B1A000
heap
page read and write
66F0000
trusted library allocation
page read and write
6623000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
7FF848BB0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
1DD52FC6000
trusted library allocation
page read and write
1A3FF0C4000
unkown
page readonly
4564000
trusted library allocation
page read and write
7FF848B90000
trusted library allocation
page execute and read and write
43C0000
trusted library allocation
page read and write
281D8790000
heap
page read and write
1A0DB24C000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
1DD62E43000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
31C0000
heap
page read and write
7FF848AE0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
43F0000
trusted library allocation
page read and write
1DD6BC30000
heap
page read and write
43F0000
trusted library allocation
page read and write
281D8864000
heap
page read and write
66D0000
trusted library allocation
page read and write
66F0000
trusted library allocation
page read and write
17E3A29000
stack
page read and write
1A0DB15D000
trusted library allocation
page read and write
2827000
heap
page read and write
2E90000
heap
page read and write
1C727BB1000
trusted library allocation
page read and write
42B3000
trusted library allocation
page read and write
1DD53104000
trusted library allocation
page read and write
43E0000
trusted library allocation
page read and write
2AB0000
heap
page read and write
43A0000
trusted library allocation
page read and write
6700000
trusted library allocation
page read and write
4390000
trusted library allocation
page read and write
C90000
heap
page read and write
4400000
trusted library allocation
page read and write
66D0000
trusted library allocation
page read and write
There are 2073 hidden memdumps, click here to show them.