IOC Report
INVOICE31401001340.exe

loading gif

Files

File Path
Type
Category
Malicious
INVOICE31401001340.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Program Files\RepairTech\LiveAgent\SyncroLive.Agent.Runner.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\RepairTech\LiveAgent\SyncroLive.Service.Runner.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\System.Management.Automation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\RepairTech\Syncro\Syncro.Service.Runner.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\RepairTech\Syncro\Update.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Microsoft.Win32.TaskScheduler.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Telerik.Windows.Controls.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Microsoft.Win32.TaskScheduler.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Telerik.Windows.Controls.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Syncro\bin\Syncro.Overmind.Service.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Syncro.Installer.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\CSharpFunctionalExtensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Cassia.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\DeltaCompressionDotNet.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Destructurama.Attributed.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\FluentCommandLineParser.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Flurl.Http.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Flurl.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Interop.NetFwTypeLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\JetBrains.Annotations.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Microsoft.Data.Edm.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Microsoft.Data.OData.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Microsoft.Data.Services.Client.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Microsoft.Web.XmlTransform.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Mixpanel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Mono.Cecil.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\NuGet.Squirrel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\OpenHardwareMonitorLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\RepairTech.Common.Tools.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\RepairTech.Common.Wpf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\RollbarSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Serilog.Formatting.Compact.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Serilog.Sinks.Console.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Serilog.Sinks.File.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Serilog.Sinks.Literate.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Serilog.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SharpCompress.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SharpDX.DXGI.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SharpDX.Direct3D11.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SharpDX.Mathematics.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SharpDX.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Splat.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Squirrel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SyncroLive.Agent.Runner.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SyncroLive.Agent.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SyncroLive.Agent.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SyncroLive.Interface.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SyncroLive.Interface.dll.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SyncroLive.Service.Runner.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SyncroLive.Service.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SyncroLive.Service.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\SyncroLive.WindowsInput.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\System.Numerics.Vectors.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\System.Runtime.CompilerServices.Unsafe.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\System.Runtime.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\System.Spatial.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\Topshelf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\UrlCombineLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\WebRTC.NET.SDK.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\ZetaLongPaths.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\config.json (copy)
JSON data
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\config.json.{83e6fab5-4386-4338-bfa9-f383adf3dcd4}
JSON data
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\deniszykov.WebSocketListener.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\x64\WebRTC.Native.Internal.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\x64\turbojpeg.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\x86\WebRTC.Native.Internal.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.66.14351~f7fcc35a2d1947f693e0732f444c406e\x86\turbojpeg.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635\OpenHardwareMonitorLib.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\CSharpFunctionalExtensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Cassia.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\DeltaCompressionDotNet.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Destructurama.Attributed.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\FluentCommandLineParser.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Flurl.Http.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Flurl.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Interop.NetFwTypeLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\JetBrains.Annotations.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Microsoft.Web.XmlTransform.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Mono.Cecil.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\NuGet.Squirrel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\OpenHardwareMonitorLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\RepairTech.Common.Tools.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\RepairTech.Common.Wpf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\RollbarSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Serilog.Formatting.Compact.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Serilog.Sinks.Console.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Serilog.Sinks.File.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Serilog.Sinks.Literate.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Serilog.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SharpDX.DXGI.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SharpDX.Direct3D11.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SharpDX.Mathematics.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SharpDX.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Splat.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Squirrel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SyncroLive.Agent.Runner.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SyncroLive.Agent.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SyncroLive.Agent.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SyncroLive.Interface.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SyncroLive.Interface.dll.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SyncroLive.Service.Runner.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SyncroLive.Service.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SyncroLive.Service.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\SyncroLive.WindowsInput.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\System.Management.Automation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\System.Numerics.Vectors.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\System.Runtime.CompilerServices.Unsafe.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\System.Runtime.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\Topshelf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\UrlCombineLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\WebRTC.NET.SDK.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\ZetaLongPaths.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\config.json (copy)
JSON data
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\config.json.{f7b140d2-12d9-49a3-9446-2dafaa3ccd88}
JSON data
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\deniszykov.WebSocketListener.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\x64\WebRTC.Native.Internal.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\x64\turbojpeg.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\x86\WebRTC.Native.Internal.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\app-0.0.68.15635~b3ea396ce3964d88b4b8425873431883\x86\turbojpeg.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\RepairTech\LiveAgent\packages\RELEASES
ASCII text, with CRLF line terminators
dropped
C:\Program Files\RepairTech\Syncro\Syncro.App.Runner.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\Syncro.Service.Runner.InstallState
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (7463), with no line terminators
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\7za-x64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\7za-x86.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Autofac.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\CSharpFunctionalExtensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\DeltaCompressionDotNet.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Destructurama.Attributed.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\FluentCommandLineParser.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Flurl.Http.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Flurl.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ICSharpCode.SharpZipLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Images\chat-bubbles-icon.png
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Images\custom-logo.png
PNG image data, 500 x 120, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Images\kabuto-logo.ico
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Interop.IWshRuntimeLibrary.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Interop.NetFwTypeLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Interop.WUApiLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Itenso.TimePeriod.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\JetBrains.Annotations.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\MetroFramework.Fonts.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\MetroFramework.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Microsoft.Bcl.AsyncInterfaces.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Microsoft.Data.Edm.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Microsoft.Data.OData.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Microsoft.Data.Services.Client.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Microsoft.Web.XmlTransform.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Mono.Cecil.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\NuGet.Squirrel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Phoenix.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\RepairTech.Common.Tools.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\RepairTech.Common.Wpf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\RestSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\RollbarSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Serilog.Formatting.Compact.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Serilog.Sinks.Console.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Serilog.Sinks.File.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Serilog.Sinks.Literate.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Serilog.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\SevenZipSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\SharpCompress.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\SharpSnmpLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Splat.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Squirrel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.App.Runner.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.App.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.App.dll.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Contracts.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Service.Configuration.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Service.Interfaces.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Service.Models.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Service.Runner.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Service.Services.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Service.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Service.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Tools.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Uninstaller.Tools.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Uninstaller.Tools.exe.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Uninstaller.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Syncro.Uninstaller.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\System.Net.WebSockets.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\System.Runtime.CompilerServices.Unsafe.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\System.Runtime.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\System.Security.Cryptography.Algorithms.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\System.Security.Cryptography.Encoding.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\System.Security.Cryptography.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\System.Security.Cryptography.X509Certificates.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\System.Spatial.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\System.Threading.Tasks.Extensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Telerik.Windows.Controls.ConversationalUI.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Telerik.Windows.Controls.Input.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Telerik.Windows.Controls.Navigation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\Telerik.Windows.Data.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\UrlCombineLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ar-SA\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\config.json
JSON data
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\cs-CZ\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\da-DK\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\de-DE\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\de\Microsoft.Data.Edm.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\de\Microsoft.Data.OData.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\de\Microsoft.Data.Services.Client.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\de\System.Spatial.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\el-GR\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\en\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\en\Syncro.Uninstaller.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\es-ES\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\es\Microsoft.Data.Edm.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\es\Microsoft.Data.OData.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\es\Microsoft.Data.Services.Client.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\es\System.Spatial.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\fi-FI\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\fr-FR\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\fr\Microsoft.Data.Edm.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\fr\Microsoft.Data.OData.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\fr\Microsoft.Data.Services.Client.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\fr\System.Spatial.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\it-IT\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\it\Microsoft.Data.Edm.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\it\Microsoft.Data.OData.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\it\Microsoft.Data.Services.Client.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\it\System.Spatial.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ja-JP\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ja\Microsoft.Data.Edm.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ja\Microsoft.Data.OData.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ja\Microsoft.Data.Services.Client.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ja\System.Spatial.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ko\Microsoft.Data.Edm.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ko\Microsoft.Data.OData.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ko\Microsoft.Data.Services.Client.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ko\System.Spatial.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\nl-NL\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\pt-BR\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ru-RU\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ru\Microsoft.Data.Edm.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ru\Microsoft.Data.OData.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ru\Microsoft.Data.Services.Client.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\ru\System.Spatial.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\sl-SI\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\websocket-sharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\zh-CHS\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\zh-Hans\Microsoft.Data.Edm.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\zh-Hans\Microsoft.Data.OData.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\zh-Hans\Microsoft.Data.Services.Client.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\zh-Hans\System.Spatial.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\zh-Hant\Microsoft.Data.Edm.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\zh-Hant\Microsoft.Data.OData.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\zh-Hant\Microsoft.Data.Services.Client.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.181.14910\zh-Hant\System.Spatial.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\7za-x64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\7za-x86.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Autofac.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\CSharpFunctionalExtensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\DeltaCompressionDotNet.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Destructurama.Attributed.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\FluentCommandLineParser.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Flurl.Http.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Flurl.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\ICSharpCode.SharpZipLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Images\chat-bubbles-icon.png
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Images\custom-logo.png
PNG image data, 500 x 120, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Images\kabuto-logo.ico
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Interop.IWshRuntimeLibrary.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Interop.NetFwTypeLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Interop.WUApiLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Itenso.TimePeriod.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\JetBrains.Annotations.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\MetroFramework.Fonts.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\MetroFramework.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Microsoft.Bcl.AsyncInterfaces.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Microsoft.Web.XmlTransform.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Mono.Cecil.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Newtonsoft.Json.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\NuGet.Squirrel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Phoenix.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\RepairTech.Common.Tools.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\RepairTech.Common.Wpf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\RollbarSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Serilog.Formatting.Compact.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Serilog.Sinks.Console.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Serilog.Sinks.File.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Serilog.Sinks.Literate.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Serilog.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\SevenZipSharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\SharpSnmpLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Splat.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Squirrel.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.App.Runner.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.App.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.App.dll.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Contracts.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Service.Configuration.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Service.Interfaces.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Service.Models.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Service.Runner.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Service.Services.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Service.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Service.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Tools.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Uninstaller.Tools.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Uninstaller.Tools.exe.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Uninstaller.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Syncro.Uninstaller.exe.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\System.Net.WebSockets.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\System.Runtime.CompilerServices.Unsafe.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\System.Runtime.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\System.Security.Cryptography.Algorithms.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\System.Security.Cryptography.Encoding.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\System.Security.Cryptography.Primitives.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\System.Security.Cryptography.X509Certificates.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\System.Threading.Tasks.Extensions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\System.ValueTuple.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Telerik.Windows.Controls.ConversationalUI.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Telerik.Windows.Controls.Input.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Telerik.Windows.Controls.Navigation.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\Telerik.Windows.Data.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\UrlCombineLib.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\ar-SA\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\config.json
JSON data
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\cs-CZ\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\da-DK\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\de-DE\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\el-GR\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\en\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\en\Syncro.Uninstaller.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\es-ES\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\fi-FI\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\fr-FR\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\it-IT\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\ja-JP\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\nl-NL\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\pt-BR\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\ru-RU\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\sl-SI\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\websocket-sharp.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\app-1.0.182.15915~47589abca4a94d61b03f0bb13cc3604c\zh-CHS\Syncro.App.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files\RepairTech\Syncro\install.bat
DOS batch file, ASCII text
dropped
C:\Program Files\RepairTech\Syncro\packages\.betaId
Unicode text, UTF-8 (with BOM) text, with no line terminators
dropped
C:\Program Files\RepairTech\Syncro\packages\RELEASES
ASCII text, with CRLF line terminators
modified
C:\Program Files\RepairTech\Syncro\packages\Syncro-1.0.181.14910-full.nupkg
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage user DataBase, version 0x620, checksum 0x1df5cfb6, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Syncro\Images\logo.ico (copy)
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\ProgramData\Syncro\bin\FilePusher.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\ProgramData\Syncro\bin\module.psm1
ASCII text
dropped
C:\ProgramData\Syncro\data\OsPatchState.json (copy)
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Syncro\data\OsPatchState.json~
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Syncro\live\fileIndex.db
data
dropped
C:\ProgramData\Syncro\live\jobs.json
Unicode text, UTF-8 (with BOM) text, with no line terminators
modified
C:\ProgramData\Syncro\logs\MasterInstaller.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Syncro\logs\Overmind.Service20240318.log
ASCII text, with very long lines (616), with CRLF, LF line terminators
dropped
C:\ProgramData\Syncro\logs\Overmind.Service20240319.log
ASCII text, with CRLF, LF line terminators
dropped
C:\ProgramData\Syncro\logs\Overmind.Service20240320.log
ASCII text, with CRLF, LF line terminators
dropped
C:\ProgramData\Syncro\logs\Overmind.Service20240321.log
ASCII text, with CRLF, LF line terminators
dropped
C:\ProgramData\Syncro\logs\Overmind.Service20240322.log
ASCII text, with CRLF, LF line terminators
dropped
C:\ProgramData\Syncro\logs\Overmind.Service20240323.log
ASCII text, with CRLF, LF line terminators
dropped
C:\ProgramData\Syncro\logs\Overmind.Service20240324.log
ASCII text, with CRLF, LF line terminators
dropped
C:\ProgramData\Syncro\logs\Overmind.Service20240325.log
ASCII text, with CRLF, LF line terminators
dropped
C:\ProgramData\Syncro\logs\Overmind.Service20240326.log
ASCII text, with CRLF, LF line terminators
dropped
C:\ProgramData\Syncro\logs\Overmind.Service20240330.log
ASCII text, with very long lines (346), with CRLF, LF line terminators
dropped
C:\ProgramData\Syncro\logs\Overmind.Service20240401.log
ASCII text, with very long lines (346), with CRLF, LF line terminators
dropped
C:\ProgramData\Syncro\logs\Overmind.Service20240402.log
ASCII text, with CRLF, LF line terminators
dropped
C:\ProgramData\Syncro\logs\Overmind.Service20240403.log
ASCII text, with CRLF, LF line terminators
dropped
C:\ProgramData\Syncro\logs\ServiceInstall.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\ProgramData\Syncro\logs\Syncro.App.Runner20240318.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Syncro\logs\Syncro.App.Runner20240318_001.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Syncro\logs\Syncro.App.Runner20240318_002.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Syncro\logs\Syncro.App.Runner20240318_003.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Syncro\logs\Syncro.Installer20240318.log
ASCII text, with very long lines (314), with CRLF, LF line terminators
dropped
C:\ProgramData\Syncro\logs\Syncro.Installer20240319.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Syncro\logs\Syncro.Service.Runner.OsPatching20240318.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Syncro\logs\Syncro.Service.Runner.OsPatching20240321.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Syncro\logs\Syncro.Service.Runner.OsPatching20240323.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Syncro\logs\Syncro.Service.Runner20240318.log
ASCII text, with very long lines (3310), with CRLF, LF line terminators
dropped
C:\ProgramData\Syncro\logs\Syncro.Service.Runner20240321.log
ASCII text, with very long lines (3310), with CRLF, LF line terminators
dropped
C:\ProgramData\Syncro\logs\Syncro.Service.Runner20240323.log
ASCII text, with very long lines (3310), with CRLF, LF line terminators
dropped
C:\ProgramData\Syncro\logs\Syncro.Squirrel20240321.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Syncro\logs\Syncro.Squirrel20240323.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Syncro\logs\SyncroLive.Agent.Runner20240318.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Syncro\logs\SyncroLive.Service.Runner20240318.log
ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Syncro\servicing\settings.json
JSON data
dropped
C:\ProgramData\Syncro\servicing\state.json
JSON data
dropped
C:\ProgramData\Syncro\servicing\syncro-live\14351\579a4ca214cab85642c04191f0f9c60a545dfe52 (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\ProgramData\Syncro\servicing\syncro-live\14351\579a4ca214cab85642c04191f0f9c60a545dfe52.{a7a99be3-713c-4f38-9392-50ab807d5dff}
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\ProgramData\Syncro\servicing\syncro-live\14351\daf9d05bc8a143caaf28a6f3fcd8b2b3ef4e8d2c (copy)
JSON data
dropped
C:\ProgramData\Syncro\servicing\syncro-live\14351\daf9d05bc8a143caaf28a6f3fcd8b2b3ef4e8d2c.{28bd2bb7-2b22-416f-a2b4-fa35c81f4b9e}
JSON data
dropped
C:\ProgramData\Syncro\servicing\syncro-live\15635\1c8b8747f6ff4443826ef247fb38a0acf65f6fd5 (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\ProgramData\Syncro\servicing\syncro-live\15635\1c8b8747f6ff4443826ef247fb38a0acf65f6fd5.{39d88cc8-edc3-4870-8524-a4d4b7b6565f}
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\ProgramData\Syncro\servicing\syncro-live\15635\d1c2d20629337d9b3497876f2cf88255468a83bc (copy)
JSON data
dropped
C:\ProgramData\Syncro\servicing\syncro-live\15635\d1c2d20629337d9b3497876f2cf88255468a83bc.{454cfae1-0675-4d4b-a40e-f324e7271b4c}
JSON data
dropped
C:\ProgramData\Syncro\servicing\syncro-main\14910\43cf91f6e057b0461972589d155b71d28edb5e3e (copy)
JSON data
dropped
C:\ProgramData\Syncro\servicing\syncro-main\14910\43cf91f6e057b0461972589d155b71d28edb5e3e.{40799c32-84c7-47c8-95b8-b0d30e3fe8e7}
JSON data
dropped
C:\ProgramData\Syncro\servicing\syncro-main\15915\326795e1b86bb2193560447e382b4458fa1d08f2 (copy)
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\ProgramData\Syncro\servicing\syncro-main\15915\326795e1b86bb2193560447e382b4458fa1d08f2.{727e79d2-4c2a-4ed0-ba95-523cd86fba19}
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\ProgramData\Syncro\servicing\syncro-main\15915\cf1c68760b94cd372a163767f9713bde6bc27f2e (copy)
JSON data
dropped
C:\ProgramData\Syncro\servicing\syncro-main\15915\cf1c68760b94cd372a163767f9713bde6bc27f2e.{4a938cb5-ccc5-4fd7-8d75-663794ae1412}
JSON data
dropped
C:\ProgramData\Syncro\servicing\targetInventory.json
JSON data
dropped
C:\ProgramData\Syncro\watchdogs\MainService.watchdog
ASCII text, with no line terminators
dropped
C:\ProgramData\Syncro\watchdogs\MainServiceUpdater.watchdog
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\INVOICE31401001340.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\InstallUtil.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Syncro.Installer.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpBECD.tmp
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Syncro.Overmind.Service.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Syncro.Service.Runner.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\.squirrel-lock-7A0B58A6894AA1EDC6355A09A90118E336F92621
ISO-8859 text, with CR line terminators
dropped
C:\Windows\Temp\tmp3A5F.tmp
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Windows\Temp\tmp5D44.tmp
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Windows\Temp\tmp6759.tmp
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Windows\Temp\tmp89B8.tmp
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
C:\Windows\Temp\tmpF3F9.tmp
MS Windows icon resource - 3 icons, 16x16, 32 bits/pixel, 32x32, 32 bits/pixel
dropped
There are 410 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\INVOICE31401001340.exe
C:\Users\user\Desktop\INVOICE31401001340.exe
malicious
C:\Users\user\AppData\Local\Temp\Syncro.Installer.exe
"C:\Users\user\AppData\Local\Temp\Syncro.Installer.exe" --jwt-payload eyJ0eXAiOiJKV1QiLCJhbGciOiJFUzI1NiJ9.eyJ2ZXJzaW9uIjoxLCJpbnN0YWxsIjp7InNob3AiOiIycHJPZFM2MWItc1FTQXA2aV9XVnRBIiwiY3VzdG9tZXJfaWQiOjEzNzUzOTMsImZvbGRlcl9pZCI6Mzc1ODExOX0sInNlcnZpY2luZyI6eyJjaGFubmVsIjoic3luY3JvLXJ0bSIsInRhcmdldCI6InN5bmNybyJ9fQ.qpR5PqzCuyisf6IKqdUr3HoeK5bJeW3zqdyumas0geGur6RM6l2ILEri8jVBr7qw20jtv4z0BCzdaar0brhD3g
malicious
C:\Program Files\RepairTech\Syncro\Syncro.Service.Runner.exe
C:\Program Files\RepairTech\Syncro\Syncro.Service.Runner.exe
malicious
C:\ProgramData\Syncro\bin\Syncro.Overmind.Service.exe
"C:\ProgramData\Syncro\bin\Syncro.Overmind.Service.exe" install
malicious
C:\ProgramData\Syncro\bin\Syncro.Overmind.Service.exe
C:\ProgramData\Syncro\bin\Syncro.Overmind.Service.exe" -displayname "SyncroRecovery" -servicename "SyncroOvermind
malicious
C:\Program Files\RepairTech\LiveAgent\SyncroLive.Service.Runner.exe
C:\Program Files\RepairTech\LiveAgent\SyncroLive.Service.Runner.exe
malicious
C:\Program Files\RepairTech\LiveAgent\SyncroLive.Agent.Runner.exe
"C:\Program Files\RepairTech\LiveAgent\SyncroLive.Agent.Runner.exe"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\cmd.exe
cmd.exe" /c "C:\Program Files\RepairTech\Syncro\install.bat
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\installutil.exe" /ShowCallStack /LogFile=C:\ProgramData/Syncro/logs/ServiceInstall.log "C:\Program Files\RepairTech\Syncro\Syncro.Service.Runner.exe
C:\Windows\System32\sc.exe
sc failure Syncro reset= 60 actions= restart/5000/restart/10000/restart/60000
C:\Windows\System32\sc.exe
sc start Syncro
C:\Program Files\RepairTech\Syncro\Syncro.App.Runner.exe
"C:\Program Files\RepairTech\Syncro\Syncro.App.Runner.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\RepairTech\Syncro\Syncro.App.Runner.exe
"C:\Program Files\RepairTech\Syncro\Syncro.App.Runner.exe"
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k smphost
C:\Program Files\RepairTech\Syncro\Syncro.App.Runner.exe
"C:\Program Files\RepairTech\Syncro\Syncro.App.Runner.exe"
C:\Program Files\RepairTech\Syncro\Syncro.App.Runner.exe
"C:\Program Files\RepairTech\Syncro\Syncro.App.Runner.exe"
C:\Windows\System32\sc.exe
sc" create "SyncroLive" binpath= "\"C:\Program Files\RepairTech\LiveAgent\SyncroLive.Service.Runner.exe\"" displayname= "SyncroLive" start= "delayed-auto
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
sc" description "SyncroLive" "
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
"sc" failure "SyncroLive" reset= 3600 actions= restart/5000/restart/30000/restart/300000
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\sc.exe
"sc" failure "Syncro" reset= 3600 actions= restart/300000
C:\Windows\System32\wbem\WmiApSrv.exe
C:\Windows\system32\wbem\WmiApSrv.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 18 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://github.com/myuser/myrepo
unknown
http://schemas.datacontract.org
unknown
http://tempuri.org/IService/SetScreenSharingSenderId
unknown
https://dl.emsisoft.com/EmsisoftAntiMalwareSetup64.msi(
unknown
https://production.kabutoservices.com/syncro/overmind/updates
unknown
http://tempuri.org/
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
https://github.com/repairtech/privacy-policy
unknown
http://schemas.datacontract.org/2004/07/System.ServiceProcess
unknown
https://production.kabutoservices.com/syncro/main/updates/r
unknown
https://my.splashtop.com/csrs/win
unknown
https://dl.emsisoft.com/EmsisoftAntiMalwareSetup64.msiC
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
https://production.kabutoservices.com/syncro/main/upd
unknown
http://foo/Wpf/XamlResources/Variables.xaml
unknown
https://admin.syncroapi.com/(Q
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
https://admin.syncroapi.com/(L
unknown
http://schemas.datacontract.org/2004/07/RepairTech.Common.Tools
unknown
https://dl.emsisoft.com/EmsisoftAntiMalwareSetup64.msia
unknown
https://production.kabutoservih
unknown
http://tempuri.org/IService/EndSession
unknown
https://production.kabutoservices.com/syncro/overmind/updates/P
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://admin.syncroapi.com/api/syncro_device/installers/policy_id.json?customer_id=1375393&folder_i
unknown
https://dl.emsisoft.com/EmsisoftAntiMalwareSetup64.msi
unknown
https://github.com/deniszykov/WebSocketListener
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQP0s
unknown
http://tempuri.org/IUserRequestService/get_WindowsPatchManagementSettingsResponse
unknown
http://tempuri.org/IMonitoringService/ShowPromptResponse
unknown
http://crl.ver)
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/IAgent/Shutdown
unknown
http://tempuri.org/$GetStoredScreenSharingSenderIdResultV
unknown
http://foo/Wpf/XamlResources/Converters/Converters.xaml
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
https://rmm.syncromsp.com/device_api/device/action_queue
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
https://rmm.syncromsp.com//device_api/devicex
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
https://dl.emsisoft.com/EmsisoftAntiMalwareSetup.exe(
unknown
http://tempuri.org/IMonitoringService/SetSyncProgressStatusResponse
unknown
http://tempuri.org/IUserRequestService/get_RemoteApplications
unknown
https://production.kabutoservices.com/kabuto/liveagent/updates/
unknown
https://production.kabutoservices.com/syncro/overmind/updates/releases
52.40.78.72
http://temp.com/p
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
https://production.kabutoservices.com/syncro/agent/updates/
unknown
http://defaultcontainer/RepairTech.Common.Wpf;component/Wpf/XamlResources/Icons.xaml
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://tempuri.org/IMonitoringService/TriggerAlertResponse
unknown
http://tempuri.org/IService/GetStoredScreenSharingSenderIdResponse&GetStoredScreenSharingSenderIdRes
unknown
http://tempuri.org/IMonitoringService/ExecutePowerShellScriptResponse
unknown
https://github.com/deniszykov/WebSocketListener6
unknown
https://production.kabutoservices.com/syncro/main/updates/servicing.defaults.json
52.40.78.72
http://www.abit.com.tw/
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
https://taskscheduler.codeplex.com/
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/Nonce
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#GSS_Kerberosv5_AP_REQ1510
unknown
https://rmm.syncromsp.com7https://admin.syncroapi.comuhttps://production.kabutoservices.com/syncro/m
unknown
http://www.w3.o
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-wssecurity-utility-1.0.xsd
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/CK/PSHA1
unknown
http://tempuri.org/IUserRequestService/get_RemoteApplicationsResponse
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#ThumbprintSHA1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/right/possessproperty
unknown
https://production.kabutoservices.com/syncro/main/updates/RELEASES?id=Syncro&localVersion=1.0.181.14
unknown
http://tempuri.org/IMonitoringService/ClearSyncProgressStatus
unknown
https://production.kabutoservices.com/syncro/main/updates/P
unknown
https://production.kab
unknown
https://production.kabutoservices.com/choco/kabuto_patch_managerP
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/SequenceAcknowledgement
unknown
http://tempuri.org/IMonitoringService/FirstSyncShowResponse
unknown
https://production.kabutoservices.com/syncro/main/updates/pR
unknown
http://schemas.xmlsoap.org/2005/02/trust/tlsnego#TLS_Wrap
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dnsh
unknown
https://production.kabutoservices.com/syncro/overmind/updates/Syncro.Overmind.Service-1.0.27.exe
52.40.78.72
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/Issue
unknown
http://tempuri.org/IUserRequestService/RunRemoteApplicationResponse
unknown
https://rmm.syncromsp.com//device_api/device/addonx
unknown
http://schemas.datacontract.org/2004/07/Kabuto.Contracts.Models.OsPatching.V1
unknown
http://ocsp.digicert.co
unknown
https://rmm.syncromsp.com//device_api/sync_device
unknown
https://rmm.syncroP
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContext
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Issue
unknown
https://ld.aurelius.host/0l
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/spnego
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc
unknown
https://my.splashtop.com/csrs/win(
unknown
https://dl.emsisoft.com/EmsisoftAntiMalwareSetup32.msi(
unknown
https://github.com/tmenier/Flurl.git
unknown
http://www.apache.org/licenses/LICENSE-2.0Digitized
unknown
http://foo/app.xaml
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
wlndows.syncroapi.com
104.26.14.34
k8s-default-syncropr-9fed691c09-f11dcedf98c8fd64.elb.us-east-1.amazonaws.com
52.206.234.204
production.kabutoservices.com
52.40.78.72
k8s-default-freebird-1b1347a338-108e2faffb945eb3.elb.us-east-1.amazonaws.com
3.222.92.158
k8s-default-kabutopr-bd4dfe3aec-18d42f354d40fada.elb.us-east-1.amazonaws.com
54.235.117.67
ec2-54-213-117-181.us-west-2.compute.amazonaws.com
54.213.117.181
admin.syncroapi.com
172.67.70.15
realtime.kabutoservices.com
unknown
ld.aurelius.host
unknown
traversal.syncromsp.com
unknown
rmm.syncromsp.com
unknown
There are 1 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
52.206.234.204
k8s-default-syncropr-9fed691c09-f11dcedf98c8fd64.elb.us-east-1.amazonaws.com
United States
52.40.78.72
production.kabutoservices.com
United States
3.222.92.158
k8s-default-freebird-1b1347a338-108e2faffb945eb3.elb.us-east-1.amazonaws.com
United States
104.26.14.34
wlndows.syncroapi.com
United States
172.67.70.15
admin.syncroapi.com
United States
54.213.117.181
ec2-54-213-117-181.us-west-2.compute.amazonaws.com
United States
54.84.28.205
unknown
United States
127.0.0.1
unknown
unknown
54.235.117.67
k8s-default-kabutopr-bd4dfe3aec-18d42f354d40fada.elb.us-east-1.amazonaws.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Syncro_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech
computer_uuid
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
app_crash_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
bsod_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
defrag_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
device_manager_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
firewall_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
low_hd_space_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
no_av_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
smart_failure_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
uuid
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
CompName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
OwnerName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
OwnerContact
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
OwnerPhone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
shop_city
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
shop_street_address
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
shop_state
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
shop_zip
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
shop_email
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
shop_phone
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
shop_hours
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
shop_name
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
shop_subdomain
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
branding_logo
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
branding_icon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
uninstall_code
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
color_code
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
live_agent_enabled
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
install_date
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
customer_install_success
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
AutoBackupLogFiles
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\Syncro
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Syncro
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Syncro
ApplicationVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Syncro
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Syncro
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Syncro
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Syncro
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Syncro
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Syncro
Contact
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Syncro
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
last_sync
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
ping_checks
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
timer_val
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
SyncroOptions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
KabutoOptions
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
PolicyUninstallCodeEnabled
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
PolicyUninstallCode
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
remote_apps
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
last_bsod_check
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\TriggerStatuses
no_av_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\TriggerStatuses
bsod_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\TriggerStatuses
device_manager_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\TriggerStatuses
failed_logins_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\TriggerStatuses
firewall_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\TriggerStatuses
low_hd_space_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\TriggerStatuses
time_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-18_OvermindService
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-18_SyncroInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-18_SyncroAppRunner
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-18_SyncroServiceRunnerOsPatching
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-18_SyncroServiceRunner
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-19_SyncroInstaller
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
UsersProfileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
LastUser
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
last_app_crash_check
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\TriggerStatuses
app_crash_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\TriggerStatuses
defrag_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\TriggerStatuses
smart_failure_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\TriggerStatuses
windows_license_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-19_OvermindService
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-21_SyncroSquirrel
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-21_SyncroServiceRunnerOsPatching
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-21_SyncroServiceRunner
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-18_SyncroLiveAgentRunner
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-18_SyncroLiveServiceRunner
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-20_OvermindService
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-21_OvermindService
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-23_SyncroSquirrel
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-23_SyncroServiceRunnerOsPatching
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-23_SyncroServiceRunner
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
app_crash_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
bsod_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
defrag_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
device_manager_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
firewall_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
low_hd_space_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
no_av_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
smart_failure_trigger
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
last_bsod_check
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
last_bsod_check
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-18_OvermindService
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-18_SyncroAppRunner
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-18_SyncroServiceRunnerOsPatching
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-18_SyncroServiceRunner
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
last_app_crash_check
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
last_bsod_check
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-18_SyncroServiceRunnerOsPatching
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-18_SyncroServiceRunner
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
last_app_crash_check
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
last_bsod_check
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-18_OvermindService
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-18_SyncroServiceRunner
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
last_app_crash_check
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro
last_bsod_check
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-19_OvermindService
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\RepairTech\Syncro\LogLines
2024-03-21_SyncroServiceRunner
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SyncroOvermind
ImagePath
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\SyncroOvermind
EventMessageFile
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
Owner
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
SessionHash
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
Sequence
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
Owner
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
SessionHash
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
Sequence
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_USERS.DEFAULT\Software\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\SyncroLive
EventMessageFile
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
SoftwareSASGeneration
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MSDTC Bridge 3.0.0.0\Linkage
Export
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\MSDTC Bridge 4.0.0.0\Linkage
Export
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ServiceModelEndpoint 3.0.0.0\Linkage
Export
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ServiceModelOperation 3.0.0.0\Linkage
Export
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ServiceModelService 3.0.0.0\Linkage
Export
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SMSvcHost 3.0.0.0\Linkage
Export
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SMSvcHost 4.0.0.0\Linkage
Export
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Windows Workflow Foundation 3.0.0.0\Linkage
Export
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\Windows Workflow Foundation 4.0.0.0\Linkage
Export
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\.NET Memory Cache 4.0\Linkage
Export
There are 137 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
23854572000
unkown
page readonly
7FFD34DB0000
trusted library allocation
page read and write
238540A0000
trusted library allocation
page read and write
D4739CE000
stack
page read and write
22A7A79A000
heap
page read and write
23854090000
trusted library allocation
page read and write
7FFD35410000
trusted library allocation
page read and write
2386C7B0000
trusted library allocation
page read and write
21C003BA000
trusted library allocation
page read and write
229101E6000
trusted library allocation
page read and write
21C0024A000
trusted library allocation
page read and write
29B44BF1000
heap
page read and write
C9CC8F5000
stack
page read and write
20709750000
trusted library allocation
page read and write
7FFD351B0000
trusted library allocation
page execute and read and write
213567D2000
unkown
page readonly
218D62C0000
trusted library allocation
page read and write
7FFD34940000
trusted library allocation
page read and write
7FFD35320000
trusted library allocation
page read and write
2386D2DC000
heap
page read and write
20770D80000
trusted library allocation
page read and write
41F227E000
stack
page read and write
13189000
trusted library allocation
page read and write
C2B327F000
stack
page read and write
1720664B000
trusted library allocation
page read and write
7FFD3494D000
trusted library allocation
page read and write
22A7A786000
heap
page read and write
F2B7F38000
stack
page read and write
21356D44000
heap
page read and write
229100F4000
trusted library allocation
page read and write
7FFD349A8000
trusted library allocation
page read and write
7FFD347CC000
trusted library allocation
page execute and read and write
7FFD34948000
trusted library allocation
page read and write
22A79E92000
heap
page read and write
7FFD34A90000
trusted library allocation
page read and write
22A7ACD2000
heap
page read and write
7FFD34930000
trusted library allocation
page read and write
2071009D000
trusted library allocation
page read and write
22A60C12000
heap
page read and write
218D6FFD000
heap
page read and write
156F00CD000
heap
page read and write
213565A0000
unkown
page readonly
20770AA0000
heap
page read and write
29B44C01000
heap
page read and write
156EFFE0000
trusted library allocation
page read and write
22A60E70000
heap
page read and write
2386D5A0000
heap
page read and write
2386D449000
heap
page read and write
B823C3D000
stack
page read and write
7FFD34A60000
trusted library allocation
page read and write
7FFD347BB000
trusted library allocation
page execute and read and write
2CB56700000
heap
page read and write
156F0400000
heap
page read and write
17205C8D000
heap
page read and write
7FFD34A10000
trusted library allocation
page read and write
7FFD34FEC000
trusted library allocation
page read and write
2386D280000
heap
page read and write
7FFD34A90000
trusted library allocation
page read and write
218CE327000
trusted library allocation
page read and write
15AB96FF000
heap
page read and write
7FFD34979000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page read and write
2CB71395000
heap
page read and write
23C0EA8A000
heap
page read and write
1721EDE6000
heap
page read and write
23C0F6E1000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
7FFD34FA0000
trusted library allocation
page read and write
22A7AC12000
heap
page read and write
218D6B20000
heap
page execute and read and write
21C0041A000
trusted library allocation
page read and write
7FFD34A3F000
trusted library allocation
page read and write
7FFD347BC000
trusted library allocation
page read and write
22900926000
trusted library allocation
page read and write
22A7A770000
heap
page read and write
22A7A3A6000
heap
page read and write
7FFD34A00000
trusted library allocation
page read and write
7FFD34C50000
trusted library allocation
page read and write
213583D0000
unkown
page readonly
7FFD34A80000
trusted library allocation
page read and write
21356690000
heap
page read and write
7FFD34792000
trusted library allocation
page read and write
21C75DC0000
heap
page read and write
7FFD34990000
trusted library allocation
page read and write
22A7A49E000
heap
page read and write
22A7A660000
unkown
page readonly
7FFD3478D000
trusted library allocation
page execute and read and write
20773037000
heap
page read and write
7FFD34AB0000
trusted library allocation
page read and write
23C0EB44000
heap
page read and write
7FFD34F40000
trusted library allocation
page read and write
98C19FE000
stack
page read and write
7FFD34770000
trusted library allocation
page read and write
1BD4E000
stack
page read and write
22A61C76000
trusted library allocation
page read and write
207735D3000
heap
page read and write
7FFD35150000
trusted library allocation
page read and write
2133C550000
trusted library allocation
page read and write
17205C2C000
heap
page read and write
23853BE2000
unkown
page readonly
7FFD34AE7000
trusted library allocation
page read and write
229001AB000
trusted library allocation
page read and write
2AC63420000
heap
page read and write
20700251000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
3FCB4FE000
stack
page read and write
45288F9000
stack
page read and write
21C73048000
heap
page read and write
7FFD3491E000
trusted library allocation
page read and write
7FFD34EE0000
trusted library allocation
page read and write
7FFD34AB0000
trusted library allocation
page read and write
22A7AC18000
heap
page read and write
7FFD349F0000
trusted library allocation
page read and write
5BFC4FE000
stack
page read and write
22A7AE34000
heap
page read and write
7FFD34C20000
trusted library allocation
page execute and read and write
22A7B000000
unkown
page readonly
21C00404000
trusted library allocation
page read and write
C9CC7FF000
stack
page read and write
29B44BE1000
heap
page read and write
3FCB1DB000
stack
page read and write
22A61312000
unkown
page readonly
156F0565000
heap
page read and write
7FFD34985000
trusted library allocation
page read and write
2CB585F6000
trusted library allocation
page read and write
7FFD34794000
trusted library allocation
page read and write
207097E0000
heap
page execute and read and write
7FFD34790000
trusted library allocation
page read and write
7FFD34949000
trusted library allocation
page read and write
C9CCDFD000
stack
page read and write
22A6177B000
trusted library allocation
page read and write
2A126710000
heap
page read and write
7FFD3479B000
trusted library allocation
page execute and read and write
22A61BEB000
trusted library allocation
page read and write
7FFD34784000
trusted library allocation
page read and write
7FFD34994000
trusted library allocation
page read and write
22A613B0000
unkown
page readonly
22A79D40000
unkown
page readonly
7FFD34B90000
trusted library allocation
page execute and read and write
21C77990000
trusted library allocation
page read and write
20709810000
heap
page read and write
7FFD34940000
trusted library allocation
page read and write
2CB713A0000
heap
page read and write
41F247E000
stack
page read and write
7FFD34A47000
trusted library allocation
page read and write
213566CA000
heap
page read and write
45280FE000
stack
page read and write
7FFD35170000
trusted library allocation
page read and write
7FFD349FE000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
2386D2C6000
heap
page read and write
21C7308E000
heap
page read and write
2386D47D000
heap
page read and write
D474A3E000
stack
page read and write
7FFD34797000
trusted library allocation
page read and write
7FFD34AB0000
trusted library allocation
page read and write
7FFD349FF000
trusted library allocation
page read and write
23853D90000
heap
page read and write
7FFD34C56000
trusted library allocation
page read and write
229100C0000
trusted library allocation
page read and write
2133DF8B000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
7FFD34AA0000
trusted library allocation
page execute and read and write
7FFD34AD0000
trusted library allocation
page execute and read and write
7FFD34BD0000
trusted library allocation
page execute and read and write
7FFD34960000
trusted library allocation
page read and write
218D6C10000
heap
page execute and read and write
22A7B070000
unkown
page readonly
7FFD34A50000
trusted library allocation
page read and write
81F1D35000
stack
page read and write
23C0F220000
heap
page read and write
45289F9000
stack
page read and write
22A60BE4000
heap
page read and write
7FFD349F0000
trusted library allocation
page read and write
7FFD34B50000
trusted library allocation
page read and write
A794EFC000
stack
page read and write
F2B8036000
stack
page read and write
156F0000000
unkown
page read and write
7FFD34B07000
trusted library allocation
page read and write
2291022F000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
7FFD34D30000
trusted library allocation
page execute and read and write
7FFD34793000
trusted library allocation
page execute and read and write
5BFC1FF000
stack
page read and write
7FFD347B2000
trusted library allocation
page read and write
15AB968C000
heap
page read and write
2CB58499000
trusted library allocation
page read and write
172060A0000
trusted library allocation
page read and write
C9CD83A000
stack
page read and write
22A7A4BC000
heap
page read and write
23854530000
unkown
page readonly
7FFD349F6000
trusted library allocation
page read and write
23C0F314000
trusted library allocation
page read and write
22A7ABDA000
heap
page read and write
7FFD34982000
trusted library allocation
page read and write
22A6227B000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page read and write
2134DE1E000
trusted library allocation
page read and write
23854570000
unkown
page readonly
7FFD34FFA000
trusted library allocation
page read and write
238546B2000
unkown
page readonly
15ABA191000
trusted library allocation
page read and write
7FFD34A40000
trusted library allocation
page read and write
336E7F4000
stack
page read and write
7FFD34890000
trusted library allocation
page execute and read and write
20770D50000
trusted library allocation
page read and write
672000
unkown
page readonly
21C000AA000
trusted library allocation
page read and write
7FFD34B80000
trusted library allocation
page read and write
7FFD34876000
trusted library allocation
page execute and read and write
4527B7E000
stack
page read and write
7FFD34C10000
trusted library allocation
page read and write
29B44BF1000
heap
page read and write
2386CF03000
heap
page read and write
238545D0000
heap
page execute and read and write
163E000
stack
page read and write
2133C2EE000
heap
page read and write
207098E0000
heap
page execute and read and write
238542C5000
heap
page read and write
218BC7E0000
trusted library allocation
page read and write
20710098000
trusted library allocation
page read and write
7FFD34CA0000
trusted library allocation
page read and write
7FFD3499C000
trusted library allocation
page read and write
15AB9643000
heap
page read and write
7FFD349F0000
trusted library allocation
page read and write
C9CC6EB000
stack
page read and write
7FFD349A4000
trusted library allocation
page read and write
207731B0000
trusted library section
page readonly
21356952000
unkown
page readonly
23854510000
unkown
page readonly
207735EB000
heap
page read and write
17205A10000
unkown
page readonly
22A61D16000
trusted library allocation
page read and write
B822BDE000
stack
page read and write
21C75541000
heap
page read and write
218BC560000
heap
page read and write
23C0F310000
trusted library allocation
page read and write
7FFD34FB0000
trusted library allocation
page read and write
2291017E000
trusted library allocation
page read and write
22A61302000
unkown
page readonly
21356D8C000
heap
page read and write
7FFD35020000
trusted library allocation
page read and write
98C12EE000
stack
page read and write
22A61FF0000
trusted library allocation
page read and write
2133E0DD000
trusted library allocation
page read and write
7FFD34A70000
trusted library allocation
page read and write
7FFD34B50000
trusted library allocation
page read and write
218CE2A5000
trusted library allocation
page read and write
21C0010A000
trusted library allocation
page read and write
7FFD34F70000
trusted library allocation
page read and write
2386CFAE000
heap
page read and write
F2B73FD000
stack
page read and write
1BD50000
heap
page read and write
7FFD34876000
trusted library allocation
page execute and read and write
7FFD347A0000
trusted library allocation
page read and write
15ABEE10000
trusted library allocation
page read and write
F2B7D3E000
stack
page read and write
22900269000
trusted library allocation
page read and write
23C0F52C000
trusted library allocation
page read and write
156F0078000
heap
page read and write
207735EF000
heap
page read and write
98C1EFA000
stack
page read and write
156F041B000
heap
page read and write
7FFD34793000
trusted library allocation
page read and write
7FF497860000
trusted library allocation
page execute and read and write
7FFD34A59000
trusted library allocation
page read and write
21C732E0000
heap
page read and write
7FFD34A20000
trusted library allocation
page read and write
22A7A397000
heap
page read and write
23C0F362000
trusted library allocation
page read and write
7FFD34A30000
trusted library allocation
page read and write
156F0013000
unkown
page read and write
22A7A4F6000
heap
page read and write
238546BE000
unkown
page readonly
22A61F20000
trusted library allocation
page read and write
156F0100000
trusted library allocation
page read and write
2133C570000
trusted library allocation
page read and write
2AC63220000
heap
page read and write
22A60B90000
heap
page read and write
5BFC5FE000
stack
page read and write
C2B307D000
stack
page read and write
7FFD34A30000
trusted library allocation
page read and write
81F2A7A000
stack
page read and write
156F052D000
heap
page read and write
218BE106000
heap
page read and write
7FFD34980000
trusted library allocation
page read and write
22A7A41E000
heap
page read and write
21356890000
heap
page execute and read and write
15ABEC90000
trusted library allocation
page read and write
7FFD34B70000
trusted library allocation
page read and write
7FFD34C43000
trusted library allocation
page read and write
7FFD34B10000
trusted library allocation
page read and write
7FFD34A10000
trusted library allocation
page read and write
7FFD34967000
trusted library allocation
page read and write
17206170000
heap
page read and write
15ABECA0000
trusted library allocation
page read and write
D4749F7000
stack
page read and write
7FFD347FC000
trusted library allocation
page execute and read and write
1B20BE99000
heap
page read and write
7FFD34960000
trusted library allocation
page read and write
17206175000
heap
page read and write
22A79FD0000
unkown
page readonly
7FFD3485C000
trusted library allocation
page execute and read and write
7FFD34B30000
trusted library allocation
page read and write
29B44BE1000
heap
page read and write
7FFD34C66000
trusted library allocation
page read and write
D4746F8000
stack
page read and write
D473DFE000
stack
page read and write
5BFD0FA000
stack
page read and write
33707FF000
stack
page read and write
7FFD34856000
trusted library allocation
page read and write
218BE70B000
trusted library allocation
page read and write
23C0F543000
trusted library allocation
page read and write
156F00AA000
heap
page read and write
7FFD34A30000
trusted library allocation
page execute and read and write
15ABEE10000
trusted library allocation
page read and write
2386D3E4000
heap
page read and write
81F377C000
stack
page read and write
7FFD34C00000
trusted library allocation
page read and write
21C75720000
heap
page read and write
22A7AC77000
heap
page read and write
21356870000
unkown
page readonly
2296F780000
heap
page read and write
7FFD34969000
trusted library allocation
page read and write
7FFD353B0000
trusted library allocation
page read and write
21C771E0000
trusted library section
page read and write
7FFD34836000
trusted library allocation
page read and write
21C72832000
unkown
page readonly
7FFD34973000
trusted library allocation
page read and write
181E000
stack
page read and write
7FFD35280000
trusted library allocation
page execute and read and write
7FFD34D70000
trusted library allocation
page read and write
7FFD34CA8000
trusted library allocation
page read and write
7FFD351A0000
trusted library allocation
page read and write
21C759D9000
heap
page read and write
7FFD34970000
trusted library allocation
page read and write
2386CF68000
heap
page read and write
7FFD3496F000
trusted library allocation
page read and write
7FFD34B60000
trusted library allocation
page read and write
4F5DA7E000
unkown
page readonly
17205A12000
unkown
page readonly
1721EC70000
trusted library section
page read and write
153E000
stack
page read and write
7FFD34930000
trusted library allocation
page read and write
7FFD3503A000
trusted library allocation
page read and write
23C0EC00000
heap
page read and write
2CB683B1000
trusted library allocation
page read and write
17205F85000
heap
page read and write
A3C3FFD000
stack
page read and write
20710078000
trusted library allocation
page read and write
156F0565000
heap
page read and write
22A62087000
trusted library allocation
page read and write
22A60D70000
heap
page read and write
22A7AD73000
heap
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
20723B00000
heap
page execute and read and write
7FFD34AF0000
trusted library allocation
page read and write
2135687C000
unkown
page readonly
7FFD3478D000
trusted library allocation
page execute and read and write
21356D4C000
heap
page read and write
F2B7B3E000
stack
page read and write
7FFD34D90000
trusted library allocation
page read and write
F2B843B000
stack
page read and write
D47397E000
stack
page read and write
7FFD347CB000
trusted library allocation
page execute and read and write
7FFD35270000
trusted library allocation
page read and write
7FFD34A64000
trusted library allocation
page read and write
2B8B8110000
heap
page read and write
7FFD35003000
trusted library allocation
page read and write
7FFD34E00000
trusted library allocation
page read and write
15AB9702000
heap
page read and write
7FFD34C30000
trusted library allocation
page read and write
7FFD349F0000
trusted library allocation
page read and write
7FFD34AD0000
trusted library allocation
page read and write
7FFD34782000
trusted library allocation
page read and write
156F0526000
heap
page read and write
2CB70CD3000
heap
page execute and read and write
20773017000
heap
page read and write
22A61B7C000
trusted library allocation
page read and write
20723950000
heap
page read and write
7FFD348A0000
trusted library allocation
page execute and read and write
23854E8C000
trusted library allocation
page read and write
15ABA580000
trusted library section
page readonly
22A60E20000
trusted library allocation
page read and write
7FFD34C40000
trusted library allocation
page read and write
7FFD349DD000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
17206510000
trusted library section
page read and write
7FFD349C4000
trusted library allocation
page read and write
21C75CB0000
heap
page read and write
156F00F9000
heap
page read and write
7FFD34A69000
trusted library allocation
page read and write
29B44BE1000
heap
page read and write
29B44BCA000
heap
page read and write
22A7ACB1000
heap
page read and write
22A7ADD9000
heap
page read and write
2296F79B000
heap
page read and write
21C74C50000
heap
page execute and read and write
22A79F52000
unkown
page readonly
23C0F376000
trusted library allocation
page read and write
22A7B040000
unkown
page readonly
218BC810000
heap
page read and write
1B20BCE0000
heap
page read and write
21C76ED2000
heap
page read and write
7FFD34A3D000
trusted library allocation
page read and write
7FFD34949000
trusted library allocation
page read and write
2071B291000
trusted library allocation
page read and write
22A79FC8000
unkown
page readonly
22A7AD71000
heap
page read and write
7FFD34866000
trusted library allocation
page execute and read and write
2CB583BC000
trusted library allocation
page read and write
2070027F000
trusted library allocation
page read and write
B823839000
stack
page read and write
218BE4E9000
trusted library allocation
page read and write
7FFD3499A000
trusted library allocation
page read and write
7FFD34E37000
trusted library allocation
page read and write
7FFD34A20000
trusted library allocation
page read and write
20770B38000
heap
page read and write
21355D80000
trusted library allocation
page read and write
22A61450000
heap
page execute and read and write
272F2C78000
heap
page read and write
20B21D15000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
22A617F0000
trusted library allocation
page read and write
22A7A02C000
unkown
page readonly
22A7A282000
unkown
page readonly
7FFD34D40000
trusted library allocation
page read and write
22910015000
trusted library allocation
page read and write
7FFD34D20000
trusted library allocation
page read and write
7FFD34A95000
trusted library allocation
page read and write
2133C5C0000
heap
page read and write
22A7BA1C000
heap
page read and write
7FFD34AA0000
trusted library allocation
page execute and read and write
29B44BF1000
heap
page read and write
20709970000
heap
page read and write
21C000AE000
trusted library allocation
page read and write
23C0F366000
trusted library allocation
page read and write
A3C44F9000
stack
page read and write
81F3B7A000
stack
page read and write
21356792000
unkown
page readonly
23C0F386000
trusted library allocation
page read and write
7FFD34F60000
trusted library allocation
page read and write
20B21AE0000
heap
page read and write
22900276000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
21C0009D000
trusted library allocation
page read and write
21C00433000
trusted library allocation
page read and write
7FFD347A4000
trusted library allocation
page read and write
22A612F0000
unkown
page readonly
1230000
heap
page read and write
22A7AFB0000
heap
page read and write
15ABEE20000
trusted library allocation
page read and write
23C0F35E000
trusted library allocation
page read and write
172064D0000
trusted library section
page read and write
2386CF3B000
heap
page read and write
7FFD349D6000
trusted library allocation
page read and write
D7C000
unkown
page readonly
156F0544000
heap
page read and write
7FFD34A2D000
trusted library allocation
page read and write
7FFD34950000
trusted library allocation
page read and write
7FFD347CB000
trusted library allocation
page execute and read and write
23854600000
unkown
page readonly
29B44C01000
heap
page read and write
129A000
heap
page read and write
238544E2000
unkown
page readonly
3FCB6FE000
stack
page read and write
81F3675000
stack
page read and write
B13E7AD000
stack
page read and write
7FFD34E22000
trusted library allocation
page read and write
2AC63315000
heap
page read and write
22900B35000
trusted library allocation
page read and write
29B44C01000
heap
page read and write
2133C222000
unkown
page readonly
218CE32C000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
23854610000
heap
page read and write
A3C45FD000
stack
page read and write
7FFD348A0000
trusted library allocation
page execute and read and write
2386D34F000
heap
page read and write
7FFD34DA0000
trusted library allocation
page read and write
20770EA5000
heap
page read and write
21C74B40000
trusted library section
page read and write
22A61DB7000
trusted library allocation
page read and write
7FFD34FF0000
trusted library allocation
page read and write
7FFD350A0000
trusted library allocation
page execute and read and write
7FFD34995000
trusted library allocation
page read and write
7370C7E000
stack
page read and write
20772650000
trusted library allocation
page read and write
15ABEC5B000
heap
page read and write
7FFD34E45000
trusted library allocation
page read and write
7FFD34B60000
trusted library allocation
page execute and read and write
7FFD35070000
trusted library allocation
page read and write
A3C3CFE000
stack
page read and write
D4745FD000
stack
page read and write
7FFD34E14000
trusted library allocation
page read and write
20772FC3000
heap
page read and write
1BF4E000
stack
page read and write
2386D457000
heap
page read and write
22A7AAD0000
heap
page read and write
22A7AAF0000
heap
page read and write
17205C20000
heap
page read and write
23C0EA50000
heap
page read and write
7FFD347CC000
trusted library allocation
page execute and read and write
29B44BF1000
heap
page read and write
7FFD34A00000
trusted library allocation
page read and write
20770B6B000
heap
page read and write
2296F6D7000
unkown
page readonly
238545F0000
unkown
page readonly
7FFD3479D000
trusted library allocation
page execute and read and write
20B21D10000
heap
page read and write
2386D2B0000
heap
page read and write
98C1AF9000
stack
page read and write
2AC63328000
heap
page read and write
C9CDA3E000
stack
page read and write
20773AC0000
heap
page read and write
F2B823D000
stack
page read and write
22A60BA6000
heap
page read and write
207735D9000
heap
page read and write
7FFD34990000
trusted library allocation
page read and write
21C755B3000
heap
page read and write
2CB713B0000
heap
page read and write
7FFD34AE0000
trusted library allocation
page read and write
7FFD34AA0000
trusted library allocation
page read and write
21C75765000
heap
page read and write
17216593000
trusted library allocation
page read and write
B823D7E000
stack
page read and write
20773960000
heap
page read and write
22910028000
trusted library allocation
page read and write
17205C49000
heap
page read and write
7FFD35050000
trusted library allocation
page read and write
7FFD34C40000
trusted library allocation
page read and write
B8236FA000
stack
page read and write
7FFD3477D000
trusted library allocation
page execute and read and write
B82373F000
stack
page read and write
22900A10000
trusted library allocation
page read and write
7FFD34B10000
trusted library allocation
page read and write
23C0F7B4000
trusted library allocation
page read and write
21C00447000
trusted library allocation
page read and write
2290026E000
trusted library allocation
page read and write
22900774000
trusted library allocation
page read and write
7FFD34B7E000
trusted library allocation
page read and write
7FFD34774000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page read and write
81F1C3F000
stack
page read and write
22A7A562000
unkown
page readonly
2386D363000
heap
page read and write
22A7A512000
heap
page read and write
7FFD34886000
trusted library allocation
page execute and read and write
22A714E2000
trusted library allocation
page read and write
7FFD34A80000
trusted library allocation
page read and write
7FFD349C0000
trusted library allocation
page read and write
213571D0000
heap
page read and write
F2B71FE000
stack
page read and write
22900929000
trusted library allocation
page read and write
7FFD34B20000
trusted library allocation
page read and write
7FFD34940000
trusted library allocation
page read and write
7FFD34A2E000
trusted library allocation
page read and write
7FFD34CC0000
trusted library allocation
page read and write
7FFD34C10000
trusted library allocation
page read and write
21C74AE0000
trusted library section
page read and write
22A617CC000
trusted library allocation
page read and write
41F2078000
stack
page read and write
21C73064000
heap
page read and write
2CB58741000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page read and write
21C73335000
heap
page read and write
7FFD34C20000
trusted library allocation
page execute and read and write
22A60C0B000
heap
page read and write
7FFD3478D000
trusted library allocation
page execute and read and write
22A617D4000
trusted library allocation
page read and write
1721ED80000
trusted library section
page read and write
218BC540000
heap
page read and write
218BE29E000
trusted library allocation
page read and write
29B44B20000
heap
page read and write
21C76ECE000
heap
page read and write
7FFD347B0000
trusted library allocation
page read and write
21C73220000
trusted library allocation
page read and write
29B44BF1000
heap
page read and write
2CB5681B000
heap
page read and write
29B44BF1000
heap
page read and write
7FFD34E60000
trusted library allocation
page execute and read and write
1B70C000
stack
page read and write
7FFD3498A000
trusted library allocation
page read and write
2133C490000
heap
page read and write
7FFD34D86000
trusted library allocation
page read and write
B8231FE000
stack
page read and write
7FFD34820000
trusted library allocation
page read and write
7FFD34C80000
trusted library allocation
page read and write
207005CC000
trusted library allocation
page read and write
C9CD3F5000
stack
page read and write
7FFD349A0000
trusted library allocation
page read and write
7FFD349A2000
trusted library allocation
page read and write
23853DD0000
heap
page read and write
2CB70ACB000
heap
page read and write
22A79ECA000
heap
page read and write
7FFD34C45000
trusted library allocation
page read and write
4F5E27E000
unkown
page readonly
22A7A78E000
heap
page read and write
272F2BE5000
heap
page read and write
22900B40000
trusted library allocation
page read and write
7FFD35300000
trusted library allocation
page read and write
81F397A000
stack
page read and write
7FFD34922000
trusted library allocation
page read and write
218BC633000
heap
page read and write
7FFD34A10000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
22A7ABA9000
heap
page read and write
4F5D27E000
unkown
page readonly
A7952FF000
stack
page read and write
23853DF4000
heap
page read and write
F2B6DCE000
stack
page read and write
20770E45000
heap
page read and write
7FFD351F0000
trusted library allocation
page read and write
7FFD35220000
trusted library allocation
page read and write
218BE36B000
trusted library allocation
page read and write
2290027E000
trusted library allocation
page read and write
1306000
heap
page read and write
21C75C80000
trusted library section
page read and write
238548FF000
trusted library allocation
page read and write
7FFD34B10000
trusted library allocation
page read and write
7FFD349B4000
trusted library allocation
page read and write
21C75770000
heap
page read and write
5BFBDEE000
stack
page read and write
22A6210F000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
F2B7C3D000
stack
page read and write
4F5E47E000
unkown
page readonly
7FFD34C4B000
trusted library allocation
page read and write
238541AD000
heap
page read and write
3FCB7FB000
stack
page read and write
CB5336C000
stack
page read and write
22A71476000
trusted library allocation
page read and write
23C0E990000
heap
page read and write
21C74B90000
heap
page read and write
29B44C01000
heap
page read and write
2CB68428000
trusted library allocation
page read and write
7FFD34792000
trusted library allocation
page read and write
23C0F77C000
trusted library allocation
page read and write
22A61314000
unkown
page readonly
29B44BF1000
heap
page read and write
238544F0000
unkown
page readonly
C9CCAFD000
stack
page read and write
20773624000
heap
page read and write
7FFD34A80000
trusted library allocation
page read and write
22A714D8000
trusted library allocation
page read and write
B8233FE000
stack
page read and write
129F000
heap
page read and write
7FFD34940000
trusted library allocation
page read and write
D4744F9000
stack
page read and write
20772FD0000
heap
page read and write
7FFD354D0000
trusted library allocation
page execute and read and write
2B8B7E50000
heap
page read and write
21356104000
heap
page read and write
2290027A000
trusted library allocation
page read and write
15ABECCB000
heap
page read and write
7FFD34C70000
trusted library allocation
page read and write
21356A90000
heap
page read and write
7FFD34920000
trusted library allocation
page read and write
23C0F776000
trusted library allocation
page read and write
16B0000
heap
page read and write
21C74C10000
trusted library section
page read and write
7FFD349D0000
trusted library allocation
page read and write
213583C2000
unkown
page readonly
1B20BDE0000
heap
page read and write
7FFD34794000
trusted library allocation
page read and write
29B44BF1000
heap
page read and write
2133C590000
heap
page execute and read and write
7FFD34C1A000
trusted library allocation
page read and write
15ABA570000
trusted library section
page readonly
7FFD34B40000
trusted library allocation
page read and write
22A7A874000
unkown
page readonly
7FFD3497C000
trusted library allocation
page read and write
2133C2F1000
heap
page read and write
7FFD34970000
trusted library allocation
page read and write
22A7AD43000
heap
page read and write
2290079F000
trusted library allocation
page read and write
7FFD3478D000
trusted library allocation
page execute and read and write
238545E0000
unkown
page readonly
20770E30000
heap
page execute and read and write
15ABEB70000
trusted library allocation
page read and write
218BCAE0000
heap
page read and write
21C005C6000
trusted library allocation
page read and write
22A7AC8F000
heap
page read and write
22A79460000
trusted library allocation
page read and write
C2B337E000
stack
page read and write
15AB9613000
heap
page read and write
22A7BA34000
heap
page read and write
7FFD347C0000
trusted library allocation
page read and write
15ABA590000
trusted library section
page readonly
22A7A77E000
heap
page read and write
21356F35000
trusted library allocation
page read and write
F2B79F1000
stack
page read and write
7FFD35380000
trusted library allocation
page read and write
23C0EAB6000
heap
page read and write
7FFD34AC0000
trusted library allocation
page execute and read and write
207735C8000
heap
page read and write
2133C560000
heap
page read and write
156F0024000
unkown
page read and write
7FF42D3D0000
trusted library allocation
page execute and read and write
218D6A3F000
heap
page read and write
2B8B8115000
heap
page read and write
15AC0000000
heap
page read and write
7FFD3497E000
trusted library allocation
page read and write
21C72F25000
unkown
page readonly
7FFD34F20000
trusted library allocation
page read and write
7FFD349C2000
trusted library allocation
page read and write
22A718CE000
trusted library allocation
page read and write
5BFC7F8000
stack
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
7FFD3498C000
trusted library allocation
page read and write
15ABEEE0000
remote allocation
page read and write
21C00204000
trusted library allocation
page read and write
81F357B000
stack
page read and write
7FFD34940000
trusted library allocation
page read and write
7FFD34773000
trusted library allocation
page execute and read and write
22A61F99000
trusted library allocation
page read and write
81F21FE000
stack
page read and write
22A7AAEB000
heap
page read and write
7FFD34D60000
trusted library allocation
page read and write
21356776000
heap
page read and write
81F3875000
stack
page read and write
156F0086000
heap
page read and write
7FFD34B00000
trusted library allocation
page read and write
7FFD34A50000
trusted library allocation
page read and write
20709528000
heap
page read and write
218BE4E0000
trusted library allocation
page read and write
7FFD34F74000
trusted library allocation
page read and write
2CB68448000
trusted library allocation
page read and write
7FFD34A23000
trusted library allocation
page read and write
7FFD34A50000
trusted library allocation
page read and write
2385465C000
unkown
page readonly
7FFD34C30000
trusted library allocation
page read and write
22910041000
trusted library allocation
page read and write
15ABEC2C000
heap
page read and write
5BFC2FE000
stack
page read and write
218BE4E7000
trusted library allocation
page read and write
2386CF5E000
heap
page read and write
7FFD349C5000
trusted library allocation
page read and write
7FFD34FF5000
trusted library allocation
page read and write
2072397F000
heap
page read and write
1B1B0000
trusted library allocation
page read and write
81F22ED000
stack
page read and write
2CB5848B000
trusted library allocation
page read and write
4528AF8000
stack
page read and write
15AB95C0000
trusted library allocation
page read and write
213565C0000
unkown
page readonly
218D6DF0000
heap
page read and write
21356550000
unkown
page readonly
218BC750000
heap
page read and write
21C73066000
heap
page read and write
7FFD3504F000
trusted library allocation
page read and write
22A7A2B0000
unkown
page readonly
21C75790000
heap
page execute and read and write
7FFD348A0000
trusted library allocation
page execute and read and write
7FFD34A57000
trusted library allocation
page read and write
33703FE000
stack
page read and write
7FFD34970000
trusted library allocation
page read and write
22A79FF0000
unkown
page readonly
7FFD34A60000
trusted library allocation
page read and write
21C75DEA000
heap
page read and write
17206614000
trusted library allocation
page read and write
7FFD34B20000
trusted library allocation
page read and write
22A617A4000
trusted library allocation
page read and write
1721EC30000
trusted library section
page read and write
2133C530000
trusted library allocation
page read and write
7FFD34784000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page read and write
2CB56A45000
heap
page read and write
23C0F318000
trusted library allocation
page read and write
3FCB8FE000
stack
page read and write
41F1CFE000
stack
page read and write
2133C2D9000
heap
page read and write
3FCB9FE000
stack
page read and write
7FFD347A0000
trusted library allocation
page read and write
23853DD8000
heap
page read and write
22A617F6000
trusted library allocation
page read and write
207735FF000
heap
page read and write
22A620DD000
trusted library allocation
page read and write
21C75940000
heap
page read and write
15AB9580000
heap
page read and write
2070B280000
heap
page read and write
81F1FFE000
stack
page read and write
7FFD34A7B000
trusted library allocation
page read and write
29B44BE1000
heap
page read and write
D473CFF000
stack
page read and write
5BFBDAE000
stack
page read and write
22A71461000
trusted library allocation
page read and write
21C00576000
trusted library allocation
page read and write
2070022C000
trusted library allocation
page read and write
21C005F5000
trusted library allocation
page read and write
4F5D4FE000
stack
page read and write
7FFD34B1F000
trusted library allocation
page read and write
20770B56000
heap
page read and write
15AB9600000
heap
page read and write
15ABEB70000
trusted library allocation
page read and write
C9CC9FE000
stack
page read and write
2133C227000
unkown
page readonly
29B44C01000
heap
page read and write
23853E0A000
heap
page read and write
22900A70000
trusted library allocation
page read and write
23C0EAF2000
heap
page read and write
1721EE24000
heap
page read and write
7FFD34950000
trusted library allocation
page read and write
2133E0D9000
trusted library allocation
page read and write
15ABED04000
heap
page read and write
29B44BE1000
heap
page read and write
218BE5CB000
trusted library allocation
page read and write
23C0EB1A000
heap
page read and write
213571C0000
heap
page read and write
7FFD34AD0000
trusted library allocation
page execute and read and write
21356882000
unkown
page readonly
45282FD000
stack
page read and write
22A79D33000
unkown
page readonly
7FFD34B40000
trusted library allocation
page read and write
C88EAFF000
stack
page read and write
7FFD34980000
trusted library allocation
page execute and read and write
15AB9560000
heap
page read and write
29B44BF1000
heap
page read and write
7FFD35420000
trusted library allocation
page execute and read and write
2CB56720000
heap
page read and write
22900001000
trusted library allocation
page read and write
7FFD34AD0000
trusted library allocation
page read and write
7FFD34DF0000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
23C0F073000
heap
page read and write
CB5367E000
stack
page read and write
22A79EFB000
heap
page read and write
C9CCFFA000
stack
page read and write
C9CD93B000
stack
page read and write
22A62111000
trusted library allocation
page read and write
7FFD34C90000
trusted library allocation
page read and write
2070000C000
trusted library allocation
page read and write
22900665000
trusted library allocation
page read and write
23C0F6F1000
trusted library allocation
page read and write
218D7340000
heap
page read and write
207094F0000
heap
page read and write
218D6A4B000
heap
page read and write
4F5D07E000
unkown
page readonly
238546B0000
unkown
page readonly
21356D40000
heap
page read and write
218BC853000
heap
page read and write
21C0026E000
trusted library allocation
page read and write
20700258000
trusted library allocation
page read and write
2070B3CB000
trusted library allocation
page read and write
7FFD34C00000
trusted library allocation
page execute and read and write
3181000
trusted library allocation
page read and write
5BFC6FE000
stack
page read and write
5BFC3F7000
stack
page read and write
7FFD34C30000
trusted library allocation
page read and write
7FFD34BE0000
trusted library allocation
page read and write
17205B0D000
unkown
page readonly
2CB70C20000
heap
page read and write
2290015C000
trusted library allocation
page read and write
21C10001000
trusted library allocation
page read and write
7FFD34886000
trusted library allocation
page execute and read and write
7FFD34994000
trusted library allocation
page read and write
7FFD347A3000
trusted library allocation
page execute and read and write
C2B317B000
stack
page read and write
3FCB5FE000
stack
page read and write
C2B31FF000
stack
page read and write
22A60DB0000
heap
page read and write
218BE4C8000
trusted library allocation
page read and write
21C75AE0000
trusted library section
page read and write
7FFD348B0000
trusted library allocation
page execute and read and write
7FFD34BF0000
trusted library allocation
page read and write
23C0F36E000
trusted library allocation
page read and write
22A620FD000
trusted library allocation
page read and write
15ABECF2000
heap
page read and write
21C732F0000
trusted library section
page read and write
7FFD34E34000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page read and write
7FFD349E2000
trusted library allocation
page read and write
1435000
heap
page read and write
2290080F000
trusted library allocation
page read and write
7FFD34934000
trusted library allocation
page read and write
7FFD34950000
trusted library allocation
page read and write
22A714E8000
trusted library allocation
page read and write
7FFD34793000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
21356C10000
unkown
page readonly
213568C0000
unkown
page readonly
2CB703B0000
trusted library allocation
page read and write
22A61C65000
trusted library allocation
page read and write
2386D492000
heap
page read and write
B8234FE000
stack
page read and write
218BC5E6000
heap
page read and write
336F3FE000
stack
page read and write
7FFD34AF0000
trusted library allocation
page read and write
D4743FA000
stack
page read and write
128C000
heap
page read and write
15ABEE70000
trusted library allocation
page read and write
213567CA000
unkown
page readonly
218BC730000
heap
page read and write
21C73000000
heap
page read and write
213568B2000
unkown
page readonly
7FFD34B10000
trusted library allocation
page read and write
15ABA688000
trusted library allocation
page read and write
7FFD34952000
trusted library allocation
page read and write
2B8B7D50000
heap
page read and write
7FFD34B30000
trusted library allocation
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
22A61FEE000
trusted library allocation
page read and write
218D6FD0000
heap
page read and write
207000E9000
trusted library allocation
page read and write
218BE723000
trusted library allocation
page read and write
7FFD34BF0000
trusted library allocation
page read and write
17206560000
heap
page execute and read and write
21C75550000
trusted library section
page read and write
2133E0DB000
trusted library allocation
page read and write
A3C42FE000
stack
page read and write
7FFD349EA000
trusted library allocation
page read and write
B8230FF000
stack
page read and write
2B8B7E30000
heap
page read and write
81F20FA000
stack
page read and write
218BE291000
trusted library allocation
page read and write
2386CEC5000
heap
page read and write
15ABECC2000
heap
page read and write
7FFD347AB000
trusted library allocation
page execute and read and write
D4741FE000
stack
page read and write
21C74C90000
trusted library allocation
page read and write
5BFC0FE000
stack
page read and write
D4742FE000
stack
page read and write
238544FD000
unkown
page readonly
7FFD34A53000
trusted library allocation
page read and write
15AB96B8000
heap
page read and write
238544F2000
unkown
page readonly
23854781000
trusted library allocation
page read and write
2AC63310000
heap
page read and write
7FFD34790000
trusted library allocation
page read and write
41F1C7D000
stack
page read and write
7FFD34A40000
trusted library allocation
page read and write
207735CA000
heap
page read and write
15ABEEE0000
remote allocation
page read and write
7FFD34D9F000
trusted library allocation
page read and write
22A7BB4B000
heap
page read and write
2386D032000
unkown
page readonly
7FFD34B40000
trusted library allocation
page execute and read and write
7FFD347DC000
trusted library allocation
page execute and read and write
21C75450000
heap
page read and write
7FFD34A42000
trusted library allocation
page read and write
22A7BA68000
heap
page read and write
7FFD34A80000
trusted library allocation
page read and write
156F0413000
heap
page read and write
7FFD34D94000
trusted library allocation
page read and write
7FFD3492A000
trusted library allocation
page read and write
2135673D000
heap
page read and write
2CB711E0000
heap
page read and write
218D6DB0000
heap
page read and write
1410000
heap
page execute and read and write
20700371000
trusted library allocation
page read and write
17206571000
trusted library allocation
page read and write
F2B6D7C000
stack
page read and write
7FFD34B40000
trusted library allocation
page read and write
21355DB0000
trusted library allocation
page read and write
218BE379000
trusted library allocation
page read and write
5BFD1FF000
stack
page read and write
7FFD34D10000
trusted library allocation
page read and write
22A7A486000
heap
page read and write
21C002EF000
trusted library allocation
page read and write
21356572000
unkown
page readonly
2290005E000
trusted library allocation
page read and write
7FFD3484C000
trusted library allocation
page execute and read and write
15ABEC20000
heap
page read and write
218D7330000
heap
page read and write
7FFD34C38000
trusted library allocation
page read and write
29B44BDB000
heap
page read and write
7FFD34A37000
trusted library allocation
page read and write
2135668A000
unkown
page readonly
7FFD34792000
trusted library allocation
page read and write
7FFD34C14000
trusted library allocation
page read and write
81F2B78000
stack
page read and write
B13EAFF000
stack
page read and write
7FFD34A70000
trusted library allocation
page read and write
22A7A3FC000
heap
page read and write
22A7AC3B000
heap
page read and write
15AB9DE1000
trusted library allocation
page read and write
21C74C30000
trusted library section
page read and write
156F0523000
heap
page read and write
22A617D8000
trusted library allocation
page read and write
2CB58609000
trusted library allocation
page read and write
23C0F4FB000
trusted library allocation
page read and write
2386D012000
unkown
page readonly
23C0E970000
heap
page read and write
7FFD34AE0000
trusted library allocation
page execute and read and write
21C00234000
trusted library allocation
page read and write
7FFD35250000
trusted library allocation
page read and write
7FFD347C4000
trusted library allocation
page read and write
2CB58632000
trusted library allocation
page read and write
3FCBAFD000
stack
page read and write
22A60E60000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
23853BE0000
unkown
page readonly
7FFD353BC000
trusted library allocation
page read and write
670000
unkown
page readonly
22A60E65000
heap
page read and write
11F0000
heap
page read and write
7FFD34A4D000
trusted library allocation
page read and write
15ABAAB0000
trusted library allocation
page read and write
17205BA0000
heap
page read and write
22A61B6D000
trusted library allocation
page read and write
D4747F9000
stack
page read and write
29B44BE1000
heap
page read and write
81F327E000
stack
page read and write
7FFD34780000
trusted library allocation
page read and write
7FFD34950000
trusted library allocation
page read and write
29B44BF1000
heap
page read and write
21C004BD000
trusted library allocation
page read and write
21C0036A000
trusted library allocation
page read and write
7FFD34C40000
trusted library allocation
page read and write
7FFD34C30000
trusted library allocation
page execute and read and write
23854070000
trusted library allocation
page read and write
23C0F71F000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
156F0402000
heap
page read and write
20B21B26000
heap
page read and write
21C72830000
unkown
page readonly
7FFD3493E000
trusted library allocation
page read and write
218D6FD3000
heap
page read and write
22A71797000
trusted library allocation
page read and write
22A7BA9C000
heap
page read and write
15ABEB41000
trusted library allocation
page read and write
22A61CF4000
trusted library allocation
page read and write
21FA2570000
heap
page read and write
7FFD34924000
trusted library allocation
page read and write
218CE2A9000
trusted library allocation
page read and write
2070957E000
heap
page read and write
22A60BA0000
heap
page read and write
17206540000
trusted library section
page read and write
22A7AAD8000
heap
page read and write
21C755C0000
trusted library section
page read and write
7FFD34960000
trusted library allocation
page read and write
207735D5000
heap
page read and write
23C0F34A000
trusted library allocation
page read and write
2070034B000
trusted library allocation
page read and write
7FFD34860000
trusted library allocation
page execute and read and write
21356790000
unkown
page readonly
17205C92000
heap
page read and write
1721E5A0000
trusted library allocation
page read and write
156F0502000
heap
page read and write
7FFD34955000
trusted library allocation
page read and write
15ABEB20000
trusted library allocation
page read and write
129C000
heap
page read and write
98C15FE000
stack
page read and write
15AB962B000
heap
page read and write
22A620E3000
trusted library allocation
page read and write
2133C368000
heap
page read and write
7FFD34976000
trusted library allocation
page read and write
7FFD3482C000
trusted library allocation
page execute and read and write
213569FE000
unkown
page readonly
81F3C73000
stack
page read and write
2296F760000
heap
page read and write
7FFD34A76000
trusted library allocation
page read and write
7FFD34B30000
trusted library allocation
page read and write
A3C3EFE000
stack
page read and write
2AC63440000
heap
page read and write
21356D72000
heap
page read and write
29B44BF1000
heap
page read and write
20700422000
trusted library allocation
page read and write
22900B37000
trusted library allocation
page read and write
20709520000
heap
page read and write
7FFD34A0E000
trusted library allocation
page read and write
2386D030000
unkown
page readonly
23C0F6FB000
trusted library allocation
page read and write
15AB96B4000
heap
page read and write
20773950000
heap
page read and write
C9CD63F000
stack
page read and write
A3C41FE000
stack
page read and write
7FFD34BF2000
trusted library allocation
page read and write
22910025000
trusted library allocation
page read and write
15AB965B000
heap
page read and write
17205C67000
heap
page read and write
22A7AC1D000
heap
page read and write
7FFD34E10000
trusted library allocation
page read and write
4F5D37E000
unkown
page readonly
7FFD34920000
trusted library allocation
page read and write
229001CA000
trusted library allocation
page read and write
7FFD34A10000
trusted library allocation
page read and write
21C0048A000
trusted library allocation
page read and write
17205C63000
heap
page read and write
2CB567A5000
heap
page read and write
21C74C00000
trusted library section
page read and write
7FFD34783000
trusted library allocation
page execute and read and write
2CB70ABF000
heap
page read and write
22A7AD10000
heap
page read and write
7FFD35120000
trusted library allocation
page read and write
238540C0000
heap
page read and write
23C1F338000
trusted library allocation
page read and write
23854740000
heap
page execute and read and write
29B44BDB000
heap
page read and write
213567F2000
unkown
page readonly
7FFD34932000
trusted library allocation
page read and write
22A6177F000
trusted library allocation
page read and write
7FFD34C10000
trusted library allocation
page read and write
21C74C40000
trusted library section
page read and write
2CB585DD000
trusted library allocation
page read and write
7FFD34E39000
trusted library allocation
page read and write
7FFD34B30000
trusted library allocation
page execute and read and write
21C00572000
trusted library allocation
page read and write
23C0F7E9000
trusted library allocation
page read and write
7FFD34A43000
trusted library allocation
page read and write
737095D000
stack
page read and write
238544E4000
unkown
page readonly
7FFD34B60000
trusted library allocation
page execute and read and write
7FFD34A54000
trusted library allocation
page read and write
21356950000
unkown
page readonly
7FFD34A50000
trusted library allocation
page read and write
15ABEB60000
trusted library allocation
page read and write
218BE280000
heap
page execute and read and write
22A61340000
heap
page read and write
7FFD351D0000
trusted library allocation
page read and write
218BC820000
trusted library allocation
page read and write
156F0544000
heap
page read and write
29B44B60000
heap
page read and write
218BC915000
heap
page read and write
218D6C13000
heap
page execute and read and write
81F273E000
stack
page read and write
156EFFD0000
heap
page read and write
15ABECFB000
heap
page read and write
7FFD34A90000
trusted library allocation
page read and write
2291020E000
trusted library allocation
page read and write
218BC910000
heap
page read and write
156F0565000
heap
page read and write
20770B96000
heap
page read and write
218BE719000
trusted library allocation
page read and write
20700001000
trusted library allocation
page read and write
2CB70CD0000
heap
page execute and read and write
22A79EC2000
heap
page read and write
218D7320000
heap
page read and write
7FFD34A50000
trusted library allocation
page read and write
81F2C70000
stack
page read and write
98C14FE000
stack
page read and write
23853C70000
heap
page read and write
7FFD349CD000
trusted library allocation
page read and write
22A61D49000
trusted library allocation
page read and write
7FFD353A0000
trusted library allocation
page read and write
7FFD347A4000
trusted library allocation
page read and write
1BB4F000
stack
page read and write
7FFD3493A000
trusted library allocation
page read and write
238546D2000
unkown
page readonly
4F5D7FE000
stack
page read and write
15ABEC4E000
heap
page read and write
22A61F34000
trusted library allocation
page read and write
7FFD35130000
trusted library allocation
page read and write
2386CF82000
heap
page read and write
22A7A35C000
heap
page read and write
2CB725BA000
heap
page read and write
41F237A000
stack
page read and write
21356D38000
heap
page read and write
7FFD34C40000
trusted library allocation
page read and write
23853DEA000
heap
page read and write
29B44BE1000
heap
page read and write
7FFD347A4000
trusted library allocation
page read and write
22900A5D000
trusted library allocation
page read and write
15ABEE90000
trusted library allocation
page read and write
23854862000
trusted library allocation
page read and write
22A7146E000
trusted library allocation
page read and write
4528DFA000
stack
page read and write
7FFD349C0000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page execute and read and write
7FFD349DD000
trusted library allocation
page read and write
23C0EC05000
heap
page read and write
21356582000
unkown
page readonly
23C0EA00000
trusted library allocation
page read and write
15ABA440000
trusted library allocation
page read and write
22A79E3D000
unkown
page readonly
22A7B090000
heap
page read and write
7FFD35240000
trusted library allocation
page read and write
4527BBE000
stack
page read and write
7FFD34A67000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page execute and read and write
207097C0000
unkown
page readonly
336F7FB000
stack
page read and write
A3C398E000
stack
page read and write
7FFD34C77000
trusted library allocation
page read and write
4F5D77E000
unkown
page readonly
7FFD351E0000
trusted library allocation
page read and write
15ABA550000
trusted library section
page readonly
20B21A00000
heap
page read and write
B823D37000
stack
page read and write
4F5D2FE000
stack
page read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD34A06000
trusted library allocation
page read and write
7FFD34A37000
trusted library allocation
page read and write
7FFD34992000
trusted library allocation
page read and write
7FFD349AE000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page execute and read and write
7FFD34942000
trusted library allocation
page read and write
13181000
trusted library allocation
page read and write
7FFD34940000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page read and write
7FFD34987000
trusted library allocation
page read and write
23C1F34F000
trusted library allocation
page read and write
272F2C70000
heap
page read and write
7FFD34AF0000
trusted library allocation
page read and write
4F5C19B000
stack
page read and write
213583C0000
unkown
page readonly
2133C510000
heap
page read and write
7FFD347BD000
trusted library allocation
page execute and read and write
7FFD34970000
trusted library allocation
page read and write
7FFD34C20000
trusted library allocation
page read and write
2133DF9F000
trusted library allocation
page read and write
7FFD34A9B000
trusted library allocation
page read and write
98C18FF000
stack
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
13183000
trusted library allocation
page read and write
22A60E00000
trusted library allocation
page read and write
7FFD34B46000
trusted library allocation
page read and write
22A79E3A000
unkown
page readonly
7FFD34846000
trusted library allocation
page read and write
7FFD347B2000
trusted library allocation
page read and write
22A79CE8000
unkown
page readonly
20770B98000
heap
page read and write
22A79D42000
unkown
page readonly
23C0EAB4000
heap
page read and write
22910133000
trusted library allocation
page read and write
29B44BE1000
heap
page read and write
7FFD34790000
trusted library allocation
page read and write
218BE29C000
trusted library allocation
page read and write
21C100F2000
trusted library allocation
page read and write
21C72FB0000
heap
page read and write
213567D0000
unkown
page readonly
21356B60000
heap
page read and write
218CE291000
trusted library allocation
page read and write
2134DD95000
trusted library allocation
page read and write
7FFD3478D000
trusted library allocation
page execute and read and write
7FFD3483C000
trusted library allocation
page execute and read and write
7FFD34C50000
trusted library allocation
page execute and read and write
7FFD349F0000
trusted library allocation
page read and write
20773350000
heap
page read and write
29B44BDB000
heap
page read and write
22A60D90000
heap
page read and write
7FFD34930000
trusted library allocation
page read and write
20770AD0000
heap
page read and write
22A7AD6B000
heap
page read and write
23C0F7E6000
trusted library allocation
page read and write
21356F70000
heap
page read and write
7FFD34A00000
trusted library allocation
page read and write
22A7AD23000
heap
page read and write
22A7AB0D000
heap
page read and write
7FFD34866000
trusted library allocation
page execute and read and write
7FFD349D0000
trusted library allocation
page read and write
22A7BAE4000
heap
page read and write
7FFD34FE0000
trusted library allocation
page read and write
7FFD349BA000
trusted library allocation
page read and write
7FFD35340000
trusted library allocation
page read and write
7FFD347A3000
trusted library allocation
page execute and read and write
7FFD34B00000
trusted library allocation
page read and write
336EBFE000
stack
page read and write
7FFD35080000
trusted library allocation
page read and write
21356AB0000
trusted library section
page readonly
7FFD34910000
trusted library allocation
page read and write
20770D10000
trusted library allocation
page read and write
2386D35D000
heap
page read and write
4F5D8FE000
stack
page read and write
1430000
heap
page read and write
22A7ABB5000
heap
page read and write
15AB96A1000
heap
page read and write
213582DA000
heap
page read and write
207731C0000
heap
page execute and read and write
23C0E890000
heap
page read and write
7FFD34CE0000
trusted library allocation
page read and write
7FFD347BB000
trusted library allocation
page execute and read and write
98C1FF5000
stack
page read and write
23854660000
unkown
page readonly
336FBFF000
stack
page read and write
2077304F000
heap
page read and write
22A7AD3B000
heap
page read and write
7FFD34B40000
trusted library allocation
page read and write
21C72830000
unkown
page readonly
22A61A7B000
trusted library allocation
page read and write
23C0F38A000
trusted library allocation
page read and write
22A71A7C000
trusted library allocation
page read and write
207003E6000
trusted library allocation
page read and write
21C003E9000
trusted library allocation
page read and write
17216854000
trusted library allocation
page read and write
29B44BE1000
heap
page read and write
7FFD3483C000
trusted library allocation
page execute and read and write
7FFD34A30000
trusted library allocation
page read and write
7FFD351C0000
trusted library allocation
page read and write
7FFD34FC0000
trusted library allocation
page execute and read and write
C9CDB39000
stack
page read and write
4F5D6FE000
stack
page read and write
7FFD34B60000
trusted library allocation
page read and write
21C75C90000
trusted library section
page read and write
7FFD34856000
trusted library allocation
page execute and read and write
7FFD347A2000
trusted library allocation
page read and write
7FFD34B20000
trusted library allocation
page read and write
2290026B000
trusted library allocation
page read and write
229005FD000
trusted library allocation
page read and write
15AB95D0000
trusted library section
page read and write
D4748FD000
stack
page read and write
22A7ABB1000
heap
page read and write
7FFD34A33000
trusted library allocation
page read and write
22A61EA9000
trusted library allocation
page read and write
3170000
heap
page read and write
238545D5000
heap
page execute and read and write
7FFD34784000
trusted library allocation
page read and write
218BCAE5000
heap
page read and write
156F0010000
unkown
page read and write
21C756C0000
trusted library section
page read and write
7FFD34DC0000
trusted library allocation
page read and write
B18887E000
unkown
page readonly
2B8B7F10000
heap
page read and write
7FFD354E0000
trusted library allocation
page read and write
2386CEDC000
heap
page read and write
4F5EA7E000
unkown
page readonly
23C0F306000
trusted library allocation
page read and write
7FFD353D0000
trusted library allocation
page read and write
7FFD347A4000
trusted library allocation
page read and write
20770AF0000
heap
page read and write
F2B72FF000
stack
page read and write
2070955E000
heap
page read and write
156F0523000
heap
page read and write
207097C2000
unkown
page readonly
2CB567A0000
heap
page read and write
29B44BE1000
heap
page read and write
23C0F342000
trusted library allocation
page read and write
7FFD35030000
trusted library allocation
page read and write
29B44BE1000
heap
page read and write
7FFD35160000
trusted library allocation
page read and write
23C1F33F000
trusted library allocation
page read and write
2134DD9D000
trusted library allocation
page read and write
7FFD3482C000
trusted library allocation
page execute and read and write
7FFD349E0000
trusted library allocation
page read and write
2CB56620000
heap
page read and write
229100E9000
trusted library allocation
page read and write
7FFD35210000
trusted library allocation
page execute and read and write
218BC59B000
heap
page read and write
7FFD34B10000
trusted library allocation
page read and write
23C0F382000
trusted library allocation
page read and write
218BC770000
heap
page read and write
218D7445000
heap
page read and write
22A62278000
trusted library allocation
page read and write
7FFD34A60000
trusted library allocation
page read and write
23C0F55F000
trusted library allocation
page read and write
22A612F2000
unkown
page readonly
A3C38FE000
stack
page read and write
98C20F9000
stack
page read and write
7FFD34950000
trusted library allocation
page read and write
2CB56A20000
trusted library allocation
page read and write
A3C3DFE000
stack
page read and write
7FFD34AE0000
trusted library allocation
page read and write
23854690000
unkown
page readonly
7FFD34A64000
trusted library allocation
page read and write
22A62050000
trusted library allocation
page read and write
207097C6000
unkown
page readonly
22A7A280000
unkown
page readonly
21356769000
heap
page read and write
29B44BF1000
heap
page read and write
22A60C0E000
heap
page read and write
17205F80000
heap
page read and write
15AB966C000
heap
page read and write
2CB568ED000
heap
page read and write
4F5C87E000
unkown
page readonly
7FFD34DD0000
trusted library allocation
page execute and read and write
22A7A46F000
heap
page read and write
20700281000
trusted library allocation
page read and write
2CB58630000
trusted library allocation
page read and write
17205BF0000
heap
page read and write
7FFD34927000
trusted library allocation
page read and write
156F0500000
heap
page read and write
4F5D9FE000
stack
page read and write
7FFD34920000
trusted library allocation
page read and write
213568F0000
trusted library allocation
page read and write
21C75750000
trusted library section
page readonly
29B44BE1000
heap
page read and write
22A7BA00000
heap
page read and write
2CB683C9000
trusted library allocation
page read and write
207000DB000
trusted library allocation
page read and write
15AB9F1A000
heap
page read and write
2CB583A0000
heap
page read and write
7FFD34920000
trusted library allocation
page read and write
22A7AB81000
heap
page read and write
7FFD34A00000
trusted library allocation
page read and write
20709568000
heap
page read and write
7FFD34794000
trusted library allocation
page read and write
20770B30000
heap
page read and write
22A7AEB2000
heap
page read and write
20774AEC000
heap
page read and write
29B44BF1000
heap
page read and write
156F0115000
trusted library allocation
page read and write
1B20BE97000
heap
page read and write
7FFD34A39000
trusted library allocation
page read and write
7FFD34FF3000
trusted library allocation
page read and write
7FFD34866000
trusted library allocation
page execute and read and write
20774AD0000
heap
page read and write
81F2435000
stack
page read and write
22A7B9CA000
heap
page read and write
229001A0000
trusted library allocation
page read and write
218BC7B0000
trusted library allocation
page read and write
156F00BF000
heap
page read and write
218BE856000
trusted library allocation
page read and write
15ABEB40000
trusted library allocation
page read and write
7FFD34B78000
trusted library allocation
page read and write
23C0EA15000
heap
page read and write
7FFD34AF0000
trusted library allocation
page read and write
7FFD34B6E000
trusted library allocation
page read and write
22A716CA000
trusted library allocation
page read and write
7FFD34933000
trusted library allocation
page read and write
156F041B000
heap
page read and write
22A7A3BE000
heap
page read and write
7FFD3479B000
trusted library allocation
page execute and read and write
7FFD34C20000
trusted library allocation
page read and write
2071B29E000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
20700245000
trusted library allocation
page read and write
29B44BF1000
heap
page read and write
156F008B000
heap
page read and write
1B20BDC0000
heap
page read and write
7FFD34980000
trusted library allocation
page read and write
2077362D000
heap
page read and write
B8235FE000
stack
page read and write
15AB9666000
heap
page read and write
21C0022C000
trusted library allocation
page read and write
7FFD34A80000
trusted library allocation
page read and write
2CB58602000
trusted library allocation
page read and write
2291002E000
trusted library allocation
page read and write
229100A0000
trusted library allocation
page read and write
22900154000
trusted library allocation
page read and write
21C73090000
heap
page read and write
1721EDEA000
heap
page read and write
17205C8F000
heap
page read and write
7FFD35058000
trusted library allocation
page read and write
2386D374000
heap
page read and write
2133C2B0000
heap
page read and write
7FFD35312000
trusted library allocation
page read and write
22A79FC2000
unkown
page readonly
15AB9F00000
heap
page read and write
B82393D000
stack
page read and write
23853D70000
heap
page read and write
7FFD34945000
trusted library allocation
page read and write
2CB70AF4000
heap
page read and write
7FFD34950000
trusted library allocation
page read and write
2386D367000
heap
page read and write
7FFD34AE0000
trusted library allocation
page read and write
4F5E37B000
stack
page read and write
7FFD34EF0000
trusted library allocation
page read and write
20B21B20000
heap
page read and write
218D6DE0000
trusted library section
page readonly
7FFD3483C000
trusted library allocation
page execute and read and write
15AB9713000
heap
page read and write
15ABEC55000
heap
page read and write
156F0102000
trusted library allocation
page read and write
81F317D000
stack
page read and write
98C1CFD000
stack
page read and write
22A7AD0D000
heap
page read and write
22A7A3D4000
heap
page read and write
22A618DB000
trusted library allocation
page read and write
2296F6D0000
unkown
page readonly
238545BE000
unkown
page readonly
98C0FBE000
stack
page read and write
2CB5874B000
trusted library allocation
page read and write
22A79CE2000
unkown
page readonly
C9CD43E000
stack
page read and write
21FA27C5000
heap
page read and write
7FFD34940000
trusted library allocation
page read and write
207731C3000
heap
page execute and read and write
7FFD349D0000
trusted library allocation
page read and write
21C00237000
trusted library allocation
page read and write
29B44BE1000
heap
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
4F5D97E000
unkown
page readonly
7FFD34DA7000
trusted library allocation
page read and write
2386D465000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
29B44BE1000
heap
page read and write
23854662000
unkown
page readonly
29B44BE1000
heap
page read and write
23853BE0000
unkown
page readonly
2386D660000
heap
page read and write
20773AC5000
heap
page read and write
7FFD34A00000
trusted library allocation
page read and write
15ABEB84000
trusted library allocation
page read and write
207735CC000
heap
page read and write
81F3A73000
stack
page read and write
2CB70C23000
heap
page read and write
1289000
heap
page read and write
7FFD349FE000
trusted library allocation
page read and write
21C000B2000
trusted library allocation
page read and write
2386D636000
heap
page read and write
7FFD34965000
trusted library allocation
page read and write
22910019000
trusted library allocation
page read and write
B1886FF000
stack
page read and write
1721EC60000
trusted library section
page read and write
15ABED0A000
heap
page read and write
22A7AF70000
heap
page execute and read and write
7FFD34959000
trusted library allocation
page read and write
21356570000
unkown
page readonly
7FFD34C70000
trusted library allocation
page read and write
2386D5BE000
heap
page read and write
2CB5681D000
heap
page read and write
21C73310000
trusted library section
page read and write
21C75465000
heap
page read and write
7FFD35190000
trusted library allocation
page read and write
2133C220000
unkown
page readonly
7FFD34D00000
trusted library allocation
page read and write
21FA2690000
heap
page read and write
7FFD34F90000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
272F2BE0000
heap
page read and write
B1883BD000
stack
page read and write
2070B38E000
trusted library allocation
page read and write
CB537FE000
unkown
page readonly
7FFD34BF0000
trusted library allocation
page read and write
F2B78F1000
stack
page read and write
7FFD35230000
trusted library allocation
page read and write
23C0EA40000
trusted library allocation
page read and write
7FFD34AC0000
trusted library allocation
page read and write
22A61E95000
trusted library allocation
page read and write
F2B75FF000
stack
page read and write
7FFD34C60000
trusted library allocation
page read and write
21356632000
unkown
page readonly
41F217C000
stack
page read and write
207097C9000
unkown
page readonly
21C72FE0000
heap
page read and write
207003EE000
trusted library allocation
page read and write
2CB5684B000
heap
page read and write
22A7BA6A000
heap
page read and write
2296F6D0000
unkown
page readonly
21C758E6000
heap
page read and write
2386CF19000
heap
page read and write
2070B398000
trusted library allocation
page read and write
7FFD34A90000
trusted library allocation
page read and write
2CB583B1000
trusted library allocation
page read and write
15ABED0D000
heap
page read and write
213571B0000
heap
page read and write
7FFD34C90000
trusted library allocation
page read and write
2386D5C6000
heap
page read and write
22900761000
trusted library allocation
page read and write
29B44A20000
heap
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
7FFD34C0C000
trusted library allocation
page read and write
207735C0000
heap
page read and write
20700417000
trusted library allocation
page read and write
7FFD34AE0000
trusted library allocation
page read and write
7FFD353E0000
trusted library allocation
page read and write
7FFD34C10000
trusted library allocation
page read and write
21356880000
unkown
page readonly
2133C5D5000
heap
page read and write
CB5377E000
stack
page read and write
7FFD34A40000
trusted library allocation
page read and write
238540C5000
heap
page read and write
2CB567D0000
trusted library allocation
page read and write
22A7ABC9000
heap
page read and write
7FFD347DC000
trusted library allocation
page execute and read and write
7FFD34958000
trusted library allocation
page read and write
2133DFCD000
trusted library allocation
page read and write
29B44B00000
heap
page read and write
7FFD34929000
trusted library allocation
page read and write
22A7ACDD000
heap
page read and write
7FFD34773000
trusted library allocation
page execute and read and write
22A61FAE000
trusted library allocation
page read and write
7FFD34B20000
trusted library allocation
page read and write
22A7A680000
unkown
page readonly
7FFD34B57000
trusted library allocation
page read and write
7FFD34AA0000
trusted library allocation
page read and write
7FFD35400000
trusted library allocation
page read and write
21C00106000
trusted library allocation
page read and write
22A7BA7B000
heap
page read and write
7FFD34A60000
trusted library allocation
page execute and read and write
23C0F6DB000
trusted library allocation
page read and write
7FFD34984000
trusted library allocation
page read and write
22A7A2B2000
unkown
page readonly
7FFD34AD0000
trusted library allocation
page execute and read and write
7FFD354A0000
trusted library allocation
page read and write
15ABEC62000
heap
page read and write
2070041B000
trusted library allocation
page read and write
213565C2000
unkown
page readonly
20770EA0000
heap
page read and write
21C74B70000
trusted library section
page read and write
7FFD35180000
trusted library allocation
page read and write
22A613B2000
unkown
page readonly
2CB71390000
heap
page read and write
2133C31A000
heap
page read and write
7FFD3499A000
trusted library allocation
page read and write
21356F92000
unkown
page readonly
20700261000
trusted library allocation
page read and write
7FFD34DA5000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
23854770000
heap
page execute and read and write
7FFD34DA2000
trusted library allocation
page read and write
2CB567E0000
heap
page read and write
2133DFA3000
trusted library allocation
page read and write
22A7BAEA000
heap
page read and write
7FFD34CD0000
trusted library allocation
page read and write
2070B393000
trusted library allocation
page read and write
7FFD34AE0000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page execute and read and write
22A60E75000
heap
page read and write
22A7A350000
heap
page read and write
7FFD34E26000
trusted library allocation
page read and write
7FFD34A52000
trusted library allocation
page read and write
7FFD34E50000
trusted library allocation
page read and write
2CB70BF0000
heap
page execute and read and write
21356ABF000
trusted library section
page readonly
22A61D75000
trusted library allocation
page read and write
7FFD347A4000
trusted library allocation
page read and write
29B44BF1000
heap
page read and write
7FFD34C00000
trusted library allocation
page execute and read and write
229007B2000
trusted library allocation
page read and write
7FFD34BF5000
trusted library allocation
page read and write
22A7A872000
unkown
page readonly
7FFD34BF7000
trusted library allocation
page read and write
B822FFE000
stack
page read and write
23853E0D000
heap
page read and write
23C0F96B000
trusted library allocation
page read and write
218CE2AD000
trusted library allocation
page read and write
2133DF97000
trusted library allocation
page read and write
21C755B0000
heap
page read and write
7FFD35390000
trusted library allocation
page read and write
15AB968F000
heap
page read and write
21C0017B000
trusted library allocation
page read and write
2CB56A40000
heap
page read and write
7FFD34A34000
trusted library allocation
page read and write
7370D7E000
stack
page read and write
7FFD34AF0000
trusted library allocation
page read and write
2296F6D4000
unkown
page readonly
7FFD34B88000
trusted library allocation
page read and write
7FFD34782000
trusted library allocation
page read and write
7FFD34B8E000
trusted library allocation
page read and write
7FFD35026000
trusted library allocation
page read and write
2133C5C3000
heap
page read and write
7FFD34919000
trusted library allocation
page read and write
7FFD35024000
trusted library allocation
page read and write
7FFD34826000
trusted library allocation
page read and write
2070B332000
trusted library allocation
page read and write
7FFD34C30000
trusted library allocation
page read and write
C9CCEFE000
stack
page read and write
B823B3A000
stack
page read and write
7FFD34850000
trusted library allocation
page read and write
23854C74000
trusted library allocation
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
22A7AB74000
heap
page read and write
7FFD347B4000
trusted library allocation
page read and write
7FFD34AB0000
trusted library allocation
page execute and read and write
23854E10000
trusted library allocation
page read and write
7FFD34784000
trusted library allocation
page read and write
7FFD34A72000
trusted library allocation
page read and write
7FFD34866000
trusted library allocation
page execute and read and write
2386D2FF000
heap
page read and write
15ABEB40000
trusted library allocation
page read and write
5BFC8F7000
stack
page read and write
7FFD34BF0000
trusted library allocation
page read and write
1B20C095000
heap
page read and write
2296F7E7000
heap
page read and write
15AB9590000
heap
page read and write
7FFD34B40000
trusted library allocation
page read and write
7FFD34939000
trusted library allocation
page read and write
7FFD35360000
trusted library allocation
page read and write
22A617E0000
trusted library allocation
page read and write
41F1D7E000
stack
page read and write
22A61FA4000
trusted library allocation
page read and write
218BE510000
trusted library allocation
page read and write
7FFD34BE0000
trusted library allocation
page read and write
7FFD354B0000
trusted library allocation
page read and write
7FFD34C72000
trusted library allocation
page read and write
22900924000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page execute and read and write
15ABEB80000
trusted library allocation
page read and write
2CB56740000
heap
page read and write
7FFD34C23000
trusted library allocation
page read and write
21C75CA0000
trusted library section
page read and write
22A7BA7F000
heap
page read and write
21356580000
unkown
page readonly
23C0EA8D000
heap
page read and write
7FFD34890000
trusted library allocation
page execute and read and write
29B44BE1000
heap
page read and write
20773330000
heap
page read and write
21356C12000
unkown
page readonly
7FFD34BC0000
trusted library allocation
page read and write
22A61783000
trusted library allocation
page read and write
22A7A4A6000
heap
page read and write
272F2B70000
heap
page read and write
7FFD349AA000
trusted library allocation
page read and write
15AB9E15000
heap
page read and write
7FFD34830000
trusted library allocation
page read and write
21356F75000
heap
page read and write
2CB70D90000
trusted library section
page readonly
2070B31C000
trusted library allocation
page read and write
22A61E93000
trusted library allocation
page read and write
2CB567E8000
heap
page read and write
29B44BC0000
heap
page read and write
213582C0000
heap
page read and write
22A79FF2000
unkown
page readonly
7FFD34944000
trusted library allocation
page read and write
23C0F567000
trusted library allocation
page read and write
2386D3A0000
heap
page read and write
22A7AEC6000
heap
page read and write
C9CDC3B000
stack
page read and write
7FFD347AB000
trusted library allocation
page execute and read and write
23854550000
unkown
page readonly
2CB683CD000
trusted library allocation
page read and write
7FFD34B60000
trusted library allocation
page read and write
23853D50000
heap
page read and write
7FFD34E30000
trusted library allocation
page read and write
15AB9E02000
heap
page read and write
7FFD34A80000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
22A60C63000
heap
page read and write
1291000
heap
page read and write
21356F90000
unkown
page readonly
7FFD34A72000
trusted library allocation
page read and write
7FFD34920000
trusted library allocation
page read and write
7FFD34946000
trusted library allocation
page read and write
7FFD34E20000
trusted library allocation
page read and write
7FFD34A36000
trusted library allocation
page read and write
4F5C777000
stack
page read and write
132E000
heap
page read and write
218BE4D4000
trusted library allocation
page read and write
7FFD34A10000
trusted library allocation
page read and write
22A7A870000
unkown
page readonly
7FFD34A20000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
15ABECA4000
heap
page read and write
21C74B60000
trusted library section
page read and write
7FFD34C80000
trusted library allocation
page read and write
23C0F54D000
trusted library allocation
page read and write
A794FFF000
stack
page read and write
21C0017D000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
1C04C000
stack
page read and write
229005FF000
trusted library allocation
page read and write
7FFD34B10000
trusted library allocation
page read and write
22A797ED000
heap
page read and write
7FFD347AD000
trusted library allocation
page execute and read and write
7FFD34A27000
trusted library allocation
page read and write
22A62100000
trusted library allocation
page read and write
7FFD34950000
trusted library allocation
page read and write
4F5E17B000
stack
page read and write
7FFD34E42000
trusted library allocation
page read and write
7FFD3497F000
trusted library allocation
page read and write
1721EDD0000
heap
page read and write
7FFD34C60000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page read and write
E5B04BD000
stack
page read and write
21356630000
unkown
page readonly
F2B77FD000
stack
page read and write
2AC63360000
heap
page read and write
7FFD3478D000
trusted library allocation
page execute and read and write
F2B76FE000
stack
page read and write
7FFD34FD0000
trusted library allocation
page read and write
22A79FA0000
heap
page execute and read and write
7FFD34990000
trusted library allocation
page read and write
15AB966E000
heap
page read and write
15ABEB9E000
trusted library allocation
page read and write
22A60BBE000
heap
page read and write
218BE6E6000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
7FFD349D2000
trusted library allocation
page read and write
7FFD34939000
trusted library allocation
page read and write
7FFD34A70000
trusted library allocation
page read and write
7FFD3483C000
trusted library allocation
page execute and read and write
7FFD347A2000
trusted library allocation
page read and write
7FFD34782000
trusted library allocation
page read and write
29B44BDB000
heap
page read and write
7FFD349AC000
trusted library allocation
page read and write
22A7AC4F000
heap
page read and write
23C0F7CB000
trusted library allocation
page read and write
2386D36C000
heap
page read and write
156F009B000
heap
page read and write
2386D583000
heap
page read and write
1267000
heap
page read and write
15ABECFD000
heap
page read and write
21C74BA0000
trusted library section
page read and write
23854620000
unkown
page readonly
7FFD34C50000
trusted library allocation
page execute and read and write
2A126AF0000
heap
page read and write
29B44BE1000
heap
page read and write
7FFD34977000
trusted library allocation
page read and write
21C73020000
heap
page read and write
20709815000
heap
page read and write
7FFD349EE000
trusted library allocation
page read and write
7FFD349DC000
trusted library allocation
page read and write
7FFD3492C000
trusted library allocation
page read and write
98C13FE000
stack
page read and write
7FFD34910000
trusted library allocation
page read and write
7FFD3509A000
trusted library allocation
page read and write
22A6210B000
trusted library allocation
page read and write
7FFD34B00000
trusted library allocation
page read and write
2386D5BA000
heap
page read and write
22A61EC8000
trusted library allocation
page read and write
2CB70A70000
heap
page read and write
7FFD34D8C000
trusted library allocation
page read and write
29B44BE1000
heap
page read and write
2133C220000
unkown
page readonly
21356D75000
heap
page read and write
21C75760000
heap
page read and write
7FFD349E6000
trusted library allocation
page read and write
2CB58747000
trusted library allocation
page read and write
2291012C000
trusted library allocation
page read and write
7FFD34B30000
trusted library allocation
page read and write
2386CF46000
heap
page read and write
7FFD34794000
trusted library allocation
page read and write
7FFD34B00000
trusted library allocation
page read and write
2A126700000
heap
page read and write
15AB9E00000
heap
page read and write
23854840000
trusted library allocation
page read and write
7FFD34C00000
trusted library allocation
page read and write
156F0544000
heap
page read and write
7FFD34C70000
trusted library allocation
page execute and read and write
7FFD34D50000
trusted library allocation
page read and write
7FFD34977000
trusted library allocation
page read and write
81F2836000
stack
page read and write
7FFD34970000
trusted library allocation
page read and write
2CB70F50000
heap
page read and write
23C1F231000
trusted library allocation
page read and write
22900060000
trusted library allocation
page read and write
5BFC9EE000
stack
page read and write
7FFD347FC000
trusted library allocation
page execute and read and write
5BFCDEE000
stack
page read and write
156F041B000
heap
page read and write
7FFD34C10000
trusted library allocation
page read and write
22A79E50000
heap
page read and write
2133C573000
trusted library allocation
page read and write
7FFD34770000
trusted library allocation
page read and write
15AB9F02000
heap
page read and write
22A7A68C000
unkown
page readonly
98C16FD000
stack
page read and write
98C1DF8000
stack
page read and write
20710015000
trusted library allocation
page read and write
20773970000
heap
page read and write
7FFD34C50000
trusted library allocation
page read and write
7FFD34C60000
trusted library allocation
page read and write
2CB56848000
heap
page read and write
21C74FEA000
heap
page read and write
20772F70000
heap
page execute and read and write
7FFD35352000
trusted library allocation
page read and write
22900655000
trusted library allocation
page read and write
1C14E000
stack
page read and write
2386D3C9000
heap
page read and write
7FFD34783000
trusted library allocation
page execute and read and write
22A7BA96000
heap
page read and write
21C76EB0000
heap
page read and write
7FFD349D0000
trusted library allocation
page read and write
21C770F0000
trusted library section
page read and write
22A714DE000
trusted library allocation
page read and write
45281FE000
stack
page read and write
17205C4C000
heap
page read and write
7FFD34AA0000
trusted library allocation
page read and write
21FA27C0000
heap
page read and write
229100ED000
trusted library allocation
page read and write
7FFD34A40000
trusted library allocation
page read and write
2386D469000
heap
page read and write
2AC63320000
heap
page read and write
21C758E0000
heap
page read and write
2134DD99000
trusted library allocation
page read and write
7FFD34969000
trusted library allocation
page read and write
238647E9000
trusted library allocation
page read and write
2CB6844D000
trusted library allocation
page read and write
7FFD34BB0000
trusted library allocation
page read and write
7FFD34942000
trusted library allocation
page read and write
2386D480000
heap
page read and write
7FFD34927000
trusted library allocation
page read and write
218D6979000
heap
page read and write
7FFD349A0000
trusted library allocation
page read and write
7FFD34A90000
trusted library allocation
page execute and read and write
7FFD34AF5000
trusted library allocation
page read and write
29B44BE1000
heap
page read and write
4527FFF000
stack
page read and write
7FFD34B70000
trusted library allocation
page execute and read and write
2386D40A000
heap
page read and write
4528BF7000
stack
page read and write
7FFD3494C000
trusted library allocation
page read and write
2386D2A6000
heap
page read and write
2386CF72000
heap
page read and write
5BFCEF8000
stack
page read and write
7FFD34850000
trusted library allocation
page read and write
2386D5CA000
heap
page read and write
7FFD34A32000
trusted library allocation
page read and write
21356560000
unkown
page readonly
22A79D30000
unkown
page readonly
23C1F245000
trusted library allocation
page read and write
21C002E9000
trusted library allocation
page read and write
45285FE000
stack
page read and write
5BFCBFB000
stack
page read and write
23C0EA43000
trusted library allocation
page read and write
7FFD34BC7000
trusted library allocation
page read and write
23C0F6E7000
trusted library allocation
page read and write
7FFD349B2000
trusted library allocation
page read and write
22A617EC000
trusted library allocation
page read and write
207729D2000
heap
page read and write
B823A3D000
stack
page read and write
29B44BF1000
heap
page read and write
7FFD34B5E000
trusted library allocation
page read and write
22A7A560000
unkown
page readonly
22A79F50000
unkown
page readonly
81F2973000
stack
page read and write
218BC7E3000
trusted library allocation
page read and write
22A6169F000
trusted library allocation
page read and write
7FFD34928000
trusted library allocation
page read and write
20770AB0000
heap
page read and write
7FFD34990000
trusted library allocation
page read and write
156F041B000
heap
page read and write
23C0F231000
trusted library allocation
page read and write
22A7A302000
unkown
page readonly
7FFD34E09000
trusted library allocation
page read and write
7FFD34E0B000
trusted library allocation
page read and write
22A7B971000
heap
page read and write
7FFD34A60000
trusted library allocation
page read and write
7FFD35028000
trusted library allocation
page read and write
7FFD34B20000
trusted library allocation
page read and write
17206661000
trusted library allocation
page read and write
218BC850000
heap
page read and write
2CB58907000
trusted library allocation
page read and write
213567F4000
unkown
page readonly
22A621F3000
trusted library allocation
page read and write
21C00001000
trusted library allocation
page read and write
218BC5D5000
heap
page read and write
7FFD34783000
trusted library allocation
page execute and read and write
7FFD34950000
trusted library allocation
page read and write
22A7AB5B000
heap
page read and write
7FFD34F50000
trusted library allocation
page read and write
2070000E000
trusted library allocation
page read and write
7FFD34A10000
trusted library allocation
page read and write
15ABED02000
heap
page read and write
2070956A000
heap
page read and write
2291001D000
trusted library allocation
page read and write
7FFD34C18000
trusted library allocation
page read and write
5BFD3FB000
stack
page read and write
7FFD3485C000
trusted library allocation
page execute and read and write
7FFD34A8B000
trusted library allocation
page read and write
2133C4B0000
heap
page read and write
2386D010000
unkown
page readonly
2386D427000
heap
page read and write
2133C3B0000
heap
page read and write
7FFD34C00000
trusted library allocation
page read and write
2CB58580000
trusted library allocation
page read and write
2070B319000
trusted library allocation
page read and write
7FFD34C35000
trusted library allocation
page read and write
7FFD34AF0000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page read and write
C9CCCFE000
stack
page read and write
2CB56A10000
heap
page execute and read and write
E5B05BE000
stack
page read and write
7FFD3499D000
trusted library allocation
page read and write
213568B0000
unkown
page readonly
2CB567D3000
trusted library allocation
page read and write
7FFD347EC000
trusted library allocation
page execute and read and write
7FFD34C50000
trusted library allocation
page read and write
15ABEC8C000
heap
page read and write
15ABECE8000
heap
page read and write
29B44BF1000
heap
page read and write
7FFD34936000
trusted library allocation
page read and write
22A7AB03000
heap
page read and write
22A61E62000
trusted library allocation
page read and write
15AB9696000
heap
page read and write
23C0EB47000
heap
page read and write
98C1BFE000
stack
page read and write
7FFD34AC0000
trusted library allocation
page read and write
21C101D7000
trusted library allocation
page read and write
1B20BE90000
heap
page read and write
22A612F6000
unkown
page readonly
7FFD34AD0000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
22900653000
trusted library allocation
page read and write
22A61CF1000
trusted library allocation
page read and write
2CB70B4F000
heap
page read and write
7FFD34A20000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
20772FC0000
heap
page read and write
7FFD34AA0000
trusted library allocation
page read and write
23C0EB90000
heap
page execute and read and write
41F257F000
stack
page read and write
238544E0000
unkown
page readonly
22900659000
trusted library allocation
page read and write
4F5D17B000
stack
page read and write
15ABEB30000
trusted library allocation
page read and write
218BC5C9000
heap
page read and write
22A62206000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
81F263E000
stack
page read and write
20772680000
trusted library allocation
page read and write
5BFD2FA000
stack
page read and write
22A7A3D8000
heap
page read and write
22A61F08000
trusted library allocation
page read and write
238540A3000
trusted library allocation
page read and write
22A7AD06000
heap
page read and write
7FFD34AEA000
trusted library allocation
page read and write
23854DB6000
trusted library allocation
page read and write
218BE700000
trusted library allocation
page read and write
22A617E4000
trusted library allocation
page read and write
2133C2B6000
heap
page read and write
7FFD34B58000
trusted library allocation
page read and write
23854C1A000
trusted library allocation
page read and write
2CB5897A000
trusted library allocation
page read and write
A3C43FA000
stack
page read and write
7FFD34780000
trusted library allocation
page read and write
7FFD349F0000
trusted library allocation
page read and write
2386CF54000
heap
page read and write
218BE7E6000
trusted library allocation
page read and write
22A61F0B000
trusted library allocation
page read and write
7FFD347DC000
trusted library allocation
page execute and read and write
22A7A408000
heap
page read and write
22A62049000
trusted library allocation
page read and write
23C0F6EE000
trusted library allocation
page read and write
21C7545C000
heap
page read and write
22A7BA9A000
heap
page read and write
15ABEAB0000
trusted library allocation
page read and write
1BC4E000
stack
page read and write
22900B3C000
trusted library allocation
page read and write
2290092D000
trusted library allocation
page read and write
2133E312000
trusted library allocation
page read and write
7FFD34783000
trusted library allocation
page execute and read and write
7FFD34846000
trusted library allocation
page read and write
7FFD34AA0000
trusted library allocation
page read and write
238544FA000
unkown
page readonly
156F00B2000
heap
page read and write
22A61C57000
trusted library allocation
page read and write
7FFD35330000
trusted library allocation
page read and write
22A7A2BE000
unkown
page readonly
7FFD34A5D000
trusted library allocation
page read and write
2CB70AAA000
heap
page read and write
22A7A3E3000
heap
page read and write
21C72FC0000
heap
page read and write
22A60E6E000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
21C005E5000
trusted library allocation
page read and write
45287F4000
stack
page read and write
7FFD349CA000
trusted library allocation
page read and write
20709770000
trusted library allocation
page read and write
7FFD34850000
trusted library allocation
page execute and read and write
7FFD34CAC000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
22910001000
trusted library allocation
page read and write
22A617C8000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page execute and read and write
A3C48FF000
stack
page read and write
2133E09B000
trusted library allocation
page read and write
336FFFE000
stack
page read and write
22A7A682000
unkown
page readonly
207095A6000
heap
page read and write
23C0F7FD000
trusted library allocation
page read and write
7FFD353C0000
trusted library allocation
page read and write
22A7A404000
heap
page read and write
7FFD3498E000
trusted library allocation
page read and write
2134DDFE000
trusted library allocation
page read and write
2386D5B4000
heap
page read and write
22A60B00000
unkown
page readonly
F2B70FE000
stack
page read and write
C9CD53E000
stack
page read and write
2CB583BE000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
7FFD34946000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
156EFFB0000
heap
page read and write
98C0F7F000
stack
page read and write
30BF000
stack
page read and write
7FFD34790000
trusted library allocation
page read and write
218CE307000
trusted library allocation
page read and write
7FFD34AB0000
trusted library allocation
page read and write
22900272000
trusted library allocation
page read and write
2386D580000
heap
page read and write
C2B32FF000
stack
page read and write
7FFD34B02000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
4F5D47E000
unkown
page readonly
7FFD349A0000
trusted library allocation
page read and write
4527EEE000
stack
page read and write
21C732E5000
heap
page read and write
22A61310000
unkown
page readonly
7FFD34836000
trusted library allocation
page read and write
7FFD34A70000
trusted library allocation
page read and write
7FFD34B00000
trusted library allocation
page read and write
22A7ADA4000
heap
page read and write
7FFD35090000
trusted library allocation
page read and write
22A61348000
heap
page read and write
7FFD34C48000
trusted library allocation
page read and write
7FFD34A85000
trusted library allocation
page read and write
7FFD348A0000
trusted library allocation
page execute and read and write
7FFD349A0000
trusted library allocation
page read and write
2133DF7F000
trusted library allocation
page read and write
2CB703E0000
trusted library allocation
page read and write
218BC59F000
heap
page read and write
22A714A3000
trusted library allocation
page read and write
23C0F7C6000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
2CB724A0000
heap
page read and write
156F0419000
heap
page read and write
7FFD347C4000
trusted library allocation
page read and write
218D6290000
trusted library allocation
page read and write
7FFD34AB0000
trusted library allocation
page read and write
15ABA680000
trusted library allocation
page read and write
23854622000
unkown
page readonly
156F00D8000
heap
page read and write
7FFD34B10000
trusted library allocation
page read and write
22A61300000
unkown
page readonly
29B44BE1000
heap
page read and write
7FFD349BC000
trusted library allocation
page read and write
7FFD349E6000
trusted library allocation
page read and write
2386D0A4000
unkown
page readonly
7FFD34ADA000
trusted library allocation
page read and write
2A126730000
heap
page read and write
C88E8FB000
stack
page read and write
7FFD34CA0000
trusted library allocation
page read and write
7FFD34920000
trusted library allocation
page read and write
7FFD34A90000
trusted library allocation
page read and write
7FFD34922000
trusted library allocation
page read and write
2A126AF5000
heap
page read and write
C9CDD36000
stack
page read and write
7FFD347C0000
trusted library allocation
page read and write
2386CEB0000
heap
page read and write
7FFD34940000
trusted library allocation
page read and write
21FA2480000
heap
page read and write
7FFD34830000
trusted library allocation
page execute and read and write
7FFD34B30000
trusted library allocation
page read and write
21C00431000
trusted library allocation
page read and write
7FFD34C30000
trusted library allocation
page read and write
22A7A300000
unkown
page readonly
7FFD34DE0000
trusted library allocation
page execute and read and write
7FFD34990000
trusted library allocation
page read and write
20710019000
trusted library allocation
page read and write
7FFD347CD000
trusted library allocation
page execute and read and write
21C101C6000
trusted library allocation
page read and write
17206490000
trusted library section
page read and write
7FFD34950000
trusted library allocation
page execute and read and write
29B44BF1000
heap
page read and write
22A7A5E0000
unkown
page readonly
7FFD349A0000
trusted library allocation
page read and write
7FFD3500A000
trusted library allocation
page read and write
7FFD34A3C000
trusted library allocation
page read and write
21FA2578000
heap
page read and write
1B20C090000
heap
page read and write
7FFD347BD000
trusted library allocation
page execute and read and write
7FFD34C4F000
trusted library allocation
page read and write
2133DF72000
trusted library allocation
page read and write
C9CC3EE000
stack
page read and write
2CB725A0000
heap
page read and write
21C75900000
heap
page read and write
7FFD34B20000
trusted library allocation
page read and write
21356A60000
heap
page execute and read and write
7FFD347EC000
trusted library allocation
page execute and read and write
2CB5897C000
trusted library allocation
page read and write
218BE6F4000
trusted library allocation
page read and write
5BFCCEE000
stack
page read and write
C9CD736000
stack
page read and write
7FFD34850000
trusted library allocation
page execute and read and write
22A7BA4A000
heap
page read and write
B13EBFE000
stack
page read and write
22900B3A000
trusted library allocation
page read and write
81F3D77000
stack
page read and write
22A7A3E9000
heap
page read and write
22A617DC000
trusted library allocation
page read and write
2070B291000
trusted library allocation
page read and write
17205C61000
heap
page read and write
29B44BE1000
heap
page read and write
7FFD3499E000
trusted library allocation
page read and write
21C75793000
heap
page execute and read and write
23854730000
trusted library allocation
page read and write
7FFD34942000
trusted library allocation
page read and write
29B44CC0000
heap
page read and write
F2B7AFE000
stack
page read and write
15ABEEE0000
remote allocation
page read and write
22A61771000
trusted library allocation
page read and write
218BE6D5000
trusted library allocation
page read and write
22A79E9E000
heap
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
5BFBD1F000
stack
page read and write
22A61D6F000
trusted library allocation
page read and write
7FFD34774000
trusted library allocation
page read and write
22A79490000
trusted library allocation
page read and write
2CB70B5A000
heap
page read and write
23853E37000
heap
page read and write
13A0000
trusted library allocation
page read and write
7FFD35056000
trusted library allocation
page read and write
22A62159000
trusted library allocation
page read and write
17205BB0000
heap
page read and write
7FFD34A54000
trusted library allocation
page read and write
22A79FD2000
unkown
page readonly
7FFD347DC000
trusted library allocation
page execute and read and write
7FFD34B80000
trusted library allocation
page execute and read and write
2296F7EB000
heap
page read and write
22A7A33E000
unkown
page readonly
22900B42000
trusted library allocation
page read and write
22A62220000
trusted library allocation
page read and write
21C101C3000
trusted library allocation
page read and write
2133C515000
heap
page read and write
22A616A7000
trusted library allocation
page read and write
7FFD34C40000
trusted library allocation
page execute and read and write
23C1F23D000
trusted library allocation
page read and write
20B21B00000
heap
page read and write
7FFD34B50000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
22A617D0000
trusted library allocation
page read and write
7FFD353F0000
trusted library allocation
page read and write
21357160000
trusted library section
page read and write
218D84D0000
heap
page read and write
272F2B90000
heap
page read and write
17205BD0000
heap
page read and write
7FFD34CB0000
trusted library allocation
page read and write
23854520000
unkown
page readonly
7FFD35045000
trusted library allocation
page read and write
C9CD2F0000
stack
page read and write
41F23FE000
stack
page read and write
2296F7BE000
heap
page read and write
7FFD34A70000
trusted library allocation
page read and write
213567F0000
unkown
page readonly
218BC7D0000
trusted library allocation
page read and write
7FFD3479D000
trusted library allocation
page execute and read and write
2CB586FD000
trusted library allocation
page read and write
7FFD34836000
trusted library allocation
page read and write
21C73240000
trusted library allocation
page read and write
2133C31E000
heap
page read and write
22A617E8000
trusted library allocation
page read and write
2CB683C5000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page read and write
21FA2670000
heap
page read and write
7FFD34C36000
trusted library allocation
page read and write
7FFD3492D000
trusted library allocation
page read and write
207001C4000
trusted library allocation
page read and write
15ABEAC0000
trusted library allocation
page read and write
7FFD34B32000
trusted library allocation
page read and write
15ABEE80000
trusted library allocation
page read and write
22A7AC41000
heap
page read and write
23C0F372000
trusted library allocation
page read and write
7FFD34C20000
trusted library allocation
page read and write
21C75C60000
trusted library section
page read and write
7FFD34A40000
trusted library allocation
page read and write
22A61430000
trusted library allocation
page read and write
21C772E0000
trusted library section
page read and write
21C00581000
trusted library allocation
page read and write
7FFD34944000
trusted library allocation
page read and write
15AB9F13000
heap
page read and write
218D7440000
heap
page read and write
7FFD34B67000
trusted library allocation
page read and write
2386CF10000
heap
page read and write
7FFD34B50000
trusted library allocation
page read and write
22A7AC5B000
heap
page read and write
7FFD34A6B000
trusted library allocation
page read and write
7FFD34A20000
trusted library allocation
page read and write
2290074E000
trusted library allocation
page read and write
7FFD34AB0000
trusted library allocation
page execute and read and write
4F5CF79000
stack
page read and write
22A7AB97000
heap
page read and write
22A7B002000
unkown
page readonly
7FFD34C40000
trusted library allocation
page read and write
C9CCBFF000
stack
page read and write
218BE4BB000
trusted library allocation
page read and write
7FFD35140000
trusted library allocation
page execute and read and write
207094E0000
heap
page read and write
23C0E9B0000
heap
page read and write
7FFD34856000
trusted library allocation
page read and write
21356872000
unkown
page readonly
7FFD3497A000
trusted library allocation
page read and write
7FFD34A6D000
trusted library allocation
page read and write
C9CD0F1000
stack
page read and write
7FFD34B20000
trusted library allocation
page read and write
7FFD35260000
trusted library allocation
page read and write
7FFD34A65000
trusted library allocation
page read and write
218BE6DF000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page read and write
20770E40000
heap
page read and write
22A7A54A000
heap
page read and write
B1887FE000
stack
page read and write
7FFD34A57000
trusted library allocation
page read and write
207095AB000
heap
page read and write
22A7AE39000
heap
page read and write
7FFD34A50000
trusted library allocation
page read and write
2386CF07000
heap
page read and write
1715000
heap
page read and write
2A126900000
heap
page read and write
7FFD34954000
trusted library allocation
page read and write
2133DD81000
trusted library allocation
page read and write
22A7ADBF000
heap
page read and write
7FFD34C70000
trusted library allocation
page read and write
5BFCFEE000
stack
page read and write
7FFD34AE0000
trusted library allocation
page read and write
22900A37000
trusted library allocation
page read and write
22A61D22000
trusted library allocation
page read and write
238542CE000
heap
page read and write
29B44BE1000
heap
page read and write
23C0EA10000
heap
page read and write
20770B4B000
heap
page read and write
7FFD34A62000
trusted library allocation
page read and write
C2B30FF000
stack
page read and write
2B8B7F18000
heap
page read and write
7FFD34940000
trusted library allocation
page read and write
17216571000
trusted library allocation
page read and write
22A61653000
trusted library allocation
page read and write
45284FE000
stack
page read and write
2386D299000
heap
page read and write
1721EDF3000
heap
page read and write
2135675B000
heap
page read and write
21356F58000
trusted library allocation
page read and write
22A61461000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page read and write
F2B813D000
stack
page read and write
21356562000
unkown
page readonly
7FFD34E05000
trusted library allocation
page read and write
7FFD34B70000
trusted library allocation
page read and write
156F0544000
heap
page read and write
81F337D000
stack
page read and write
218BE6ED000
trusted library allocation
page read and write
7FFD34C20000
trusted library allocation
page read and write
22A7BA74000
heap
page read and write
D4740FE000
stack
page read and write
D473EFC000
stack
page read and write
2296F7BC000
heap
page read and write
22A7B072000
unkown
page readonly
7FFD349C6000
trusted library allocation
page read and write
7FFD34793000
trusted library allocation
page execute and read and write
21C003D3000
trusted library allocation
page read and write
20B21B29000
heap
page read and write
670000
unkown
page readonly
20709547000
heap
page read and write
20770D30000
trusted library allocation
page read and write
4F5D87E000
unkown
page readonly
22A61CF7000
trusted library allocation
page read and write
2CB567C0000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page read and write
17205A10000
unkown
page readonly
21356A63000
heap
page execute and read and write
22A7ADF0000
heap
page read and write
21C755A0000
trusted library allocation
page read and write
7FFD34B0C000
trusted library allocation
page read and write
7FFD35412000
trusted library allocation
page read and write
7FFD34975000
trusted library allocation
page read and write
21C7591B000
heap
page read and write
7FFD34C74000
trusted library allocation
page read and write
7FFD34B50000
trusted library allocation
page execute and read and write
7FFD34F10000
trusted library allocation
page read and write
20700239000
trusted library allocation
page read and write
17206080000
trusted library allocation
page read and write
7FFD34A30000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
12C8000
heap
page read and write
3FCBBFE000
stack
page read and write
7FFD34C83000
trusted library allocation
page read and write
218BC568000
heap
page read and write
7FFD34A44000
trusted library allocation
page read and write
A3C40FE000
stack
page read and write
2386CF14000
heap
page read and write
2291009E000
trusted library allocation
page read and write
7FFD34AD0000
trusted library allocation
page read and write
2133DE58000
trusted library allocation
page read and write
1260000
heap
page read and write
7FFD34F00000
trusted library allocation
page read and write
21356D30000
heap
page read and write
2CB70B49000
heap
page read and write
7FFD34AC6000
trusted library allocation
page read and write
4F5E9FE000
stack
page read and write
7FFD34C35000
trusted library allocation
page read and write
22A7ABB9000
heap
page read and write
22A60BE1000
heap
page read and write
7FFD35200000
trusted library allocation
page read and write
7FFD34F80000
trusted library allocation
page read and write
5BFBD6F000
stack
page read and write
1110000
heap
page read and write
81F287F000
stack
page read and write
21C00102000
trusted library allocation
page read and write
81F19D5000
stack
page read and write
7FFD34947000
trusted library allocation
page read and write
20770D40000
heap
page read and write
23C0F798000
trusted library allocation
page read and write
7FFD349B2000
trusted library allocation
page read and write
22A7ABA5000
heap
page read and write
15ABA560000
trusted library section
page readonly
22A7A5E2000
unkown
page readonly
15AB96BD000
heap
page read and write
2077300F000
heap
page read and write
F2B74FE000
stack
page read and write
213567B2000
unkown
page readonly
2386D439000
heap
page read and write
213567B0000
unkown
page readonly
22A61ACF000
trusted library allocation
page read and write
17206130000
heap
page read and write
156F00D5000
heap
page read and write
207735B0000
heap
page read and write
7FFD348B0000
trusted library allocation
page execute and read and write
336EFFE000
stack
page read and write
21C75430000
trusted library section
page read and write
7FFD35060000
trusted library allocation
page read and write
207096F0000
heap
page read and write
7FFD34820000
trusted library allocation
page read and write
7FFD34A20000
trusted library allocation
page read and write
22A7A522000
heap
page read and write
22A7AE91000
heap
page read and write
21C00318000
trusted library allocation
page read and write
4F5CA7E000
unkown
page readonly
22A7B930000
heap
page read and write
10F5000
stack
page read and write
2CB70F30000
heap
page read and write
21C754D2000
heap
page read and write
4F5C97E000
stack
page read and write
21C73029000
heap
page read and write
23C0F6DE000
trusted library allocation
page read and write
20709710000
heap
page read and write
7FFD34C60000
trusted library allocation
page execute and read and write
22A7AD0B000
heap
page read and write
B822EFE000
stack
page read and write
45283FE000
stack
page read and write
7FFD349C8000
trusted library allocation
page read and write
2386D2C1000
heap
page read and write
21C75DD6000
heap
page read and write
4F5D57E000
unkown
page readonly
17205C26000
heap
page read and write
2133DFCF000
trusted library allocation
page read and write
7FFD34C15000
trusted library allocation
page read and write
22A7BB2B000
heap
page read and write
22A7A568000
unkown
page readonly
81F253E000
stack
page read and write
C88E9FF000
unkown
page read and write
23864781000
trusted library allocation
page read and write
2134DD81000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page execute and read and write
22A617C4000
trusted library allocation
page read and write
20709975000
heap
page read and write
29B44BF1000
heap
page read and write
15ABA540000
trusted library section
page readonly
22A79CE0000
unkown
page readonly
7FFD34856000
trusted library allocation
page execute and read and write
23C0F6EB000
trusted library allocation
page read and write
7FFD34CF1000
trusted library allocation
page read and write
23854680000
unkown
page readonly
23C0EA30000
trusted library allocation
page read and write
41F1F7D000
stack
page read and write
20B21B33000
heap
page read and write
7FFD34B70000
trusted library allocation
page execute and read and write
238542C0000
heap
page read and write
7FFD34AC0000
trusted library allocation
page execute and read and write
22A60B00000
unkown
page readonly
172165C9000
trusted library allocation
page read and write
C9CD1FE000
stack
page read and write
22A61FFB000
trusted library allocation
page read and write
7FFD354C0000
trusted library allocation
page read and write
21C0031E000
trusted library allocation
page read and write
2386D601000
heap
page read and write
1380000
trusted library allocation
page read and write
22A79FC0000
unkown
page readonly
2135716A000
trusted library section
page read and write
1721ECB0000
trusted library section
page read and write
20770D53000
trusted library allocation
page read and write
1721EDC0000
heap
page execute and read and write
218D6950000
heap
page read and write
7FFD34860000
trusted library allocation
page execute and read and write
22A7ACCC000
heap
page read and write
4F5D3FE000
stack
page read and write
7FFD34F30000
trusted library allocation
page read and write
22A61ECB000
trusted library allocation
page read and write
98C17FE000
stack
page read and write
7FFD347AB000
trusted library allocation
page execute and read and write
15AB9F1A000
heap
page read and write
7FFD34AC2000
trusted library allocation
page read and write
7FFD34C10000
trusted library allocation
page read and write
23C0F308000
trusted library allocation
page read and write
7FFD3484C000
trusted library allocation
page execute and read and write
7FFD349B0000
trusted library allocation
page read and write
156F0040000
heap
page read and write
7FFD34970000
trusted library allocation
page read and write
22A7A532000
heap
page read and write
22900A23000
trusted library allocation
page read and write
D473FFE000
stack
page read and write
15ABEC41000
heap
page read and write
7FFD34826000
trusted library allocation
page read and write
2071001D000
trusted library allocation
page read and write
F2B833E000
stack
page read and write
1210000
heap
page read and write
2CB585EA000
trusted library allocation
page read and write
22910099000
trusted library allocation
page read and write
7FFD34A48000
trusted library allocation
page read and write
2CB56790000
trusted library allocation
page read and write
2A126738000
heap
page read and write
7FFD34960000
trusted library allocation
page read and write
7FFD347A2000
trusted library allocation
page read and write
7FFD34B50000
trusted library allocation
page read and write
7FFD34E4B000
trusted library allocation
page read and write
7FFD34A75000
trusted library allocation
page read and write
2133E0D3000
trusted library allocation
page read and write
7FFD34A29000
trusted library allocation
page read and write
21C770C0000
heap
page execute and read and write
1BD6E000
heap
page read and write
23C0F6F4000
trusted library allocation
page read and write
B8232FD000
stack
page read and write
1721657D000
trusted library allocation
page read and write
238546D0000
unkown
page readonly
21C775B2000
trusted library allocation
page read and write
F2B7E3E000
stack
page read and write
21C7596A000
heap
page read and write
5BFCAFB000
stack
page read and write
22A79F72000
unkown
page readonly
23854848000
trusted library allocation
page read and write
218BE50E000
trusted library allocation
page read and write
F2B853B000
stack
page read and write
81F347F000
stack
page read and write
2133C5D0000
heap
page read and write
15ABEC00000
heap
page read and write
207735D1000
heap
page read and write
20710001000
trusted library allocation
page read and write
7FFD34C53000
trusted library allocation
page read and write
23C0F7CD000
trusted library allocation
page read and write
21C73330000
heap
page read and write
7FFD34D83000
trusted library allocation
page read and write
7FFD35370000
trusted library allocation
page read and write
2133C4D0000
heap
page read and write
21C00583000
trusted library allocation
page read and write
21356552000
unkown
page readonly
7FFD3477D000
trusted library allocation
page execute and read and write
7FFD347B0000
trusted library allocation
page read and write
7FFD347AB000
trusted library allocation
page execute and read and write
7FFD34A62000
trusted library allocation
page read and write
272F2A90000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
1710000
heap
page read and write
22A7A52D000
heap
page read and write
21C75DB0000
heap
page read and write
7FFD34B00000
trusted library allocation
page read and write
There are 2498 hidden memdumps, click here to show them.