Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
bUWKfj04aU.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\ProgramData\wikombernizc\reakuqnanrkn.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\0Tp94y9MBurxJFhItxZ95EWw.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\1YUCcdc2ns8K2t45poUN7Amx.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\2dRkzCtGWj8VKkanaZyDrBYJ.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\2pxZ3QGs5RsdEF32wezepFbS.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\3kkvcuaTSYv6zr1LL5n1fFGV.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\3u6RrNmizX68IHHLss9QqKUE.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\6kv625NXRIyPYKeDaoPyctw3.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\9xT7E5Pb81hXRamadrxhTcKa.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\A47mXAfrsBDpojX2UlRMyVjb.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\BD2oseXp7BCvMSmO4ZjO5L8H.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\EbkuLW0CG2HYrP9ej87UFUE5.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Ee4C8pygmuP2wWmHYlaPNRsj.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\EobcTZAHsg9TkKb6ZiDxOQpo.exe
|
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Users\user\AppData\Local\EwtRoEOPYdd062EDD7ELX587.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\GbMT76fl6mAPfbFsS3x29QL1.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\HwwnZ3CpAQLjyKlmGEjpSgAe.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\JgoflcD9Q8N9LvT5krhponwA.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\KS0KCSisDq7pEmahBFThP4AT.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\KaHPEM2tjHD1595lRxdfqHsL.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\MSGhyVQl8QvU645EqnDaDG5h.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\4767d2e713f2021e8fe856e3ea638b58[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\DocuWorks[1].exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\gold[1].exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\random[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\sarra[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\FirstZ[1].exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\alexxxxxxxx[1].exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\cred64[1].dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\swiiii[1].exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\Uni400uni[1].exe
|
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\clip64[1].dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\file300un[1].exe
|
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\swiiiii[1].exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\ISetup8[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\NewB[1].exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\RCIIZOAM\jok[1].exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\MnKGY5RWTeEWMNUxbLjGgu1v.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\NVX3Pk7yCVoYnwk8B8rP7BRQ.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\NXiJY5ksTtPuwWHLdp7c611m.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\QOC4MrQyBEQHndqZcvBUgBgA.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\QgQgG9QxK6KBBiRO6TDiG08X.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\SN8aMZWrntrM7YJrmHS2jN15.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\SSO4jRyuUDShfiudMUcxy9PM.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\SYo7pMEIUYDach25xrEqQtfo.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\00c07260dc\explorgu.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000187001\4767d2e713f2021e8fe856e3ea638b58.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000188001\ISetup8.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000191001\FirstZ.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000192001\Uni400uni.exe
|
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1000985001\alexxxxxxxx.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001053001\gold.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\NewB.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001073001\swiiiii.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001084001\random.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001085001\file300un.exe
|
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001107001\jok.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001108001\swiiii.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001142001\DocuWorks.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001152001\DocuWorks.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u5ps.0.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\u5ps.1.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\U56AmqiMe1O1Xr1D2Q9NTKco.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\ULpJp44l4YgbS9xGxpGd4gFD.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\UNI7mc4Nnga4yNCGVfbOvnYn.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\UqEUiSMhaNIUaul1PMLhCUwN.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\VxBZwWSDvyrtFfizMLyM1BzT.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\XJI9AFzBIfKNprDgZXpUs99e.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\aCC9Y3uZiPILOE7CPQBm3dqe.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\b135cfRMuAwZwxqPJGvWitOU.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\bhUVpYwvm9Cx2G2Rs1dNzx32.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\dG8PuyJTCxed1f6M5xR2MLtX.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\dUJDpd3reHboCY5zymPoYWZb.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\duWjVWTrdvxVwAVHrNA8iMHG.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\eVxkDSvCJmjQQtpfadM6vVRZ.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\erPoCjwbFUG1W9A8W6y3CW6b.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\fCvVPrm4SypzMQ6EiBEadgs1.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\g9ls6tmSqvqEPFEPMTLxj5T8.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\hcidkkgbJV63mERAuLfsQa8h.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\ikwgyD2WNrub0XxL5g8QM7GI.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\ilujg24U0DrNyFRHYG8F01Xq.exe
|
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Users\user\AppData\Local\iwNl8K5vXvEOpYcZRlgRArUI.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\l9eBjdHLCrnnkZZKJdDffPtE.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\o8Jx9jV1oAFDNGwS0JdA5742.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\oLeePKVd7zLdWzK9yLk3y6uB.exe
|
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Users\user\AppData\Local\p2n3E86Xy4ldROofshdOCL5V.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\s72QQ1HEDtqfs0ltMB4uulZT.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\szmZp5wR4ysalkWrHfDx3ALH.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\tH2mUUONokvK3vL8ubpXbilZ.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\vSXx0NPQvyjoNMnvb7CbbdI3.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\vjbBGdKLPrfqevTO8NoyWGaS.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\wQWWfYa2Wpi02lLWRtocQHQR.exe
|
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Users\user\AppData\Local\wXamxKfyZPmwZrj3GYJOigy8.exe
|
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Users\user\AppData\Local\xEsbKulN7hG8EPnegeeycsh4.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\yB6Uf0WkvSc9vwkxXb9qHuqG.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\yUsmdV5pQCUMcoI7bnDHRZY9.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\zFwKnsnVeTcdv2qgWZnCYFfo.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\zTSMwf6EqjBUbab8YHX1tAIc.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\006700e5a2ab05\clip64.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\006700e5a2ab05\cred64.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\configurationValue\Traffic.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\configurationValue\propro.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\1abyUXPEgy4bZxyXlnZFcHZ5.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\1nTmHrERKdzkaXW6uWP0ApYm.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\3Qu8OOESjPevn9hgYpoGckO6.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\5t4J6LPx9worlCEV5lJ6PESB.exe
|
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Users\user\Pictures\5zJHpAJpIRB1HYZQQAYjkJ25.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\6OLUTXGxeOohIVqZzcEJ5alb.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\7cKVSqTv7NnDDL1Bxf0FokVy.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\7oogYDdOsBiWJ9MKZ1L5HbFc.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\8UpBCIaVf6AAjxJPhsi6WXaA.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\AyNYT4O47VfBk09nQnrCijm6.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\DTvgIdE1FHJj9FUSxKWXL2RO.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\FUb10VYVGNCyaJzEYAYj3GQs.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\Gp0jcfXPIousEInbW21jIMsf.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\HAM9LOmldo1zWlB6yIg4ket5.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\HJ7xEP91cEUeBnkYZsutN6xz.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\JLiIrbSzLzOnR0erkK3iGyEU.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\Jow4Yx3Pjb1bpRyZH3KDPaVs.exe
|
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Users\user\Pictures\MpHOHCEEUzMhd1hQeZRzVhhz.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\Mpw4JlCHhiliCOOFY4izjnxd.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\NfgsIliNy2FIhgIHRMVtFDp6.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\NzMhoMiQShLnUxfisrCBpUcg.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\OW0IY6qIxwA2vBNesoWOn7tx.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\PX9pw9BSDC6GcNiwEOwN9eIo.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\QGd5vowLDGLbl9fCzFQRFDz6.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\QHSpBJfT7rENIQ9ncyZXQ7Pm.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\QxCv5P4RWl5NZ4tvZO0mZrz2.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\RTdjK9qJEXQ928Kc9bfdj8uO.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\RoyNg8B8qjQgITKbssh3ShCc.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\RqikXgL90rwJFOFaZuJPlBKd.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\TB8gyY0giMN6fcZjZLzipP7P.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\TjI0ijcIo0xtphiVp90L9Ox0.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\VScSUh49U4ILUy7wHZccpWfB.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\XOhApkVOUtZE8u9vX17eosOR.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\Xi37RtmryfYQA7AgXeZvjKIg.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\ZM1H78lrEQNEMSqAF8jMSK2I.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\ZoBfdkTi1TzYd4Qho9RGiD49.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\b7aAk4NsmjOyCEFaPAgyoXSd.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\bgw33Otai3n3FHEj79p4BuQd.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\dAQPk6VJcRnzNryadPob76ur.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\e9BFbVGJvYbRX1O9pfx94p87.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\eRuQ9CSoyYCbA7kgv2O4hBGL.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\emoDG0nH5rlkVVnXgc1mj5b6.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\fNXuIJPtZ25Cf8AC2M7nLhvu.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\fbQkxrJoAES30cVcdBN8aXwZ.exe
|
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Users\user\Pictures\iWlE1PLcvZdqKeIUsVDIfjKo.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\itMidjIgtoMzghFLrzdYkPDa.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\j5y10uqj39KWgJqNPePuwKtH.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\jEBnyzNlpnxYBpX0SzTsilYc.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\kj4vlWepIIui5EUsEpaKN5uf.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\lGY9WNr93099Iipz5J2xUIwU.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\ngPRyE3pVf7AVqsG4El6sbei.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\oda8FFwXlvLarxOY0ZoPcs8X.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\pVHGmT1xb3UJCnVvgRWBUZ7Y.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\rig4vLmrODGxubaXNA7eu9mO.exe
|
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Users\user\Pictures\sNUwctL7GkZ5u0NI0scxfcy0.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\sx0rXq9mQR9aeLWBWHbPdr14.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\tLniRa1wNfVBc8wtGlFeZuV5.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\tqElYl8Fl4JU3kvWVy6e00VW.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\uOTCOcyWGW2C0V1L0OAjLfFo.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\uhjRBnwj8K4T9LYmtd6M66hw.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\uuRE7gXsEM4RR1NoZUBwtrlp.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\wZuV3PgWQZH6WkVb85MHgKez.exe
|
MS-DOS executable PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
|
dropped
|
||
C:\Users\user\Pictures\yhDNs5CKgcvWpHQdXrg6et6I.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\Pictures\zkP3dJByFmLvW6zaaFPB4q1s.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage user DataBase, version 0x620, checksum 0x3f41fe08, page size 16384, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Uni400uni.exe_abcc73dc4be9eccf93f57939ad34e24e865bf25_72d372f9_edad4638-018d-4178-8ee1-0f05c5001308\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_swiiiii.exe_4644a13ebcdb6e10e65a72b8ec8bc0b0ff32d1fa_6563360f_0de07880-8bf4-4e90-a473-63681402adc2\Report.wer
|
Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER37A4.tmp.dmp
|
Mini DuMP crash report, 16 streams, Mon Apr 15 05:42:34 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER491A.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4B0F.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDD9D.tmp.dmp
|
Mini DuMP crash report, 15 streams, Mon Apr 15 05:42:08 2024, 0x1205a4 type
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDF25.tmp.WERInternalMetadata.xml
|
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDF55.tmp.xml
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\Public\Desktop\Google Chrome.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working
directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:41 2023, mtime=Thu Oct 5 05:47:17 2023,
atime=Wed Sep 27 08:36:54 2023, length=3242272, window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\33tIGBzVuCMQl3Wc6IvtNEjP.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\AppData\Local\EqvNTTWJsgdaHBZM2vNGyoMV.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\AppData\Local\IA1JiyWIGEvHCZKTDOlZNrXb.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Traffic.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\alexxxxxxxx.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\gold.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Stj0rnzdLizcr79amRyA4wnp.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\00c07260dc\explorgu.exe:Zone.Identifier
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\1001059001\0lQs2u2bQN8wOmVXVy2wItPr.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\0tYrOK0l3oFbXddjsmtb931W.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\18oG7LNEo6QcClXRVAJbS4hd.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\3M4Jtk9KWHgh8ducxhTFcjW1.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\3mHg0ktrbc2PpU4ds9bpMhZZ.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\4hs64zd1vggd1u64GpeGCzqk.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\7INGj891a3Tm3DBdzkBBBu4f.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\7Px23zDNZXL8Wy0lPHfMYVTL.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\7czkMh8EvSiPUijWCDYmOA0H.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\83h7vd7bLREHOEODb4HLTiUR.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\97Lqi3WoncD5y5D9KjmTRajv.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\9Y7uMe8QnC7FFfGfNRzEDhaF.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\9vtbOcSuXHIUE3aqSLzyIs15.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\DXBbZJH6aLRZHAVt4F6j0AmN.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\Da4hPfXHBBjDyahp38gylcgg.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\E2yH5MLGXjpJh1srJDZoMcAl.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\EAIEYPMHLI2C96DGaxuSW1Wl.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\Elh8h4Mgm3Kyj26kaoBm2vi2.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\EuHH093mR5qKLZmV0JaXHXHY.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\F3BI9GaNOs6Ya1J9lebEzYL9.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\FYWrmh9kVvfjND8uGAmX5Y4l.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\G5mEm3jS1pvbju1MRv4tfDyu.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\HNvooPz7Vh4sIgGP39cslh4N.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\I8XeDfyDr6bDQhOsvcFng6ze.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\JXVwjDMgM09uvctWr995ZwGN.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\MgvqbtqceBiLGxlPZIfqyYea.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\NDXx6frQXtljightQZ1O7fjP.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\NQ4poDjMI3RXXj5p2XsaVrP3.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\NzzUKUXiYayfTxpveiz4EThB.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\ReJSK9WVd6KfmbU9BelU2dTM.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\RfYqto9ALRNpcVKkonPjQKeW.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\RhhG1gn0QUhYedfdbzAy5ZNg.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\RwTMC4vzdsOGTPwvVM2qZjtm.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\SbiAzImWgkT7MJB2PHgRcGax.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\Sv6g3ERXfxKD2J0JVlLThaHN.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\TgZOkQYQnPGPXD7pldT9f2PL.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\UDZw2rmIuxJqvLYxjDsuaurn.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\UjJo2kS8cmZcF5KHpYmSzplI.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\UjOBDHW3UrPljjSOmFiE3BQz.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\W0iQl0pZ5sWOTAcjwfLYYAT7.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\WoroixetAf5ka8XSLVlC1zOe.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\Wz6d3yrxvUiYF1DUYfgHq4pk.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\XRq4aN5F1IW0xzC6S5xN6i2b.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\Xxc1XEY9M6t5SKzF0RMTQR6B.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\aQDowDvx9wZiVLu5ax7aNCbI.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\cEHiDGk9wayAY1T1AaqMXTts.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\ctHd3czrPTUSeJ3p8SDBZ1v1.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\cv0AmfEhPjyqiSLT2h9xTanU.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\dQz83vXZCdAW6INUr81qydEi.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\dl67yGegABuy4cgIumPGhEid.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\f0pnZDMd6RaZV3ru6ZcvWYoh.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\flhAOmHuPU4rOQraF9et2tNv.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\gKz1moE7eup3G7nOTrAM5FEe.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\gexYuw0NRhQ8R1rZTdriSThP.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\gtUxZk6cj8wfEklu1LBTS737.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\hn24jhY0Fv65Hr2JNkbIUU32.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\iGgltwF3cPJJEQEEusF5Xi0h.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\isSKeeo2YpQheeY24R4j9G2t.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\jVb7NGJ5fDo17zuI07wKXTkn.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\k4WDKn5GdBylasbk9EPm9Oxn.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\nruxO9vtSEsvmw1nJfHLNbN3.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\o9rQUR3l55wTcAhNhuto03lk.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\oWpy9mG9Ds15Yw7FsUFYFKZz.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\ory2z8Uv63Q76t6KnnuaZBZ3.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\p8NzMeukSixzfsrv1eOsaArK.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\r2A0rS3VHsn8vyJeZHhKfWXr.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\rocNHTvv38JS6pWod6Y4Gd91.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\sKWhFmW1UBgSm2O3z2QVt6hX.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\sx87S9fjIWqhIFU42ChmdBD5.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\vWfNA9ItlVbIhYLgDbH2qYCB.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\vtH7nDBrnek0dvASVqeqkxmh.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\wECmGoZSCpcGomt5tgyfkCt8.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\wHUmqxGl1NXuimy6s35CfrOK.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\xTp4bHJiLrusMpbtmcQ6RM59.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\xfnvi9jPfFxOupLhRqQ53EM3.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\xly7DWkYKo5WnXstfCeJrt5O.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\1001059001\zjeauCZFVCgTqOll4Vc5L2Ft.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Tmp3775.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Tmp3776.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\TmpBCE6.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\TmpBD35.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\GAOBCVIQIJ.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\IPKGELNTQY.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\IPKGELNTQY.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\LSBIHQFDVT.xlsx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\NEBFQQYWPS.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\_Files_\SFPUSAFIOL.docx
|
ASCII text, with very long lines (1024), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0z0fvjrp.5w0.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1kprbola.2vk.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2g4p5thq.ky5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a1gfrcqo.kip.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hda1lzma.gbm.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r1c5fzge.c2k.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\UvmCGtz1aYTjhcoAhykwCuQw.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\AppData\Local\a3XC8JYF0aYXxIZPljcBh92I.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\AppData\Local\dkk7cRVuWpprbxEbDlw69GrM.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\AppData\Local\domCqD7LBg1Q0KxGLvuFe0Aj.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\AppData\Local\oxW5doxruDrLfkxekfdC42S3.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\AppData\Local\swXqwxxcUE7SVCRYdUBHf3nm.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\AppData\Local\vFvvln76msVyiTRvQQMSlc4y.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\AppData\Local\xIvgySaF2JVAOfOVBY400p1d.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\AppData\Local\yybBRlcB659iEk7Vesfqc6Zw.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\76b53b3ec448f7ccdda2063b15d2bfc3_9e146be9-c76a-4720-bcdb-53011b87bd06
|
data
|
modified
|
||
C:\Users\user\Pictures\0ZzXdtKbBOkMTYdVV1HNUsqT.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\Pictures\0zuHPkqadZGFhsedqfFjHrEV.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\Pictures\1Cki827fF40ubJ4RMKyP3Elr.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\Pictures\6A6tSzDSK6P9F6s9kkiOZkgA.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\Pictures\CCF32f9je00j8IZrr0Ff4c4t.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\Pictures\IKulK0lzJvII432wpHMkGWRw.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\Pictures\RvrkjxBwedY81Y68Ne47TzMs.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\Pictures\SlwT2Dhb0jcRK2apeSa3FdHE.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\Pictures\YtkUkgpbmZlbSuZT81owPAOw.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\Pictures\gxNMHUmIRRsTpoh2kGfIr9lW.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\Pictures\h9MmfvkW2XknV10h725GOqVL.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\Pictures\uWDQa01moDg0YUv8UXTjuXuR.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Users\user\Pictures\v05bbHszTdSghZlrnH5jWCvs.exe
|
HTML document, Unicode text, UTF-8 text, with very long lines (1460)
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
C:\Windows\Tasks\explorgu.job
|
data
|
dropped
|
||
C:\Windows\appcompat\Programs\Amcache.hve
|
MS Windows registry file, NT/2000 or above
|
dropped
|
There are 297 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\bUWKfj04aU.exe
|
"C:\Users\user\Desktop\bUWKfj04aU.exe"
|
||
C:\Users\user\AppData\Local\Temp\00c07260dc\explorgu.exe
|
C:\Users\user\AppData\Local\Temp\00c07260dc\explorgu.exe
|
||
C:\Windows\SysWOW64\rundll32.exe
|
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
|
||
C:\Windows\System32\rundll32.exe
|
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
|
||
C:\Windows\System32\netsh.exe
|
netsh wlan show profiles
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip'
-CompressionLevel Optimal
|
||
C:\Users\user\AppData\Local\Temp\1000985001\alexxxxxxxx.exe
|
"C:\Users\user\AppData\Local\Temp\1000985001\alexxxxxxxx.exe"
|
||
C:\Windows\SysWOW64\rundll32.exe
|
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Users\user\AppData\Roaming\configurationValue\propro.exe
|
"C:\Users\user\AppData\Roaming\configurationValue\propro.exe"
|
||
C:\Users\user\AppData\Roaming\configurationValue\Traffic.exe
|
"C:\Users\user\AppData\Roaming\configurationValue\Traffic.exe"
|
||
C:\Users\user\AppData\Local\Temp\1001053001\gold.exe
|
"C:\Users\user\AppData\Local\Temp\1001053001\gold.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Users\user\AppData\Local\Temp\1001059001\NewB.exe
|
"C:\Users\user\AppData\Local\Temp\1001059001\NewB.exe"
|
||
C:\Windows\SysWOW64\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 1 /TN NewB.exe /TR "C:\Users\user\AppData\Local\Temp\1001059001\NewB.exe"
/F
|
||
C:\Users\user\AppData\Local\Temp\1001059001\NewB.exe
|
C:\Users\user\AppData\Local\Temp\1001059001\NewB.exe
|
||
C:\Users\user\AppData\Local\Temp\1001073001\swiiiii.exe
|
"C:\Users\user\AppData\Local\Temp\1001073001\swiiiii.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
|
||
C:\Users\user\AppData\Local\Temp\00c07260dc\explorgu.exe
|
"C:\Users\user\AppData\Local\Temp\00c07260dc\explorgu.exe"
|
||
C:\Users\user\AppData\Local\Temp\1001084001\random.exe
|
"C:\Users\user\AppData\Local\Temp\1001084001\random.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000191001\FirstZ.exe
|
"C:\Users\user\AppData\Local\Temp\1000191001\FirstZ.exe"
|
||
C:\Users\user\AppData\Local\Temp\1001085001\file300un.exe
|
"C:\Users\user\AppData\Local\Temp\1001085001\file300un.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000192001\Uni400uni.exe
|
"C:\Users\user\AppData\Local\Temp\1000192001\Uni400uni.exe"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData)
-ExclusionExtension '.exe' -Force
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
|
||
C:\Users\user\AppData\Local\Temp\1001107001\jok.exe
|
"C:\Users\user\AppData\Local\Temp\1001107001\jok.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regsvcs.exe"
|
||
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
|
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\msbuild.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 5564 -ip 5564
|
||
C:\Windows\SysWOW64\WerFault.exe
|
C:\Windows\SysWOW64\WerFault.exe -u -p 5564 -s 920
|
||
C:\Users\user\AppData\Local\Temp\1000187001\4767d2e713f2021e8fe856e3ea638b58.exe
|
"C:\Users\user\AppData\Local\Temp\1000187001\4767d2e713f2021e8fe856e3ea638b58.exe"
|
||
C:\Users\user\AppData\Local\Temp\1000188001\ISetup8.exe
|
"C:\Users\user\AppData\Local\Temp\1000188001\ISetup8.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -pss -s 500 -p 7684 -ip 7684
|
||
C:\Windows\System32\WerFault.exe
|
C:\Windows\system32\WerFault.exe -u -p 7684 -s 1076
|
There are 36 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bordersoarmanusjuw.shop
|
|||
mealplayerpreceodsju.shop
|
|||
absentconvicsjawun.shop
|
|||
pushjellysingeywus.shop
|
|||
economicscreateojsu.shop
|
|||
185.172.128.33:8970
|
|||
wifeplasterbakewis.shop
|
|||
suitcaseacanehalk.shop
|
|||
entitlementappwo.shop
|
|||
https://legal.opera.com/terms
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://www.opera.com/privacy
|
unknown
|
||
https://crashpad.chromium.org/bug/new
|
unknown
|
||
https://help.opera.com/latest/
|
unknown
|
||
https://contoso.com/License
|
unknown
|
||
https://junglethomas.com/45c777cd634b90d85bd90992c72a11ec/4767d2e713f2021e8fe856e3ea638b58.exe
|
unknown
|
||
https://policies.google.com/terms;
|
unknown
|
||
https://api.ip.s
|
unknown
|
||
https://download.opera.com/download/get/?partner=www&opsys=Windows&utm_source=netinstaller
|
unknown
|
||
http://www.indyproject.org/
|
unknown
|
||
http://google.com
|
unknown
|
||
https://gamemaker.io/en/education.
|
unknown
|
||
https://legal.opera.com/terms.
|
unknown
|
||
http://localhost:3001api/prefs/?product=$1&version=$2..
|
unknown
|
||
https://autoupdate.geo.opera.com/https://autoupdate.geo.opera.com/geolocation/OperaDesktophttps://cr
|
unknown
|
||
https://crashpad.chromium.org/https://crashpad.chromium.org/bug/new
|
unknown
|
||
https://www.opera.com/download/
|
unknown
|
||
https://telegram.org/tos/
|
unknown
|
||
https://junglethomas.com/AV
|
unknown
|
||
https://addons.opera.com/extensions/download/be76331b95dfc399cd776d2fc68021e0db03cc4f.opera.com
|
unknown
|
||
https://junglethomas.com/IV
|
unknown
|
||
https://contoso.com/
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
https://discord.com/api/v9/users/
|
unknown
|
||
https://junglethomas.com/a638b58.exe
|
unknown
|
||
https://sectigo.com/CPS0D
|
unknown
|
||
https://affordcharmcropwo.shop:443/api
|
unknown
|
||
https://www.opera.com
|
unknown
|
||
http://svc.iolo.com/__svc/sbv/DownloadManager.ashx
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
https://autoupdate.geo.opera.com/
|
unknown
|
||
https://twitter.com/en/tos;
|
unknown
|
||
http://nuget.org/NuGet.exe
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelp
|
unknown
|
||
https://api.ip.sb/ip
|
unknown
|
||
https://economicscreateojsu.shop:443/api)
|
unknown
|
||
https://crashpad.chromium.org/
|
unknown
|
||
https://redir.opera.com/uninstallsurvey/
|
unknown
|
||
https://addons.opera.com/en/extensions/details/dify-cashback/
|
unknown
|
||
https://junglethomas.com/iV
|
unknown
|
||
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
https://autoupdate.geo.opera.com/geolocation/
|
unknown
|
||
http://schemas.xmlsoap.org/soap/encoding/
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
https://crashstats-collector.opera.com/collector/submit
|
unknown
|
||
https://junglethomas.com/qV
|
unknown
|
||
http://www.opera.com0
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
https://aka.ms/winsvr-2022-pshelpX
|
unknown
|
||
https://g.live.com/odclientsettings/ProdV21C:
|
unknown
|
||
https://opera.com/privacy
|
unknown
|
||
https://legal.opera.com/eula/computers
|
unknown
|
||
https://gamemaker.io)
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
http://autoupdate-staging.services.ams.osa/v4/v5/netinstaller///windows/x64v2/Fetching
|
unknown
|
||
https://sourcecode.opera.com
|
unknown
|
||
https://pastebin.com/raw/V6VJsrV31https://yip.su/RNWPd.exe7https://iplogger.com/1djqU4
|
unknown
|
||
https://www.whatsapp.com/legal;
|
unknown
|
||
http://crl.sectigo.com/SectigoRSATimeStampingCA.crl0t
|
unknown
|
||
https://parrotflight.com/4767d2e713f2021e8fe856e3ea638b58.exe
|
unknown
|
||
https://yip.su/RNWPd.exeChttps://pastebin.com/raw/E0rY26ni5https://iplogger.com/1lyxz
|
unknown
|
||
https://economicscreateojsu.shop/api
|
unknown
|
||
https://g.live.com/odclientsettings/Prod1C:
|
unknown
|
||
https://economicscreateojsu.shop/
|
unknown
|
||
https://affordcharmcropwo.shop/api
|
unknown
|
||
https://www.opera.com..
|
unknown
|
||
https://www.opera.com/
|
unknown
|
||
https://affordcharmcropwo.shop/apiW
|
unknown
|
||
https://economicscreateojsu.shop:443/api
|
unknown
|
||
http://crt.sectigo.com/SectigoRSATimeStampingCA.crt0#
|
unknown
|
||
https://economicscreateojsu.shop/apip
|
unknown
|
||
http://schemas.xmlsoap.org/wsdl/
|
unknown
|
||
https://gamemaker.io/en/get.
|
unknown
|
||
https://gamemaker.io
|
unknown
|
||
https://affordcharmcropwo.shop/apiA
|
unknown
|
||
https://legal.opera.com/privacy
|
unknown
|
||
http://download.iolo.net
|
unknown
|
||
https://help.instagram.com/581066165581870;
|
unknown
|
||
https://aka.ms/pscore68
|
unknown
|
||
https://features.opera-api2.com/api/v2/features?country=%s&language=%s&uuid=%s&product=%s&channel=%s
|
unknown
|
||
https://affordcharmcropwo.shop/
|
unknown
|
||
https://junglethomas.com/
|
unknown
|
||
https://legal.opera.com/privacy.
|
unknown
|
There are 83 hidden URLs, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
185.172.128.33
|
unknown
|
Russian Federation
|
||
185.215.113.32
|
unknown
|
Portugal
|
||
185.172.128.19
|
unknown
|
Russian Federation
|
||
185.172.128.90
|
unknown
|
Russian Federation
|
||
172.67.181.34
|
unknown
|
United States
|
||
185.215.113.45
|
unknown
|
Portugal
|
||
185.215.113.67
|
unknown
|
Portugal
|
||
193.233.132.175
|
unknown
|
Russian Federation
|
||
185.172.128.59
|
unknown
|
Russian Federation
|
||
104.208.16.94
|
unknown
|
United States
|
||
104.21.79.77
|
unknown
|
United States
|
||
88.218.93.76
|
unknown
|
Netherlands
|
||
104.21.31.124
|
unknown
|
United States
|
||
94.232.247.248
|
unknown
|
Lithuania
|
||
104.21.90.14
|
unknown
|
United States
|
||
23.62.134.148
|
unknown
|
United States
|
||
52.2.56.64
|
unknown
|
United States
|
||
185.172.128.228
|
unknown
|
Russian Federation
|
||
172.67.176.131
|
unknown
|
United States
|
||
172.67.187.204
|
unknown
|
United States
|
||
20.42.65.92
|
unknown
|
United States
|
||
172.67.34.170
|
unknown
|
United States
|
||
193.233.132.167
|
unknown
|
Russian Federation
|
||
104.21.92.190
|
unknown
|
United States
|
||
172.67.193.79
|
unknown
|
United States
|
||
104.21.47.60
|
unknown
|
United States
|
||
5.42.64.17
|
unknown
|
Russian Federation
|
||
104.20.67.143
|
unknown
|
United States
|
||
107.167.110.211
|
unknown
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
There are 20 hidden IPs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
random.exe
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
|
Blob
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
|
Blob
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\F1A578C4CB5DE79A370893983FD4DA8B67B2B064
|
Blob
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
|
Startup
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer
|
SlowContextMenuEntries
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
\REGISTRY\A\{1b912a2e-f96f-3367-5f24-81b84ad252bb}\Root\InventoryApplicationFile\swiiiii.exe|b9eef5c4f3166502
|
ProgramId
|
||
\REGISTRY\A\{1b912a2e-f96f-3367-5f24-81b84ad252bb}\Root\InventoryApplicationFile\swiiiii.exe|b9eef5c4f3166502
|
FileId
|
||
\REGISTRY\A\{1b912a2e-f96f-3367-5f24-81b84ad252bb}\Root\InventoryApplicationFile\swiiiii.exe|b9eef5c4f3166502
|
LowerCaseLongPath
|
||
\REGISTRY\A\{1b912a2e-f96f-3367-5f24-81b84ad252bb}\Root\InventoryApplicationFile\swiiiii.exe|b9eef5c4f3166502
|
LongPathHash
|
||
\REGISTRY\A\{1b912a2e-f96f-3367-5f24-81b84ad252bb}\Root\InventoryApplicationFile\swiiiii.exe|b9eef5c4f3166502
|
Name
|
||
\REGISTRY\A\{1b912a2e-f96f-3367-5f24-81b84ad252bb}\Root\InventoryApplicationFile\swiiiii.exe|b9eef5c4f3166502
|
OriginalFileName
|
||
\REGISTRY\A\{1b912a2e-f96f-3367-5f24-81b84ad252bb}\Root\InventoryApplicationFile\swiiiii.exe|b9eef5c4f3166502
|
Publisher
|
||
\REGISTRY\A\{1b912a2e-f96f-3367-5f24-81b84ad252bb}\Root\InventoryApplicationFile\swiiiii.exe|b9eef5c4f3166502
|
Version
|
||
\REGISTRY\A\{1b912a2e-f96f-3367-5f24-81b84ad252bb}\Root\InventoryApplicationFile\swiiiii.exe|b9eef5c4f3166502
|
BinFileVersion
|
||
\REGISTRY\A\{1b912a2e-f96f-3367-5f24-81b84ad252bb}\Root\InventoryApplicationFile\swiiiii.exe|b9eef5c4f3166502
|
BinaryType
|
||
\REGISTRY\A\{1b912a2e-f96f-3367-5f24-81b84ad252bb}\Root\InventoryApplicationFile\swiiiii.exe|b9eef5c4f3166502
|
ProductName
|
||
\REGISTRY\A\{1b912a2e-f96f-3367-5f24-81b84ad252bb}\Root\InventoryApplicationFile\swiiiii.exe|b9eef5c4f3166502
|
ProductVersion
|
||
\REGISTRY\A\{1b912a2e-f96f-3367-5f24-81b84ad252bb}\Root\InventoryApplicationFile\swiiiii.exe|b9eef5c4f3166502
|
LinkDate
|
||
\REGISTRY\A\{1b912a2e-f96f-3367-5f24-81b84ad252bb}\Root\InventoryApplicationFile\swiiiii.exe|b9eef5c4f3166502
|
BinProductVersion
|
||
\REGISTRY\A\{1b912a2e-f96f-3367-5f24-81b84ad252bb}\Root\InventoryApplicationFile\swiiiii.exe|b9eef5c4f3166502
|
AppxPackageFullName
|
||
\REGISTRY\A\{1b912a2e-f96f-3367-5f24-81b84ad252bb}\Root\InventoryApplicationFile\swiiiii.exe|b9eef5c4f3166502
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{1b912a2e-f96f-3367-5f24-81b84ad252bb}\Root\InventoryApplicationFile\swiiiii.exe|b9eef5c4f3166502
|
Size
|
||
\REGISTRY\A\{1b912a2e-f96f-3367-5f24-81b84ad252bb}\Root\InventoryApplicationFile\swiiiii.exe|b9eef5c4f3166502
|
Language
|
||
\REGISTRY\A\{1b912a2e-f96f-3367-5f24-81b84ad252bb}\Root\InventoryApplicationFile\swiiiii.exe|b9eef5c4f3166502
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceId
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
ApplicationFlags
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018000DDABBE6B3
|
||
HKEY_CURRENT_USER\SOFTWARE\BroomCleaner
|
Installed
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
|
DontOfferThroughWUAU
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msbuild_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msbuild_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msbuild_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msbuild_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msbuild_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msbuild_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msbuild_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msbuild_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msbuild_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msbuild_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msbuild_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msbuild_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msbuild_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\msbuild_RASMANCS
|
FileDirectory
|
||
\REGISTRY\A\{e010ba09-bb30-16ea-8a66-b09d30c180fe}\Root\InventoryApplicationFile\uni400uni.exe|63332a4f626f9b1e
|
ProgramId
|
||
\REGISTRY\A\{e010ba09-bb30-16ea-8a66-b09d30c180fe}\Root\InventoryApplicationFile\uni400uni.exe|63332a4f626f9b1e
|
FileId
|
||
\REGISTRY\A\{e010ba09-bb30-16ea-8a66-b09d30c180fe}\Root\InventoryApplicationFile\uni400uni.exe|63332a4f626f9b1e
|
LowerCaseLongPath
|
||
\REGISTRY\A\{e010ba09-bb30-16ea-8a66-b09d30c180fe}\Root\InventoryApplicationFile\uni400uni.exe|63332a4f626f9b1e
|
LongPathHash
|
||
\REGISTRY\A\{e010ba09-bb30-16ea-8a66-b09d30c180fe}\Root\InventoryApplicationFile\uni400uni.exe|63332a4f626f9b1e
|
Name
|
||
\REGISTRY\A\{e010ba09-bb30-16ea-8a66-b09d30c180fe}\Root\InventoryApplicationFile\uni400uni.exe|63332a4f626f9b1e
|
OriginalFileName
|
||
\REGISTRY\A\{e010ba09-bb30-16ea-8a66-b09d30c180fe}\Root\InventoryApplicationFile\uni400uni.exe|63332a4f626f9b1e
|
Publisher
|
||
\REGISTRY\A\{e010ba09-bb30-16ea-8a66-b09d30c180fe}\Root\InventoryApplicationFile\uni400uni.exe|63332a4f626f9b1e
|
Version
|
||
\REGISTRY\A\{e010ba09-bb30-16ea-8a66-b09d30c180fe}\Root\InventoryApplicationFile\uni400uni.exe|63332a4f626f9b1e
|
BinFileVersion
|
||
\REGISTRY\A\{e010ba09-bb30-16ea-8a66-b09d30c180fe}\Root\InventoryApplicationFile\uni400uni.exe|63332a4f626f9b1e
|
BinaryType
|
||
\REGISTRY\A\{e010ba09-bb30-16ea-8a66-b09d30c180fe}\Root\InventoryApplicationFile\uni400uni.exe|63332a4f626f9b1e
|
ProductName
|
||
\REGISTRY\A\{e010ba09-bb30-16ea-8a66-b09d30c180fe}\Root\InventoryApplicationFile\uni400uni.exe|63332a4f626f9b1e
|
ProductVersion
|
||
\REGISTRY\A\{e010ba09-bb30-16ea-8a66-b09d30c180fe}\Root\InventoryApplicationFile\uni400uni.exe|63332a4f626f9b1e
|
LinkDate
|
||
\REGISTRY\A\{e010ba09-bb30-16ea-8a66-b09d30c180fe}\Root\InventoryApplicationFile\uni400uni.exe|63332a4f626f9b1e
|
BinProductVersion
|
||
\REGISTRY\A\{e010ba09-bb30-16ea-8a66-b09d30c180fe}\Root\InventoryApplicationFile\uni400uni.exe|63332a4f626f9b1e
|
AppxPackageFullName
|
||
\REGISTRY\A\{e010ba09-bb30-16ea-8a66-b09d30c180fe}\Root\InventoryApplicationFile\uni400uni.exe|63332a4f626f9b1e
|
AppxPackageRelativeId
|
||
\REGISTRY\A\{e010ba09-bb30-16ea-8a66-b09d30c180fe}\Root\InventoryApplicationFile\uni400uni.exe|63332a4f626f9b1e
|
Size
|
||
\REGISTRY\A\{e010ba09-bb30-16ea-8a66-b09d30c180fe}\Root\InventoryApplicationFile\uni400uni.exe|63332a4f626f9b1e
|
Language
|
||
\REGISTRY\A\{e010ba09-bb30-16ea-8a66-b09d30c180fe}\Root\InventoryApplicationFile\uni400uni.exe|63332a4f626f9b1e
|
Usn
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
|
0018000DDABBE6B3
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
|
DeviceTicket
|
There are 64 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
191000
|
unkown
|
page execute read
|
||
6A1000
|
unkown
|
page readonly
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
25500041000
|
trusted library allocation
|
page read and write
|
||
8C1000
|
unkown
|
page execute and read and write
|
||
191000
|
unkown
|
page execute read
|
||
5090000
|
direct allocation
|
page read and write
|
||
342000
|
unkown
|
page readonly
|
||
A22000
|
unkown
|
page readonly
|
||
27AB9251000
|
trusted library allocation
|
page read and write
|
||
3B73000
|
trusted library allocation
|
page read and write
|
||
3B05000
|
trusted library allocation
|
page read and write
|
||
12B1000
|
heap
|
page read and write
|
||
191000
|
unkown
|
page execute read
|
||
5F2000
|
unkown
|
page readonly
|
||
125F1000
|
trusted library allocation
|
page read and write
|
||
4C30000
|
direct allocation
|
page read and write
|
||
27FE000
|
trusted library allocation
|
page read and write
|
||
FBD000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
14CF000
|
heap
|
page read and write
|
||
25500001000
|
trusted library allocation
|
page read and write
|
||
2763000
|
trusted library allocation
|
page read and write
|
||
7FFD34420000
|
trusted library allocation
|
page execute and read and write
|
||
D2D000
|
stack
|
page read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
1235000
|
heap
|
page read and write
|
||
27AB7580000
|
unkown
|
page readonly
|
||
28AA000
|
trusted library allocation
|
page read and write
|
||
3D4E000
|
stack
|
page read and write
|
||
27FA000
|
trusted library allocation
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
28CC000
|
trusted library allocation
|
page read and write
|
||
1A30D94F000
|
trusted library allocation
|
page read and write
|
||
2B01000
|
trusted library allocation
|
page read and write
|
||
398E000
|
stack
|
page read and write
|
||
25E4E91A000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
1B010000
|
heap
|
page read and write
|
||
27AB7990000
|
heap
|
page read and write
|
||
1A324620000
|
heap
|
page execute and read and write
|
||
3E8E000
|
stack
|
page read and write
|
||
2978000
|
trusted library allocation
|
page read and write
|
||
37B0000
|
heap
|
page read and write
|
||
7FFD3441C000
|
trusted library allocation
|
page execute and read and write
|
||
34ED000
|
stack
|
page read and write
|
||
14FE000
|
heap
|
page read and write
|
||
31CF000
|
stack
|
page read and write
|
||
35EE000
|
stack
|
page read and write
|
||
1A30C6D9000
|
trusted library allocation
|
page read and write
|
||
BC077E000
|
stack
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
29C3000
|
trusted library allocation
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
1A30D993000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
27AB7820000
|
heap
|
page read and write
|
||
410E000
|
stack
|
page read and write
|
||
64C5000
|
heap
|
page read and write
|
||
65CD000
|
stack
|
page read and write
|
||
52DE000
|
stack
|
page read and write
|
||
DC5000
|
heap
|
page read and write
|
||
BC097F000
|
stack
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
236FF890000
|
trusted library allocation
|
page read and write
|
||
281E000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
7FF6AD860000
|
unkown
|
page readonly
|
||
FF0000
|
direct allocation
|
page read and write
|
||
2933000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
2769000
|
trusted library allocation
|
page read and write
|
||
27AD000
|
trusted library allocation
|
page read and write
|
||
11EE000
|
stack
|
page read and write
|
||
A3C000
|
stack
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
1348000
|
heap
|
page read and write
|
||
1A30BF70000
|
heap
|
page read and write
|
||
2966000
|
trusted library allocation
|
page read and write
|
||
114E000
|
stack
|
page read and write
|
||
137B000
|
heap
|
page read and write
|
||
7FFD3441C000
|
trusted library allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
C9A10F3000
|
stack
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
28CE000
|
trusted library allocation
|
page read and write
|
||
223F2E94000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
273E000
|
stack
|
page read and write
|
||
2B30000
|
direct allocation
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
35FD000
|
trusted library allocation
|
page read and write
|
||
8C0000
|
unkown
|
page read and write
|
||
28F3000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
1A30D953000
|
trusted library allocation
|
page read and write
|
||
3B20000
|
heap
|
page read and write
|
||
27EF000
|
trusted library allocation
|
page read and write
|
||
DA0000
|
heap
|
page read and write
|
||
1A30BF7A000
|
heap
|
page read and write
|
||
3441000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
425000
|
unkown
|
page write copy
|
||
4C11000
|
heap
|
page read and write
|
||
28FE000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page execute and read and write
|
||
125E3000
|
trusted library allocation
|
page read and write
|
||
10FA000
|
stack
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
2809000
|
trusted library allocation
|
page read and write
|
||
12EE000
|
stack
|
page read and write
|
||
1A31C798000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
1A30C2F0000
|
trusted library allocation
|
page read and write
|
||
25E53790000
|
remote allocation
|
page read and write
|
||
7FFD345D0000
|
trusted library allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
4F70000
|
trusted library allocation
|
page read and write
|
||
4CC000
|
stack
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
2900000
|
trusted library allocation
|
page read and write
|
||
7FFD3437D000
|
trusted library allocation
|
page execute and read and write
|
||
14AA000
|
heap
|
page read and write
|
||
5CB7000
|
heap
|
page read and write
|
||
27D8000
|
trusted library allocation
|
page read and write
|
||
1CE7E000
|
stack
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
14A0000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
7FFD34530000
|
trusted library allocation
|
page execute and read and write
|
||
25E53790000
|
remote allocation
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
CDF000
|
stack
|
page read and write
|
||
6FB25FF000
|
stack
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
27DA000
|
trusted library allocation
|
page read and write
|
||
27C7000
|
trusted library allocation
|
page read and write
|
||
7FFD345B0000
|
trusted library allocation
|
page read and write
|
||
1375000
|
heap
|
page read and write
|
||
27B8000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
A52000
|
unkown
|
page readonly
|
||
236FF890000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
5290000
|
direct allocation
|
page execute and read and write
|
||
4AF3000
|
heap
|
page read and write
|
||
AF0000
|
trusted library allocation
|
page read and write
|
||
2895000
|
trusted library allocation
|
page read and write
|
||
1A30CA86000
|
trusted library allocation
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
2851000
|
trusted library allocation
|
page execute and read and write
|
||
38FE000
|
stack
|
page read and write
|
||
DCA000
|
heap
|
page read and write
|
||
223F0F77000
|
heap
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
1A30DD0D000
|
trusted library allocation
|
page read and write
|
||
11AD000
|
stack
|
page read and write
|
||
926000
|
unkown
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
27AB78F0000
|
trusted library section
|
page read and write
|
||
223F0FAE000
|
heap
|
page read and write
|
||
BC09FE000
|
stack
|
page read and write
|
||
FF0000
|
direct allocation
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
27CC000
|
trusted library allocation
|
page read and write
|
||
236FF890000
|
trusted library allocation
|
page read and write
|
||
51CF000
|
stack
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
D50000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
13FF000
|
stack
|
page read and write
|
||
1A324957000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
27C9000
|
trusted library allocation
|
page read and write
|
||
FBF000
|
heap
|
page read and write
|
||
1A3244B0000
|
heap
|
page read and write
|
||
AC5000
|
unkown
|
page write copy
|
||
5270000
|
direct allocation
|
page execute and read and write
|
||
D63000
|
trusted library allocation
|
page execute and read and write
|
||
47B1000
|
heap
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
1A30A5C0000
|
heap
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
7FFD34373000
|
trusted library allocation
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
C9A15FF000
|
stack
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
12A4000
|
heap
|
page read and write
|
||
874000
|
heap
|
page read and write
|
||
BC0CBE000
|
stack
|
page read and write
|
||
7FFD34542000
|
trusted library allocation
|
page read and write
|
||
BC0A79000
|
stack
|
page read and write
|
||
1B150000
|
heap
|
page execute and read and write
|
||
C9A19FC000
|
stack
|
page read and write
|
||
27ED000
|
trusted library allocation
|
page read and write
|
||
28B7000
|
trusted library allocation
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
354F000
|
stack
|
page read and write
|
||
6CE0000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
2935000
|
trusted library allocation
|
page read and write
|
||
BCA000
|
unkown
|
page execute and read and write
|
||
2937000
|
trusted library allocation
|
page read and write
|
||
D40000
|
heap
|
page read and write
|
||
27AB77C1000
|
heap
|
page read and write
|
||
2920000
|
trusted library allocation
|
page read and write
|
||
287B000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
27AB77FA000
|
heap
|
page read and write
|
||
1A31C51F000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
37AE000
|
stack
|
page read and write
|
||
688E000
|
stack
|
page read and write
|
||
1F7000
|
unkown
|
page readonly
|
||
62E000
|
unkown
|
page readonly
|
||
47B1000
|
heap
|
page read and write
|
||
CFB000
|
trusted library allocation
|
page execute and read and write
|
||
1580000
|
heap
|
page read and write
|
||
223F0FAE000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
2908000
|
trusted library allocation
|
page read and write
|
||
1A30D97D000
|
trusted library allocation
|
page read and write
|
||
BCB000
|
unkown
|
page execute and write copy
|
||
12A4000
|
heap
|
page read and write
|
||
143E000
|
stack
|
page read and write
|
||
D8A000
|
trusted library allocation
|
page execute and read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
27AB78B0000
|
trusted library allocation
|
page read and write
|
||
2741000
|
trusted library allocation
|
page read and write
|
||
344E000
|
stack
|
page read and write
|
||
B6E000
|
stack
|
page read and write
|
||
4C20000
|
heap
|
page read and write
|
||
2E238FE000
|
stack
|
page read and write
|
||
1138000
|
stack
|
page read and write
|
||
13EE000
|
stack
|
page read and write
|
||
125E6000
|
trusted library allocation
|
page read and write
|
||
D74000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
heap
|
page read and write
|
||
48B0000
|
trusted library allocation
|
page read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
1A324819000
|
heap
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
C9A16FE000
|
stack
|
page read and write
|
||
A66000
|
unkown
|
page readonly
|
||
7FFD34550000
|
trusted library allocation
|
page execute and read and write
|
||
B90000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
87E000
|
heap
|
page read and write
|
||
142E000
|
stack
|
page read and write
|
||
1195000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
DBD000
|
heap
|
page read and write
|
||
7FF6ADAED000
|
unkown
|
page readonly
|
||
27C5000
|
trusted library allocation
|
page read and write
|
||
2700000
|
heap
|
page execute and read and write
|
||
155E000
|
heap
|
page read and write
|
||
87AF000
|
stack
|
page read and write
|
||
223F0F00000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
25E535F1000
|
trusted library allocation
|
page read and write
|
||
1A30DD30000
|
trusted library allocation
|
page read and write
|
||
27AB78C3000
|
trusted library allocation
|
page read and write
|
||
5240000
|
direct allocation
|
page read and write
|
||
2C9F000
|
stack
|
page read and write
|
||
1A324914000
|
heap
|
page read and write
|
||
1B3B0000
|
heap
|
page read and write
|
||
28F1000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
28E0000
|
trusted library allocation
|
page read and write
|
||
1F7000
|
unkown
|
page readonly
|
||
1A3244F6000
|
heap
|
page read and write
|
||
2EBE000
|
stack
|
page read and write
|
||
FBF000
|
heap
|
page read and write
|
||
430000
|
unkown
|
page readonly
|
||
2944000
|
trusted library allocation
|
page read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
3BCF000
|
stack
|
page read and write
|
||
BA3000
|
trusted library allocation
|
page execute and read and write
|
||
4C11000
|
heap
|
page read and write
|
||
86A000
|
heap
|
page read and write
|
||
464000
|
unkown
|
page read and write
|
||
223F2E96000
|
heap
|
page read and write
|
||
29EA000
|
trusted library allocation
|
page read and write
|
||
2765000
|
trusted library allocation
|
page read and write
|
||
3E2000
|
unkown
|
page readonly
|
||
4C11000
|
heap
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
14E5000
|
heap
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
D50000
|
heap
|
page read and write
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
29F0000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
A0D000
|
heap
|
page read and write
|
||
494D000
|
stack
|
page read and write
|
||
BC0C3A000
|
stack
|
page read and write
|
||
25DE000
|
stack
|
page read and write
|
||
2F7C000
|
trusted library allocation
|
page read and write
|
||
D70000
|
trusted library allocation
|
page read and write
|
||
27AB9200000
|
heap
|
page execute and read and write
|
||
50D0000
|
heap
|
page execute and read and write
|
||
2629000
|
trusted library allocation
|
page read and write
|
||
2F3F000
|
stack
|
page read and write
|
||
8991000
|
heap
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
7FFD34363000
|
trusted library allocation
|
page execute and read and write
|
||
45CF000
|
stack
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
236FF440000
|
trusted library allocation
|
page read and write
|
||
1A30A550000
|
heap
|
page read and write
|
||
7FFD34520000
|
trusted library allocation
|
page read and write
|
||
B80000
|
trusted library section
|
page readonly
|
||
30CF000
|
stack
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
28A8000
|
trusted library allocation
|
page read and write
|
||
2873000
|
trusted library allocation
|
page read and write
|
||
660E000
|
stack
|
page read and write
|
||
25E4E91A000
|
heap
|
page read and write
|
||
E7B000
|
stack
|
page read and write
|
||
2B30000
|
direct allocation
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
7FFD34363000
|
trusted library allocation
|
page execute and read and write
|
||
FF0000
|
direct allocation
|
page read and write
|
||
888C000
|
stack
|
page read and write
|
||
7FFD34510000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
448F000
|
stack
|
page read and write
|
||
6FB29FB000
|
stack
|
page read and write
|
||
223F0F69000
|
heap
|
page read and write
|
||
28B9000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
D9E000
|
stack
|
page read and write
|
||
5300000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
4AD2000
|
heap
|
page read and write
|
||
1A30E0CF000
|
trusted library allocation
|
page read and write
|
||
1558000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
1A30C4B1000
|
trusted library allocation
|
page read and write
|
||
5C27000
|
heap
|
page read and write
|
||
5F0000
|
unkown
|
page readonly
|
||
DF6000
|
heap
|
page read and write
|
||
27AB772A000
|
heap
|
page read and write
|
||
1A30A470000
|
heap
|
page read and write
|
||
1A30A630000
|
heap
|
page read and write
|
||
39FF000
|
stack
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
1A30D9C0000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
2470000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
27E7000
|
trusted library allocation
|
page read and write
|
||
6FB22FF000
|
stack
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
27AB7870000
|
heap
|
page read and write
|
||
7FFD34410000
|
trusted library allocation
|
page read and write
|
||
928000
|
unkown
|
page execute and read and write
|
||
E03000
|
heap
|
page read and write
|
||
1A3248C8000
|
heap
|
page read and write
|
||
36AE000
|
stack
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
D9A000
|
heap
|
page read and write
|
||
2E2331E000
|
stack
|
page read and write
|
||
3100000
|
unkown
|
page readonly
|
||
4C11000
|
heap
|
page read and write
|
||
2913000
|
trusted library allocation
|
page read and write
|
||
2963000
|
trusted library allocation
|
page read and write
|
||
223F11F5000
|
heap
|
page read and write
|
||
DD3000
|
heap
|
page read and write
|
||
1582000
|
heap
|
page read and write
|
||
6FB2AFD000
|
stack
|
page read and write
|
||
7FFD34364000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
14EF000
|
heap
|
page read and write
|
||
340000
|
unkown
|
page readonly
|
||
27D4000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
1A30DD83000
|
trusted library allocation
|
page read and write
|
||
27FC000
|
trusted library allocation
|
page read and write
|
||
2E23BFF000
|
stack
|
page read and write
|
||
7FFD343BC000
|
trusted library allocation
|
page execute and read and write
|
||
E44000
|
heap
|
page read and write
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
A08000
|
heap
|
page read and write
|
||
5A60000
|
direct allocation
|
page read and write
|
||
25E53790000
|
remote allocation
|
page read and write
|
||
2EC0000
|
heap
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
BD5000
|
heap
|
page read and write
|
||
926000
|
unkown
|
page write copy
|
||
4C11000
|
heap
|
page read and write
|
||
C9A18FE000
|
stack
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
270D000
|
trusted library allocation
|
page read and write
|
||
5240000
|
direct allocation
|
page execute and read and write
|
||
4C11000
|
heap
|
page read and write
|
||
5841000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
52A0000
|
direct allocation
|
page execute and read and write
|
||
6FB26FE000
|
stack
|
page read and write
|
||
441000
|
unkown
|
page execute and write copy
|
||
236FF440000
|
trusted library allocation
|
page read and write
|
||
1A31C4E1000
|
trusted library allocation
|
page read and write
|
||
2E236FD000
|
unkown
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
848000
|
heap
|
page read and write
|
||
25E5364E000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
223F0F66000
|
heap
|
page read and write
|
||
1150000
|
heap
|
page read and write
|
||
2940000
|
trusted library allocation
|
page read and write
|
||
1A324670000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
980000
|
unkown
|
page readonly
|
||
47B1000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
334E000
|
stack
|
page read and write
|
||
1366000
|
heap
|
page read and write
|
||
FBD000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page execute and read and write
|
||
440000
|
unkown
|
page readonly
|
||
C9A17FF000
|
stack
|
page read and write
|
||
1B3A0000
|
heap
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
5E2000
|
unkown
|
page readonly
|
||
2E3E000
|
stack
|
page read and write
|
||
1290000
|
heap
|
page read and write
|
||
712000
|
stack
|
page read and write
|
||
D2E000
|
stack
|
page read and write
|
||
44A000
|
remote allocation
|
page execute and read and write
|
||
223F2E93000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
2473000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
FF0000
|
direct allocation
|
page read and write
|
||
7FF6ADAF0000
|
unkown
|
page readonly
|
||
4A6000
|
unkown
|
page write copy
|
||
47B1000
|
heap
|
page read and write
|
||
102E000
|
stack
|
page read and write
|
||
98E000
|
stack
|
page read and write
|
||
7FFD34360000
|
trusted library allocation
|
page read and write
|
||
6FB20F3000
|
stack
|
page read and write
|
||
35DC000
|
trusted library allocation
|
page read and write
|
||
981000
|
unkown
|
page execute and write copy
|
||
384E000
|
stack
|
page read and write
|
||
236FF440000
|
trusted library allocation
|
page read and write
|
||
3A20000
|
remote allocation
|
page read and write
|
||
87B000
|
heap
|
page read and write
|
||
1B39D000
|
stack
|
page read and write
|
||
F8F000
|
stack
|
page read and write
|
||
12A3000
|
heap
|
page read and write
|
||
7FFD34480000
|
trusted library allocation
|
page execute and read and write
|
||
498F000
|
stack
|
page read and write
|
||
921000
|
unkown
|
page execute and read and write
|
||
760000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
3E0000
|
unkown
|
page readonly
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
14E4000
|
heap
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
1250000
|
heap
|
page read and write
|
||
1AFAE000
|
stack
|
page read and write
|
||
29C9000
|
trusted library allocation
|
page read and write
|
||
7FFD34380000
|
trusted library allocation
|
page read and write
|
||
25E53750000
|
trusted library allocation
|
page read and write
|
||
D90000
|
heap
|
page read and write
|
||
296E000
|
trusted library allocation
|
page read and write
|
||
157D000
|
heap
|
page read and write
|
||
160000
|
heap
|
page read and write
|
||
FC0000
|
trusted library allocation
|
page execute and read and write
|
||
1A30A600000
|
trusted library allocation
|
page read and write
|
||
370E000
|
stack
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
380F000
|
stack
|
page read and write
|
||
125E8000
|
trusted library allocation
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
FF0000
|
direct allocation
|
page read and write
|
||
6A70000
|
heap
|
page read and write
|
||
1A3248E6000
|
heap
|
page read and write
|
||
4A65000
|
heap
|
page read and write
|
||
1470000
|
heap
|
page read and write
|
||
33BE000
|
trusted library allocation
|
page read and write
|
||
69C0000
|
heap
|
page read and write
|
||
470F000
|
stack
|
page read and write
|
||
156C000
|
heap
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
2970000
|
trusted library allocation
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
509E000
|
stack
|
page read and write
|
||
2905000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
DE8000
|
heap
|
page read and write
|
||
6CC000
|
stack
|
page read and write
|
||
5250000
|
direct allocation
|
page execute and read and write
|
||
52B0000
|
direct allocation
|
page execute and read and write
|
||
14E4000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
7FFD34511000
|
trusted library allocation
|
page read and write
|
||
12A0000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
2811000
|
trusted library allocation
|
page read and write
|
||
4FC000
|
stack
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
33CD000
|
trusted library allocation
|
page read and write
|
||
157E000
|
heap
|
page read and write
|
||
1A324800000
|
heap
|
page read and write
|
||
1A30A6B7000
|
heap
|
page read and write
|
||
DB7000
|
heap
|
page read and write
|
||
2812000
|
trusted library allocation
|
page execute and read and write
|
||
2879000
|
trusted library allocation
|
page read and write
|
||
5200000
|
direct allocation
|
page execute and read and write
|
||
1564000
|
heap
|
page read and write
|
||
157A000
|
heap
|
page read and write
|
||
136B000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
1246000
|
heap
|
page read and write
|
||
29A8000
|
trusted library allocation
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
484F000
|
stack
|
page read and write
|
||
7FFD34540000
|
trusted library allocation
|
page execute and read and write
|
||
27AB7582000
|
unkown
|
page readonly
|
||
505F000
|
stack
|
page read and write
|
||
394F000
|
stack
|
page read and write
|
||
7FFD3436D000
|
trusted library allocation
|
page execute and read and write
|
||
E44000
|
heap
|
page read and write
|
||
4A6000
|
unkown
|
page write copy
|
||
14E4000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
7FFD345F0000
|
trusted library allocation
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
BA4000
|
trusted library allocation
|
page read and write
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
1A324875000
|
heap
|
page read and write
|
||
FF0000
|
direct allocation
|
page read and write
|
||
1B019000
|
heap
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
1A31C7A7000
|
trusted library allocation
|
page read and write
|
||
6BDB000
|
stack
|
page read and write
|
||
7FFD34380000
|
trusted library allocation
|
page read and write
|
||
DE8000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
7EC000
|
heap
|
page read and write
|
||
824000
|
unkown
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
7FFD3438D000
|
trusted library allocation
|
page execute and read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
223F11C0000
|
heap
|
page read and write
|
||
4A89000
|
heap
|
page read and write
|
||
CAF000
|
stack
|
page read and write
|
||
1160000
|
heap
|
page read and write
|
||
277A000
|
trusted library allocation
|
page read and write
|
||
329E000
|
stack
|
page read and write
|
||
2884000
|
trusted library allocation
|
page read and write
|
||
27AB776D000
|
heap
|
page read and write
|
||
2899000
|
trusted library allocation
|
page read and write
|
||
223F0F58000
|
heap
|
page read and write
|
||
1A31C79F000
|
trusted library allocation
|
page read and write
|
||
BC08FE000
|
stack
|
page read and write
|
||
F81000
|
heap
|
page read and write
|
||
5230000
|
direct allocation
|
page execute and read and write
|
||
C9A14FF000
|
stack
|
page read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
4D90000
|
direct allocation
|
page read and write
|
||
1369000
|
heap
|
page read and write
|
||
A4F000
|
stack
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
4D70000
|
direct allocation
|
page execute and read and write
|
||
4C11000
|
heap
|
page read and write
|
||
BC0DBC000
|
stack
|
page read and write
|
||
4C90000
|
direct allocation
|
page read and write
|
||
27A7000
|
trusted library allocation
|
page read and write
|
||
840000
|
heap
|
page read and write
|
||
4AE8000
|
heap
|
page read and write
|
||
7C1000
|
heap
|
page read and write
|
||
330F000
|
stack
|
page read and write
|
||
2813000
|
trusted library allocation
|
page read and write
|
||
6CE4000
|
heap
|
page read and write
|
||
1A32496F000
|
heap
|
page read and write
|
||
8C1000
|
unkown
|
page execute and write copy
|
||
12A4000
|
heap
|
page read and write
|
||
1A31C79D000
|
trusted library allocation
|
page read and write
|
||
28DE000
|
trusted library allocation
|
page read and write
|
||
D80000
|
heap
|
page read and write
|
||
28FF000
|
stack
|
page read and write
|
||
2787000
|
trusted library allocation
|
page read and write
|
||
BC0EBB000
|
stack
|
page read and write
|
||
2886000
|
trusted library allocation
|
page read and write
|
||
307D000
|
stack
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
7DF440230000
|
trusted library allocation
|
page execute and read and write
|
||
DCE000
|
heap
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
4C11000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
190000
|
unkown
|
page readonly
|
||
4C11000
|
heap
|
page read and write
|
||
7FFD3438B000
|
trusted library allocation
|
page execute and read and write
|
||
BBC000
|
unkown
|
page execute and read and write
|
||
1B04F000
|
heap
|
page read and write
|
||
D30000
|
trusted library allocation
|
page read and write
|
||
27AB7610000
|
heap
|
page read and write
|
||
A57000
|
unkown
|
page readonly
|
||
281A000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
1AB6C000
|
stack
|
page read and write
|
||
7FFD34500000
|
trusted library allocation
|
page read and write
|
||
6FB21FF000
|
stack
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
554F000
|
stack
|
page read and write
|
||
2931000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
FF0000
|
direct allocation
|
page read and write
|
||
64BB000
|
stack
|
page read and write
|
||
1A3246C7000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
8990000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
1343000
|
heap
|
page read and write
|
||
1A324810000
|
heap
|
page read and write
|
||
25E53620000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
heap
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
7FF468E70000
|
trusted library allocation
|
page execute and read and write
|
||
12A4000
|
heap
|
page read and write
|
||
3570000
|
trusted library allocation
|
page read and write
|
||
1AFF8000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
7FFD34384000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
direct allocation
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
1A30D505000
|
trusted library allocation
|
page read and write
|
||
28ED000
|
trusted library allocation
|
page read and write
|
||
BC0ABF000
|
stack
|
page read and write
|
||
C9A11FF000
|
stack
|
page read and write
|
||
FF0000
|
direct allocation
|
page read and write
|
||
2875000
|
trusted library allocation
|
page read and write
|
||
1A30DCC1000
|
trusted library allocation
|
page read and write
|
||
35F0000
|
heap
|
page read and write
|
||
1A31C4B1000
|
trusted library allocation
|
page read and write
|
||
2902000
|
trusted library allocation
|
page read and write
|
||
1A30A6BB000
|
heap
|
page read and write
|
||
2648000
|
trusted library allocation
|
page read and write
|
||
1A30D93B000
|
trusted library allocation
|
page read and write
|
||
1A30A66F000
|
heap
|
page read and write
|
||
3815000
|
trusted library allocation
|
page read and write
|
||
F77000
|
heap
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
7FFD34590000
|
trusted library allocation
|
page read and write
|
||
460E000
|
stack
|
page read and write
|
||
27AB7742000
|
heap
|
page read and write
|
||
EC000
|
stack
|
page read and write
|
||
279C000
|
trusted library allocation
|
page read and write
|
||
27DC000
|
trusted library allocation
|
page read and write
|
||
F97000
|
trusted library allocation
|
page execute and read and write
|
||
1A30A5B0000
|
heap
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
3811000
|
trusted library allocation
|
page read and write
|
||
1A30C4A0000
|
heap
|
page read and write
|
||
29C7000
|
trusted library allocation
|
page read and write
|
||
27AB770C000
|
heap
|
page read and write
|
||
1584000
|
heap
|
page read and write
|
||
7FFD34370000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
424D000
|
stack
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
69C000
|
unkown
|
page readonly
|
||
4C11000
|
heap
|
page read and write
|
||
1190000
|
heap
|
page read and write
|
||
2888000
|
trusted library allocation
|
page read and write
|
||
33E1000
|
trusted library allocation
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
3D0F000
|
stack
|
page read and write
|
||
223F0F50000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
1B3C2000
|
heap
|
page read and write
|
||
129A000
|
heap
|
page read and write
|
||
5CB000
|
stack
|
page read and write
|
||
3FCE000
|
stack
|
page read and write
|
||
289D000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
1554000
|
heap
|
page read and write
|
||
7DF440240000
|
trusted library allocation
|
page execute and read and write
|
||
D20000
|
trusted library allocation
|
page execute and read and write
|
||
447000
|
remote allocation
|
page execute and read and write
|
||
F9B000
|
trusted library allocation
|
page execute and read and write
|
||
223F11F0000
|
heap
|
page read and write
|
||
1333000
|
heap
|
page read and write
|
||
1A30D9AC000
|
trusted library allocation
|
page read and write
|
||
6FB24FF000
|
stack
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
AC5000
|
heap
|
page read and write
|
||
1AFC4000
|
heap
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
35CE000
|
stack
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
7FFD34480000
|
trusted library allocation
|
page execute and read and write
|
||
42B000
|
unkown
|
page write copy
|
||
2CFE000
|
stack
|
page read and write
|
||
25579610000
|
unkown
|
page readonly
|
||
47B1000
|
heap
|
page read and write
|
||
27AB7740000
|
heap
|
page read and write
|
||
8C0000
|
unkown
|
page readonly
|
||
47B1000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
6B2000
|
unkown
|
page readonly
|
||
2821000
|
trusted library allocation
|
page read and write
|
||
7FFD34560000
|
trusted library allocation
|
page read and write
|
||
1B3D9000
|
heap
|
page read and write
|
||
7FFD34446000
|
trusted library allocation
|
page execute and read and write
|
||
4A6B000
|
heap
|
page read and write
|
||
4AAD000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
1A30BEE0000
|
trusted library allocation
|
page read and write
|
||
FF0000
|
direct allocation
|
page read and write
|
||
49CE000
|
stack
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
74A000
|
unkown
|
page execute and write copy
|
||
40CF000
|
stack
|
page read and write
|
||
440000
|
unkown
|
page readonly
|
||
47B1000
|
heap
|
page read and write
|
||
2801000
|
trusted library allocation
|
page read and write
|
||
6FB27FE000
|
stack
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
4AC2000
|
heap
|
page read and write
|
||
5C48000
|
heap
|
page read and write
|
||
BC188E000
|
stack
|
page read and write
|
||
684F000
|
stack
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
41C000
|
unkown
|
page readonly
|
||
4F60000
|
trusted library allocation
|
page execute and read and write
|
||
12A4000
|
heap
|
page read and write
|
||
BB0000
|
trusted library allocation
|
page read and write
|
||
146E000
|
stack
|
page read and write
|
||
2B0A000
|
trusted library allocation
|
page execute and read and write
|
||
295D000
|
trusted library allocation
|
page read and write
|
||
2FAD000
|
heap
|
page read and write
|
||
14AE000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
BC0879000
|
stack
|
page read and write
|
||
1B034000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
4D80000
|
direct allocation
|
page execute and read and write
|
||
51DE000
|
stack
|
page read and write
|
||
25579612000
|
unkown
|
page readonly
|
||
1A324557000
|
heap
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
27AB7840000
|
heap
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
1574000
|
heap
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
3A40000
|
heap
|
page read and write
|
||
1A324640000
|
heap
|
page execute and read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
279A000
|
trusted library allocation
|
page read and write
|
||
A20000
|
unkown
|
page readonly
|
||
278D000
|
trusted library allocation
|
page read and write
|
||
153D000
|
heap
|
page read and write
|
||
BC06FE000
|
unkown
|
page read and write
|
||
420F000
|
stack
|
page read and write
|
||
4D90000
|
direct allocation
|
page execute and read and write
|
||
4F40000
|
heap
|
page read and write
|
||
2985000
|
trusted library allocation
|
page read and write
|
||
290F000
|
trusted library allocation
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
2853000
|
trusted library allocation
|
page read and write
|
||
157A000
|
heap
|
page read and write
|
||
7FFD34500000
|
trusted library allocation
|
page read and write
|
||
29B4000
|
trusted library allocation
|
page read and write
|
||
27EB000
|
trusted library allocation
|
page read and write
|
||
1A324827000
|
heap
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
3613000
|
trusted library allocation
|
page read and write
|
||
4BFD000
|
stack
|
page read and write
|
||
27AB9236000
|
trusted library allocation
|
page read and write
|
||
7FFD34446000
|
trusted library allocation
|
page execute and read and write
|
||
2976000
|
trusted library allocation
|
page read and write
|
||
236FF440000
|
trusted library allocation
|
page read and write
|
||
340D000
|
trusted library allocation
|
page read and write
|
||
687000
|
unkown
|
page readonly
|
||
674E000
|
stack
|
page read and write
|
||
27AB77BD000
|
heap
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
2740000
|
heap
|
page execute and read and write
|
||
4EA0000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
27F8000
|
trusted library allocation
|
page read and write
|
||
223F2E90000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
B38000
|
stack
|
page read and write
|
||
51F0000
|
direct allocation
|
page execute and read and write
|
||
36CF000
|
stack
|
page read and write
|
||
2915000
|
trusted library allocation
|
page read and write
|
||
292F000
|
trusted library allocation
|
page read and write
|
||
28FC000
|
trusted library allocation
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
400000
|
unkown
|
page readonly
|
||
27AB77E7000
|
heap
|
page read and write
|
||
2E2330D000
|
stack
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
1A30D10D000
|
trusted library allocation
|
page read and write
|
||
2961000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
236FF890000
|
trusted library allocation
|
page read and write
|
||
1576000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
2911000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
7FF6AD86B000
|
unkown
|
page readonly
|
||
585C000
|
heap
|
page read and write
|
||
1A324647000
|
heap
|
page execute and read and write
|
||
2733000
|
trusted library allocation
|
page read and write
|
||
7AA000
|
heap
|
page read and write
|
||
2994000
|
trusted library allocation
|
page read and write
|
||
25E53634000
|
trusted library allocation
|
page read and write
|
||
2F1D000
|
stack
|
page read and write
|
||
F7E000
|
heap
|
page read and write
|
||
2E1F000
|
stack
|
page read and write
|
||
BAD000
|
trusted library allocation
|
page execute and read and write
|
||
1A30E005000
|
trusted library allocation
|
page read and write
|
||
276B000
|
trusted library allocation
|
page read and write
|
||
1E370000
|
trusted library allocation
|
page read and write
|
||
120A000
|
heap
|
page read and write
|
||
D64000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
42B000
|
unkown
|
page write copy
|
||
2868000
|
trusted library allocation
|
page read and write
|
||
7FFD3437B000
|
trusted library allocation
|
page read and write
|
||
1B048000
|
heap
|
page read and write
|
||
434F000
|
stack
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
28EF000
|
trusted library allocation
|
page read and write
|
||
14F4000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
2D1D000
|
stack
|
page read and write
|
||
27AB7995000
|
heap
|
page read and write
|
||
FF0000
|
direct allocation
|
page read and write
|
||
3A8F000
|
stack
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
1A3246A0000
|
heap
|
page read and write
|
||
3436000
|
trusted library allocation
|
page read and write
|
||
51E0000
|
direct allocation
|
page execute and read and write
|
||
103B000
|
stack
|
page read and write
|
||
27AB772D000
|
heap
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
6E1E000
|
stack
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
7FFD34570000
|
trusted library allocation
|
page read and write
|
||
1580000
|
heap
|
page read and write
|
||
1A30C339000
|
heap
|
page read and write
|
||
223F0F77000
|
heap
|
page read and write
|
||
357A000
|
trusted library allocation
|
page read and write
|
||
1AFF0000
|
heap
|
page read and write
|
||
B5E000
|
stack
|
page read and write
|
||
1576000
|
heap
|
page read and write
|
||
78C000
|
heap
|
page read and write
|
||
25E53630000
|
trusted library allocation
|
page read and write
|
||
288C000
|
trusted library allocation
|
page read and write
|
||
1574000
|
heap
|
page read and write
|
||
1A32481B000
|
heap
|
page read and write
|
||
AE4000
|
trusted library allocation
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
1A324837000
|
heap
|
page read and write
|
||
29B2000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
1A30A68F000
|
heap
|
page read and write
|
||
1A32484D000
|
heap
|
page read and write
|
||
223F2B40000
|
heap
|
page read and write
|
||
9D4000
|
trusted library allocation
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
2942000
|
trusted library allocation
|
page read and write
|
||
74A000
|
unkown
|
page execute and write copy
|
||
125E1000
|
trusted library allocation
|
page read and write
|
||
441000
|
unkown
|
page execute and write copy
|
||
1C6A2000
|
trusted library allocation
|
page read and write
|
||
7EA000
|
heap
|
page read and write
|
||
2B50000
|
direct allocation
|
page execute and read and write
|
||
BE0000
|
heap
|
page read and write
|
||
1CB7E000
|
stack
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
BC0E3E000
|
stack
|
page read and write
|
||
1A30C536000
|
trusted library allocation
|
page read and write
|
||
280F000
|
stack
|
page read and write
|
||
384F000
|
stack
|
page read and write
|
||
25E1000
|
trusted library allocation
|
page read and write
|
||
474E000
|
stack
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
44CE000
|
stack
|
page read and write
|
||
1A30E0CB000
|
trusted library allocation
|
page read and write
|
||
27AB78C0000
|
trusted library allocation
|
page read and write
|
||
2FCF000
|
stack
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
2992000
|
trusted library allocation
|
page read and write
|
||
374E000
|
stack
|
page read and write
|
||
12E0000
|
heap
|
page read and write
|
||
808000
|
heap
|
page read and write
|
||
519F000
|
stack
|
page read and write
|
||
7BF000
|
heap
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
12A9000
|
heap
|
page read and write
|
||
4AF3000
|
heap
|
page read and write
|
||
7FFD34530000
|
trusted library allocation
|
page read and write
|
||
153D000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
1554000
|
heap
|
page read and write
|
||
7FFD345E0000
|
trusted library allocation
|
page read and write
|
||
1567000
|
heap
|
page read and write
|
||
3ACE000
|
stack
|
page read and write
|
||
1A30D290000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
24397F00000
|
unkown
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
27AB91F0000
|
heap
|
page execute and read and write
|
||
1A30DAD6000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
12D5000
|
heap
|
page read and write
|
||
1A30D969000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
2989000
|
trusted library allocation
|
page read and write
|
||
279E000
|
trusted library allocation
|
page read and write
|
||
7FFD343BC000
|
trusted library allocation
|
page execute and read and write
|
||
1E0000
|
unkown
|
page readonly
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
14E4000
|
heap
|
page read and write
|
||
236FF440000
|
trusted library allocation
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
6CDC000
|
stack
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
9C0000
|
trusted library allocation
|
page read and write
|
||
1200000
|
heap
|
page read and write
|
||
7FFD34416000
|
trusted library allocation
|
page read and write
|
||
25E53740000
|
trusted library allocation
|
page read and write
|
||
AAA000
|
unkown
|
page execute and read and write
|
||
299A000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
35A0000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
875000
|
heap
|
page read and write
|
||
1337000
|
heap
|
page read and write
|
||
FF0000
|
direct allocation
|
page read and write
|
||
1F7000
|
unkown
|
page readonly
|
||
47B1000
|
heap
|
page read and write
|
||
27AB7875000
|
heap
|
page read and write
|
||
1030000
|
heap
|
page read and write
|
||
6FB23FD000
|
stack
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
28EB000
|
trusted library allocation
|
page read and write
|
||
1A30D996000
|
trusted library allocation
|
page read and write
|
||
4AE8000
|
heap
|
page read and write
|
||
4D10000
|
trusted library allocation
|
page read and write
|
||
1A324935000
|
heap
|
page read and write
|
||
277E000
|
trusted library allocation
|
page read and write
|
||
BC0673000
|
stack
|
page read and write
|
||
344F000
|
stack
|
page read and write
|
||
29DD000
|
stack
|
page read and write
|
||
5260000
|
direct allocation
|
page execute and read and write
|
||
870000
|
heap
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
27AB776B000
|
heap
|
page read and write
|
||
1A30A570000
|
heap
|
page read and write
|
||
1A324858000
|
heap
|
page read and write
|
||
348E000
|
stack
|
page read and write
|
||
3580000
|
trusted library allocation
|
page read and write
|
||
830000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
D9E000
|
heap
|
page read and write
|
||
AE0000
|
trusted library allocation
|
page read and write
|
||
438E000
|
stack
|
page read and write
|
||
AD0000
|
trusted library allocation
|
page read and write
|
||
277C000
|
trusted library allocation
|
page read and write
|
||
1035000
|
heap
|
page read and write
|
||
1A30D9AA000
|
trusted library allocation
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
2767000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
2E237FE000
|
stack
|
page read and write
|
||
2FD6000
|
heap
|
page read and write
|
||
6A60000
|
heap
|
page read and write
|
||
27AF000
|
trusted library allocation
|
page read and write
|
||
1A31C4D1000
|
trusted library allocation
|
page read and write
|
||
FD0000
|
trusted library allocation
|
page read and write
|
||
C9A13FD000
|
stack
|
page read and write
|
||
FF0000
|
direct allocation
|
page read and write
|
||
1AFFB000
|
heap
|
page read and write
|
||
12C8000
|
heap
|
page read and write
|
||
52F9000
|
stack
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
28CA000
|
trusted library allocation
|
page read and write
|
||
28BB000
|
trusted library allocation
|
page read and write
|
||
2681000
|
trusted library allocation
|
page read and write
|
||
2E7C000
|
stack
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
680000
|
unkown
|
page readonly
|
||
A30000
|
heap
|
page read and write
|
||
281C000
|
trusted library allocation
|
page read and write
|
||
E34000
|
heap
|
page read and write
|
||
FF0000
|
direct allocation
|
page read and write
|
||
7C7000
|
stack
|
page read and write
|
||
BC0B37000
|
stack
|
page read and write
|
||
3C0E000
|
stack
|
page read and write
|
||
540B000
|
stack
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
1C4A0000
|
heap
|
page read and write
|
||
7FF6AD861000
|
unkown
|
page execute read
|
||
BE5000
|
heap
|
page read and write
|
||
9EE000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
268E000
|
stack
|
page read and write
|
||
1A30BF20000
|
heap
|
page execute and read and write
|
||
1A30BF75000
|
heap
|
page read and write
|
||
C9A12FF000
|
stack
|
page read and write
|
||
2DFD000
|
stack
|
page read and write
|
||
2946000
|
trusted library allocation
|
page read and write
|
||
29C5000
|
trusted library allocation
|
page read and write
|
||
7DF440250000
|
trusted library allocation
|
page execute and read and write
|
||
3B01000
|
trusted library allocation
|
page read and write
|
||
4C10000
|
heap
|
page read and write
|
||
1F2000
|
unkown
|
page read and write
|
||
2972000
|
trusted library allocation
|
page read and write
|
||
1AFB4000
|
heap
|
page read and write
|
||
7FFD34580000
|
trusted library allocation
|
page read and write
|
||
25E4E95A000
|
heap
|
page read and write
|
||
BC0D3E000
|
stack
|
page read and write
|
||
1A3248DA000
|
heap
|
page read and write
|
||
7FFD345C0000
|
trusted library allocation
|
page read and write
|
||
1AFE1000
|
heap
|
page read and write
|
||
4F4E000
|
stack
|
page read and write
|
||
D72000
|
unkown
|
page execute and write copy
|
||
1592000
|
heap
|
page read and write
|
||
1F2000
|
unkown
|
page write copy
|
||
12A4000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
C35000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
27D6000
|
trusted library allocation
|
page read and write
|
||
190000
|
unkown
|
page readonly
|
||
190000
|
unkown
|
page readonly
|
||
7FFD34520000
|
trusted library allocation
|
page execute and read and write
|
||
1556000
|
heap
|
page read and write
|
||
255000CF000
|
trusted library allocation
|
page read and write
|
||
223F0F77000
|
heap
|
page read and write
|
||
289B000
|
trusted library allocation
|
page read and write
|
||
5304000
|
heap
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
2F7E000
|
stack
|
page read and write
|
||
488E000
|
stack
|
page read and write
|
||
358F000
|
stack
|
page read and write
|
||
DED000
|
heap
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
898C000
|
stack
|
page read and write
|
||
1490000
|
direct allocation
|
page read and write
|
||
FC0000
|
heap
|
page read and write
|
||
24D0000
|
heap
|
page execute and read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
670F000
|
stack
|
page read and write
|
||
7FF6AD86E000
|
unkown
|
page write copy
|
||
A50000
|
heap
|
page read and write
|
||
7FFD34416000
|
trusted library allocation
|
page read and write
|
||
29BA000
|
trusted library allocation
|
page read and write
|
||
6A6E000
|
heap
|
page read and write
|
||
5270000
|
direct allocation
|
page execute and read and write
|
||
236FF440000
|
trusted library allocation
|
page read and write
|
||
1582000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
7FFD345A0000
|
trusted library allocation
|
page read and write
|
||
2798000
|
trusted library allocation
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
7FFD34364000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
33B0000
|
trusted library allocation
|
page read and write
|
||
1A3248DE000
|
heap
|
page read and write
|
||
2825000
|
trusted library allocation
|
page read and write
|
||
4D90000
|
direct allocation
|
page execute and read and write
|
||
5E0000
|
unkown
|
page readonly
|
||
DBB000
|
heap
|
page read and write
|
||
223F0FA4000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
1A30D967000
|
trusted library allocation
|
page read and write
|
||
1490000
|
direct allocation
|
page read and write
|
||
27AB7800000
|
heap
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
842000
|
heap
|
page read and write
|
||
1558000
|
heap
|
page read and write
|
||
3F8F000
|
stack
|
page read and write
|
||
223F0F9E000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
2981000
|
trusted library allocation
|
page read and write
|
||
4A60000
|
direct allocation
|
page read and write
|
||
1AFBA000
|
heap
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
27E9000
|
trusted library allocation
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
BC07FE000
|
stack
|
page read and write
|
||
3035000
|
heap
|
page read and write
|
||
1A30A675000
|
heap
|
page read and write
|
||
4D90000
|
direct allocation
|
page execute and read and write
|
||
12D9000
|
heap
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
1A30D9F3000
|
trusted library allocation
|
page read and write
|
||
4A6D000
|
heap
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
2E23314000
|
stack
|
page read and write
|
||
1A30A5B5000
|
heap
|
page read and write
|
||
1A3248AE000
|
heap
|
page read and write
|
||
1AFD8000
|
heap
|
page read and write
|
||
2877000
|
trusted library allocation
|
page read and write
|
||
9EA000
|
heap
|
page read and write
|
||
1CD7E000
|
stack
|
page read and write
|
||
49AD000
|
stack
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
5220000
|
direct allocation
|
page execute and read and write
|
||
A25000
|
heap
|
page read and write
|
||
7FFD34410000
|
trusted library allocation
|
page read and write
|
||
CEE000
|
stack
|
page read and write
|
||
150000
|
heap
|
page read and write
|
||
6CE000
|
unkown
|
page readonly
|
||
12750000
|
trusted library allocation
|
page read and write
|
||
7AD000
|
heap
|
page read and write
|
||
1A30A67B000
|
heap
|
page read and write
|
||
3855000
|
trusted library allocation
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
27AB7950000
|
heap
|
page read and write
|
||
BB4000
|
unkown
|
page execute and read and write
|
||
27AB7700000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
3A20000
|
remote allocation
|
page read and write
|
||
295F000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
89AA000
|
heap
|
page read and write
|
||
2790000
|
trusted library allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
498E000
|
stack
|
page read and write
|
||
BCA000
|
unkown
|
page execute and write copy
|
||
288A000
|
trusted library allocation
|
page read and write
|
||
1490000
|
direct allocation
|
page read and write
|
||
CF7000
|
trusted library allocation
|
page execute and read and write
|
||
4C11000
|
heap
|
page read and write
|
||
157E000
|
heap
|
page read and write
|
||
29B6000
|
trusted library allocation
|
page read and write
|
||
27AB9211000
|
trusted library allocation
|
page read and write
|
||
4ACF000
|
stack
|
page read and write
|
||
400000
|
remote allocation
|
page execute and read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
340000
|
unkown
|
page readonly
|
||
28BE000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
B70000
|
trusted library allocation
|
page execute and read and write
|
||
3851000
|
trusted library allocation
|
page read and write
|
||
E44000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
2818000
|
trusted library allocation
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
1B290000
|
heap
|
page read and write
|
||
25E536C0000
|
trusted library allocation
|
page read and write
|
||
223F0F30000
|
heap
|
page read and write
|
||
64C0000
|
heap
|
page read and write
|
||
800000
|
heap
|
page read and write
|
||
1A324580000
|
heap
|
page read and write
|
||
C15000
|
heap
|
page read and write
|
||
F78000
|
stack
|
page read and write
|
||
1050000
|
heap
|
page read and write
|
||
1A324921000
|
heap
|
page read and write
|
||
1A32492B000
|
heap
|
page read and write
|
||
1470000
|
direct allocation
|
page read and write
|
||
5250000
|
direct allocation
|
page execute and read and write
|
||
50F0000
|
direct allocation
|
page read and write
|
||
41C000
|
unkown
|
page readonly
|
||
1470000
|
direct allocation
|
page read and write
|
||
12A4000
|
heap
|
page read and write
|
||
169F000
|
stack
|
page read and write
|
||
1A30BED0000
|
heap
|
page readonly
|
||
2752000
|
trusted library allocation
|
page read and write
|
||
2EC7000
|
heap
|
page read and write
|
||
2983000
|
trusted library allocation
|
page read and write
|
||
155E000
|
heap
|
page read and write
|
||
7FFD34362000
|
trusted library allocation
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
1F2000
|
unkown
|
page write copy
|
||
4AD0000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
AC8000
|
unkown
|
page write copy
|
||
320E000
|
stack
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
698F000
|
stack
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
4C0F000
|
stack
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
1F4000
|
unkown
|
page write copy
|
||
5210000
|
direct allocation
|
page execute and read and write
|
||
B0B000
|
trusted library allocation
|
page execute and read and write
|
||
425000
|
unkown
|
page write copy
|
||
339F000
|
stack
|
page read and write
|
||
1F5000
|
unkown
|
page read and write
|
||
A16000
|
heap
|
page read and write
|
||
28D7000
|
trusted library allocation
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
1A3246B1000
|
heap
|
page read and write
|
||
1AFB0000
|
heap
|
page read and write
|
||
2686000
|
trusted library allocation
|
page read and write
|
||
12FE000
|
heap
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
C9A1AFD000
|
stack
|
page read and write
|
||
27AB000
|
trusted library allocation
|
page read and write
|
||
DFB000
|
stack
|
page read and write
|
||
F84000
|
heap
|
page read and write
|
||
5260000
|
direct allocation
|
page execute and read and write
|
||
27AB7890000
|
trusted library allocation
|
page read and write
|
||
1A30A620000
|
trusted library allocation
|
page read and write
|
||
B83000
|
unkown
|
page execute and read and write
|
||
4C11000
|
heap
|
page read and write
|
||
1320000
|
direct allocation
|
page execute and read and write
|
||
157D000
|
heap
|
page read and write
|
||
BC0BB8000
|
stack
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
284E000
|
stack
|
page read and write
|
||
223F2E99000
|
heap
|
page read and write
|
||
1CC7E000
|
stack
|
page read and write
|
||
1A32489F000
|
heap
|
page read and write
|
||
2778000
|
trusted library allocation
|
page read and write
|
||
D60000
|
unkown
|
page execute and read and write
|
||
6FB28FE000
|
stack
|
page read and write
|
||
292D000
|
trusted library allocation
|
page read and write
|
||
2D40000
|
unkown
|
page readonly
|
||
223F2E9A000
|
heap
|
page read and write
|
||
25E535F0000
|
trusted library allocation
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
7FFD3436D000
|
trusted library allocation
|
page execute and read and write
|
||
E44000
|
heap
|
page read and write
|
||
25500026000
|
trusted library allocation
|
page read and write
|
||
544C000
|
stack
|
page read and write
|
||
4D90000
|
direct allocation
|
page execute and read and write
|
||
223F0F10000
|
heap
|
page read and write
|
||
4A61000
|
heap
|
page read and write
|
||
7A7000
|
heap
|
page read and write
|
||
7FFD3451A000
|
trusted library allocation
|
page read and write
|
||
4C11000
|
heap
|
page read and write
|
||
4A8F000
|
stack
|
page read and write
|
||
14E4000
|
heap
|
page read and write
|
||
50CE000
|
stack
|
page read and write
|
||
25E535F0000
|
trusted library allocation
|
page read and write
|
||
2AFF000
|
stack
|
page read and write
|
||
5280000
|
direct allocation
|
page execute and read and write
|
||
3A20000
|
remote allocation
|
page read and write
|
||
9D3000
|
trusted library allocation
|
page execute and read and write
|
||
4D90000
|
direct allocation
|
page execute and read and write
|
||
25E53913000
|
heap
|
page read and write
|
||
29A5000
|
trusted library allocation
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
47B1000
|
heap
|
page read and write
|
||
4F50000
|
heap
|
page execute and read and write
|
||
2B0C000
|
trusted library allocation
|
page read and write
|
||
1AFCE000
|
heap
|
page read and write
|
||
135F000
|
heap
|
page read and write
|
||
DC0000
|
heap
|
page read and write
|
||
2998000
|
trusted library allocation
|
page read and write
|
||
3E4F000
|
stack
|
page read and write
|
There are 1292 hidden memdumps, click here to show them.