Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
nsis-installer.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\SerenityTherapyInstaller.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\D3DSCache\5b4e827ea0c96efd\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\D3DSCache\5b4e827ea0c96efd\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock
|
ASCII text, with no line terminators
|
modified
|
||
C:\Users\user\AppData\Local\D3DSCache\5b4e827ea0c96efd\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val
|
Matlab v4 mat-file (little endian) (, numeric, rows 0, columns 16, imaginary
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\LICENSE.electron.txt
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\LICENSES.chromium.html
|
HTML document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\chrome_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\chrome_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\d3dcompiler_47.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\ffmpeg.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\icudtl.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\locales\af.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\locales\am.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\locales\ar.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\locales\bg.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\locales\bn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\locales\ca.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\snapshot_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\v8_context_snapshot.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\vk_swiftshader.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\vk_swiftshader_icd.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\vulkan-1.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\496db3a3-1a7f-4f1b-9fcf-efdaeed463f0.tmp.node
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\8643e452-b938-4f7e-b6f6-6c79c3287391.tmp.node
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3dincutv.eem.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ofq3lde.4wp.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4qs4bf1f.sjc.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4t5nvsem.qun.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_brskhiv3.m0b.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cc21cv3h.uf5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_drghpzag.zal.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dvdjxw0x.ou2.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hxhqdpqg.1c5.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iz5dm4ax.15d.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kkrpzhpl.i5k.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ljcdovsy.igu.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n1i5acdv.0m3.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nsmbg5ro.bxw.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_orsy05su.rrt.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r2lcpk1r.fll.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rf2mqf4h.lgx.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sbupstr1.qth.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vjlpmqyv.1re.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vresv4fo.4ql.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\a5cccf86-07fd-48a4-a9cf-7cd44af85556.tmp.node
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e10a37c2-8429-4258-9cd3-d725395e8215.tmp.node
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\LICENSE.electron.txt
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\LICENSES.chromium.html
|
HTML document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\SerenityTherapyInstaller.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\chrome_100_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\chrome_200_percent.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\d3dcompiler_47.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\ffmpeg.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\icudtl.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\libEGL.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\libGLESv2.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\af.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\am.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\ar.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\bg.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\bn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\ca.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\cs.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\da.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\de.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\el.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\en-GB.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\en-US.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\es-419.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\es.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\et.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\fa.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\fi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\fil.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\fr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\gu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\he.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\hi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\hr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\hu.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\id.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\it.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\ja.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\kn.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\ko.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\lt.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\lv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\ml.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\mr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\ms.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\nb.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\nl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\pl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\pt-BR.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\pt-PT.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\ro.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\ru.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\sk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\sl.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\sr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\sv.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\sw.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\ta.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\te.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\th.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\tr.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\uk.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\ur.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\vi.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\zh-CN.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\locales\zh-TW.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\resources.pak
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\resources\app.asar
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\resources\elevate.exe
|
PE32 executable (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\snapshot_blob.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\v8_context_snapshot.bin
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\vk_swiftshader.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\vk_swiftshader_icd.json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\7z-out\vulkan-1.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\SpiderBanner.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\StdUtils.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\app-32.7z
|
7-zip archive data, version 0.4
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\nsExec.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nss10B5.tmp\nsis7z.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\SerenityTherapyInstaller\1508d4cb-6eb4-4c1c-911b-6a8c7e0b4058.tmp
|
JSON data
|
modified
|
||
C:\Users\user\AppData\Roaming\SerenityTherapyInstaller\Local State (copy)
|
JSON data
|
dropped
|
There are 122 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\nsis-installer.exe
|
"C:\Users\user\Desktop\nsis-installer.exe"
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\SerenityTherapyInstaller.exe
|
"C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\SerenityTherapyInstaller.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\SerenityTherapyInstaller.exe
|
"C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\SerenityTherapyInstaller.exe" --type=gpu-process --user-data-dir="C:\Users\user\AppData\Roaming\SerenityTherapyInstaller"
--gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA=
--mojo-platform-channel-handle=1972 --field-trial-handle=1976,i,9719428906805688631,3168165960160999559,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand
/prefetch:2
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\SerenityTherapyInstaller.exe
|
"C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\SerenityTherapyInstaller.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --user-data-dir="C:\Users\user\AppData\Roaming\SerenityTherapyInstaller" --mojo-platform-channel-handle=2144
--field-trial-handle=1976,i,9719428906805688631,3168165960160999559,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand
/prefetch:8
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\SerenityTherapyInstaller.exe
|
"C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\SerenityTherapyInstaller.exe"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
powershell.exe -NoProfile -NoLogo -InputFormat Text -NoExit -ExecutionPolicy Unrestricted -Command -
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\SerenityTherapyInstaller.exe
|
"C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\SerenityTherapyInstaller.exe" --type=gpu-process --user-data-dir="C:\Users\user\AppData\Roaming\SerenityTherapyInstaller"
--gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA=
--mojo-platform-channel-handle=1912 --field-trial-handle=1916,i,2428637527847521265,8401632774138072131,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand
/prefetch:2
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\SerenityTherapyInstaller.exe
|
"C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\SerenityTherapyInstaller.exe" --type=utility --utility-sub-type=network.mojom.NetworkService
--lang=en-GB --service-sandbox-type=none --user-data-dir="C:\Users\user\AppData\Roaming\SerenityTherapyInstaller" --mojo-platform-channel-handle=1808
--field-trial-handle=1916,i,2428637527847521265,8401632774138072131,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand
/prefetch:8
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\SerenityTherapyInstaller.exe
|
"C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\SerenityTherapyInstaller.exe" --type=gpu-process --disable-gpu-sandbox
--use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546
--user-data-dir="C:\Users\user\AppData\Roaming\SerenityTherapyInstaller" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA=
--mojo-platform-channel-handle=1908 --field-trial-handle=1976,i,9719428906805688631,3168165960160999559,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand
/prefetch:2
|
||
C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\SerenityTherapyInstaller.exe
|
"C:\Users\user\AppData\Local\Programs\SerenityTherapyInstaller\SerenityTherapyInstaller.exe" --type=gpu-process --disable-gpu-sandbox
--use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546
--user-data-dir="C:\Users\user\AppData\Roaming\SerenityTherapyInstaller" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAABgAAAAAAAAAGAAAAAAAAAAIAAAAAAAAAAgAAAAAAAAACAAAAAAAAAA=
--mojo-platform-channel-handle=944 --field-trial-handle=1916,i,2428637527847521265,8401632774138072131,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand
/prefetch:2
|
||
C:\Windows\SysWOW64\cmd.exe
|
cmd /c tasklist /FI "USERNAME eq %USERNAME%" /FI "IMAGENAME eq SerenityTherapyInstaller.exe" /FO csv | %SYSTEMROOT%\System32\find.exe
"SerenityTherapyInstaller.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist /FI "USERNAME eq user" /FI "IMAGENAME eq SerenityTherapyInstaller.exe" /FO csv
|
||
C:\Windows\SysWOW64\find.exe
|
C:\Windows\System32\find.exe "SerenityTherapyInstaller.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /d /s /c "chcp"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\chcp.com
|
chcp
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /d /s /c "chcp"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\chcp.com
|
chcp
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\tasklist.exe
|
tasklist
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /d /s /c "echo %COMPUTERNAME%.%USERDNSDOMAIN%"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\cmd.exe
|
C:\Windows\system32\cmd.exe /d /s /c "findstr /C:"Detected boot environment" "%windir%\Panther\setupact.log""
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\findstr.exe
|
findstr /C:"Detected boot environment" "C:\Windows\Panther\setupact.log"
|
There are 37 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://sqlite.org/forum/forumpost/eb8613976a
|
unknown
|
||
https://url.spec.whatwg.org/#concept-url-origin
|
unknown
|
||
https://tools.ietf.org/html/rfc6455#section-1.3
|
unknown
|
||
https://www.ecma-international.org/ecma-262/8.0/#sec-atomescape
|
unknown
|
||
https://github.com/sebhildebrandt/systeminformation.git
|
unknown
|
||
https://support.google.com/chrome/answer/6098869
|
unknown
|
||
http://anglebug.com/4633
|
unknown
|
||
https://anglebug.com/7382
|
unknown
|
||
https://www.ecma-international.org/ecma-262/8.0/#prod-Atom
|
unknown
|
||
https://github.com/nodejs/node/pull/35941
|
unknown
|
||
https://www.chromestatus.com/feature/5093566007214080
|
unknown
|
||
https://console.spec.whatwg.org/#table
|
unknown
|
||
https://github.com/nodejs/string_decoder
|
unknown
|
||
https://docs.google.com/
|
unknown
|
||
https://crbug.com/1356053
|
unknown
|
||
https://elinux.org/RPI_vcgencmd_usage
|
unknown
|
||
https://encoding.spec.whatwg.org/#textencoder
|
unknown
|
||
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3C//DTD
|
unknown
|
||
https://github.com/tc39/proposal-weakrefs
|
unknown
|
||
https://goo.gl/t5IS6M).
|
unknown
|
||
http://crbug.com/110263
|
unknown
|
||
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-Assertion
|
unknown
|
||
https://github.com/google/caja/blob/HEAD/src/com/google/caja/ses/repairES5.js
|
unknown
|
||
https://tc39.github.io/ecma262/#sec-%iteratorprototype%-object
|
unknown
|
||
https://url.spec.whatwg.org/#concept-urlencoded-serializer
|
unknown
|
||
https://www.chromium.org/blink/origin-trials/portals.
|
unknown
|
||
http://anglebug.com/6929
|
unknown
|
||
https://semver.org/
|
unknown
|
||
https://wiki.squid-cache.org/SquidFaq/InnerWorkings#What_is_a_half-closed_filedescriptor.3F
|
unknown
|
||
https://nodejs.org/api/fs.html
|
unknown
|
||
https://chromium.googlesource.com/chromium/src/
|
unknown
|
||
https://github.com/nodejs/node/pull/21313
|
unknown
|
||
https://www.chromium.org/blink/origin-trials/portals.The
|
unknown
|
||
https://anglebug.com/7246
|
unknown
|
||
https://anglebug.com/7369
|
unknown
|
||
https://anglebug.com/7489
|
unknown
|
||
https://bit.ly/3rpDuEX.
|
unknown
|
||
https://crbug.com/593024
|
unknown
|
||
https://www.ecma-international.org/ecma-262/8.0/#prod-NonemptyClassRanges
|
unknown
|
||
https://w3c.github.io/manifest/#installability-signals
|
unknown
|
||
http://www.midnight-commander.org/browser/lib/tty/key.c
|
unknown
|
||
https://nodejs.org/
|
unknown
|
||
https://tools.ietf.org/html/rfc7540#section-8.1.2.5
|
unknown
|
||
http://exslt.org/common
|
unknown
|
||
https://github.com/tensorflow/models
|
unknown
|
||
https://www.ecma-international.org/ecma-262/8.0/#prod-Hex4Digits
|
unknown
|
||
http://www.squid-cache.org/Doc/config/half_closed_clients/
|
unknown
|
||
https://www.ecma-international.org/ecma-262/8.0/#prod-DecimalEscape
|
unknown
|
||
https://c.docs.google.com/
|
unknown
|
||
https://github.com/KhronosGroup/SPIRV-Headers.git
|
unknown
|
||
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-ClassControlLetter
|
unknown
|
||
https://www.sqlite.org/src/info/908f001483982c43
|
unknown
|
||
https://tc39.es/ecma262/#sec-timeclip
|
unknown
|
||
https://issuetracker.google.com/161903006
|
unknown
|
||
http://127.0.0.1
|
unknown
|
||
https://crbug.com/1300575
|
unknown
|
||
https://github.com/nodejs/node/pull/33661
|
unknown
|
||
http://www.nongnu.org/freebangfont/downloads.html#mukti
|
unknown
|
||
https://crbug.com/710443
|
unknown
|
||
http://narwhaljs.org)
|
unknown
|
||
http://istanbul-js.org/
|
unknown
|
||
https://github.com/tensorflow/tflite-support
|
unknown
|
||
https://github.com/WICG/scheduling-apis
|
unknown
|
||
https://sqlite.org/
|
unknown
|
||
https://crbug.com/1060012
|
unknown
|
||
http://localhosthttp://127.0.0.1object-src
|
unknown
|
||
https://code.google.com/p/chromium/issues/detail?id=25916
|
unknown
|
||
http://anglebug.com/3997
|
unknown
|
||
http://anglebug.com/4722
|
unknown
|
||
http://crbug.com/642605
|
unknown
|
||
https://fetch.spec.whatwg.org/#fetch-timing-info
|
unknown
|
||
http://anglebug.com/1452
|
unknown
|
||
https://webassembly.github.io/spec/web-api
|
unknown
|
||
https://github.com/electron/electron/issues/18397.Module
|
unknown
|
||
https://github.com/nodejs/node/pull/12607
|
unknown
|
||
https://www.ecma-international.org/ecma-262/#sec-line-terminators
|
unknown
|
||
http://www.sqlite.org/
|
unknown
|
||
https://www.unicode.org/Public/UNIDATA/EastAsianWidth.txt
|
unknown
|
||
https://crbug.com/650547callClearTwiceUsing
|
unknown
|
||
https://github.com/npm/node-tar/issues/183
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
http://anglebug.com/3502
|
unknown
|
||
http://anglebug.com/3623
|
unknown
|
||
https://gitlab.freedesktop.org/xdg/xdgmime
|
unknown
|
||
http://anglebug.com/3625
|
unknown
|
||
http://anglebug.com/3624
|
unknown
|
||
http://www.unicode.org/copyright.html
|
unknown
|
||
https://beacons.gcp.gvt2.com/domainreliability/upload
|
unknown
|
||
http://anglebug.com/2894
|
unknown
|
||
http://anglebug.com/3862
|
unknown
|
||
http://anglebug.com/4836
|
unknown
|
||
https://issuetracker.google.com/issues/166475273
|
unknown
|
||
https://developer.chrome.com/docs/extensions/mv3/cross-origin-isolation/.
|
unknown
|
||
https://github.com/WICG/construct-stylesheets/issues/119#issuecomment-588352418.
|
unknown
|
||
https://www.ecma-international.org/ecma-262/8.0/#prod-annexB-ExtendedAtom
|
unknown
|
||
https://github.com/w3c/webappsec-trusted-types/wiki/Trusted-Types-for-function-constructor
|
unknown
|
||
https://heycam.github.io/webidl/#es-iterable-entries
|
unknown
|
||
https://github.com/wasdk/wasmparser
|
unknown
|
||
https://heycam.github.io/webidl/#es-interfaces
|
unknown
|
||
https://sqlite.org/forum/forumpost/36937b197273d403
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
chrome.cloudflare-dns.com
|
172.64.41.3
|
||
ipinfo.io
|
34.117.186.192
|
||
illitmagnetic.site
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
34.117.186.192
|
ipinfo.io
|
United States
|
||
162.159.61.3
|
unknown
|
United States
|
||
172.64.41.3
|
chrome.cloudflare-dns.com
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\cfbc383d-9aa0-5771-9485-7b806e8442d5
|
InstallLocation
|
||
HKEY_CURRENT_USER\SOFTWARE\cfbc383d-9aa0-5771-9485-7b806e8442d5
|
KeepShortcuts
|
||
HKEY_CURRENT_USER\SOFTWARE\cfbc383d-9aa0-5771-9485-7b806e8442d5
|
ShortcutName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cfbc383d-9aa0-5771-9485-7b806e8442d5
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cfbc383d-9aa0-5771-9485-7b806e8442d5
|
UninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cfbc383d-9aa0-5771-9485-7b806e8442d5
|
QuietUninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cfbc383d-9aa0-5771-9485-7b806e8442d5
|
DisplayVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cfbc383d-9aa0-5771-9485-7b806e8442d5
|
DisplayIcon
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cfbc383d-9aa0-5771-9485-7b806e8442d5
|
Publisher
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cfbc383d-9aa0-5771-9485-7b806e8442d5
|
NoModify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cfbc383d-9aa0-5771-9485-7b806e8442d5
|
NoRepair
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\cfbc383d-9aa0-5771-9485-7b806e8442d5
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
|
GlobalAssocChangedCounter
|
There are 3 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
7B2F000
|
heap
|
page read and write
|
||
6399000
|
trusted library allocation
|
page read and write
|
||
745D000
|
stack
|
page read and write
|
||
35CF000
|
stack
|
page read and write
|
||
23E5000
|
heap
|
page read and write
|
||
7AB0000
|
heap
|
page read and write
|
||
4DA0000
|
trusted library allocation
|
page execute and read and write
|
||
5300000
|
trusted library allocation
|
page read and write
|
||
8C3000
|
heap
|
page read and write
|
||
358E000
|
stack
|
page read and write
|
||
7D0F000
|
stack
|
page read and write
|
||
3547000
|
heap
|
page read and write
|
||
8F5000
|
heap
|
page read and write
|
||
792E000
|
stack
|
page read and write
|
||
8A8B000
|
unkown
|
page execute read
|
||
7AF4000
|
heap
|
page read and write
|
||
30B7000
|
heap
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
7F428000
|
trusted library allocation
|
page execute and read and write
|
||
72ED000
|
stack
|
page read and write
|
||
307D000
|
stack
|
page read and write
|
||
33D4000
|
trusted library allocation
|
page read and write
|
||
7B09000
|
heap
|
page read and write
|
||
7DF0000
|
trusted library allocation
|
page read and write
|
||
2F31000
|
unkown
|
page execute read
|
||
4E41000
|
heap
|
page read and write
|
||
7A57000
|
heap
|
page read and write
|
||
30BD000
|
heap
|
page read and write
|
||
50FF000
|
heap
|
page read and write
|
||
79AE000
|
unkown
|
page readonly
|
||
5741000
|
heap
|
page read and write
|
||
5681000
|
heap
|
page read and write
|
||
34E0000
|
trusted library allocation
|
page read and write
|
||
79C7000
|
unkown
|
page readonly
|
||
263D000
|
stack
|
page read and write
|
||
5500000
|
heap
|
page read and write
|
||
7AE7000
|
heap
|
page read and write
|
||
7D60000
|
trusted library allocation
|
page read and write
|
||
8A8E000
|
unkown
|
page execute read
|
||
323B000
|
stack
|
page read and write
|
||
6810000
|
direct allocation
|
page read and write
|
||
2F31000
|
unkown
|
page execute read
|
||
8A01000
|
heap
|
page read and write
|
||
731000
|
unkown
|
page execute read
|
||
74BD000
|
stack
|
page read and write
|
||
3457000
|
heap
|
page read and write
|
||
53C0000
|
heap
|
page read and write
|
||
76B0000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
782C000
|
unkown
|
page readonly
|
||
4EC0000
|
direct allocation
|
page read and write
|
||
5F10000
|
heap
|
page read and write
|
||
54D0000
|
trusted library allocation
|
page read and write
|
||
7CC0000
|
trusted library allocation
|
page read and write
|
||
2C40000
|
heap
|
page read and write
|
||
3495000
|
trusted library allocation
|
page execute and read and write
|
||
5500000
|
heap
|
page read and write
|
||
2DE4000
|
heap
|
page read and write
|
||
36D8000
|
trusted library allocation
|
page read and write
|
||
5562000
|
heap
|
page read and write
|
||
7A70000
|
trusted library allocation
|
page read and write
|
||
88AE000
|
stack
|
page read and write
|
||
3280000
|
heap
|
page read and write
|
||
903000
|
heap
|
page read and write
|
||
29FB000
|
heap
|
page read and write
|
||
79AB000
|
unkown
|
page readonly
|
||
5554000
|
heap
|
page read and write
|
||
86C1000
|
unkown
|
page write copy
|
||
400000
|
unkown
|
page readonly
|
||
281E000
|
stack
|
page read and write
|
||
8A8B000
|
unkown
|
page execute read
|
||
33C0000
|
trusted library allocation
|
page read and write
|
||
8B38000
|
heap
|
page read and write
|
||
5582000
|
heap
|
page read and write
|
||
4D00000
|
heap
|
page read and write
|
||
2A48000
|
heap
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
6399000
|
trusted library allocation
|
page read and write
|
||
2C10000
|
heap
|
page read and write
|
||
3450000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
5F51000
|
heap
|
page read and write
|
||
2A47000
|
heap
|
page read and write
|
||
89AD000
|
stack
|
page read and write
|
||
3664000
|
trusted library allocation
|
page read and write
|
||
3470000
|
heap
|
page read and write
|
||
7415000
|
heap
|
page execute and read and write
|
||
2DC8000
|
heap
|
page read and write
|
||
755D000
|
stack
|
page read and write
|
||
8E6E000
|
stack
|
page read and write
|
||
5541000
|
heap
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
3790000
|
heap
|
page read and write
|
||
8AB0000
|
heap
|
page read and write
|
||
8ACC000
|
heap
|
page read and write
|
||
6112000
|
heap
|
page read and write
|
||
23C0000
|
direct allocation
|
page read and write
|
||
3090000
|
heap
|
page read and write
|
||
2531000
|
unkown
|
page execute read
|
||
32CC000
|
heap
|
page read and write
|
||
94E000
|
heap
|
page read and write
|
||
7AE2000
|
heap
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
7E00000
|
trusted library allocation
|
page read and write
|
||
7D8D000
|
stack
|
page read and write
|
||
969000
|
heap
|
page read and write
|
||
3000000
|
heap
|
page read and write
|
||
51CE000
|
stack
|
page read and write
|
||
1131000
|
unkown
|
page execute read
|
||
362F000
|
stack
|
page read and write
|
||
5160000
|
trusted library allocation
|
page read and write
|
||
8B14000
|
heap
|
page read and write
|
||
2A41000
|
heap
|
page read and write
|
||
7C20000
|
trusted library allocation
|
page read and write
|
||
3490000
|
trusted library allocation
|
page read and write
|
||
78DD000
|
stack
|
page read and write
|
||
8A8E000
|
unkown
|
page execute read
|
||
3590000
|
heap
|
page read and write
|
||
323D000
|
stack
|
page read and write
|
||
946000
|
heap
|
page read and write
|
||
79E0000
|
unkown
|
page readonly
|
||
7B5F000
|
heap
|
page read and write
|
||
5702000
|
heap
|
page read and write
|
||
79E0000
|
unkown
|
page readonly
|
||
4331000
|
unkown
|
page execute read
|
||
3260000
|
heap
|
page read and write
|
||
7205000
|
unkown
|
page readonly
|
||
2DBB000
|
heap
|
page read and write
|
||
7E20000
|
heap
|
page read and write
|
||
416000
|
unkown
|
page read and write
|
||
31DC000
|
heap
|
page read and write
|
||
2A3F000
|
heap
|
page read and write
|
||
7A0D000
|
heap
|
page read and write
|
||
553000
|
unkown
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
33D3000
|
trusted library allocation
|
page execute and read and write
|
||
336F000
|
stack
|
page read and write
|
||
5742000
|
heap
|
page read and write
|
||
6091000
|
heap
|
page read and write
|
||
742E000
|
stack
|
page read and write
|
||
2210000
|
heap
|
page read and write
|
||
7841000
|
unkown
|
page readonly
|
||
2334000
|
heap
|
page read and write
|
||
2BCD000
|
stack
|
page read and write
|
||
786F000
|
stack
|
page read and write
|
||
3627000
|
heap
|
page read and write
|
||
7C60000
|
trusted library allocation
|
page read and write
|
||
4FF000
|
unkown
|
page read and write
|
||
2DB5000
|
heap
|
page read and write
|
||
784C000
|
unkown
|
page readonly
|
||
766E000
|
stack
|
page read and write
|
||
4CFF000
|
stack
|
page read and write
|
||
3650000
|
trusted library allocation
|
page read and write
|
||
535E000
|
stack
|
page read and write
|
||
5641000
|
heap
|
page read and write
|
||
7640000
|
heap
|
page read and write
|
||
5671000
|
trusted library allocation
|
page read and write
|
||
7DE0000
|
trusted library allocation
|
page read and write
|
||
8C70000
|
trusted library allocation
|
page read and write
|
||
2AFE000
|
stack
|
page read and write
|
||
5580000
|
heap
|
page read and write
|
||
8BF000
|
heap
|
page read and write
|
||
2CCD000
|
stack
|
page read and write
|
||
7E30000
|
trusted library allocation
|
page read and write
|
||
7D52000
|
trusted library allocation
|
page read and write
|
||
5AC6000
|
trusted library allocation
|
page read and write
|
||
7B27000
|
heap
|
page read and write
|
||
7E80000
|
trusted library allocation
|
page read and write
|
||
50CC000
|
heap
|
page read and write
|
||
27DE000
|
unkown
|
page read and write
|
||
50C2000
|
heap
|
page read and write
|
||
3790000
|
heap
|
page read and write
|
||
5320000
|
direct allocation
|
page read and write
|
||
8DD000
|
heap
|
page read and write
|
||
511E000
|
stack
|
page read and write
|
||
4EFE000
|
direct allocation
|
page read and write
|
||
7AE9000
|
heap
|
page read and write
|
||
7B4E000
|
stack
|
page read and write
|
||
2820000
|
heap
|
page read and write
|
||
74D0000
|
heap
|
page execute and read and write
|
||
2F6D000
|
stack
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
2FF0000
|
heap
|
page read and write
|
||
878000
|
heap
|
page read and write
|
||
5AC0000
|
direct allocation
|
page read and write
|
||
50C0000
|
trusted library allocation
|
page execute and read and write
|
||
8B24000
|
heap
|
page read and write
|
||
890A000
|
trusted library allocation
|
page read and write
|
||
71F4000
|
unkown
|
page readonly
|
||
50BF000
|
stack
|
page read and write
|
||
96E000
|
heap
|
page read and write
|
||
7A74000
|
heap
|
page read and write
|
||
86C1000
|
unkown
|
page write copy
|
||
56C2000
|
heap
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
4CC0000
|
heap
|
page read and write
|
||
2DA4000
|
heap
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
5F50000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
8BB2000
|
trusted library allocation
|
page read and write
|
||
53CD000
|
trusted library allocation
|
page read and write
|
||
969000
|
heap
|
page read and write
|
||
7E50000
|
trusted library allocation
|
page read and write
|
||
63BC000
|
trusted library allocation
|
page read and write
|
||
2F31000
|
unkown
|
page execute read
|
||
4E00000
|
heap
|
page read and write
|
||
6011000
|
heap
|
page read and write
|
||
7CA0000
|
trusted library allocation
|
page execute and read and write
|
||
76C0000
|
heap
|
page read and write
|
||
3419000
|
heap
|
page read and write
|
||
88A0000
|
trusted library allocation
|
page read and write
|
||
7290000
|
direct allocation
|
page read and write
|
||
3450000
|
trusted library allocation
|
page read and write
|
||
5555000
|
heap
|
page read and write
|
||
7B92000
|
heap
|
page read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
7CA0000
|
trusted library allocation
|
page read and write
|
||
305D000
|
stack
|
page read and write
|
||
5371000
|
trusted library allocation
|
page read and write
|
||
2DF0000
|
heap
|
page read and write
|
||
762E000
|
stack
|
page read and write
|
||
5ED1000
|
heap
|
page read and write
|
||
2D1F000
|
stack
|
page read and write
|
||
226C000
|
stack
|
page read and write
|
||
7C80000
|
heap
|
page execute and read and write
|
||
76D9000
|
heap
|
page read and write
|
||
74D5000
|
heap
|
page execute and read and write
|
||
3463000
|
trusted library allocation
|
page execute and read and write
|
||
8960000
|
trusted library allocation
|
page execute and read and write
|
||
2A45000
|
heap
|
page read and write
|
||
3180000
|
heap
|
page read and write
|
||
784C000
|
unkown
|
page readonly
|
||
7861000
|
unkown
|
page readonly
|
||
7A77000
|
trusted library allocation
|
page read and write
|
||
2D9F000
|
stack
|
page read and write
|
||
5270000
|
heap
|
page read and write
|
||
2B3F000
|
stack
|
page read and write
|
||
96E000
|
heap
|
page read and write
|
||
75AB000
|
stack
|
page read and write
|
||
7570000
|
heap
|
page read and write
|
||
777E000
|
stack
|
page read and write
|
||
7410000
|
heap
|
page execute and read and write
|
||
31FC000
|
heap
|
page read and write
|
||
7970000
|
heap
|
page read and write
|
||
29FB000
|
heap
|
page read and write
|
||
3390000
|
heap
|
page read and write
|
||
88F0000
|
heap
|
page read and write
|
||
292F000
|
stack
|
page read and write
|
||
7A01000
|
heap
|
page read and write
|
||
3464000
|
trusted library allocation
|
page read and write
|
||
6199000
|
trusted library allocation
|
page read and write
|
||
3695000
|
trusted library allocation
|
page execute and read and write
|
||
7188000
|
trusted library allocation
|
page read and write
|
||
7EF60000
|
trusted library allocation
|
page execute and read and write
|
||
4D31000
|
unkown
|
page execute read
|
||
5F51000
|
heap
|
page read and write
|
||
3509000
|
heap
|
page read and write
|
||
36AF000
|
stack
|
page read and write
|
||
4D40000
|
heap
|
page read and write
|
||
2D4D000
|
stack
|
page read and write
|
||
2FE0000
|
heap
|
page read and write
|
||
6110000
|
heap
|
page read and write
|
||
7C50000
|
trusted library allocation
|
page read and write
|
||
7DC0000
|
trusted library allocation
|
page read and write
|
||
27E0000
|
heap
|
page read and write
|
||
2DB2000
|
heap
|
page read and write
|
||
746E000
|
stack
|
page read and write
|
||
4B80000
|
direct allocation
|
page read and write
|
||
31AF000
|
unkown
|
page read and write
|
||
86C0000
|
trusted library allocation
|
page read and write
|
||
7AF0000
|
heap
|
page read and write
|
||
751E000
|
stack
|
page read and write
|
||
4950000
|
heap
|
page read and write
|
||
79B2000
|
unkown
|
page readonly
|
||
4A1E000
|
stack
|
page read and write
|
||
5381000
|
trusted library allocation
|
page read and write
|
||
88EE000
|
stack
|
page read and write
|
||
79FE000
|
heap
|
page read and write
|
||
8E50000
|
trusted library allocation
|
page execute and read and write
|
||
2D0E000
|
stack
|
page read and write
|
||
2DAA000
|
heap
|
page read and write
|
||
76AA000
|
stack
|
page read and write
|
||
7CE0000
|
trusted library allocation
|
page read and write
|
||
8EF000
|
heap
|
page read and write
|
||
340F000
|
heap
|
page read and write
|
||
2DC5000
|
heap
|
page read and write
|
||
5701000
|
heap
|
page read and write
|
||
8A00000
|
trusted library allocation
|
page read and write
|
||
77EE000
|
stack
|
page read and write
|
||
3500000
|
trusted library allocation
|
page read and write
|
||
2D5E000
|
stack
|
page read and write
|
||
8690000
|
trusted library allocation
|
page read and write
|
||
6B31000
|
unkown
|
page execute read
|
||
4D08000
|
trusted library allocation
|
page read and write
|
||
79AB000
|
unkown
|
page readonly
|
||
7C30000
|
trusted library allocation
|
page read and write
|
||
7BD0000
|
heap
|
page read and write
|
||
61A9000
|
trusted library allocation
|
page read and write
|
||
8A3000
|
heap
|
page read and write
|
||
8960000
|
trusted library allocation
|
page read and write
|
||
870000
|
heap
|
page read and write
|
||
32E4000
|
heap
|
page read and write
|
||
2BCF000
|
stack
|
page read and write
|
||
7A3F000
|
heap
|
page read and write
|
||
890D000
|
stack
|
page read and write
|
||
796E000
|
stack
|
page read and write
|
||
2DCB000
|
heap
|
page read and write
|
||
77AE000
|
stack
|
page read and write
|
||
88F6000
|
trusted library allocation
|
page read and write
|
||
7205000
|
unkown
|
page readonly
|
||
8850000
|
heap
|
page read and write
|
||
6092000
|
heap
|
page read and write
|
||
4FB000
|
unkown
|
page read and write
|
||
34B0000
|
trusted library allocation
|
page read and write
|
||
95E000
|
heap
|
page read and write
|
||
8930000
|
trusted library allocation
|
page read and write
|
||
5639000
|
trusted library allocation
|
page read and write
|
||
5F50000
|
heap
|
page read and write
|
||
7B0E000
|
stack
|
page read and write
|
||
969000
|
heap
|
page read and write
|
||
89F0000
|
heap
|
page read and write
|
||
29E1000
|
heap
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
525E000
|
stack
|
page read and write
|
||
969000
|
heap
|
page read and write
|
||
3502000
|
trusted library allocation
|
page read and write
|
||
4E3000
|
unkown
|
page read and write
|
||
721D000
|
stack
|
page read and write
|
||
4A9E000
|
stack
|
page read and write
|
||
29FB000
|
heap
|
page read and write
|
||
3679000
|
trusted library allocation
|
page read and write
|
||
8A35000
|
heap
|
page read and write
|
||
73FD000
|
stack
|
page read and write
|
||
326C000
|
heap
|
page read and write
|
||
7A2E000
|
stack
|
page read and write
|
||
7AC9000
|
heap
|
page read and write
|
||
7C70000
|
trusted library allocation
|
page read and write
|
||
74EA000
|
stack
|
page read and write
|
||
33EE000
|
stack
|
page read and write
|
||
8A50000
|
trusted library allocation
|
page read and write
|
||
6371000
|
trusted library allocation
|
page read and write
|
||
785D000
|
stack
|
page read and write
|
||
8CD0000
|
trusted library allocation
|
page execute and read and write
|
||
730000
|
unkown
|
page readonly
|
||
7857000
|
unkown
|
page readonly
|
||
4CC8000
|
heap
|
page read and write
|
||
61D0000
|
heap
|
page read and write
|
||
315D000
|
stack
|
page read and write
|
||
7C4E000
|
stack
|
page read and write
|
||
8F2E000
|
stack
|
page read and write
|
||
3258000
|
heap
|
page read and write
|
||
7AD8000
|
heap
|
page read and write
|
||
2F7E000
|
unkown
|
page read and write
|
||
7AA9000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
63D5000
|
trusted library allocation
|
page read and write
|
||
2B90000
|
heap
|
page read and write
|
||
894D000
|
trusted library allocation
|
page read and write
|
||
782E000
|
stack
|
page read and write
|
||
5EC0000
|
trusted library allocation
|
page read and write
|
||
35BE000
|
stack
|
page read and write
|
||
7D70000
|
trusted library allocation
|
page read and write
|
||
88E4000
|
trusted library allocation
|
page read and write
|
||
8C1E000
|
stack
|
page read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
31B0000
|
heap
|
page read and write
|
||
6810000
|
direct allocation
|
page read and write
|
||
89B0000
|
heap
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
56C2000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
31D0000
|
heap
|
page read and write
|
||
48EE000
|
stack
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
3240000
|
heap
|
page read and write
|
||
5441000
|
heap
|
page read and write
|
||
1B31000
|
unkown
|
page execute read
|
||
63A9000
|
trusted library allocation
|
page read and write
|
||
3078000
|
stack
|
page read and write
|
||
52D0000
|
trusted library allocation
|
page read and write
|
||
4D80000
|
heap
|
page read and write
|
||
66D0000
|
direct allocation
|
page read and write
|
||
880D000
|
stack
|
page read and write
|
||
7AF7000
|
heap
|
page read and write
|
||
2531000
|
unkown
|
page execute read
|
||
4E40000
|
heap
|
page read and write
|
||
2EFD000
|
stack
|
page read and write
|
||
7CCE000
|
stack
|
page read and write
|
||
7CB0000
|
trusted library allocation
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
5703000
|
heap
|
page read and write
|
||
2B2F000
|
unkown
|
page read and write
|
||
30F0000
|
heap
|
page read and write
|
||
5566000
|
heap
|
page read and write
|
||
959000
|
heap
|
page read and write
|
||
7A1F000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1B31000
|
unkown
|
page execute read
|
||
79F1000
|
heap
|
page read and write
|
||
320C000
|
heap
|
page read and write
|
||
54C0000
|
trusted library allocation
|
page read and write
|
||
5ED0000
|
heap
|
page read and write
|
||
5601000
|
heap
|
page read and write
|
||
731000
|
unkown
|
page execute read
|
||
56C2000
|
heap
|
page read and write
|
||
7C80000
|
trusted library allocation
|
page read and write
|
||
59B000
|
unkown
|
page readonly
|
||
7C0F000
|
stack
|
page read and write
|
||
3380000
|
heap
|
page read and write
|
||
520E000
|
stack
|
page read and write
|
||
60D0000
|
heap
|
page read and write
|
||
75EE000
|
stack
|
page read and write
|
||
4930000
|
heap
|
page read and write
|
||
4CBE000
|
stack
|
page read and write
|
||
7837000
|
unkown
|
page readonly
|
||
7A91000
|
heap
|
page read and write
|
||
74DE000
|
stack
|
page read and write
|
||
762E000
|
stack
|
page read and write
|
||
33DD000
|
trusted library allocation
|
page execute and read and write
|
||
7DB0000
|
trusted library allocation
|
page read and write
|
||
3460000
|
trusted library allocation
|
page read and write
|
||
5580000
|
heap
|
page read and write
|
||
2885000
|
heap
|
page read and write
|
||
72AE000
|
stack
|
page read and write
|
||
7C10000
|
trusted library allocation
|
page read and write
|
||
56C2000
|
heap
|
page read and write
|
||
730000
|
unkown
|
page readonly
|
||
7E90000
|
trusted library allocation
|
page execute and read and write
|
||
506A000
|
direct allocation
|
page read and write
|
||
31C5000
|
heap
|
page read and write
|
||
3492000
|
trusted library allocation
|
page read and write
|
||
79BB000
|
heap
|
page read and write
|
||
2E9D000
|
stack
|
page read and write
|
||
53DD000
|
trusted library allocation
|
page read and write
|
||
6190000
|
trusted library allocation
|
page read and write
|
||
7B72000
|
heap
|
page read and write
|
||
2B0E000
|
stack
|
page read and write
|
||
52CE000
|
stack
|
page read and write
|
||
2DB0000
|
heap
|
page read and write
|
||
2360000
|
heap
|
page read and write
|
||
2B8E000
|
stack
|
page read and write
|
||
344F000
|
stack
|
page read and write
|
||
4D41000
|
heap
|
page read and write
|
||
2BDC000
|
stack
|
page read and write
|
||
765000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
76EF000
|
stack
|
page read and write
|
||
969000
|
heap
|
page read and write
|
||
2EE0000
|
direct allocation
|
page read and write
|
||
7841000
|
unkown
|
page readonly
|
||
8947000
|
trusted library allocation
|
page read and write
|
||
3385000
|
heap
|
page read and write
|
||
5603000
|
heap
|
page read and write
|
||
951000
|
heap
|
page read and write
|
||
57C0000
|
direct allocation
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
5480000
|
heap
|
page read and write
|
||
3540000
|
heap
|
page read and write
|
||
79F6000
|
heap
|
page read and write
|
||
6131000
|
unkown
|
page execute read
|
||
52FD000
|
stack
|
page read and write
|
||
6091000
|
heap
|
page read and write
|
||
7D30000
|
trusted library allocation
|
page read and write
|
||
349F000
|
heap
|
page read and write
|
||
6B31000
|
unkown
|
page execute read
|
||
538E000
|
trusted library allocation
|
page read and write
|
||
7AED000
|
heap
|
page read and write
|
||
3278000
|
stack
|
page read and write
|
||
5500000
|
heap
|
page read and write
|
||
2C61000
|
heap
|
page read and write
|
||
2DA6000
|
heap
|
page read and write
|
||
8A60000
|
trusted library allocation
|
page read and write
|
||
872D000
|
stack
|
page read and write
|
||
5682000
|
heap
|
page read and write
|
||
756D000
|
stack
|
page read and write
|
||
557C000
|
heap
|
page read and write
|
||
949000
|
heap
|
page read and write
|
||
7A60000
|
heap
|
page execute and read and write
|
||
3663000
|
trusted library allocation
|
page execute and read and write
|
||
2D60000
|
heap
|
page read and write
|
||
3520000
|
trusted library allocation
|
page read and write
|
||
29C8000
|
heap
|
page read and write
|
||
79AD000
|
heap
|
page read and write
|
||
6189000
|
trusted library allocation
|
page read and write
|
||
7B74000
|
heap
|
page read and write
|
||
8FB000
|
heap
|
page read and write
|
||
89EE000
|
stack
|
page read and write
|
||
2DE4000
|
heap
|
page read and write
|
||
7B88000
|
heap
|
page read and write
|
||
74AD000
|
stack
|
page read and write
|
||
96C000
|
heap
|
page read and write
|
||
969000
|
heap
|
page read and write
|
||
324E000
|
unkown
|
page read and write
|
||
40E000
|
unkown
|
page read and write
|
||
2E24000
|
heap
|
page read and write
|
||
530E000
|
stack
|
page read and write
|
||
23E0000
|
heap
|
page read and write
|
||
2DE4000
|
heap
|
page read and write
|
||
36F0000
|
heap
|
page read and write
|
||
5260000
|
trusted library allocation
|
page execute and read and write
|
||
56C2000
|
heap
|
page read and write
|
||
29DF000
|
heap
|
page read and write
|
||
5683000
|
heap
|
page read and write
|
||
8A8F000
|
unkown
|
page readonly
|
||
556D000
|
heap
|
page read and write
|
||
7D90000
|
trusted library allocation
|
page read and write
|
||
50C7000
|
heap
|
page read and write
|
||
34D0000
|
heap
|
page read and write
|
||
32CE000
|
heap
|
page read and write
|
||
5470000
|
trusted library allocation
|
page read and write
|
||
8940000
|
trusted library allocation
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
2F2B000
|
stack
|
page read and write
|
||
2DA6000
|
heap
|
page read and write
|
||
29DD000
|
heap
|
page read and write
|
||
743A000
|
stack
|
page read and write
|
||
894E000
|
stack
|
page read and write
|
||
32E3000
|
heap
|
page read and write
|
||
5731000
|
unkown
|
page execute read
|
||
961000
|
heap
|
page read and write
|
||
5370000
|
heap
|
page execute and read and write
|
||
98000
|
stack
|
page read and write
|
||
731000
|
unkown
|
page execute read
|
||
8EF000
|
heap
|
page read and write
|
||
6131000
|
unkown
|
page execute read
|
||
1B31000
|
unkown
|
page execute read
|
||
4E40000
|
heap
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
4B00000
|
direct allocation
|
page read and write
|
||
32C0000
|
heap
|
page read and write
|
||
8900000
|
trusted library allocation
|
page read and write
|
||
7A2E000
|
heap
|
page read and write
|
||
359D000
|
heap
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
55C1000
|
heap
|
page read and write
|
||
8CB2000
|
trusted library allocation
|
page read and write
|
||
2D8D000
|
stack
|
page read and write
|
||
86FD000
|
unkown
|
page write copy
|
||
400000
|
unkown
|
page readonly
|
||
401000
|
unkown
|
page execute read
|
||
5731000
|
unkown
|
page execute read
|
||
358E000
|
stack
|
page read and write
|
||
2C60000
|
heap
|
page read and write
|
||
366D000
|
trusted library allocation
|
page execute and read and write
|
||
5422000
|
trusted library allocation
|
page read and write
|
||
776E000
|
stack
|
page read and write
|
||
2B15000
|
heap
|
page read and write
|
||
77BD000
|
stack
|
page read and write
|
||
3600000
|
heap
|
page read and write
|
||
2881000
|
heap
|
page read and write
|
||
8860000
|
trusted library allocation
|
page execute and read and write
|
||
2A3F000
|
heap
|
page read and write
|
||
34ED000
|
heap
|
page read and write
|
||
2A06000
|
heap
|
page read and write
|
||
3430000
|
heap
|
page read and write
|
||
8A8F000
|
unkown
|
page readonly
|
||
2B60000
|
direct allocation
|
page read and write
|
||
957000
|
heap
|
page read and write
|
||
50CB000
|
heap
|
page read and write
|
||
483000
|
unkown
|
page read and write
|
||
783D000
|
unkown
|
page readonly
|
||
8A10000
|
trusted library allocation
|
page read and write
|
||
32D0000
|
heap
|
page read and write
|
||
791B000
|
stack
|
page read and write
|
||
7D10000
|
trusted library allocation
|
page read and write
|
||
94E000
|
heap
|
page read and write
|
||
349C000
|
heap
|
page read and write
|
||
5ED1000
|
heap
|
page read and write
|
||
4E00000
|
heap
|
page execute and read and write
|
||
7CF0000
|
trusted library allocation
|
page read and write
|
||
79E2000
|
unkown
|
page readonly
|
||
5F50000
|
heap
|
page read and write
|
||
7BE0000
|
trusted library allocation
|
page read and write
|
||
4200000
|
trusted library allocation
|
page read and write
|
||
2780000
|
heap
|
page read and write
|
||
524E000
|
stack
|
page read and write
|
||
317E000
|
stack
|
page read and write
|
||
79AF000
|
stack
|
page read and write
|
||
7AB8000
|
heap
|
page read and write
|
||
2F69000
|
stack
|
page read and write
|
||
492F000
|
stack
|
page read and write
|
||
3284000
|
heap
|
page read and write
|
||
7A80000
|
heap
|
page execute and read and write
|
||
5400000
|
heap
|
page read and write
|
||
5500000
|
heap
|
page read and write
|
||
556A000
|
heap
|
page read and write
|
||
328E000
|
stack
|
page read and write
|
||
5702000
|
heap
|
page read and write
|
||
961000
|
heap
|
page read and write
|
||
36B0000
|
trusted library allocation
|
page read and write
|
||
782C000
|
unkown
|
page readonly
|
||
752F000
|
direct allocation
|
page read and write
|
||
2A05000
|
heap
|
page read and write
|
||
8770000
|
trusted library allocation
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
5440000
|
heap
|
page read and write
|
||
7D80000
|
trusted library allocation
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
34D7000
|
heap
|
page read and write
|
||
8C5E000
|
stack
|
page read and write
|
||
32B6000
|
heap
|
page read and write
|
||
7A60000
|
heap
|
page read and write
|
||
8905000
|
trusted library allocation
|
page read and write
|
||
5FD1000
|
heap
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
969000
|
heap
|
page read and write
|
||
7A90000
|
trusted library allocation
|
page read and write
|
||
73BE000
|
stack
|
page read and write
|
||
4D5C000
|
stack
|
page read and write
|
||
412000
|
unkown
|
page read and write
|
||
2DCA000
|
heap
|
page read and write
|
||
79C7000
|
unkown
|
page readonly
|
||
7A90000
|
heap
|
page read and write
|
||
277C000
|
stack
|
page read and write
|
||
8D1000
|
heap
|
page read and write
|
||
56C1000
|
heap
|
page read and write
|
||
4331000
|
unkown
|
page execute read
|
||
3692000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
heap
|
page read and write
|
||
5210000
|
heap
|
page read and write
|
||
8910000
|
trusted library allocation
|
page read and write
|
||
2B98000
|
heap
|
page read and write
|
||
2BC9000
|
heap
|
page read and write
|
||
6519000
|
trusted library allocation
|
page read and write
|
||
31F8000
|
heap
|
page read and write
|
||
3500000
|
heap
|
page read and write
|
||
3660000
|
trusted library allocation
|
page read and write
|
||
4DB0000
|
trusted library allocation
|
page read and write
|
||
2370000
|
heap
|
page read and write
|
||
32B0000
|
heap
|
page read and write
|
||
29C0000
|
heap
|
page read and write
|
||
50C0000
|
heap
|
page read and write
|
||
3931000
|
unkown
|
page execute read
|
||
7ACF000
|
heap
|
page read and write
|
||
60D1000
|
heap
|
page read and write
|
||
33E8000
|
heap
|
page read and write
|
||
22BE000
|
stack
|
page read and write
|
||
31C0000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
7D40000
|
trusted library allocation
|
page read and write
|
||
7AFF000
|
heap
|
page read and write
|
||
73EB000
|
stack
|
page read and write
|
||
73AD000
|
stack
|
page read and write
|
||
7B8E000
|
stack
|
page read and write
|
||
79AE000
|
unkown
|
page readonly
|
||
5F10000
|
heap
|
page read and write
|
||
79B5000
|
heap
|
page read and write
|
||
5B0000
|
heap
|
page read and write
|
||
71DC000
|
stack
|
page read and write
|
||
8870000
|
trusted library allocation
|
page read and write
|
||
8AF2000
|
heap
|
page read and write
|
||
25F7000
|
heap
|
page read and write
|
||
324F000
|
stack
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
907000
|
heap
|
page read and write
|
||
3370000
|
heap
|
page read and write
|
||
32E0000
|
heap
|
page read and write
|
||
2DB2000
|
heap
|
page read and write
|
||
58C9000
|
trusted library allocation
|
page read and write
|
||
273D000
|
stack
|
page read and write
|
||
37A0000
|
heap
|
page read and write
|
||
6381000
|
trusted library allocation
|
page read and write
|
||
521E000
|
stack
|
page read and write
|
||
5642000
|
heap
|
page read and write
|
||
313E000
|
stack
|
page read and write
|
||
5480000
|
heap
|
page read and write
|
||
327F000
|
stack
|
page read and write
|
||
2F9D000
|
stack
|
page read and write
|
||
51D5000
|
trusted library allocation
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
7D90000
|
trusted library allocation
|
page execute and read and write
|
||
5576000
|
heap
|
page read and write
|
||
8C60000
|
trusted library allocation
|
page read and write
|
||
4ADF000
|
stack
|
page read and write
|
||
75EE000
|
stack
|
page read and write
|
||
5580000
|
heap
|
page read and write
|
||
3290000
|
heap
|
page read and write
|
||
6390000
|
trusted library allocation
|
page read and write
|
||
5FD2000
|
heap
|
page read and write
|
||
50CD000
|
heap
|
page read and write
|
||
2DE4000
|
heap
|
page read and write
|
||
5170000
|
heap
|
page execute and read and write
|
||
4EC3000
|
heap
|
page read and write
|
||
4E41000
|
heap
|
page read and write
|
||
3283000
|
heap
|
page read and write
|
||
3530000
|
heap
|
page readonly
|
||
749B000
|
stack
|
page read and write
|
||
2A44000
|
heap
|
page read and write
|
||
29FB000
|
heap
|
page read and write
|
||
61D1000
|
heap
|
page read and write
|
||
5579000
|
heap
|
page read and write
|
||
86AA000
|
unkown
|
page write copy
|
||
7837000
|
unkown
|
page readonly
|
||
747E000
|
stack
|
page read and write
|
||
7565000
|
heap
|
page execute and read and write
|
||
4FDF000
|
heap
|
page read and write
|
||
5F24000
|
trusted library allocation
|
page read and write
|
||
8CF0000
|
trusted library allocation
|
page read and write
|
||
78EE000
|
stack
|
page read and write
|
||
7E82000
|
trusted library allocation
|
page read and write
|
||
726E000
|
stack
|
page read and write
|
||
957000
|
heap
|
page read and write
|
||
8D0000
|
heap
|
page read and write
|
||
73AD000
|
stack
|
page read and write
|
||
7560000
|
heap
|
page execute and read and write
|
||
7D4E000
|
stack
|
page read and write
|
||
759A000
|
stack
|
page read and write
|
||
2DC1000
|
heap
|
page read and write
|
||
86AA000
|
unkown
|
page write copy
|
||
4DC1000
|
heap
|
page read and write
|
||
73D7000
|
direct allocation
|
page read and write
|
||
2A09000
|
heap
|
page read and write
|
||
52BC000
|
stack
|
page read and write
|
||
8A0A000
|
trusted library allocation
|
page read and write
|
||
95E000
|
heap
|
page read and write
|
||
342F000
|
stack
|
page read and write
|
||
56C2000
|
heap
|
page read and write
|
||
33D0000
|
heap
|
page read and write
|
||
3598000
|
heap
|
page read and write
|
||
89C4000
|
heap
|
page read and write
|
||
34C0000
|
heap
|
page readonly
|
||
5549000
|
heap
|
page read and write
|
||
35FF000
|
stack
|
page read and write
|
||
7F410000
|
trusted library allocation
|
page execute and read and write
|
||
7CB0000
|
trusted library allocation
|
page execute and read and write
|
||
7A09000
|
heap
|
page read and write
|
||
2F20000
|
trusted library allocation
|
page read and write
|
||
8C80000
|
trusted library allocation
|
page execute and read and write
|
||
5F90000
|
heap
|
page read and write
|
||
7D00000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
71FD000
|
unkown
|
page readonly
|
||
4D00000
|
trusted library allocation
|
page read and write
|
||
3931000
|
unkown
|
page execute read
|
||
8920000
|
trusted library allocation
|
page read and write
|
||
6051000
|
heap
|
page read and write
|
||
4D00000
|
heap
|
page read and write
|
||
469000
|
unkown
|
page read and write
|
||
789B000
|
stack
|
page read and write
|
||
308F000
|
stack
|
page read and write
|
||
783D000
|
unkown
|
page readonly
|
||
730000
|
unkown
|
page readonly
|
||
328A000
|
heap
|
page read and write
|
||
8950000
|
trusted library allocation
|
page read and write
|
||
8919000
|
trusted library allocation
|
page read and write
|
||
355F000
|
heap
|
page read and write
|
||
515F000
|
stack
|
page read and write
|
||
87A0000
|
trusted library allocation
|
page read and write
|
||
304E000
|
stack
|
page read and write
|
||
78AE000
|
stack
|
page read and write
|
||
79E2000
|
unkown
|
page readonly
|
||
286C000
|
heap
|
page read and write
|
||
7EF78000
|
trusted library allocation
|
page execute and read and write
|
||
6052000
|
heap
|
page read and write
|
||
7CD0000
|
trusted library allocation
|
page read and write
|
||
23E8000
|
heap
|
page read and write
|
||
32BE000
|
stack
|
page read and write
|
||
7E70000
|
trusted library allocation
|
page read and write
|
||
86F000
|
stack
|
page read and write
|
||
2C0E000
|
stack
|
page read and write
|
||
884E000
|
stack
|
page read and write
|
||
2DA4000
|
heap
|
page read and write
|
||
961000
|
heap
|
page read and write
|
||
7D50000
|
trusted library allocation
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
2DE4000
|
heap
|
page read and write
|
||
5682000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
5CC0000
|
direct allocation
|
page read and write
|
||
7BCD000
|
stack
|
page read and write
|
||
7B45000
|
heap
|
page read and write
|
||
528E000
|
stack
|
page read and write
|
||
5440000
|
heap
|
page read and write
|
||
7E10000
|
trusted library allocation
|
page read and write
|
||
2DE4000
|
heap
|
page read and write
|
||
3479000
|
trusted library allocation
|
page read and write
|
||
35AE000
|
unkown
|
page read and write
|
||
95E000
|
heap
|
page read and write
|
||
8910000
|
trusted library allocation
|
page read and write
|
||
2790000
|
heap
|
page read and write
|
||
8907000
|
trusted library allocation
|
page read and write
|
||
4DC0000
|
heap
|
page read and write
|
||
79B2000
|
unkown
|
page readonly
|
||
5360000
|
heap
|
page read and write
|
||
4B00000
|
heap
|
page read and write
|
||
5574000
|
heap
|
page read and write
|
||
A6F000
|
stack
|
page read and write
|
||
89F2000
|
heap
|
page read and write
|
||
907000
|
heap
|
page read and write
|
||
94E000
|
heap
|
page read and write
|
||
297F000
|
stack
|
page read and write
|
||
352F000
|
unkown
|
page read and write
|
||
2980000
|
heap
|
page read and write
|
||
36F8000
|
heap
|
page read and write
|
||
50C2000
|
heap
|
page read and write
|
||
7AD5000
|
heap
|
page read and write
|
||
5181000
|
trusted library allocation
|
page read and write
|
||
25F0000
|
heap
|
page read and write
|
||
8EA000
|
heap
|
page read and write
|
||
3690000
|
trusted library allocation
|
page read and write
|
||
95E000
|
heap
|
page read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
7C8D000
|
stack
|
page read and write
|
||
8A40000
|
trusted library allocation
|
page read and write
|
||
50D0000
|
heap
|
page read and write
|
||
346D000
|
trusted library allocation
|
page execute and read and write
|
||
2F30000
|
heap
|
page read and write
|
||
8CD000
|
heap
|
page read and write
|
||
7882000
|
heap
|
page read and write
|
||
293E000
|
stack
|
page read and write
|
||
50BD000
|
stack
|
page read and write
|
||
2B60000
|
trusted library allocation
|
page read and write
|
||
4331000
|
unkown
|
page execute read
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
6D50000
|
direct allocation
|
page read and write
|
||
7C40000
|
trusted library allocation
|
page read and write
|
||
79A5000
|
heap
|
page read and write
|
||
8770000
|
trusted library allocation
|
page execute and read and write
|
||
3420000
|
heap
|
page read and write
|
||
90A000
|
heap
|
page read and write
|
||
8EC000
|
heap
|
page read and write
|
||
273C000
|
stack
|
page read and write
|
||
8CE0000
|
trusted library allocation
|
page read and write
|
||
736D000
|
stack
|
page read and write
|
||
25AC000
|
stack
|
page read and write
|
||
53C1000
|
heap
|
page read and write
|
||
5602000
|
heap
|
page read and write
|
||
7E60000
|
trusted library allocation
|
page read and write
|
||
5FD0000
|
heap
|
page read and write
|
||
5AC0000
|
direct allocation
|
page read and write
|
||
732A000
|
stack
|
page read and write
|
||
3250000
|
heap
|
page read and write
|
||
8960000
|
trusted library allocation
|
page read and write
|
||
1131000
|
unkown
|
page execute read
|
||
4FBF000
|
stack
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
786E000
|
stack
|
page read and write
|
||
8780000
|
trusted library allocation
|
page read and write
|
||
29DD000
|
heap
|
page read and write
|
||
7B2B000
|
heap
|
page read and write
|
||
7B4A000
|
heap
|
page read and write
|
||
340B000
|
heap
|
page read and write
|
||
54C1000
|
heap
|
page read and write
|
||
2DAB000
|
heap
|
page read and write
|
||
8940000
|
trusted library allocation
|
page read and write
|
||
5FD1000
|
heap
|
page read and write
|
||
79C1000
|
heap
|
page read and write
|
||
2F80000
|
heap
|
page read and write
|
||
3478000
|
heap
|
page read and write
|
||
34E9000
|
trusted library allocation
|
page read and write
|
||
59B000
|
unkown
|
page readonly
|
||
2A08000
|
heap
|
page read and write
|
||
4CC1000
|
heap
|
page read and write
|
||
448000
|
unkown
|
page read and write
|
||
4951000
|
heap
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
88E0000
|
trusted library allocation
|
page read and write
|
||
57B1000
|
trusted library allocation
|
page read and write
|
||
5582000
|
heap
|
page read and write
|
||
7A70000
|
trusted library allocation
|
page read and write
|
||
3200000
|
heap
|
page read and write
|
||
50CB000
|
heap
|
page read and write
|
||
8A07000
|
trusted library allocation
|
page read and write
|
||
772E000
|
stack
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
83DF000
|
unkown
|
page readonly
|
||
2E60000
|
direct allocation
|
page read and write
|
||
3931000
|
unkown
|
page execute read
|
||
6AD0000
|
direct allocation
|
page read and write
|
||
332E000
|
stack
|
page read and write
|
||
8950000
|
heap
|
page read and write
|
||
959000
|
heap
|
page read and write
|
||
29DD000
|
heap
|
page read and write
|
||
7D20000
|
trusted library allocation
|
page read and write
|
||
8D1000
|
heap
|
page read and write
|
||
36C0000
|
heap
|
page readonly
|
||
50CC000
|
heap
|
page read and write
|
||
8BD0000
|
trusted library allocation
|
page execute and read and write
|
||
7A4B000
|
heap
|
page read and write
|
||
6010000
|
heap
|
page read and write
|
||
345D000
|
heap
|
page read and write
|
||
3670000
|
trusted library allocation
|
page read and write
|
||
303B000
|
stack
|
page read and write
|
||
8EEE000
|
stack
|
page read and write
|
||
33D0000
|
trusted library allocation
|
page read and write
|
||
61E5000
|
trusted library allocation
|
page read and write
|
||
2330000
|
heap
|
page read and write
|
||
53C1000
|
heap
|
page read and write
|
||
2A3F000
|
heap
|
page read and write
|
||
2BAD000
|
heap
|
page read and write
|
||
959000
|
heap
|
page read and write
|
||
320E000
|
stack
|
page read and write
|
||
8EAB000
|
stack
|
page read and write
|
||
32C2000
|
heap
|
page read and write
|
||
50CB000
|
heap
|
page read and write
|
||
2531000
|
unkown
|
page execute read
|
||
31E5000
|
heap
|
page read and write
|
||
7B68000
|
heap
|
page read and write
|
||
2DAC000
|
heap
|
page read and write
|
||
8950000
|
trusted library allocation
|
page read and write
|
||
7861000
|
unkown
|
page readonly
|
||
5441000
|
heap
|
page read and write
|
||
7630000
|
heap
|
page read and write
|
||
4DC0000
|
heap
|
page read and write
|
||
41E000
|
unkown
|
page read and write
|
||
8ED000
|
heap
|
page read and write
|
||
2FCE000
|
stack
|
page read and write
|
||
3450000
|
heap
|
page read and write
|
||
327D000
|
stack
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
79EE000
|
stack
|
page read and write
|
||
3340000
|
heap
|
page read and write
|
||
1131000
|
unkown
|
page execute read
|
||
282C000
|
stack
|
page read and write
|
||
876E000
|
stack
|
page read and write
|
||
71FD000
|
unkown
|
page readonly
|
||
5540000
|
heap
|
page read and write
|
||
8FE000
|
heap
|
page read and write
|
||
31F5000
|
heap
|
page read and write
|
||
7C90000
|
trusted library allocation
|
page read and write
|
||
2DE4000
|
heap
|
page read and write
|
||
3620000
|
heap
|
page read and write
|
||
4E40000
|
heap
|
page read and write
|
||
7978000
|
heap
|
page read and write
|
||
5602000
|
heap
|
page read and write
|
||
61BC000
|
trusted library allocation
|
page read and write
|
||
4E00000
|
heap
|
page read and write
|
||
76AE000
|
stack
|
page read and write
|
||
7BCE000
|
stack
|
page read and write
|
||
2DA4000
|
heap
|
page read and write
|
||
31FE000
|
unkown
|
page read and write
|
||
7AA0000
|
trusted library allocation
|
page execute and read and write
|
||
4E40000
|
heap
|
page read and write
|
||
7A44000
|
heap
|
page read and write
|
||
4BC8000
|
heap
|
page read and write
|
||
7A50000
|
trusted library allocation
|
page read and write
|
||
7E40000
|
trusted library allocation
|
page read and write
|
||
54F000
|
unkown
|
page read and write
|
||
6210000
|
heap
|
page read and write
|
||
256C000
|
stack
|
page read and write
|
||
7857000
|
unkown
|
page readonly
|
||
2DA2000
|
heap
|
page read and write
|
||
7DD0000
|
trusted library allocation
|
page read and write
|
||
4A5F000
|
stack
|
page read and write
|
||
3505000
|
trusted library allocation
|
page execute and read and write
|
||
2BDC000
|
heap
|
page read and write
|
||
60D1000
|
heap
|
page read and write
|
||
345E000
|
heap
|
page read and write
|
||
86FD000
|
unkown
|
page write copy
|
||
33E0000
|
heap
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
4D31000
|
unkown
|
page execute read
|
||
2DE4000
|
heap
|
page read and write
|
||
7BF0000
|
trusted library allocation
|
page read and write
|
||
29FB000
|
heap
|
page read and write
|
||
7999000
|
heap
|
page read and write
|
||
4D9D000
|
stack
|
page read and write
|
||
54C0000
|
heap
|
page read and write
|
||
2DE4000
|
heap
|
page read and write
|
||
957000
|
heap
|
page read and write
|
||
7DA0000
|
trusted library allocation
|
page execute and read and write
|
||
83DF000
|
unkown
|
page readonly
|
||
34AA000
|
heap
|
page read and write
|
||
32FF000
|
stack
|
page read and write
|
||
71F4000
|
unkown
|
page readonly
|
||
7962000
|
heap
|
page read and write
|
||
2DB7000
|
heap
|
page read and write
|
||
563D000
|
trusted library allocation
|
page read and write
|
||
25F5000
|
heap
|
page read and write
|
||
6150000
|
heap
|
page read and write
|
||
3470000
|
trusted library allocation
|
page read and write
|
||
63E4000
|
trusted library allocation
|
page read and write
|
||
4BC0000
|
heap
|
page read and write
|
||
4B30000
|
heap
|
page read and write
|
||
5F90000
|
heap
|
page read and write
|
||
34E9000
|
heap
|
page read and write
|
||
6181000
|
trusted library allocation
|
page read and write
|
||
7C00000
|
trusted library allocation
|
page read and write
|
||
48AF000
|
stack
|
page read and write
|
||
7B0C000
|
heap
|
page read and write
|
There are 974 hidden memdumps, click here to show them.