Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
OpenWebStart_windows-x64_1_9_1.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\java.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\MessagesDefault
|
ASCII text, with very long lines (363)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_0_1mu2pq3.utf8
|
ASCII text, with very long lines (363)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_10_1mu2pq3_wnegrj.png
|
PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_11_1mu2pq3.txt
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_12_1mu2pq3_ctpfum.icns
|
Mac OS X icon, 130099 bytes, "ic09" type
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_13_1mu2pq3_1l2apw7.ico
|
MS Windows icon resource - 1 icon, 256x256 with PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_14_1mu2pq3_x7nby6.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_15_1mu2pq3_vd2dea.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_16_1mu2pq3_un9apv.png
|
PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_17_1mu2pq3_1xth8wx.png
|
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_18_1mu2pq3_259ij1.png
|
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_19_1mu2pq3_1w6mnzb.png
|
PNG image data, 79 x 53, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_19_1mu2pq3_1w6mnzb@2x.png
|
PNG image data, 157 x 106, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_1_1mu2pq3.utf8
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_2_1mu2pq3.utf8
|
Unicode text, UTF-8 text, with very long lines (470)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_3_1mu2pq3.utf8
|
Unicode text, UTF-8 text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_4_1mu2pq3_1qcjq5g.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_5_1mu2pq3_14adzqr.png
|
PNG image data, 32 x 32, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_6_1mu2pq3_1bf9cql.png
|
PNG image data, 48 x 48, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_7_1mu2pq3_njuzm5.png
|
PNG image data, 64 x 64, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_8_1mu2pq3_1reef1z.png
|
PNG image data, 128 x 128, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4j_extf_9_1mu2pq3_fwd21f.png
|
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4jparams.conf
|
XML 1.0 document, ASCII text, with very long lines (565), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\i4jruntime.jar
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\installer.ico
|
MS Windows icon resource - 12 icons, 16x16, 8 bits/pixel, 16x16, 32 bits/pixel
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre.tar.gz
|
gzip compressed data, from FAT filesystem (MS-DOS, OS/2, NT), original size modulo 2^32 101785600
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\ASSEMBLY_EXCEPTION
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\LICENSE
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\THIRD_PARTY_README
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\JAWTAccessBridge-64.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\JavaAccessBridge-64.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\WindowsAccessBridge-64.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-console-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-datetime-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-debug-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-errorhandling-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-file-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-file-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-file-l2-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-handle-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-heap-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-interlocked-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-libraryloader-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-localization-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-memory-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-namedpipe-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-processenvironment-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-processthreads-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-processthreads-l1-1-1.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-profile-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-rtlsupport-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-string-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-synch-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-synch-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-sysinfo-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-timezone-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-core-util-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-conio-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-convert-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-environment-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-filesystem-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-heap-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-locale-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-math-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-multibyte-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-private-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-process-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-runtime-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-stdio-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-string-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-time-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\api-ms-win-crt-utility-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\attach.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\awt.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\dt_shmem.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\dt_socket.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\fontmanager.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\freetype.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\hprof.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\instrument.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\j2gss.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\j2pcsc.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\j2pkcs11.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\jaas_nt.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\jabswitch.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\java-rmi.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\java.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\java_crw_demo.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\javaw.exe
|
PE32+ executable (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\jawt.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\jdwp.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\jjs.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\jli.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\jpeg.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\jsdt.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\jsound.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\jsoundds.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\keytool.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\kinit.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\klist.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\ktab.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\lcms.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\management.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\mlib_image.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\msvcp140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\net.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\nio.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\npt.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\orbd.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\pack200.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\policytool.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\rmid.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\rmiregistry.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\sawindbg.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\server\Xusage.txt
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\server\jvm.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\servertool.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\splashscreen.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\sspi_bridge.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\sunec.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\sunmscapi.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\tnameserv.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\ucrtbase.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\unpack.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\unpack200.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\vcruntime140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\verify.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\w2k_lsa_auth.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\zip.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\accessibility.properties
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\amd64\jvm.cfg
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\calendars.properties
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\charsets.jar
|
Java archive data (JAR)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\classlist
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\cmm\CIEXYZ.pf
|
Microsoft color profile 2.3, type lcms, XYZ/XYZ-abst device by lcms, 784 bytes, 28-12-2006 18:07:22, no copyright tag "lcms
XYZ identity"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\cmm\GRAY.pf
|
Microsoft color profile 2.3, type lcms, GRAY/XYZ-mntr device by lcms, 556 bytes, 28-12-2006 18:07:22, no copyright tag "lcms
gray virtual profile"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\cmm\LINEAR_RGB.pf
|
ColorSync color profile 2.3, type lcms, RGB/XYZ-mntr device by lcms, 488 bytes, 28-3-2008 14:24:37, transparent, relative
colorimetric "linear sRGB"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\cmm\PYCC.pf
|
ColorSync color profile 4.0, type lcms, 3CLR/XYZ-spac device by lcms, 234080 bytes, 10-4-2008 10:24:22, transparent, relative
colorimetric, 0xf0e75c55d21e4d8c MD5 'PYCC from PCD 045'
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\cmm\sRGB.pf
|
Microsoft color profile 2.3, type lcms, RGB/XYZ-mntr device by lcms, 6876 bytes, 28-12-2006 18:07:22, no copyright tag "sRGB
built-in"
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\content-types.properties
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\currency.data
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\access-bridge-64.jar
|
Java archive data (JAR)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\cldrdata.jar
|
Java archive data (JAR)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\dnsns.jar
|
Java archive data (JAR)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\jaccess.jar
|
Java archive data (JAR)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\localedata.jar
|
Java archive data (JAR)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\meta-index
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\nashorn.jar
|
Java archive data (JAR)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\sunec.jar
|
Java archive data (JAR)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\sunjce_provider.jar
|
Java archive data (JAR)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\sunmscapi.jar
|
Java archive data (JAR)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\sunpkcs11.jar
|
Java archive data (JAR)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\ext\zipfs.jar
|
Java archive data (JAR)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\flavormap.properties
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\fontconfig.bfc
|
raw G3 (Group 3) FAX
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\fontconfig.properties.src
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\hijrah-config-umalqura.properties
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\images\cursors\cursors.properties
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\images\cursors\invalid32x32.gif
|
GIF image data, version 89a, 32 x 32
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\images\cursors\win32_CopyDrop32x32.gif
|
GIF image data, version 89a, 31 x 32
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\images\cursors\win32_CopyNoDrop32x32.gif
|
GIF image data, version 89a, 32 x 32
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\images\cursors\win32_LinkDrop32x32.gif
|
GIF image data, version 89a, 31 x 32
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\images\cursors\win32_LinkNoDrop32x32.gif
|
GIF image data, version 89a, 32 x 32
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\images\cursors\win32_MoveDrop32x32.gif
|
GIF image data, version 89a, 31 x 32
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\images\cursors\win32_MoveNoDrop32x32.gif
|
GIF image data, version 89a, 32 x 32
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\jce.jar
|
Java archive data (JAR)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\jfr.jar
|
Java archive data (JAR)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\jfr\default.jfc
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\jfr\profile.jfc
|
XML 1.0 document, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\jsse.jar
|
Java archive data (JAR)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\jvm.hprof.txt
|
Algol 68 source, ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\logging.properties
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\management-agent.jar
|
Java archive data (JAR)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\management\jmxremote.access
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\management\jmxremote.password.template
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\management\management.properties
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\management\snmp.acl.template
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\meta-index
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\net.properties
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\psfont.properties.ja
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\psfontj2d.properties
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\resources.jar
|
Java archive data (JAR)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\rt.jar
|
Java archive data (JAR)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\security\blacklisted.certs
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\security\cacerts
|
Java KeyStore
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\security\java.policy
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\security\java.security
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\security\policy\limited\US_export_policy.jar
|
Java archive data (JAR)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\security\policy\limited\local_policy.jar
|
Java archive data (JAR)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\security\policy\unlimited\US_export_policy.jar
|
Java archive data (JAR)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\security\policy\unlimited\local_policy.jar
|
Java archive data (JAR)
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\sound.properties
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\tzdb.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\lib\tzmappings
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\release
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\stats.properties
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\user.jar
|
Zip archive data, at least v1.0 to extract, compression method=store
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\e4j771B.tmp
|
ASCII text, with CRLF line terminators
|
modified
|
||
C:\Users\user\AppData\Local\Temp\hsperfdata_user\7276
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\hsperfdata_user\7352
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\i4j_log_OpenWebStart_6227722212339928138.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\i4j_nlog_1.log
|
Unicode text, UTF-8 (with BOM) text, with very long lines (409), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1002\83aa4cc77f591dfc2374580bbd95f6ba_9e146be9-c76a-4720-bcdb-53011b87bd06
|
data
|
dropped
|
There are 195 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\AppData\Local\Temp\e4j5D2A.tmp_dir1713545260\jre\bin\java.exe
|
c:\users\user\appdata\local\temp\E4J5D2~1.TMP\jre\bin\java.exe -version
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Users\user\Desktop\OpenWebStart_windows-x64_1_9_1.exe
|
"C:\Users\user\Desktop\OpenWebStart_windows-x64_1_9_1.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://apache.org/xml/features/dom/create-entity-ref-nodes
|
unknown
|
||
http://apache.org/xml/features/validation/dynamic
|
unknown
|
||
http://apache.org/xml/features/validation/schema/augment-psvi
|
unknown
|
||
http://apache.org/xml/xmlschema/1.0/anonymousTypesDocume
|
unknown
|
||
https://adoptium.net/
|
unknown
|
||
http://java.sun.com/xml/schema/features/
|
unknown
|
||
http://apache.org/xml/properties/internal/validator/dtd
|
unknown
|
||
http://apache.org/xml/properties/localeF
|
unknown
|
||
http://apache.org/xml/properties/input-buffer-size
|
unknown
|
||
http://apache.org/xml/properties/internal/datatype-validator-factory
|
unknown
|
||
http://apache.org/xml/properties/internal/validator/schema
|
unknown
|
||
http://xml.org/sax/features/allow-dtd-events-after-endDTD7
|
unknown
|
||
http://timestamp.sectigo.com
|
unknown
|
||
http://apache.org/xml/properties/dom/document-class-name3
|
unknown
|
||
http://apache.org/xml/features/internal/tolerate-duplicatesO
|
unknown
|
||
http://apache.org/xml/features/validate-annotations
|
unknown
|
||
http://javax.xml.transform.stream.StreamSource/feature6
|
unknown
|
||
http://xml.org/sax/features/namespace-prefixes
|
unknown
|
||
https://openwebstart.com/
|
unknown
|
||
http://apache.org/xml/properties/internal/entity-manager
|
unknown
|
||
http://java.sun.com/xml/stream/properties/reader-in-defined-state.org/do
|
unknown
|
||
http://apache.org/xml/properties/internal/dtd-processor
|
unknown
|
||
http://apache.org/xml/features/namespace-growth
|
unknown
|
||
http://xml.org/sax/features/string-interning
|
unknown
|
||
http://apache.org/xml/features/internal/parser-settings
|
unknown
|
||
http://apache.org/xml/features/dom/include-ignorable-whitespace
|
unknown
|
||
http://apache.org/xml/features/create-cdata-nodes
|
unknown
|
||
http://java.sun.com/xml/dom/properties/
|
unknown
|
||
http://apache.org/xml/properties/internal/stax-entity-resolver
|
unknown
|
||
https://adoptium.net/java.vendor.url.bughttps://github.com/adoptium/adoptium-support/issues%d.%djava
|
unknown
|
||
https://github.com/adoptium/temurin-build.git
|
unknown
|
||
http://apache.org/xml/features/xinclude/fixup-base-uris6
|
unknown
|
||
http://javax.xml.XMLConstants/feature/secure-processing
|
unknown
|
||
http://apache.org/xml/features/xinclude/fixup-base-uris
|
unknown
|
||
http://xml.org/sax/properties/dom-nodet
|
unknown
|
||
http://apache.org/xml/properties/schema/external-noNamespaceSchemaLocation
|
unknown
|
||
http://www.freedesktop.org/standards/shared-mime-info
|
unknown
|
||
http://apache.org/xml/properties/internal/error-reporter
|
unknown
|
||
http://apache.org/xml/properties/internal/namespace-context
|
unknown
|
||
http://apache.org/xml/features/warn-on-duplicate-entitydef
|
unknown
|
||
http://xml.org/sax/features/string-interning0(&
|
unknown
|
||
http://javax.xml.XMLConstants/property/accessExternalStylesheet;
|
unknown
|
||
http://javax.xml.XMLConstants/property/accessExternalSchema
|
unknown
|
||
http://apache.org/xml/features/include-comments
|
unknown
|
||
http://apache.org/xml/features/scanner/notify-char-refs
|
unknown
|
||
http://apache.org/xml/properties/internal/symbol-table6
|
unknown
|
||
http://java.sun.com/xml/stream/properties/report-cdata-event
|
unknown
|
||
http://apache.org/xml/features/scanner/notify-char-refs:
|
unknown
|
||
http://apache.org/xml/properties/dom/current-element-node7
|
unknown
|
||
http://javax.xml.transform.stax.StAXSource/feature
|
unknown
|
||
http://apache.org/xml/features/continue-after-fatal-error
|
unknown
|
||
http://apache.org/xml/features/standard-uri-conformant
|
unknown
|
||
http://apache.org/xml/properties/internal/document-scanner
|
unknown
|
||
http://apache.org/xml/properties/input-buffer-sizedtd/XM
|
unknown
|
||
http://www.ej-technologies.com/shared-mime-info-ext
|
unknown
|
||
http://apache.org/xml/properties/internal/validation/schema/dv-factory8
|
unknown
|
||
http://apache.org/xml/properties/internal/namespace-binderFfA
|
unknown
|
||
http://xml.org/sax/features/use-entity-resolver2
|
unknown
|
||
http://apache.org/xml/properties/internal/entity-resolver
|
unknown
|
||
http://apache.org/xml/features/
|
unknown
|
||
http://apache.org/xml/features/dom/create-entity-ref-nodesp
|
unknown
|
||
http://apache.org/xml/features/generate-synthetic-annotations
|
unknown
|
||
http://xml.org/sax/features/allow-dtd-events-after-endDTD
|
unknown
|
||
http://apache.org/xml/features/validation/balance-syntax-trees
|
unknown
|
||
http://apache.org/xml/features/internal/validation/schema/use-grammar-pool-only
|
unknown
|
||
http://apache.org/xml/features/include-comments1
|
unknown
|
||
http://apache.org/xml/features/namespace-growth;
|
unknown
|
||
http://apache.org/xml/properties/internal/namespace-binder
|
unknown
|
||
http://javax.xml.XMLConstants/property/accessExternalDTD;
|
unknown
|
||
http://apache.org/xml/features/validate-annotations9
|
unknown
|
||
http://www.oracle.com/xml/is-standalone
|
unknown
|
||
http://javax.xml.transform.sax.SAXTransformerFactory/feature
|
unknown
|
||
http://xml.org/sax/features/validation
|
unknown
|
||
http://javax.xml.XMLConstants/property/accessExternalStylesheet
|
unknown
|
||
http://apache.org/xml/properties/internal/xinclude-handler
|
unknown
|
||
http://apache.org/xml/properties/security-manager
|
unknown
|
||
http://java.sun.com/xml/dom/properties/ancestor-check
|
unknown
|
||
http://xml.apache.org/xslt
|
unknown
|
||
http://java.sun.com/xml/stream/properties/
|
unknown
|
||
http://xml.org/sax/features/erces/intern
|
unknown
|
||
http://apache.org/xml/features/validation/schemapl
|
unknown
|
||
http://java.sun.com/xml/stream/properties/ache/xerces/in
|
unknown
|
||
http://apache.org/xml/features/validation/schema
|
unknown
|
||
http://javax.xml.transform.stax.StAXResult/feature
|
unknown
|
||
http://java.sun.com/xml/dom/properties/t
|
unknown
|
||
http://apache.org/xml/properties/internal/dtd-scanner
|
unknown
|
||
http://xml.org/sax/properties/lexical-handler
|
unknown
|
||
http://apache.org/xml/features/xinclude/fixup-language:
|
unknown
|
||
http://apache.org/xml/properties/schema/external-schemaLocation
|
unknown
|
||
http://apache.org/xml/features/dom/include-ignorable-whitespace:
|
unknown
|
||
http://xml.org/sax/features/
|
unknown
|
||
http://apache.org/xml/properties/internal/error-handler
|
unknown
|
||
https://github.com/adoptium/adoptium-
|
unknown
|
||
http://apache.org/xml/features/xinclude
|
unknown
|
||
http://apache.org/xml/properties/internal/xinclude-handler;
|
unknown
|
||
http://javax.xml.transform.sax.SAXTransformerFactory/featureF
|
unknown
|
||
http://apache.org/xml/features/validation/schema/element-default
|
unknown
|
||
https://github.com/ad
|
unknown
|
||
http://apache.org/xml/features/validation/schema-full-checking
|
unknown
|
||
http://javax.xml.XMLConstants/property/
|
unknown
|
There are 90 hidden URLs, click here to show them.
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER\SOFTWARE\ej-technologies\exe4j\pids
|
c:\users\user\desktop\openwebstart_windows-x64_1_9_1.exe
|
||
HKEY_CURRENT_USER\SOFTWARE\ej-technologies\exe4j\jvms\c:/users/user/appdata/local/temp/e4j5d2a.tmp_dir1713545260/jre/bin/java.exe
|
LastWriteTime
|
||
HKEY_CURRENT_USER\SOFTWARE\ej-technologies\exe4j\jvms\c:/users/user/appdata/local/temp/e4j5d2a.tmp_dir1713545260/jre/bin/java.exe
|
Version
|
||
HKEY_CURRENT_USER\SOFTWARE\ej-technologies\exe4j
|
InstallStarted_7276
|
||
HKEY_CURRENT_USER\SOFTWARE\ej-technologies\exe4j
|
InstallStarted
|
||
HKEY_CURRENT_USER\SOFTWARE\ej-technologies\exe4j
|
InstallStarted_7276
|
||
HKEY_CURRENT_USER\SOFTWARE\ej-technologies\exe4j
|
InstallStarted
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1B63F000
|
heap
|
page read and write
|
||
2629000
|
heap
|
page read and write
|
||
1BF6F000
|
heap
|
page read and write
|
||
D6859000
|
direct allocation
|
page read and write
|
||
7FFDFF301000
|
unkown
|
page read and write
|
||
19779000
|
heap
|
page read and write
|
||
1D552000
|
heap
|
page read and write
|
||
1BB8D000
|
heap
|
page read and write
|
||
1B698000
|
heap
|
page read and write
|
||
1D34C000
|
heap
|
page read and write
|
||
D55A4000
|
direct allocation
|
page read and write
|
||
B87000
|
heap
|
page read and write
|
||
1B90B000
|
heap
|
page read and write
|
||
1BDF2000
|
heap
|
page read and write
|
||
1D2D0000
|
heap
|
page read and write
|
||
1B951000
|
heap
|
page read and write
|
||
1BC79000
|
heap
|
page read and write
|
||
1BEDE000
|
heap
|
page read and write
|
||
1BBE6000
|
heap
|
page read and write
|
||
7FF743C59000
|
unkown
|
page readonly
|
||
D56CC000
|
direct allocation
|
page read and write
|
||
4F21000
|
direct allocation
|
page execute and read and write
|
||
19909000
|
heap
|
page read and write
|
||
1D309000
|
heap
|
page read and write
|
||
D55AC000
|
direct allocation
|
page read and write
|
||
1BCCC000
|
heap
|
page read and write
|
||
1BBF6000
|
heap
|
page read and write
|
||
21D3E475000
|
direct allocation
|
page execute and read and write
|
||
1E390000
|
direct allocation
|
page read and write
|
||
D6B27000
|
direct allocation
|
page read and write
|
||
1D4D5000
|
heap
|
page read and write
|
||
1EE3F000
|
stack
|
page read and write
|
||
1BF3E000
|
heap
|
page read and write
|
||
D66BF000
|
direct allocation
|
page read and write
|
||
1BCD4000
|
heap
|
page read and write
|
||
D677C000
|
direct allocation
|
page read and write
|
||
1BC62000
|
heap
|
page read and write
|
||
1D332000
|
heap
|
page read and write
|
||
1488E000
|
stack
|
page read and write
|
||
1BB82000
|
heap
|
page read and write
|
||
1AF7E000
|
unkown
|
page read and write
|
||
21D52B30000
|
heap
|
page read and write
|
||
1B649000
|
heap
|
page read and write
|
||
D6353000
|
direct allocation
|
page read and write
|
||
1B99B000
|
heap
|
page read and write
|
||
1C8C1000
|
heap
|
page read and write
|
||
1BD4B000
|
heap
|
page read and write
|
||
1D4D2000
|
heap
|
page read and write
|
||
1B8E2000
|
heap
|
page read and write
|
||
1BB82000
|
heap
|
page read and write
|
||
1B8E4000
|
heap
|
page read and write
|
||
1BB7C000
|
heap
|
page read and write
|
||
1BCCD000
|
heap
|
page read and write
|
||
1BC27000
|
heap
|
page read and write
|
||
1D552000
|
heap
|
page read and write
|
||
1BCCC000
|
heap
|
page read and write
|
||
7FFE126E0000
|
unkown
|
page readonly
|
||
1D366000
|
heap
|
page read and write
|
||
1BB53000
|
heap
|
page read and write
|
||
1BC93000
|
heap
|
page read and write
|
||
1D48F000
|
heap
|
page read and write
|
||
1D5E5000
|
heap
|
page read and write
|
||
1BB6B000
|
heap
|
page read and write
|
||
2612000
|
heap
|
page read and write
|
||
261F000
|
heap
|
page read and write
|
||
1B904000
|
heap
|
page read and write
|
||
1BCF5000
|
heap
|
page read and write
|
||
D654B000
|
direct allocation
|
page read and write
|
||
1BC31000
|
heap
|
page read and write
|
||
1B904000
|
heap
|
page read and write
|
||
1AE7E000
|
unkown
|
page read and write
|
||
1D555000
|
heap
|
page read and write
|
||
21D3CBD7000
|
heap
|
page read and write
|
||
21D3E4BE000
|
direct allocation
|
page execute and read and write
|
||
1BF95000
|
heap
|
page read and write
|
||
D6414000
|
direct allocation
|
page read and write
|
||
1BC9D000
|
heap
|
page read and write
|
||
65EC1000
|
unkown
|
page execute read
|
||
1D309000
|
heap
|
page read and write
|
||
1BCD0000
|
heap
|
page read and write
|
||
21D3E578000
|
direct allocation
|
page execute and read and write
|
||
1BE48000
|
heap
|
page read and write
|
||
1BB10000
|
heap
|
page read and write
|
||
D65ED000
|
direct allocation
|
page read and write
|
||
1BE48000
|
heap
|
page read and write
|
||
7FF743C10000
|
unkown
|
page readonly
|
||
4FBB000
|
direct allocation
|
page execute and read and write
|
||
1B609000
|
heap
|
page read and write
|
||
1BC8A000
|
heap
|
page read and write
|
||
1BAC0000
|
heap
|
page read and write
|
||
1B8DA000
|
heap
|
page read and write
|
||
D5B82000
|
direct allocation
|
page read and write
|
||
1BB20000
|
heap
|
page read and write
|
||
D5F43000
|
direct allocation
|
page read and write
|
||
375E000
|
stack
|
page read and write
|
||
7FFE1324D000
|
unkown
|
page readonly
|
||
1B98F000
|
heap
|
page read and write
|
||
1D565000
|
heap
|
page read and write
|
||
1B974000
|
heap
|
page read and write
|
||
7FFDFF2C2000
|
unkown
|
page readonly
|
||
19795000
|
heap
|
page read and write
|
||
2612000
|
heap
|
page read and write
|
||
66634000
|
unkown
|
page read and write
|
||
21D533B0000
|
heap
|
page read and write
|
||
7FF743C4F000
|
unkown
|
page write copy
|
||
21D3E4B9000
|
direct allocation
|
page execute and read and write
|
||
1D36B000
|
heap
|
page read and write
|
||
1BEDE000
|
heap
|
page read and write
|
||
1D5EC000
|
heap
|
page read and write
|
||
2629000
|
heap
|
page read and write
|
||
D63DA000
|
direct allocation
|
page read and write
|
||
1B96D000
|
heap
|
page read and write
|
||
1B5B4000
|
heap
|
page read and write
|
||
3560000
|
heap
|
page read and write
|
||
1993C000
|
heap
|
page read and write
|
||
1BEE0000
|
heap
|
page read and write
|
||
1B8FD000
|
heap
|
page read and write
|
||
1BC92000
|
heap
|
page read and write
|
||
1B8FC000
|
heap
|
page read and write
|
||
1BBAE000
|
heap
|
page read and write
|
||
1B994000
|
heap
|
page read and write
|
||
1BCF6000
|
heap
|
page read and write
|
||
D640F000
|
direct allocation
|
page read and write
|
||
1BEE0000
|
heap
|
page read and write
|
||
1B8DB000
|
heap
|
page read and write
|
||
1B65F000
|
heap
|
page read and write
|
||
2629000
|
heap
|
page read and write
|
||
D5C19000
|
direct allocation
|
page read and write
|
||
7FF75B8C9000
|
unkown
|
page write copy
|
||
1D1B8000
|
unkown
|
page read and write
|
||
D5848000
|
direct allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
4F0E000
|
direct allocation
|
page execute and read and write
|
||
14A8D000
|
stack
|
page read and write
|
||
1B951000
|
heap
|
page read and write
|
||
D63F7000
|
direct allocation
|
page read and write
|
||
2620000
|
heap
|
page read and write
|
||
7FFE1322A000
|
unkown
|
page readonly
|
||
21D5335A000
|
heap
|
page read and write
|
||
2630000
|
heap
|
page read and write
|
||
D643D000
|
direct allocation
|
page read and write
|
||
1D34B000
|
heap
|
page read and write
|
||
21D3CCB9000
|
heap
|
page read and write
|
||
1D374000
|
heap
|
page read and write
|
||
D693B000
|
direct allocation
|
page read and write
|
||
1B872000
|
heap
|
page read and write
|
||
6646B000
|
unkown
|
page readonly
|
||
1968F000
|
direct allocation
|
page read and write
|
||
1BEF5000
|
heap
|
page read and write
|
||
21D53250000
|
heap
|
page read and write
|
||
1BD8F000
|
heap
|
page read and write
|
||
1BEAC000
|
heap
|
page read and write
|
||
1BCF6000
|
heap
|
page read and write
|
||
1D4CB000
|
heap
|
page read and write
|
||
D69A5000
|
direct allocation
|
page read and write
|
||
1BAB8000
|
heap
|
page read and write
|
||
1D3D1000
|
heap
|
page read and write
|
||
2628000
|
heap
|
page read and write
|
||
1BD01000
|
heap
|
page read and write
|
||
1BEE0000
|
heap
|
page read and write
|
||
21D3CB95000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
7FDCEFE000
|
stack
|
page read and write
|
||
1B90E000
|
heap
|
page read and write
|
||
66630000
|
unkown
|
page write copy
|
||
1AC7E000
|
unkown
|
page read and write
|
||
1B92D000
|
heap
|
page read and write
|
||
D6A76000
|
direct allocation
|
page read and write
|
||
1D3BB000
|
heap
|
page read and write
|
||
1B831000
|
heap
|
page read and write
|
||
1BE9A000
|
heap
|
page read and write
|
||
2616000
|
heap
|
page read and write
|
||
1CCC0000
|
direct allocation
|
page read and write
|
||
1D5F2000
|
heap
|
page read and write
|
||
6663D000
|
unkown
|
page read and write
|
||
1B96D000
|
heap
|
page read and write
|
||
D6090000
|
direct allocation
|
page read and write
|
||
1C7A5000
|
unkown
|
page read and write
|
||
262B000
|
heap
|
page read and write
|
||
7FFE13210000
|
unkown
|
page readonly
|
||
7FDD1FE000
|
stack
|
page read and write
|
||
1BCA6000
|
heap
|
page read and write
|
||
1BFC1000
|
heap
|
page read and write
|
||
1D5A5000
|
heap
|
page read and write
|
||
1BC17000
|
heap
|
page read and write
|
||
1E3F0000
|
direct allocation
|
page read and write
|
||
7FFE13211000
|
unkown
|
page execute read
|
||
1B8DA000
|
heap
|
page read and write
|
||
1BC9D000
|
heap
|
page read and write
|
||
7FFE1324C000
|
unkown
|
page read and write
|
||
7FF743C3E000
|
unkown
|
page readonly
|
||
1D47D000
|
heap
|
page read and write
|
||
1B951000
|
heap
|
page read and write
|
||
1B933000
|
heap
|
page read and write
|
||
1BDA2000
|
heap
|
page read and write
|
||
1BAE7000
|
heap
|
page read and write
|
||
21D52AF0000
|
heap
|
page read and write
|
||
1B4D9000
|
heap
|
page read and write
|
||
21D522F0000
|
direct allocation
|
page read and write
|
||
2760000
|
heap
|
page read and write
|
||
7FF75B914000
|
unkown
|
page readonly
|
||
2629000
|
heap
|
page read and write
|
||
1D4CB000
|
heap
|
page read and write
|
||
66652000
|
unkown
|
page read and write
|
||
1BE54000
|
heap
|
page read and write
|
||
1B993000
|
heap
|
page read and write
|
||
1BE4D000
|
heap
|
page read and write
|
||
1BE44000
|
heap
|
page read and write
|
||
66637000
|
unkown
|
page read and write
|
||
1BC53000
|
heap
|
page read and write
|
||
1BE08000
|
heap
|
page read and write
|
||
1D5B6000
|
heap
|
page read and write
|
||
7FFE126F5000
|
unkown
|
page readonly
|
||
1CEC6000
|
heap
|
page read and write
|
||
1BAB8000
|
heap
|
page read and write
|
||
1BB8D000
|
heap
|
page read and write
|
||
1C042000
|
heap
|
page read and write
|
||
1D574000
|
heap
|
page read and write
|
||
1BBDE000
|
heap
|
page read and write
|
||
1BB8E000
|
heap
|
page read and write
|
||
1BCA8000
|
heap
|
page read and write
|
||
1BC92000
|
heap
|
page read and write
|
||
1B7A0000
|
heap
|
page read and write
|
||
1BCCC000
|
heap
|
page read and write
|
||
1BCA8000
|
heap
|
page read and write
|
||
1BB2A000
|
heap
|
page read and write
|
||
D6426000
|
direct allocation
|
page read and write
|
||
1B8F4000
|
heap
|
page read and write
|
||
1B799000
|
heap
|
page read and write
|
||
1BC7B000
|
heap
|
page read and write
|
||
6646B000
|
unkown
|
page readonly
|
||
D55A8000
|
direct allocation
|
page read and write
|
||
1BC63000
|
heap
|
page read and write
|
||
3949000
|
unkown
|
page read and write
|
||
7FDCCFC000
|
stack
|
page read and write
|
||
1BB33000
|
heap
|
page read and write
|
||
65EC1000
|
unkown
|
page execute read
|
||
D5CA7000
|
direct allocation
|
page read and write
|
||
262A000
|
heap
|
page read and write
|
||
1C07A000
|
heap
|
page read and write
|
||
1BE5C000
|
heap
|
page read and write
|
||
1C014000
|
heap
|
page read and write
|
||
1BC92000
|
heap
|
page read and write
|
||
1B8D7000
|
heap
|
page read and write
|
||
1BC79000
|
heap
|
page read and write
|
||
D5E7B000
|
direct allocation
|
page read and write
|
||
1BE93000
|
heap
|
page read and write
|
||
1BB2B000
|
heap
|
page read and write
|
||
1BFED000
|
heap
|
page read and write
|
||
19850000
|
heap
|
page read and write
|
||
1D3DB000
|
heap
|
page read and write
|
||
1BF45000
|
heap
|
page read and write
|
||
1B880000
|
heap
|
page read and write
|
||
1BE48000
|
heap
|
page read and write
|
||
1D45C000
|
heap
|
page read and write
|
||
21D3CB90000
|
heap
|
page read and write
|
||
7FF743C52000
|
unkown
|
page readonly
|
||
1BE90000
|
heap
|
page read and write
|
||
7FFE13239000
|
unkown
|
page readonly
|
||
66697000
|
unkown
|
page read and write
|
||
1B938000
|
heap
|
page read and write
|
||
7FFE13241000
|
unkown
|
page execute read
|
||
1BB97000
|
heap
|
page read and write
|
||
1C8C0000
|
heap
|
page read and write
|
||
1BD01000
|
heap
|
page read and write
|
||
1D4D3000
|
heap
|
page read and write
|
||
1B5BA000
|
heap
|
page read and write
|
||
1BB44000
|
heap
|
page read and write
|
||
1BCB1000
|
heap
|
page read and write
|
||
D691D000
|
direct allocation
|
page read and write
|
||
1C04D000
|
heap
|
page read and write
|
||
1BDAF000
|
heap
|
page read and write
|
||
1BE87000
|
heap
|
page read and write
|
||
1BCF6000
|
heap
|
page read and write
|
||
D617B000
|
direct allocation
|
page read and write
|
||
1BB67000
|
heap
|
page read and write
|
||
1BD53000
|
heap
|
page read and write
|
||
7FDDDFE000
|
unkown
|
page read and write
|
||
1BA8C000
|
heap
|
page read and write
|
||
13EC0000
|
direct allocation
|
page read and write
|
||
1478D000
|
stack
|
page read and write
|
||
1B938000
|
heap
|
page read and write
|
||
1B8FC000
|
heap
|
page read and write
|
||
1BCA2000
|
heap
|
page read and write
|
||
7FFDFF2FF000
|
unkown
|
page read and write
|
||
1B90E000
|
heap
|
page read and write
|
||
1BB67000
|
heap
|
page read and write
|
||
1BDA2000
|
heap
|
page read and write
|
||
1B7B0000
|
heap
|
page read and write
|
||
1D5BD000
|
heap
|
page read and write
|
||
1D403000
|
heap
|
page read and write
|
||
198D4000
|
heap
|
page read and write
|
||
1BD29000
|
heap
|
page read and write
|
||
D58A3000
|
direct allocation
|
page read and write
|
||
1D3C4000
|
heap
|
page read and write
|
||
D595B000
|
direct allocation
|
page read and write
|
||
1BC0F000
|
heap
|
page read and write
|
||
D6A7A000
|
direct allocation
|
page read and write
|
||
2765000
|
heap
|
page read and write
|
||
1BC92000
|
heap
|
page read and write
|
||
1C4BE000
|
unkown
|
page read and write
|
||
1B92D000
|
heap
|
page read and write
|
||
1BF95000
|
heap
|
page read and write
|
||
4FCD000
|
direct allocation
|
page execute and read and write
|
||
1B4D4000
|
heap
|
page read and write
|
||
1BAE7000
|
heap
|
page read and write
|
||
D610E000
|
direct allocation
|
page read and write
|
||
1BF0D000
|
heap
|
page read and write
|
||
1B8E8000
|
heap
|
page read and write
|
||
66635000
|
unkown
|
page write copy
|
||
1BDA2000
|
heap
|
page read and write
|
||
1C05B000
|
heap
|
page read and write
|
||
19943000
|
heap
|
page read and write
|
||
1BCFA000
|
heap
|
page read and write
|
||
1B994000
|
heap
|
page read and write
|
||
D647B000
|
direct allocation
|
page read and write
|
||
1C03D000
|
heap
|
page read and write
|
||
7FF743C55000
|
unkown
|
page readonly
|
||
1BB8D000
|
heap
|
page read and write
|
||
1B5EA000
|
heap
|
page read and write
|
||
1B8E8000
|
heap
|
page read and write
|
||
1BE4D000
|
heap
|
page read and write
|
||
1D2C1000
|
heap
|
page read and write
|
||
1BE87000
|
heap
|
page read and write
|
||
D64DF000
|
direct allocation
|
page read and write
|
||
1BCF6000
|
heap
|
page read and write
|
||
66697000
|
unkown
|
page read and write
|
||
356E000
|
heap
|
page read and write
|
||
1D474000
|
heap
|
page read and write
|
||
1BC4F000
|
heap
|
page read and write
|
||
1D464000
|
heap
|
page read and write
|
||
1BE87000
|
heap
|
page read and write
|
||
1B98B000
|
heap
|
page read and write
|
||
1D35B000
|
heap
|
page read and write
|
||
1BC33000
|
heap
|
page read and write
|
||
1BAF0000
|
heap
|
page read and write
|
||
1BF8D000
|
heap
|
page read and write
|
||
1BBF6000
|
heap
|
page read and write
|
||
1B738000
|
heap
|
page read and write
|
||
7FFE1330D000
|
unkown
|
page readonly
|
||
1BC34000
|
heap
|
page read and write
|
||
1D332000
|
heap
|
page read and write
|
||
D5E3A000
|
direct allocation
|
page read and write
|
||
7FDD7FE000
|
unkown
|
page read and write
|
||
1BF10000
|
heap
|
page read and write
|
||
1BEA4000
|
heap
|
page read and write
|
||
1BCB8000
|
heap
|
page read and write
|
||
7FF743C10000
|
unkown
|
page readonly
|
||
1B933000
|
heap
|
page read and write
|
||
1B838000
|
heap
|
page read and write
|
||
1B938000
|
heap
|
page read and write
|
||
1BCC1000
|
heap
|
page read and write
|
||
2617000
|
heap
|
page read and write
|
||
1BEDE000
|
heap
|
page read and write
|
||
1BF95000
|
heap
|
page read and write
|
||
1D3C4000
|
heap
|
page read and write
|
||
2629000
|
heap
|
page read and write
|
||
D64DB000
|
direct allocation
|
page read and write
|
||
1D2F1000
|
heap
|
page read and write
|
||
1D379000
|
heap
|
page read and write
|
||
1D34B000
|
heap
|
page read and write
|
||
D57DB000
|
direct allocation
|
page read and write
|
||
1D3BB000
|
heap
|
page read and write
|
||
1B959000
|
heap
|
page read and write
|
||
1BD01000
|
heap
|
page read and write
|
||
1B8E8000
|
heap
|
page read and write
|
||
1BF27000
|
heap
|
page read and write
|
||
1B8C2000
|
heap
|
page read and write
|
||
1D4D2000
|
heap
|
page read and write
|
||
6663F000
|
unkown
|
page write copy
|
||
1BD42000
|
heap
|
page read and write
|
||
1D45C000
|
heap
|
page read and write
|
||
1B951000
|
heap
|
page read and write
|
||
6669F000
|
unkown
|
page read and write
|
||
1BF27000
|
heap
|
page read and write
|
||
1B924000
|
heap
|
page read and write
|
||
4F05000
|
direct allocation
|
page execute and read and write
|
||
1BB0E000
|
heap
|
page read and write
|
||
1BB84000
|
heap
|
page read and write
|
||
1D5C6000
|
heap
|
page read and write
|
||
6663F000
|
unkown
|
page write copy
|
||
356A000
|
heap
|
page read and write
|
||
66656000
|
unkown
|
page read and write
|
||
1BDA2000
|
heap
|
page read and write
|
||
1BECD000
|
heap
|
page read and write
|
||
1BCA3000
|
heap
|
page read and write
|
||
1B98C000
|
heap
|
page read and write
|
||
1D5C6000
|
heap
|
page read and write
|
||
7FDCDFE000
|
stack
|
page read and write
|
||
1B741000
|
heap
|
page read and write
|
||
1D589000
|
heap
|
page read and write
|
||
B54000
|
heap
|
page read and write
|
||
D55BB000
|
direct allocation
|
page read and write
|
||
1D5EC000
|
heap
|
page read and write
|
||
1B47D000
|
stack
|
page read and write
|
||
1BF95000
|
heap
|
page read and write
|
||
D5B7A000
|
direct allocation
|
page read and write
|
||
1BB8B000
|
heap
|
page read and write
|
||
1BF27000
|
heap
|
page read and write
|
||
1BBA7000
|
heap
|
page read and write
|
||
1BFE4000
|
heap
|
page read and write
|
||
1BD01000
|
heap
|
page read and write
|
||
D6883000
|
direct allocation
|
page read and write
|
||
1BC79000
|
heap
|
page read and write
|
||
21D533A7000
|
heap
|
page read and write
|
||
1C7AA000
|
unkown
|
page read and write
|
||
261A000
|
heap
|
page read and write
|
||
7FFE126E1000
|
unkown
|
page execute read
|
||
1B924000
|
heap
|
page read and write
|
||
1D4C6000
|
heap
|
page read and write
|
||
1D5E6000
|
heap
|
page read and write
|
||
1BC3C000
|
heap
|
page read and write
|
||
1BC9D000
|
heap
|
page read and write
|
||
6662E000
|
unkown
|
page read and write
|
||
1BC6A000
|
heap
|
page read and write
|
||
1BC92000
|
heap
|
page read and write
|
||
1BC73000
|
heap
|
page read and write
|
||
D661F000
|
direct allocation
|
page read and write
|
||
1BD3B000
|
heap
|
page read and write
|
||
1D403000
|
heap
|
page read and write
|
||
1B924000
|
heap
|
page read and write
|
||
D5E36000
|
direct allocation
|
page read and write
|
||
1B8CA000
|
heap
|
page read and write
|
||
1BE44000
|
heap
|
page read and write
|
||
1BA9F000
|
heap
|
page read and write
|
||
D579B000
|
direct allocation
|
page read and write
|
||
1C5BE000
|
unkown
|
page read and write
|
||
1BB2A000
|
heap
|
page read and write
|
||
1BB2A000
|
heap
|
page read and write
|
||
D6404000
|
direct allocation
|
page read and write
|
||
1BD71000
|
heap
|
page read and write
|
||
1BBFD000
|
heap
|
page read and write
|
||
21D3CC13000
|
heap
|
page read and write
|
||
1B90E000
|
heap
|
page read and write
|
||
1D49C000
|
heap
|
page read and write
|
||
21D52B4C000
|
heap
|
page read and write
|
||
1B8D2000
|
heap
|
page read and write
|
||
1B078000
|
unkown
|
page read and write
|
||
7FDDAFA000
|
unkown
|
page read and write
|
||
21D3CCB0000
|
heap
|
page read and write
|
||
21D53368000
|
heap
|
page read and write
|
||
1BF75000
|
heap
|
page read and write
|
||
21D3E4C8000
|
direct allocation
|
page execute and read and write
|
||
21D52B0C000
|
heap
|
page read and write
|
||
B82000
|
heap
|
page read and write
|
||
28F0000
|
unkown
|
page read and write
|
||
D63FD000
|
direct allocation
|
page read and write
|
||
1B751000
|
heap
|
page read and write
|
||
1BC8B000
|
heap
|
page read and write
|
||
1BCEC000
|
heap
|
page read and write
|
||
261D000
|
heap
|
page read and write
|
||
1BCD0000
|
heap
|
page read and write
|
||
1C04C000
|
heap
|
page read and write
|
||
7FFDFF300000
|
unkown
|
page write copy
|
||
1C042000
|
heap
|
page read and write
|
||
D67E9000
|
direct allocation
|
page read and write
|
||
1D5C5000
|
heap
|
page read and write
|
||
1498D000
|
stack
|
page read and write
|
||
1BC49000
|
heap
|
page read and write
|
||
D5898000
|
direct allocation
|
page read and write
|
||
1B924000
|
heap
|
page read and write
|
||
21D3CA00000
|
heap
|
page read and write
|
||
1BFB0000
|
heap
|
page read and write
|
||
1BCA8000
|
heap
|
page read and write
|
||
1BB93000
|
heap
|
page read and write
|
||
1D494000
|
heap
|
page read and write
|
||
1B728000
|
heap
|
page read and write
|
||
261F000
|
heap
|
page read and write
|
||
21D3E470000
|
direct allocation
|
page execute and read and write
|
||
21D3CBD0000
|
heap
|
page read and write
|
||
1BB9B000
|
heap
|
page read and write
|
||
1BE08000
|
heap
|
page read and write
|
||
D5580000
|
direct allocation
|
page read and write
|
||
1D3C9000
|
heap
|
page read and write
|
||
1B888000
|
heap
|
page read and write
|
||
1BDA2000
|
heap
|
page read and write
|
||
21D52B65000
|
heap
|
page read and write
|
||
D6A73000
|
direct allocation
|
page read and write
|
||
1BB8D000
|
heap
|
page read and write
|
||
D5C8C000
|
direct allocation
|
page read and write
|
||
7FFE13235000
|
unkown
|
page read and write
|
||
7FFE13237000
|
unkown
|
page readonly
|
||
1B974000
|
heap
|
page read and write
|
||
1BCD0000
|
heap
|
page read and write
|
||
1BAE9000
|
heap
|
page read and write
|
||
1B94E000
|
heap
|
page read and write
|
||
1BD01000
|
heap
|
page read and write
|
||
1D5F2000
|
heap
|
page read and write
|
||
1D5C5000
|
heap
|
page read and write
|
||
1BD90000
|
heap
|
page read and write
|
||
1BF95000
|
heap
|
page read and write
|
||
2612000
|
heap
|
page read and write
|
||
1CCBE000
|
direct allocation
|
page read and write
|
||
1B949000
|
heap
|
page read and write
|
||
1D48F000
|
heap
|
page read and write
|
||
B8B000
|
heap
|
page read and write
|
||
1BF85000
|
heap
|
page read and write
|
||
D55B6000
|
direct allocation
|
page read and write
|
||
1BA16000
|
heap
|
page read and write
|
||
1B7F9000
|
heap
|
page read and write
|
||
1BFE4000
|
heap
|
page read and write
|
||
666A4000
|
unkown
|
page readonly
|
||
198D4000
|
heap
|
page read and write
|
||
1BAF8000
|
heap
|
page read and write
|
||
1BEDE000
|
heap
|
page read and write
|
||
1BFC1000
|
heap
|
page read and write
|
||
D6409000
|
direct allocation
|
page read and write
|
||
19771000
|
heap
|
page read and write
|
||
1BF46000
|
heap
|
page read and write
|
||
7FF743C11000
|
unkown
|
page execute read
|
||
1BBB7000
|
heap
|
page read and write
|
||
1C044000
|
heap
|
page read and write
|
||
1BE48000
|
heap
|
page read and write
|
||
1ED3F000
|
stack
|
page read and write
|
||
1B768000
|
heap
|
page read and write
|
||
D5593000
|
direct allocation
|
page read and write
|
||
1BCC8000
|
heap
|
page read and write
|
||
1BB2A000
|
heap
|
page read and write
|
||
1D5F5000
|
heap
|
page read and write
|
||
18E90000
|
direct allocation
|
page read and write
|
||
1BE02000
|
heap
|
page read and write
|
||
D5F4D000
|
direct allocation
|
page read and write
|
||
66630000
|
unkown
|
page write copy
|
||
1C054000
|
heap
|
page read and write
|
||
1BC49000
|
heap
|
page read and write
|
||
1B639000
|
heap
|
page read and write
|
||
1BDAE000
|
heap
|
page read and write
|
||
1D57C000
|
heap
|
page read and write
|
||
1BC62000
|
heap
|
page read and write
|
||
1C03D000
|
heap
|
page read and write
|
||
4EC5000
|
direct allocation
|
page execute and read and write
|
||
1BD3A000
|
heap
|
page read and write
|
||
1BC3B000
|
heap
|
page read and write
|
||
1BCD2000
|
heap
|
page read and write
|
||
1B951000
|
heap
|
page read and write
|
||
1D5C5000
|
heap
|
page read and write
|
||
1B27B000
|
unkown
|
page read and write
|
||
1BF8D000
|
heap
|
page read and write
|
||
6663A000
|
unkown
|
page write copy
|
||
7FDD2FE000
|
stack
|
page read and write
|
||
1BEE0000
|
heap
|
page read and write
|
||
21D3E4EC000
|
direct allocation
|
page execute and read and write
|
||
66692000
|
unkown
|
page read and write
|
||
66651000
|
unkown
|
page write copy
|
||
1B8E2000
|
heap
|
page read and write
|
||
D6095000
|
direct allocation
|
page read and write
|
||
1BC2F000
|
heap
|
page read and write
|
||
1BCA6000
|
heap
|
page read and write
|
||
1BCF6000
|
heap
|
page read and write
|
||
7FDCFFE000
|
stack
|
page read and write
|
||
66692000
|
unkown
|
page read and write
|
||
1BC82000
|
heap
|
page read and write
|
||
1BB82000
|
heap
|
page read and write
|
||
1B85B000
|
heap
|
page read and write
|
||
1CAC8000
|
heap
|
page read and write
|
||
1BB8D000
|
heap
|
page read and write
|
||
7FF743C4F000
|
unkown
|
page read and write
|
||
1BCA8000
|
heap
|
page read and write
|
||
66676000
|
unkown
|
page read and write
|
||
1BFE5000
|
heap
|
page read and write
|
||
1B821000
|
heap
|
page read and write
|
||
D6A70000
|
direct allocation
|
page read and write
|
||
D63DC000
|
direct allocation
|
page read and write
|
||
1CEBF000
|
direct allocation
|
page read and write
|
||
1BCD0000
|
heap
|
page read and write
|
||
1BCB8000
|
heap
|
page read and write
|
||
1B5F7000
|
heap
|
page read and write
|
||
1BCF6000
|
heap
|
page read and write
|
||
7FDDBFE000
|
unkown
|
page read and write
|
||
21D52B11000
|
heap
|
page read and write
|
||
1BE5C000
|
heap
|
page read and write
|
||
1B904000
|
heap
|
page read and write
|
||
1D5E6000
|
heap
|
page read and write
|
||
1BBA7000
|
heap
|
page read and write
|
||
1B8D2000
|
heap
|
page read and write
|
||
1BBF7000
|
heap
|
page read and write
|
||
1BE60000
|
heap
|
page read and write
|
||
1CE50000
|
direct allocation
|
page read and write
|
||
1BE5C000
|
heap
|
page read and write
|
||
1B90E000
|
heap
|
page read and write
|
||
1D4CB000
|
heap
|
page read and write
|
||
1BCA6000
|
heap
|
page read and write
|
||
1BDF2000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
1B8DB000
|
heap
|
page read and write
|
||
1BD73000
|
heap
|
page read and write
|
||
21D5339F000
|
heap
|
page read and write
|
||
D5A9A000
|
direct allocation
|
page read and write
|
||
1D3DD000
|
heap
|
page read and write
|
||
1BAF8000
|
heap
|
page read and write
|
||
1BEDD000
|
heap
|
page read and write
|
||
7FDD3FD000
|
stack
|
page read and write
|
||
1BDFB000
|
heap
|
page read and write
|
||
1BE48000
|
heap
|
page read and write
|
||
1C015000
|
heap
|
page read and write
|
||
D61A3000
|
direct allocation
|
page read and write
|
||
1D59E000
|
heap
|
page read and write
|
||
1BD11000
|
heap
|
page read and write
|
||
1B5C2000
|
heap
|
page read and write
|
||
1D328000
|
heap
|
page read and write
|
||
1BFEC000
|
heap
|
page read and write
|
||
1B178000
|
unkown
|
page read and write
|
||
D57C8000
|
direct allocation
|
page read and write
|
||
1BDF0000
|
heap
|
page read and write
|
||
6669F000
|
unkown
|
page read and write
|
||
1D5C5000
|
heap
|
page read and write
|
||
1B924000
|
heap
|
page read and write
|
||
1BCF6000
|
heap
|
page read and write
|
||
2860000
|
heap
|
page read and write
|
||
66633000
|
unkown
|
page write copy
|
||
1B85B000
|
heap
|
page read and write
|
||
1BCB8000
|
heap
|
page read and write
|
||
1B7D0000
|
heap
|
page read and write
|
||
1B8FC000
|
heap
|
page read and write
|
||
B38000
|
heap
|
page read and write
|
||
1BD01000
|
heap
|
page read and write
|
||
1BAB9000
|
heap
|
page read and write
|
||
D5F9F000
|
direct allocation
|
page read and write
|
||
1BB97000
|
heap
|
page read and write
|
||
7FDD4FD000
|
stack
|
page read and write
|
||
1BC33000
|
heap
|
page read and write
|
||
1BC1E000
|
heap
|
page read and write
|
||
1BAB1000
|
heap
|
page read and write
|
||
1D5C5000
|
heap
|
page read and write
|
||
1BE4D000
|
heap
|
page read and write
|
||
1C02C000
|
heap
|
page read and write
|
||
3748000
|
stack
|
page read and write
|
||
1BB53000
|
heap
|
page read and write
|
||
D641C000
|
direct allocation
|
page read and write
|
||
1B8F5000
|
heap
|
page read and write
|
||
261A000
|
heap
|
page read and write
|
||
2623000
|
heap
|
page read and write
|
||
4EC0000
|
direct allocation
|
page execute and read and write
|
||
D6642000
|
direct allocation
|
page read and write
|
||
21D5337C000
|
heap
|
page read and write
|
||
1BCCC000
|
heap
|
page read and write
|
||
1B828000
|
heap
|
page read and write
|
||
1BB0E000
|
heap
|
page read and write
|
||
1D48F000
|
heap
|
page read and write
|
||
1BCDD000
|
heap
|
page read and write
|
||
7FF743C3E000
|
unkown
|
page readonly
|
||
1BB9B000
|
heap
|
page read and write
|
||
1BD71000
|
heap
|
page read and write
|
||
66654000
|
unkown
|
page write copy
|
||
1D45C000
|
heap
|
page read and write
|
||
D67D2000
|
direct allocation
|
page read and write
|
||
7FF75B860000
|
unkown
|
page readonly
|
||
D5BD4000
|
direct allocation
|
page read and write
|
||
1BCCC000
|
heap
|
page read and write
|
||
7FDD6FE000
|
unkown
|
page read and write
|
||
1BB64000
|
heap
|
page read and write
|
||
1BEDC000
|
heap
|
page read and write
|
||
1BE44000
|
heap
|
page read and write
|
||
1BCD2000
|
heap
|
page read and write
|
||
21D52BF5000
|
heap
|
page read and write
|
||
1BC33000
|
heap
|
page read and write
|
||
1BCD4000
|
heap
|
page read and write
|
||
1BF5A000
|
heap
|
page read and write
|
||
1B951000
|
heap
|
page read and write
|
||
1BFEC000
|
heap
|
page read and write
|
||
21D53386000
|
heap
|
page read and write
|
||
1CAC0000
|
direct allocation
|
page read and write
|
||
1BEDE000
|
heap
|
page read and write
|
||
D55A5000
|
direct allocation
|
page read and write
|
||
276A000
|
heap
|
page read and write
|
||
100000000
|
direct allocation
|
page read and write
|
||
1B904000
|
heap
|
page read and write
|
||
7FFE126F4000
|
unkown
|
page read and write
|
||
D58D4000
|
direct allocation
|
page read and write
|
||
D6411000
|
direct allocation
|
page read and write
|
||
1BADD000
|
heap
|
page read and write
|
||
1BF82000
|
heap
|
page read and write
|
||
65EC0000
|
unkown
|
page readonly
|
||
1BD01000
|
heap
|
page read and write
|
||
1BC82000
|
heap
|
page read and write
|
||
1CCB2000
|
direct allocation
|
page read and write
|
||
66654000
|
unkown
|
page write copy
|
||
1BE66000
|
heap
|
page read and write
|
||
7FFDFF270000
|
unkown
|
page readonly
|
||
1EF3E000
|
stack
|
page read and write
|
||
1BC9A000
|
heap
|
page read and write
|
||
1BCD0000
|
heap
|
page read and write
|
||
1BAF8000
|
heap
|
page read and write
|
||
1B7A0000
|
heap
|
page read and write
|
||
1B8E4000
|
heap
|
page read and write
|
||
7FF75B861000
|
unkown
|
page execute read
|
||
D55A1000
|
direct allocation
|
page read and write
|
||
1BCD4000
|
heap
|
page read and write
|
||
1B7A0000
|
heap
|
page read and write
|
||
1BAC1000
|
heap
|
page read and write
|
||
D6547000
|
direct allocation
|
page read and write
|
||
1BCCC000
|
heap
|
page read and write
|
||
66651000
|
unkown
|
page write copy
|
||
1B523000
|
heap
|
page read and write
|
||
D641A000
|
direct allocation
|
page read and write
|
||
1B951000
|
heap
|
page read and write
|
||
1BC62000
|
heap
|
page read and write
|
||
1D332000
|
heap
|
page read and write
|
||
1B90F000
|
heap
|
page read and write
|
||
1BFE4000
|
heap
|
page read and write
|
||
D6338000
|
direct allocation
|
page read and write
|
||
1BC5A000
|
heap
|
page read and write
|
||
1BB82000
|
heap
|
page read and write
|
||
D587A000
|
direct allocation
|
page read and write
|
||
1BF18000
|
heap
|
page read and write
|
||
21D52B5E000
|
heap
|
page read and write
|
||
2629000
|
heap
|
page read and write
|
||
66659000
|
unkown
|
page write copy
|
||
2629000
|
heap
|
page read and write
|
||
1B4CC000
|
heap
|
page read and write
|
||
1B881000
|
heap
|
page read and write
|
||
1C3BE000
|
direct allocation
|
page read and write
|
||
1D3C9000
|
heap
|
page read and write
|
||
7FF743C52000
|
unkown
|
page readonly
|
||
D5F81000
|
direct allocation
|
page read and write
|
||
D588D000
|
direct allocation
|
page read and write
|
||
1BDF0000
|
heap
|
page read and write
|
||
262C000
|
heap
|
page read and write
|
||
1D40C000
|
heap
|
page read and write
|
||
D6894000
|
direct allocation
|
page read and write
|
||
25D0000
|
heap
|
page read and write
|
||
198B0000
|
heap
|
page read and write
|
||
1D5F5000
|
heap
|
page read and write
|
||
66633000
|
unkown
|
page write copy
|
||
1D34B000
|
heap
|
page read and write
|
||
D5FC2000
|
direct allocation
|
page read and write
|
||
1BCCC000
|
heap
|
page read and write
|
||
1BECC000
|
heap
|
page read and write
|
||
1BCF6000
|
heap
|
page read and write
|
||
D5626000
|
direct allocation
|
page read and write
|
||
D5887000
|
direct allocation
|
page read and write
|
||
1BCD4000
|
heap
|
page read and write
|
||
1B90B000
|
heap
|
page read and write
|
||
D6B3C000
|
direct allocation
|
page read and write
|
||
1B94E000
|
heap
|
page read and write
|
||
7AD000
|
stack
|
page read and write
|
||
1BCD2000
|
heap
|
page read and write
|
||
1BFC1000
|
heap
|
page read and write
|
||
2612000
|
heap
|
page read and write
|
||
2614000
|
heap
|
page read and write
|
||
1BAA9000
|
heap
|
page read and write
|
||
1C6B6000
|
unkown
|
page read and write
|
||
1B854000
|
heap
|
page read and write
|
||
1B705000
|
heap
|
page read and write
|
||
1D3D1000
|
heap
|
page read and write
|
||
1B629000
|
heap
|
page read and write
|
||
1D5EC000
|
heap
|
page read and write
|
||
1BD6A000
|
heap
|
page read and write
|
||
21D532F0000
|
heap
|
page read and write
|
||
1B905000
|
heap
|
page read and write
|
||
1BE13000
|
heap
|
page read and write
|
||
1BCB8000
|
heap
|
page read and write
|
||
1BE8E000
|
heap
|
page read and write
|
||
1BE27000
|
heap
|
page read and write
|
||
1D3F0000
|
heap
|
page read and write
|
||
1D328000
|
heap
|
page read and write
|
||
1BF85000
|
heap
|
page read and write
|
||
1BE44000
|
heap
|
page read and write
|
||
1BB97000
|
heap
|
page read and write
|
||
1BAD9000
|
heap
|
page read and write
|
||
1D328000
|
heap
|
page read and write
|
||
1BB8E000
|
heap
|
page read and write
|
||
261D000
|
heap
|
page read and write
|
||
1980E000
|
heap
|
page read and write
|
||
1BE12000
|
heap
|
page read and write
|
||
2913000
|
heap
|
page read and write
|
||
D5BF6000
|
direct allocation
|
page read and write
|
||
1B8E8000
|
heap
|
page read and write
|
||
1BCD2000
|
heap
|
page read and write
|
||
1BCCC000
|
heap
|
page read and write
|
||
66635000
|
unkown
|
page write copy
|
||
1D5F5000
|
heap
|
page read and write
|
||
1B951000
|
heap
|
page read and write
|
||
1B5BA000
|
heap
|
page read and write
|
||
1B5E3000
|
heap
|
page read and write
|
||
1B6A7000
|
heap
|
page read and write
|
||
1D5C5000
|
heap
|
page read and write
|
||
1CEBB000
|
direct allocation
|
page read and write
|
||
1BBFD000
|
heap
|
page read and write
|
||
1BB5B000
|
heap
|
page read and write
|
||
1B670000
|
heap
|
page read and write
|
||
1D2C0000
|
heap
|
page read and write
|
||
1BBBE000
|
heap
|
page read and write
|
||
1BE8C000
|
heap
|
page read and write
|
||
1D57F000
|
heap
|
page read and write
|
||
2629000
|
heap
|
page read and write
|
||
1BDA2000
|
heap
|
page read and write
|
||
1B8D7000
|
heap
|
page read and write
|
||
1B949000
|
heap
|
page read and write
|
||
1B759000
|
heap
|
page read and write
|
||
2618000
|
heap
|
page read and write
|
||
1BCD0000
|
heap
|
page read and write
|
||
1BF85000
|
heap
|
page read and write
|
||
1AA7E000
|
stack
|
page read and write
|
||
1BCCC000
|
heap
|
page read and write
|
||
1B8ED000
|
heap
|
page read and write
|
||
1BBB6000
|
heap
|
page read and write
|
||
66676000
|
unkown
|
page read and write
|
||
2743000
|
heap
|
page read and write
|
||
274B000
|
heap
|
page read and write
|
||
D5B7D000
|
direct allocation
|
page read and write
|
||
1BC9D000
|
heap
|
page read and write
|
||
1D49D000
|
heap
|
page read and write
|
||
1BBCF000
|
heap
|
page read and write
|
||
D57B7000
|
direct allocation
|
page read and write
|
||
1BFCA000
|
heap
|
page read and write
|
||
1B9D5000
|
heap
|
page read and write
|
||
66659000
|
unkown
|
page write copy
|
||
1D2C3000
|
heap
|
page read and write
|
||
1B90B000
|
heap
|
page read and write
|
||
D5923000
|
direct allocation
|
page read and write
|
||
1B8E2000
|
heap
|
page read and write
|
||
21D3E4B5000
|
direct allocation
|
page execute and read and write
|
||
6663A000
|
unkown
|
page write copy
|
||
1BCD2000
|
heap
|
page read and write
|
||
7FFE13240000
|
unkown
|
page readonly
|
||
1B8FC000
|
heap
|
page read and write
|
||
1BB2B000
|
heap
|
page read and write
|
||
1BE44000
|
heap
|
page read and write
|
||
1BD32000
|
heap
|
page read and write
|
||
1BE48000
|
heap
|
page read and write
|
||
1BC9D000
|
heap
|
page read and write
|
||
1B8AA000
|
heap
|
page read and write
|
||
D55B7000
|
direct allocation
|
page read and write
|
||
1BBB6000
|
heap
|
page read and write
|
||
1BE44000
|
heap
|
page read and write
|
||
1B760000
|
heap
|
page read and write
|
||
1BF6F000
|
heap
|
page read and write
|
||
666A4000
|
unkown
|
page readonly
|
||
1BF50000
|
heap
|
page read and write
|
||
7FFDFF309000
|
unkown
|
page readonly
|
||
3945000
|
unkown
|
page read and write
|
||
D6630000
|
direct allocation
|
page read and write
|
||
1D48F000
|
heap
|
page read and write
|
||
1B994000
|
heap
|
page read and write
|
||
1B4DB000
|
heap
|
page read and write
|
||
1BF76000
|
heap
|
page read and write
|
||
2740000
|
heap
|
page read and write
|
||
D60DD000
|
direct allocation
|
page read and write
|
||
D641F000
|
direct allocation
|
page read and write
|
||
21D52B1D000
|
heap
|
page read and write
|
||
1B889000
|
heap
|
page read and write
|
||
1D332000
|
heap
|
page read and write
|
||
1D33C000
|
heap
|
page read and write
|
||
1D58D000
|
heap
|
page read and write
|
||
7FF75B8AA000
|
unkown
|
page readonly
|
||
1BEAC000
|
heap
|
page read and write
|
||
7FF743C59000
|
unkown
|
page readonly
|
||
1BC92000
|
heap
|
page read and write
|
||
1BAE7000
|
heap
|
page read and write
|
||
1BE27000
|
heap
|
page read and write
|
||
1BCFA000
|
heap
|
page read and write
|
||
1BFB0000
|
heap
|
page read and write
|
||
7FFE13300000
|
unkown
|
page readonly
|
||
1C014000
|
heap
|
page read and write
|
||
1D2D0000
|
heap
|
page read and write
|
||
1BB6B000
|
heap
|
page read and write
|
||
D667D000
|
direct allocation
|
page read and write
|
||
7FFE13301000
|
unkown
|
page execute read
|
||
D5876000
|
direct allocation
|
page read and write
|
||
1B736000
|
heap
|
page read and write
|
||
1D2C7000
|
heap
|
page read and write
|
||
1B99B000
|
heap
|
page read and write
|
||
7FFDFF271000
|
unkown
|
page execute read
|
||
21D3E56B000
|
direct allocation
|
page execute and read and write
|
||
1D5BD000
|
heap
|
page read and write
|
||
D5B89000
|
direct allocation
|
page read and write
|
||
1B7F0000
|
heap
|
page read and write
|
||
1BB08000
|
heap
|
page read and write
|
||
7FFE13311000
|
unkown
|
page read and write
|
||
1B4C2000
|
heap
|
page read and write
|
||
1BE48000
|
heap
|
page read and write
|
||
1BB01000
|
heap
|
page read and write
|
||
1D5F2000
|
heap
|
page read and write
|
||
7FDD9FE000
|
unkown
|
page read and write
|
||
1AB7D000
|
unkown
|
page read and write
|
||
7FF743C55000
|
unkown
|
page readonly
|
||
1B917000
|
heap
|
page read and write
|
||
1BE44000
|
heap
|
page read and write
|
||
2624000
|
heap
|
page read and write
|
||
1BF95000
|
heap
|
page read and write
|
||
2614000
|
heap
|
page read and write
|
||
1B71A000
|
heap
|
page read and write
|
||
D6A6E000
|
direct allocation
|
page read and write
|
||
6664F000
|
unkown
|
page read and write
|
||
1BE27000
|
heap
|
page read and write
|
||
21D53315000
|
heap
|
page read and write
|
||
1B940000
|
heap
|
page read and write
|
||
1BD01000
|
heap
|
page read and write
|
||
1CEC0000
|
direct allocation
|
page read and write
|
||
1D3C6000
|
heap
|
page read and write
|
||
7FFE126ED000
|
unkown
|
page readonly
|
||
1C01D000
|
heap
|
page read and write
|
||
1B620000
|
heap
|
page read and write
|
||
7B3000
|
stack
|
page read and write
|
||
1B687000
|
heap
|
page read and write
|
||
1D5C5000
|
heap
|
page read and write
|
||
1BCFA000
|
heap
|
page read and write
|
||
1B924000
|
heap
|
page read and write
|
||
D63F9000
|
direct allocation
|
page read and write
|
||
1B610000
|
heap
|
page read and write
|
||
21D3CAE0000
|
heap
|
page read and write
|
||
1B924000
|
heap
|
page read and write
|
||
6663D000
|
unkown
|
page read and write
|
||
1BF33000
|
heap
|
page read and write
|
||
1D3C6000
|
heap
|
page read and write
|
||
B85000
|
heap
|
page read and write
|
||
1B904000
|
heap
|
page read and write
|
||
D65D7000
|
direct allocation
|
page read and write
|
||
D6431000
|
direct allocation
|
page read and write
|
||
B7C000
|
heap
|
page read and write
|
||
198C4000
|
heap
|
page read and write
|
||
1B780000
|
heap
|
page read and write
|
||
1D40C000
|
heap
|
page read and write
|
||
1B771000
|
heap
|
page read and write
|
||
1BCA6000
|
heap
|
page read and write
|
||
7FDDCFC000
|
unkown
|
page read and write
|
||
2D60000
|
trusted library allocation
|
page read and write
|
||
66652000
|
unkown
|
page read and write
|
||
1D332000
|
heap
|
page read and write
|
||
B50000
|
heap
|
page read and write
|
||
4F18000
|
direct allocation
|
page execute and read and write
|
||
2624000
|
heap
|
page read and write
|
||
7FF743C11000
|
unkown
|
page execute read
|
||
1B5FE000
|
heap
|
page read and write
|
||
4FAD000
|
direct allocation
|
page execute and read and write
|
||
1B949000
|
heap
|
page read and write
|
||
7FFE13248000
|
unkown
|
page readonly
|
||
1BCCC000
|
heap
|
page read and write
|
||
1B951000
|
heap
|
page read and write
|
||
1D3C9000
|
heap
|
page read and write
|
||
1D5F5000
|
heap
|
page read and write
|
||
7FFDFF303000
|
unkown
|
page readonly
|
||
D5580000
|
direct allocation
|
page read and write
|
||
1B37E000
|
unkown
|
page read and write
|
||
1BFC8000
|
heap
|
page read and write
|
||
1B90E000
|
heap
|
page read and write
|
||
1B993000
|
heap
|
page read and write
|
||
1BFCC000
|
heap
|
page read and write
|
||
1C044000
|
heap
|
page read and write
|
||
21D3E4D1000
|
direct allocation
|
page execute and read and write
|
||
2629000
|
heap
|
page read and write
|
||
2910000
|
heap
|
page read and write
|
||
1B938000
|
heap
|
page read and write
|
||
D5C33000
|
direct allocation
|
page read and write
|
||
1BCF6000
|
heap
|
page read and write
|
||
1D589000
|
heap
|
page read and write
|
||
1C044000
|
heap
|
page read and write
|
||
D6406000
|
direct allocation
|
page read and write
|
||
1B4D7000
|
heap
|
page read and write
|
||
1BDA2000
|
heap
|
page read and write
|
||
1BB28000
|
heap
|
page read and write
|
||
BAA000
|
heap
|
page read and write
|
||
1B918000
|
heap
|
page read and write
|
||
1D4D2000
|
heap
|
page read and write
|
||
1B924000
|
heap
|
page read and write
|
||
D58FC000
|
direct allocation
|
page read and write
|
||
1BF8D000
|
heap
|
page read and write
|
||
1BCCC000
|
heap
|
page read and write
|
||
1BC2E000
|
heap
|
page read and write
|
||
1D2E5000
|
heap
|
page read and write
|
||
1C04C000
|
heap
|
page read and write
|
||
1D403000
|
heap
|
page read and write
|
||
2618000
|
heap
|
page read and write
|
||
2629000
|
heap
|
page read and write
|
||
1D5DE000
|
heap
|
page read and write
|
||
D5592000
|
direct allocation
|
page read and write
|
||
198C5000
|
heap
|
page read and write
|
||
1D46D000
|
heap
|
page read and write
|
||
1BF10000
|
heap
|
page read and write
|
||
21D52AF6000
|
heap
|
page read and write
|
||
1BCD4000
|
heap
|
page read and write
|
||
1B7E9000
|
heap
|
page read and write
|
||
1C01D000
|
heap
|
page read and write
|
||
6662E000
|
unkown
|
page read and write
|
||
65EC0000
|
unkown
|
page readonly
|
||
D5CD4000
|
direct allocation
|
page read and write
|
||
1B9FE000
|
heap
|
page read and write
|
||
D55EC000
|
direct allocation
|
page read and write
|
||
1BC31000
|
heap
|
page read and write
|
||
1D5E6000
|
heap
|
page read and write
|
||
D55AB000
|
direct allocation
|
page read and write
|
||
21D5334A000
|
heap
|
page read and write
|
||
1BC31000
|
heap
|
page read and write
|
||
1B90F000
|
heap
|
page read and write
|
||
6664F000
|
unkown
|
page read and write
|
||
1BB8D000
|
heap
|
page read and write
|
||
2616000
|
heap
|
page read and write
|
||
1BDA2000
|
heap
|
page read and write
|
||
1BF0B000
|
heap
|
page read and write
|
||
2623000
|
heap
|
page read and write
|
||
1B8FC000
|
heap
|
page read and write
|
||
1BFEC000
|
heap
|
page read and write
|
||
66634000
|
unkown
|
page read and write
|
||
1BEE0000
|
heap
|
page read and write
|
||
21D3CB70000
|
unkown
|
page read and write
|
||
2624000
|
heap
|
page read and write
|
||
1B677000
|
heap
|
page read and write
|
||
1B8CA000
|
heap
|
page read and write
|
||
1B939000
|
heap
|
page read and write
|
||
1C044000
|
heap
|
page read and write
|
||
2614000
|
heap
|
page read and write
|
||
1B480000
|
heap
|
page read and write
|
||
1B4CB000
|
heap
|
page read and write
|
||
1BD8F000
|
heap
|
page read and write
|
||
19690000
|
heap
|
page read and write
|
||
B10000
|
heap
|
page read and write
|
||
D6466000
|
direct allocation
|
page read and write
|
||
D55A0000
|
direct allocation
|
page read and write
|
||
1B8F4000
|
heap
|
page read and write
|
||
1C1C0000
|
direct allocation
|
page read and write
|
||
1BDAE000
|
heap
|
page read and write
|
||
1B958000
|
heap
|
page read and write
|
||
1C062000
|
heap
|
page read and write
|
||
1B94E000
|
heap
|
page read and write
|
||
1BB82000
|
heap
|
page read and write
|
||
19790000
|
heap
|
page read and write
|
||
1D5F5000
|
heap
|
page read and write
|
||
1BAF1000
|
heap
|
page read and write
|
||
1BFEC000
|
heap
|
page read and write
|
||
7FF75B8DD000
|
unkown
|
page readonly
|
||
1BFC1000
|
heap
|
page read and write
|
||
21D3CB00000
|
heap
|
page read and write
|
||
1BD6A000
|
heap
|
page read and write
|
||
7FFE13312000
|
unkown
|
page readonly
|
||
D60FD000
|
direct allocation
|
page read and write
|
||
6669A000
|
unkown
|
page read and write
|
||
1BE02000
|
heap
|
page read and write
|
||
1B951000
|
heap
|
page read and write
|
||
1BB0E000
|
heap
|
page read and write
|
||
1BCFA000
|
heap
|
page read and write
|
||
21D4D470000
|
direct allocation
|
page read and write
|
||
1BE67000
|
heap
|
page read and write
|
||
66637000
|
unkown
|
page read and write
|
||
1BDF2000
|
heap
|
page read and write
|
||
1B951000
|
heap
|
page read and write
|
||
1B7B9000
|
heap
|
page read and write
|
||
2629000
|
heap
|
page read and write
|
||
D55E8000
|
direct allocation
|
page read and write
|
||
1987B000
|
heap
|
page read and write
|
||
1BFCA000
|
heap
|
page read and write
|
||
1B905000
|
heap
|
page read and write
|
||
19518000
|
direct allocation
|
page read and write
|
||
1BAC8000
|
heap
|
page read and write
|
||
1BCCC000
|
heap
|
page read and write
|
||
1D49C000
|
heap
|
page read and write
|
||
1BB0E000
|
heap
|
page read and write
|
||
D6B10000
|
direct allocation
|
page read and write
|
||
66632000
|
unkown
|
page read and write
|
||
D55BA000
|
direct allocation
|
page read and write
|
||
66632000
|
unkown
|
page read and write
|
||
2610000
|
heap
|
page read and write
|
||
1BFA7000
|
heap
|
page read and write
|
||
1BAC8000
|
heap
|
page read and write
|
||
6669A000
|
unkown
|
page read and write
|
||
66656000
|
unkown
|
page read and write
|
||
1BCD0000
|
heap
|
page read and write
|
There are 1047 hidden memdumps, click here to show them.