IOC Report
SoftwareAGUpdateManagerInstaller20231121-11-Windows.exe

loading gif

Files

File Path
Type
Category
Malicious
SoftwareAGUpdateManagerInstaller20231121-11-Windows.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\ZFI_3536\SUMlauncher.jar
Zip archive data, at least v1.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\WinFallbackLookup.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-console-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-console-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-datetime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-debug-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-errorhandling-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-fibers-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-file-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-file-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-file-l2-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-handle-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-interlocked-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-libraryloader-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-localization-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-memory-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-namedpipe-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-processenvironment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-processthreads-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-processthreads-l1-1-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-profile-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-rtlsupport-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-synch-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-synch-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-sysinfo-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-timezone-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-core-util-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-crt-conio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-crt-convert-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-crt-environment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-crt-filesystem-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-crt-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-crt-locale-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-crt-math-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-crt-multibyte-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-crt-private-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-crt-process-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-crt-runtime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-crt-stdio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-crt-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-crt-time-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\api-ms-win-crt-utility-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\awt.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\dt_socket.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\fontmanager.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\freetype.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\instrument.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\j2gss.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\j2pcsc.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\j2pkcs11.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\jaas.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\jabswitch.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\jaccessinspector.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\jaccesswalker.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\java.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\java.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\javaaccessbridge.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\javajpeg.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\javaw.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\jawt.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\jdwp.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\jfr.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\jimage.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\jli.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\jrunscript.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\jsound.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\jsvml.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\keytool.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\kinit.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\klist.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\ktab.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\lcms.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\management.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\management_agent.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\management_ext.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\mlib_image.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\net.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\nio.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\prefs.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\rmi.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\rmiregistry.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\server\jvm.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\splashscreen.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\sspi_bridge.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\sunmscapi.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\ucrtbase.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\verify.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\w2k_lsa_auth.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\windowsaccessbridge-64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\zip.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\+~JF2041233423233583574.tmp
TrueType Font data, 18 tables, 1st "FFTM", 26 names, Macintosh
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\DISCLAIMER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\Welcome.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\msvcp140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\server\classes_nocoops.jsa
data
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\vcruntime140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\vcruntime140_1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\conf\logging.properties
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\conf\management\jmxremote.access
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\conf\management\jmxremote.password.template
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\conf\management\management.properties
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\conf\net.properties
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\conf\security\java.policy
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\conf\security\java.security
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\conf\security\policy\README.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\conf\security\policy\limited\default_US_export.policy
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\conf\security\policy\limited\default_local.policy
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\conf\security\policy\limited\exempt_local.policy
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\conf\security\policy\unlimited\default_US_export.policy
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\conf\security\policy\unlimited\default_local.policy
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\conf\sound.properties
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\com.azul.crs.client\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\com.azul.crs.client\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\com.azul.crs.client\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\com.azul.crs.client\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\com.azul.tooling\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\com.azul.tooling\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\com.azul.tooling\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\com.azul.tooling\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.base\ADDITIONAL_LICENSE_INFO
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.base\ASSEMBLY_EXCEPTION
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.base\CLASSPATH_EXCEPTION_NOTE
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.base\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.base\aes.md
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.base\asm.md
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.base\c-libutl.md
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.base\cldr.md
Unicode text, UTF-8 text, with very long lines (837)
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.base\icu.md
Unicode text, UTF-8 text, with very long lines (849)
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.base\public_suffix.md
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.base\unicode.md
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.base\wepoll.md
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.base\zlib.md
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.compiler\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.compiler\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.compiler\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.compiler\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.datatransfer\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.datatransfer\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.datatransfer\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.datatransfer\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.desktop\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.desktop\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.desktop\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.desktop\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.desktop\colorimaging.md
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.desktop\freetype.md
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.desktop\giflib.md
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.desktop\harfbuzz.md
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.desktop\jpeg.md
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.desktop\lcms.md
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.desktop\libpng.md
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.desktop\mesa3d.md
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.instrument\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.instrument\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.instrument\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.instrument\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.logging\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.logging\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.logging\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.logging\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.management.rmi\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.management.rmi\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.management.rmi\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.management.rmi\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.management\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.management\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.management\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.management\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.naming\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.naming\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.naming\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.naming\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.net.http\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.net.http\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.net.http\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.net.http\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.prefs\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.prefs\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.prefs\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.prefs\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.rmi\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.rmi\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.rmi\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.rmi\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.scripting\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.scripting\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.scripting\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.scripting\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.se\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.se\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.se\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.se\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.security.jgss\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.security.jgss\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.security.jgss\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.security.jgss\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.security.sasl\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.security.sasl\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.security.sasl\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.security.sasl\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.smartcardio\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.smartcardio\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.smartcardio\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.smartcardio\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.sql.rowset\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.sql.rowset\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.sql.rowset\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.sql.rowset\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.sql\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.sql\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.sql\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.sql\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.transaction.xa\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.transaction.xa\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.transaction.xa\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.transaction.xa\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.xml.crypto\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.xml.crypto\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.xml.crypto\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.xml.crypto\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.xml.crypto\santuario.md
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.xml\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.xml\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.xml\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.xml\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.xml\bcel.md
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.xml\dom.md
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.xml\jcup.md
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.xml\xalan.md
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\java.xml\xerces.md
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.accessibility\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.accessibility\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.accessibility\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.accessibility\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.charsets\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.charsets\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.charsets\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.charsets\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.crypto.cryptoki\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.crypto.cryptoki\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.crypto.cryptoki\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.crypto.cryptoki\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.crypto.cryptoki\pkcs11cryptotoken.md
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.crypto.cryptoki\pkcs11wrapper.md
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.crypto.ec\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.crypto.ec\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.crypto.ec\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.crypto.ec\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.crypto.mscapi\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.crypto.mscapi\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.crypto.mscapi\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.crypto.mscapi\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.dynalink\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.dynalink\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.dynalink\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.dynalink\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.dynalink\dynalink.md
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.httpserver\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.httpserver\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.httpserver\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.httpserver\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.incubator.foreign\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.incubator.foreign\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.incubator.foreign\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.incubator.foreign\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.incubator.vector\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.incubator.vector\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.incubator.vector\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.incubator.vector\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.jdwp.agent\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.jdwp.agent\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.jdwp.agent\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.jdwp.agent\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.jfr\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.jfr\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.jfr\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.jfr\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.jsobject\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.jsobject\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.jsobject\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.jsobject\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.localedata\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.localedata\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.localedata\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.localedata\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.localedata\cldr.md
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.localedata\thaidict.md
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.management.agent\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.management.agent\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.management.agent\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.management.agent\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.management.jfr\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.management.jfr\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.management.jfr\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.management.jfr\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.management\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.management\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.management\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.management\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.naming.dns\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.naming.dns\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.naming.dns\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.naming.dns\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.naming.rmi\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.naming.rmi\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.naming.rmi\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.naming.rmi\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.net\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.net\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.net\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.net\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.nio.mapmode\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.nio.mapmode\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.nio.mapmode\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.nio.mapmode\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.random\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.random\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.random\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.random\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.sctp\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.sctp\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.sctp\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.sctp\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.security.auth\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.security.auth\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.security.auth\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.security.auth\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.security.jgss\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.security.jgss\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.security.jgss\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.security.jgss\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.unsupported\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.unsupported\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.unsupported\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.unsupported\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.xml.dom\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.xml.dom\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.xml.dom\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.xml.dom\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.zipfs\ADDITIONAL_LICENSE_INFO
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.zipfs\ASSEMBLY_EXCEPTION
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.zipfs\CLASSPATH_EXCEPTION_NOTE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\legal\jdk.zipfs\LICENSE
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\lib\classlist
ASCII text, with very long lines (522), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\lib\fontconfig.bfc
raw G3 (Group 3) FAX
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\lib\fontconfig.properties.src
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\lib\jawt.lib
current ar archive
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\lib\jfr\default.jfc
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\lib\jfr\profile.jfc
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\lib\jrt-fs.jar
Java archive data (JAR)
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\lib\jvm.cfg
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\lib\jvm.lib
current ar archive
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\lib\modules
Java module image (little endian), version 1.0
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\lib\psfont.properties.ja
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\lib\psfontj2d.properties
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\lib\security\blocked.certs
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\lib\security\cacerts
Java KeyStore
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\lib\security\default.policy
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\lib\security\public_suffix_list.dat
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\lib\tzdb.dat
data
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\lib\tzmappings
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\readme.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\release
ASCII text, with very long lines (768), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\shortcut.vbs
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\ZFI_3536\sum-setup.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\envvar10818828613249938793.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\envvar11338522504124708664.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\envvar1160597909741069849.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\envvar12061198024144877217.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\envvar13494803152977832873.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\envvar17401203860513035475.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\envvar17841775868638982939.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\envvar3441555891569706586.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\envvar4430410592668505130.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\envvar4588889823313094399.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\envvar4667907513633472375.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\envvar4678659186746217219.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\envvar679868451359564232.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\envvar7729600830500743558.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\envvar8642198764105678578.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\envvar9521514706033490886.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\envvar9524271340662204174.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\envvar9879207687526437611.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\hsperfdata_user\6544
data
dropped
C:\Users\user\AppData\Local\Temp\logs\launcher_gui260424_14-40-28.log
ASCII text
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\83aa4cc77f591dfc2374580bbd95f6ba_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
There are 379 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SoftwareAGUpdateManagerInstaller20231121-11-Windows.exe
"C:\Users\user\Desktop\SoftwareAGUpdateManagerInstaller20231121-11-Windows.exe"
C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\javaw.exe
"C:\Users\user\AppData\Local\Temp\ZFI_3536\jre\bin\javaw.exe" -Dbootstrapper.version=11.0.0.0000-0617 -classpath SUMLauncher.jar com.softwareag.plm.sum.client.launcher.installer.Main
C:\Windows\System32\cmd.exe
CMD /C C:\Users\user\AppData\Local\Temp\envvar3441555891569706586.bat
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
CMD /C C:\Users\user\AppData\Local\Temp\envvar10818828613249938793.bat
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
CMD /C C:\Users\user\AppData\Local\Temp\envvar17401203860513035475.bat
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
CMD /C C:\Users\user\AppData\Local\Temp\envvar13494803152977832873.bat
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
CMD /C C:\Users\user\AppData\Local\Temp\envvar12061198024144877217.bat
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
CMD /C C:\Users\user\AppData\Local\Temp\envvar679868451359564232.bat
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
CMD /C C:\Users\user\AppData\Local\Temp\envvar1160597909741069849.bat
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
CMD /C C:\Users\user\AppData\Local\Temp\envvar9524271340662204174.bat
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
CMD /C C:\Users\user\AppData\Local\Temp\envvar8642198764105678578.bat
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
CMD /C C:\Users\user\AppData\Local\Temp\envvar4678659186746217219.bat
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
CMD /C C:\Users\user\AppData\Local\Temp\envvar4430410592668505130.bat
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
CMD /C C:\Users\user\AppData\Local\Temp\envvar4588889823313094399.bat
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
CMD /C C:\Users\user\AppData\Local\Temp\envvar9879207687526437611.bat
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
CMD /C C:\Users\user\AppData\Local\Temp\envvar9521514706033490886.bat
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
CMD /C C:\Users\user\AppData\Local\Temp\envvar7729600830500743558.bat
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
CMD /C C:\Users\user\AppData\Local\Temp\envvar11338522504124708664.bat
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
CMD /C C:\Users\user\AppData\Local\Temp\envvar17841775868638982939.bat
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
CMD /C C:\Users\user\AppData\Local\Temp\envvar4667907513633472375.bat
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 28 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://apache.org/xml/features/validation/schema/augment-psvi
unknown
http://apache.org/xml/properties/input-buffer-size
unknown
http://crl.dhimyotis.com/certignarootca.crl0
unknown
http://www.chambersign.org1
unknown
http://repository.swisssign.com/0
unknown
http://apache.org/xml/features/validation/schema/ignore-xsi-type-until-elemdeclkE
unknown
http://apache.org/xml/properties/internal/entity-manager
unknown
http://apache.org/xml/properties/internal/document-scanner3
unknown
http://repository.swisssign.com/6
unknown
http://apache.org/xml/features/internal/parser-settings
unknown
http://www.fontbureau.comhttp://www.fontbureau.com/designersCursivaCalifornian
unknown
http://java.sun.com/xml/dom/properties/
unknown
http://apache.org/xml/properties/internal/stax-entity-resolver
unknown
http://apache.org/xml/properties/schema/external-schemaLocationibu
unknown
http://apache.org/xml/features/xinclude/fixup-base-uris
unknown
http://apache.org/xml/properties/schema/external-noNamespaceSchemaLocation
unknown
http://apache.org/xml/properties/internal/error-reporter
unknown
http://javax.xml.XMLConstants/feature/useCatalog
unknown
http://apache.org/xml/features/internal/tolerate-duplicatesKF
unknown
http://apache.org/xml/properties/n
unknown
http://crl.dhimyotis.com/certignarootca.crl
unknown
http://www.zhongyicts.com.cn
unknown
http://apache.org/xml/features/scanner/notify-char-refs
unknown
http://apache.org/xml/properties/internal/validator/dtdSP
unknown
http://policy.camerfirma.com0
unknown
http://crl2.softwareag.com/Software%20AG%20Root%20CA%202020.crt0
unknown
http://xml.org/sax/features/validation.
unknown
http://apache.org/xml/features/continue-after-fatal-error
unknown
http://apache.org/xml/features/standard-uri-conformant
unknown
http://apache.org/xml/properties/internal/document-scanner
unknown
http://repository.swisssign.com/nla
unknown
http://javax.xml.XMLConstants/feature/useCatalogpa
unknown
http://repository.swisssign.com/mb
unknown
https://wwww.certigna.fr/autorites/0m
unknown
http://crl1.softwareag.com/Software%20AG%20CA%202.crt
unknown
http://repository.swisssign.com/m
unknown
http://xml.org/sax/properties/C
unknown
http://apache.org/xml/features/
unknown
http://apache.org/xml/features/generate-synthetic-annotations
unknown
http://javax.xml.XMLConstants/property/accessExternalSchemas:
unknown
http://repository.swisssign.com/t
unknown
http://xml.org/sax/features/allow-dtd-events-after-endDTD
unknown
http://cps.chambersign.org/cps/chambersroot.html
unknown
http://apache.org/xml/features/internal/validation/schema/use-grammar-pool-only
unknown
http://crl.securetrust.com/STCA.crl
unknown
http://repository.swisssign.com/ttokD
unknown
http://apache.org/xml/properties/internal/namespace-binder
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
http://apache.org/xml/properties/internal/validation-managercL
unknown
http://www.oracle.com/xml/is-standalone
unknown
https://sdc.softwareag.com/cgi-bin/dataserveMASTER.cgi#
unknown
http://www.quovadisglobal.com/cpss
unknown
http://www.cert.fnmt.es/dpcs/
unknown
http://apache.org/xml/properties/internal/namespace-binder3M
unknown
http://policy.camerfirma.come
unknown
http://apache.org/xml/properties/security-manager
unknown
http://policy.camerfirma.comk
unknown
http://www.accv.es00
unknown
http://apache.org/xml/properties/internal/error-reporterrs
unknown
http://crl.chambersign.org/chambersroot.crlme
unknown
http://crl.securetrust.com/STCA.crlerCDG
unknown
https://documentation.softwareag.com/legal/general_license.txt
unknown
http://crl1.softwareag.com/Software%20AG%20Root%20CA%202020.crt0K
unknown
https://softwareag.com/licenses
unknown
http://apache.org/xml/features/xinclude
unknown
http://crl2.softwareag.com/Software%20AG%20Root%20CA%202020.crl
unknown
http://apache.org/xml/features/validation/schema-full-checking
unknown
http://javax.xml.XMLConstants/property/
unknown
http://www.firmaprofesional.com/cps0
unknown
http://www.azul.com/support/
unknown
http://apache.org/xml/features/validation/warn-on-duplicate-attdef#
unknown
http://crl.securetrust.com/SGCA.crl0
unknown
http://www.firmaprofesional.com/cps
unknown
http://apache.org/xml/features/generate-synthetic-annotationsc.
unknown
http://apache.org/xml/properties/internal/grammar-pool
unknown
http://apache.org/xml/properties/locale
unknown
http://java.sun.com/xml/stream/properties/reader-in-defined-state
unknown
http://www.oracle.com/xml/is-standalones
unknown
http://documentation.softwareag.com/legal/general_license.txt
unknown
http://www.quovadisglobal.com/cps0
unknown
http://www.galapagosdesign.com/NormalNormaaliNormalNorm
unknown
http://www.fontbureau.comhttp://www.fontbureau.com/designers/NormalNormaaliNormalNorm
unknown
http://apache.org/xml/features/allow-java-encodings
unknown
http://apache.org/xml/properties/validation/schema/root-element-declaration
unknown
http://www.accv.es
unknown
http://apache.org/xml/properties/internal/datatype-validator-factory36
unknown
http://crl2.softwareag.com/Software%20AG%20Root%20CA%202020.crt
unknown
http://www.cert.fnmt.es/dpcs/s
unknown
http://www.oracle.com/feature/use-service-mechanism
unknown
http://javax.xml.XMLConstants/property/accessExternalDTD
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt#Y
unknown
http://apache.org/xml/features/validation/warn-on-undeclared-elemdef3
unknown
http://apache.org/xml/xmlschema/1.0/anonymousTypes
unknown
http://crl.securetrust.com/SGCA.crln
unknown
http://apache.org/xml/features/validation/schema/normalized-value
unknown
http://apache.org/xml/features/xinclude/fixup-language
unknown
http://ocsp.accv.es0
unknown
http://crl2.softwareag.com/Software%20AG%20CA%202.crt0
unknown
http://softwareag.com/licenses
unknown
http://apache.org/xml/properties/validation/schema/root-element-declaration3K
unknown
There are 90 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
12E63A3E000
heap
page read and write
12E68633000
heap
page read and write
12E635EE000
heap
page read and write
12E63DE5000
heap
page read and write
22A0000
direct allocation
page read and write
25C8C200000
heap
page read and write
12E63AF3000
heap
page read and write
702B8FE000
stack
page read and write
228B000
direct allocation
page read and write
2BEF7E50000
heap
page read and write
2288000
direct allocation
page read and write
12E63AE7000
heap
page read and write
12E461C5000
heap
page read and write
8793E000
direct allocation
page read and write
2250000
heap
page read and write
12E63A3E000
heap
page read and write
12E63968000
heap
page read and write
12E6350A000
heap
page read and write
1D3DDE00000
heap
page read and write
196346E5000
heap
page read and write
874CC000
direct allocation
page read and write
23A5D2E0000
heap
page read and write
12E63D40000
heap
page read and write
228B000
direct allocation
page read and write
12E63EF2000
heap
page read and write
87170000
direct allocation
page read and write
12E63D40000
heap
page read and write
1E48AFE0000
heap
page read and write
8740D000
direct allocation
page read and write
12E6865B000
heap
page read and write
7A5000
heap
page read and write
12E639EC000
heap
page read and write
12E63EED000
heap
page read and write
87290000
direct allocation
page read and write
12E6861D000
heap
page read and write
12E63AE3000
heap
page read and write
87302000
direct allocation
page read and write
12E68656000
heap
page read and write
878D0000
direct allocation
page read and write
12E63A6A000
heap
page read and write
87172000
direct allocation
page read and write
47739FF000
stack
page read and write
12E63D40000
heap
page read and write
10020A000
direct allocation
page read and write
799000
heap
page read and write
26F7F4C5000
heap
page read and write
12E639C5000
heap
page read and write
879CC000
direct allocation
page read and write
12E63D31000
heap
page read and write
1B331920000
heap
page read and write
2290000
direct allocation
page read and write
22A0000
direct allocation
page read and write
12E63F66000
heap
page read and write
12E684C1000
heap
page read and write
12E68664000
heap
page read and write
87976000
direct allocation
page read and write
12E461C1000
heap
page read and write
25C8BF90000
heap
page read and write
14E39A30000
heap
page read and write
12E68664000
heap
page read and write
12E63B4D000
heap
page read and write
12E63B95000
heap
page read and write
196346FC000
heap
page read and write
87959000
direct allocation
page read and write
79D000
heap
page read and write
228B000
direct allocation
page read and write
12E6350A000
heap
page read and write
1E48B035000
heap
page read and write
25E8EF80000
heap
page read and write
1CDAC9B5000
heap
page read and write
15D3CAB0000
heap
page read and write
2290000
direct allocation
page read and write
12E68540000
heap
page read and write
87306000
direct allocation
page read and write
196346FC000
heap
page read and write
12E63DA6000
heap
page read and write
12E63E96000
heap
page read and write
244BC800000
heap
page read and write
700000
heap
page read and write
12E635AD000
heap
page read and write
79F000
heap
page read and write
878DA000
direct allocation
page read and write
12E63CFE000
heap
page read and write
F521FF000
unkown
page read and write
12E63AC9000
heap
page read and write
20122920000
heap
page read and write
12E63AE3000
heap
page read and write
1B33174C000
heap
page read and write
12E6855D000
heap
page read and write
10000
unkown
page readonly
12E63D2A000
heap
page read and write
2360000
trusted library allocation
page read and write
12E63D3D000
heap
page read and write
12E63F5E000
heap
page read and write
12E68897000
heap
page read and write
12E63636000
heap
page read and write
12E63BB4000
heap
page read and write
12E63AA0000
heap
page read and write
12E63D60000
heap
page read and write
87111000
direct allocation
page read and write
12E63A6A000
heap
page read and write
29DF000
stack
page read and write
12E63EE0000
heap
page read and write
12E63B53000
heap
page read and write
878FE000
direct allocation
page read and write
87993000
direct allocation
page read and write
12E63EB6000
heap
page read and write
651094C000
stack
page read and write
2E8D9FE000
stack
page read and write
2290000
direct allocation
page read and write
87ABB000
direct allocation
page read and write
12E68575000
heap
page read and write
25C8C3B0000
heap
page read and write
164677E0000
heap
page read and write
1818B1D0000
heap
page read and write
15D3C90D000
heap
page read and write
1E48B04C000
heap
page read and write
12E635B1000
heap
page read and write
12E6851C000
heap
page read and write
12E63AF3000
heap
page read and write
26F7F56D000
heap
page read and write
12E63AB2000
heap
page read and write
12E63CD8000
heap
page read and write
12E68656000
heap
page read and write
12E684F9000
heap
page read and write
12E461EE000
heap
page read and write
20122940000
heap
page read and write
28B359C000
stack
page read and write
12E63CFE000
heap
page read and write
12E63AC9000
heap
page read and write
12E63B44000
heap
page read and write
1E48B300000
heap
page read and write
87105000
direct allocation
page read and write
12E63B1D000
heap
page read and write
2BEF7FD0000
heap
page read and write
877FE000
direct allocation
page read and write
12E63CFE000
heap
page read and write
12E63512000
heap
page read and write
12E63AD4000
heap
page read and write
12E63D40000
heap
page read and write
12E63BDC000
heap
page read and write
12E6356A000
heap
page read and write
3CAACFF000
unkown
page read and write
12E63E8D000
heap
page read and write
87683000
direct allocation
page read and write
87302000
direct allocation
page read and write
12E63993000
heap
page read and write
12E6857A000
heap
page read and write
12E63E3D000
heap
page read and write
87102000
direct allocation
page read and write
12E63ACD000
heap
page read and write
606000
heap
page read and write
12E63E7D000
heap
page read and write
12E63C3C000
heap
page read and write
8794D000
direct allocation
page read and write
12E63AB4000
heap
page read and write
12E68656000
heap
page read and write
14E39A34000
heap
page read and write
25E8EFE5000
heap
page read and write
2BEF7EBE000
heap
page read and write
12E6399C000
heap
page read and write
2283000
direct allocation
page read and write
12E63BDC000
heap
page read and write
12E63F7E000
heap
page read and write
873FE000
direct allocation
page read and write
2288000
direct allocation
page read and write
12E63B1E000
heap
page read and write
12E63C84000
heap
page read and write
12E68837000
heap
page read and write
2290000
direct allocation
page read and write
87642000
direct allocation
page read and write
12E63CE7000
heap
page read and write
12E6857A000
heap
page read and write
87254000
direct allocation
page read and write
12E68525000
heap
page read and write
12E63EFE000
heap
page read and write
8740D000
direct allocation
page read and write
12E4604A000
heap
page read and write
2FD0000
trusted library allocation
page read and write
12E63964000
heap
page read and write
12E63C75000
heap
page read and write
12E63BD4000
heap
page read and write
12E63CD8000
heap
page read and write
12E68808000
heap
page read and write
12E46204000
heap
page read and write
12E63582000
heap
page read and write
12E6391F000
heap
page read and write
12E63A50000
heap
page read and write
12E6857F000
heap
page read and write
23A5D330000
heap
page read and write
228C000
direct allocation
page read and write
12E639F9000
heap
page read and write
196346FC000
heap
page read and write
12E63F23000
heap
page read and write
12E63AB5000
heap
page read and write
87383000
direct allocation
page read and write
12E685A0000
heap
page read and write
FCD616C000
stack
page read and write
7B9000
heap
page read and write
1CDAC9B4000
heap
page read and write
12E63E46000
heap
page read and write
244BC63D000
heap
page read and write
2012284E000
heap
page read and write
87846000
direct allocation
page read and write
1955DFE000
stack
page read and write
226A000
direct allocation
page read and write
767000
heap
page read and write
7B1000
heap
page read and write
2290000
direct allocation
page read and write
12E6360A000
heap
page read and write
12E639A4000
heap
page read and write
12E685C4000
heap
page read and write
756000
heap
page read and write
196346F9000
heap
page read and write
12E46240000
heap
page read and write
87606000
direct allocation
page read and write
8787F000
direct allocation
page read and write
12E46010000
heap
page read and write
3CAA90C000
stack
page read and write
12E63E9D000
heap
page read and write
F522FF000
stack
page read and write
87924000
direct allocation
page read and write
19634680000
heap
page read and write
12E45F40000
heap
page read and write
12E63301000
heap
page read and write
12E639EA000
heap
page read and write
12E63522000
heap
page read and write
2283000
direct allocation
page read and write
244BC639000
heap
page read and write
4F1D0FF000
unkown
page read and write
12E63D40000
heap
page read and write
12E68625000
heap
page read and write
12E63937000
heap
page read and write
12E685CD000
heap
page read and write
12E6857D000
heap
page read and write
1E48B048000
heap
page read and write
12E63791000
heap
page read and write
12E68586000
heap
page read and write
12E639D1000
heap
page read and write
12E63512000
heap
page read and write
12E63AF6000
heap
page read and write
12E63BC4000
heap
page read and write
12E63E1D000
heap
page read and write
12E68674000
heap
page read and write
23A5D520000
heap
page read and write
108000
stack
page read and write
86F00000
direct allocation
page read and write
876FE000
direct allocation
page read and write
2BEF7E20000
heap
page read and write
12E63CFE000
heap
page read and write
87283000
direct allocation
page read and write
12E63A1E000
heap
page read and write
2BEF7EDE000
heap
page read and write
12E632E1000
heap
page read and write
228B000
direct allocation
page read and write
12E63D60000
heap
page read and write
1E48B04C000
heap
page read and write
12E63CD1000
heap
page read and write
2279000
direct allocation
page read and write
12E63AE7000
heap
page read and write
86F00000
direct allocation
page read and write
12E63EB5000
heap
page read and write
87952000
direct allocation
page read and write
23A5D35E000
heap
page read and write
12E63D3B000
heap
page read and write
1E48B04C000
heap
page read and write
12E63A4C000
heap
page read and write
12E63A42000
heap
page read and write
87142000
direct allocation
page read and write
12E6392F000
heap
page read and write
12E63B6C000
heap
page read and write
12E63AD3000
heap
page read and write
87936000
direct allocation
page read and write
23A5D635000
heap
page read and write
12E63E3D000
heap
page read and write
2298000
direct allocation
page read and write
2594000
heap
page read and write
12E46017000
heap
page read and write
87783000
direct allocation
page read and write
12E63DE5000
heap
page read and write
12E63B56000
heap
page read and write
12E6391F000
heap
page read and write
765000
heap
page read and write
196346FC000
heap
page read and write
12E63BD5000
heap
page read and write
12E63ECE000
heap
page read and write
87246000
direct allocation
page read and write
12E63F1C000
heap
page read and write
23F12BF0000
heap
page read and write
87924000
direct allocation
page read and write
12E63F05000
heap
page read and write
12E68861000
heap
page read and write
80216000
direct allocation
page read and write
12E63E8D000
heap
page read and write
87746000
direct allocation
page read and write
12E63930000
heap
page read and write
12E63E9D000
heap
page read and write
12E6864D000
heap
page read and write
12E6855C000
heap
page read and write
70E000
heap
page read and write
16467800000
heap
page read and write
12E639D1000
heap
page read and write
25E8EFE4000
heap
page read and write
228B000
direct allocation
page read and write
1B331925000
heap
page read and write
12E63BB4000
heap
page read and write
600000
heap
page read and write
1955AFF000
unkown
page read and write
1E48B04C000
heap
page read and write
80000000
direct allocation
page read and write
87383000
direct allocation
page read and write
1D3DDC4D000
heap
page read and write
12E6396C000
heap
page read and write
12E63BC8000
heap
page read and write
79B000
heap
page read and write
164676A4000
heap
page read and write
12E685DD000
heap
page read and write
878C0000
direct allocation
page read and write
12E63942000
heap
page read and write
12E68658000
heap
page read and write
87ABB000
direct allocation
page read and write
25C8C030000
heap
page read and write
12E63B75000
heap
page read and write
87915000
direct allocation
page read and write
7AD000
heap
page read and write
7A9000
heap
page read and write
12E63E2D000
heap
page read and write
1818B258000
heap
page read and write
12E63C71000
heap
page read and write
12E63B74000
heap
page read and write
12E63AF3000
heap
page read and write
872C0000
direct allocation
page read and write
12E6865B000
heap
page read and write
8792C000
direct allocation
page read and write
2283000
direct allocation
page read and write
228B000
direct allocation
page read and write
12E63C71000
heap
page read and write
872C0000
direct allocation
page read and write
12E6867D000
heap
page read and write
796000
heap
page read and write
12E63E7D000
heap
page read and write
7FF7B1385000
unkown
page readonly
87959000
direct allocation
page read and write
70A000
heap
page read and write
244BC900000
heap
page read and write
8710C000
direct allocation
page read and write
872BC000
direct allocation
page read and write
1E48B049000
heap
page read and write
19416FE000
stack
page read and write
12E63B0C000
heap
page read and write
12E63A4C000
heap
page read and write
12E688AC000
heap
page read and write
12E63C9D000
heap
page read and write
87927000
direct allocation
page read and write
12E6865B000
heap
page read and write
196346D0000
heap
page read and write
12E63C71000
heap
page read and write
874B5000
direct allocation
page read and write
79E000
heap
page read and write
12E68695000
heap
page read and write
12E684FF000
heap
page read and write
87115000
direct allocation
page read and write
F520FC000
stack
page read and write
878DA000
direct allocation
page read and write
12E63CB6000
heap
page read and write
12E6394B000
heap
page read and write
87102000
direct allocation
page read and write
12E63BB5000
heap
page read and write
12E63E9D000
heap
page read and write
12E68644000
heap
page read and write
87145000
direct allocation
page read and write
12E63A38000
heap
page read and write
12E45FC0000
direct allocation
page read and write
12E639D1000
heap
page read and write
12E63CF7000
heap
page read and write
19415FF000
unkown
page read and write
12E63E8D000
heap
page read and write
873FE000
direct allocation
page read and write
12E63D33000
heap
page read and write
12E63589000
heap
page read and write
7B7000
heap
page read and write
1818B258000
heap
page read and write
12E634D9000
heap
page read and write
1818B230000
heap
page read and write
7B2000
heap
page read and write
12E68811000
heap
page read and write
12E63512000
heap
page read and write
12E639AB000
heap
page read and write
23A5D2B0000
heap
page read and write
228B000
direct allocation
page read and write
12E4612D000
heap
page read and write
201227C0000
heap
page read and write
87933000
direct allocation
page read and write
2288000
direct allocation
page read and write
12E63984000
heap
page read and write
228B000
direct allocation
page read and write
80471000
direct allocation
page read and write
A6799FE000
unkown
page read and write
12E63C71000
heap
page read and write
8787F000
direct allocation
page read and write
2290000
direct allocation
page read and write
12E63781000
heap
page read and write
12E684CF000
heap
page read and write
12E63DDE000
heap
page read and write
244BC904000
heap
page read and write
1646770E000
heap
page read and write
12E63791000
heap
page read and write
8796B000
direct allocation
page read and write
12E63CFC000
heap
page read and write
228C000
direct allocation
page read and write
12E63B53000
heap
page read and write
25C8C05E000
heap
page read and write
12E6399C000
heap
page read and write
12E63B3E000
heap
page read and write
8717D000
direct allocation
page read and write
755000
heap
page read and write
12E63920000
heap
page read and write
12E63C29000
heap
page read and write
2290000
direct allocation
page read and write
12E68890000
heap
page read and write
80004000
direct allocation
page read and write
12E63EB5000
heap
page read and write
12E63E8D000
heap
page read and write
12E68600000
heap
page read and write
12E68881000
heap
page read and write
12E63C35000
heap
page read and write
12E6350A000
heap
page read and write
26F7F470000
heap
page read and write
225A000
heap
page read and write
12E63B16000
heap
page read and write
19553F8000
unkown
page read and write
873FA000
direct allocation
page read and write
19541F1000
unkown
page read and write
86DBC000
direct allocation
page read and write
12E63A3E000
heap
page read and write
12E68830000
heap
page read and write
12E63A14000
heap
page read and write
12E6865B000
heap
page read and write
1CDAC6E0000
heap
page read and write
12E63B0C000
heap
page read and write
12E634D5000
heap
page read and write
23F12D80000
heap
page read and write
12E638E6000
heap
page read and write
194CD9E0000
heap
page read and write
12E6851B000
heap
page read and write
87918000
direct allocation
page read and write
12E6862D000
heap
page read and write
87AB2000
direct allocation
page read and write
12E63A3B000
heap
page read and write
26F7F540000
heap
page read and write
15D3C820000
heap
page read and write
12E63D60000
heap
page read and write
1E48B04C000
heap
page read and write
12E638FA000
heap
page read and write
194CDD54000
heap
page read and write
12E63301000
heap
page read and write
23A5D347000
heap
page read and write
19634935000
heap
page read and write
12E68644000
heap
page read and write
87147000
direct allocation
page read and write
12E63B8C000
heap
page read and write
12E63E8E000
heap
page read and write
87945000
direct allocation
page read and write
86DBC000
direct allocation
page read and write
12E6396C000
heap
page read and write
87961000
direct allocation
page read and write
26F7F4C4000
heap
page read and write
196346FC000
heap
page read and write
12E685AC000
heap
page read and write
86F54000
direct allocation
page read and write
86D00000
direct allocation
page read and write
8791D000
direct allocation
page read and write
12E63E36000
heap
page read and write
793000
heap
page read and write
12E63F56000
heap
page read and write
229C000
direct allocation
page read and write
170000
heap
page read and write
12E63C05000
heap
page read and write
12E63BC4000
heap
page read and write
12E6861D000
heap
page read and write
12E63E2D000
heap
page read and write
12E68869000
heap
page read and write
1D3DDC2C000
heap
page read and write
2260000
direct allocation
page read and write
12E6858D000
heap
page read and write
22A0000
direct allocation
page read and write
12E63E8E000
heap
page read and write
228B000
direct allocation
page read and write
12E63BDC000
heap
page read and write
12E63AAE000
heap
page read and write
12E639F1000
heap
page read and write
12E63B54000
heap
page read and write
23A5D33B000
heap
page read and write
12E63AE3000
heap
page read and write
12E68881000
heap
page read and write
87968000
direct allocation
page read and write
12E68827000
heap
page read and write
20122820000
heap
page read and write
12E63C7D000
heap
page read and write
12E634EB000
heap
page read and write
87945000
direct allocation
page read and write
12E63CB2000
heap
page read and write
12E63B59000
heap
page read and write
87206000
direct allocation
page read and write
1CDAC600000
heap
page read and write
12E63B19000
heap
page read and write
228B000
direct allocation
page read and write
25C8BF70000
heap
page read and write
12E63E8D000
heap
page read and write
12E638F3000
heap
page read and write
194CD990000
heap
page read and write
228B000
direct allocation
page read and write
12E63AC6000
heap
page read and write
244BC610000
heap
page read and write
59000
unkown
page read and write
12E63F23000
heap
page read and write
12E63A14000
heap
page read and write
12E63AB0000
heap
page read and write
1B331680000
heap
page read and write
22A0000
direct allocation
page read and write
12E6354D000
heap
page read and write
244BC5B0000
heap
page read and write
12E63AE3000
heap
page read and write
1D3DDDD5000
heap
page read and write
870BA000
direct allocation
page read and write
8716D000
direct allocation
page read and write
12E68504000
heap
page read and write
1818B25D000
heap
page read and write
87936000
direct allocation
page read and write
12E63798000
heap
page read and write
1B331769000
heap
page read and write
12E685E6000
heap
page read and write
12E63E9D000
heap
page read and write
12E63BAC000
heap
page read and write
12E63CF7000
heap
page read and write
12E639AB000
heap
page read and write
12E639F7000
heap
page read and write
12E6861E000
heap
page read and write
12E63F44000
heap
page read and write
F7C0B6C000
stack
page read and write
22A0000
direct allocation
page read and write
194CDBB0000
heap
page read and write
12E68861000
heap
page read and write
12E6861B000
heap
page read and write
201227F0000
heap
page read and write
19552FF000
stack
page read and write
228B000
direct allocation
page read and write
12E6350E000
heap
page read and write
25E8EE50000
heap
page read and write
12E63C0B000
heap
page read and write
87973000
direct allocation
page read and write
12E63B4D000
heap
page read and write
12E63C94000
heap
page read and write
12E63F05000
heap
page read and write
8793B000
direct allocation
page read and write
23F12D50000
heap
page read and write
87746000
direct allocation
page read and write
2AD0000
trusted library allocation
page read and write
86C00000
direct allocation
page read and write
87976000
direct allocation
page read and write
12E63AD6000
heap
page read and write
12E63EED000
heap
page read and write
2BEF7ED9000
heap
page read and write
12E68604000
heap
page read and write
12E63ABB000
heap
page read and write
12E63CE7000
heap
page read and write
12E63F34000
heap
page read and write
12E634E6000
heap
page read and write
871F4000
direct allocation
page read and write
228B000
direct allocation
page read and write
164676F7000
heap
page read and write
1818B1A5000
heap
page read and write
87646000
direct allocation
page read and write
12E638F3000
heap
page read and write
87961000
direct allocation
page read and write
23A5D359000
heap
page read and write
14E396F0000
heap
page read and write
12E63BE4000
heap
page read and write
12E63AB4000
heap
page read and write
80400000
direct allocation
page read and write
12E639F8000
heap
page read and write
12E685E1000
heap
page read and write
702B6FC000
stack
page read and write
12E63A31000
heap
page read and write
26F7F569000
heap
page read and write
12E63348000
heap
page read and write
12E6326B000
heap
page read and write
87920000
direct allocation
page read and write
22A0000
direct allocation
page read and write
12E639A4000
heap
page read and write
28000
unkown
page write copy
12E46244000
heap
page read and write
2255000
heap
page read and write
12E634EB000
heap
page read and write
196346DE000
heap
page read and write
201227F4000
heap
page read and write
87A1A000
direct allocation
page read and write
12E63357000
heap
page read and write
87262000
direct allocation
page read and write
86DBF000
direct allocation
page read and write
86F54000
direct allocation
page read and write
12E63ACD000
heap
page read and write
12E63E9D000
heap
page read and write
2BEF7EBC000
heap
page read and write
12E6858E000
heap
page read and write
2274000
direct allocation
page read and write
FCD64FF000
unkown
page read and write
12E6862B000
heap
page read and write
871BB000
direct allocation
page read and write
12E685C4000
heap
page read and write
12E63B0C000
heap
page read and write
12E63EF0000
heap
page read and write
2E8D59C000
stack
page read and write
8710C000
direct allocation
page read and write
25C8C3B5000
heap
page read and write
2BEF7E24000
heap
page read and write
12E685C4000
heap
page read and write
22A0000
direct allocation
page read and write
872FE000
direct allocation
page read and write
12E68861000
heap
page read and write
229C000
direct allocation
page read and write
28000
unkown
page read and write
12E63BA4000
heap
page read and write
12E45FA0000
unkown
page read and write
12E63994000
heap
page read and write
22A0000
direct allocation
page read and write
12E63348000
heap
page read and write
6CE000
stack
page read and write
25E8EEAE000
heap
page read and write
1D3DDDE0000
heap
page read and write
201226E0000
heap
page read and write
244BC590000
heap
page read and write
12E63AC4000
heap
page read and write
2BEF7EDE000
heap
page read and write
12E4604C000
heap
page read and write
87AB2000
direct allocation
page read and write
538E6FE000
unkown
page read and write
12E63F00000
heap
page read and write
873FA000
direct allocation
page read and write
12E63F5E000
heap
page read and write
12E639D1000
heap
page read and write
24D0000
heap
page read and write
12E6350A000
heap
page read and write
7FF7B1380000
unkown
page readonly
12E68658000
heap
page read and write
25E8EFE0000
heap
page read and write
47735BC000
stack
page read and write
12E63EED000
heap
page read and write
228B000
direct allocation
page read and write
12E635D8000
heap
page read and write
12E63A38000
heap
page read and write
1646770E000
heap
page read and write
8707D000
direct allocation
page read and write
A679AFF000
stack
page read and write
12E63C9D000
heap
page read and write
12E63CF7000
heap
page read and write
8716D000
direct allocation
page read and write
779000
heap
page read and write
80210000
direct allocation
page read and write
12E63B44000
heap
page read and write
7A5000
heap
page read and write
87706000
direct allocation
page read and write
1CDAC800000
heap
page read and write
12E685FD000
heap
page read and write
12E63F0E000
heap
page read and write
87115000
direct allocation
page read and write
12E63F54000
heap
page read and write
1CDAC9B0000
heap
page read and write
12E63A41000
heap
page read and write
12E6362A000
heap
page read and write
228B000
direct allocation
page read and write
180000
heap
page read and write
87993000
direct allocation
page read and write
2DFF000
stack
page read and write
87172000
direct allocation
page read and write
12E6396B000
heap
page read and write
1E48B049000
heap
page read and write
12E685C4000
heap
page read and write
87970000
direct allocation
page read and write
12E63B0D000
heap
page read and write
784000
heap
page read and write
12E479F0000
unkown
page readonly
12E63B0C000
heap
page read and write
228B000
direct allocation
page read and write
12E63B35000
heap
page read and write
12E639E1000
heap
page read and write
12E63D40000
heap
page read and write
87290000
direct allocation
page read and write
12E63DDE000
heap
page read and write
2283000
direct allocation
page read and write
12E63916000
heap
page read and write
12E63781000
heap
page read and write
1B331924000
heap
page read and write
12E63F05000
heap
page read and write
194CDA09000
heap
page read and write
2BEF7EDE000
heap
page read and write
1818B25D000
heap
page read and write
791000
heap
page read and write
F7C0FFE000
stack
page read and write
12E63BAD000
heap
page read and write
14E3971D000
heap
page read and write
801C6000
direct allocation
page read and write
F7C0EFF000
unkown
page read and write
2290000
direct allocation
page read and write
12E639C1000
heap
page read and write
244BC61C000
heap
page read and write
19557FF000
stack
page read and write
1818B350000
heap
page read and write
1E48B000000
heap
page read and write
12E639AB000
heap
page read and write
12E63C7D000
heap
page read and write
8793B000
direct allocation
page read and write
12E63937000
heap
page read and write
12E638B7000
heap
page read and write
4EF000
stack
page read and write
19544FF000
stack
page read and write
871F8000
direct allocation
page read and write
12E63E9D000
heap
page read and write
87142000
direct allocation
page read and write
12E63512000
heap
page read and write
12E63CFC000
heap
page read and write
87000000
direct allocation
page read and write
2290000
direct allocation
page read and write
12E63B76000
heap
page read and write
12E68644000
heap
page read and write
87306000
direct allocation
page read and write
12E63475000
heap
page read and write
12E63A6A000
heap
page read and write
12E634E9000
heap
page read and write
12E63CFE000
heap
page read and write
7B6000
heap
page read and write
8794D000
direct allocation
page read and write
8796B000
direct allocation
page read and write
25E8ED70000
heap
page read and write
12E63AB3000
heap
page read and write
12E68881000
heap
page read and write
87E00000
direct allocation
page read and write
25E8EEAE000
heap
page read and write
12E63AF3000
heap
page read and write
22A0000
direct allocation
page read and write
12E63E96000
heap
page read and write
8792F000
direct allocation
page read and write
14E39900000
heap
page read and write
11000
unkown
page execute read
12E639F4000
heap
page read and write
12E68869000
heap
page read and write
87910000
direct allocation
page read and write
12E461B2000
heap
page read and write
12E63F54000
heap
page read and write
12E63ACB000
heap
page read and write
12E63B3E000
heap
page read and write
12E63A01000
heap
page read and write
12E639C9000
heap
page read and write
87109000
direct allocation
page read and write
12E63EC8000
heap
page read and write
12E63A72000
heap
page read and write
1B33176D000
heap
page read and write
12E634FA000
heap
page read and write
12E63E7D000
heap
page read and write
87145000
direct allocation
page read and write
8791D000
direct allocation
page read and write
12E68869000
heap
page read and write
12E63B0E000
heap
page read and write
87A82000
direct allocation
page read and write
12E638B7000
heap
page read and write
12E63D2C000
heap
page read and write
12E639DA000
heap
page read and write
12E63BC9000
heap
page read and write
12E6388B000
heap
page read and write
19634660000
heap
page read and write
702B7FF000
unkown
page read and write
12E63981000
heap
page read and write
5A000
unkown
page write copy
12E63A4C000
heap
page read and write
19548FA000
unkown
page read and write
1B331580000
heap
page read and write
12E68575000
heap
page read and write
12E685E3000
heap
page read and write
12E634E6000
heap
page read and write
12E63AC6000
heap
page read and write
12E634D2000
heap
page read and write
12E6861E000
heap
page read and write
879F7000
direct allocation
page read and write
12E635EE000
heap
page read and write
12E63AB1000
heap
page read and write
19549FC000
unkown
page read and write
19558FF000
stack
page read and write
12E6392F000
heap
page read and write
14E39702000
heap
page read and write
87806000
direct allocation
page read and write
FCD65FE000
stack
page read and write
12E68658000
heap
page read and write
12E63A42000
heap
page read and write
12E68547000
heap
page read and write
87346000
direct allocation
page read and write
87C40000
direct allocation
page read and write
8038B000
direct allocation
page read and write
12E6863D000
heap
page read and write
12E63C9D000
heap
page read and write
12E684D0000
heap
page read and write
12E63CFE000
heap
page read and write
12E63A14000
heap
page read and write
15D3CBF0000
heap
page read and write
12E63602000
heap
page read and write
F608EFC000
stack
page read and write
878DE000
direct allocation
page read and write
26F7F370000
heap
page read and write
12E63BC4000
heap
page read and write
12E63F64000
heap
page read and write
12E63D40000
heap
page read and write
14E3971D000
heap
page read and write
12E63348000
heap
page read and write
878D8000
direct allocation
page read and write
12E63F08000
heap
page read and write
87642000
direct allocation
page read and write
12E6865D000
heap
page read and write
12E6391D000
heap
page read and write
19634934000
heap
page read and write
12E684F9000
heap
page read and write
12E483F0000
unkown
page readonly
79F000
heap
page read and write
12E63F17000
heap
page read and write
228B000
direct allocation
page read and write
14E398E0000
heap
page read and write
12E63C20000
heap
page read and write
1E48B2E0000
heap
page read and write
12E63A3B000
heap
page read and write
12E68690000
heap
page read and write
196346F9000
heap
page read and write
12E685B6000
heap
page read and write
12E63A5B000
heap
page read and write
12E63571000
heap
page read and write
1818B0C0000
heap
page read and write
12E63C9D000
heap
page read and write
12E63AE3000
heap
page read and write
1B33176D000
heap
page read and write
12E63F06000
heap
page read and write
8794A000
direct allocation
page read and write
23F12C1A000
heap
page read and write
26F7F54C000
heap
page read and write
8000B000
direct allocation
page read and write
12E63BD1000
heap
page read and write
164676E0000
heap
page read and write
873C0000
direct allocation
page read and write
12E63F3F000
heap
page read and write
87105000
direct allocation
page read and write
15D3CBF5000
heap
page read and write
87410000
direct allocation
page read and write
12E63C71000
heap
page read and write
28B39FF000
stack
page read and write
12E63B8C000
heap
page read and write
872FE000
direct allocation
page read and write
7AB000
heap
page read and write
15D3C840000
heap
page read and write
1953EFC000
stack
page read and write
805D3000
direct allocation
page read and write
2290000
direct allocation
page read and write
1E48B020000
heap
page read and write
1B331660000
heap
page read and write
12E63AF6000
heap
page read and write
196346FC000
heap
page read and write
12E639C2000
heap
page read and write
12E63E2D000
heap
page read and write
12E63BBD000
heap
page read and write
87346000
direct allocation
page read and write
12E684EF000
heap
page read and write
12E6881A000
heap
page read and write
12E63EC2000
heap
page read and write
68E000
stack
page read and write
2290000
direct allocation
page read and write
12E63CFE000
heap
page read and write
25E8F010000
heap
page read and write
86DBF000
direct allocation
page read and write
87846000
direct allocation
page read and write
12E63ACD000
heap
page read and write
12E639F8000
heap
page read and write
12E6397B000
heap
page read and write
12E63C1E000
heap
page read and write
7B4000
heap
page read and write
F608FFF000
unkown
page read and write
87683000
direct allocation
page read and write
878C0000
direct allocation
page read and write
12E63F34000
heap
page read and write
12E68567000
heap
page read and write
12E68620000
heap
page read and write
87706000
direct allocation
page read and write
871F4000
direct allocation
page read and write
12E63CA4000
heap
page read and write
12E63D25000
heap
page read and write
2BEF7D30000
heap
page read and write
12E45E40000
heap
page read and write
1E48B049000
heap
page read and write
818FAFF000
stack
page read and write
538E7FF000
stack
page read and write
12E63C71000
heap
page read and write
14E3971D000
heap
page read and write
87109000
direct allocation
page read and write
12E639C5000
heap
page read and write
87254000
direct allocation
page read and write
87973000
direct allocation
page read and write
12E634C0000
heap
page read and write
7AE000
heap
page read and write
87BE8000
direct allocation
page read and write
12E68602000
heap
page read and write
25C8C220000
heap
page read and write
28B38FE000
unkown
page read and write
23A0000
heap
page read and write
25C8C059000
heap
page read and write
12E6857C000
heap
page read and write
244BC580000
heap
page read and write
12E63F5E000
heap
page read and write
12E68602000
heap
page read and write
12E63AB2000
heap
page read and write
12E635B1000
heap
page read and write
12E68572000
heap
page read and write
1954AFF000
unkown
page read and write
12E6391D000
heap
page read and write
12E63BB4000
heap
page read and write
12E63AB1000
heap
page read and write
818F9FF000
unkown
page read and write
12E634E6000
heap
page read and write
12E6391D000
heap
page read and write
2283000
direct allocation
page read and write
1CDAC820000
heap
page read and write
12E63CF7000
heap
page read and write
12E638E6000
heap
page read and write
12E63BCB000
heap
page read and write
12E68674000
heap
page read and write
1818B242000
heap
page read and write
164676B0000
heap
page read and write
6510DFF000
stack
page read and write
23A5D35E000
heap
page read and write
12E6856D000
heap
page read and write
878D8000
direct allocation
page read and write
793000
heap
page read and write
12E63CC1000
heap
page read and write
1D3DDB00000
heap
page read and write
12E6351D000
heap
page read and write
12E63F05000
heap
page read and write
12E63B37000
heap
page read and write
12E63AE3000
heap
page read and write
2E8D8FF000
unkown
page read and write
12E634EB000
heap
page read and write
12E63DDE000
heap
page read and write
23F12BF8000
heap
page read and write
12E63AE7000
heap
page read and write
87BE8000
direct allocation
page read and write
228B000
direct allocation
page read and write
12E684C1000
heap
page read and write
87955000
direct allocation
page read and write
19634930000
heap
page read and write
100000000
direct allocation
page read and write
12E68819000
heap
page read and write
26F7F660000
heap
page read and write
12E68614000
heap
page read and write
12E6857E000
heap
page read and write
876C0000
direct allocation
page read and write
12E63B64000
heap
page read and write
6EB699C000
stack
page read and write
12E63611000
heap
page read and write
12E46110000
heap
page read and write
12E634FE000
heap
page read and write
12E63ED8000
heap
page read and write
12E63AF0000
heap
page read and write
12E63B54000
heap
page read and write
12E634D2000
heap
page read and write
164676EB000
heap
page read and write
12E63DE5000
heap
page read and write
879F7000
direct allocation
page read and write
12E63C45000
heap
page read and write
2BEF7E25000
heap
page read and write
87964000
direct allocation
page read and write
2283000
direct allocation
page read and write
228B000
direct allocation
page read and write
12E634C7000
heap
page read and write
12E685C4000
heap
page read and write
12E63EB5000
heap
page read and write
12E63793000
heap
page read and write
15D3C909000
heap
page read and write
12E634F9000
heap
page read and write
12E46170000
heap
page read and write
87883000
direct allocation
page read and write
15D3C810000
heap
page read and write
12E6851B000
heap
page read and write
12E63605000
heap
page read and write
12E63EFD000
heap
page read and write
12E63AD1000
heap
page read and write
12E63D40000
heap
page read and write
12E63A3B000
heap
page read and write
12E635D8000
heap
page read and write
12E63D40000
heap
page read and write
805B9000
direct allocation
page read and write
12E63512000
heap
page read and write
228B000
direct allocation
page read and write
12E63ABB000
heap
page read and write
26F7F640000
heap
page read and write
879B5000
direct allocation
page read and write
87910000
direct allocation
page read and write
80578000
direct allocation
page read and write
12E6354D000
heap
page read and write
87262000
direct allocation
page read and write
87A31000
direct allocation
page read and write
12E63D40000
heap
page read and write
12E63AD1000
heap
page read and write
23F12CF0000
heap
page read and write
12E63C1E000
heap
page read and write
86F15000
direct allocation
page read and write
12E63D2C000
heap
page read and write
878D4000
direct allocation
page read and write
12E63E8D000
heap
page read and write
12E63AE7000
heap
page read and write
19547FC000
stack
page read and write
12E63C9D000
heap
page read and write
12E68674000
heap
page read and write
2283000
direct allocation
page read and write
12E63B8C000
heap
page read and write
25E8EEA9000
heap
page read and write
12E63B19000
heap
page read and write
12E63CFE000
heap
page read and write
23A5D2C0000
heap
page read and write
12E684E9000
heap
page read and write
12E6858C000
heap
page read and write
2283000
direct allocation
page read and write
12E63D96000
heap
page read and write
6EB6CFF000
unkown
page read and write
12E639C5000
heap
page read and write
196346F8000
heap
page read and write
2290000
direct allocation
page read and write
879CC000
direct allocation
page read and write
12E639FA000
heap
page read and write
12E6391D000
heap
page read and write
12E6856E000
heap
page read and write
12E63D96000
heap
page read and write
12E45FB0000
direct allocation
page read and write
87046000
direct allocation
page read and write
12E63DED000
heap
page read and write
12E6354A000
heap
page read and write
22A0000
direct allocation
page read and write
12E63BDC000
heap
page read and write
12E63F57000
heap
page read and write
12E63798000
heap
page read and write
12E63C9D000
heap
page read and write
A6798FC000
stack
page read and write
16467709000
heap
page read and write
12E63C3C000
heap
page read and write
12E63A31000
heap
page read and write
801BC000
direct allocation
page read and write
12E635AA000
heap
page read and write
87A49000
direct allocation
page read and write
12E63964000
heap
page read and write
12E6855C000
heap
page read and write
757000
heap
page read and write
12E635AA000
heap
page read and write
25C8C03B000
heap
page read and write
7AF000
heap
page read and write
1B331740000
heap
page read and write
12E63D2A000
heap
page read and write
12E684C1000
heap
page read and write
A90EFFE000
stack
page read and write
25E8EE8B000
heap
page read and write
A90EBEC000
stack
page read and write
1E48B2D4000
heap
page read and write
12E63B43000
heap
page read and write
6510CFF000
unkown
page read and write
12E63E8D000
heap
page read and write
1E48B2D0000
heap
page read and write
87246000
direct allocation
page read and write
24AE000
stack
page read and write
12E63AD3000
heap
page read and write
12E63C9D000
heap
page read and write
12E63AA5000
heap
page read and write
12E63BE4000
heap
page read and write
12E63F7E000
heap
page read and write
87B93000
direct allocation
page read and write
12E63BC6000
heap
page read and write
2BEF7FB0000
heap
page read and write
2CFE000
stack
page read and write
12E688BD000
heap
page read and write
14E3971D000
heap
page read and write
12E63636000
heap
page read and write
12E63A48000
heap
page read and write
770000
heap
page read and write
12E63A4C000
heap
page read and write
19634650000
heap
page read and write
12E63F4F000
heap
page read and write
194CDBD0000
heap
page read and write
12E63605000
heap
page read and write
8058A000
direct allocation
page read and write
12E6388E000
heap
page read and write
12E461A1000
heap
page read and write
E53E8FC000
stack
page read and write
14E398C0000
heap
page read and write
12E639E2000
heap
page read and write
12E68624000
heap
page read and write
12E63CFE000
heap
page read and write
23A5D634000
heap
page read and write
22A0000
direct allocation
page read and write
12E6357A000
heap
page read and write
874CC000
direct allocation
page read and write
14E39719000
heap
page read and write
20122800000
heap
page read and write
22A0000
direct allocation
page read and write
12E68576000
heap
page read and write
12E63DED000
heap
page read and write
12E68674000
heap
page read and write
12E634E2000
heap
page read and write
12E63B8C000
heap
page read and write
12E63EB5000
heap
page read and write
12E68525000
heap
page read and write
12E6862B000
heap
page read and write
12E63EC8000
heap
page read and write
12E635CA000
heap
page read and write
100217000
direct allocation
page read and write
194CD9A0000
heap
page read and write
12E685E4000
heap
page read and write
12E63D3D000
heap
page read and write
87783000
direct allocation
page read and write
876C0000
direct allocation
page read and write
803C3000
direct allocation
page read and write
1001D4000
direct allocation
page read and write
47738FF000
unkown
page read and write
12E685C4000
heap
page read and write
1CDAC70C000
heap
page read and write
12E639C5000
heap
page read and write
12E634D5000
heap
page read and write
25C8BF60000
heap
page read and write
12E461C9000
heap
page read and write
12E63AA5000
heap
page read and write
12E68528000
heap
page read and write
1955FFF000
stack
page read and write
12E63BDC000
heap
page read and write
8707D000
direct allocation
page read and write
15D3C8E0000
heap
page read and write
12E63ADC000
heap
page read and write
7A0000
heap
page read and write
874B5000
direct allocation
page read and write
8795C000
direct allocation
page read and write
22A0000
direct allocation
page read and write
12E63639000
heap
page read and write
12E6851B000
heap
page read and write
12E685A1000
heap
page read and write
12E68640000
heap
page read and write
12E63A31000
heap
page read and write
12E63D31000
heap
page read and write
1954FF0000
unkown
page read and write
12E63BDC000
heap
page read and write
12E63ACD000
heap
page read and write
1954DFF000
unkown
page read and write
12E634B8000
heap
page read and write
12E6347D000
heap
page read and write
12E63B44000
heap
page read and write
12E6861E000
heap
page read and write
12E63D3D000
heap
page read and write
878DE000
direct allocation
page read and write
870F8000
direct allocation
page read and write
12E63CF8000
heap
page read and write
12E68525000
heap
page read and write
12E63B24000
heap
page read and write
873C0000
direct allocation
page read and write
8792C000
direct allocation
page read and write
12E4615A000
heap
page read and write
14E39920000
heap
page read and write
4F1D1FE000
stack
page read and write
12E63A42000
heap
page read and write
14E3971D000
heap
page read and write
12E63F44000
heap
page read and write
87646000
direct allocation
page read and write
7BC000
heap
page read and write
12E63932000
heap
page read and write
12E63BDD000
heap
page read and write
87147000
direct allocation
page read and write
12E63A76000
heap
page read and write
2283000
direct allocation
page read and write
1CDAC72D000
heap
page read and write
228B000
direct allocation
page read and write
2BEF7E30000
heap
page read and write
228B000
direct allocation
page read and write
12E63F1C000
heap
page read and write
12E63622000
heap
page read and write
26F7F4C0000
heap
page read and write
87046000
direct allocation
page read and write
12E63B84000
heap
page read and write
12E63BE4000
heap
page read and write
1818B25D000
heap
page read and write
2298000
direct allocation
page read and write
8703F000
direct allocation
page read and write
12E63D96000
heap
page read and write
12E63ADC000
heap
page read and write
12E68836000
heap
page read and write
12E6861E000
heap
page read and write
1E48B04C000
heap
page read and write
12E68629000
heap
page read and write
15D3C8EC000
heap
page read and write
1D3DDC4D000
heap
page read and write
12E63506000
heap
page read and write
15D3CAD0000
heap
page read and write
12E63BE4000
heap
page read and write
8795C000
direct allocation
page read and write
12E63C55000
heap
page read and write
8717D000
direct allocation
page read and write
12E63C21000
heap
page read and write
12E63A0A000
heap
page read and write
12E63ABB000
heap
page read and write
12E63532000
heap
page read and write
87968000
direct allocation
page read and write
12E63D60000
heap
page read and write
228B000
direct allocation
page read and write
12E63CD8000
heap
page read and write
12E68538000
heap
page read and write
12E68656000
heap
page read and write
7FF7B1381000
unkown
page execute read
1D3DDC20000
heap
page read and write
871BB000
direct allocation
page read and write
12E63A98000
heap
page read and write
12E63ACE000
heap
page read and write
12E635D8000
heap
page read and write
12E63E7D000
heap
page read and write
878CE000
direct allocation
page read and write
12E68831000
heap
page read and write
12E63DA6000
heap
page read and write
12E63CCA000
heap
page read and write
7A9000
heap
page read and write
1D3DDDD0000
heap
page read and write
8703F000
direct allocation
page read and write
87942000
direct allocation
page read and write
12E63B85000
heap
page read and write
12E635EE000
heap
page read and write
79B000
heap
page read and write
12E6855C000
heap
page read and write
12E68669000
heap
page read and write
8728E000
direct allocation
page read and write
19545FE000
stack
page read and write
12E634B8000
heap
page read and write
12E639D1000
heap
page read and write
19543FF000
stack
page read and write
12E63F45000
heap
page read and write
12E63BE4000
heap
page read and write
12E63BC1000
heap
page read and write
23F12D60000
heap
page read and write
12E6850F000
heap
page read and write
12E63D41000
heap
page read and write
19554FE000
unkown
page read and write
12E63B0C000
heap
page read and write
12E63920000
heap
page read and write
23F12C19000
heap
page read and write
19550FF000
unkown
page read and write
8056C000
direct allocation
page read and write
12E63A14000
heap
page read and write
23A5D630000
heap
page read and write
86C00000
direct allocation
page read and write
12E63AF3000
heap
page read and write
12E684C9000
heap
page read and write
12E63A53000
heap
page read and write
12E63F5F000
heap
page read and write
E53E9FF000
unkown
page read and write
164676A5000
heap
page read and write
1CDAC72D000
heap
page read and write
2012284E000
heap
page read and write
12E63AE3000
heap
page read and write
1CDAC729000
heap
page read and write
1818B242000
heap
page read and write
12E63E76000
heap
page read and write
12E639C5000
heap
page read and write
87933000
direct allocation
page read and write
12E6855C000
heap
page read and write
12E63F15000
heap
page read and write
1B331930000
heap
page read and write
12E63C9D000
heap
page read and write
1955BF4000
unkown
page read and write
12E63D96000
heap
page read and write
12E63B0D000
heap
page read and write
F6090FF000
stack
page read and write
1818B1A4000
heap
page read and write
E53EAFF000
stack
page read and write
870F8000
direct allocation
page read and write
12E63DED000
heap
page read and write
12E639AB000
heap
page read and write
12E63E2D000
heap
page read and write
19634960000
heap
page read and write
12E6360D000
heap
page read and write
87206000
direct allocation
page read and write
872BC000
direct allocation
page read and write
87927000
direct allocation
page read and write
12E6852A000
heap
page read and write
14E39A35000
heap
page read and write
2288000
direct allocation
page read and write
12E6868F000
heap
page read and write
876FE000
direct allocation
page read and write
7A9000
heap
page read and write
12E68635000
heap
page read and write
87283000
direct allocation
page read and write
12E63C39000
heap
page read and write
194CDD55000
heap
page read and write
1818B25D000
heap
page read and write
26F7F450000
heap
page read and write
19551FF000
unkown
page read and write
12E63BC5000
heap
page read and write
12E6856C000
heap
page read and write
2290000
direct allocation
page read and write
12E6857C000
heap
page read and write
12E63B74000
heap
page read and write
87918000
direct allocation
page read and write
244BC905000
heap
page read and write
12E46040000
heap
page read and write
23F12D54000
heap
page read and write
12E63B16000
heap
page read and write
25E8EFF0000
heap
page read and write
878D0000
direct allocation
page read and write
12E63D41000
heap
page read and write
4F1CDEC000
stack
page read and write
7BC000
heap
page read and write
12E63EB5000
heap
page read and write
164675A0000
heap
page read and write
12E63AE3000
heap
page read and write
22A0000
direct allocation
page read and write
12E6852A000
heap
page read and write
12E63BE4000
heap
page read and write
12E63DE5000
heap
page read and write
878FE000
direct allocation
page read and write
87970000
direct allocation
page read and write
25C8C05E000
heap
page read and write
12E63B24000
heap
page read and write
15D3CBF4000
heap
page read and write
87964000
direct allocation
page read and write
87A49000
direct allocation
page read and write
194CDD50000
heap
page read and write
87C40000
direct allocation
page read and write
12E63EFE000
heap
page read and write
2BEF7EB0000
heap
page read and write
2590000
heap
page read and write
12E63A30000
heap
page read and write
2012284A000
heap
page read and write
12E638C7000
heap
page read and write
12E6362A000
heap
page read and write
12E63ABB000
heap
page read and write
1954EF8000
unkown
page read and write
228B000
direct allocation
page read and write
12E63AA3000
heap
page read and write
87A1A000
direct allocation
page read and write
12E63D11000
heap
page read and write
771000
heap
page read and write
8792F000
direct allocation
page read and write
12E63B65000
heap
page read and write
1818B25D000
heap
page read and write
87410000
direct allocation
page read and write
12E68818000
heap
page read and write
12E63AB0000
heap
page read and write
1D3DDC49000
heap
page read and write
228B000
direct allocation
page read and write
228B000
direct allocation
page read and write
12E63DA6000
heap
page read and write
12E63C14000
heap
page read and write
1818B330000
heap
page read and write
12E461DA000
heap
page read and write
23F12BD0000
heap
page read and write
1D3DDBE0000
heap
page read and write
12E68545000
heap
page read and write
12E63B0C000
heap
page read and write
87742000
direct allocation
page read and write
12E639F8000
heap
page read and write
7FF7B1382000
unkown
page readonly
12E63636000
heap
page read and write
26F7F56D000
heap
page read and write
12E63B54000
heap
page read and write
12E634EB000
heap
page read and write
1D3DDDD4000
heap
page read and write
1818B1A0000
heap
page read and write
19559FE000
stack
page read and write
12E63B7C000
heap
page read and write
19556F4000
unkown
page read and write
87942000
direct allocation
page read and write
14E3971D000
heap
page read and write
1E48B02E000
heap
page read and write
1D3DDC00000
heap
page read and write
12E63A09000
heap
page read and write
12E6868F000
heap
page read and write
228B000
direct allocation
page read and write
12E63DA6000
heap
page read and write
12E63DDE000
heap
page read and write
12E68824000
heap
page read and write
1B331950000
heap
page read and write
5E000
unkown
page readonly
12E63A42000
heap
page read and write
87952000
direct allocation
page read and write
12E635D9000
heap
page read and write
12E6855D000
heap
page read and write
81B00000
direct allocation
page read and write
23F12D55000
heap
page read and write
12E63E7D000
heap
page read and write
12E68658000
heap
page read and write
19555FF000
stack
page read and write
87806000
direct allocation
page read and write
12E63B1A000
heap
page read and write
12E63CE7000
heap
page read and write
194CD9EC000
heap
page read and write
12E6857C000
heap
page read and write
12E63CF7000
heap
page read and write
12E63B34000
heap
page read and write
87955000
direct allocation
page read and write
8020E000
direct allocation
page read and write
A90EEFE000
unkown
page read and write
1CDAC840000
heap
page read and write
12E63475000
heap
page read and write
12E63E8D000
heap
page read and write
12E635C2000
heap
page read and write
12E684C1000
heap
page read and write
87AF6000
direct allocation
page read and write
1954BFE000
unkown
page read and write
8728E000
direct allocation
page read and write
12E6360A000
heap
page read and write
86F15000
direct allocation
page read and write
12E63AC3000
heap
page read and write
25C8C3B4000
heap
page read and write
878CE000
direct allocation
page read and write
87111000
direct allocation
page read and write
12E4610B000
heap
page read and write
12E461B9000
heap
page read and write
12E63602000
heap
page read and write
12E63BB4000
heap
page read and write
12E63928000
heap
page read and write
87AF6000
direct allocation
page read and write
12E63938000
heap
page read and write
8793E000
direct allocation
page read and write
79F000
heap
page read and write
19542FF000
stack
page read and write
12E63636000
heap
page read and write
87A31000
direct allocation
page read and write
14E396E0000
heap
page read and write
20122828000
heap
page read and write
196346F9000
heap
page read and write
12E63C9D000
heap
page read and write
877FE000
direct allocation
page read and write
12E63CFC000
heap
page read and write
12E63F6F000
heap
page read and write
12E45F20000
heap
page read and write
12E63DED000
heap
page read and write
12E63974000
heap
page read and write
12E63F2F000
heap
page read and write
6EB6DFF000
stack
page read and write
12E6853A000
heap
page read and write
12E63DED000
heap
page read and write
87915000
direct allocation
page read and write
19414FC000
stack
page read and write
12E63ACE000
heap
page read and write
12E63EB5000
heap
page read and write
879B9000
direct allocation
page read and write
75E000
heap
page read and write
12E6360D000
heap
page read and write
1818B23B000
heap
page read and write
14E396FB000
heap
page read and write
12E63AD4000
heap
page read and write
12E635C2000
heap
page read and write
12E63CB5000
heap
page read and write
12E63E9D000
heap
page read and write
23F12AF0000
heap
page read and write
12E63EFD000
heap
page read and write
878D4000
direct allocation
page read and write
12E6865B000
heap
page read and write
87742000
direct allocation
page read and write
228B000
direct allocation
page read and write
12E639E1000
heap
page read and write
12E68897000
heap
page read and write
12E68656000
heap
page read and write
23A5D500000
heap
page read and write
12E63F05000
heap
page read and write
12E638FA000
heap
page read and write
791000
heap
page read and write
12E6861E000
heap
page read and write
1E48B2D5000
heap
page read and write
12E68504000
heap
page read and write
12E63EB5000
heap
page read and write
12E63ACB000
heap
page read and write
879B5000
direct allocation
page read and write
12E63CFE000
heap
page read and write
2290000
direct allocation
page read and write
8794A000
direct allocation
page read and write
12E63C20000
heap
page read and write
87883000
direct allocation
page read and write
12E685E0000
heap
page read and write
5E0000
heap
page read and write
12E6856E000
heap
page read and write
194CD9C0000
heap
page read and write
12E63AD6000
heap
page read and write
12E63B65000
heap
page read and write
12E635B1000
heap
page read and write
12E6395F000
heap
page read and write
12E63D3D000
heap
page read and write
12E63EFD000
heap
page read and write
2270000
direct allocation
page read and write
12E68661000
heap
page read and write
228B000
direct allocation
page read and write
1E48AFD0000
heap
page read and write
12E63A3B000
heap
page read and write
22A0000
direct allocation
page read and write
12E63CF1000
heap
page read and write
12E68869000
heap
page read and write
3CAADFF000
stack
page read and write
12E63B15000
heap
page read and write
2283000
direct allocation
page read and write
12E685B5000
heap
page read and write
25E8EE80000
heap
page read and write
87A82000
direct allocation
page read and write
791000
heap
page read and write
1818B25D000
heap
page read and write
12E63AAE000
heap
page read and write
12E6867D000
heap
page read and write
12E68602000
heap
page read and write
879B9000
direct allocation
page read and write
12E68545000
heap
page read and write
538E3EC000
stack
page read and write
201227F5000
heap
page read and write
194CDA0D000
heap
page read and write
12E63A3E000
heap
page read and write
12E68554000
heap
page read and write
791000
heap
page read and write
194CDA0D000
heap
page read and write
1818B243000
heap
page read and write
12E6391F000
heap
page read and write
12E68881000
heap
page read and write
19546FF000
stack
page read and write
12E63EB5000
heap
page read and write
87B93000
direct allocation
page read and write
12E63501000
heap
page read and write
16467680000
heap
page read and write
12E6863C000
heap
page read and write
244BC7E0000
heap
page read and write
228B000
direct allocation
page read and write
12E63F77000
heap
page read and write
15D3C90D000
heap
page read and write
870BA000
direct allocation
page read and write
75B000
heap
page read and write
12E639EF000
heap
page read and write
12E63E2D000
heap
page read and write
244BC63D000
heap
page read and write
1CDAC700000
heap
page read and write
1954CFF000
unkown
page read and write
12E63BDC000
heap
page read and write
19634940000
heap
page read and write
12E639F2000
heap
page read and write
12E63B2D000
heap
page read and write
164676A0000
heap
page read and write
12E6350A000
heap
page read and write
12E68602000
heap
page read and write
12E63DED000
heap
page read and write
12E68861000
heap
page read and write
87170000
direct allocation
page read and write
12E68692000
heap
page read and write
871F8000
direct allocation
page read and write
12E63D1B000
heap
page read and write
86D00000
direct allocation
page read and write
12E68674000
heap
page read and write
12E635B1000
heap
page read and write
12E63AF3000
heap
page read and write
81BEC000
direct allocation
page read and write
818F8FC000
stack
page read and write
12E63350000
heap
page read and write
1818B1B0000
heap
page read and write
2380000
heap
page read and write
1E48B02C000
heap
page read and write
1955EFF000
stack
page read and write
196346DC000
heap
page read and write
12E639F8000
heap
page read and write
12E63CD9000
heap
page read and write
12E63CF1000
heap
page read and write
12E461AA000
heap
page read and write
87920000
direct allocation
page read and write
791000
heap
page read and write
87606000
direct allocation
page read and write
12E63F57000
heap
page read and write
12E63EE6000
heap
page read and write
12E63A6A000
heap
page read and write
12E63AB8000
heap
page read and write
12E68658000
heap
page read and write
There are 1563 hidden memdumps, click here to show them.