IOC Report
java_update.exe

loading gif

Files

File Path
Type
Category
Malicious
java_update.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Program Files (x86)\AutoIt3\Au3Check.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\AutoIt3\Au3Info.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\AutoIt3\Au3Info_x64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\AutoIt3\Aut2Exe\Aut2exe.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\AutoIt3\Aut2Exe\Aut2exe_x64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\AutoIt3\Aut2Exe\upx.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\AutoIt3\AutoIt3Help.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\AutoIt3\AutoIt3_x64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\AutoIt3\Uninstall.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE16\LICLUA.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaws.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleCrashHandler.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleCrashHandler64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdate.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateBroker.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateCore.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateOnDemand.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Java\jre-1.8\bin\javacpl.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Java\jre-1.8\bin\javaws.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Java\jre-1.8\bin\jp2launcher.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Java\jre-1.8\bin\ssvagent.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Java\jre-1.8\bin\unpack200.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\Office16\OSPPREARM.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Client\AppVDllSurrogate.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Client\AppVDllSurrogate32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Client\AppVDllSurrogate64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Client\AppVLP.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Integration\Integrator.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\ACCICONS.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.Loader.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\AppSharingHookController.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\CLVIEW.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\CNFNOT32.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\DCF\Common.DBConnection.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\DCF\Common.DBConnection64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\DCF\DATABASECOMPARE.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\DCF\SPREADSHEETCOMPARE.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\DCF\filecompare.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\GRAPH.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\IEContentService.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\MSOHTMED.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\MSOSREC.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\MSQRY32.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\OLCFG.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTEM.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\ORGCHART.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\OcPubMgr.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\OfficeScrBroker.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\OfficeScrSanBroker.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\POWERPNT.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\PPTICO.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\PerfBoost.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\SCANPST.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\SDXHelper.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\SELFCERT.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\SETLANG.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\SkypeSrv\SKYPESERVER.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\UcMapi.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\VPREVIEW.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\WORDICON.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\Wordconv.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\XLICONS.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\lync99.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\misc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\msoadfsb.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\msoasb.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\msoev.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\officeappguardwin32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\aimgr.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\DW\DW20.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Office16\FLTLDR.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Office16\MSOICONS.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Office16\MSOXMLED.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Office16\OLicenseHeartbeat.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Office16\ai.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Office16\aimgr.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Source Engine\OSE.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Office\Office16\AppSharingHookController64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Office\Office16\MSOHTMED.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\accicons.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\dbcicons.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\grv_icons.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\joticon.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\lyncicon.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\misc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\osmclienticon.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\outicon.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\pj11icon.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\pptico.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\pubs.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\sscicons.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\visicon.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\wordicon.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\xlicons.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0409-0000-0000000FF1CE}\misc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-040C-0000-0000000FF1CE}\misc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0C0A-0000-0000000FF1CE}\misc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-006E-0409-0000-0000000FF1CE}\misc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\BHO\ie_to_edge_stub.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\Installer\setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\cookie_exporter.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\msedge.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\msedge_proxy.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\msedge_pwa_launcher.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\msedgewebview2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\notification_click_helper.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\pwahelper.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge_proxy.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\pwahelper.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\MicrosoftEdgeComRegisterShellARM64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\MicrosoftEdgeUpdate.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\MicrosoftEdgeUpdateBroker.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\MicrosoftEdgeUpdateComRegisterShell64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\MicrosoftEdgeUpdateCore.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\MicrosoftEdgeUpdateOnDemand.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\MicrosoftEdgeUpdateSetup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Java Update Checker (64 bit).exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\ConfigSecurityPolicy.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\MpCmdRun.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\MpCopyAccelerator.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\MpDlpCmd.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\MsMpEng.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\NisSrv.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\X86\MpCmdRun.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\mpextms.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\3582-490\java_update.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\chrome.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\directx.sys
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\svchost.com
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1dgcwg1i.vnc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_50vx02cd.eem.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_amsqfrnz.fuc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_asrgtdci.hha.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bc0tav1y.mtk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bddcrqrm.du0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d0pu4h1b.fny.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fgql5vgl.ayc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gfdwqriy.rhw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gx24ozpp.xuq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i5qkafn2.jia.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k3kygkb5.llx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qgqptdb2.zhu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t04zexdm.tjt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w4ne050n.4kb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xnpzu4sq.arx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp5023.tmp
data
modified
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\8YRMCFYJIVPKXNDBK2UV.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\9OOQ23IIUS1X33VJB442.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\F3XZIQ40AJJWSYMEXA52.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\XB96MGLYWA6BGN5DOIIZ.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF3ebb05.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF3ebde3.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF3ebfb8.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java Update Checker (64 bit).lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jul 2 03:52:04 2024, mtime=Tue Jul 2 03:52:04 2024, atime=Tue Jul 2 03:52:04 2024, length=44544, window=hide
dropped
There are 174 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\java_update.exe
"C:\Users\user\Desktop\java_update.exe"
malicious
C:\Users\user\AppData\Local\Temp\3582-490\java_update.exe
"C:\Users\user\AppData\Local\Temp\3582-490\java_update.exe"
malicious
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\3582-490\java_update.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\Temp\3582-490\java_update.exe'
malicious
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'java_update.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'java_update.exe'
malicious
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Java Update Checker (64 bit).exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Java Update Checker (64 bit).exe'
malicious
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Java Update Checker (64 bit).exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Java Update Checker (64 bit).exe'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
45.141.26.232
malicious
http://tempuri.org/IRoamingSettingsService/WriteSettings
unknown
http://nuget.org/NuGet.exe
unknown
https://mozilla.org0/
unknown
http://crl.microsoftI
unknown
http://crl.microK
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://crl.microsoft
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.datacontract.org/2004/07/Microsoft.Office.Web.Roaming.Service
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://tempuri.org/
unknown
http://tempuri.org/IRoamingSettingsService/DisableUserResponse
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.autoitscript.com/autoit3/
unknown
https://www.autoitscript.com/autoit3/
unknown
http://crl.me
unknown
https://github.com/Pester/Pester
unknown
http://crl.microsoft/
unknown
http://tempuri.org/IRoamingSettingsService/WriteSettingsResponse
unknown
http://tempuri.org/IRoamingSettingsService/ReadSettings
unknown
http://schemas.datacontract.org/2004/07/Microsoft.Office.Web.Roaming.SoapObjectsItemsSortKeyArrayOfR
unknown
https://github.com/pq-crystals/kyber/commit/28413dfbf523fdde181246451c2bd77199c0f7ffDilithium2Dilith
unknown
http://crl.micro
unknown
http://tempuri.org/IRoamingSettingsService/GetConfig
unknown
http://tempuri.org/IRoamingSettingsService/GetConfigResponse
unknown
http://tempuri.org/IRoamingSettingsService/WriteSettingshttp://tempuri.org/IRoamingSettingsService/R
unknown
http://tempuri.org/IRoamingSettingsService/DisableUser
unknown
https://aka.ms/pscore6lBfq
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://tempuri.org/IRoamingSettingsService/ReadSettingsResponse
unknown
http://127.0.0.1:13556/InsiderSlabBehaviorReportedBuildInsiderSlabBehaviorInsiderSlabBehaviorReporte
unknown
http://www.autoitscript.com/autoit3/8
unknown
http://schemas.datacontract.org/2004/07/Microsoft.Office.Web.Roaming.SoapObjects
unknown
http://tempuri.org/IRoamingSettingsService/EnableUser
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://tempuri.org/IRoamingSettingsService/EnableUserResponse
unknown
https://github.com/pq-crystals/kyber/commit/28413dfbf523fdde181246451c2bd77199c0f7ff
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 33 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
45.141.26.232
unknown
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shell\open\command
NULL
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\java_update_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\java_update_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\java_update_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\java_update_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\java_update_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\java_update_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\java_update_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\java_update_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\java_update_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\java_update_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\java_update_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\java_update_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\java_update_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\java_update_RASMANCS
FileDirectory
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\svchost.com.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\svchost.com.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\svchost.com.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\svchost.com.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\svchost.com.ApplicationCompany
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
E62000
unkown
page readonly
malicious
3351000
trusted library allocation
page read and write
malicious
409000
unkown
page read and write
malicious
8D9D000
stack
page read and write
7AE0000
trusted library allocation
page read and write
1F1C000
direct allocation
page read and write
77DF000
heap
page read and write
77CE000
heap
page read and write
32B0000
heap
page read and write
4D5A000
trusted library allocation
page execute and read and write
4C62000
trusted library allocation
page read and write
1F4C000
direct allocation
page read and write
88DE000
heap
page read and write
7FFD9B7CC000
trusted library allocation
page execute and read and write
327E000
stack
page read and write
5A9E000
trusted library allocation
page read and write
6443000
trusted library allocation
page read and write
77AE000
stack
page read and write
1F40000
direct allocation
page read and write
415000
unkown
page read and write
8830000
heap
page read and write
786E000
stack
page read and write
1F48000
direct allocation
page read and write
51E0000
trusted library allocation
page read and write
1F50000
direct allocation
page read and write
62F7000
trusted library allocation
page read and write
497E000
stack
page read and write
1F68000
direct allocation
page read and write
784D000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
735B000
stack
page read and write
772E000
stack
page read and write
1F1C000
direct allocation
page read and write
7D00000
trusted library allocation
page read and write
1F38000
direct allocation
page read and write
881E000
stack
page read and write
7CC0000
trusted library allocation
page read and write
2260000
heap
page read and write
8C5D000
stack
page read and write
8770000
trusted library allocation
page read and write
8714000
heap
page read and write
1F20000
direct allocation
page read and write
7BCE000
stack
page read and write
1F68000
direct allocation
page read and write
1F58000
direct allocation
page read and write
3060000
heap
page read and write
1600000
heap
page read and write
5178000
trusted library allocation
page read and write
1F4C000
direct allocation
page read and write
1F4C000
direct allocation
page read and write
1F1C000
direct allocation
page read and write
500000
heap
page read and write
1F68000
direct allocation
page read and write
19D000
stack
page read and write
5BB1000
trusted library allocation
page read and write
8B0E000
stack
page read and write
4A7E000
stack
page read and write
1F1C000
direct allocation
page read and write
31DF000
stack
page read and write
5290000
trusted library allocation
page read and write
7A35000
heap
page read and write
3327000
heap
page read and write
5B90000
trusted library allocation
page read and write
7B80000
trusted library allocation
page read and write
1F4C000
direct allocation
page read and write
7972000
heap
page read and write
1F0000
heap
page read and write
8B29000
trusted library allocation
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
4D62000
trusted library allocation
page read and write
7793000
heap
page read and write
FF0000
heap
page read and write
1F0000
heap
page read and write
630000
heap
page read and write
6299000
trusted library allocation
page read and write
40A000
unkown
page read and write
7FFD9B910000
trusted library allocation
page read and write
1F68000
direct allocation
page read and write
52FD000
stack
page read and write
8C2E000
stack
page read and write
2DF0000
heap
page read and write
1F18000
direct allocation
page read and write
7944000
heap
page read and write
5D16000
trusted library allocation
page read and write
86C0000
trusted library allocation
page read and write
560000
heap
page read and write
1F00000
direct allocation
page read and write
8820000
trusted library allocation
page read and write
1BC03000
heap
page read and write
310E000
stack
page read and write
8B4F000
stack
page read and write
1F38000
direct allocation
page read and write
57E000
stack
page read and write
7B40000
trusted library allocation
page read and write
8AA0000
trusted library allocation
page read and write
5260000
heap
page read and write
86AB000
trusted library allocation
page read and write
31F0000
heap
page read and write
8EBE000
stack
page read and write
1F48000
direct allocation
page read and write
87F7000
heap
page read and write
9B000
stack
page read and write
77A7000
heap
page read and write
1F68000
direct allocation
page read and write
1F1C000
direct allocation
page read and write
4D60000
trusted library allocation
page read and write
1BB50000
heap
page read and write
2180000
direct allocation
page read and write
78A8000
heap
page read and write
7B4E000
stack
page read and write
62B1000
trusted library allocation
page read and write
7AF0000
trusted library allocation
page read and write
7FFD9B940000
trusted library allocation
page read and write
2DD5000
heap
page read and write
7A5C000
heap
page read and write
32C8000
heap
page read and write
7CE0000
trusted library allocation
page read and write
775E000
heap
page read and write
32BE000
stack
page read and write
72D000
heap
page read and write
8760000
heap
page read and write
1F4C000
direct allocation
page read and write
3360000
heap
page read and write
533B000
stack
page read and write
7B50000
trusted library allocation
page read and write
1F68000
direct allocation
page read and write
53DF000
stack
page read and write
1F4C000
direct allocation
page read and write
77BD000
heap
page read and write
1F4C000
direct allocation
page read and write
893C000
heap
page read and write
749E000
stack
page read and write
4C30000
trusted library allocation
page read and write
1F38000
direct allocation
page read and write
875F000
heap
page read and write
65E000
stack
page read and write
415000
unkown
page write copy
8CCE000
stack
page read and write
1C955000
stack
page read and write
1C1F5000
heap
page read and write
1F48000
direct allocation
page read and write
751D000
stack
page read and write
1F68000
direct allocation
page read and write
278F000
stack
page read and write
326E000
stack
page read and write
8750000
trusted library allocation
page execute and read and write
5311000
trusted library allocation
page read and write
1F48000
direct allocation
page read and write
6617000
trusted library allocation
page read and write
522C000
stack
page read and write
1F38000
direct allocation
page read and write
1F1C000
direct allocation
page read and write
8E0E000
stack
page read and write
1F68000
direct allocation
page read and write
89F9000
heap
page read and write
871C000
heap
page read and write
319E000
stack
page read and write
8930000
heap
page read and write
5800000
trusted library allocation
page read and write
3020000
heap
page read and write
8EF9000
stack
page read and write
314E000
stack
page read and write
1F4C000
direct allocation
page read and write
6433000
trusted library allocation
page read and write
50B5000
trusted library allocation
page execute and read and write
749D000
stack
page read and write
1F48000
direct allocation
page read and write
1F1C000
direct allocation
page read and write
194000
stack
page read and write
4D60000
trusted library allocation
page read and write
5C11000
trusted library allocation
page read and write
1F68000
direct allocation
page read and write
1F1C000
direct allocation
page read and write
256F000
stack
page read and write
8728000
heap
page read and write
2CED000
stack
page read and write
6444000
trusted library allocation
page read and write
3350000
heap
page read and write
5D5F000
trusted library allocation
page read and write
591D000
trusted library allocation
page read and write
1F4C000
direct allocation
page read and write
4D70000
trusted library allocation
page read and write
7CB0000
trusted library allocation
page read and write
1C1F8000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
4DD0000
heap
page readonly
7AEE000
stack
page read and write
7B2E000
stack
page read and write
7E8000
heap
page read and write
88B0000
trusted library allocation
page read and write
7A9D000
stack
page read and write
3520000
heap
page read and write
1F4C000
direct allocation
page read and write
6479000
trusted library allocation
page read and write
709000
heap
page read and write
331B000
heap
page read and write
1F38000
direct allocation
page read and write
8C9B000
stack
page read and write
8710000
trusted library allocation
page read and write
4B5000
heap
page read and write
8BD0000
trusted library allocation
page read and write
7BD0000
trusted library allocation
page read and write
87D0000
trusted library allocation
page read and write
1F68000
direct allocation
page read and write
1F68000
direct allocation
page read and write
1F1C000
direct allocation
page read and write
6CB000
heap
page read and write
7A30000
trusted library allocation
page execute and read and write
3371000
heap
page read and write
4AE7000
heap
page read and write
5460000
heap
page execute and read and write
1F4C000
direct allocation
page read and write
54CB000
trusted library allocation
page read and write
4D74000
trusted library allocation
page read and write
1B380000
trusted library allocation
page read and write
897D000
heap
page read and write
7B70000
trusted library allocation
page read and write
13DE000
heap
page read and write
7877000
heap
page read and write
342D000
heap
page read and write
52E000
stack
page read and write
89C7000
heap
page read and write
151E000
stack
page read and write
77BF000
heap
page read and write
1F68000
direct allocation
page read and write
770E000
stack
page read and write
1F38000
direct allocation
page read and write
1F68000
direct allocation
page read and write
5E50000
trusted library allocation
page read and write
1F4C000
direct allocation
page read and write
76DE000
stack
page read and write
2A0F000
stack
page read and write
1F4C000
direct allocation
page read and write
7BEE000
stack
page read and write
7B60000
trusted library allocation
page read and write
1329000
heap
page read and write
7920000
trusted library allocation
page read and write
870D000
trusted library allocation
page read and write
3340000
heap
page execute and read and write
792B000
trusted library allocation
page read and write
7B20000
trusted library allocation
page read and write
1F1C000
direct allocation
page read and write
776E000
stack
page read and write
7B0E000
stack
page read and write
8AC0000
trusted library allocation
page read and write
33F0000
heap
page read and write
1C65E000
stack
page read and write
7A59000
heap
page read and write
3028000
heap
page read and write
889C000
heap
page read and write
4BD7000
heap
page read and write
1F38000
direct allocation
page read and write
49BF000
stack
page read and write
5195000
trusted library allocation
page execute and read and write
1F4C000
direct allocation
page read and write
541E000
stack
page read and write
1F4C000
direct allocation
page read and write
6AD000
heap
page read and write
8752000
heap
page read and write
2A4E000
stack
page read and write
1BD0A000
stack
page read and write
7941000
heap
page read and write
7B50000
trusted library allocation
page read and write
1605000
heap
page read and write
8E4F000
stack
page read and write
1F54000
direct allocation
page read and write
1F4F000
direct allocation
page read and write
8894000
heap
page read and write
7C85000
trusted library allocation
page read and write
8BE3000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
1C1B1000
heap
page read and write
1F38000
direct allocation
page read and write
5210000
trusted library allocation
page execute and read and write
8940000
trusted library allocation
page read and write
7CB0000
trusted library allocation
page read and write
133BB000
trusted library allocation
page read and write
2D78000
stack
page read and write
87EF000
heap
page read and write
79B6000
heap
page read and write
1F18000
direct allocation
page read and write
88D0000
trusted library allocation
page execute and read and write
1F1C000
direct allocation
page read and write
6603000
trusted library allocation
page read and write
88F5000
heap
page read and write
4DCE000
stack
page read and write
59F7000
trusted library allocation
page read and write
34DE000
stack
page read and write
87D0000
trusted library allocation
page execute and read and write
318E000
heap
page read and write
897F000
heap
page read and write
33AB000
stack
page read and write
7CB0000
trusted library allocation
page read and write
4C33000
trusted library allocation
page execute and read and write
1F4C000
direct allocation
page read and write
1F18000
direct allocation
page read and write
545C000
stack
page read and write
77EE000
stack
page read and write
7CA0000
trusted library allocation
page execute and read and write
351D000
stack
page read and write
32B7000
heap
page read and write
88A0000
heap
page read and write
1F1C000
direct allocation
page read and write
8938000
heap
page read and write
8C43000
trusted library allocation
page read and write
5AA0000
trusted library allocation
page read and write
6318000
trusted library allocation
page read and write
64A6000
trusted library allocation
page read and write
4D40000
trusted library allocation
page read and write
891C000
heap
page read and write
8893000
heap
page read and write
7C90000
trusted library allocation
page read and write
8850000
heap
page read and write
7FFD9B79B000
trusted library allocation
page execute and read and write
78EC000
heap
page read and write
7572000
heap
page read and write
88C0000
trusted library allocation
page read and write
78F5000
heap
page read and write
1F53000
direct allocation
page read and write
514E000
stack
page read and write
86A0000
trusted library allocation
page read and write
12D5000
heap
page read and write
1F68000
direct allocation
page read and write
3783000
trusted library allocation
page read and write
1F18000
direct allocation
page read and write
4BD0000
heap
page read and write
1F4C000
direct allocation
page read and write
50A0000
trusted library allocation
page read and write
7C0E000
stack
page read and write
7700000
heap
page execute and read and write
72EC000
stack
page read and write
C2F000
stack
page read and write
78C7000
heap
page read and write
5CE1000
trusted library allocation
page read and write
12E0000
heap
page read and write
8962000
heap
page read and write
4C90000
heap
page readonly
21AF000
stack
page read and write
1F1C000
direct allocation
page read and write
3430000
heap
page read and write
512E000
stack
page read and write
1F38000
direct allocation
page read and write
8A32000
trusted library allocation
page read and write
1F1C000
direct allocation
page read and write
1F0000
heap
page read and write
88FD000
heap
page read and write
5090000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
7AB0000
heap
page execute and read and write
13EC000
heap
page read and write
4D33000
trusted library allocation
page execute and read and write
1F48000
direct allocation
page read and write
5190000
trusted library allocation
page read and write
1F1C000
direct allocation
page read and write
8AB0000
trusted library allocation
page execute and read and write
1F5B000
direct allocation
page read and write
731D000
stack
page read and write
1F38000
direct allocation
page read and write
792D000
trusted library allocation
page read and write
28CF000
stack
page read and write
7A4F000
heap
page read and write
7CE0000
trusted library allocation
page read and write
64C6000
trusted library allocation
page read and write
8A70000
trusted library allocation
page read and write
755E000
stack
page read and write
530000
heap
page read and write
7B4E000
stack
page read and write
745A000
stack
page read and write
4D09000
stack
page read and write
87AE000
heap
page read and write
32A0000
heap
page read and write
8E70000
trusted library allocation
page execute and read and write
33F0000
heap
page read and write
871D000
stack
page read and write
8AC0000
trusted library allocation
page read and write
7F8B0000
trusted library allocation
page execute and read and write
757E000
stack
page read and write
1300000
heap
page read and write
89A7000
heap
page read and write
5842000
trusted library allocation
page read and write
1F1C000
direct allocation
page read and write
76EE000
stack
page read and write
450000
heap
page read and write
33EE000
stack
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
1F48000
direct allocation
page read and write
1BBDE000
stack
page read and write
1570000
trusted library allocation
page read and write
7A8A000
trusted library allocation
page read and write
610000
heap
page read and write
742B000
stack
page read and write
1F38000
direct allocation
page read and write
4CA0000
heap
page read and write
8A92000
trusted library allocation
page read and write
3277000
heap
page read and write
1BC00000
heap
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
203E000
stack
page read and write
877C000
heap
page read and write
1F1C000
direct allocation
page read and write
526E000
stack
page read and write
8C40000
trusted library allocation
page read and write
52CE000
stack
page read and write
1F68000
direct allocation
page read and write
1F38000
direct allocation
page read and write
2170000
heap
page read and write
57F8000
trusted library allocation
page read and write
75FD000
stack
page read and write
237F000
stack
page read and write
8BE0000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
4C50000
trusted library allocation
page read and write
8CA3000
trusted library allocation
page read and write
1F4C000
direct allocation
page read and write
5917000
trusted library allocation
page read and write
1F4C000
direct allocation
page read and write
1F1C000
direct allocation
page read and write
8912000
trusted library allocation
page read and write
7562000
heap
page read and write
4D80000
trusted library allocation
page read and write
1F68000
direct allocation
page read and write
87F2000
heap
page read and write
559B000
trusted library allocation
page read and write
6471000
trusted library allocation
page read and write
7D0000
heap
page read and write
7A89000
heap
page read and write
3155000
heap
page read and write
32F0000
heap
page read and write
876B000
trusted library allocation
page read and write
8D90000
trusted library allocation
page execute and read and write
6C2000
heap
page read and write
7A1F000
stack
page read and write
346B000
heap
page read and write
1F4C000
direct allocation
page read and write
8917000
heap
page read and write
2070000
heap
page read and write
898B000
heap
page read and write
409000
unkown
page read and write
309F000
heap
page read and write
1F23000
direct allocation
page read and write
B27000
stack
page read and write
193000
stack
page read and write
8A15000
heap
page read and write
194000
stack
page read and write
7955000
heap
page read and write
1F38000
direct allocation
page read and write
50B0000
trusted library allocation
page read and write
6614000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
78BE000
heap
page read and write
1F4C000
direct allocation
page read and write
7610000
heap
page read and write
1F48000
direct allocation
page read and write
2DBF000
stack
page read and write
790F000
heap
page read and write
73E0000
heap
page execute and read and write
1F18000
direct allocation
page read and write
751E000
stack
page read and write
1F4C000
direct allocation
page read and write
87C0000
trusted library allocation
page read and write
7B6E000
stack
page read and write
5099000
trusted library allocation
page read and write
7B60000
trusted library allocation
page read and write
7CF0000
trusted library allocation
page read and write
7A7E000
stack
page read and write
4AD0000
heap
page read and write
135F000
heap
page read and write
7C30000
trusted library allocation
page read and write
86AD000
trusted library allocation
page read and write
752A000
stack
page read and write
5220000
heap
page read and write
5278000
trusted library allocation
page read and write
1F2B000
direct allocation
page read and write
1BF1F000
stack
page read and write
5373000
trusted library allocation
page read and write
8718000
heap
page read and write
8855000
heap
page read and write
3150000
heap
page read and write
867E000
stack
page read and write
74B5000
heap
page execute and read and write
4DE0000
heap
page read and write
5C8F000
trusted library allocation
page read and write
1F18000
direct allocation
page read and write
74DF000
stack
page read and write
73CD000
stack
page read and write
4ADE000
stack
page read and write
79C8000
heap
page read and write
C35000
heap
page read and write
8A12000
heap
page read and write
6311000
trusted library allocation
page read and write
778E000
stack
page read and write
4C60000
trusted library allocation
page read and write
6FF000
stack
page read and write
74EE000
stack
page read and write
32C0000
heap
page read and write
87A2000
heap
page read and write
E60000
unkown
page readonly
1F18000
direct allocation
page read and write
8924000
heap
page read and write
7A90000
trusted library allocation
page read and write
5932000
trusted library allocation
page read and write
87BE000
stack
page read and write
883C000
heap
page read and write
7BAE000
stack
page read and write
739E000
stack
page read and write
794D000
heap
page read and write
312F000
stack
page read and write
797E000
stack
page read and write
73DE000
stack
page read and write
51B0000
trusted library allocation
page read and write
661B000
trusted library allocation
page read and write
1F68000
direct allocation
page read and write
7F748000
trusted library allocation
page execute and read and write
8770000
heap
page read and write
7C80000
trusted library allocation
page read and write
465000
heap
page read and write
5270000
trusted library allocation
page read and write
7C90000
trusted library allocation
page read and write
2DD0000
heap
page read and write
5466000
trusted library allocation
page read and write
77F0000
heap
page read and write
7990000
trusted library allocation
page read and write
2270000
direct allocation
page read and write
1F38000
direct allocation
page read and write
305D000
heap
page read and write
4AE0000
heap
page read and write
598000
heap
page read and write
19D000
stack
page read and write
7A80000
trusted library allocation
page read and write
6457000
trusted library allocation
page read and write
349D000
stack
page read and write
7D8000
heap
page read and write
50B2000
trusted library allocation
page read and write
1F4C000
direct allocation
page read and write
7A87000
trusted library allocation
page read and write
400000
unkown
page readonly
87EA000
trusted library allocation
page read and write
1F38000
direct allocation
page read and write
5275000
heap
page execute and read and write
8AB0000
trusted library allocation
page read and write
7710000
trusted library allocation
page read and write
8920000
heap
page read and write
5C74000
trusted library allocation
page read and write
3450000
heap
page read and write
88D2000
heap
page read and write
8930000
trusted library allocation
page execute and read and write
7C10000
trusted library allocation
page read and write
1F38000
direct allocation
page read and write
1F48000
direct allocation
page read and write
528E000
stack
page read and write
7F730000
trusted library allocation
page execute and read and write
7CA0000
trusted library allocation
page read and write
539E000
stack
page read and write
7980000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
15A3000
trusted library allocation
page read and write
4DA0000
heap
page read and write
741E000
stack
page read and write
7C2D000
stack
page read and write
1F1C000
direct allocation
page read and write
7D10000
trusted library allocation
page read and write
1F1C000
direct allocation
page read and write
7B00000
trusted library allocation
page read and write
89FC000
heap
page read and write
1F68000
direct allocation
page read and write
64BE000
trusted library allocation
page read and write
7A3D000
heap
page read and write
7B00000
trusted library allocation
page execute and read and write
1F1C000
direct allocation
page read and write
1D18E000
stack
page read and write
7D50000
trusted library allocation
page read and write
5312000
trusted library allocation
page read and write
5200000
heap
page readonly
1352000
heap
page read and write
6491000
trusted library allocation
page read and write
9C000
stack
page read and write
587B000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
8580000
trusted library allocation
page read and write
8F3E000
stack
page read and write
7810000
heap
page read and write
8B30000
trusted library allocation
page read and write
7C50000
trusted library allocation
page read and write
1F38000
direct allocation
page read and write
2D3B000
stack
page read and write
59B3000
trusted library allocation
page read and write
1F1C000
direct allocation
page read and write
5192000
trusted library allocation
page read and write
5A32000
trusted library allocation
page read and write
1F4C000
direct allocation
page read and write
5220000
trusted library allocation
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
8C90000
trusted library allocation
page read and write
9C000
stack
page read and write
418000
unkown
page readonly
1F4C000
direct allocation
page read and write
8570000
trusted library allocation
page execute and read and write
15A0000
trusted library allocation
page read and write
56E000
heap
page read and write
8801000
heap
page read and write
7A39000
heap
page read and write
1F1C000
direct allocation
page read and write
7A91000
heap
page read and write
4D9A000
trusted library allocation
page execute and read and write
BEE000
stack
page read and write
7978000
heap
page read and write
194000
stack
page read and write
7D00000
trusted library allocation
page read and write
8760000
trusted library allocation
page read and write
5291000
trusted library allocation
page read and write
79B0000
heap
page read and write
5406000
trusted library allocation
page read and write
32BF000
stack
page read and write
3327000
heap
page read and write
8FFE000
stack
page read and write
87E4000
heap
page read and write
BA0000
heap
page read and write
345A000
heap
page read and write
3150000
heap
page read and write
877D000
stack
page read and write
6455000
trusted library allocation
page read and write
7D20000
trusted library allocation
page read and write
88FF000
heap
page read and write
7B30000
trusted library allocation
page read and write
51D0000
trusted library allocation
page execute and read and write
1CB55000
stack
page read and write
4C80000
trusted library allocation
page read and write
782E000
stack
page read and write
2B4F000
stack
page read and write
1F4C000
direct allocation
page read and write
5198000
trusted library allocation
page read and write
8D2E000
stack
page read and write
741D000
stack
page read and write
1F18000
direct allocation
page read and write
77DB000
heap
page read and write
792B000
heap
page read and write
7B57000
trusted library allocation
page read and write
64B7000
trusted library allocation
page read and write
7C8D000
stack
page read and write
1320000
heap
page read and write
7720000
heap
page read and write
87E0000
trusted library allocation
page read and write
7E5000
heap
page read and write
1F40000
direct allocation
page read and write
637A000
trusted library allocation
page read and write
1F48000
direct allocation
page read and write
1F1C000
direct allocation
page read and write
8CEE000
stack
page read and write
8834000
heap
page read and write
62D9000
trusted library allocation
page read and write
4C20000
trusted library allocation
page read and write
78D1000
heap
page read and write
8DFE000
stack
page read and write
4BC0000
trusted library allocation
page read and write
31F5000
heap
page read and write
1F38000
direct allocation
page read and write
8F7C000
stack
page read and write
458000
heap
page read and write
13361000
trusted library allocation
page read and write
5A3A000
trusted library allocation
page read and write
4B59000
stack
page read and write
6422000
trusted library allocation
page read and write
64D8000
trusted library allocation
page read and write
7540000
heap
page read and write
86B0000
trusted library allocation
page read and write
7D60000
trusted library allocation
page read and write
73E5000
heap
page execute and read and write
8AC3000
trusted library allocation
page read and write
77EF000
stack
page read and write
576F000
trusted library allocation
page read and write
420000
heap
page read and write
896B000
heap
page read and write
1F1C000
direct allocation
page read and write
8859000
heap
page read and write
3170000
heap
page read and write
4B1D000
stack
page read and write
1CA5A000
stack
page read and write
69A000
heap
page read and write
E60000
unkown
page readonly
690000
heap
page read and write
1F1C000
direct allocation
page read and write
1391000
heap
page read and write
1F48000
direct allocation
page read and write
8861000
heap
page read and write
6499000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
7F8C8000
trusted library allocation
page execute and read and write
1F1C000
direct allocation
page read and write
796F000
heap
page read and write
635000
heap
page read and write
409000
unkown
page write copy
87F0000
trusted library allocation
page read and write
4A9E000
stack
page read and write
1F38000
direct allocation
page read and write
8E3C000
stack
page read and write
889C000
heap
page read and write
4BCD000
trusted library allocation
page execute and read and write
32FE000
stack
page read and write
9C000
stack
page read and write
49FD000
stack
page read and write
62B1000
trusted library allocation
page read and write
1CE8E000
stack
page read and write
1F30000
direct allocation
page read and write
1F50000
direct allocation
page read and write
7FD08000
trusted library allocation
page execute and read and write
1F1C000
direct allocation
page read and write
786E000
stack
page read and write
170E000
stack
page read and write
8724000
heap
page read and write
1F10000
direct allocation
page read and write
8915000
heap
page read and write
7C40000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
530000
heap
page read and write
7C60000
trusted library allocation
page read and write
5DF0000
trusted library allocation
page read and write
1F18000
direct allocation
page read and write
59EB000
trusted library allocation
page read and write
1F68000
direct allocation
page read and write
1F1C000
direct allocation
page read and write
87E0000
trusted library allocation
page read and write
5300000
heap
page read and write
88A8000
heap
page read and write
1F38000
direct allocation
page read and write
6291000
trusted library allocation
page read and write
1F68000
direct allocation
page read and write
7758000
heap
page read and write
8963000
heap
page read and write
8D1D000
stack
page read and write
782E000
stack
page read and write
2D30000
heap
page read and write
75F000
stack
page read and write
4F9E000
stack
page read and write
203E000
stack
page read and write
4C40000
trusted library allocation
page read and write
87C0000
heap
page read and write
8920000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
88AC000
heap
page read and write
59EF000
trusted library allocation
page read and write
5355000
heap
page execute and read and write
12D0000
heap
page read and write
787C000
heap
page read and write
7E0000
heap
page read and write
8C30000
trusted library allocation
page read and write
746E000
stack
page read and write
78AF000
stack
page read and write
8934000
heap
page read and write
190000
stack
page read and write
7FCF0000
trusted library allocation
page execute and read and write
7CD0000
trusted library allocation
page read and write
52E000
stack
page read and write
870B000
trusted library allocation
page read and write
3130000
heap
page read and write
77B9000
heap
page read and write
4C3D000
trusted library allocation
page execute and read and write
4D7D000
trusted library allocation
page execute and read and write
5270000
heap
page execute and read and write
8B20000
trusted library allocation
page read and write
51CC000
stack
page read and write
5DED000
trusted library allocation
page read and write
AEB000
stack
page read and write
7748000
heap
page read and write
6F7000
heap
page read and write
7F510000
trusted library allocation
page execute and read and write
8700000
trusted library allocation
page read and write
890B000
heap
page read and write
7B10000
trusted library allocation
page read and write
7D40000
trusted library allocation
page read and write
5887000
trusted library allocation
page read and write
1F4C000
direct allocation
page read and write
5100000
heap
page execute and read and write
5F0000
heap
page read and write
1F38000
direct allocation
page read and write
79E1000
heap
page read and write
1361000
heap
page read and write
86B0000
trusted library allocation
page read and write
13351000
trusted library allocation
page read and write
1D08B000
stack
page read and write
7C20000
trusted library allocation
page read and write
876D000
trusted library allocation
page read and write
79DE000
stack
page read and write
3038000
stack
page read and write
1F1F000
direct allocation
page read and write
9CF000
stack
page read and write
8DDE000
stack
page read and write
1F4C000
direct allocation
page read and write
1520000
heap
page read and write
1349000
heap
page read and write
88A4000
heap
page read and write
55C6000
trusted library allocation
page read and write
1F4C000
direct allocation
page read and write
1F1C000
direct allocation
page read and write
7810000
heap
page read and write
1F68000
direct allocation
page read and write
620000
heap
page read and write
7B5A000
trusted library allocation
page read and write
6623000
trusted library allocation
page read and write
78C1000
heap
page read and write
13358000
trusted library allocation
page read and write
1335E000
trusted library allocation
page read and write
78AC000
heap
page read and write
5D18000
trusted library allocation
page read and write
6436000
trusted library allocation
page read and write
1F4C000
direct allocation
page read and write
8EBE000
stack
page read and write
4F5E000
stack
page read and write
7AE0000
trusted library allocation
page read and write
520C000
stack
page read and write
8918000
heap
page read and write
8720000
heap
page read and write
4C34000
trusted library allocation
page read and write
78B0000
heap
page read and write
7B90000
trusted library allocation
page read and write
4FF0000
heap
page read and write
1F38000
direct allocation
page read and write
789E000
heap
page read and write
2C8F000
stack
page read and write
1F1C000
direct allocation
page read and write
7AC0000
trusted library allocation
page execute and read and write
4C49000
trusted library allocation
page read and write
8C8E000
stack
page read and write
7920000
trusted library allocation
page read and write
1F1C000
direct allocation
page read and write
1F38000
direct allocation
page read and write
1F4C000
direct allocation
page read and write
7966000
heap
page read and write
333D000
stack
page read and write
62B9000
trusted library allocation
page read and write
1F1C000
direct allocation
page read and write
58E000
stack
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
30DC000
heap
page read and write
4D3D000
trusted library allocation
page execute and read and write
755B000
stack
page read and write
3068000
heap
page read and write
1F4C000
direct allocation
page read and write
1C1D6000
heap
page read and write
7938000
heap
page read and write
7CD0000
trusted library allocation
page read and write
40A000
unkown
page read and write
1F18000
direct allocation
page read and write
753E000
stack
page read and write
5210000
trusted library allocation
page execute and read and write
8869000
heap
page read and write
52B1000
trusted library allocation
page read and write
1F0000
heap
page read and write
1F18000
direct allocation
page read and write
8DBB000
stack
page read and write
1F38000
direct allocation
page read and write
8630000
heap
page read and write
30AF000
stack
page read and write
5A08000
trusted library allocation
page read and write
1F14000
direct allocation
page read and write
8890000
heap
page read and write
2D80000
heap
page read and write
7C80000
trusted library allocation
page read and write
7FFD9B782000
trusted library allocation
page read and write
5A51000
trusted library allocation
page read and write
8E1B000
stack
page read and write
303F000
stack
page read and write
1F68000
direct allocation
page read and write
1F38000
direct allocation
page read and write
1F68000
direct allocation
page read and write
77A5000
heap
page read and write
1590000
trusted library allocation
page read and write
7980000
trusted library allocation
page read and write
585C000
trusted library allocation
page read and write
4D34000
trusted library allocation
page read and write
219F000
stack
page read and write
77F3000
heap
page read and write
7B80000
heap
page execute and read and write
51F0000
heap
page execute and read and write
1F1C000
direct allocation
page read and write
892C000
heap
page read and write
51EC000
stack
page read and write
50AA000
trusted library allocation
page execute and read and write
2B8E000
stack
page read and write
86F0000
trusted library allocation
page execute and read and write
761E000
stack
page read and write
50E0000
heap
page readonly
1F18000
direct allocation
page read and write
1C1F3000
heap
page read and write
7951000
heap
page read and write
8923000
heap
page read and write
1F27000
direct allocation
page read and write
7F5000
heap
page read and write
88F2000
heap
page read and write
1F4C000
direct allocation
page read and write
27CE000
stack
page read and write
1F4C000
direct allocation
page read and write
798A000
trusted library allocation
page read and write
4D49000
trusted library allocation
page read and write
33F8000
heap
page read and write
1F1C000
direct allocation
page read and write
1BD10000
heap
page execute and read and write
2CE9000
stack
page read and write
1C45E000
stack
page read and write
1F38000
direct allocation
page read and write
516E000
stack
page read and write
4F0000
heap
page read and write
523C000
stack
page read and write
8A50000
trusted library allocation
page execute and read and write
4BC3000
trusted library allocation
page execute and read and write
4BC4000
trusted library allocation
page read and write
1F4C000
direct allocation
page read and write
7881000
heap
page read and write
1F48000
direct allocation
page read and write
7C50000
trusted library allocation
page read and write
1F4C000
direct allocation
page read and write
1F1C000
direct allocation
page read and write
3526000
heap
page read and write
1F48000
direct allocation
page read and write
886D000
heap
page read and write
1F48000
direct allocation
page read and write
5D1A000
trusted library allocation
page read and write
739D000
stack
page read and write
30DA000
heap
page read and write
71F000
stack
page read and write
7C44000
trusted library allocation
page read and write
7A04000
heap
page read and write
87AE000
stack
page read and write
1F38000
direct allocation
page read and write
5350000
heap
page execute and read and write
1F68000
direct allocation
page read and write
74AF000
stack
page read and write
1F1C000
direct allocation
page read and write
1F4C000
direct allocation
page read and write
34E7000
heap
page read and write
554B000
trusted library allocation
page read and write
8842000
trusted library allocation
page read and write
8850000
heap
page read and write
3320000
heap
page read and write
1F20000
direct allocation
page read and write
784A000
heap
page read and write
409000
unkown
page read and write
2DEB000
stack
page read and write
8C10000
trusted library allocation
page execute and read and write
1F38000
direct allocation
page read and write
5CE000
stack
page read and write
4BA0000
trusted library section
page read and write
2090000
heap
page read and write
7C30000
trusted library allocation
page read and write
75BE000
stack
page read and write
78CB000
heap
page read and write
1C120000
heap
page read and write
6339000
trusted library allocation
page read and write
8D5E000
stack
page read and write
4CCE000
stack
page read and write
1F68000
direct allocation
page read and write
1F4C000
direct allocation
page read and write
8F1E000
stack
page read and write
420000
heap
page read and write
246F000
stack
page read and write
875F000
stack
page read and write
1F38000
direct allocation
page read and write
7C4E000
stack
page read and write
FA1000
stack
page read and write
8DDD000
stack
page read and write
4D89000
trusted library allocation
page read and write
135D000
heap
page read and write
4B0000
heap
page read and write
3457000
heap
page read and write
51FE000
stack
page read and write
7A28000
heap
page read and write
4D30000
trusted library allocation
page read and write
7BCD000
stack
page read and write
8E7E000
stack
page read and write
490000
heap
page read and write
7C60000
trusted library allocation
page read and write
78D0000
heap
page read and write
774E000
stack
page read and write
7987000
trusted library allocation
page read and write
3367000
heap
page read and write
7845000
heap
page read and write
7CC0000
trusted library allocation
page read and write
5BB3000
trusted library allocation
page read and write
77CE000
stack
page read and write
7FFD9B794000
trusted library allocation
page read and write
1F38000
direct allocation
page read and write
86A0000
trusted library allocation
page read and write
1F1C000
direct allocation
page read and write
8C6E000
stack
page read and write
1F68000
direct allocation
page read and write
4D65000
trusted library allocation
page execute and read and write
1F4C000
direct allocation
page read and write
7FFD9B79D000
trusted library allocation
page execute and read and write
7831000
heap
page read and write
85ED000
stack
page read and write
59E9000
trusted library allocation
page read and write
732C000
stack
page read and write
872C000
heap
page read and write
1F1C000
direct allocation
page read and write
8CDE000
stack
page read and write
1F4C000
direct allocation
page read and write
2D7E000
stack
page read and write
52A0000
heap
page execute and read and write
1C01E000
stack
page read and write
1F38000
direct allocation
page read and write
1BE1E000
stack
page read and write
7FFD9B790000
trusted library allocation
page read and write
268E000
stack
page read and write
2DEE000
stack
page read and write
7560000
heap
page read and write
1F38000
direct allocation
page read and write
5D14000
trusted library allocation
page read and write
2610000
heap
page read and write
7AD0000
trusted library allocation
page read and write
4C5A000
trusted library allocation
page execute and read and write
30A0000
heap
page read and write
7CF0000
trusted library allocation
page read and write
59DD000
trusted library allocation
page read and write
52F1000
trusted library allocation
page read and write
1F4C000
direct allocation
page read and write
4D50000
trusted library allocation
page read and write
516E000
stack
page read and write
1F68000
direct allocation
page read and write
1F68000
direct allocation
page read and write
8A40000
trusted library allocation
page read and write
6FC000
heap
page read and write
862E000
stack
page read and write
4BB0000
trusted library allocation
page read and write
8A60000
trusted library allocation
page read and write
1F1C000
direct allocation
page read and write
1F38000
direct allocation
page read and write
765E000
stack
page read and write
6464000
trusted library allocation
page read and write
7F528000
trusted library allocation
page execute and read and write
4D80000
trusted library allocation
page read and write
7D42000
trusted library allocation
page read and write
8945000
heap
page read and write
4D20000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
87E1000
heap
page read and write
74FA000
stack
page read and write
582F000
trusted library allocation
page read and write
885D000
heap
page read and write
7C40000
trusted library allocation
page execute and read and write
7C00000
trusted library allocation
page read and write
47E000
stack
page read and write
7D30000
trusted library allocation
page read and write
7C90000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page read and write
C0B000
stack
page read and write
769E000
stack
page read and write
79A0000
heap
page execute and read and write
8D30000
trusted library allocation
page execute and read and write
50D0000
trusted library allocation
page read and write
7CA0000
trusted library allocation
page read and write
401000
unkown
page execute read
415000
unkown
page read and write
4C65000
trusted library allocation
page execute and read and write
430000
heap
page read and write
1F1C000
direct allocation
page read and write
7D10000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
7AB0000
trusted library allocation
page read and write
8830000
trusted library allocation
page read and write
87E7000
trusted library allocation
page read and write
7FF43BD00000
trusted library allocation
page execute and read and write
8EDE000
stack
page read and write
1C75D000
stack
page read and write
290E000
stack
page read and write
51CC000
stack
page read and write
87DD000
stack
page read and write
8690000
trusted library allocation
page execute and read and write
75DB000
stack
page read and write
4D90000
trusted library allocation
page read and write
1F4C000
direct allocation
page read and write
583A000
trusted library allocation
page read and write
133E000
heap
page read and write
C30000
heap
page read and write
759E000
stack
page read and write
1F18000
direct allocation
page read and write
19D000
stack
page read and write
4D73000
trusted library allocation
page execute and read and write
645B000
trusted library allocation
page read and write
7D70000
trusted library allocation
page read and write
309D000
heap
page read and write
1F1C000
direct allocation
page read and write
1B7CC000
stack
page read and write
3000000
trusted library section
page read and write
779D000
heap
page read and write
8840000
trusted library allocation
page read and write
7B8E000
stack
page read and write
138A000
heap
page read and write
322E000
stack
page read and write
1BBF0000
heap
page read and write
8E1E000
stack
page read and write
8E5E000
stack
page read and write
89EA000
heap
page read and write
5471000
trusted library allocation
page read and write
643A000
trusted library allocation
page read and write
1F4C000
direct allocation
page read and write
3270000
heap
page read and write
8710000
heap
page read and write
8950000
trusted library allocation
page read and write
1F38000
direct allocation
page read and write
53E6000
trusted library allocation
page read and write
7600000
heap
page read and write
8D7D000
stack
page read and write
8933000
heap
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
1F68000
direct allocation
page read and write
573D000
trusted library allocation
page read and write
5178000
trusted library allocation
page read and write
56A000
heap
page read and write
5A53000
trusted library allocation
page read and write
7A5E000
stack
page read and write
5942000
trusted library allocation
page read and write
4ABE000
stack
page read and write
50F0000
trusted library allocation
page execute and read and write
78E5000
heap
page read and write
2DC0000
heap
page read and write
1C17E000
heap
page read and write
74B0000
heap
page execute and read and write
1F0000
heap
page read and write
30EE000
stack
page read and write
8FBE000
stack
page read and write
77C8000
heap
page read and write
1F18000
direct allocation
page read and write
1C55E000
stack
page read and write
1F68000
direct allocation
page read and write
5CF2000
trusted library allocation
page read and write
4A39000
stack
page read and write
8CA0000
trusted library allocation
page read and write
8B2F000
trusted library allocation
page read and write
7930000
trusted library allocation
page execute and read and write
745E000
stack
page read and write
889E000
stack
page read and write
20A0000
heap
page read and write
5280000
heap
page read and write
518F000
stack
page read and write
8A02000
heap
page read and write
77E5000
heap
page read and write
8E9D000
stack
page read and write
5230000
trusted library allocation
page read and write
1F38000
direct allocation
page read and write
9C000
stack
page read and write
554D000
trusted library allocation
page read and write
892B000
heap
page read and write
1D190000
heap
page read and write
1F68000
direct allocation
page read and write
1F1C000
direct allocation
page read and write
1F68000
direct allocation
page read and write
77AB000
stack
page read and write
7BE0000
trusted library allocation
page execute and read and write
4B90000
heap
page read and write
1F68000
direct allocation
page read and write
62D1000
trusted library allocation
page read and write
1F68000
direct allocation
page read and write
73DB000
stack
page read and write
3240000
heap
page read and write
There are 1143 hidden memdumps, click here to show them.