Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
LisectAVT_2403002A_473.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
initial sample
|
||
C:\Users\user~1\AppData\Local\Temp\is-5AHC5.tmp\ndp48-web.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user~1\AppData\Local\Temp\is-QU0ES.tmp\ndp48-web.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalM_d_cKXRrV.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\LisectAVT_2403002A_473.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\CustomRP.1.17.26.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-5AHC5.tmp\is-L16CA.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-8HC4K.tmp\CustomRP.1.17.26.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\is-GPIMV.tmp\LocalwCRkvqzBqW.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
modified
|
||
C:\Users\user\AppData\Local\Temp\is-QU0ES.tmp\is-PMCAU.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local_wGRdnhmmy.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalwCRkvqzBqW.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\LocalylmNBbjoFA.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\CommonMark.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\CustomRP.exe (copy)
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\CustomRP.exe.config (copy)
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\DiscordRPC.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\HtmlRenderer.WinForms.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\HtmlRenderer.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\Microsoft.AppCenter.Analytics.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\Microsoft.AppCenter.Crashes.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\Microsoft.AppCenter.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\Newtonsoft.Json.Bson.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\Newtonsoft.Json.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\Octokit.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\SQLitePCLRaw.batteries_v2.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\SQLitePCLRaw.core.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\SQLitePCLRaw.provider.dynamic_cdecl.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\System.Memory.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\System.Net.Http.Formatting.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\System.Threading.Tasks.Extensions.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ar\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ar\is-674TO.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ar\is-HRLC1.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\az\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\az\is-SPCCG.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\be\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\be\is-CQSTG.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\be\is-OUIRJ.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\bg\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\bg\is-RDQFL.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\bg\is-VHFMO.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\bn\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\bn\is-1BDJ5.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\bn\is-HPMA5.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\bs\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\bs\is-6KALE.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\bs\is-UTM10.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ca\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ca\is-G3P15.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ca\is-RKKJG.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\cs\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\cs\is-D6RI7.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\cs\is-LVJRV.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\cy\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\cy\is-39CN3.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\cy\is-QS138.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\da\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\da\is-L9EDS.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\da\is-MEI7K.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\de-CH\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\de-CH\is-3GQDR.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\de-CH\is-PS652.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\de\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\de\is-ONH2C.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\de\is-Q34JK.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\el\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\el\is-2TH83.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\el\is-NEUVP.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\es\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\es\is-65RVL.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\es\is-JBG7J.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\et\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\et\is-1TNPU.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\et\is-6NKQM.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\fa\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\fa\is-ATSDQ.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\fa\is-N68S6.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\fi\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\fi\is-3UC6U.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\fi\is-JNLAH.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\fil\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\fil\is-PN2OA.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\fil\is-UD0CQ.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\fr\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\fr\is-CJ2KI.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\fr\is-VSURF.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\gl\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\gl\is-O7UR3.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\gl\is-ROPLV.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\he\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\he\is-85D8B.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\he\is-BIB27.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\hi\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\hi\is-5G0PQ.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\hi\is-OG5MR.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\hr\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\hr\is-EFPSN.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\hr\is-QSFJ0.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\hu\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\hu\is-1UC18.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\hu\is-T48C7.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\hy\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\hy\is-9K8L2.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\hy\is-OHUPK.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\id\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\id\is-JVR9Q.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\id\is-VO99H.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-1NIJ8.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-1OIC0.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-2C28F.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-313PG.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-40UMB.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-550CF.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-60I9P.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-687SV.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-7ECM7.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-840Q4.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-8B8DA.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-8ECJB.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-90JQC.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-9AGJI.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-9VO3N.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-CMKDC.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-FETK3.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-FEUPA.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-FK5SN.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-FNJTI.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-GVRFI.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-H1ITL.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-I462P.tmp
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-I8E2V.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-JAUIP.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-JHC4U.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-KQM6J.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-N75LE.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-N7DCN.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-OARCU.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-OD2S7.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-PN1CV.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-QH208.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-TI8RB.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-TJS3F.tmp
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-VUD2Q.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is\is-9VBA1.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is\is-G0GP4.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\it\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\it\is-AVJLC.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\it\is-SMAND.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ja\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ja\is-HSSNF.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ja\is-HUT9S.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ka\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ka\is-BTTKK.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ka\is-O57A3.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\kk\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\kk\is-BEN2D.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\kn\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\kn\is-PHNVH.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\kn\is-Q0K47.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ko\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ko\is-3MKMH.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ko\is-QDV0A.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ku\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ku\is-0AQNH.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ku\is-54C0C.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\lt\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\lt\is-558BR.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\lt\is-7TEOR.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\lv\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\lv\is-943IK.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\lv\is-9GBNE.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\mk\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\mk\is-4D6QO.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\mk\is-B6G5I.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ml\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ml\is-H8GME.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ml\is-NJ72O.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\mn\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\mn\is-GJ06U.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\mn\is-S5EU4.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ms\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ms\is-KFO4O.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\my\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\my\is-2UT95.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\my\is-DB878.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\nl\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\nl\is-AGJMF.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\nl\is-T6AQ0.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\no\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\no\is-AJQMV.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\no\is-M254A.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\pa\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\pa\is-DAB1M.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\pa\is-QT140.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\pl\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\pl\is-05QDT.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\pl\is-5BRIE.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\pt-BR\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\pt-BR\is-0EQ8U.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\pt-BR\is-2A1S4.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\pt\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\pt\is-IFBSR.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\pt\is-MD896.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ro\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ro\is-H3RRR.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ro\is-SGDGS.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ru\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ru\is-GL4HQ.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ru\is-SBHVJ.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\runtimes\win-arm\native\e_sqlite3.dll (copy)
|
PE32 executable (DLL) (console) ARMv7 Thumb, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\runtimes\win-arm\native\is-JNFCM.tmp
|
PE32 executable (DLL) (console) ARMv7 Thumb, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\runtimes\win-arm\native\is-L6FKM.tmp
|
PE32 executable (DLL) (console) ARMv7 Thumb, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\runtimes\win-x64\native\e_sqlite3.dll (copy)
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\runtimes\win-x64\native\is-546QC.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\runtimes\win-x64\native\is-HGKHC.tmp
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\runtimes\win-x86\native\e_sqlite3.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\runtimes\win-x86\native\is-SDGP4.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\runtimes\win-x86\native\is-TR1B4.tmp
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\sk\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\sk\is-5KF44.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\sk\is-NHIH0.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\sl\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\sl\is-C59RA.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\sl\is-G19UM.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\sr\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\sr\is-7NGID.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\sr\is-UK4IF.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\sv\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\sv\is-0ERMH.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\sv\is-53H19.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ta\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ta\is-A4O8R.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ta\is-AVES5.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\th\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\th\is-B2KEE.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\th\is-K9T0V.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\tr\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\tr\is-51KP4.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\tr\is-IOVKP.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\uk\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\uk\is-DVKQR.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\uk\is-VIB03.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\unins000.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ur\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ur\is-COL0K.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\ur\is-G731T.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\vi\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\vi\is-I9TFR.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\vi\is-JDVP8.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\zh-Hans\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\zh-Hans\is-5VLN4.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\zh-Hans\is-A2DL7.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\zh-Hant\CustomRP.resources.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\zh-Hant\is-LHI5A.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\zh-Hant\is-TCS3P.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\server.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\AppCenter\fb523500-4273-456f-a2b6-bb86d47f097a\Logs.db
|
SQLite 3.x database, last written using SQLite version 3041002, file counter 9, database pages 3, cookie 0x1, schema 4, UTF-8,
version-valid-for 9
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\AppCenter\fb523500-4273-456f-a2b6-bb86d47f097a\Logs.db-journal
|
SQLite Rollback Journal
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\LocalylmNBbjoFA.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\LocalM_d_cKXRrV.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Local_wGRdnhmmy.exe.log
|
Unknown
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\CustomRP.exe.log
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-5AHC5.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\is-QU0ES.tmp\_isetup\_setup64.tmp
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\maximmax42\CustomRP.exe_Url_zdpjc2ymxmegs1gpmvwgwfzhgdugxifw\1.0.0.0\ei5ssafe.newcfg
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\maximmax42\CustomRP.exe_Url_zdpjc2ymxmegs1gpmvwgwfzhgdugxifw\1.0.0.0\pbrobjpg.newcfg
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\maximmax42\CustomRP.exe_Url_zdpjc2ymxmegs1gpmvwgwfzhgdugxifw\1.0.0.0\user.config (copy)
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\maximmax42\CustomRP.exe_Url_zdpjc2ymxmegs1gpmvwgwfzhgdugxifw\1.0.0.0\w0yrzvgf.newcfg
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\maximmax42\CustomRP.exe_Url_zdpjc2ymxmegs1gpmvwgwfzhgdugxifw\22gmj3kj.newcfg
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\maximmax42\CustomRP.exe_Url_zdpjc2ymxmegs1gpmvwgwfzhgdugxifw\AppCenter.config (copy)
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\License.txt (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\Privacy Policy.txt (copy)
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\System.Buffers.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\System.Numerics.Vectors.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\System.Runtime.CompilerServices.Unsafe.dll (copy)
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-0375B.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-18R1F.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-2ATOI.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-2C6IM.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-BRDOG.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-CU43O.tmp
|
ASCII text
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-F4MFV.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-IOV14.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-KT4F4.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-LTL2H.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-MQLS8.tmp
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\is-QQTGA.tmp
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Roaming\CustomRP\unins000.dat
|
InnoSetup Log CustomRP {6B1949CF-3AC6-43B8-95BF-5517797E2CEA}, version 0x418, 47172 bytes, 745773\37\user, C:\Users\user\AppData\Roaming\CustomR
|
modified
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\CustomRP\CustomRP.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Thu Jul 25 18:43:12 2024, mtime=Thu Jul 25 18:44:06 2024, atime=Sun Jul 7 14:59:54 2024, length=1201152, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\CustomRP\Uninstall CustomRP.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Thu Jul 25 18:43:12 2024, mtime=Thu Jul 25 18:44:06 2024, atime=Thu Jul 25 16:44:45 2024, length=3442237, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CustomRP.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has Working
directory, Archive, ctime=Thu Jul 25 18:43:12 2024, mtime=Thu Jul 25 18:43:27 2024, atime=Sun Feb 25 17:57:50 2024, length=1197568,
window=hide
|
dropped
|
||
C:\Users\user\Desktop\CustomRP.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Thu Jul 25 18:43:12 2024, mtime=Thu Jul 25 18:44:09 2024, atime=Sun Jul 7 14:59:54 2024, length=1201152, window=hide
|
dropped
|
||
Chrome Cache Entry: 302
|
HTML document, Unicode text, UTF-8 text, with very long lines (55638)
|
downloaded
|
||
Chrome Cache Entry: 303
|
HTML document, Unicode text, UTF-8 text, with very long lines (30466)
|
dropped
|
||
Chrome Cache Entry: 304
|
ASCII text, with very long lines (3600)
|
downloaded
|
||
Chrome Cache Entry: 305
|
ASCII text, with very long lines (7798)
|
dropped
|
||
Chrome Cache Entry: 306
|
ASCII text, with very long lines (11896)
|
downloaded
|
||
Chrome Cache Entry: 307
|
PNG image data, 1375 x 274, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 308
|
Unicode text, UTF-8 text, with very long lines (18265)
|
downloaded
|
||
Chrome Cache Entry: 309
|
ASCII text, with very long lines (11351)
|
dropped
|
||
Chrome Cache Entry: 310
|
ASCII text, with very long lines (3600)
|
dropped
|
||
Chrome Cache Entry: 311
|
ASCII text, with very long lines (10068)
|
dropped
|
||
Chrome Cache Entry: 312
|
ASCII text, with very long lines (63280)
|
dropped
|
||
Chrome Cache Entry: 313
|
ASCII text, with very long lines (3904)
|
downloaded
|
||
Chrome Cache Entry: 314
|
Web Open Font Format (Version 2), TrueType, length 1666688, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 315
|
ASCII text, with very long lines (41198)
|
downloaded
|
||
Chrome Cache Entry: 316
|
ASCII text, with very long lines (4871)
|
downloaded
|
||
Chrome Cache Entry: 317
|
ISO Media, AVIF Image
|
downloaded
|
||
Chrome Cache Entry: 318
|
ASCII text, with very long lines (11076)
|
downloaded
|
||
Chrome Cache Entry: 319
|
ASCII text, with very long lines (3904)
|
dropped
|
||
Chrome Cache Entry: 320
|
JSON data
|
downloaded
|
||
Chrome Cache Entry: 321
|
ASCII text, with very long lines (13598)
|
downloaded
|
||
Chrome Cache Entry: 322
|
ISO Media, AVIF Image
|
downloaded
|
||
Chrome Cache Entry: 323
|
ASCII text, with very long lines (35872)
|
dropped
|
||
Chrome Cache Entry: 324
|
Web Open Font Format (Version 2), TrueType, length 46552, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 325
|
Unicode text, UTF-8 text, with very long lines (25755)
|
dropped
|
||
Chrome Cache Entry: 326
|
Web Open Font Format (Version 2), TrueType, length 10088, version 1.0
|
downloaded
|
||
Chrome Cache Entry: 327
|
ASCII text, with very long lines (25679)
|
downloaded
|
||
Chrome Cache Entry: 328
|
Unicode text, UTF-8 text, with very long lines (58741)
|
downloaded
|
||
Chrome Cache Entry: 329
|
HTML document, Unicode text, UTF-8 text, with very long lines (53466)
|
dropped
|
||
Chrome Cache Entry: 330
|
ASCII text, with very long lines (65472)
|
downloaded
|
||
Chrome Cache Entry: 331
|
PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 332
|
ASCII text, with very long lines (11351)
|
downloaded
|
||
Chrome Cache Entry: 333
|
ASCII text, with very long lines (925)
|
downloaded
|
||
Chrome Cache Entry: 334
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 335
|
ASCII text, with very long lines (6241)
|
dropped
|
||
Chrome Cache Entry: 336
|
ASCII text
|
downloaded
|
||
Chrome Cache Entry: 337
|
ASCII text, with very long lines (15524)
|
dropped
|
||
Chrome Cache Entry: 338
|
PNG image data, 713 x 503, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 339
|
ASCII text, with very long lines (25679)
|
dropped
|
||
Chrome Cache Entry: 340
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
||
Chrome Cache Entry: 341
|
PNG image data, 932 x 551, 8-bit/color RGB, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 342
|
ASCII text, with very long lines (10068)
|
downloaded
|
||
Chrome Cache Entry: 343
|
ASCII text, with very long lines (4871)
|
dropped
|
||
Chrome Cache Entry: 344
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 32x32, components
3
|
dropped
|
||
Chrome Cache Entry: 345
|
PNG image data, 713 x 503, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 346
|
ASCII text, with very long lines (11076)
|
dropped
|
||
Chrome Cache Entry: 347
|
JSON data
|
dropped
|
||
Chrome Cache Entry: 348
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 349
|
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 32x32, components
3
|
downloaded
|
||
Chrome Cache Entry: 350
|
ASCII text, with very long lines (6241)
|
downloaded
|
||
Chrome Cache Entry: 351
|
ASCII text, with very long lines (15524)
|
downloaded
|
||
Chrome Cache Entry: 352
|
ASCII text, with very long lines (2716)
|
downloaded
|
||
Chrome Cache Entry: 353
|
ASCII text, with very long lines (65536), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 354
|
PNG image data, 932 x 551, 8-bit/color RGB, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 355
|
ASCII text, with very long lines (46795)
|
downloaded
|
||
Chrome Cache Entry: 356
|
ASCII text, with very long lines (925)
|
dropped
|
||
Chrome Cache Entry: 357
|
Unicode text, UTF-8 text, with very long lines (25755)
|
downloaded
|
||
Chrome Cache Entry: 358
|
ISO Media, AVIF Image
|
dropped
|
||
Chrome Cache Entry: 359
|
Unicode text, UTF-8 text, with very long lines (18265)
|
dropped
|
||
Chrome Cache Entry: 360
|
ASCII text, with very long lines (41198)
|
dropped
|
||
Chrome Cache Entry: 361
|
ASCII text, with very long lines (7798)
|
downloaded
|
||
Chrome Cache Entry: 362
|
HTML document, Unicode text, UTF-8 text, with very long lines (53656)
|
dropped
|
||
Chrome Cache Entry: 363
|
ASCII text, with very long lines (11896)
|
dropped
|
||
Chrome Cache Entry: 364
|
Unicode text, UTF-8 text, with very long lines (58741)
|
dropped
|
||
Chrome Cache Entry: 365
|
PNG image data, 713 x 503, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
Chrome Cache Entry: 366
|
ASCII text, with very long lines (2657)
|
downloaded
|
||
Chrome Cache Entry: 367
|
PNG image data, 713 x 503, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 368
|
RIFF (little-endian) data, Web/P image
|
downloaded
|
||
Chrome Cache Entry: 369
|
Unicode text, UTF-8 text, with very long lines (65531), with no line terminators
|
downloaded
|
||
Chrome Cache Entry: 370
|
ASCII text, with very long lines (13598)
|
dropped
|
||
Chrome Cache Entry: 371
|
PNG image data, 1375 x 274, 8-bit/color RGBA, non-interlaced
|
downloaded
|
||
Chrome Cache Entry: 372
|
ASCII text, with very long lines (2666)
|
downloaded
|
||
Chrome Cache Entry: 373
|
ISO Media, AVIF Image
|
dropped
|
||
Chrome Cache Entry: 374
|
ASCII text, with very long lines (46795)
|
dropped
|
||
Chrome Cache Entry: 375
|
ASCII text, with very long lines (35872)
|
downloaded
|
||
Chrome Cache Entry: 376
|
ASCII text, with very long lines (63280)
|
downloaded
|
||
\Device\ConDrv
|
ASCII text, with CRLF line terminators
|
dropped
|
There are 361 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\LisectAVT_2403002A_473.exe
|
"C:\Users\user\Desktop\LisectAVT_2403002A_473.exe"
|
||
C:\Users\user\AppData\LocalM_d_cKXRrV.exe
|
"C:\Users\user\AppData\LocalM_d_cKXRrV.exe"
|
||
C:\Users\user\AppData\LocalylmNBbjoFA.exe
|
"C:\Users\user\AppData\LocalylmNBbjoFA.exe"
|
||
C:\Users\user\AppData\Local_wGRdnhmmy.exe
|
"C:\Users\user\AppData\Local_wGRdnhmmy.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-GPIMV.tmp\LocalwCRkvqzBqW.tmp
|
"C:\Users\user~1\AppData\Local\Temp\is-GPIMV.tmp\LocalwCRkvqzBqW.tmp" /SL5="$20408,5483573,1081856,C:\Users\user\AppData\LocalwCRkvqzBqW.exe"
|
||
C:\Users\user\server.exe
|
"C:\Users\user\server.exe"
|
||
C:\Windows\System32\schtasks.exe
|
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "Local_wGRdnhmmy" /tr "C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe"
|
||
C:\Windows\SysWOW64\netsh.exe
|
netsh firewall add allowedprogram "C:\Users\user\server.exe" "server.exe" ENABLE
|
||
C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe
|
"C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe"
|
||
C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe
|
C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe
|
||
C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe
|
"C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe"
|
||
C:\Users\user\AppData\Roaming\CustomRP\CustomRP.exe
|
"C:\Users\user\AppData\Roaming\CustomRP\CustomRP.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://docs.customrp.xyz/setting-up
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2216 --field-trial-handle=1936,i,15522809999631733676,11133617490285214044,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Users\user\AppData\Roaming\CustomRP\CustomRP.exe
|
"C:\Users\user\AppData\Roaming\CustomRP\CustomRP.exe"
|
||
C:\Users\user\AppData\Local\Temp\is-8HC4K.tmp\CustomRP.1.17.26.tmp
|
"C:\Users\user~1\AppData\Local\Temp\is-8HC4K.tmp\CustomRP.1.17.26.tmp" /SL5="$404B2,5498303,1081856,C:\Users\user\AppData\Local\Temp\CustomRP.1.17.26.exe"
|
||
C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe
|
C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe
|
||
C:\Users\user\AppData\Roaming\CustomRP\CustomRP.exe
|
"C:\Users\user\AppData\Roaming\CustomRP\CustomRP.exe"
|
||
C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe
|
C:\Users\user\AppData\Roaming\Local_wGRdnhmmy.exe
|
||
C:\Users\user\AppData\LocalwCRkvqzBqW.exe
|
"C:\Users\user\AppData\LocalwCRkvqzBqW.exe"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\explorer.exe
|
"C:\Windows\System32\explorer.exe" https://docs.customrp.xyz/setting-up
|
||
C:\Windows\explorer.exe
|
C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
|
||
C:\Users\user\AppData\Local\Temp\CustomRP.1.17.26.exe
|
"C:\Users\user\AppData\Local\Temp\CustomRP.1.17.26.exe"
|
There are 15 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/assets/153460616
|
unknown
|
||
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/assets/153478024
|
unknown
|
||
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/assets/153478023
|
unknown
|
||
https://uploads.github.com/repos/maximmax42/Discord-CustomRP/releases/125125712/assets
|
unknown
|
||
https://api.github.com/users/maximmax42
|
unknown
|
||
https://api.github.com/repositories/158286982/releases?page=2
|
140.82.121.5
|
||
https://api.github.com/repositories/158286982/releases?page=3
|
140.82.121.5
|
||
https://api.github.com/repositories/158286982/releases?page=1
|
unknown
|
||
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/assets/110203536
|
unknown
|
||
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.19/CustomRP.1.17.19.zip
|
unknown
|
||
https://twitter.com/Illeg__al
|
unknown
|
||
https://api.github.com/repositories/158286982/releases?page=4
|
140.82.121.5
|
||
https://github.com/maximmax42/Discord-CustomRP/releases
|
unknown
|
||
https://docs.customrp.xyz/_next/static/chunks/9297-f3eccea4ea14abf3.js
|
172.64.147.209
|
||
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/117069059/assets
|
unknown
|
||
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.10/CustomRP.1.17.10.zip
|
unknown
|
||
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/assets/166298664
|
unknown
|
||
https://github.com/dotnet/corefx/tree/7601f4f6225089ff
|
unknown
|
||
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/148080647/assets
|
unknown
|
||
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases
|
140.82.121.5
|
||
https://www.innosetup.com/
|
unknown
|
||
https://docs.customrp.xyz/_next/static/chunks/app/(space)/(content)/%5B%5B...pathname%5D%5D/page-ec571d2756d4b9b5.js
|
172.64.147.209
|
||
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.17/CustomRP.1.17.17.exe
|
unknown
|
||
https://www.youtube.com/channel/UCxGqMDnXnEyVt4yugLeBpgA
|
unknown
|
||
https://3448418481-files.gitbook.io/~/files/v0/b/gitbook-x-prod.appspot.com/o/collections%2Fb7ivX6BQQxRccY1orTyN%2Ficon%2FnkaA7BNDEwNuDrY1Bu5Z%2Flogo.png?alt=media&token=8a0a99e6-b7f7-4e7b-9a7d-ec4200fc5dbe
|
172.64.147.209
|
||
https://api.github.com/users/maximmax42/received_eventsLR
|
unknown
|
||
https://uploads.github.com/repos/maximmax42/Discord-CustomRP/releases/114405601/assets
|
unknown
|
||
https://in.appcenter.ms./logs?api-version=1.0.0
|
unknown
|
||
https://codiaz.com/
|
unknown
|
||
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/assets/110203541
|
unknown
|
||
https://cdn.discordapp.com/embed/avatars/4.png
|
unknown
|
||
https://docs.customrp.xyz/_next/static/chunks/1dd3208c-be983e9332503385.js
|
172.64.147.209
|
||
https://docs.customrp.xyz/_next/static/chunks/app/global-error-fb32fca0ade143dc.js
|
172.64.147.209
|
||
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.20.1/CustomRP.1.17.20.1.exe
|
unknown
|
||
https://docs.customrp.xyz/_next/static/chunks/132-510ddc716fcc679e.js
|
172.64.147.209
|
||
https://linktr.ee/404femboy
|
unknown
|
||
https://github.com/EdiRo
|
unknown
|
||
https://ci.appveyor.com/project/maximmax42/customrp/builds/49898001)
|
unknown
|
||
https://docs.customrp.xyz/_next/static/css/9788c0e64943a60e.css
|
172.64.147.209
|
||
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.25/CustomRP.1.17.25.zip
|
unknown
|
||
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/143526226/assets
|
unknown
|
||
http://www.haysoft.org%1-k
|
unknown
|
||
https://jesperiz.carrd.co/
|
unknown
|
||
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.16/CustomRP.1.17.16.exe
|
unknown
|
||
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.23/CustomRP.Hashes.1.17.23.txt
|
unknown
|
||
https://uploads.github.com/repos/maximmax42/Discord-CustomRP/releases/143518737/assets
|
unknown
|
||
https://api.github.com/users/maximmax42/following
|
unknown
|
||
https://github.com/Knagis/CommonMark.NET
|
unknown
|
||
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.22/CustomRP.1.17.22.exe
|
unknown
|
||
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/assets/9840178
|
unknown
|
||
https://api.github.com/repositories/158286982/releases?page=2lB
|
unknown
|
||
https://avatars.githubusercontent.com/u/2225711?v=4lB
|
unknown
|
||
https://github.com/octokit/octokit.net
|
unknown
|
||
https://docs.customrp.xyz/~gitbook/image?url=https%3A%2F%2Fuser-images.githubusercontent.com%2F2225711%2F161050202-c796103d-6712-401e-be96-3f3712512375.png&width=768&dpr=4&quality=100&sign=1d31e0c1&sv=1
|
172.64.147.209
|
||
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.26/CustomRP.Hashes.1.17.26.txt
|
unknown
|
||
https://uploads.github.com/repos/maximmax42/Discord-CustomRP/releases/120548332/assets
|
unknown
|
||
https://api.github.com/
|
unknown
|
||
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/120549358/assets
|
unknown
|
||
https://raw.githubusercontent.com/dcurtis/markdown-mark/m
|
unknown
|
||
https://boefjim.com/
|
unknown
|
||
https://api.github.com/users/maximmax42/repos
|
unknown
|
||
https://japanesegirl99.muzes.xyz/))
|
unknown
|
||
https://uploads.github.com/repos/maximmax42/Discord-CustomRP/releases/152239004/assets
|
unknown
|
||
https://uploads.github.com/repos/maximmax42/Discord-CustomRP/releases/105004829/assets
|
unknown
|
||
https://api.github.com/users/maximmax42LR
|
unknown
|
||
https://4ng3l.com/
|
unknown
|
||
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/assets/28138380
|
unknown
|
||
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/assets/9847888lB
|
unknown
|
||
https://sys-256.me/
|
unknown
|
||
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.18/CustomRP.1.17.18.exe
|
unknown
|
||
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/assets/139951833
|
unknown
|
||
https://github.com/maximmax42/Discord-CustomRP/releases/tag/1.14.2
|
unknown
|
||
https://zag.rip
|
unknown
|
||
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/142494604/assets
|
unknown
|
||
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/125125712
|
unknown
|
||
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/105004829
|
unknown
|
||
https://julian-idl.codes/
|
unknown
|
||
https://docs.customrp.xyz/setting-up
|
|||
https://api.github.com/repos/maximmax42/Discord-CustomRP/zipball/1.17.13.1
|
unknown
|
||
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/assets/139951848
|
unknown
|
||
https://opensea.io/collection/worldtowers
|
unknown
|
||
https://www.youtube.com/channel/UCxNVq2Esevsdp2v1jGQNu5A
|
unknown
|
||
https://api.github.com/repos/maximmax42/Discord-CustomRP/tarball/1.14.2
|
unknown
|
||
https://app.gitbook.com/__session?proposed=c7fb3030-4991-43e6-a825-1b67f742be0cR
|
172.64.146.167
|
||
https://github.com/ericsink/SQLitePCL.rawX
|
unknown
|
||
https://api.github.com/repos/maximmax42/Discord-CustomRP/releases/110103989/assets
|
unknown
|
||
https://meap.gg/
|
unknown
|
||
https://docs.customrp.xyz/_next/static/media/c9a5bc6a7c948fb0-s.woff2
|
172.64.147.209
|
||
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.14.5/CustomRP.1.14.5.zip
|
unknown
|
||
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.23/CustomRP.1.17.23.exe
|
unknown
|
||
https://github.com/maximmax42/Discord-CustomRP/releases/download/1.17.24/CustomRP.1.17.24.zip
|
unknown
|
||
https://isaidpower.dev/
|
unknown
|
||
https://github.com/maximmax42/Discord-CustomRP/releases/download/v1.0/CustomRP.1.0.zip
|
unknown
|
||
https://www.customrp.xyz/donations/NearbyFish.png
|
unknown
|
||
https://avatars.githubusercontent.com/u/2225711?v=4
|
unknown
|
||
https://uploads.github.com/repos/maximmax42/Discord-CustomRP/releases/130222051/assets
|
unknown
|
||
https://docs.customrp.xyz/_next/static/chunks/5810-30abd17002efe9e2.js
|
172.64.147.209
|
||
https://github.com/ericsink/SQLitePCL.rawH
|
unknown
|
||
http://www.dk-soft.org/
|
unknown
|
||
https://api.github.com/repos/maximmax42/Discord-CustomRP/tarball/1.17.20.1
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
ip-api.com
|
208.95.112.1
|
||
in.appcenter.ms
|
unknown
|
||
docs.customrp.xyz
|
unknown
|
||
h2cker.ddns.net
|
unknown
|
||
3448418481-files.gitbook.io
|
172.64.147.209
|
||
github.com
|
140.82.121.4
|
||
api.github.com
|
140.82.121.5
|
||
d2bc804067-hosting.gitbook.io
|
172.64.147.209
|
||
www.google.com
|
142.250.181.228
|
||
app.gitbook.com
|
172.64.146.167
|
||
objects.githubusercontent.com
|
185.199.111.133
|
||
api.gitbook.com
|
104.18.41.89
|
There are 2 hidden domains, click here to show them.
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
208.95.112.1
|
ip-api.com
|
United States
|
||
104.18.41.89
|
api.gitbook.com
|
United States
|
||
192.168.2.7
|
unknown
|
unknown
|
||
140.82.121.4
|
github.com
|
United States
|
||
140.82.121.5
|
api.github.com
|
United States
|
||
185.199.111.133
|
objects.githubusercontent.com
|
Netherlands
|
||
172.64.146.167
|
app.gitbook.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
142.250.181.228
|
www.google.com
|
United States
|
||
172.64.147.209
|
3448418481-files.gitbook.io
|
United States
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_CURRENT_USER
|
di
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Local_wGRdnhmmy_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Local_wGRdnhmmy
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER_Classes\.crp\OpenWithProgids
|
CustomRP.crp
|
||
HKEY_CURRENT_USER_Classes\CustomRP.crp
|
NULL
|
||
HKEY_CURRENT_USER_Classes\CustomRP.crp\DefaultIcon
|
NULL
|
||
HKEY_CURRENT_USER_Classes\CustomRP.crp\shell\open\command
|
NULL
|
||
HKEY_CURRENT_USER_Classes\Applications\CustomRP.exe\SupportedTypes
|
.crp
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
Inno Setup: Setup Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
Inno Setup: App Path
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
InstallLocation
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
Inno Setup: Icon Group
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
Inno Setup: User
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
Inno Setup: Selected Tasks
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
Inno Setup: Deselected Tasks
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
Inno Setup: Language
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
DisplayIcon
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
UninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
QuietUninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
DisplayVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
Publisher
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
URLInfoAbout
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
HelpLink
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
URLUpdateInfo
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
NoModify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
NoRepair
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
InstallDate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
MajorVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
MinorVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
VersionMajor
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
VersionMinor
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
|
GlobalAssocChangedCounter
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\CustomRP_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Owner
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
SessionHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
Sequence
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFiles0000
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
|
RegFilesHash
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
Inno Setup: Setup Version
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
Inno Setup: App Path
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
InstallLocation
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
Inno Setup: Icon Group
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
Inno Setup: User
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
Inno Setup: Selected Tasks
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
Inno Setup: Deselected Tasks
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
Inno Setup: Language
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
DisplayName
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
DisplayIcon
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
UninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
QuietUninstallString
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
DisplayVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
Publisher
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
URLInfoAbout
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
HelpLink
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
URLUpdateInfo
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
NoModify
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
NoRepair
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
InstallDate
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
MajorVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
MinorVersion
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
VersionMajor
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
VersionMinor
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{6B1949CF-3AC6-43B8-95BF-5517797E2CEA}_is1
|
EstimatedSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Explorer
|
GlobalAssocChangedCounter
|
There are 88 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2E01000
|
trusted library allocation
|
page read and write
|
||
215000
|
unkown
|
page readonly
|
||
3C2000
|
unkown
|
page readonly
|
||
2EE1000
|
trusted library allocation
|
page read and write
|
||
25E1000
|
trusted library allocation
|
page read and write
|
||
2EA1000
|
trusted library allocation
|
page read and write
|
||
12E1D000
|
trusted library allocation
|
page read and write
|
||
206000
|
unkown
|
page readonly
|
||
84B000
|
unkown
|
page readonly
|
||
5C2000
|
unkown
|
page readonly
|
||
27F0000
|
direct allocation
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
2513000
|
direct allocation
|
page read and write
|
||
BD30000
|
trusted library allocation
|
page read and write
|
||
781D000
|
heap
|
page read and write
|
||
31B6000
|
trusted library allocation
|
page read and write
|
||
3C20000
|
heap
|
page read and write
|
||
9CE000
|
heap
|
page read and write
|
||
3AD4000
|
trusted library allocation
|
page read and write
|
||
ACF000
|
heap
|
page read and write
|
||
A80000
|
unkown
|
page readonly
|
||
9E5000
|
heap
|
page read and write
|
||
3786000
|
trusted library allocation
|
page read and write
|
||
38FC000
|
trusted library allocation
|
page read and write
|
||
379E000
|
direct allocation
|
page read and write
|
||
A0A0000
|
heap
|
page read and write
|
||
BCB0000
|
trusted library allocation
|
page read and write
|
||
7FFAA9D5D000
|
trusted library allocation
|
page execute and read and write
|
||
3848000
|
direct allocation
|
page read and write
|
||
779C000
|
heap
|
page read and write
|
||
1386000
|
heap
|
page read and write
|
||
24D1000
|
direct allocation
|
page read and write
|
||
1B6EA000
|
trusted library allocation
|
page read and write
|
||
70F0000
|
trusted library allocation
|
page read and write
|
||
247A000
|
direct allocation
|
page read and write
|
||
5C54000
|
heap
|
page execute and read and write
|
||
4DC0000
|
heap
|
page read and write
|
||
D2E000
|
heap
|
page read and write
|
||
C3D0000
|
trusted library allocation
|
page execute and read and write
|
||
2826000
|
direct allocation
|
page read and write
|
||
5590000
|
trusted library allocation
|
page read and write
|
||
BF9000
|
heap
|
page read and write
|
||
1B29D000
|
stack
|
page read and write
|
||
B59D000
|
heap
|
page read and write
|
||
3407000
|
trusted library allocation
|
page read and write
|
||
9F80000
|
trusted library section
|
page readonly
|
||
7FFAACBC2000
|
trusted library allocation
|
page execute and read and write
|
||
A47000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
990000
|
heap
|
page read and write
|
||
3896000
|
trusted library allocation
|
page read and write
|
||
2AE0000
|
heap
|
page read and write
|
||
22DA000
|
direct allocation
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
21EC000
|
trusted library allocation
|
page read and write
|
||
BF5D000
|
stack
|
page read and write
|
||
6CA000
|
unkown
|
page read and write
|
||
8E00000
|
trusted library allocation
|
page read and write
|
||
1B7CE000
|
stack
|
page read and write
|
||
9D82000
|
heap
|
page read and write
|
||
243C000
|
direct allocation
|
page read and write
|
||
3727000
|
trusted library allocation
|
page read and write
|
||
F731F2F000
|
unkown
|
page read and write
|
||
4DEA000
|
heap
|
page read and write
|
||
BA2000
|
trusted library allocation
|
page execute and read and write
|
||
4DE0000
|
heap
|
page read and write
|
||
7BF000
|
heap
|
page read and write
|
||
6C7000
|
unkown
|
page read and write
|
||
3427000
|
trusted library allocation
|
page read and write
|
||
9D6000
|
heap
|
page read and write
|
||
5A6E000
|
stack
|
page read and write
|
||
7FFAA9D8C000
|
trusted library allocation
|
page execute and read and write
|
||
3770000
|
direct allocation
|
page read and write
|
||
C200000
|
trusted library allocation
|
page execute and read and write
|
||
5785000
|
direct allocation
|
page read and write
|
||
7FFAA9D44000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
heap
|
page read and write
|
||
607E000
|
stack
|
page read and write
|
||
B07000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
12EB000
|
trusted library allocation
|
page execute and read and write
|
||
488F000
|
stack
|
page read and write
|
||
16F0000
|
heap
|
page read and write
|
||
194000
|
stack
|
page read and write
|
||
7FFAA9D7D000
|
trusted library allocation
|
page execute and read and write
|
||
770000
|
heap
|
page read and write
|
||
6342000
|
unkown
|
page readonly
|
||
1947000
|
heap
|
page read and write
|
||
5C0000
|
unkown
|
page readonly
|
||
87E000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
5A40000
|
unkown
|
page readonly
|
||
3A37000
|
direct allocation
|
page read and write
|
||
5879000
|
direct allocation
|
page read and write
|
||
E5B000
|
heap
|
page read and write
|
||
37FE000
|
stack
|
page read and write
|
||
AAC000
|
heap
|
page read and write
|
||
12D08000
|
trusted library allocation
|
page read and write
|
||
5660000
|
unkown
|
page readonly
|
||
1000000
|
trusted library allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
F17000
|
heap
|
page read and write
|
||
8A0000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
CDEE000
|
stack
|
page read and write
|
||
CE40000
|
trusted library allocation
|
page execute and read and write
|
||
11F3000
|
heap
|
page read and write
|
||
3721000
|
trusted library allocation
|
page read and write
|
||
73D0000
|
trusted library allocation
|
page read and write
|
||
2B5E000
|
stack
|
page read and write
|
||
895000
|
heap
|
page read and write
|
||
AEB000
|
heap
|
page read and write
|
||
121E3000
|
trusted library allocation
|
page read and write
|
||
1B6CE000
|
stack
|
page read and write
|
||
2C11000
|
trusted library allocation
|
page read and write
|
||
5570000
|
trusted library allocation
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
7A6000
|
heap
|
page read and write
|
||
FDF000
|
heap
|
page read and write
|
||
8C70000
|
trusted library allocation
|
page execute and read and write
|
||
1167000
|
heap
|
page read and write
|
||
38B3000
|
trusted library allocation
|
page read and write
|
||
C24E000
|
stack
|
page read and write
|
||
32F0000
|
heap
|
page execute and read and write
|
||
F68000
|
stack
|
page read and write
|
||
4DE0000
|
heap
|
page read and write
|
||
AEB000
|
heap
|
page read and write
|
||
AD8000
|
heap
|
page read and write
|
||
3B36000
|
trusted library allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
5472000
|
heap
|
page read and write
|
||
3719000
|
trusted library allocation
|
page read and write
|
||
CB8E000
|
stack
|
page read and write
|
||
5572000
|
heap
|
page read and write
|
||
2D1C000
|
trusted library allocation
|
page read and write
|
||
E63000
|
heap
|
page read and write
|
||
7FFAA9D60000
|
trusted library allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
A1ED000
|
heap
|
page read and write
|
||
27B0000
|
direct allocation
|
page read and write
|
||
1B517000
|
heap
|
page read and write
|
||
372B000
|
trusted library allocation
|
page read and write
|
||
710000
|
heap
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
7FE4E000
|
direct allocation
|
page read and write
|
||
116E000
|
stack
|
page read and write
|
||
6D0000
|
heap
|
page read and write
|
||
266A000
|
direct allocation
|
page read and write
|
||
E53000
|
trusted library allocation
|
page read and write
|
||
2878000
|
direct allocation
|
page read and write
|
||
B1E000
|
stack
|
page read and write
|
||
2A4E000
|
stack
|
page read and write
|
||
B36000
|
stack
|
page read and write
|
||
4301000
|
trusted library allocation
|
page read and write
|
||
6CF0000
|
trusted library allocation
|
page read and write
|
||
75C000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
70446000
|
unkown
|
page readonly
|
||
27EC000
|
direct allocation
|
page read and write
|
||
9C25000
|
heap
|
page read and write
|
||
C260000
|
trusted library allocation
|
page read and write
|
||
7FFB0CCA5000
|
unkown
|
page readonly
|
||
3A0A000
|
trusted library allocation
|
page read and write
|
||
C90000
|
heap
|
page read and write
|
||
F731FAE000
|
stack
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
449000
|
heap
|
page read and write
|
||
2480000
|
direct allocation
|
page read and write
|
||
AE9000
|
heap
|
page read and write
|
||
5734000
|
direct allocation
|
page read and write
|
||
3729000
|
trusted library allocation
|
page read and write
|
||
3AD0000
|
trusted library allocation
|
page read and write
|
||
8D00000
|
trusted library allocation
|
page read and write
|
||
616E000
|
unkown
|
page readonly
|
||
7FFAA9D4D000
|
trusted library allocation
|
page execute and read and write
|
||
7EC000
|
heap
|
page read and write
|
||
6E40000
|
trusted library allocation
|
page execute and read and write
|
||
89A0000
|
heap
|
page read and write
|
||
3A00000
|
trusted library allocation
|
page read and write
|
||
2308000
|
direct allocation
|
page read and write
|
||
E10000
|
trusted library allocation
|
page read and write
|
||
97D000
|
heap
|
page read and write
|
||
3195000
|
trusted library allocation
|
page read and write
|
||
3100000
|
heap
|
page execute and read and write
|
||
8B10000
|
trusted library allocation
|
page read and write
|
||
C65000
|
heap
|
page read and write
|
||
27C0000
|
direct allocation
|
page read and write
|
||
8A7000
|
heap
|
page read and write
|
||
CBE000
|
stack
|
page read and write
|
||
9B10000
|
trusted library allocation
|
page read and write
|
||
2AB0000
|
heap
|
page execute and read and write
|
||
B2A000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
6A7E000
|
stack
|
page read and write
|
||
588E000
|
direct allocation
|
page read and write
|
||
98D000
|
heap
|
page read and write
|
||
58B0000
|
direct allocation
|
page read and write
|
||
8E60000
|
trusted library allocation
|
page read and write
|
||
B5F3000
|
heap
|
page read and write
|
||
3214000
|
trusted library allocation
|
page read and write
|
||
E4F000
|
heap
|
page read and write
|
||
E7A000
|
trusted library allocation
|
page execute and read and write
|
||
7100000
|
trusted library allocation
|
page execute and read and write
|
||
E62000
|
trusted library allocation
|
page execute and read and write
|
||
77E000
|
heap
|
page read and write
|
||
14B4000
|
trusted library allocation
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
3923000
|
trusted library allocation
|
page read and write
|
||
E67000
|
stack
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
286B000
|
direct allocation
|
page read and write
|
||
BB60000
|
trusted library allocation
|
page execute and read and write
|
||
A3A000
|
stack
|
page read and write
|
||
AFA000
|
heap
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
9A0000
|
heap
|
page read and write
|
||
E01E000
|
stack
|
page read and write
|
||
E57000
|
heap
|
page read and write
|
||
7C5000
|
heap
|
page read and write
|
||
3A5E000
|
direct allocation
|
page read and write
|
||
1BC7E000
|
stack
|
page read and write
|
||
382A000
|
direct allocation
|
page read and write
|
||
CF00000
|
trusted library allocation
|
page execute and read and write
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
20000
|
trusted library allocation
|
page read and write
|
||
7FFAA9D4D000
|
trusted library allocation
|
page execute and read and write
|
||
2334000
|
direct allocation
|
page read and write
|
||
268A000
|
direct allocation
|
page read and write
|
||
83D000
|
heap
|
page read and write
|
||
7FFAA9D43000
|
trusted library allocation
|
page execute and read and write
|
||
ACF000
|
heap
|
page read and write
|
||
6A0000
|
heap
|
page read and write
|
||
7FFAA9D44000
|
trusted library allocation
|
page read and write
|
||
1000000
|
heap
|
page read and write
|
||
24B4000
|
direct allocation
|
page read and write
|
||
89A5000
|
heap
|
page read and write
|
||
60C0000
|
unkown
|
page readonly
|
||
1760000
|
heap
|
page read and write
|
||
9E5000
|
heap
|
page read and write
|
||
3A79000
|
direct allocation
|
page read and write
|
||
6CE000
|
unkown
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
1040000
|
heap
|
page read and write
|
||
7FFAACC9D000
|
trusted library allocation
|
page execute and read and write
|
||
894000
|
heap
|
page read and write
|
||
AED000
|
heap
|
page read and write
|
||
BEC0000
|
trusted library allocation
|
page read and write
|
||
EA0000
|
heap
|
page read and write
|
||
115B000
|
heap
|
page read and write
|
||
37E6000
|
trusted library allocation
|
page read and write
|
||
A310000
|
trusted library allocation
|
page execute and read and write
|
||
2A20000
|
trusted library allocation
|
page read and write
|
||
1682000
|
trusted library allocation
|
page read and write
|
||
2856000
|
direct allocation
|
page read and write
|
||
1030000
|
trusted library allocation
|
page read and write
|
||
5570000
|
heap
|
page read and write
|
||
7FFAA9E20000
|
trusted library allocation
|
page execute and read and write
|
||
1B7EF000
|
stack
|
page read and write
|
||
2326000
|
direct allocation
|
page read and write
|
||
98D000
|
heap
|
page read and write
|
||
BCAF000
|
stack
|
page read and write
|
||
A2D0000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
7FFAA9E50000
|
trusted library allocation
|
page execute and read and write
|
||
5640000
|
trusted library allocation
|
page read and write
|
||
750000
|
unkown
|
page readonly
|
||
5586000
|
trusted library allocation
|
page read and write
|
||
23AA000
|
direct allocation
|
page read and write
|
||
7150000
|
heap
|
page read and write
|
||
3713000
|
trusted library allocation
|
page read and write
|
||
C68C000
|
stack
|
page read and write
|
||
7FFAACC8A000
|
trusted library allocation
|
page execute and read and write
|
||
3B13000
|
trusted library allocation
|
page read and write
|
||
EFA000
|
heap
|
page read and write
|
||
888000
|
heap
|
page read and write
|
||
2D0C000
|
trusted library allocation
|
page read and write
|
||
4DF4000
|
heap
|
page read and write
|
||
6340000
|
unkown
|
page readonly
|
||
7D5000
|
heap
|
page read and write
|
||
367E000
|
trusted library allocation
|
page read and write
|
||
981000
|
heap
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
1300000
|
trusted library allocation
|
page read and write
|
||
3B6C000
|
trusted library allocation
|
page read and write
|
||
563E000
|
stack
|
page read and write
|
||
38FF000
|
trusted library allocation
|
page read and write
|
||
7FFAA9D40000
|
trusted library allocation
|
page read and write
|
||
B31000
|
heap
|
page read and write
|
||
E49000
|
heap
|
page read and write
|
||
9140000
|
trusted library allocation
|
page execute and read and write
|
||
B3B000
|
heap
|
page read and write
|
||
16C000
|
stack
|
page read and write
|
||
9C9000
|
heap
|
page read and write
|
||
BEB0000
|
trusted library allocation
|
page execute and read and write
|
||
C3E000
|
stack
|
page read and write
|
||
9DA0000
|
heap
|
page read and write
|
||
6A57A000
|
unkown
|
page readonly
|
||
7FFAA9E50000
|
trusted library allocation
|
page execute and read and write
|
||
CD0000
|
heap
|
page read and write
|
||
2B21000
|
trusted library allocation
|
page read and write
|
||
53F1000
|
trusted library allocation
|
page read and write
|
||
BD3000
|
heap
|
page read and write
|
||
96A000
|
heap
|
page read and write
|
||
3839000
|
trusted library allocation
|
page read and write
|
||
3788000
|
trusted library allocation
|
page read and write
|
||
55F2000
|
unkown
|
page readonly
|
||
3A83000
|
direct allocation
|
page read and write
|
||
7FFAA9E16000
|
trusted library allocation
|
page execute and read and write
|
||
3312000
|
trusted library allocation
|
page read and write
|
||
F70000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page execute and read and write
|
||
31AE000
|
trusted library allocation
|
page read and write
|
||
385A000
|
trusted library allocation
|
page read and write
|
||
7FDBE000
|
direct allocation
|
page read and write
|
||
214A1240000
|
heap
|
page read and write
|
||
942000
|
heap
|
page read and write
|
||
B08000
|
heap
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
F5E000
|
heap
|
page read and write
|
||
2A8E000
|
stack
|
page read and write
|
||
5472000
|
heap
|
page read and write
|
||
151E000
|
stack
|
page read and write
|
||
BEF0000
|
unkown
|
page readonly
|
||
7FFAA9DBC000
|
trusted library allocation
|
page execute and read and write
|
||
3890000
|
direct allocation
|
page read and write
|
||
68D0000
|
heap
|
page read and write
|
||
53FD000
|
trusted library allocation
|
page read and write
|
||
903D000
|
stack
|
page read and write
|
||
7FFAA9D70000
|
trusted library allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
6352000
|
unkown
|
page readonly
|
||
57A7000
|
direct allocation
|
page read and write
|
||
1B8CE000
|
stack
|
page read and write
|
||
12BD000
|
trusted library allocation
|
page execute and read and write
|
||
2474000
|
direct allocation
|
page read and write
|
||
3819000
|
trusted library allocation
|
page read and write
|
||
3914000
|
trusted library allocation
|
page read and write
|
||
4DE3000
|
heap
|
page read and write
|
||
30EE000
|
stack
|
page read and write
|
||
B630000
|
trusted library allocation
|
page read and write
|
||
22CA000
|
direct allocation
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
A03000
|
trusted library allocation
|
page read and write
|
||
2446000
|
direct allocation
|
page read and write
|
||
C4E000
|
heap
|
page read and write
|
||
CE10000
|
trusted library allocation
|
page read and write
|
||
3B7A000
|
trusted library allocation
|
page read and write
|
||
50F9000
|
stack
|
page read and write
|
||
3700000
|
trusted library allocation
|
page read and write
|
||
977000
|
heap
|
page read and write
|
||
1B1AE000
|
stack
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
35CD000
|
trusted library allocation
|
page read and write
|
||
AFA000
|
heap
|
page read and write
|
||
52BE000
|
stack
|
page read and write
|
||
1563000
|
heap
|
page read and write
|
||
64F0000
|
trusted library allocation
|
page read and write
|
||
7B0000
|
heap
|
page execute and read and write
|
||
5740000
|
direct allocation
|
page read and write
|
||
6DE000
|
unkown
|
page readonly
|
||
1BB4D000
|
stack
|
page read and write
|
||
600000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
CDF0000
|
trusted library allocation
|
page read and write
|
||
E67000
|
heap
|
page read and write
|
||
5780000
|
trusted library allocation
|
page read and write
|
||
7805000
|
heap
|
page read and write
|
||
84B000
|
heap
|
page read and write
|
||
1700000
|
trusted library allocation
|
page read and write
|
||
6880000
|
trusted library allocation
|
page execute and read and write
|
||
E6A000
|
trusted library allocation
|
page execute and read and write
|
||
9C32000
|
unkown
|
page readonly
|
||
9D4000
|
heap
|
page read and write
|
||
750000
|
heap
|
page read and write
|
||
6860000
|
trusted library allocation
|
page execute and read and write
|
||
1B4B0000
|
heap
|
page read and write
|
||
5572000
|
heap
|
page read and write
|
||
BB90000
|
trusted library allocation
|
page read and write
|
||
C2E000
|
stack
|
page read and write
|
||
4BA000
|
unkown
|
page read and write
|
||
B08000
|
heap
|
page read and write
|
||
10AB000
|
trusted library allocation
|
page execute and read and write
|
||
AD9000
|
heap
|
page read and write
|
||
12E0000
|
trusted library allocation
|
page read and write
|
||
A300000
|
trusted library allocation
|
page read and write
|
||
4DF4000
|
heap
|
page read and write
|
||
39E8000
|
trusted library allocation
|
page read and write
|
||
CE90000
|
unkown
|
page readonly
|
||
2BF0000
|
heap
|
page read and write
|
||
77BB000
|
heap
|
page read and write
|
||
7260000
|
trusted library section
|
page readonly
|
||
894000
|
heap
|
page read and write
|
||
AFA000
|
heap
|
page read and write
|
||
3140000
|
heap
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
45B000
|
heap
|
page read and write
|
||
12AD000
|
stack
|
page read and write
|
||
FA0000
|
heap
|
page read and write
|
||
1BE3A000
|
stack
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
953000
|
heap
|
page read and write
|
||
9BB0000
|
trusted library allocation
|
page read and write
|
||
38AE000
|
trusted library allocation
|
page read and write
|
||
74E0000
|
heap
|
page read and write
|
||
109E000
|
stack
|
page read and write
|
||
2A40000
|
trusted library allocation
|
page read and write
|
||
157E000
|
heap
|
page read and write
|
||
3100000
|
heap
|
page read and write
|
||
3817000
|
direct allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
1B7BE000
|
stack
|
page read and write
|
||
5570000
|
heap
|
page read and write
|
||
9F90000
|
heap
|
page read and write
|
||
3690000
|
unkown
|
page read and write
|
||
B39000
|
heap
|
page read and write
|
||
22EE000
|
stack
|
page read and write
|
||
9F0000
|
trusted library allocation
|
page read and write
|
||
6A58B000
|
unkown
|
page readonly
|
||
2C14000
|
trusted library allocation
|
page read and write
|
||
3F9F000
|
stack
|
page read and write
|
||
39C5000
|
trusted library allocation
|
page read and write
|
||
5769000
|
direct allocation
|
page read and write
|
||
12E5000
|
trusted library allocation
|
page execute and read and write
|
||
8F90000
|
trusted library allocation
|
page execute and read and write
|
||
16EB000
|
trusted library allocation
|
page execute and read and write
|
||
986000
|
heap
|
page read and write
|
||
B02000
|
heap
|
page read and write
|
||
720000
|
heap
|
page read and write
|
||
36FE000
|
stack
|
page read and write
|
||
2425000
|
direct allocation
|
page read and write
|
||
BCE0000
|
trusted library allocation
|
page read and write
|
||
2D00000
|
trusted library allocation
|
page read and write
|
||
EDF000
|
stack
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
691C000
|
stack
|
page read and write
|
||
53DB000
|
trusted library allocation
|
page read and write
|
||
3957000
|
direct allocation
|
page read and write
|
||
38EE000
|
trusted library allocation
|
page read and write
|
||
6E30000
|
trusted library allocation
|
page read and write
|
||
3C0000
|
heap
|
page read and write
|
||
A1D0000
|
heap
|
page read and write
|
||
6080000
|
trusted library allocation
|
page read and write
|
||
9AA0000
|
unkown
|
page readonly
|
||
C70000
|
heap
|
page read and write
|
||
1BF4E000
|
stack
|
page read and write
|
||
BD40000
|
trusted library allocation
|
page read and write
|
||
7FFAA9D47000
|
trusted library allocation
|
page read and write
|
||
7044D000
|
unkown
|
page read and write
|
||
2D6E000
|
stack
|
page read and write
|
||
EAE000
|
heap
|
page read and write
|
||
B92000
|
trusted library allocation
|
page execute and read and write
|
||
894000
|
heap
|
page read and write
|
||
282F000
|
direct allocation
|
page read and write
|
||
3C23000
|
heap
|
page read and write
|
||
D63000
|
heap
|
page read and write
|
||
A1BA000
|
heap
|
page read and write
|
||
31DC000
|
trusted library allocation
|
page read and write
|
||
8D50000
|
trusted library allocation
|
page execute and read and write
|
||
F27000
|
heap
|
page read and write
|
||
8666000
|
heap
|
page read and write
|
||
10BA000
|
trusted library allocation
|
page read and write
|
||
AD9000
|
heap
|
page read and write
|
||
3134000
|
trusted library allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
A85000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
EDF000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
2454000
|
direct allocation
|
page read and write
|
||
141E000
|
stack
|
page read and write
|
||
7FFAA9DE0000
|
trusted library allocation
|
page read and write
|
||
7110000
|
trusted library allocation
|
page read and write
|
||
980000
|
heap
|
page read and write
|
||
9D7000
|
heap
|
page read and write
|
||
7FFAA9E16000
|
trusted library allocation
|
page execute and read and write
|
||
A8C000
|
heap
|
page read and write
|
||
5893000
|
direct allocation
|
page read and write
|
||
57EE000
|
stack
|
page read and write
|
||
261B000
|
stack
|
page read and write
|
||
33E0000
|
trusted library allocation
|
page read and write
|
||
232D000
|
direct allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
B02000
|
heap
|
page read and write
|
||
FF7C0000
|
trusted library allocation
|
page execute and read and write
|
||
792000
|
heap
|
page read and write
|
||
F3F000
|
heap
|
page read and write
|
||
1687000
|
trusted library allocation
|
page execute and read and write
|
||
6B7E000
|
stack
|
page read and write
|
||
E72000
|
unkown
|
page readonly
|
||
CE00000
|
trusted library allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
592D000
|
stack
|
page read and write
|
||
7FFAA9D40000
|
trusted library allocation
|
page read and write
|
||
A7B000
|
heap
|
page read and write
|
||
342E000
|
trusted library allocation
|
page read and write
|
||
F4A000
|
heap
|
page read and write
|
||
2AF0000
|
heap
|
page execute and read and write
|
||
D0F000
|
heap
|
page read and write
|
||
43AA000
|
trusted library allocation
|
page read and write
|
||
A86000
|
heap
|
page read and write
|
||
6D9000
|
unkown
|
page write copy
|
||
6858000
|
stack
|
page read and write
|
||
89D8000
|
heap
|
page read and write
|
||
AE3000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
7FFAACBD2000
|
trusted library allocation
|
page execute and read and write
|
||
CCEE000
|
stack
|
page read and write
|
||
234A000
|
direct allocation
|
page read and write
|
||
A01E000
|
heap
|
page read and write
|
||
7FF4ECB80000
|
trusted library allocation
|
page execute and read and write
|
||
12B0000
|
heap
|
page read and write
|
||
5794000
|
direct allocation
|
page read and write
|
||
2B2C000
|
trusted library allocation
|
page read and write
|
||
22FA000
|
direct allocation
|
page read and write
|
||
BDBE000
|
stack
|
page read and write
|
||
A89000
|
heap
|
page read and write
|
||
9CF000
|
stack
|
page read and write
|
||
3841000
|
direct allocation
|
page read and write
|
||
5D9F000
|
stack
|
page read and write
|
||
474E000
|
stack
|
page read and write
|
||
A97000
|
heap
|
page read and write
|
||
E3E000
|
stack
|
page read and write
|
||
428000
|
heap
|
page read and write
|
||
1157000
|
heap
|
page read and write
|
||
398A000
|
trusted library allocation
|
page read and write
|
||
3AF1000
|
trusted library allocation
|
page read and write
|
||
5A00000
|
unkown
|
page readonly
|
||
B09000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
3ABC000
|
trusted library allocation
|
page read and write
|
||
2D30000
|
trusted library allocation
|
page read and write
|
||
BDB000
|
trusted library allocation
|
page execute and read and write
|
||
E29000
|
heap
|
page read and write
|
||
58A0000
|
heap
|
page execute and read and write
|
||
280C000
|
direct allocation
|
page read and write
|
||
1145000
|
heap
|
page read and write
|
||
231F000
|
direct allocation
|
page read and write
|
||
B5EF000
|
heap
|
page read and write
|
||
CE32000
|
unkown
|
page readonly
|
||
57BE000
|
stack
|
page read and write
|
||
714000
|
stack
|
page read and write
|
||
2ABE000
|
stack
|
page read and write
|
||
38D7000
|
trusted library allocation
|
page read and write
|
||
E2C000
|
heap
|
page read and write
|
||
25A0000
|
direct allocation
|
page read and write
|
||
8BA0000
|
trusted library section
|
page read and write
|
||
1370000
|
heap
|
page read and write
|
||
9CF000
|
heap
|
page read and write
|
||
420000
|
heap
|
page read and write
|
||
5570000
|
heap
|
page read and write
|
||
B55F000
|
heap
|
page read and write
|
||
1410000
|
heap
|
page read and write
|
||
A080000
|
heap
|
page read and write
|
||
ACB000
|
heap
|
page read and write
|
||
105E000
|
stack
|
page read and write
|
||
246B000
|
direct allocation
|
page read and write
|
||
3A7B000
|
trusted library allocation
|
page read and write
|
||
70E0000
|
heap
|
page read and write
|
||
AE9000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
BD7000
|
trusted library allocation
|
page execute and read and write
|
||
53D0000
|
trusted library allocation
|
page read and write
|
||
23B1000
|
direct allocation
|
page read and write
|
||
2361000
|
direct allocation
|
page read and write
|
||
8C4F000
|
stack
|
page read and write
|
||
2D11000
|
trusted library allocation
|
page read and write
|
||
B02000
|
heap
|
page read and write
|
||
9B20000
|
trusted library allocation
|
page execute and read and write
|
||
2682000
|
trusted library allocation
|
page read and write
|
||
304B000
|
trusted library allocation
|
page read and write
|
||
3B83000
|
trusted library allocation
|
page read and write
|
||
1BD2E000
|
stack
|
page read and write
|
||
AAC000
|
heap
|
page read and write
|
||
1BA7D000
|
stack
|
page read and write
|
||
96C000
|
heap
|
page read and write
|
||
1680000
|
trusted library allocation
|
page read and write
|
||
981000
|
heap
|
page read and write
|
||
3A8D000
|
trusted library allocation
|
page read and write
|
||
7FDE0000
|
direct allocation
|
page read and write
|
||
913E000
|
stack
|
page read and write
|
||
446000
|
heap
|
page read and write
|
||
2ED7000
|
trusted library allocation
|
page read and write
|
||
995000
|
stack
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
B3C000
|
heap
|
page read and write
|
||
3B0F000
|
trusted library allocation
|
page read and write
|
||
6FE8000
|
heap
|
page read and write
|
||
58A8000
|
direct allocation
|
page read and write
|
||
AF5000
|
heap
|
page read and write
|
||
2386000
|
direct allocation
|
page read and write
|
||
14A8000
|
heap
|
page read and write
|
||
5C30000
|
trusted library allocation
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
24C2000
|
direct allocation
|
page read and write
|
||
249F000
|
direct allocation
|
page read and write
|
||
4DF4000
|
heap
|
page read and write
|
||
3CA1000
|
heap
|
page read and write
|
||
CECA000
|
unkown
|
page readonly
|
||
7DE000
|
heap
|
page read and write
|
||
7D0000
|
heap
|
page read and write
|
||
283D000
|
direct allocation
|
page read and write
|
||
377E000
|
direct allocation
|
page read and write
|
||
7FF41C620000
|
trusted library allocation
|
page execute and read and write
|
||
EF5000
|
heap
|
page read and write
|
||
831000
|
heap
|
page read and write
|
||
53FD000
|
stack
|
page read and write
|
||
281F000
|
direct allocation
|
page read and write
|
||
8B60000
|
trusted library allocation
|
page read and write
|
||
9680000
|
trusted library allocation
|
page execute and read and write
|
||
1373000
|
heap
|
page read and write
|
||
3A91000
|
trusted library allocation
|
page read and write
|
||
4C6000
|
unkown
|
page readonly
|
||
12A0000
|
trusted library allocation
|
page read and write
|
||
2430000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
843000
|
heap
|
page read and write
|
||
9BD5000
|
trusted library allocation
|
page read and write
|
||
C61E000
|
stack
|
page read and write
|
||
2B10000
|
heap
|
page read and write
|
||
BF0000
|
heap
|
page read and write
|
||
6D61000
|
heap
|
page read and write
|
||
7FFAA9D53000
|
trusted library allocation
|
page read and write
|
||
25E0000
|
heap
|
page read and write
|
||
132E000
|
stack
|
page read and write
|
||
93B000
|
heap
|
page read and write
|
||
B29000
|
heap
|
page read and write
|
||
2B9E000
|
stack
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
5594000
|
trusted library allocation
|
page read and write
|
||
3AB6000
|
trusted library allocation
|
page read and write
|
||
510D000
|
stack
|
page read and write
|
||
7FFAACC9A000
|
trusted library allocation
|
page execute and read and write
|
||
C70000
|
heap
|
page read and write
|
||
2F17000
|
trusted library allocation
|
page read and write
|
||
72F0000
|
trusted library allocation
|
page read and write
|
||
13C0000
|
heap
|
page read and write
|
||
2EB1000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
unkown
|
page read and write
|
||
CDB000
|
heap
|
page read and write
|
||
27B0000
|
direct allocation
|
page read and write
|
||
A12B000
|
heap
|
page read and write
|
||
7FFAACD02000
|
trusted library allocation
|
page read and write
|
||
6A20000
|
trusted library allocation
|
page read and write
|
||
7FFAA9D50000
|
trusted library allocation
|
page read and write
|
||
8681000
|
heap
|
page read and write
|
||
9FD8000
|
heap
|
page read and write
|
||
5895000
|
direct allocation
|
page read and write
|
||
3C34000
|
heap
|
page read and write
|
||
96A000
|
heap
|
page read and write
|
||
85B000
|
stack
|
page read and write
|
||
CA0B000
|
stack
|
page read and write
|
||
585E000
|
direct allocation
|
page read and write
|
||
AF1000
|
heap
|
page read and write
|
||
2341000
|
direct allocation
|
page read and write
|
||
59FE000
|
stack
|
page read and write
|
||
10EB000
|
heap
|
page read and write
|
||
D35000
|
heap
|
page read and write
|
||
5C10000
|
trusted library allocation
|
page read and write
|
||
B559000
|
heap
|
page read and write
|
||
2634000
|
trusted library allocation
|
page read and write
|
||
B2B000
|
heap
|
page read and write
|
||
B39000
|
heap
|
page read and write
|
||
A62000
|
heap
|
page read and write
|
||
64D0000
|
trusted library allocation
|
page read and write
|
||
1F0000
|
heap
|
page read and write
|
||
12B28000
|
trusted library allocation
|
page read and write
|
||
6A8D7000
|
unkown
|
page write copy
|
||
CED0000
|
trusted library allocation
|
page read and write
|
||
E70000
|
trusted library allocation
|
page read and write
|
||
63E0000
|
trusted library allocation
|
page read and write
|
||
B14000
|
heap
|
page read and write
|
||
6A582000
|
unkown
|
page readonly
|
||
586A000
|
direct allocation
|
page read and write
|
||
12B4000
|
trusted library allocation
|
page read and write
|
||
39EB000
|
trusted library allocation
|
page read and write
|
||
3258000
|
trusted library allocation
|
page read and write
|
||
8621000
|
heap
|
page read and write
|
||
FD0000
|
heap
|
page read and write
|
||
CD2000
|
heap
|
page read and write
|
||
3B52000
|
trusted library allocation
|
page read and write
|
||
3B31000
|
trusted library allocation
|
page read and write
|
||
2823000
|
heap
|
page read and write
|
||
33E8000
|
trusted library allocation
|
page read and write
|
||
3A95000
|
trusted library allocation
|
page read and write
|
||
79B000
|
heap
|
page read and write
|
||
12B21000
|
trusted library allocation
|
page read and write
|
||
EF0000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
115F000
|
heap
|
page read and write
|
||
957000
|
heap
|
page read and write
|
||
8695000
|
heap
|
page read and write
|
||
43BF000
|
trusted library allocation
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
1ACDE000
|
stack
|
page read and write
|
||
3A24000
|
trusted library allocation
|
page read and write
|
||
CB1F000
|
stack
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
F54000
|
heap
|
page read and write
|
||
89BF000
|
heap
|
page read and write
|
||
38B2000
|
trusted library allocation
|
page read and write
|
||
2829000
|
direct allocation
|
page read and write
|
||
1390000
|
heap
|
page execute and read and write
|
||
790000
|
heap
|
page read and write
|
||
24CA000
|
direct allocation
|
page read and write
|
||
77D2000
|
heap
|
page read and write
|
||
39D5000
|
trusted library allocation
|
page read and write
|
||
CE22000
|
unkown
|
page readonly
|
||
3A45000
|
direct allocation
|
page read and write
|
||
2853000
|
direct allocation
|
page read and write
|
||
5200000
|
heap
|
page read and write
|
||
920000
|
heap
|
page read and write
|
||
A55000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
A1B5000
|
heap
|
page read and write
|
||
B742000
|
trusted library allocation
|
page read and write
|
||
1163000
|
heap
|
page read and write
|
||
4E2000
|
heap
|
page read and write
|
||
4DF5000
|
heap
|
page read and write
|
||
BBB0000
|
trusted library allocation
|
page execute and read and write
|
||
58A6000
|
direct allocation
|
page read and write
|
||
370D000
|
trusted library allocation
|
page read and write
|
||
12F0000
|
heap
|
page execute and read and write
|
||
3C37000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
AFA000
|
heap
|
page read and write
|
||
7760000
|
heap
|
page read and write
|
||
3857000
|
trusted library allocation
|
page read and write
|
||
AB2000
|
unkown
|
page readonly
|
||
558B000
|
trusted library allocation
|
page read and write
|
||
1BF48000
|
stack
|
page read and write
|
||
37F3000
|
trusted library allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
8675000
|
heap
|
page read and write
|
||
3785000
|
direct allocation
|
page read and write
|
||
7FFAACBD0000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
trusted library allocation
|
page read and write
|
||
C80E000
|
stack
|
page read and write
|
||
E72000
|
trusted library allocation
|
page execute and read and write
|
||
3530000
|
direct allocation
|
page read and write
|
||
DAF000
|
heap
|
page read and write
|
||
3959000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page execute and read and write
|
||
783C000
|
heap
|
page read and write
|
||
386C000
|
direct allocation
|
page read and write
|
||
6EF000
|
stack
|
page read and write
|
||
E61000
|
heap
|
page read and write
|
||
11CA000
|
trusted library allocation
|
page read and write
|
||
72C0000
|
heap
|
page execute and read and write
|
||
D73000
|
heap
|
page read and write
|
||
37BE000
|
stack
|
page read and write
|
||
3404000
|
trusted library allocation
|
page read and write
|
||
B2C000
|
heap
|
page read and write
|
||
7FFAA9D3D000
|
trusted library allocation
|
page execute and read and write
|
||
5CC000
|
unkown
|
page readonly
|
||
894000
|
heap
|
page read and write
|
||
392E000
|
trusted library allocation
|
page read and write
|
||
3A9C000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
7250000
|
heap
|
page read and write
|
||
AF2000
|
heap
|
page read and write
|
||
7FFAA9D4D000
|
trusted library allocation
|
page execute and read and write
|
||
3BA0000
|
heap
|
page read and write
|
||
85E0000
|
heap
|
page read and write
|
||
7FFAA9E50000
|
trusted library allocation
|
page execute and read and write
|
||
11C0000
|
trusted library allocation
|
page read and write
|
||
1490000
|
trusted library allocation
|
page read and write
|
||
387A000
|
trusted library allocation
|
page read and write
|
||
780000
|
heap
|
page read and write
|
||
2368000
|
direct allocation
|
page read and write
|
||
CE20000
|
unkown
|
page readonly
|
||
7FFAACBC2000
|
trusted library allocation
|
page execute and read and write
|
||
60A2000
|
unkown
|
page readonly
|
||
894000
|
heap
|
page read and write
|
||
1220000
|
heap
|
page read and write
|
||
2720000
|
direct allocation
|
page execute and read and write
|
||
1F2000
|
unkown
|
page readonly
|
||
38E3000
|
trusted library allocation
|
page read and write
|
||
F5E000
|
stack
|
page read and write
|
||
A045000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
214A0FC0000
|
heap
|
page read and write
|
||
3918000
|
trusted library allocation
|
page read and write
|
||
B2D000
|
heap
|
page read and write
|
||
AFB000
|
heap
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
166D000
|
trusted library allocation
|
page execute and read and write
|
||
3210000
|
trusted library allocation
|
page read and write
|
||
AED000
|
heap
|
page read and write
|
||
121E000
|
stack
|
page read and write
|
||
2CF0000
|
trusted library allocation
|
page read and write
|
||
1B84E000
|
stack
|
page read and write
|
||
202000
|
unkown
|
page readonly
|
||
10B4000
|
trusted library allocation
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
36E4000
|
trusted library allocation
|
page read and write
|
||
2770000
|
heap
|
page read and write
|
||
3AB1000
|
trusted library allocation
|
page read and write
|
||
38F6000
|
trusted library allocation
|
page read and write
|
||
ABF000
|
stack
|
page read and write
|
||
A2E0000
|
trusted library allocation
|
page execute and read and write
|
||
7C8000
|
heap
|
page read and write
|
||
7FFAA9E10000
|
trusted library allocation
|
page read and write
|
||
E8A000
|
trusted library allocation
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
12EE5000
|
trusted library allocation
|
page read and write
|
||
12D13000
|
trusted library allocation
|
page read and write
|
||
3A99000
|
trusted library allocation
|
page read and write
|
||
E4C000
|
heap
|
page read and write
|
||
1BF7B000
|
stack
|
page read and write
|
||
2EE6000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
120E000
|
trusted library allocation
|
page read and write
|
||
389F000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
EC5000
|
heap
|
page read and write
|
||
A116000
|
heap
|
page read and write
|
||
3A19000
|
direct allocation
|
page read and write
|
||
AE8000
|
heap
|
page read and write
|
||
20000
|
trusted library allocation
|
page read and write
|
||
AF1000
|
heap
|
page read and write
|
||
6D30000
|
heap
|
page read and write
|
||
12D18000
|
trusted library allocation
|
page read and write
|
||
11E0000
|
trusted library allocation
|
page read and write
|
||
5761000
|
trusted library allocation
|
page read and write
|
||
7FFAA9DF6000
|
trusted library allocation
|
page read and write
|
||
6A471000
|
unkown
|
page execute read
|
||
520E000
|
stack
|
page read and write
|
||
965000
|
heap
|
page read and write
|
||
4DE0000
|
heap
|
page read and write
|
||
2865000
|
direct allocation
|
page read and write
|
||
39E0000
|
trusted library allocation
|
page read and write
|
||
AE4000
|
heap
|
page read and write
|
||
7FFAA9D64000
|
trusted library allocation
|
page read and write
|
||
6E80000
|
unkown
|
page readonly
|
||
4DE0000
|
heap
|
page read and write
|
||
98B000
|
heap
|
page read and write
|
||
885000
|
heap
|
page read and write
|
||
24D8000
|
direct allocation
|
page read and write
|
||
23A0000
|
direct allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
7FFAA9D44000
|
trusted library allocation
|
page read and write
|
||
30F0000
|
trusted library allocation
|
page execute and read and write
|
||
E87000
|
trusted library allocation
|
page execute and read and write
|
||
E26000
|
heap
|
page read and write
|
||
5A02000
|
unkown
|
page readonly
|
||
2351000
|
direct allocation
|
page read and write
|
||
7D2000
|
heap
|
page read and write
|
||
33E4000
|
trusted library allocation
|
page read and write
|
||
6F4000
|
unkown
|
page readonly
|
||
214A10E0000
|
heap
|
page read and write
|
||
233C000
|
direct allocation
|
page read and write
|
||
6DA8000
|
heap
|
page read and write
|
||
4DE4000
|
heap
|
page read and write
|
||
2430000
|
direct allocation
|
page read and write
|
||
DE6000
|
heap
|
page read and write
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
3444000
|
trusted library allocation
|
page read and write
|
||
27F7000
|
direct allocation
|
page read and write
|
||
7BC000
|
heap
|
page read and write
|
||
9A89000
|
trusted library allocation
|
page read and write
|
||
2323000
|
direct allocation
|
page read and write
|
||
95B000
|
heap
|
page read and write
|
||
AF5000
|
heap
|
page read and write
|
||
AAF000
|
heap
|
page read and write
|
||
1750000
|
heap
|
page read and write
|
||
12E01000
|
trusted library allocation
|
page read and write
|
||
3B2F000
|
trusted library allocation
|
page read and write
|
||
3EB1000
|
trusted library allocation
|
page read and write
|
||
6DB4000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
2E80000
|
trusted library allocation
|
page read and write
|
||
C1F0000
|
trusted library allocation
|
page read and write
|
||
33ED000
|
trusted library allocation
|
page read and write
|
||
50CE000
|
stack
|
page read and write
|
||
6A8DB000
|
unkown
|
page readonly
|
||
3E0000
|
heap
|
page read and write
|
||
4DE6000
|
heap
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
3A17000
|
trusted library allocation
|
page read and write
|
||
2E49000
|
trusted library allocation
|
page read and write
|
||
ACB000
|
heap
|
page read and write
|
||
1237000
|
stack
|
page read and write
|
||
321C000
|
trusted library allocation
|
page read and write
|
||
12D11000
|
trusted library allocation
|
page read and write
|
||
96FC000
|
stack
|
page read and write
|
||
1280000
|
heap
|
page read and write
|
||
1110000
|
heap
|
page read and write
|
||
2817000
|
direct allocation
|
page read and write
|
||
C99000
|
heap
|
page read and write
|
||
6C9000
|
unkown
|
page read and write
|
||
57ED000
|
stack
|
page read and write
|
||
3850000
|
direct allocation
|
page read and write
|
||
7788000
|
heap
|
page read and write
|
||
27C8000
|
direct allocation
|
page read and write
|
||
899B000
|
heap
|
page read and write
|
||
1654000
|
trusted library allocation
|
page read and write
|
||
5670000
|
heap
|
page read and write
|
||
7FFAA9DF0000
|
trusted library allocation
|
page execute and read and write
|
||
401000
|
unkown
|
page execute read
|
||
7FFAACD02000
|
trusted library allocation
|
page read and write
|
||
1B4C0000
|
heap
|
page execute and read and write
|
||
6F4000
|
stack
|
page read and write
|
||
7FF4DE4F0000
|
trusted library allocation
|
page execute and read and write
|
||
559F000
|
stack
|
page read and write
|
||
125E8000
|
trusted library allocation
|
page read and write
|
||
7EE000
|
heap
|
page read and write
|
||
CEC000
|
heap
|
page read and write
|
||
4DF6000
|
heap
|
page read and write
|
||
6410000
|
trusted library allocation
|
page read and write
|
||
31C5000
|
trusted library allocation
|
page read and write
|
||
16F7000
|
heap
|
page read and write
|
||
385E000
|
direct allocation
|
page read and write
|
||
A20C000
|
heap
|
page read and write
|
||
EE3000
|
heap
|
page read and write
|
||
1415000
|
heap
|
page read and write
|
||
A55000
|
heap
|
page read and write
|
||
CC8F000
|
stack
|
page read and write
|
||
12E05000
|
trusted library allocation
|
page read and write
|
||
31DF000
|
trusted library allocation
|
page read and write
|
||
53F0000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
A1E2000
|
heap
|
page read and write
|
||
36F2000
|
trusted library allocation
|
page read and write
|
||
36B3000
|
trusted library allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
43F000
|
heap
|
page read and write
|
||
38C6000
|
trusted library allocation
|
page read and write
|
||
3EA1000
|
trusted library allocation
|
page read and write
|
||
3600000
|
trusted library allocation
|
page read and write
|
||
121E8000
|
trusted library allocation
|
page read and write
|
||
AD8000
|
heap
|
page read and write
|
||
F44000
|
heap
|
page read and write
|
||
36A0000
|
trusted library allocation
|
page read and write
|
||
6C7000
|
unkown
|
page write copy
|
||
894000
|
heap
|
page read and write
|
||
11BE000
|
stack
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
95B000
|
heap
|
page read and write
|
||
3C20000
|
heap
|
page read and write
|
||
1653000
|
trusted library allocation
|
page execute and read and write
|
||
5777000
|
direct allocation
|
page read and write
|
||
57AA000
|
direct allocation
|
page read and write
|
||
1350000
|
heap
|
page read and write
|
||
C48000
|
heap
|
page read and write
|
||
5798000
|
direct allocation
|
page read and write
|
||
559E000
|
trusted library allocation
|
page read and write
|
||
A89000
|
heap
|
page read and write
|
||
BD70000
|
trusted library allocation
|
page execute and read and write
|
||
7CA000
|
heap
|
page read and write
|
||
35FC000
|
trusted library allocation
|
page read and write
|
||
ADA000
|
heap
|
page read and write
|
||
64B0000
|
trusted library allocation
|
page read and write
|
||
9B0000
|
heap
|
page read and write
|
||
C00000
|
heap
|
page read and write
|
||
784000
|
heap
|
page read and write
|
||
5C60000
|
trusted library allocation
|
page read and write
|
||
10B5000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
1B970000
|
heap
|
page read and write
|
||
232A000
|
direct allocation
|
page read and write
|
||
7D3000
|
heap
|
page read and write
|
||
4EB8000
|
trusted library allocation
|
page read and write
|
||
7FFAACD10000
|
trusted library allocation
|
page execute and read and write
|
||
10D0000
|
trusted library allocation
|
page read and write
|
||
26C0000
|
heap
|
page read and write
|
||
760000
|
trusted library allocation
|
page read and write
|
||
2580000
|
direct allocation
|
page read and write
|
||
A00000
|
trusted library allocation
|
page read and write
|
||
8B30000
|
trusted library allocation
|
page execute and read and write
|
||
890000
|
heap
|
page read and write
|
||
3BA0000
|
heap
|
page read and write
|
||
3810000
|
direct allocation
|
page read and write
|
||
7FFAACBD0000
|
trusted library allocation
|
page read and write
|
||
248C000
|
direct allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
B610000
|
heap
|
page read and write
|
||
C67E000
|
stack
|
page read and write
|
||
7521000
|
heap
|
page read and write
|
||
3B09000
|
trusted library allocation
|
page read and write
|
||
BBA0000
|
trusted library allocation
|
page read and write
|
||
24A4000
|
direct allocation
|
page read and write
|
||
11E0000
|
heap
|
page read and write
|
||
5899000
|
direct allocation
|
page read and write
|
||
F00000
|
heap
|
page read and write
|
||
3408000
|
trusted library allocation
|
page read and write
|
||
72E0000
|
heap
|
page read and write
|
||
C8C9000
|
stack
|
page read and write
|
||
480F000
|
stack
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
3B85000
|
trusted library allocation
|
page read and write
|
||
36D2000
|
trusted library allocation
|
page read and write
|
||
9BC0000
|
trusted library allocation
|
page execute and read and write
|
||
16A0000
|
trusted library allocation
|
page read and write
|
||
A8E000
|
heap
|
page read and write
|
||
9CB000
|
heap
|
page read and write
|
||
1020000
|
heap
|
page execute and read and write
|
||
AAC000
|
heap
|
page read and write
|
||
F4F000
|
heap
|
page read and write
|
||
200000
|
unkown
|
page readonly
|
||
C90C000
|
stack
|
page read and write
|
||
3EDE000
|
stack
|
page read and write
|
||
73C0000
|
trusted library allocation
|
page execute and read and write
|
||
1190000
|
trusted library allocation
|
page read and write
|
||
3610000
|
direct allocation
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
3A38000
|
trusted library allocation
|
page read and write
|
||
C34E000
|
stack
|
page read and write
|
||
6CE000
|
unkown
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
7C7000
|
heap
|
page read and write
|
||
5300000
|
heap
|
page read and write
|
||
77D7000
|
heap
|
page read and write
|
||
39E4000
|
trusted library allocation
|
page read and write
|
||
6A595000
|
unkown
|
page read and write
|
||
93E000
|
heap
|
page read and write
|
||
9E7000
|
heap
|
page read and write
|
||
B39000
|
heap
|
page read and write
|
||
7F2000
|
heap
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
7FFAA9D44000
|
trusted library allocation
|
page read and write
|
||
3CA0000
|
heap
|
page read and write
|
||
3770000
|
direct allocation
|
page read and write
|
||
A98000
|
heap
|
page read and write
|
||
93000
|
stack
|
page read and write
|
||
A88000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
8D68000
|
trusted library allocation
|
page read and write
|
||
C63C000
|
stack
|
page read and write
|
||
58EE000
|
stack
|
page read and write
|
||
B8F0000
|
trusted library allocation
|
page read and write
|
||
965000
|
heap
|
page read and write
|
||
5BE000
|
stack
|
page read and write
|
||
3CA1000
|
heap
|
page read and write
|
||
233A000
|
direct allocation
|
page read and write
|
||
13F0000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
7FFAACC90000
|
trusted library allocation
|
page read and write
|
||
7FFAACC82000
|
trusted library allocation
|
page execute and read and write
|
||
81A000
|
heap
|
page read and write
|
||
55F0000
|
unkown
|
page readonly
|
||
31BB000
|
trusted library allocation
|
page read and write
|
||
24E8000
|
direct allocation
|
page read and write
|
||
3A5F000
|
trusted library allocation
|
page read and write
|
||
7FFAACBDA000
|
trusted library allocation
|
page execute and read and write
|
||
53BE000
|
stack
|
page read and write
|
||
7CD000
|
heap
|
page read and write
|
||
4111000
|
trusted library allocation
|
page read and write
|
||
A1B3000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
95F000
|
heap
|
page read and write
|
||
9678000
|
stack
|
page read and write
|
||
3813000
|
trusted library allocation
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
2394000
|
direct allocation
|
page read and write
|
||
3410000
|
trusted library allocation
|
page read and write
|
||
1B4AB000
|
stack
|
page read and write
|
||
5494000
|
heap
|
page read and write
|
||
7FFAA9ED2000
|
trusted library allocation
|
page read and write
|
||
5D5D000
|
stack
|
page read and write
|
||
3130000
|
trusted library allocation
|
page read and write
|
||
4114000
|
trusted library allocation
|
page read and write
|
||
C3A0000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
977000
|
heap
|
page read and write
|
||
3B8D000
|
trusted library allocation
|
page read and write
|
||
8950000
|
heap
|
page read and write
|
||
4DE4000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
6FE000
|
stack
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
7FD50000
|
direct allocation
|
page read and write
|
||
108E000
|
stack
|
page read and write
|
||
2429000
|
direct allocation
|
page read and write
|
||
97FF000
|
stack
|
page read and write
|
||
5877000
|
direct allocation
|
page read and write
|
||
B02000
|
heap
|
page read and write
|
||
B2E000
|
heap
|
page read and write
|
||
107B000
|
stack
|
page read and write
|
||
7FB00000
|
direct allocation
|
page read and write
|
||
8D6E000
|
trusted library allocation
|
page read and write
|
||
1488000
|
heap
|
page read and write
|
||
4DE3000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
2D10000
|
trusted library allocation
|
page read and write
|
||
392C000
|
trusted library allocation
|
page read and write
|
||
371D000
|
trusted library allocation
|
page read and write
|
||
6C7000
|
unkown
|
page read and write
|
||
63A0000
|
trusted library allocation
|
page execute and read and write
|
||
8D70000
|
trusted library allocation
|
page read and write
|
||
AF6000
|
heap
|
page read and write
|
||
BEE0000
|
trusted library allocation
|
page read and write
|
||
12C0000
|
trusted library allocation
|
page read and write
|
||
2301000
|
direct allocation
|
page read and write
|
||
11A0000
|
trusted library allocation
|
page execute and read and write
|
||
989000
|
heap
|
page read and write
|
||
A1F1000
|
heap
|
page read and write
|
||
CE92000
|
unkown
|
page readonly
|
||
A80000
|
heap
|
page read and write
|
||
21EF000
|
trusted library allocation
|
page read and write
|
||
5C50000
|
heap
|
page execute and read and write
|
||
64C0000
|
trusted library allocation
|
page read and write
|
||
3C22000
|
heap
|
page read and write
|
||
BB70000
|
trusted library allocation
|
page execute and read and write
|
||
9FAA000
|
heap
|
page read and write
|
||
1AB6C000
|
stack
|
page read and write
|
||
3A22000
|
trusted library allocation
|
page read and write
|
||
F15000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
101E000
|
stack
|
page read and write
|
||
E3F000
|
stack
|
page read and write
|
||
5A10000
|
trusted library allocation
|
page execute and read and write
|
||
BAC000
|
trusted library allocation
|
page execute and read and write
|
||
38AD000
|
trusted library allocation
|
page read and write
|
||
507A000
|
stack
|
page read and write
|
||
24BB000
|
direct allocation
|
page read and write
|
||
378C000
|
direct allocation
|
page read and write
|
||
343B000
|
trusted library allocation
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
867B000
|
heap
|
page read and write
|
||
788000
|
stack
|
page read and write
|
||
7FFAA9D4D000
|
trusted library allocation
|
page execute and read and write
|
||
4B7000
|
unkown
|
page read and write
|
||
21E1000
|
trusted library allocation
|
page read and write
|
||
1AFA0000
|
heap
|
page read and write
|
||
563E000
|
stack
|
page read and write
|
||
5886000
|
direct allocation
|
page read and write
|
||
928000
|
heap
|
page read and write
|
||
1317000
|
heap
|
page read and write
|
||
1178000
|
stack
|
page read and write
|
||
7FDF0000
|
direct allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
4CA0000
|
heap
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
1670000
|
trusted library allocation
|
page read and write
|
||
715000
|
heap
|
page read and write
|
||
B29000
|
heap
|
page read and write
|
||
27FB000
|
direct allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
5C70000
|
trusted library allocation
|
page execute and read and write
|
||
2CFE000
|
stack
|
page read and write
|
||
2318000
|
direct allocation
|
page read and write
|
||
3962000
|
trusted library allocation
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
3730000
|
direct allocation
|
page read and write
|
||
10F1000
|
trusted library allocation
|
page read and write
|
||
6CF9000
|
trusted library allocation
|
page read and write
|
||
1AD20000
|
heap
|
page execute and read and write
|
||
894000
|
heap
|
page read and write
|
||
503F000
|
stack
|
page read and write
|
||
BB30000
|
trusted library allocation
|
page read and write
|
||
3EC3000
|
trusted library allocation
|
page read and write
|
||
237F000
|
direct allocation
|
page read and write
|
||
199000
|
stack
|
page read and write
|
||
576D000
|
trusted library allocation
|
page read and write
|
||
1BD4E000
|
stack
|
page read and write
|
||
E7C000
|
trusted library allocation
|
page execute and read and write
|
||
8D10000
|
trusted library allocation
|
page read and write
|
||
DD0000
|
heap
|
page read and write
|
||
97A000
|
heap
|
page read and write
|
||
9BE000
|
stack
|
page read and write
|
||
9C1C000
|
stack
|
page read and write
|
||
A62000
|
heap
|
page read and write
|
||
58D0000
|
heap
|
page read and write
|
||
B5E000
|
stack
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
D1C000
|
heap
|
page read and write
|
||
2638000
|
trusted library allocation
|
page read and write
|
||
8683000
|
heap
|
page read and write
|
||
AF7000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
2464000
|
direct allocation
|
page read and write
|
||
12E2000
|
trusted library allocation
|
page read and write
|
||
CEE0000
|
trusted library allocation
|
page execute and read and write
|
||
3B81000
|
trusted library allocation
|
page read and write
|
||
7FFAACC82000
|
trusted library allocation
|
page execute and read and write
|
||
894000
|
heap
|
page read and write
|
||
A86000
|
heap
|
page read and write
|
||
3A04000
|
trusted library allocation
|
page read and write
|
||
7FFAA9D6D000
|
trusted library allocation
|
page execute and read and write
|
||
A1C7000
|
heap
|
page read and write
|
||
7FFAACCC2000
|
trusted library allocation
|
page execute and read and write
|
||
2805000
|
direct allocation
|
page read and write
|
||
B3E000
|
heap
|
page read and write
|
||
BCD0000
|
trusted library allocation
|
page execute and read and write
|
||
8D30000
|
trusted library allocation
|
page execute and read and write
|
||
3B4E000
|
trusted library allocation
|
page read and write
|
||
2D0F000
|
trusted library allocation
|
page read and write
|
||
27F0000
|
heap
|
page read and write
|
||
3B2B000
|
trusted library allocation
|
page read and write
|
||
8DB0000
|
trusted library allocation
|
page execute and read and write
|
||
16D0000
|
trusted library allocation
|
page read and write
|
||
3815000
|
trusted library allocation
|
page read and write
|
||
9C9000
|
heap
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
2E10000
|
trusted library allocation
|
page read and write
|
||
3B00000
|
trusted library allocation
|
page read and write
|
||
B0B000
|
heap
|
page read and write
|
||
ACC000
|
heap
|
page read and write
|
||
E70000
|
unkown
|
page readonly
|
||
82D000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
7FFAACC8A000
|
trusted library allocation
|
page execute and read and write
|
||
7FFB0CCA0000
|
unkown
|
page read and write
|
||
C14B000
|
stack
|
page read and write
|
||
263C000
|
trusted library allocation
|
page read and write
|
||
548E000
|
stack
|
page read and write
|
||
11C4000
|
trusted library allocation
|
page read and write
|
||
7CD000
|
heap
|
page read and write
|
||
E50000
|
trusted library allocation
|
page read and write
|
||
9B000
|
stack
|
page read and write
|
||
3C35000
|
heap
|
page read and write
|
||
AF1000
|
heap
|
page read and write
|
||
3966000
|
trusted library allocation
|
page read and write
|
||
5C20000
|
trusted library allocation
|
page read and write
|
||
12B000
|
stack
|
page read and write
|
||
FF540000
|
trusted library allocation
|
page execute and read and write
|
||
2CF4000
|
trusted library allocation
|
page read and write
|
||
27BD000
|
direct allocation
|
page read and write
|
||
993B000
|
stack
|
page read and write
|
||
847000
|
heap
|
page read and write
|
||
6BE000
|
stack
|
page read and write
|
||
3C20000
|
heap
|
page read and write
|
||
4DA0000
|
heap
|
page read and write
|
||
55E7000
|
trusted library allocation
|
page read and write
|
||
16EE000
|
stack
|
page read and write
|
||
168B000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAA9D34000
|
trusted library allocation
|
page read and write
|
||
970000
|
heap
|
page read and write
|
||
2814000
|
direct allocation
|
page read and write
|
||
5B80000
|
trusted library allocation
|
page read and write
|
||
2F31000
|
trusted library allocation
|
page read and write
|
||
A1E7000
|
heap
|
page read and write
|
||
3853000
|
trusted library allocation
|
page read and write
|
||
5100000
|
unclassified section
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
60C2000
|
unkown
|
page readonly
|
||
575E000
|
trusted library allocation
|
page read and write
|
||
7FFAA9D9C000
|
trusted library allocation
|
page execute and read and write
|
||
8955000
|
heap
|
page read and write
|
||
23B8000
|
direct allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
5747000
|
direct allocation
|
page read and write
|
||
3986000
|
trusted library allocation
|
page read and write
|
||
FDE000
|
stack
|
page read and write
|
||
DF0C000
|
stack
|
page read and write
|
||
2830000
|
direct allocation
|
page read and write
|
||
BEF2000
|
unkown
|
page readonly
|
||
B2B000
|
heap
|
page read and write
|
||
7CA000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
F8C000
|
heap
|
page read and write
|
||
9B30000
|
heap
|
page execute and read and write
|
||
214A0EE0000
|
heap
|
page read and write
|
||
5550000
|
heap
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
B3E000
|
unkown
|
page readonly
|
||
11AF000
|
stack
|
page read and write
|
||
39CA000
|
trusted library allocation
|
page read and write
|
||
812000
|
heap
|
page read and write
|
||
A7E000
|
stack
|
page read and write
|
||
BD4000
|
stack
|
page read and write
|
||
6FCA000
|
unkown
|
page readonly
|
||
9C30000
|
unkown
|
page readonly
|
||
283F000
|
direct allocation
|
page read and write
|
||
5470000
|
heap
|
page read and write
|
||
1243000
|
heap
|
page read and write
|
||
3A86000
|
trusted library allocation
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
221F000
|
stack
|
page read and write
|
||
58BE000
|
stack
|
page read and write
|
||
C90E000
|
stack
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
3F5A000
|
trusted library allocation
|
page read and write
|
||
7FE10000
|
direct allocation
|
page read and write
|
||
567B000
|
stack
|
page read and write
|
||
3874000
|
direct allocation
|
page read and write
|
||
ACF000
|
heap
|
page read and write
|
||
168E000
|
stack
|
page read and write
|
||
251A000
|
direct allocation
|
page read and write
|
||
4EA8000
|
trusted library allocation
|
page read and write
|
||
5933000
|
heap
|
page read and write
|
||
281B000
|
direct allocation
|
page read and write
|
||
320C000
|
trusted library allocation
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
14A4000
|
trusted library allocation
|
page read and write
|
||
1BB7E000
|
stack
|
page read and write
|
||
C390000
|
trusted library allocation
|
page execute and read and write
|
||
1185000
|
heap
|
page read and write
|
||
1200000
|
trusted library allocation
|
page read and write
|
||
4B9000
|
unkown
|
page read and write
|
||
386F000
|
trusted library allocation
|
page read and write
|
||
1480000
|
heap
|
page read and write
|
||
9E9000
|
heap
|
page read and write
|
||
7044F000
|
unkown
|
page readonly
|
||
4F8C000
|
stack
|
page read and write
|
||
3111000
|
trusted library allocation
|
page read and write
|
||
508D000
|
stack
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
2871000
|
direct allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
1246000
|
heap
|
page read and write
|
||
835000
|
heap
|
page read and write
|
||
B2A000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
E92000
|
trusted library allocation
|
page execute and read and write
|
||
997C000
|
stack
|
page read and write
|
||
D69000
|
heap
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
10AE000
|
stack
|
page read and write
|
||
26C5000
|
direct allocation
|
page read and write
|
||
1337000
|
stack
|
page read and write
|
||
AE6000
|
heap
|
page read and write
|
||
AD0000
|
heap
|
page read and write
|
||
6A7B0000
|
unkown
|
page readonly
|
||
5570000
|
heap
|
page read and write
|
||
B5F9000
|
heap
|
page read and write
|
||
1A76D000
|
stack
|
page read and write
|
||
2498000
|
direct allocation
|
page read and write
|
||
968000
|
heap
|
page read and write
|
||
B30000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
1BE4E000
|
stack
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
10A0000
|
trusted library allocation
|
page read and write
|
||
15CF000
|
stack
|
page read and write
|
||
520F000
|
stack
|
page read and write
|
||
3120000
|
trusted library allocation
|
page read and write
|
||
788000
|
heap
|
page read and write
|
||
1940000
|
heap
|
page read and write
|
||
16D6000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
7270000
|
trusted library allocation
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
553E000
|
stack
|
page read and write
|
||
3608000
|
trusted library allocation
|
page read and write
|
||
A2C0000
|
trusted library allocation
|
page read and write
|
||
BFE0000
|
heap
|
page read and write
|
||
1390000
|
heap
|
page read and write
|
||
2521000
|
direct allocation
|
page read and write
|
||
7FFAA9D3D000
|
trusted library allocation
|
page execute and read and write
|
||
7FDE6000
|
direct allocation
|
page read and write
|
||
7305000
|
heap
|
page read and write
|
||
5470000
|
heap
|
page read and write
|
||
B04000
|
heap
|
page read and write
|
||
13F5000
|
heap
|
page read and write
|
||
6DE2000
|
heap
|
page read and write
|
||
16D7000
|
trusted library allocation
|
page execute and read and write
|
||
3B6A000
|
trusted library allocation
|
page read and write
|
||
3301000
|
trusted library allocation
|
page read and write
|
||
544E000
|
stack
|
page read and write
|
||
FE0000
|
heap
|
page read and write
|
||
7FFAA9DF0000
|
trusted library allocation
|
page read and write
|
||
D6C000
|
heap
|
page read and write
|
||
9D7A000
|
unkown
|
page readonly
|
||
9B40000
|
trusted library allocation
|
page read and write
|
||
217E000
|
stack
|
page read and write
|
||
2504000
|
direct allocation
|
page read and write
|
||
A190000
|
heap
|
page read and write
|
||
7FFAA9ED2000
|
trusted library allocation
|
page read and write
|
||
957000
|
heap
|
page read and write
|
||
6D1000
|
unkown
|
page read and write
|
||
55E1000
|
trusted library allocation
|
page read and write
|
||
8C0E000
|
stack
|
page read and write
|
||
A07B000
|
heap
|
page read and write
|
||
324E000
|
stack
|
page read and write
|
||
DF5000
|
heap
|
page read and write
|
||
388F000
|
trusted library allocation
|
page read and write
|
||
2A50000
|
heap
|
page read and write
|
||
5732000
|
direct allocation
|
page read and write
|
||
5930000
|
heap
|
page read and write
|
||
57DE000
|
stack
|
page read and write
|
||
1650000
|
trusted library allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
10B0000
|
trusted library allocation
|
page read and write
|
||
66C0000
|
trusted library allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
10FA000
|
trusted library allocation
|
page read and write
|
||
193C000
|
stack
|
page read and write
|
||
1B64F000
|
stack
|
page read and write
|
||
2418000
|
direct allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
BC6D000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
BD0000
|
heap
|
page read and write
|
||
74DE000
|
stack
|
page read and write
|
||
14C0000
|
heap
|
page read and write
|
||
514000
|
unkown
|
page readonly
|
||
B2B000
|
heap
|
page read and write
|
||
BB20000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAA9E60000
|
trusted library allocation
|
page execute and read and write
|
||
27D7000
|
direct allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
5470000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
AD2000
|
heap
|
page read and write
|
||
250C000
|
direct allocation
|
page read and write
|
||
3A12000
|
direct allocation
|
page read and write
|
||
27D0000
|
direct allocation
|
page read and write
|
||
959000
|
stack
|
page read and write
|
||
3964000
|
trusted library allocation
|
page read and write
|
||
6690000
|
trusted library allocation
|
page read and write
|
||
69E000
|
stack
|
page read and write
|
||
575D000
|
direct allocation
|
page read and write
|
||
283F000
|
direct allocation
|
page read and write
|
||
E8E000
|
heap
|
page read and write
|
||
F20000
|
heap
|
page read and write
|
||
2358000
|
direct allocation
|
page read and write
|
||
1660000
|
trusted library allocation
|
page read and write
|
||
24BC000
|
direct allocation
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
58A4000
|
heap
|
page execute and read and write
|
||
12B23000
|
trusted library allocation
|
page read and write
|
||
31C9000
|
trusted library allocation
|
page read and write
|
||
BFDF000
|
stack
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
F731EA9000
|
stack
|
page read and write
|
||
4DF4000
|
heap
|
page read and write
|
||
C640000
|
trusted library allocation
|
page execute and read and write
|
||
7FDC7000
|
direct allocation
|
page read and write
|
||
2C8E000
|
stack
|
page read and write
|
||
8A6000
|
heap
|
page read and write
|
||
38F8000
|
trusted library allocation
|
page read and write
|
||
46D0000
|
heap
|
page read and write
|
||
833000
|
heap
|
page read and write
|
||
AE2000
|
heap
|
page read and write
|
||
3A39000
|
direct allocation
|
page read and write
|
||
1210000
|
heap
|
page read and write
|
||
AD1000
|
heap
|
page read and write
|
||
AFC000
|
heap
|
page read and write
|
||
AD7000
|
heap
|
page read and write
|
||
4B7000
|
unkown
|
page write copy
|
||
16DA000
|
trusted library allocation
|
page execute and read and write
|
||
8D75000
|
trusted library allocation
|
page read and write
|
||
3A57000
|
trusted library allocation
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
3C20000
|
heap
|
page read and write
|
||
8B40000
|
trusted library allocation
|
page read and write
|
||
FE0000
|
trusted library allocation
|
page read and write
|
||
12D0000
|
trusted library allocation
|
page read and write
|
||
837000
|
heap
|
page read and write
|
||
B9A000
|
trusted library allocation
|
page execute and read and write
|
||
894000
|
heap
|
page read and write
|
||
90E000
|
stack
|
page read and write
|
||
1310000
|
heap
|
page read and write
|
||
3953000
|
trusted library allocation
|
page read and write
|
||
569E000
|
stack
|
page read and write
|
||
4DA1000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
AAC000
|
heap
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
6A8D8000
|
unkown
|
page read and write
|
||
B02000
|
heap
|
page read and write
|
||
DC0E000
|
stack
|
page read and write
|
||
C7F000
|
heap
|
page read and write
|
||
9AE0000
|
trusted library allocation
|
page read and write
|
||
484E000
|
stack
|
page read and write
|
||
AE8000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
D20000
|
heap
|
page read and write
|
||
ACF000
|
heap
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
9CB000
|
heap
|
page read and write
|
||
3844000
|
trusted library allocation
|
page read and write
|
||
269E000
|
stack
|
page read and write
|
||
942000
|
heap
|
page read and write
|
||
CAC000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
6D75000
|
heap
|
page read and write
|
||
394E000
|
trusted library allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
77AE000
|
heap
|
page read and write
|
||
12D01000
|
trusted library allocation
|
page read and write
|
||
B2C000
|
heap
|
page read and write
|
||
DE0E000
|
stack
|
page read and write
|
||
7FFAACCC2000
|
trusted library allocation
|
page execute and read and write
|
||
3B6F000
|
trusted library allocation
|
page read and write
|
||
977000
|
heap
|
page read and write
|
||
7FFAA9D8C000
|
trusted library allocation
|
page execute and read and write
|
||
451000
|
heap
|
page read and write
|
||
829000
|
heap
|
page read and write
|
||
5470000
|
heap
|
page read and write
|
||
BEA0000
|
trusted library allocation
|
page execute and read and write
|
||
396A000
|
trusted library allocation
|
page read and write
|
||
3833000
|
direct allocation
|
page read and write
|
||
263A000
|
trusted library allocation
|
page read and write
|
||
4E50000
|
heap
|
page read and write
|
||
5850000
|
trusted library allocation
|
page read and write
|
||
1B930000
|
heap
|
page read and write
|
||
24C3000
|
direct allocation
|
page read and write
|
||
A86000
|
heap
|
page read and write
|
||
7FFAACD10000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAA9EF0000
|
trusted library allocation
|
page execute and read and write
|
||
C20000
|
heap
|
page read and write
|
||
C7CC000
|
stack
|
page read and write
|
||
24EF000
|
direct allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
36B0000
|
direct allocation
|
page read and write
|
||
12E7000
|
trusted library allocation
|
page execute and read and write
|
||
2820000
|
heap
|
page read and write
|
||
381D000
|
trusted library allocation
|
page read and write
|
||
27B7000
|
direct allocation
|
page read and write
|
||
1BC4E000
|
stack
|
page read and write
|
||
16C0000
|
trusted library allocation
|
page read and write
|
||
5762000
|
direct allocation
|
page read and write
|
||
3A1B000
|
trusted library allocation
|
page read and write
|
||
9B70000
|
heap
|
page read and write
|
||
72D0000
|
trusted library allocation
|
page read and write
|
||
57AF000
|
direct allocation
|
page read and write
|
||
B03000
|
heap
|
page read and write
|
||
2D00000
|
heap
|
page execute and read and write
|
||
3740000
|
trusted library allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
7FFB0CCA2000
|
unkown
|
page readonly
|
||
62DE000
|
stack
|
page read and write
|
||
F8A000
|
heap
|
page read and write
|
||
AE7000
|
heap
|
page read and write
|
||
214A0FE9000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
7B3000
|
heap
|
page read and write
|
||
2AD0000
|
heap
|
page execute and read and write
|
||
971000
|
heap
|
page read and write
|
||
2822000
|
direct allocation
|
page read and write
|
||
5490000
|
heap
|
page read and write
|
||
B39000
|
heap
|
page read and write
|
||
34DF000
|
trusted library allocation
|
page read and write
|
||
27B0000
|
direct allocation
|
page read and write
|
||
1100000
|
heap
|
page read and write
|
||
675C000
|
stack
|
page read and write
|
||
3939000
|
direct allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
AE7000
|
heap
|
page read and write
|
||
AC4000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
5863000
|
direct allocation
|
page read and write
|
||
8900000
|
trusted library allocation
|
page execute and read and write
|
||
B14000
|
heap
|
page read and write
|
||
3B9F000
|
stack
|
page read and write
|
||
7FFAA9D64000
|
trusted library allocation
|
page read and write
|
||
1C04B000
|
stack
|
page read and write
|
||
7FFAA9DFC000
|
trusted library allocation
|
page execute and read and write
|
||
BF0000
|
heap
|
page read and write
|
||
396E000
|
trusted library allocation
|
page read and write
|
||
6D57000
|
heap
|
page read and write
|
||
388E000
|
trusted library allocation
|
page read and write
|
||
23F0000
|
direct allocation
|
page read and write
|
||
2AF8000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
1BD7E000
|
stack
|
page read and write
|
||
7FFAA9D6B000
|
trusted library allocation
|
page execute and read and write
|
||
13C5000
|
heap
|
page read and write
|
||
7C3000
|
heap
|
page read and write
|
||
4C2000
|
unkown
|
page write copy
|
||
8D78000
|
trusted library allocation
|
page read and write
|
||
349E000
|
trusted library allocation
|
page read and write
|
||
1B94E000
|
stack
|
page read and write
|
||
36EB000
|
trusted library allocation
|
page read and write
|
||
574B000
|
trusted library allocation
|
page read and write
|
||
1B54F000
|
heap
|
page read and write
|
||
10A2000
|
trusted library allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
39DC000
|
trusted library allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
3C20000
|
heap
|
page read and write
|
||
A2F0000
|
trusted library allocation
|
page read and write
|
||
1BA3E000
|
stack
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
9B60000
|
trusted library allocation
|
page read and write
|
||
1470000
|
trusted library allocation
|
page read and write
|
||
6DA4000
|
heap
|
page read and write
|
||
7390000
|
trusted library allocation
|
page execute and read and write
|
||
1090000
|
trusted library allocation
|
page read and write
|
||
2809000
|
direct allocation
|
page read and write
|
||
6E0000
|
unkown
|
page readonly
|
||
9B80000
|
trusted library allocation
|
page read and write
|
||
55A1000
|
trusted library allocation
|
page read and write
|
||
12EE1000
|
trusted library allocation
|
page read and write
|
||
9AC0000
|
unkown
|
page readonly
|
||
374C000
|
trusted library allocation
|
page read and write
|
||
AF1000
|
heap
|
page read and write
|
||
23EF000
|
stack
|
page read and write
|
||
38B5000
|
direct allocation
|
page read and write
|
||
9CD000
|
heap
|
page read and write
|
||
AD3000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
B2D000
|
heap
|
page read and write
|
||
214A1245000
|
heap
|
page read and write
|
||
3C37000
|
heap
|
page read and write
|
||
1358000
|
heap
|
page read and write
|
||
1215000
|
heap
|
page read and write
|
||
BCC0000
|
trusted library allocation
|
page execute and read and write
|
||
12CD000
|
trusted library allocation
|
page execute and read and write
|
||
4DDD000
|
heap
|
page read and write
|
||
3A77000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
1676000
|
trusted library allocation
|
page execute and read and write
|
||
C66000
|
heap
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
24CA000
|
direct allocation
|
page read and write
|
||
A62000
|
heap
|
page read and write
|
||
47CE000
|
stack
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
111E000
|
stack
|
page read and write
|
||
64E0000
|
trusted library allocation
|
page execute and read and write
|
||
894000
|
heap
|
page read and write
|
||
11F0000
|
heap
|
page read and write
|
||
77D9000
|
heap
|
page read and write
|
||
27E5000
|
direct allocation
|
page read and write
|
||
BE0000
|
direct allocation
|
page read and write
|
||
35B000
|
stack
|
page read and write
|
||
5700000
|
direct allocation
|
page read and write
|
||
2632000
|
trusted library allocation
|
page read and write
|
||
9F7D000
|
stack
|
page read and write
|
||
3A6E000
|
direct allocation
|
page read and write
|
||
5C6C000
|
trusted library allocation
|
page read and write
|
||
5841000
|
direct allocation
|
page read and write
|
||
B5CD000
|
heap
|
page read and write
|
||
165D000
|
trusted library allocation
|
page execute and read and write
|
||
B0F000
|
heap
|
page read and write
|
||
2D01000
|
trusted library allocation
|
page read and write
|
||
27DE000
|
direct allocation
|
page read and write
|
||
5792000
|
direct allocation
|
page read and write
|
||
16E7000
|
trusted library allocation
|
page execute and read and write
|
||
2411000
|
direct allocation
|
page read and write
|
||
BB50000
|
trusted library allocation
|
page execute and read and write
|
||
996000
|
stack
|
page read and write
|
||
35F5000
|
trusted library allocation
|
page read and write
|
||
1548000
|
heap
|
page read and write
|
||
8D40000
|
trusted library allocation
|
page read and write
|
||
3A55000
|
direct allocation
|
page read and write
|
||
3D4000
|
unkown
|
page readonly
|
||
9D7000
|
heap
|
page read and write
|
||
12E09000
|
trusted library allocation
|
page read and write
|
||
11EF000
|
stack
|
page read and write
|
||
9C20000
|
heap
|
page read and write
|
||
3530000
|
direct allocation
|
page read and write
|
||
38EC000
|
trusted library allocation
|
page read and write
|
||
54E000
|
stack
|
page read and write
|
||
3AF5000
|
trusted library allocation
|
page read and write
|
||
9E3000
|
heap
|
page read and write
|
||
2D20000
|
heap
|
page read and write
|
||
AE5000
|
heap
|
page read and write
|
||
BE0000
|
direct allocation
|
page read and write
|
||
284D000
|
direct allocation
|
page read and write
|
||
384F000
|
trusted library allocation
|
page read and write
|
||
36AF000
|
trusted library allocation
|
page read and write
|
||
2280000
|
direct allocation
|
page read and write
|
||
7FFAA9F02000
|
trusted library allocation
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
7FFAA9E80000
|
trusted library allocation
|
page execute and read and write
|
||
78E000
|
heap
|
page read and write
|
||
ACF000
|
heap
|
page read and write
|
||
2468000
|
direct allocation
|
page read and write
|
||
2A8E000
|
stack
|
page read and write
|
||
AC7000
|
heap
|
page read and write
|
||
AEB000
|
heap
|
page read and write
|
||
55D0000
|
trusted library allocation
|
page read and write
|
||
630000
|
heap
|
page read and write
|
||
B5C8000
|
heap
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
2401000
|
direct allocation
|
page read and write
|
||
C38E000
|
stack
|
page read and write
|
||
AEA000
|
heap
|
page read and write
|
||
3936000
|
trusted library allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
9CF000
|
heap
|
page read and write
|
||
6400000
|
trusted library allocation
|
page read and write
|
||
38BE000
|
trusted library allocation
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
50BC000
|
stack
|
page read and write
|
||
18C000
|
stack
|
page read and write
|
||
214A0FE0000
|
heap
|
page read and write
|
||
7FFAA9D3D000
|
trusted library allocation
|
page execute and read and write
|
||
58AB000
|
direct allocation
|
page read and write
|
||
1ABAD000
|
stack
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
7BB000
|
heap
|
page read and write
|
||
A15C000
|
heap
|
page read and write
|
||
9A7C000
|
stack
|
page read and write
|
||
7FFAA9E26000
|
trusted library allocation
|
page execute and read and write
|
||
A1AD000
|
heap
|
page read and write
|
||
37F3000
|
trusted library allocation
|
page read and write
|
||
BED0000
|
trusted library allocation
|
page read and write
|
||
A86000
|
heap
|
page read and write
|
||
7E4000
|
heap
|
page read and write
|
||
AB0000
|
unkown
|
page readonly
|
||
6A1B000
|
stack
|
page read and write
|
||
97A000
|
heap
|
page read and write
|
||
EA8000
|
heap
|
page read and write
|
||
392A000
|
trusted library allocation
|
page read and write
|
||
82E000
|
heap
|
page read and write
|
||
53FE000
|
stack
|
page read and write
|
||
1B0AD000
|
stack
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
1BE7E000
|
stack
|
page read and write
|
||
1B730000
|
heap
|
page read and write
|
||
11F6000
|
heap
|
page read and write
|
||
5890000
|
heap
|
page read and write
|
||
BAA000
|
trusted library allocation
|
page execute and read and write
|
||
7AC000
|
heap
|
page read and write
|
||
ADC000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
520000
|
heap
|
page read and write
|
||
60A0000
|
unkown
|
page readonly
|
||
21F1000
|
trusted library allocation
|
page read and write
|
||
A1A0000
|
heap
|
page read and write
|
||
2451000
|
direct allocation
|
page read and write
|
||
244D000
|
direct allocation
|
page read and write
|
||
54F0000
|
heap
|
page read and write
|
||
894D000
|
heap
|
page read and write
|
||
856000
|
unkown
|
page readonly
|
||
5787000
|
direct allocation
|
page read and write
|
||
ED0000
|
heap
|
page read and write
|
||
9FB9000
|
heap
|
page read and write
|
||
2648000
|
trusted library allocation
|
page read and write
|
||
55B5000
|
trusted library allocation
|
page read and write
|
||
9B82000
|
trusted library allocation
|
page read and write
|
||
DDCE000
|
stack
|
page read and write
|
||
8DD0000
|
trusted library allocation
|
page read and write
|
||
23FA000
|
direct allocation
|
page read and write
|
||
95D000
|
heap
|
page read and write
|
||
3777000
|
direct allocation
|
page read and write
|
||
EE0000
|
heap
|
page read and write
|
||
3971000
|
trusted library allocation
|
page read and write
|
||
5A00000
|
trusted library allocation
|
page read and write
|
||
300F000
|
stack
|
page read and write
|
||
3A30000
|
direct allocation
|
page read and write
|
||
B09000
|
heap
|
page read and write
|
||
73A0000
|
trusted library allocation
|
page execute and read and write
|
||
14B0000
|
trusted library allocation
|
page read and write
|
||
10E5000
|
heap
|
page read and write
|
||
12EE9000
|
trusted library allocation
|
page read and write
|
||
148E000
|
stack
|
page read and write
|
||
8FA0000
|
trusted library allocation
|
page read and write
|
||
5873000
|
direct allocation
|
page read and write
|
||
27E8000
|
direct allocation
|
page read and write
|
||
1020000
|
heap
|
page read and write
|
||
16CF000
|
stack
|
page read and write
|
||
C35000
|
heap
|
page read and write
|
||
3A42000
|
trusted library allocation
|
page read and write
|
||
12D6000
|
trusted library allocation
|
page execute and read and write
|
||
9FFB000
|
heap
|
page read and write
|
||
12B3000
|
trusted library allocation
|
page execute and read and write
|
||
AE1000
|
heap
|
page read and write
|
||
5740000
|
trusted library allocation
|
page read and write
|
||
B40000
|
direct allocation
|
page execute and read and write
|
||
478F000
|
stack
|
page read and write
|
||
1B500000
|
heap
|
page read and write
|
||
3A13000
|
trusted library allocation
|
page read and write
|
||
2378000
|
direct allocation
|
page read and write
|
||
BF5000
|
heap
|
page read and write
|
||
27F4000
|
direct allocation
|
page read and write
|
||
A78000
|
heap
|
page read and write
|
||
114B000
|
heap
|
page read and write
|
||
5580000
|
trusted library allocation
|
page read and write
|
||
384D000
|
trusted library allocation
|
page read and write
|
||
7DB000
|
heap
|
page read and write
|
||
39A9000
|
trusted library allocation
|
page read and write
|
||
2B2F000
|
trusted library allocation
|
page read and write
|
||
C51D000
|
stack
|
page read and write
|
||
3B4A000
|
trusted library allocation
|
page read and write
|
||
3C11000
|
trusted library allocation
|
page read and write
|
||
50E000
|
stack
|
page read and write
|
||
1AE2F000
|
stack
|
page read and write
|
||
4C0000
|
unkown
|
page read and write
|
||
263E000
|
trusted library allocation
|
page read and write
|
||
23B4000
|
direct allocation
|
page read and write
|
||
363C000
|
trusted library allocation
|
page read and write
|
||
9AC2000
|
unkown
|
page readonly
|
||
8D80000
|
trusted library allocation
|
page execute and read and write
|
||
A1D4000
|
heap
|
page read and write
|
||
B724000
|
trusted library allocation
|
page read and write
|
||
25A0000
|
direct allocation
|
page read and write
|
||
AC7000
|
heap
|
page read and write
|
||
10EE000
|
trusted library allocation
|
page read and write
|
||
E87000
|
heap
|
page read and write
|
||
971000
|
heap
|
page read and write
|
||
3C21000
|
heap
|
page read and write
|
||
84E000
|
stack
|
page read and write
|
||
5800000
|
trusted library allocation
|
page read and write
|
||
125E1000
|
trusted library allocation
|
page read and write
|
||
DCCD000
|
stack
|
page read and write
|
||
238D000
|
direct allocation
|
page read and write
|
||
5BF0000
|
trusted library allocation
|
page read and write
|
||
3C32000
|
heap
|
page read and write
|
||
C77F000
|
stack
|
page read and write
|
||
8910000
|
heap
|
page read and write
|
||
AF4000
|
heap
|
page read and write
|
||
63B0000
|
unkown
|
page readonly
|
||
B5DF000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
8D80000
|
trusted library allocation
|
page read and write
|
||
BE0000
|
heap
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
3C20000
|
heap
|
page read and write
|
||
FF0000
|
trusted library allocation
|
page execute and read and write
|
||
5570000
|
heap
|
page read and write
|
||
6DB0000
|
heap
|
page read and write
|
||
AE8000
|
heap
|
page read and write
|
||
9B50000
|
trusted library allocation
|
page execute and read and write
|
||
58FE000
|
stack
|
page read and write
|
||
AAE000
|
heap
|
page read and write
|
||
968000
|
heap
|
page read and write
|
||
21D0000
|
heap
|
page read and write
|
||
27A0000
|
heap
|
page read and write
|
||
860000
|
heap
|
page read and write
|
||
3892000
|
trusted library allocation
|
page read and write
|
||
16D9000
|
heap
|
page read and write
|
||
98E000
|
unkown
|
page read and write
|
||
9A80000
|
trusted library allocation
|
page read and write
|
||
7FFAA9D8C000
|
trusted library allocation
|
page execute and read and write
|
||
6EE000
|
stack
|
page read and write
|
||
174E000
|
stack
|
page read and write
|
||
AD2000
|
heap
|
page read and write
|
||
1F0000
|
unkown
|
page readonly
|
||
12B0000
|
trusted library allocation
|
page read and write
|
||
F96000
|
unkown
|
page readonly
|
||
5150000
|
heap
|
page read and write
|
||
3A8F000
|
trusted library allocation
|
page read and write
|
||
8B20000
|
trusted library allocation
|
page execute and read and write
|
||
3C20000
|
heap
|
page read and write
|
||
3794000
|
direct allocation
|
page read and write
|
||
1415000
|
heap
|
page read and write
|
||
6A7B1000
|
unkown
|
page execute read
|
||
7FFAA9F00000
|
trusted library allocation
|
page execute and read and write
|
||
1B0AB000
|
stack
|
page read and write
|
||
121E1000
|
trusted library allocation
|
page read and write
|
||
C53C000
|
stack
|
page read and write
|
||
7FFAA9ED2000
|
trusted library allocation
|
page read and write
|
||
10B0000
|
heap
|
page read and write
|
||
28CE000
|
stack
|
page read and write
|
||
84E000
|
heap
|
page read and write
|
||
3C34000
|
heap
|
page read and write
|
||
10B8000
|
heap
|
page read and write
|
||
3604000
|
trusted library allocation
|
page read and write
|
||
3A15000
|
trusted library allocation
|
page read and write
|
||
98C000
|
heap
|
page read and write
|
||
896D000
|
heap
|
page read and write
|
||
940000
|
heap
|
page read and write
|
||
5A42000
|
unkown
|
page readonly
|
||
10EE000
|
stack
|
page read and write
|
||
1F0000
|
unkown
|
page readonly
|
||
7E0000
|
heap
|
page read and write
|
||
8D60000
|
trusted library allocation
|
page read and write
|
||
3857000
|
direct allocation
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
B29000
|
heap
|
page read and write
|
||
A1AB000
|
heap
|
page read and write
|
||
B53E000
|
heap
|
page read and write
|
||
B0F000
|
heap
|
page read and write
|
||
1B74F000
|
stack
|
page read and write
|
||
3882000
|
trusted library allocation
|
page read and write
|
||
5A3E000
|
stack
|
page read and write
|
||
7300000
|
heap
|
page read and write
|
||
2B1C000
|
heap
|
page read and write
|
||
3990000
|
trusted library allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
9DD000
|
heap
|
page read and write
|
||
C3B0000
|
trusted library allocation
|
page read and write
|
||
16B0000
|
trusted library allocation
|
page execute and read and write
|
||
AE8000
|
heap
|
page read and write
|
||
487000
|
heap
|
page read and write
|
||
36B1000
|
trusted library allocation
|
page read and write
|
||
7FFB0CC81000
|
unkown
|
page execute read
|
||
3610000
|
direct allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
A95000
|
heap
|
page read and write
|
||
3891000
|
trusted library allocation
|
page read and write
|
||
400000
|
heap
|
page read and write
|
||
F6F000
|
stack
|
page read and write
|
||
30F0000
|
trusted library allocation
|
page execute and read and write
|
||
7FF4DE500000
|
trusted library allocation
|
page execute and read and write
|
||
7FFAA9D50000
|
trusted library allocation
|
page read and write
|
||
38F3000
|
trusted library allocation
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
7FFB0CC96000
|
unkown
|
page readonly
|
||
19D000
|
stack
|
page read and write
|
||
BC2000
|
trusted library allocation
|
page execute and read and write
|
||
7D9000
|
heap
|
page read and write
|
||
F10000
|
heap
|
page read and write
|
||
B2F000
|
heap
|
page read and write
|
||
58EE000
|
stack
|
page read and write
|
||
F24000
|
heap
|
page read and write
|
||
89D000
|
heap
|
page read and write
|
||
9AB0000
|
trusted library allocation
|
page execute and read and write
|
||
CA6000
|
heap
|
page read and write
|
||
89BC000
|
heap
|
page read and write
|
||
1375000
|
heap
|
page read and write
|
||
577C000
|
stack
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
F85000
|
heap
|
page read and write
|
||
54FE000
|
stack
|
page read and write
|
||
114F000
|
heap
|
page read and write
|
||
B530000
|
heap
|
page read and write
|
||
2859000
|
direct allocation
|
page read and write
|
||
4DF4000
|
heap
|
page read and write
|
||
838000
|
heap
|
page read and write
|
||
2810000
|
direct allocation
|
page read and write
|
||
27FE000
|
direct allocation
|
page read and write
|
||
287E000
|
direct allocation
|
page read and write
|
||
BB80000
|
trusted library allocation
|
page read and write
|
||
2343000
|
direct allocation
|
page read and write
|
||
3432000
|
trusted library allocation
|
page read and write
|
||
53EE000
|
trusted library allocation
|
page read and write
|
||
E20000
|
heap
|
page read and write
|
||
8B50000
|
trusted library allocation
|
page read and write
|
||
7130000
|
trusted library allocation
|
page read and write
|
||
239C000
|
direct allocation
|
page read and write
|
||
F4C000
|
heap
|
page read and write
|
||
838000
|
heap
|
page read and write
|
||
6D1000
|
unkown
|
page read and write
|
||
64AE000
|
stack
|
page read and write
|
||
1B6DE000
|
stack
|
page read and write
|
||
2ACE000
|
stack
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
2C2E000
|
stack
|
page read and write
|
||
38BE000
|
trusted library allocation
|
page read and write
|
||
6DC0000
|
heap
|
page read and write
|
||
235A000
|
direct allocation
|
page read and write
|
||
7B7000
|
heap
|
page read and write
|
||
4DF1000
|
heap
|
page read and write
|
||
55C6000
|
trusted library allocation
|
page read and write
|
||
780000
|
trusted library allocation
|
page read and write
|
||
A2B0000
|
trusted library allocation
|
page read and write
|
||
3AD8000
|
trusted library allocation
|
page read and write
|
||
B80000
|
trusted library allocation
|
page read and write
|
||
AFE000
|
heap
|
page read and write
|
||
1B6DE000
|
stack
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
4FCD000
|
stack
|
page read and write
|
||
3A1F000
|
trusted library allocation
|
page read and write
|
||
6CD0000
|
trusted library allocation
|
page execute and read and write
|
||
C7CE000
|
stack
|
page read and write
|
||
3C20000
|
heap
|
page read and write
|
||
6E50000
|
trusted library allocation
|
page read and write
|
||
BF18000
|
unkown
|
page readonly
|
||
B2A000
|
heap
|
page read and write
|
||
45D000
|
heap
|
page read and write
|
||
4C4000
|
unkown
|
page readonly
|
||
6CC0000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
4C9F000
|
stack
|
page read and write
|
||
33EF000
|
trusted library allocation
|
page read and write
|
||
5824000
|
direct allocation
|
page read and write
|
||
11B0000
|
heap
|
page execute and read and write
|
||
10F0000
|
heap
|
page read and write
|
||
BF9E000
|
stack
|
page read and write
|
||
C78B000
|
stack
|
page read and write
|
||
3B07000
|
trusted library allocation
|
page read and write
|
||
CAB000
|
heap
|
page read and write
|
||
12EF000
|
stack
|
page read and write
|
||
3E9F000
|
stack
|
page read and write
|
||
9BD9000
|
trusted library allocation
|
page read and write
|
||
E94000
|
heap
|
page read and write
|
||
8669000
|
heap
|
page read and write
|
||
8DC0000
|
trusted library allocation
|
page read and write
|
||
AD6000
|
heap
|
page read and write
|
||
9C0000
|
heap
|
page read and write
|
||
284F000
|
direct allocation
|
page read and write
|
||
12D03000
|
trusted library allocation
|
page read and write
|
||
FA5000
|
heap
|
page read and write
|
||
5A30000
|
trusted library allocation
|
page read and write
|
||
8E50000
|
trusted library allocation
|
page read and write
|
||
4DDD000
|
heap
|
page read and write
|
||
8976000
|
heap
|
page read and write
|
||
8870000
|
trusted library allocation
|
page execute and read and write
|
||
AD9000
|
heap
|
page read and write
|
||
E89000
|
heap
|
page read and write
|
||
9D90000
|
heap
|
page read and write
|
||
285D000
|
direct allocation
|
page read and write
|
||
C30000
|
heap
|
page read and write
|
||
AFC000
|
heap
|
page read and write
|
||
5A20000
|
trusted library allocation
|
page read and write
|
||
7044D000
|
unkown
|
page read and write
|
||
7E2000
|
heap
|
page read and write
|
||
E51000
|
heap
|
page read and write
|
||
39AD000
|
trusted library allocation
|
page read and write
|
||
79F000
|
heap
|
page read and write
|
||
A86000
|
heap
|
page read and write
|
||
56DE000
|
stack
|
page read and write
|
||
3C0000
|
unkown
|
page readonly
|
||
956000
|
stack
|
page read and write
|
||
849000
|
heap
|
page read and write
|
||
5470000
|
heap
|
page read and write
|
||
2B31000
|
trusted library allocation
|
page read and write
|
||
F60000
|
heap
|
page read and write
|
||
577E000
|
stack
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
13E0000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
3A54000
|
trusted library allocation
|
page read and write
|
||
E5D000
|
heap
|
page read and write
|
||
2B1F000
|
heap
|
page read and write
|
||
97FA000
|
stack
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
3683000
|
trusted library allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
C95000
|
heap
|
page read and write
|
||
38B7000
|
trusted library allocation
|
page read and write
|
||
B39000
|
heap
|
page read and write
|
||
11F0000
|
trusted library allocation
|
page execute and read and write
|
||
14B6000
|
heap
|
page read and write
|
||
AE5000
|
heap
|
page read and write
|
||
3CA0000
|
heap
|
page read and write
|
||
84D000
|
heap
|
page read and write
|
||
55C0000
|
trusted library allocation
|
page read and write
|
||
ACB000
|
heap
|
page read and write
|
||
B3B000
|
heap
|
page read and write
|
||
D19000
|
heap
|
page read and write
|
||
3865000
|
direct allocation
|
page read and write
|
||
5766000
|
trusted library allocation
|
page read and write
|
||
2EA0000
|
heap
|
page execute and read and write
|
||
1B540000
|
heap
|
page read and write
|
||
6E82000
|
unkown
|
page readonly
|
||
9FA0000
|
heap
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
2472000
|
direct allocation
|
page read and write
|
||
B29000
|
heap
|
page read and write
|
||
9CC000
|
heap
|
page read and write
|
||
3A3C000
|
trusted library allocation
|
page read and write
|
||
2496000
|
direct allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
4DAE000
|
stack
|
page read and write
|
||
B5CB000
|
heap
|
page read and write
|
||
3B89000
|
trusted library allocation
|
page read and write
|
||
1685000
|
trusted library allocation
|
page execute and read and write
|
||
AEA000
|
heap
|
page read and write
|
||
E50000
|
heap
|
page read and write
|
||
C250000
|
trusted library allocation
|
page execute and read and write
|
||
8C50000
|
trusted library allocation
|
page execute and read and write
|
||
5888000
|
direct allocation
|
page read and write
|
||
E5F000
|
heap
|
page read and write
|
||
6FD0000
|
heap
|
page read and write
|
||
489000
|
heap
|
page read and write
|
||
ACF000
|
heap
|
page read and write
|
||
5584000
|
trusted library allocation
|
page read and write
|
||
ADF000
|
stack
|
page read and write
|
||
2AF0000
|
heap
|
page read and write
|
||
5773000
|
direct allocation
|
page read and write
|
||
1B93E000
|
stack
|
page read and write
|
||
2802000
|
direct allocation
|
page read and write
|
||
A1CB000
|
heap
|
page read and write
|
||
AE0000
|
heap
|
page read and write
|
||
578E000
|
direct allocation
|
page read and write
|
||
3B0B000
|
trusted library allocation
|
page read and write
|
||
B39000
|
heap
|
page read and write
|
||
3C20000
|
heap
|
page read and write
|
||
7FFAA9D6D000
|
trusted library allocation
|
page execute and read and write
|
||
4312000
|
trusted library allocation
|
page read and write
|
||
70430000
|
unkown
|
page readonly
|
||
5848000
|
direct allocation
|
page read and write
|
||
6D6000
|
unkown
|
page read and write
|
||
19D000
|
stack
|
page read and write
|
||
D30000
|
heap
|
page read and write
|
||
1B6E1000
|
trusted library allocation
|
page read and write
|
||
8FB0000
|
trusted library allocation
|
page read and write
|
||
7FFAA9EE2000
|
trusted library allocation
|
page read and write
|
||
C40000
|
heap
|
page read and write
|
||
14A3000
|
trusted library allocation
|
page execute and read and write
|
||
AF5000
|
heap
|
page read and write
|
||
5A46000
|
unkown
|
page readonly
|
||
3932000
|
trusted library allocation
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
AD8000
|
heap
|
page read and write
|
||
9B86000
|
trusted library allocation
|
page read and write
|
||
2847000
|
direct allocation
|
page read and write
|
||
372F000
|
trusted library allocation
|
page read and write
|
||
2580000
|
direct allocation
|
page read and write
|
||
3835000
|
trusted library allocation
|
page read and write
|
||
3C3A000
|
heap
|
page read and write
|
||
778C000
|
heap
|
page read and write
|
||
6A8D5000
|
unkown
|
page read and write
|
||
7FFB0CC80000
|
unkown
|
page readonly
|
||
1B50E000
|
heap
|
page read and write
|
||
2479000
|
direct allocation
|
page read and write
|
||
372D000
|
trusted library allocation
|
page read and write
|
||
7FFAA9E16000
|
trusted library allocation
|
page execute and read and write
|
||
2836000
|
direct allocation
|
page read and write
|
||
3746000
|
trusted library allocation
|
page read and write
|
||
72BC000
|
stack
|
page read and write
|
||
1ABD0000
|
heap
|
page read and write
|
||
10E0000
|
heap
|
page read and write
|
||
2626000
|
direct allocation
|
page read and write
|
||
74F0000
|
heap
|
page read and write
|
||
7FFAA9E00000
|
trusted library allocation
|
page execute and read and write
|
||
7FDE0000
|
direct allocation
|
page read and write
|
||
1240000
|
heap
|
page read and write
|
||
7E6000
|
heap
|
page read and write
|
||
AB0000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
AEA000
|
heap
|
page read and write
|
||
2461000
|
direct allocation
|
page read and write
|
||
11C0000
|
trusted library allocation
|
page read and write
|
||
968000
|
heap
|
page read and write
|
||
AC7000
|
heap
|
page read and write
|
||
6A470000
|
unkown
|
page readonly
|
||
1A5E0000
|
trusted library allocation
|
page read and write
|
||
3768000
|
direct allocation
|
page read and write
|
||
70431000
|
unkown
|
page execute read
|
||
84D000
|
heap
|
page read and write
|
||
C24C000
|
stack
|
page read and write
|
||
3218000
|
trusted library allocation
|
page read and write
|
||
AAE000
|
heap
|
page read and write
|
||
A0CF000
|
heap
|
page read and write
|
||
AFC000
|
heap
|
page read and write
|
||
57A5000
|
direct allocation
|
page read and write
|
||
13D8000
|
heap
|
page read and write
|
||
EF2000
|
heap
|
page read and write
|
||
24B4000
|
direct allocation
|
page read and write
|
||
BC0000
|
heap
|
page execute and read and write
|
||
26DF000
|
stack
|
page read and write
|
||
7B7000
|
heap
|
page read and write
|
||
16D0000
|
heap
|
page read and write
|
||
3876000
|
direct allocation
|
page read and write
|
||
8A1000
|
heap
|
page read and write
|
||
4DC1000
|
heap
|
page read and write
|
||
983E000
|
stack
|
page read and write
|
||
3C22000
|
heap
|
page read and write
|
||
6A8BA000
|
unkown
|
page readonly
|
||
10A7000
|
trusted library allocation
|
page execute and read and write
|
||
3761000
|
direct allocation
|
page read and write
|
||
7D9000
|
heap
|
page read and write
|
||
25DE000
|
stack
|
page read and write
|
||
2CBE000
|
stack
|
page read and write
|
||
AC7000
|
heap
|
page read and write
|
||
1B28C000
|
stack
|
page read and write
|
||
63B2000
|
unkown
|
page readonly
|
||
894000
|
heap
|
page read and write
|
||
23A3000
|
direct allocation
|
page read and write
|
||
4DEE000
|
heap
|
page read and write
|
||
27D0000
|
direct allocation
|
page read and write
|
||
9BD0000
|
trusted library allocation
|
page read and write
|
||
AD5000
|
heap
|
page read and write
|
||
2220000
|
direct allocation
|
page read and write
|
||
CE6000
|
heap
|
page read and write
|
||
1B83E000
|
stack
|
page read and write
|
||
C3B0000
|
trusted library allocation
|
page execute and read and write
|
||
7135000
|
trusted library allocation
|
page read and write
|
||
5790000
|
trusted library allocation
|
page read and write
|
||
93000
|
stack
|
page read and write
|
||
53F6000
|
trusted library allocation
|
page read and write
|
||
9D2000
|
heap
|
page read and write
|
||
2528000
|
direct allocation
|
page read and write
|
||
C4DC000
|
stack
|
page read and write
|
||
80E000
|
unkown
|
page read and write
|
||
2F06000
|
trusted library allocation
|
page read and write
|
||
984000
|
heap
|
page read and write
|
||
22E1000
|
direct allocation
|
page read and write
|
||
A52000
|
heap
|
page read and write
|
||
8880000
|
trusted library allocation
|
page read and write
|
||
1015000
|
heap
|
page read and write
|
||
82C000
|
heap
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
B32000
|
heap
|
page read and write
|
||
CF4000
|
stack
|
page read and write
|
||
5662000
|
unkown
|
page readonly
|
||
AD0000
|
heap
|
page read and write
|
||
9ED000
|
heap
|
page read and write
|
||
E9A000
|
trusted library allocation
|
page execute and read and write
|
||
CCA0000
|
trusted library allocation
|
page execute and read and write
|
||
894000
|
heap
|
page read and write
|
||
7FFAA9D74000
|
trusted library allocation
|
page read and write
|
||
6A598000
|
unkown
|
page read and write
|
||
7FFAACBDA000
|
trusted library allocation
|
page execute and read and write
|
||
39B0000
|
trusted library allocation
|
page read and write
|
||
384B000
|
trusted library allocation
|
page read and write
|
||
39A5000
|
trusted library allocation
|
page read and write
|
||
4DEA000
|
heap
|
page read and write
|
||
BA4000
|
stack
|
page read and write
|
||
6F0000
|
heap
|
page read and write
|
||
3D0000
|
heap
|
page read and write
|
||
603D000
|
stack
|
page read and write
|
||
B00000
|
heap
|
page read and write
|
||
AD6000
|
heap
|
page read and write
|
||
3C20000
|
heap
|
page read and write
|
||
10E0000
|
trusted library allocation
|
page read and write
|
||
7FFAA9D47000
|
trusted library allocation
|
page read and write
|
||
6D6000
|
unkown
|
page read and write
|
||
16E0000
|
trusted library allocation
|
page read and write
|
||
7FFAACBD2000
|
trusted library allocation
|
page execute and read and write
|
||
A1E000
|
stack
|
page read and write
|
||
6D8000
|
heap
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
7FFAA9D80000
|
trusted library allocation
|
page read and write
|
||
2636000
|
trusted library allocation
|
page read and write
|
||
760000
|
heap
|
page read and write
|
||
2847000
|
direct allocation
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
39DE000
|
trusted library allocation
|
page read and write
|
||
8918000
|
heap
|
page read and write
|
||
371B000
|
trusted library allocation
|
page read and write
|
||
9AA2000
|
unkown
|
page readonly
|
||
2EF7000
|
trusted library allocation
|
page read and write
|
||
8D20000
|
trusted library allocation
|
page execute and read and write
|
||
2630000
|
trusted library allocation
|
page read and write
|
||
2837000
|
direct allocation
|
page read and write
|
||
A9A000
|
heap
|
page read and write
|
||
894000
|
heap
|
page read and write
|
||
CE0000
|
heap
|
page read and write
|
||
AD4000
|
heap
|
page read and write
|
||
5831000
|
direct allocation
|
page read and write
|
||
7FFAA9E46000
|
trusted library allocation
|
page execute and read and write
|
||
3874000
|
trusted library allocation
|
page read and write
|
||
2D11000
|
trusted library allocation
|
page read and write
|
||
9B90000
|
trusted library allocation
|
page read and write
|
||
AD8000
|
heap
|
page read and write
|
||
3A5B000
|
trusted library allocation
|
page read and write
|
||
A40000
|
heap
|
page read and write
|
||
9D0000
|
trusted library allocation
|
page read and write
|
||
F38000
|
heap
|
page read and write
|
||
249D000
|
direct allocation
|
page read and write
|
||
367E000
|
stack
|
page read and write
|
There are 2219 hidden memdumps, click here to show them.
DOM / HTML
URL
|
Malicious
|
|
---|---|---|
https://docs.customrp.xyz/setting-up
|
||
https://docs.customrp.xyz/setting-up
|