Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
C:\Program Files (x86)\NIR Technology Analysis Software\NTAS MS3000X.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\NIR Technology Analysis Software\Watchdog.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\NIR Technology Analysis Software\uninstall.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\Downloads\06dc3f2a-0d04-4237-8c43-2058ccd60562.tmp
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\Downloads\NTAS_MS3000X_Installer_v2.8.25_October2024_NO_UPS.exe (copy)
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Users\user\Downloads\Unconfirmed 279108.crdownload
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
dropped
|
||
C:\Windows\SysWOW64\COMCTL32.ocx
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\Cerea.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\DBGRID32.ocx
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\MSFLXGRD.ocx
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\MSHFLXGD.ocx
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\Mahalanobis.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\NSIS.Library.RegTool.v3.{760CC695-7C3A-465F-9E6C-D3931A64AC97}.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\PLSObj.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\vbGraph.ocx
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\RestartApp.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\_asyncio.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\_bz2.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\_ctypes.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\_curses.cp310-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\_decimal.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\_elementtree.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\_hashlib.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\_lzma.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\_multiprocessing.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\_overlapped.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\_queue.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\_socket.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\_ssl.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-console-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-datetime-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-debug-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-errorhandling-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-file-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-file-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-handle-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-heap-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-interlocked-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-libraryloader-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-louserzation-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-memory-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-namedpipe-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-processenvironment-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-processthreads-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-processthreads-l1-1-1.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-profile-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-rtlsupport-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-string-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-synch-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-synch-l1-2-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-sysinfo-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-timezone-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-util-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-crt-conio-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-crt-convert-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-crt-environment-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-crt-filesystem-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-crt-heap-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-crt-locale-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-crt-math-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-crt-process-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-crt-runtime-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-crt-stdio-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-crt-string-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-crt-time-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-crt-utility-l1-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\libcrypto-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\libssl-1_1.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\psutil\_psutil_windows.cp310-win_amd64.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\pyexpat.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\python310.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\select.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\unicodedata.pyd
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\socketcropscan\socketcropscan.exe
|
PE32+ executable (console) x86-64, for MS Windows
|
dropped
|
||
Chrome Cache Entry: 171
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
downloaded
|
||
C:\Program Files (x86)\NIR Technology Analysis Software\NTAS Help.chm
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\NIR Technology Analysis Software\NTAS Help.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive,
ctime=Mon Feb 24 22:42:50 2003, mtime=Mon Oct 28 21:41:18 2024, atime=Mon Feb 24 22:42:50 2003, length=1844627, window=hide
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\NIR Technology Analysis Software\NTAS MS3000X.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0,
Archive, ctime=Mon Oct 28 02:48:08 2024, mtime=Mon Oct 28 21:41:17 2024, atime=Mon Oct 28 02:48:08 2024, length=13479936,
window=hide
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\NIR Technology Analysis Software\Uninstall.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0,
Archive, ctime=Mon Oct 28 21:41:21 2024, mtime=Mon Oct 28 21:41:21 2024, atime=Mon Oct 28 21:41:21 2024, length=59896, window=hide
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\SystemData\S-1-5-21-2246122658-3693405117-2476756634-1003\ReadOnly\LockScreen_W\LockScreen___1280_1024_notdimmed.jpg
(copy)
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\ProgramData\Microsoft\Windows\SystemData\S-1-5-21-2246122658-3693405117-2476756634-1003\ReadOnly\LockScreen_W\~ockScreen___1280_1024_notdimmed.tmp
|
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\Public\Desktop\NTAS MS3000X.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0,
Archive, ctime=Mon Oct 28 02:48:08 2024, mtime=Mon Oct 28 21:41:22 2024, atime=Mon Oct 28 02:48:08 2024, length=13479936,
window=hide
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsl5413.tmp\InstallOptions.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsl5413.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsl5413.tmp\UserInfo.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsl5413.tmp\ioSpecial.ini
|
Unicode text, UTF-16, little-endian text, with very long lines (301), with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsl5413.tmp\modern-wizard.bmp
|
PC bitmap, Windows 3.x format, 164 x 314 x 4, image size 26376, resolution 2834 x 2834 px/m, cbSize 26494, bits offset 118
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsl5413.tmp\nsExec.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsl5413.tmp\nsProcess.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsq53E3.tmp
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\NTAS MS3000X.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Icon number=0,
Archive, ctime=Mon Oct 28 02:48:08 2024, mtime=Mon Oct 28 21:41:22 2024, atime=Mon Oct 28 02:48:08 2024, length=13479936,
window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 21:40:46 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 21:40:46 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 21:40:46 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 21:40:46 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
|
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command
line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Mon Oct 28 21:40:46 2024, atime=Wed Sep 27 04:28:28
2023, length=1210144, window=hide
|
dropped
|
||
C:\Windows\SysWOW64\COMCT232.ocx
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\COMCT332.ocx
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\COMDLG32.ocx
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\MSCHRT20.ocx
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\MSCOMCT2.ocx
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\MSCOMCTL.ocx
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\MSCOMM32.ocx
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\MSDATGRD.ocx
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\MSWINSCK.ocx
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\SYSINFO.ocx
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\TrendGraph.tlb
|
data
|
dropped
|
||
C:\Windows\SysWOW64\VB6STKIT.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Windows\SysWOW64\msstdfmt.dll
|
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\wga\Scripts\BatteryStatus.bat
|
ASCII text, with no line terminators
|
dropped
|
||
C:\wga\Scripts\DisableAutomaticUpdates.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\wga\Scripts\RestartApp\VCRUNTIME140.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\api-ms-win-core-file-l2-1-0.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\base_library.zip
|
Zip archive data, at least v2.0 to extract, compression method=store
|
dropped
|
||
C:\wga\Scripts\RestartApp\libffi-7.dll
|
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\RestartApp\ucrtbase.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\wga\Scripts\ScrollBarWidth255.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\wga\Scripts\ScrollBarWidth650.bat
|
DOS batch file, ASCII text, with CRLF line terminators
|
dropped
|
There are 110 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Downloads\NTAS_MS3000X_Installer_v2.8.25_October2024_NO_UPS.exe
|
"C:\Users\user\Downloads\NTAS_MS3000X_Installer_v2.8.25_October2024_NO_UPS.exe"
|
||
C:\Users\user\Downloads\NTAS_MS3000X_Installer_v2.8.25_October2024_NO_UPS.exe
|
"C:\Users\user\Downloads\NTAS_MS3000X_Installer_v2.8.25_October2024_NO_UPS.exe"
|
||
C:\Windows\System32\bcdedit.exe
|
"bcdedit" /set {current} bootstatuspolicy ignoreallfailures
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US
--service-sandbox-type=none --mojo-platform-channel-handle=2208 --field-trial-handle=1936,i,14282950788006197663,4562122908551355024,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://on-combine-data.s3.us-west-2.amazonaws.com/dealer-data/Share+Point/NTAS_MS3000X_Installer_v2.8.25_October2024_NO_UPS.exe"
|
||
C:\Program Files\Google\Chrome\Application\chrome.exe
|
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US
--service-sandbox-type=icon_reader --mojo-platform-channel-handle=3140 --field-trial-handle=1936,i,14282950788006197663,4562122908551355024,262144
--disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction
/prefetch:8
|
||
C:\Windows\System32\rundll32.exe
|
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6}
-Embedding
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
TaskKill /IM Watchdog.exe /F
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
TaskKill /IM RestartApp.exe /F
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
TaskKill /IM NTAS 3000X /F
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\taskkill.exe
|
TaskKill /IM ReadWeight.exe /F
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\LogonUI.exe
|
"LogonUI.exe" /flags:0x4 /state0:0xa3ff7055 /state1:0x41c64e6d
|
||
C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exe
|
"C:\Windows\SystemApps\Microsoft.LockApp_cw5n1h2txyewy\LockApp.exe" -ServerName:WindowsDefaultLockScreen.AppX7y4nbzq37zn4ks9k7amqjywdat7d3j2z.mca
|
There are 9 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://on-combine-data.s3.us-west-2.amazonaws.com/dealer-data/Share+Point/NTAS_MS3000X_Installer_v2.8.25_October2024_NO_UPS.exe
|
|||
http://ns.adobe.hotosh
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
http://crl.thawte.com/ThawteTimestampingCA.crl0
|
unknown
|
||
http://ns.a.0/sTy
|
unknown
|
||
https://on-combine-data.s3.us-west-2.amazonaws.com/dealer-data/Share+Point/NTAS_MS3000X_Installer_v2.8.25_October2024_NO_UPS.exe
|
52.218.247.225
|
||
http://ocsp.thawte.com0
|
unknown
|
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
s3-r-w.us-west-2.amazonaws.com
|
52.218.247.225
|
||
www.google.com
|
142.250.185.228
|
||
on-combine-data.s3.us-west-2.amazonaws.com
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
142.250.185.228
|
www.google.com
|
United States
|
||
52.218.247.225
|
s3-r-w.us-west-2.amazonaws.com
|
United States
|
||
239.255.255.250
|
unknown
|
Reserved
|
||
192.168.2.16
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
count
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce
|
NSIS.Library.RegTool.v3
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
1.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
1.mode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
2.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
2.mode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
3.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
3.mode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
4.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
4.mode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
5.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
5.mode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
6.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
6.mode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
7.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
7.mode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
8.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
8.mode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
9.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
9.mode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
10.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
10.mode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
11.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
11.mode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
12.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
12.mode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
13.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
13.mode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
14.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
14.mode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
15.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
15.mode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
16.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
16.mode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
17.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
17.mode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
18.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
18.mode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
19.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
19.mode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
20.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
20.mode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
21.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
21.mode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
22.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
22.mode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NTAS
|
Install_Dir
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\NTAS
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\NTAS
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\NTAS
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\NTAS
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
23.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
23.mode
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
24.file
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
24.mode
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
count
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
count
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
count
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
count
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
count
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
count
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
count
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
count
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
count
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
count
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
count
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
count
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
count
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
count
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\NSIS.Library.RegTool.v3\{760CC695-7C3A-465F-9E6C-D3931A64AC97}
|
count
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager
|
PendingFileRenameOperations
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Description
|
FirmwareModified
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\11000001
|
Element
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{9dea862c-5cdd-4e70-acc1-f32b344d4795}\Elements\12000002
|
Element
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{584f4cfd-61ca-11ee-8a62-e43725c6cdb7}\Elements\12000004
|
Element
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{584f4cfe-61ca-11ee-8a62-e43725c6cdb7}\Elements\12000004
|
Element
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{a5a30fa2-3d06-4e9f-b5f4-a01df9d1fcba}\Description
|
Type
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{a5a30fa2-3d06-4e9f-b5f4-a01df9d1fcba}\Elements\24000001
|
Element
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{a5a30fa2-3d06-4e9f-b5f4-a01df9d1fcba}\Elements\25000004
|
Element
|
||
HKEY_LOCAL_MACHINE\BCD00000000\Objects\{71a3c7fc-f751-4982-aec1-e958357e6813}\Elements\250000e0
|
Element
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI
|
IdleTime
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\FaceLogon
|
CredProvUncompletedInstances
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Authentication\LogonUI\FaceLogon
|
CredProvUncompletedInstances
|
There are 75 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
1AFF77F0000
|
heap
|
page read and write
|
||
20C28A95000
|
heap
|
page read and write
|
||
20C28AED000
|
heap
|
page read and write
|
||
2E4F000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
20C2ABFB000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
20C2EC83000
|
heap
|
page read and write
|
||
2166623F000
|
heap
|
page read and write
|
||
20C312C6000
|
heap
|
page read and write
|
||
20C2EA9A000
|
heap
|
page read and write
|
||
A8ACAFB000
|
stack
|
page read and write
|
||
20C2D040000
|
heap
|
page read and write
|
||
20C2EB46000
|
heap
|
page read and write
|
||
2165F2AF000
|
heap
|
page read and write
|
||
20C28A40000
|
heap
|
page read and write
|
||
5FB000
|
heap
|
page read and write
|
||
2F81000
|
heap
|
page read and write
|
||
20C2F570000
|
heap
|
page read and write
|
||
2165F288000
|
heap
|
page read and write
|
||
1AFF9230000
|
heap
|
page read and write
|
||
C5F000
|
unkown
|
page read and write
|
||
3441000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
216653B0000
|
heap
|
page readonly
|
||
ADE000
|
stack
|
page read and write
|
||
20C2F380000
|
heap
|
page read and write
|
||
20C2ED66000
|
heap
|
page read and write
|
||
20C2D1BC000
|
heap
|
page read and write
|
||
5D9000
|
heap
|
page read and write
|
||
20C28ACD000
|
heap
|
page read and write
|
||
20C2D1ED000
|
heap
|
page read and write
|
||
20C2ED55000
|
heap
|
page read and write
|
||
A8AC38C000
|
stack
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
20C28A99000
|
heap
|
page read and write
|
||
20C27857000
|
heap
|
page read and write
|
||
A8AC8FB000
|
stack
|
page read and write
|
||
450000
|
heap
|
page read and write
|
||
20C2D21C000
|
heap
|
page read and write
|
||
354B000
|
heap
|
page read and write
|
||
21665ECE000
|
heap
|
page read and write
|
||
29ABB7D000
|
stack
|
page read and write
|
||
20C2ED2F000
|
heap
|
page read and write
|
||
B40000
|
heap
|
page read and write
|
||
20C2ABEA000
|
heap
|
page read and write
|
||
A8ACBEE000
|
stack
|
page read and write
|
||
20C2EC55000
|
heap
|
page read and write
|
||
20C2F4DA000
|
heap
|
page read and write
|
||
20C2D106000
|
heap
|
page read and write
|
||
20C2D0AE000
|
heap
|
page read and write
|
||
20C30541000
|
heap
|
page read and write
|
||
20C2ED44000
|
heap
|
page read and write
|
||
20C28AEB000
|
heap
|
page read and write
|
||
2D4D000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
20C28ADA000
|
heap
|
page read and write
|
||
616000
|
heap
|
page read and write
|
||
5F4000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
4FE000
|
stack
|
page read and write
|
||
20C2ED5D000
|
heap
|
page read and write
|
||
20C2F53A000
|
heap
|
page read and write
|
||
20C2AC9E000
|
heap
|
page read and write
|
||
2165F2B8000
|
heap
|
page read and write
|
||
21665EF3000
|
heap
|
page read and write
|
||
20C2ED1E000
|
heap
|
page read and write
|
||
20C2D18D000
|
heap
|
page read and write
|
||
20C2ED5B000
|
heap
|
page read and write
|
||
20C2D0AE000
|
heap
|
page read and write
|
||
20C30AB4000
|
heap
|
page read and write
|
||
20C2ED94000
|
heap
|
page read and write
|
||
216662C4000
|
heap
|
page read and write
|
||
3541000
|
heap
|
page read and write
|
||
20C2ACDC000
|
heap
|
page read and write
|
||
20C2ED91000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
4ACF000
|
stack
|
page read and write
|
||
42E000
|
heap
|
page read and write
|
||
1B7FAF30000
|
heap
|
page read and write
|
||
20C2D199000
|
heap
|
page read and write
|
||
592000
|
heap
|
page read and write
|
||
20C2F43E000
|
heap
|
page read and write
|
||
20C2D024000
|
heap
|
page read and write
|
||
20C2ED4F000
|
heap
|
page read and write
|
||
A8AC77E000
|
stack
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
20C2ABE6000
|
heap
|
page read and write
|
||
2DEE000
|
stack
|
page read and write
|
||
20C2EAF3000
|
heap
|
page read and write
|
||
570000
|
heap
|
page read and write
|
||
2CAF000
|
heap
|
page read and write
|
||
5E3000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
20C2EBC8000
|
heap
|
page read and write
|
||
A8ACEFB000
|
stack
|
page read and write
|
||
32E0000
|
trusted library allocation
|
page read and write
|
||
1AFF76D0000
|
heap
|
page read and write
|
||
20C304C0000
|
heap
|
page read and write
|
||
20C308C0000
|
heap
|
page read and write
|
||
21665D50000
|
trusted library allocation
|
page read and write
|
||
20C2D13E000
|
heap
|
page read and write
|
||
A50000
|
heap
|
page read and write
|
||
C0E000
|
unkown
|
page read and write
|
||
2165F361000
|
heap
|
page read and write
|
||
21665380000
|
trusted library allocation
|
page read and write
|
||
A8AC7FE000
|
stack
|
page read and write
|
||
3579000
|
heap
|
page read and write
|
||
20C2D13C000
|
heap
|
page read and write
|
||
20C2AE00000
|
trusted library allocation
|
page read and write
|
||
20C2D19C000
|
heap
|
page read and write
|
||
2165F2F4000
|
heap
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
20C2ED3B000
|
heap
|
page read and write
|
||
5C9000
|
heap
|
page read and write
|
||
597000
|
heap
|
page read and write
|
||
1B7FAF00000
|
heap
|
page read and write
|
||
20C2D1C8000
|
heap
|
page read and write
|
||
20C2D11F000
|
heap
|
page read and write
|
||
5E6000
|
heap
|
page read and write
|
||
A8ACF7D000
|
stack
|
page read and write
|
||
20C2E900000
|
heap
|
page read and write
|
||
2166115A000
|
heap
|
page read and write
|
||
20C28AB9000
|
heap
|
page read and write
|
||
20C2F740000
|
heap
|
page read and write
|
||
A9C000
|
stack
|
page read and write
|
||
21666238000
|
heap
|
page read and write
|
||
21661002000
|
heap
|
page read and write
|
||
20C2ED22000
|
heap
|
page read and write
|
||
20C278AE000
|
heap
|
page read and write
|
||
20C2F511000
|
heap
|
page read and write
|
||
20C28A3C000
|
heap
|
page read and write
|
||
20C2D165000
|
heap
|
page read and write
|
||
20C2ED6D000
|
heap
|
page read and write
|
||
5EE000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
1FE96FB000
|
stack
|
page read and write
|
||
A8ACB7F000
|
stack
|
page read and write
|
||
44A000
|
heap
|
page read and write
|
||
31A0000
|
trusted library allocation
|
page read and write
|
||
1B7FB220000
|
heap
|
page read and write
|
||
1FE8DFE000
|
stack
|
page read and write
|
||
3556000
|
heap
|
page read and write
|
||
4B0000
|
heap
|
page read and write
|
||
20C30570000
|
heap
|
page read and write
|
||
A94000
|
heap
|
page read and write
|
||
20C2ED3D000
|
heap
|
page read and write
|
||
2165F22E000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2165F388000
|
heap
|
page read and write
|
||
20C2D21A000
|
heap
|
page read and write
|
||
4A8E000
|
stack
|
page read and write
|
||
BB5000
|
heap
|
page read and write
|
||
AC8000
|
heap
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
422000
|
unkown
|
page read and write
|
||
2165F2AD000
|
heap
|
page read and write
|
||
10000000
|
unkown
|
page readonly
|
||
20C2D1F4000
|
heap
|
page read and write
|
||
20C2EB4E000
|
heap
|
page read and write
|
||
3440000
|
heap
|
page read and write
|
||
20C2D0E9000
|
heap
|
page read and write
|
||
20C2E9A0000
|
heap
|
page read and write
|
||
20C2C612000
|
unkown
|
page readonly
|
||
29F6000
|
heap
|
page read and write
|
||
20C2EA9F000
|
heap
|
page read and write
|
||
21665DB0000
|
heap
|
page read and write
|
||
20C2EBC2000
|
heap
|
page read and write
|
||
A8AC6FE000
|
stack
|
page read and write
|
||
20C2D1D9000
|
heap
|
page read and write
|
||
3441000
|
heap
|
page read and write
|
||
21665D10000
|
heap
|
page read and write
|
||
20C2ED4F000
|
heap
|
page read and write
|
||
20C27817000
|
heap
|
page read and write
|
||
20C2790C000
|
heap
|
page read and write
|
||
20C2ED56000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
2165F1E0000
|
trusted library allocation
|
page read and write
|
||
20C2D06C000
|
heap
|
page read and write
|
||
21666249000
|
heap
|
page read and write
|
||
20C28AC1000
|
heap
|
page read and write
|
||
1B7FB030000
|
heap
|
page read and write
|
||
21661100000
|
heap
|
page read and write
|
||
20C27950000
|
heap
|
page read and write
|
||
20C28A83000
|
heap
|
page read and write
|
||
20C28AC5000
|
heap
|
page read and write
|
||
1AFF77F5000
|
heap
|
page read and write
|
||
2D37000
|
heap
|
page read and write
|
||
2165F257000
|
heap
|
page read and write
|
||
575000
|
heap
|
page read and write
|
||
B8F000
|
unkown
|
page read and write
|
||
20C2C617000
|
unkown
|
page readonly
|
||
20C2D21F000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
20C2EDAB000
|
heap
|
page read and write
|
||
20C2EABA000
|
heap
|
page read and write
|
||
20C2D10C000
|
heap
|
page read and write
|
||
2165F3D8000
|
heap
|
page read and write
|
||
20C278FC000
|
heap
|
page read and write
|
||
20C2D0F6000
|
heap
|
page read and write
|
||
20C2EDD6000
|
heap
|
page read and write
|
||
20C2D0CB000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
21665EB4000
|
heap
|
page read and write
|
||
20C28AA5000
|
heap
|
page read and write
|
||
20C2ED53000
|
heap
|
page read and write
|
||
2EA3000
|
heap
|
page read and write
|
||
3441000
|
heap
|
page read and write
|
||
2D6E000
|
stack
|
page read and write
|
||
20C2EBE5000
|
heap
|
page read and write
|
||
20C2D177000
|
heap
|
page read and write
|
||
20C2F55E000
|
heap
|
page read and write
|
||
20C2ACBB000
|
heap
|
page read and write
|
||
1B7FAF38000
|
heap
|
page read and write
|
||
20C2D151000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
20C2EBC5000
|
heap
|
page read and write
|
||
20C2D18C000
|
heap
|
page read and write
|
||
20C2F575000
|
heap
|
page read and write
|
||
20C2AC37000
|
heap
|
page read and write
|
||
20C2F577000
|
heap
|
page read and write
|
||
20C2EC25000
|
heap
|
page read and write
|
||
20C28A24000
|
heap
|
page read and write
|
||
20C2EB31000
|
heap
|
page read and write
|
||
68E000
|
unkown
|
page read and write
|
||
20C2D202000
|
heap
|
page read and write
|
||
20C2D1C3000
|
heap
|
page read and write
|
||
1C0000
|
heap
|
page read and write
|
||
20C2EA00000
|
heap
|
page read and write
|
||
20C28AB9000
|
heap
|
page read and write
|
||
20C28AE7000
|
heap
|
page read and write
|
||
A8ACC7E000
|
stack
|
page read and write
|
||
20C2EB34000
|
heap
|
page read and write
|
||
20C2F545000
|
heap
|
page read and write
|
||
32F0000
|
unkown
|
page read and write
|
||
20C3056F000
|
heap
|
page read and write
|
||
20C2EC22000
|
heap
|
page read and write
|
||
29C9000
|
heap
|
page read and write
|
||
3682000
|
heap
|
page read and write
|
||
20C2ED74000
|
heap
|
page read and write
|
||
2165F311000
|
heap
|
page read and write
|
||
20C2ABE8000
|
heap
|
page read and write
|
||
20C2EAF1000
|
heap
|
page read and write
|
||
20C2F475000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page read and write
|
||
20C2E980000
|
heap
|
page read and write
|
||
2165F267000
|
heap
|
page read and write
|
||
20C2D19C000
|
heap
|
page read and write
|
||
2165F2B3000
|
heap
|
page read and write
|
||
2E70000
|
heap
|
page read and write
|
||
2165F347000
|
heap
|
page read and write
|
||
20C2EAB2000
|
heap
|
page read and write
|
||
20C31284000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
20C278BD000
|
heap
|
page read and write
|
||
20C30542000
|
heap
|
page read and write
|
||
2EAE000
|
stack
|
page read and write
|
||
20C2ACA1000
|
heap
|
page read and write
|
||
443E000
|
stack
|
page read and write
|
||
20C2D0BB000
|
heap
|
page read and write
|
||
20C2AC99000
|
heap
|
page read and write
|
||
20C2E8F0000
|
heap
|
page read and write
|
||
20C2ACCC000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
1FE8FF9000
|
stack
|
page read and write
|
||
20C2D179000
|
heap
|
page read and write
|
||
20C2781E000
|
heap
|
page read and write
|
||
21661116000
|
heap
|
page read and write
|
||
20C2ED75000
|
heap
|
page read and write
|
||
20C28AB7000
|
heap
|
page read and write
|
||
20C2D065000
|
heap
|
page read and write
|
||
2D30000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
43B000
|
unkown
|
page read and write
|
||
20C2D132000
|
heap
|
page read and write
|
||
20C28AC1000
|
heap
|
page read and write
|
||
21666282000
|
heap
|
page read and write
|
||
20C2F567000
|
heap
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
20C2F43E000
|
heap
|
page read and write
|
||
20C2ED5F000
|
heap
|
page read and write
|
||
417000
|
heap
|
page read and write
|
||
20C2D1EB000
|
heap
|
page read and write
|
||
20C2ED8A000
|
heap
|
page read and write
|
||
2165F35E000
|
heap
|
page read and write
|
||
5E8000
|
heap
|
page read and write
|
||
20C2D1D5000
|
heap
|
page read and write
|
||
BBA000
|
heap
|
page read and write
|
||
20C2D20F000
|
heap
|
page read and write
|
||
2FDD000
|
heap
|
page read and write
|
||
5C2000
|
heap
|
page read and write
|
||
21666422000
|
trusted library allocation
|
page read and write
|
||
5F9000
|
heap
|
page read and write
|
||
A8AD0FC000
|
stack
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
20C2F398000
|
heap
|
page read and write
|
||
453E000
|
stack
|
page read and write
|
||
4B7E000
|
stack
|
page read and write
|
||
21666274000
|
heap
|
page read and write
|
||
20C2EC87000
|
heap
|
page read and write
|
||
42B000
|
unkown
|
page read and write
|
||
2DAD000
|
stack
|
page read and write
|
||
20C2CF10000
|
heap
|
page readonly
|
||
3543000
|
heap
|
page read and write
|
||
20C2ED63000
|
heap
|
page read and write
|
||
2E4856F000
|
stack
|
page read and write
|
||
20C2D064000
|
heap
|
page read and write
|
||
20C2EAF3000
|
heap
|
page read and write
|
||
20C278EE000
|
heap
|
page read and write
|
||
20C279C0000
|
heap
|
page read and write
|
||
A8AC9FC000
|
stack
|
page read and write
|
||
20C2CF80000
|
trusted library allocation
|
page read and write
|
||
3543000
|
heap
|
page read and write
|
||
20C2D06A000
|
heap
|
page read and write
|
||
2165F150000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
5C5000
|
heap
|
page read and write
|
||
1FE90FE000
|
stack
|
page read and write
|
||
20C2D16E000
|
heap
|
page read and write
|
||
20C2D0EC000
|
heap
|
page read and write
|
||
20C2EA9D000
|
heap
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
A75000
|
heap
|
page read and write
|
||
20C2D14B000
|
heap
|
page read and write
|
||
20C27960000
|
heap
|
page read and write
|
||
20C2D065000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
20C2D1F4000
|
heap
|
page read and write
|
||
20C2D020000
|
heap
|
page read and write
|
||
44BE000
|
stack
|
page read and write
|
||
20C2D156000
|
heap
|
page read and write
|
||
20C2F47A000
|
heap
|
page read and write
|
||
20C27760000
|
heap
|
page read and write
|
||
A8AD27E000
|
stack
|
page read and write
|
||
43F000
|
unkown
|
page readonly
|
||
4A40000
|
trusted library allocation
|
page read and write
|
||
20C2EF32000
|
trusted library allocation
|
page read and write
|
||
BA0000
|
heap
|
page read and write
|
||
2166110A000
|
heap
|
page read and write
|
||
4B0E000
|
stack
|
page read and write
|
||
43E000
|
heap
|
page read and write
|
||
5E4000
|
heap
|
page read and write
|
||
20C2F479000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
A2F000
|
stack
|
page read and write
|
||
20C2F554000
|
heap
|
page read and write
|
||
216611A4000
|
heap
|
page read and write
|
||
20C2D118000
|
heap
|
page read and write
|
||
20C28AC7000
|
heap
|
page read and write
|
||
3542000
|
heap
|
page read and write
|
||
20C28AD6000
|
heap
|
page read and write
|
||
20C2F565000
|
heap
|
page read and write
|
||
20C2D0E2000
|
heap
|
page read and write
|
||
20C2F4AE000
|
heap
|
page read and write
|
||
20C2D0C1000
|
heap
|
page read and write
|
||
C4E000
|
stack
|
page read and write
|
||
21661157000
|
heap
|
page read and write
|
||
617000
|
heap
|
page read and write
|
||
20C2F571000
|
heap
|
page read and write
|
||
B1E000
|
stack
|
page read and write
|
||
20C2D0E5000
|
heap
|
page read and write
|
||
2166628E000
|
heap
|
page read and write
|
||
410000
|
heap
|
page read and write
|
||
20C2ACB0000
|
heap
|
page read and write
|
||
602000
|
heap
|
page read and write
|
||
21665EF9000
|
heap
|
page read and write
|
||
20C2EBBE000
|
heap
|
page read and write
|
||
A8ACA74000
|
stack
|
page read and write
|
||
20C2D0A1000
|
heap
|
page read and write
|
||
20C28A04000
|
heap
|
page read and write
|
||
2166111D000
|
heap
|
page read and write
|
||
20C2ED74000
|
heap
|
page read and write
|
||
29E6000
|
heap
|
page read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
15C000
|
stack
|
page read and write
|
||
3543000
|
heap
|
page read and write
|
||
20C2EA36000
|
heap
|
page read and write
|
||
20C289F0000
|
heap
|
page read and write
|
||
1B7FB225000
|
heap
|
page read and write
|
||
1AFF7857000
|
heap
|
page read and write
|
||
21661160000
|
heap
|
page read and write
|
||
20C2D212000
|
heap
|
page read and write
|
||
20C2D060000
|
heap
|
page read and write
|
||
20C2F475000
|
heap
|
page read and write
|
||
28F0000
|
heap
|
page read and write
|
||
20C2D1E5000
|
heap
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
20C28A8E000
|
heap
|
page read and write
|
||
20C2EB28000
|
heap
|
page read and write
|
||
A8ACD7E000
|
stack
|
page read and write
|
||
3546000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
20C2ED1E000
|
heap
|
page read and write
|
||
43B000
|
heap
|
page read and write
|
||
A8ACE7F000
|
stack
|
page read and write
|
||
74E000
|
stack
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
20C2EBF8000
|
heap
|
page read and write
|
||
2CEE000
|
unkown
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
20C2CF00000
|
trusted library allocation
|
page read and write
|
||
A5C000
|
stack
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
5F2000
|
heap
|
page read and write
|
||
20C2D15F000
|
heap
|
page read and write
|
||
A97000
|
heap
|
page read and write
|
||
73C000
|
stack
|
page read and write
|
||
2165F200000
|
heap
|
page read and write
|
||
20C2ED6B000
|
heap
|
page read and write
|
||
20C2ED5B000
|
heap
|
page read and write
|
||
2166627E000
|
heap
|
page read and write
|
||
21666278000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
1D0000
|
heap
|
page read and write
|
||
78E000
|
stack
|
page read and write
|
||
20C2ABE0000
|
heap
|
page read and write
|
||
20C2ABE2000
|
heap
|
page read and write
|
||
20C27865000
|
heap
|
page read and write
|
||
2E78000
|
heap
|
page read and write
|
||
20C289F2000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
1FE92F4000
|
stack
|
page read and write
|
||
20C28A54000
|
heap
|
page read and write
|
||
7F0000
|
heap
|
page read and write
|
||
431000
|
unkown
|
page read and write
|
||
77C000
|
stack
|
page read and write
|
||
20C2ACC4000
|
heap
|
page read and write
|
||
2165F30B000
|
heap
|
page read and write
|
||
6CE000
|
stack
|
page read and write
|
||
2165F1F0000
|
heap
|
page read and write
|
||
447F000
|
stack
|
page read and write
|
||
1FE97FC000
|
stack
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
356C000
|
heap
|
page read and write
|
||
3541000
|
heap
|
page read and write
|
||
7DF3FEEC1000
|
trusted library allocation
|
page execute read
|
||
20C2F552000
|
heap
|
page read and write
|
||
20C2EB3B000
|
heap
|
page read and write
|
||
20C28AC3000
|
heap
|
page read and write
|
||
457F000
|
stack
|
page read and write
|
||
21665DC0000
|
trusted library allocation
|
page read and write
|
||
20C2D172000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
AD6000
|
heap
|
page read and write
|
||
601000
|
heap
|
page read and write
|
||
425000
|
unkown
|
page read and write
|
||
4A0000
|
heap
|
page read and write
|
||
2165F334000
|
heap
|
page read and write
|
||
21665F13000
|
heap
|
page read and write
|
||
21666261000
|
heap
|
page read and write
|
||
20C2F38F000
|
heap
|
page read and write
|
||
2E4887F000
|
stack
|
page read and write
|
||
42B000
|
heap
|
page read and write
|
||
1FE9EFF000
|
stack
|
page read and write
|
||
3680000
|
heap
|
page read and write
|
||
20C2ED74000
|
heap
|
page read and write
|
||
614000
|
heap
|
page read and write
|
||
20C27680000
|
heap
|
page read and write
|
||
20C2F577000
|
heap
|
page read and write
|
||
20C28AB0000
|
heap
|
page read and write
|
||
2E6E000
|
stack
|
page read and write
|
||
1FE94FE000
|
stack
|
page read and write
|
||
C8E000
|
stack
|
page read and write
|
||
20C2EB32000
|
heap
|
page read and write
|
||
20C28AB2000
|
heap
|
page read and write
|
||
B3D000
|
unkown
|
page read and write
|
||
2ED0000
|
heap
|
page read and write
|
||
28EE000
|
heap
|
page read and write
|
||
20C2EBE2000
|
heap
|
page read and write
|
||
2165F3CA000
|
heap
|
page read and write
|
||
2165F2FE000
|
heap
|
page read and write
|
||
A8AC87E000
|
stack
|
page read and write
|
||
20C2AC80000
|
heap
|
page read and write
|
||
2CB0000
|
heap
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
20C2E970000
|
trusted library allocation
|
page read and write
|
||
8E0000
|
heap
|
page read and write
|
||
560000
|
heap
|
page read and write
|
||
20C2F424000
|
heap
|
page read and write
|
||
2165F3C2000
|
heap
|
page read and write
|
||
20C2D1B8000
|
heap
|
page read and write
|
||
20C2F547000
|
heap
|
page read and write
|
||
216611AA000
|
heap
|
page read and write
|
||
20C2EBB0000
|
heap
|
page read and write
|
||
20C2D123000
|
heap
|
page read and write
|
||
20C2CFF0000
|
heap
|
page read and write
|
||
2CED000
|
stack
|
page read and write
|
||
2165F291000
|
heap
|
page read and write
|
||
A8AD179000
|
stack
|
page read and write
|
||
21661138000
|
heap
|
page read and write
|
||
2165F2D1000
|
heap
|
page read and write
|
||
2E484EC000
|
stack
|
page read and write
|
||
4580000
|
heap
|
page read and write
|
||
A8ACFFE000
|
stack
|
page read and write
|
||
2165F284000
|
heap
|
page read and write
|
||
20C2F51F000
|
heap
|
page read and write
|
||
20C28AA5000
|
heap
|
page read and write
|
||
2166626A000
|
heap
|
page read and write
|
||
1FE9AFF000
|
stack
|
page read and write
|
||
7DF3FEEB1000
|
trusted library allocation
|
page execute read
|
||
216611FA000
|
heap
|
page read and write
|
||
5C1000
|
heap
|
page read and write
|
||
20C2D22D000
|
heap
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
1FE93FC000
|
stack
|
page read and write
|
||
2EAB000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
20C2D0FB000
|
heap
|
page read and write
|
||
20C2D06C000
|
heap
|
page read and write
|
||
20C2D12D000
|
heap
|
page read and write
|
||
20C28AC1000
|
heap
|
page read and write
|
||
4BBF000
|
stack
|
page read and write
|
||
20C2ABF1000
|
heap
|
page read and write
|
||
2165F2B1000
|
heap
|
page read and write
|
||
1FE95FF000
|
stack
|
page read and write
|
||
20C2F821000
|
heap
|
page read and write
|
||
20C28AC7000
|
heap
|
page read and write
|
||
A8AC976000
|
stack
|
page read and write
|
||
20C2D0DB000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
20C2D140000
|
heap
|
page read and write
|
||
20C2F479000
|
heap
|
page read and write
|
||
20C2ED6D000
|
heap
|
page read and write
|
||
20C28A99000
|
heap
|
page read and write
|
||
20C2D1F6000
|
heap
|
page read and write
|
||
2CE0000
|
heap
|
page read and write
|
||
20C2D0A1000
|
heap
|
page read and write
|
||
31A0000
|
trusted library allocation
|
page read and write
|
||
20C2EA10000
|
heap
|
page read and write
|
||
20C2F421000
|
heap
|
page read and write
|
||
44A000
|
heap
|
page read and write
|
||
20C2ED2A000
|
heap
|
page read and write
|
||
2165F2A8000
|
heap
|
page read and write
|
||
20C2F572000
|
heap
|
page read and write
|
||
1AFF77D0000
|
heap
|
page read and write
|
||
7BC000
|
stack
|
page read and write
|
||
20C2D163000
|
heap
|
page read and write
|
||
20C2F38F000
|
heap
|
page read and write
|
||
582000
|
heap
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
20C2EC59000
|
heap
|
page read and write
|
||
2165F24B000
|
heap
|
page read and write
|
||
2165F371000
|
heap
|
page read and write
|
||
20C28AC3000
|
heap
|
page read and write
|
||
82F000
|
stack
|
page read and write
|
||
10002000
|
unkown
|
page readonly
|
||
20C2C622000
|
unkown
|
page readonly
|
||
20C2D06A000
|
heap
|
page read and write
|
||
20C2D030000
|
heap
|
page read and write
|
||
2165F271000
|
heap
|
page read and write
|
||
1FE8EFE000
|
stack
|
page read and write
|
||
20C2F396000
|
heap
|
page read and write
|
||
4B4F000
|
stack
|
page read and write
|
||
20C30EA0000
|
trusted library allocation
|
page read and write
|
||
20C2EC96000
|
heap
|
page read and write
|
||
20C28ACD000
|
heap
|
page read and write
|
||
28A3000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
20C2D14D000
|
heap
|
page read and write
|
||
A8AD07E000
|
stack
|
page read and write
|
||
AF0000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
20C2D1A0000
|
heap
|
page read and write
|
||
20C2D05B000
|
heap
|
page read and write
|
||
20C28AAF000
|
heap
|
page read and write
|
||
2165F324000
|
heap
|
page read and write
|
||
20C2D10A000
|
heap
|
page read and write
|
||
20C2EB9F000
|
heap
|
page read and write
|
||
20C2D193000
|
heap
|
page read and write
|
||
20C28AC7000
|
heap
|
page read and write
|
||
20C2D11B000
|
heap
|
page read and write
|
||
49E000
|
stack
|
page read and write
|
||
2165F3DB000
|
heap
|
page read and write
|
||
C10000
|
heap
|
page read and write
|
||
602000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
2166624D000
|
heap
|
page read and write
|
||
20C28AC4000
|
heap
|
page read and write
|
||
A8AC30C000
|
stack
|
page read and write
|
||
54E000
|
unkown
|
page read and write
|
||
42A000
|
heap
|
page read and write
|
||
20C2F741000
|
heap
|
page read and write
|
||
20C2EC08000
|
heap
|
page read and write
|
||
20C2EC66000
|
heap
|
page read and write
|
||
2D9D000
|
heap
|
page read and write
|
||
20C2ED57000
|
heap
|
page read and write
|
||
20C2F543000
|
heap
|
page read and write
|
||
20C2EC83000
|
heap
|
page read and write
|
||
567000
|
heap
|
page read and write
|
||
2E8C000
|
heap
|
page read and write
|
||
20C2D114000
|
heap
|
page read and write
|
||
3541000
|
heap
|
page read and write
|
||
20C278BA000
|
heap
|
page read and write
|
||
20C2F577000
|
heap
|
page read and write
|
||
20C2EDA6000
|
heap
|
page read and write
|
||
58D000
|
heap
|
page read and write
|
||
20C2AC82000
|
heap
|
page read and write
|
||
20C2D17C000
|
heap
|
page read and write
|
||
21666286000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
20C28ABE000
|
heap
|
page read and write
|
||
20C2ED66000
|
heap
|
page read and write
|
||
2165F2EC000
|
heap
|
page read and write
|
||
4BCF000
|
stack
|
page read and write
|
||
B45000
|
heap
|
page read and write
|
||
20C2D1C1000
|
heap
|
page read and write
|
||
279F000
|
stack
|
page read and write
|
||
20C2D053000
|
heap
|
page read and write
|
||
77C000
|
stack
|
page read and write
|
||
21661120000
|
heap
|
page read and write
|
||
70E000
|
stack
|
page read and write
|
||
2EB0000
|
heap
|
page read and write
|
||
A70000
|
heap
|
page read and write
|
||
1FE99FB000
|
stack
|
page read and write
|
||
2D79000
|
heap
|
page read and write
|
||
2165F130000
|
heap
|
page read and write
|
||
3060000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
20C2ED38000
|
heap
|
page read and write
|
||
20C28AB3000
|
heap
|
page read and write
|
||
20C2D1C1000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
20C2F47B000
|
heap
|
page read and write
|
||
1B7FAE20000
|
heap
|
page read and write
|
||
20C27904000
|
heap
|
page read and write
|
||
3544000
|
heap
|
page read and write
|
||
20C2EBA8000
|
heap
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
20C2AC9C000
|
heap
|
page read and write
|
||
20C2D17D000
|
heap
|
page read and write
|
||
AAB000
|
heap
|
page read and write
|
||
29ABBFF000
|
stack
|
page read and write
|
||
5C1000
|
heap
|
page read and write
|
||
20C2D062000
|
heap
|
page read and write
|
||
20C2ED91000
|
heap
|
page read and write
|
||
BCE000
|
stack
|
page read and write
|
||
21665F02000
|
heap
|
page read and write
|
||
20C2ABE4000
|
heap
|
page read and write
|
||
58B000
|
heap
|
page read and write
|
||
2165F3AE000
|
heap
|
page read and write
|
||
4B5000
|
heap
|
page read and write
|
||
3540000
|
heap
|
page read and write
|
||
20C2D125000
|
heap
|
page read and write
|
||
20C28A8A000
|
heap
|
page read and write
|
||
20C279C5000
|
heap
|
page read and write
|
||
21665EB0000
|
heap
|
page read and write
|
||
20C2EA84000
|
heap
|
page read and write
|
||
20C2D0A1000
|
heap
|
page read and write
|
||
A3E000
|
unkown
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
20C2ED34000
|
heap
|
page read and write
|
||
587000
|
heap
|
page read and write
|
||
2165F336000
|
heap
|
page read and write
|
||
20C308C0000
|
heap
|
page read and write
|
||
20C2ACB7000
|
heap
|
page read and write
|
||
20C2AC10000
|
heap
|
page read and write
|
||
21666257000
|
heap
|
page read and write
|
||
21665ED2000
|
heap
|
page read and write
|
||
61F000
|
heap
|
page read and write
|
||
A8ACDFF000
|
stack
|
page read and write
|
||
20C2D16A000
|
heap
|
page read and write
|
||
3549000
|
heap
|
page read and write
|
||
20C2D0AE000
|
heap
|
page read and write
|
||
20C2D1EB000
|
heap
|
page read and write
|
||
21666241000
|
heap
|
page read and write
|
||
2165F213000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
20C2ED50000
|
heap
|
page read and write
|
||
343F000
|
stack
|
page read and write
|
||
A8AD1FF000
|
stack
|
page read and write
|
||
440000
|
heap
|
page read and write
|
||
4B8E000
|
stack
|
page read and write
|
||
20C310A4000
|
heap
|
page read and write
|
||
A20000
|
heap
|
page read and write
|
||
613000
|
heap
|
page read and write
|
||
20C2EF00000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
2165F313000
|
heap
|
page read and write
|
||
20C2EDA9000
|
heap
|
page read and write
|
||
1FE9DFF000
|
stack
|
page read and write
|
||
289F000
|
stack
|
page read and write
|
||
20C2D1BE000
|
heap
|
page read and write
|
||
20C2D06C000
|
heap
|
page read and write
|
||
4BD0000
|
heap
|
page read and write
|
||
20C2ED76000
|
heap
|
page read and write
|
||
1FE9BFE000
|
stack
|
page read and write
|
||
20C2D1D2000
|
heap
|
page read and write
|
||
42A000
|
heap
|
page read and write
|
||
20C2D1B1000
|
heap
|
page read and write
|
||
2165F3A7000
|
heap
|
page read and write
|
||
20C2F3F2000
|
heap
|
page read and write
|
||
20C28AAF000
|
heap
|
page read and write
|
||
20C2F537000
|
heap
|
page read and write
|
||
20C2F47B000
|
heap
|
page read and write
|
||
20C2AC2B000
|
heap
|
page read and write
|
||
11C000
|
stack
|
page read and write
|
||
2165F120000
|
heap
|
page read and write
|
||
60A000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
A8AC67E000
|
stack
|
page read and write
|
||
20C2EC5F000
|
heap
|
page read and write
|
||
21665E00000
|
heap
|
page read and write
|
||
1AFF77B0000
|
heap
|
page read and write
|
||
2E485EE000
|
stack
|
page read and write
|
||
2D2E000
|
stack
|
page read and write
|
||
1FE8CFE000
|
stack
|
page read and write
|
||
20C27953000
|
heap
|
page read and write
|
||
20C28AB3000
|
heap
|
page read and write
|
||
2165F2CB000
|
heap
|
page read and write
|
||
2165F2BD000
|
heap
|
page read and write
|
||
20C28ABA000
|
heap
|
page read and write
|
||
10001000
|
unkown
|
page execute read
|
||
20C2EC57000
|
heap
|
page read and write
|
||
2A14000
|
heap
|
page read and write
|
||
20C2D0D7000
|
heap
|
page read and write
|
||
20C2ED5D000
|
heap
|
page read and write
|
||
1FE9CFB000
|
stack
|
page read and write
|
||
4B3F000
|
stack
|
page read and write
|
||
20C2ACAB000
|
heap
|
page read and write
|
||
44FF000
|
stack
|
page read and write
|
||
20C2EBBA000
|
heap
|
page read and write
|
||
A90000
|
heap
|
page read and write
|
||
20C2ED4C000
|
heap
|
page read and write
|
||
20C2D193000
|
heap
|
page read and write
|
||
B90000
|
heap
|
page read and write
|
||
20C2D044000
|
heap
|
page read and write
|
||
20C2E900000
|
trusted library allocation
|
page read and write
|
||
20C278F2000
|
heap
|
page read and write
|
||
53E000
|
stack
|
page read and write
|
||
456000
|
heap
|
page read and write
|
||
1FE898B000
|
stack
|
page read and write
|
||
20C2ACBA000
|
heap
|
page read and write
|
||
20C2D195000
|
heap
|
page read and write
|
||
20C2F52C000
|
heap
|
page read and write
|
||
20C27859000
|
heap
|
page read and write
|
||
20C2D211000
|
heap
|
page read and write
|
||
2165F2E6000
|
heap
|
page read and write
|
||
1FE98F7000
|
stack
|
page read and write
|
||
20C28ABC000
|
heap
|
page read and write
|
||
333E000
|
stack
|
page read and write
|
||
96000
|
stack
|
page read and write
|
||
20C28A38000
|
heap
|
page read and write
|
||
20C28A3E000
|
heap
|
page read and write
|
||
20C2ED53000
|
heap
|
page read and write
|
||
29ABE7F000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
20C2D199000
|
heap
|
page read and write
|
||
20C27780000
|
heap
|
page read and write
|
||
3220000
|
trusted library allocation
|
page read and write
|
||
20C28AB9000
|
heap
|
page read and write
|
||
20C2D06A000
|
heap
|
page read and write
|
||
20C28A8E000
|
heap
|
page read and write
|
||
21661200000
|
trusted library allocation
|
page read and write
|
||
5C5000
|
heap
|
page read and write
|
||
435000
|
unkown
|
page read and write
|
||
21666200000
|
heap
|
page read and write
|
||
92F000
|
stack
|
page read and write
|
||
1FE91FB000
|
stack
|
page read and write
|
||
20C28ADA000
|
heap
|
page read and write
|
||
32E0000
|
trusted library allocation
|
page read and write
|
||
20C2D04F000
|
heap
|
page read and write
|
||
20C28AC1000
|
heap
|
page read and write
|
||
20C28AE4000
|
heap
|
page read and write
|
||
216611F8000
|
heap
|
page read and write
|
||
2165F25F000
|
heap
|
page read and write
|
||
20C2D0C0000
|
heap
|
page read and write
|
||
20C28ABC000
|
heap
|
page read and write
|
||
20C2F571000
|
heap
|
page read and write
|
||
20C2EBCC000
|
heap
|
page read and write
|
||
2165F2D5000
|
heap
|
page read and write
|
||
20C2D18C000
|
heap
|
page read and write
|
||
2F22000
|
heap
|
page read and write
|
||
20C2ED48000
|
heap
|
page read and write
|
||
20C28ABB000
|
heap
|
page read and write
|
||
20C2EDD4000
|
heap
|
page read and write
|
||
20C28AC5000
|
heap
|
page read and write
|
||
20C28A9E000
|
heap
|
page read and write
|
||
20C27810000
|
heap
|
page read and write
|
||
2165F2AB000
|
heap
|
page read and write
|
||
29BC000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
4B7000
|
heap
|
page read and write
|
||
20C2AC7C000
|
heap
|
page read and write
|
||
20C2D1C4000
|
heap
|
page read and write
|
||
2165F35A000
|
heap
|
page read and write
|
||
57E000
|
heap
|
page read and write
|
||
20C2EBFF000
|
heap
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
20C2ED7D000
|
heap
|
page read and write
|
||
5CB000
|
heap
|
page read and write
|
||
20C2EC84000
|
heap
|
page read and write
|
||
10004000
|
unkown
|
page readonly
|
||
20C2D193000
|
heap
|
page read and write
|
||
1AFF7850000
|
heap
|
page read and write
|
There are 791 hidden memdumps, click here to show them.