Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
ProcoreExtractsSetup.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows
|
initial sample
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\Procore ExtractsService.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\Procore ExtractsUninstaller.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\Procore ExtractsUpdater.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Bobcat.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Bobcat\Procore Technologies\Procore Extracts\{358817B7-2092-449A-B283-F61AA1499B65}\Installer.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Bobcat\Procore Technologies\Procore Extracts\{358817B7-2092-449A-B283-F61AA1499B65}\Service.exe
|
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Bobcat\Procore Technologies\Procore Extracts\{358817B7-2092-449A-B283-F61AA1499B65}\Uninstaller.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Bobcat\Procore Technologies\Procore Extracts\{358817B7-2092-449A-B283-F61AA1499B65}\Updater.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\CONFIG
|
JSON data
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\AWSSDK.Core.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\AWSSDK.Core.pdb
|
Microsoft Roslyn C# debugging symbols version 1.0
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\AWSSDK.S3.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\AWSSDK.S3.pdb
|
Microsoft Roslyn C# debugging symbols version 1.0
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Bugsnag.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\CommandLine.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Humanizer.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Images\empty_state_company_project.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\LaunchDarkly.ClientSdk.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\LaunchDarkly.CommonSdk.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\LaunchDarkly.EventSource.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\LaunchDarkly.InternalSdk.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\LaunchDarkly.Logging.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.Bcl.AsyncInterfaces.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.Bcl.TimeProvider.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.Data.Sqlite.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.DotNet.PlatformAbstractions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.EntityFrameworkCore.Abstractions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.EntityFrameworkCore.Design.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.EntityFrameworkCore.Relational.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.EntityFrameworkCore.Sqlite.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.EntityFrameworkCore.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.Expression.Interactions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.Extensions.Caching.Abstractions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.Extensions.Caching.Memory.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.Extensions.Configuration.Abstractions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.Extensions.Configuration.Binder.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.Extensions.Configuration.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.Extensions.DependencyInjection.Abstractions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.Extensions.DependencyInjection.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.Extensions.DependencyModel.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.Extensions.Logging.Abstractions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.Extensions.Logging.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.Extensions.Options.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.Extensions.Primitives.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.Web.WebView2.Core.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.Web.WebView2.WinForms.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Microsoft.Web.WebView2.Wpf.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Newtonsoft.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Nito.AsyncEx.Context.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Nito.AsyncEx.Coordination.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Nito.AsyncEx.Interop.WaitHandles.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Nito.AsyncEx.Oop.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Nito.AsyncEx.Tasks.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Nito.Cancellation.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Nito.Collections.Deque.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Nito.Disposables.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Nito.Mvvm.Async.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Nito.Mvvm.Core.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Polly.Core.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Polly.Core.pdb
|
Microsoft Roslyn C# debugging symbols version 1.0
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Polly.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Polly.pdb
|
Microsoft Roslyn C# debugging symbols version 1.0
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Procore.Api.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Procore.Api.pdb
|
Microsoft Roslyn C# debugging symbols version 1.0
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Procore.DB.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Procore.DB.dll.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Procore.DB.pdb
|
Microsoft Roslyn C# debugging symbols version 1.0
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Procore.Ditto.exe
|
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Procore.Ditto.exe.config
|
XML 1.0 document, ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Procore.Ditto.pdb
|
MSVC program database ver 7.00, 512*1427 bytes
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Remotion.Linq.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\SQLitePCLRaw.batteries_green.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\SQLitePCLRaw.batteries_v2.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\SQLitePCLRaw.core.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\SQLitePCLRaw.provider.e_sqlite3.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Serilog.Sinks.File.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Serilog.Sinks.File.pdb
|
Microsoft Roslyn C# debugging symbols version 1.0
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Serilog.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\SharpVectors.Converters.Wpf.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\SharpVectors.Core.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\SharpVectors.Css.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\SharpVectors.Dom.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\SharpVectors.Model.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\SharpVectors.Rendering.Gdi.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\SharpVectors.Rendering.Wpf.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\SharpVectors.Runtime.Wpf.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\SimpleInjector.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Buffers.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Collections.Immutable.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.ComponentModel.Annotations.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Data.Common.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Diagnostics.DiagnosticSource.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Diagnostics.StackTrace.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Diagnostics.Tracing.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Globalization.Extensions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.IO.Compression.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Interactive.Async.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Memory.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Net.Http.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Net.Sockets.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Numerics.Vectors.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Reactive.Linq.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Reactive.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Runtime.CompilerServices.Unsafe.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Runtime.Serialization.Primitives.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Security.Cryptography.Algorithms.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Security.SecureString.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Text.Encodings.Web.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Text.Json.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Threading.Overlapped.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Threading.Tasks.Extensions.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.ValueTuple.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Windows.Interactivity.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\System.Xml.XPath.XDocument.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\af\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\ar\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\az\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\bg\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\bn-BD\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\cs\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\da\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\de-DE\Procore.Ditto.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\de\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\el\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\en-AU\Procore.Ditto.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\en-CA\Procore.Ditto.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\en-GB\Procore.Ditto.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\en-US\Procore.Ditto.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\es-ES\Procore.Ditto.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\es-MX\Procore.Ditto.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\es\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\fa\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\fi-FI\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\fr-BE\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\fr-CA\Procore.Ditto.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\fr-FR\Procore.Ditto.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\fr\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\he\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\hr\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\hu\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\hy\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\icon.ico
|
MS Windows icon resource - 8 icons, -128x-128, 32 bits/pixel, 16x16, 32 bits/pixel
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\id\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\is-IS\Procore.Ditto.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\is\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\it-IT\Procore.Ditto.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\it\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\ja-JP\Procore.Ditto.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\ja\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\ko-KR\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\ko-KR\Procore.Ditto.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\ku\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\lv\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\ms-MY\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\mt\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\nb-NO\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\nb\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\nl\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\pl\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\pt-BR\Procore.Ditto.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\pt\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\release-notes.json
|
JSON data
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\ro\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\ru\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\runtimes\win-arm64\native\WebView2Loader.dll
|
PE32+ executable (DLL) (console) Aarch64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\runtimes\win-x64\native\WebView2Loader.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\runtimes\win-x86\native\WebView2Loader.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\sk\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\sl\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\sr-Latn\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\sr\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\sv\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\th-TH\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\th-TH\Procore.Ditto.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\tr\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\uk\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\uz-Cyrl-UZ\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\uz-Latn-UZ\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\vi\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\x64\e_sqlite3.dll
|
PE32+ executable (DLL) (console) x86-64, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\x86\e_sqlite3.dll
|
PE32 executable (DLL) (console) Intel 80386, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\zh-CN\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\zh-Hans\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\zh-Hant\Humanizer.resources.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\logs\bobcat.log.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\packages\Procore.Ditto.1.3.1.full.nupkg
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\edb.log
|
data
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
|
Extensible storage engine DataBase, version 0x620, checksum 0x7bf328c8, page size 16384, Windows version 10.0
|
dropped
|
||
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
|
COM executable for DOS
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\Procore.Ditto.exe.log
|
CSV text
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Procore ExtractsService.exe.log
|
CSV text
|
modified
|
||
C:\Users\user\AppData\Local\Procore Technologies\Procore Extracts\logs\ProcoreExtracts-20241008.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Bobcat\Procore Technologies\Procore Extracts\bobcat.log.txt
|
ASCII text, with CRLF line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Bobcat\Procore Technologies\Procore Extracts\{358817B7-2092-449A-B283-F61AA1499B65}\CONFIG
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Bobcat\Procore Technologies\Procore Extracts\{358817B7-2092-449A-B283-F61AA1499B65}\Procore.Ditto.1.3.1.full.nupkg
|
Zip archive data, at least v2.0 to extract, compression method=deflate
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Bobcat\Procore Technologies\Procore Extracts\{358817B7-2092-449A-B283-F61AA1499B65}\procore_ditto_installation.gif
|
GIF image data, version 89a, 500 x 500
|
dropped
|
||
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
|
JSON data
|
dropped
|
||
C:\Windows\Temp\bobcat\Procore Technologies\Procore Extracts\bobcat.log.txt
|
ASCII text, with CRLF line terminators
|
modified
|
||
\Device\ConDrv
|
ASCII text, with CRLF, LF line terminators
|
dropped
|
There are 191 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\AppData\Local\Temp\Bobcat\Procore Technologies\Procore Extracts\{358817B7-2092-449A-B283-F61AA1499B65}\Installer.exe
|
"C:\Users\user\AppData\Local\Temp\Bobcat\Procore Technologies\Procore Extracts\{358817B7-2092-449A-B283-F61AA1499B65}\Installer.exe"
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\Procore ExtractsService.exe
|
"C:\Program Files (x86)\Procore Technologies\Procore Extracts\Procore ExtractsService.exe" install
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\Procore ExtractsService.exe
|
"C:\Program Files (x86)\Procore Technologies\Procore Extracts\Procore ExtractsService.exe" start
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\Procore ExtractsService.exe
|
"C:\Program Files (x86)\Procore Technologies\Procore Extracts\Procore ExtractsService.exe" -displayname "Procore Extracts
Updater Service" -servicename "ProcoreExtractsUpdaterSvc"
|
||
C:\Users\user\Desktop\ProcoreExtractsSetup.exe
|
"C:\Users\user\Desktop\ProcoreExtractsSetup.exe"
|
||
C:\Windows\System32\svchost.exe
|
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Procore.Ditto.exe
|
"C:\Program Files (x86)\Procore Technologies\Procore Extracts\app-1.3.1\Procore.Ditto.exe" install
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
https://github.com/launchdarkly/dotnet-eventsource
|
unknown
|
||
https://simpleinjector.org/asmld
|
unknown
|
||
https://github.com/serilog/serilog-sinks-file
|
unknown
|
||
https://simpleinjector.org/diasc3
|
unknown
|
||
https://raw.githubusercontent.com/App-vNext/Polly/a2559b1ab7bf9c1e12c71183ce2dfa937bc9c7a6/
|
unknown
|
||
http://s3.amazonaws.com/doc/2006-03-01/
|
unknown
|
||
https://github.com/StephenCleary/AsyncEx
|
unknown
|
||
https://github.com/dotnet/core-setup/tree/caa7b7e2bad98e56a687fb5cbaf60825500800f7
|
unknown
|
||
https://github.com/aspnet/EntityFrameworkCore/tree/01da710cdeff0431fc60379580aa63f335fbc165
|
unknown
|
||
http://169.254.170.2aUnable
|
unknown
|
||
https://github.com/App-vNext/Polly0
|
unknown
|
||
http://www.ietf.org/rfc/rfc2045.txt
|
unknown
|
||
https://github.com/bugsnag/bugsnag-net
|
unknown
|
||
http://sqlite.org/rescode.html
|
unknown
|
||
https://github.com/dotnet/reactive0
|
unknown
|
||
https://procore-ditto.s3.amazonaws.com/RELEASES
|
unknown
|
||
https://clientstream.launchdarkly.comEhttps://clientsdk.launchdarkly.com?https://mobile.launchdarkly
|
unknown
|
||
https://raw.githubusercontent.com/aws/aws-sdk-net/4166a61afde54a8bbe723fbb936afa39716f97a0/
|
unknown
|
||
https://s3.dualstack.
|
unknown
|
||
http://sharpvectors.codeplex.com/svgc/
|
unknown
|
||
http://sharpvectors.codeplex.com/runtime/
|
unknown
|
||
https://github.com/launchdarkly/dotnet-sdk-internal
|
unknown
|
||
https://ip-ranges.amazonaws.com/ip-ranges.json
|
unknown
|
||
https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html#access_policies-json
|
unknown
|
||
https://github.com/serilog/serilog-sinks-fileC
|
unknown
|
||
http://docs.aws.amazon.com/sdk-for-net/v3/developer-guide/net-dg-config-creds.html
|
unknown
|
||
https://raw.githubusercontent.com/procore/Procore.NET/3394502880c4bcecca16039ac5fa16a9992342c7/
|
unknown
|
||
https://s3-fips.dualstack.
|
unknown
|
||
https://github.com/dotnet/corefx/tree/7601f4f6225089ffb291dc7d58293c7bbf5c5d4f
|
unknown
|
||
https://github.com/dotnet/reactivey
|
unknown
|
||
https://github.com/launchdarkly/dotnet-sdk-common
|
unknown
|
||
https://github.com/StephenCleary/Deque2
|
unknown
|
||
http://www.rfc-editor.org/rfc/bcp/bcp47.txt
|
unknown
|
||
https://simpleinjector.org/depr3.%
|
unknown
|
||
https://simpleinjector.org/depr3.-
|
unknown
|
||
https://www.newtonsoft.com/jsonschema
|
unknown
|
||
https://simpleinjector.org/ovrrd.;Container.Collection.Register#Container.Options9AllowOverridingReg
|
unknown
|
||
http://www.xmlspy.com)
|
unknown
|
||
https://raw.githubusercontent.com/procore/ditto/d46178350f469016b7d8342b9e0a0683eeca7004/
|
unknown
|
||
https://ecrion-test.procoretech.com/pdf/create
|
unknown
|
||
https://github.com/dotnet/core-setup/tree/caa7b7e2bad98e56a687fb5cbaf60825500800f78
|
unknown
|
||
http://html4/loose.dtd
|
unknown
|
||
https://simpleinjector.org/diagnostics
|
unknown
|
||
https://github.com/aspnet/Extensions/tree/9bc79b2f25a3724376d7af19617c33749a30ea3a
|
unknown
|
||
https://www.procore.com/legal/terms-of-service
|
unknown
|
||
https://github.com/aspnet/EntityFrameworkCore
|
unknown
|
||
https://github.com/dotnet/corefx/tree/7601f4f6225089ffb291dc7d58293c7bbf5c5d4f8
|
unknown
|
||
https://s3-fips.dualstack.us-east-1.
|
unknown
|
||
https://github.com/dotnet/runtime8
|
unknown
|
||
https://simpleinjector.org/diasc
|
unknown
|
||
http://169.254.170.2
|
unknown
|
||
http://ocsp.sectigo.com0
|
unknown
|
||
https://github.com/Humanizr/Humanizer
|
unknown
|
||
https://simpleinjector.org/coll1.
|
unknown
|
||
https://www.nuget.org/packages/Amazon.Extensions.S3.Encryption
|
unknown
|
||
https://ecrion.procoretech.com/pdf/create
|
unknown
|
||
https://simpleinjector.org/ovrrd.
|
unknown
|
||
https://github.com/Humanizr/Humanizer2
|
unknown
|
||
https://www.newtonsoft.com/json
|
unknown
|
||
https://github.com/launchdarkly/dotnet-sdk-internalR
|
unknown
|
||
http://.css
|
unknown
|
||
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf
|
unknown
|
||
https://simpleinjector.org/diasr
|
unknown
|
||
https://www.procore.com/legal/privacy
|
unknown
|
||
https://github.com/dotnet/runtime
|
unknown
|
||
https://sketchapp.com
|
unknown
|
||
https://simpleinjector.org/diaut8
|
unknown
|
||
https://aka.ms/dotnet-warnings/
|
unknown
|
||
https://simpleinjector.org/diaal
|
unknown
|
||
https://aka.ms/binaryformatter
|
unknown
|
||
https://github.com/StephenCleary/Deque
|
unknown
|
||
https://github.com/App-vNext/Polly
|
unknown
|
||
https://github.com/dotnet/runtimeH
|
unknown
|
||
https://www.launchdarkly.com/0
|
unknown
|
||
https://notify.bugsnag.com9https://sessions.bugsnag.com
|
unknown
|
||
http://.jpg
|
unknown
|
||
https://github.com/serilog/serilog/pull/819.
|
unknown
|
||
https://github.com/StephenCleary/AsyncEx5
|
unknown
|
||
https://github.com/dotnet/reactive
|
unknown
|
||
https://github.com/JamesNK/Newtonsoft.Json
|
unknown
|
||
https://s3-fips.us-east-1.
|
unknown
|
||
http://www.ietf.org/rfc/rfc3066.txt
|
unknown
|
||
https://s3.dualstack.us-east-1.
|
unknown
|
||
https://sectigo.com/CPS0
|
unknown
|
||
http://www.iana.org/assignments/language-subtag-registry
|
unknown
|
||
https://simpleinjector.org/diadt
|
unknown
|
||
https://github.com/aspnet/EntityFrameworkCore.
|
unknown
|
||
https://github.com/StephenCleary/Mvvm
|
unknown
|
||
https://docs.aws.amazon.com/general/latest/gr/aws_sdk_cryptography.html
|
unknown
|
||
https://github.com/mono/linker/issues/1416.
|
unknown
|
||
https://simpleinjector.org/depr3.
|
unknown
|
||
https://github.com/StephenCleary/AsyncExG
|
unknown
|
||
https://github.com/StephenCleary/Disposables
|
unknown
|
||
https://simpleinjector.org/diadt:
|
unknown
|
||
https://simpleinjector.org/locked
|
unknown
|
||
https://simpleinjector.org/one-constructor
|
unknown
|
||
https://sessions.bugsnag.com/
|
35.190.88.7
|
||
https://github.com/dotnet/corefx/tree/30ab651fcb4354552bd4891619a0bdd81e0ebdbf8
|
unknown
|
||
https://simpleinjector.org/collections
|
unknown
|
||
https://simpleinjector.org/diaut
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
sessions.bugsnag.com
|
35.190.88.7
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
35.190.88.7
|
sessions.bugsnag.com
|
United States
|
||
127.0.0.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Installer_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Installer_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Installer_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Installer_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Installer_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Installer_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Installer_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Installer_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Installer_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Installer_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Installer_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Installer_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Installer_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Installer_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Procore Technologies.Procore Extracts
|
DisplayName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Procore Technologies.Procore Extracts
|
InstallDate
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Procore Technologies.Procore Extracts
|
InstallLocation
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Procore Technologies.Procore Extracts
|
Publisher
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Procore Technologies.Procore Extracts
|
UninstallString
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Procore Technologies.Procore Extracts
|
DisplayIcon
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Procore Technologies.Procore Extracts
|
DisplayVersion
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Procore Technologies.Procore Extracts
|
NoModify
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Procore Technologies.Procore Extracts
|
NoRepair
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Procore Technologies.Procore Extracts
|
Language
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
|
PerfMMFileName
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Procore ExtractsService_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Procore ExtractsService_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Procore ExtractsService_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Procore ExtractsService_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Procore ExtractsService_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Procore ExtractsService_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Procore ExtractsService_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Procore ExtractsService_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Procore ExtractsService_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Procore ExtractsService_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Procore ExtractsService_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Procore ExtractsService_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Procore ExtractsService_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\Procore ExtractsService_RASMANCS
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\ProcoreExtractsUpdaterSvc
|
ImagePath
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application
|
AutoBackupLogFiles
|
||
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\Application\ProcoreExtractsUpdaterSvc
|
EventMessageFile
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Procore_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Procore_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Procore_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Procore_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Procore_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Procore_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Procore_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Procore_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Procore_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Procore_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Procore_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Procore_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Procore_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\Procore_RASMANCS
|
FileDirectory
|
There are 47 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
84A0000
|
trusted library allocation
|
page read and write
|
||
1530000
|
trusted library allocation
|
page execute and read and write
|
||
E0F000
|
heap
|
page read and write
|
||
22CEA8A7000
|
heap
|
page read and write
|
||
DD0000
|
trusted library allocation
|
page read and write
|
||
1767000
|
trusted library allocation
|
page execute and read and write
|
||
29E4000
|
trusted library allocation
|
page read and write
|
||
FE5A000
|
trusted library allocation
|
page readonly
|
||
7FFD9B57C000
|
trusted library allocation
|
page execute and read and write
|
||
124E7000
|
trusted library allocation
|
page read and write
|
||
5E60000
|
trusted library allocation
|
page read and write
|
||
2DF0000
|
heap
|
page execute and read and write
|
||
22CEFEC5000
|
heap
|
page read and write
|
||
AAC000
|
trusted library allocation
|
page read and write
|
||
F80000
|
heap
|
page read and write
|
||
1D05C2B0000
|
heap
|
page read and write
|
||
125DC000
|
trusted library allocation
|
page read and write
|
||
22CF00B0000
|
remote allocation
|
page read and write
|
||
1D05DCE0000
|
unkown
|
page readonly
|
||
106AC000
|
trusted library allocation
|
page readonly
|
||
24A8000
|
trusted library allocation
|
page read and write
|
||
1D05DCE6000
|
unkown
|
page readonly
|
||
22B99000
|
trusted library allocation
|
page read and write
|
||
1BD31000
|
trusted library allocation
|
page read and write
|
||
62FE000
|
stack
|
page read and write
|
||
8E0D4FE000
|
stack
|
page read and write
|
||
2988000
|
trusted library allocation
|
page read and write
|
||
7FFD9B76B000
|
trusted library allocation
|
page read and write
|
||
EA19000
|
heap
|
page read and write
|
||
64E0000
|
trusted library allocation
|
page execute and read and write
|
||
510000
|
unkown
|
page readonly
|
||
C10000
|
trusted library allocation
|
page execute and read and write
|
||
22657000
|
trusted library allocation
|
page read and write
|
||
1720000
|
heap
|
page read and write
|
||
E8AA000
|
heap
|
page read and write
|
||
8608000
|
heap
|
page read and write
|
||
7FFD9B7D0000
|
trusted library allocation
|
page read and write
|
||
18F0000
|
heap
|
page read and write
|
||
556000
|
unkown
|
page readonly
|
||
53F0000
|
trusted library allocation
|
page read and write
|
||
EAAB000
|
heap
|
page read and write
|
||
6090000
|
trusted library allocation
|
page read and write
|
||
8E0DEFE000
|
stack
|
page read and write
|
||
85B1000
|
heap
|
page read and write
|
||
1D05C505000
|
heap
|
page read and write
|
||
1D076743000
|
heap
|
page read and write
|
||
954000
|
trusted library allocation
|
page read and write
|
||
2253D000
|
trusted library allocation
|
page read and write
|
||
609E000
|
stack
|
page read and write
|
||
1137000
|
trusted library allocation
|
page read and write
|
||
2526000
|
trusted library allocation
|
page read and write
|
||
2D19000
|
trusted library allocation
|
page read and write
|
||
164D000
|
trusted library allocation
|
page execute and read and write
|
||
3061000
|
trusted library allocation
|
page read and write
|
||
22CEFD20000
|
trusted library allocation
|
page read and write
|
||
D8D9000
|
trusted library allocation
|
page read and write
|
||
58DF000
|
stack
|
page read and write
|
||
13B7000
|
heap
|
page read and write
|
||
5C9E000
|
stack
|
page read and write
|
||
8E0DAFF000
|
stack
|
page read and write
|
||
22CF1000000
|
heap
|
page read and write
|
||
2C1E000
|
trusted library allocation
|
page read and write
|
||
1D076665000
|
heap
|
page read and write
|
||
6750000
|
trusted library allocation
|
page read and write
|
||
11A8000
|
heap
|
page read and write
|
||
5E1D000
|
stack
|
page read and write
|
||
30C4000
|
trusted library allocation
|
page read and write
|
||
22CF0000000
|
trusted library allocation
|
page read and write
|
||
69AF000
|
stack
|
page read and write
|
||
EA57000
|
heap
|
page read and write
|
||
1A20000
|
heap
|
page read and write
|
||
5F7E000
|
stack
|
page read and write
|
||
1D076B90000
|
unkown
|
page readonly
|
||
5AE0000
|
heap
|
page read and write
|
||
F15000
|
trusted library allocation
|
page execute and read and write
|
||
1D05DCB2000
|
unkown
|
page readonly
|
||
1C16C000
|
trusted library allocation
|
page read and write
|
||
7FF4327D0000
|
trusted library allocation
|
page execute and read and write
|
||
DB55000
|
trusted library allocation
|
page read and write
|
||
4EE0000
|
trusted library allocation
|
page read and write
|
||
260E000
|
stack
|
page read and write
|
||
1769000
|
stack
|
page read and write
|
||
55A0000
|
trusted library allocation
|
page read and write
|
||
BB75000
|
trusted library allocation
|
page readonly
|
||
599D000
|
heap
|
page read and write
|
||
1D07667B000
|
heap
|
page read and write
|
||
EAFF000
|
heap
|
page read and write
|
||
62E0000
|
trusted library allocation
|
page execute and read and write
|
||
F10000
|
trusted library allocation
|
page read and write
|
||
1D05C3D5000
|
heap
|
page read and write
|
||
1780000
|
trusted library allocation
|
page read and write
|
||
5E70000
|
trusted library allocation
|
page read and write
|
||
124AA000
|
trusted library allocation
|
page read and write
|
||
8E0CB8E000
|
stack
|
page read and write
|
||
5400000
|
trusted library allocation
|
page read and write
|
||
1D05DFB2000
|
trusted library allocation
|
page read and write
|
||
1278E000
|
trusted library allocation
|
page read and write
|
||
BD1B000
|
trusted library allocation
|
page readonly
|
||
4F40000
|
heap
|
page execute and read and write
|
||
192C000
|
heap
|
page read and write
|
||
EAB1000
|
heap
|
page read and write
|
||
9F8000
|
stack
|
page read and write
|
||
99A9000
|
heap
|
page read and write
|
||
11AB1000
|
heap
|
page read and write
|
||
22CF0040000
|
trusted library allocation
|
page read and write
|
||
549D000
|
stack
|
page read and write
|
||
E17000
|
heap
|
page read and write
|
||
22CF006F000
|
trusted library allocation
|
page read and write
|
||
11C9000
|
heap
|
page read and write
|
||
1750000
|
trusted library allocation
|
page read and write
|
||
E92D000
|
heap
|
page read and write
|
||
5FD0000
|
trusted library allocation
|
page read and write
|
||
4A20000
|
trusted library allocation
|
page execute and read and write
|
||
11A6A000
|
heap
|
page read and write
|
||
8E0D5FF000
|
stack
|
page read and write
|
||
47F0000
|
trusted library allocation
|
page execute and read and write
|
||
191F000
|
heap
|
page read and write
|
||
22CEA82B000
|
heap
|
page read and write
|
||
F2AA000
|
trusted library allocation
|
page read and write
|
||
8537000
|
heap
|
page read and write
|
||
AB2000
|
trusted library allocation
|
page read and write
|
||
9BEE000
|
trusted library allocation
|
page readonly
|
||
59B7000
|
heap
|
page read and write
|
||
7FFD9B6F0000
|
trusted library allocation
|
page read and write
|
||
2E47000
|
trusted library allocation
|
page read and write
|
||
1650000
|
heap
|
page read and write
|
||
60A0000
|
trusted library allocation
|
page read and write
|
||
129CE000
|
trusted library allocation
|
page read and write
|
||
1047E000
|
trusted library allocation
|
page readonly
|
||
1762000
|
trusted library allocation
|
page read and write
|
||
12539000
|
trusted library allocation
|
page read and write
|
||
22CEA8BA000
|
heap
|
page read and write
|
||
12657000
|
trusted library allocation
|
page read and write
|
||
1258A000
|
trusted library allocation
|
page read and write
|
||
5BDE000
|
stack
|
page read and write
|
||
1249000
|
heap
|
page read and write
|
||
22CEA89F000
|
heap
|
page read and write
|
||
5E7E000
|
stack
|
page read and write
|
||
989C000
|
trusted library allocation
|
page readonly
|
||
5B9F000
|
stack
|
page read and write
|
||
C67000
|
heap
|
page read and write
|
||
93E000
|
stack
|
page read and write
|
||
139F000
|
stack
|
page read and write
|
||
119CE000
|
trusted library allocation
|
page readonly
|
||
5B60000
|
trusted library allocation
|
page execute and read and write
|
||
99D8000
|
heap
|
page read and write
|
||
11D0000
|
heap
|
page read and write
|
||
2EDD000
|
stack
|
page read and write
|
||
2B63000
|
trusted library allocation
|
page read and write
|
||
9CD1000
|
heap
|
page read and write
|
||
D1AF000
|
trusted library allocation
|
page readonly
|
||
65F5000
|
heap
|
page read and write
|
||
EAF9000
|
heap
|
page read and write
|
||
2A94000
|
trusted library allocation
|
page read and write
|
||
D40000
|
trusted library allocation
|
page read and write
|
||
22CEA8AE000
|
heap
|
page read and write
|
||
120D000
|
heap
|
page read and write
|
||
17D7000
|
heap
|
page read and write
|
||
1D05C296000
|
heap
|
page read and write
|
||
6690000
|
heap
|
page read and write
|
||
22CEA844000
|
heap
|
page read and write
|
||
5A9E000
|
stack
|
page read and write
|
||
582E000
|
stack
|
page read and write
|
||
101E7000
|
trusted library allocation
|
page readonly
|
||
66A5000
|
heap
|
page read and write
|
||
F903000
|
trusted library allocation
|
page read and write
|
||
C60A000
|
trusted library allocation
|
page readonly
|
||
9998000
|
heap
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
125B3000
|
trusted library allocation
|
page read and write
|
||
22CF00FF000
|
trusted library allocation
|
page read and write
|
||
48D0000
|
heap
|
page read and write
|
||
6040000
|
trusted library allocation
|
page read and write
|
||
672E000
|
trusted library allocation
|
page read and write
|
||
1D05DE80000
|
trusted library allocation
|
page read and write
|
||
E7DB000
|
trusted library allocation
|
page readonly
|
||
68EC000
|
stack
|
page read and write
|
||
BA7000
|
trusted library allocation
|
page execute and read and write
|
||
2E70000
|
trusted library allocation
|
page read and write
|
||
1274B000
|
trusted library allocation
|
page read and write
|
||
1550000
|
trusted library allocation
|
page read and write
|
||
4008000
|
trusted library allocation
|
page read and write
|
||
85CC000
|
heap
|
page read and write
|
||
1633000
|
trusted library allocation
|
page execute and read and write
|
||
1D05DED5000
|
trusted library allocation
|
page read and write
|
||
540000
|
unkown
|
page readonly
|
||
29DE000
|
trusted library allocation
|
page read and write
|
||
3E16000
|
trusted library allocation
|
page read and write
|
||
1D05C472000
|
unkown
|
page readonly
|
||
1D076580000
|
heap
|
page read and write
|
||
6A30000
|
trusted library allocation
|
page read and write
|
||
26A0000
|
heap
|
page read and write
|
||
61EE000
|
stack
|
page read and write
|
||
1547000
|
trusted library allocation
|
page read and write
|
||
22CEA813000
|
heap
|
page read and write
|
||
1931000
|
heap
|
page read and write
|
||
53EE000
|
stack
|
page read and write
|
||
10CE000
|
stack
|
page read and write
|
||
6560000
|
trusted library allocation
|
page execute and read and write
|
||
22A48000
|
trusted library allocation
|
page read and write
|
||
5F30000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B770000
|
trusted library allocation
|
page read and write
|
||
126B1000
|
trusted library allocation
|
page read and write
|
||
54B000
|
stack
|
page read and write
|
||
1133000
|
trusted library allocation
|
page read and write
|
||
1D05C270000
|
heap
|
page read and write
|
||
8E0E13F000
|
stack
|
page read and write
|
||
30D1000
|
trusted library allocation
|
page read and write
|
||
2660000
|
trusted library allocation
|
page read and write
|
||
22CEFD10000
|
trusted library allocation
|
page read and write
|
||
22CEFCF0000
|
trusted library allocation
|
page read and write
|
||
520E000
|
stack
|
page read and write
|
||
1EB4000
|
trusted library allocation
|
page read and write
|
||
99AF000
|
heap
|
page read and write
|
||
8F51000
|
trusted library allocation
|
page read and write
|
||
6BA0000
|
trusted library section
|
page readonly
|
||
126DB000
|
trusted library allocation
|
page read and write
|
||
55C0000
|
heap
|
page execute and read and write
|
||
126D4000
|
trusted library allocation
|
page read and write
|
||
868A000
|
heap
|
page read and write
|
||
E1669FE000
|
stack
|
page read and write
|
||
2B7D000
|
trusted library allocation
|
page read and write
|
||
14C0000
|
trusted library allocation
|
page read and write
|
||
5EA0000
|
trusted library allocation
|
page read and write
|
||
62C8000
|
stack
|
page read and write
|
||
8E0E03F000
|
stack
|
page read and write
|
||
4EFC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4E4000
|
trusted library allocation
|
page read and write
|
||
12705000
|
trusted library allocation
|
page read and write
|
||
55EB000
|
stack
|
page read and write
|
||
601F000
|
stack
|
page read and write
|
||
1D05C303000
|
heap
|
page read and write
|
||
1D0765A3000
|
heap
|
page read and write
|
||
1D05C410000
|
trusted library allocation
|
page read and write
|
||
C57E000
|
trusted library allocation
|
page readonly
|
||
6756000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4DB000
|
trusted library allocation
|
page read and write
|
||
84C0000
|
trusted library allocation
|
page read and write
|
||
953000
|
trusted library allocation
|
page execute and read and write
|
||
22CEA902000
|
heap
|
page read and write
|
||
EB8000
|
heap
|
page read and write
|
||
605E000
|
stack
|
page read and write
|
||
4E6B000
|
stack
|
page read and write
|
||
670E000
|
stack
|
page read and write
|
||
22CF004D000
|
trusted library allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
1540000
|
trusted library allocation
|
page read and write
|
||
12576000
|
trusted library allocation
|
page read and write
|
||
D281000
|
trusted library allocation
|
page read and write
|
||
116D000
|
stack
|
page read and write
|
||
22CF0060000
|
trusted library allocation
|
page read and write
|
||
2359E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B720000
|
trusted library allocation
|
page read and write
|
||
A3D000
|
heap
|
page read and write
|
||
4A00000
|
trusted library allocation
|
page read and write
|
||
1D05C492000
|
unkown
|
page readonly
|
||
7FFD9B7B0000
|
trusted library allocation
|
page read and write
|
||
129BA000
|
trusted library allocation
|
page read and write
|
||
22CEFD50000
|
trusted library allocation
|
page read and write
|
||
84F0000
|
trusted library allocation
|
page read and write
|
||
E1670FE000
|
unkown
|
page readonly
|
||
CA7E000
|
trusted library allocation
|
page readonly
|
||
557E000
|
stack
|
page read and write
|
||
4BA000
|
unkown
|
page readonly
|
||
7FFD9B570000
|
trusted library allocation
|
page read and write
|
||
22CEA730000
|
heap
|
page read and write
|
||
6550000
|
trusted library allocation
|
page read and write
|
||
120F000
|
heap
|
page read and write
|
||
4F6E000
|
stack
|
page read and write
|
||
2D4E000
|
stack
|
page read and write
|
||
EB51000
|
heap
|
page read and write
|
||
14D0000
|
trusted library allocation
|
page read and write
|
||
17D0000
|
heap
|
page read and write
|
||
4BAD000
|
stack
|
page read and write
|
||
11AF3000
|
heap
|
page read and write
|
||
1D05C2FD000
|
heap
|
page read and write
|
||
11B2E000
|
heap
|
page read and write
|
||
1D05DFA4000
|
trusted library allocation
|
page read and write
|
||
9725000
|
trusted library allocation
|
page read and write
|
||
51CD000
|
stack
|
page read and write
|
||
9A2000
|
heap
|
page read and write
|
||
7FFD9B780000
|
trusted library allocation
|
page read and write
|
||
4D60000
|
heap
|
page read and write
|
||
1D05DFCE000
|
trusted library allocation
|
page read and write
|
||
1D05DF92000
|
trusted library allocation
|
page read and write
|
||
64CF000
|
stack
|
page read and write
|
||
4E2E000
|
stack
|
page read and write
|
||
2A2000
|
unkown
|
page readonly
|
||
22CEFE47000
|
heap
|
page read and write
|
||
1BFE4000
|
trusted library allocation
|
page read and write
|
||
644C000
|
stack
|
page read and write
|
||
7FFD9B66D000
|
trusted library allocation
|
page read and write
|
||
14D4000
|
trusted library allocation
|
page read and write
|
||
1D05DFA8000
|
trusted library allocation
|
page read and write
|
||
22CEA760000
|
heap
|
page read and write
|
||
DB50000
|
trusted library allocation
|
page read and write
|
||
64D0000
|
trusted library allocation
|
page read and write
|
||
1EB0000
|
trusted library allocation
|
page read and write
|
||
E958000
|
heap
|
page read and write
|
||
5FB0000
|
trusted library allocation
|
page read and write
|
||
125C7000
|
trusted library allocation
|
page read and write
|
||
681C000
|
trusted library allocation
|
page read and write
|
||
4860000
|
trusted library allocation
|
page read and write
|
||
99A4000
|
heap
|
page read and write
|
||
11AF5000
|
heap
|
page read and write
|
||
7FFD9B5A6000
|
trusted library allocation
|
page execute and read and write
|
||
5B50000
|
trusted library allocation
|
page read and write
|
||
5C1E000
|
stack
|
page read and write
|
||
1180000
|
heap
|
page read and write
|
||
E166AFE000
|
unkown
|
page readonly
|
||
22CF00B0000
|
remote allocation
|
page read and write
|
||
191F000
|
heap
|
page read and write
|
||
1520000
|
trusted library allocation
|
page read and write
|
||
128A5000
|
trusted library allocation
|
page read and write
|
||
5E3E000
|
stack
|
page read and write
|
||
1D05DD70000
|
heap
|
page read and write
|
||
1D06DDCA000
|
trusted library allocation
|
page read and write
|
||
6731000
|
trusted library allocation
|
page read and write
|
||
612000
|
unkown
|
page readonly
|
||
1756000
|
trusted library allocation
|
page execute and read and write
|
||
618C000
|
stack
|
page read and write
|
||
D231000
|
trusted library allocation
|
page read and write
|
||
85E1000
|
heap
|
page read and write
|
||
7FFD9B71E000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4C3000
|
trusted library allocation
|
page execute and read and write
|
||
E167DFE000
|
unkown
|
page readonly
|
||
EEE000
|
heap
|
page read and write
|
||
7FFD9B4CD000
|
trusted library allocation
|
page execute and read and write
|
||
E167AFB000
|
stack
|
page read and write
|
||
E167FFE000
|
unkown
|
page readonly
|
||
8490000
|
trusted library allocation
|
page read and write
|
||
1502000
|
trusted library allocation
|
page read and write
|
||
7FFD9B51C000
|
trusted library allocation
|
page execute and read and write
|
||
85DB000
|
heap
|
page read and write
|
||
1D0765D3000
|
heap
|
page read and write
|
||
6775000
|
trusted library allocation
|
page read and write
|
||
7FFD9B690000
|
trusted library allocation
|
page read and write
|
||
1D05DE84000
|
trusted library allocation
|
page read and write
|
||
BC0000
|
trusted library allocation
|
page read and write
|
||
E166EFE000
|
unkown
|
page readonly
|
||
99E3000
|
heap
|
page read and write
|
||
7FFD9B739000
|
trusted library allocation
|
page read and write
|
||
22EB0000
|
trusted library allocation
|
page read and write
|
||
1D0765BF000
|
heap
|
page read and write
|
||
22CEA88D000
|
heap
|
page read and write
|
||
8470000
|
trusted library allocation
|
page read and write
|
||
E167EFB000
|
stack
|
page read and write
|
||
652E000
|
stack
|
page read and write
|
||
C8A1000
|
trusted library allocation
|
page readonly
|
||
22CF006C000
|
trusted library allocation
|
page read and write
|
||
2AA0000
|
heap
|
page execute and read and write
|
||
6A50000
|
trusted library allocation
|
page read and write
|
||
1D05DDA0000
|
heap
|
page execute and read and write
|
||
85EC000
|
heap
|
page read and write
|
||
22CF0072000
|
trusted library allocation
|
page read and write
|
||
6030000
|
heap
|
page read and write
|
||
8E0E53D000
|
stack
|
page read and write
|
||
22CEFE59000
|
heap
|
page read and write
|
||
7FFD9B712000
|
trusted library allocation
|
page read and write
|
||
6B5E000
|
stack
|
page read and write
|
||
605E000
|
stack
|
page read and write
|
||
D30E000
|
trusted library allocation
|
page read and write
|
||
5950000
|
trusted library allocation
|
page read and write
|
||
1620000
|
trusted library allocation
|
page read and write
|
||
1D05C452000
|
unkown
|
page readonly
|
||
5A9E000
|
stack
|
page read and write
|
||
1C2FD000
|
trusted library allocation
|
page read and write
|
||
619F000
|
stack
|
page read and write
|
||
22F09000
|
trusted library allocation
|
page read and write
|
||
7FFD9B680000
|
trusted library allocation
|
page read and write
|
||
20BD000
|
trusted library allocation
|
page read and write
|
||
8AB6000
|
trusted library allocation
|
page read and write
|
||
6724000
|
trusted library allocation
|
page read and write
|
||
8B56000
|
trusted library allocation
|
page read and write
|
||
EADE000
|
heap
|
page read and write
|
||
67CE000
|
stack
|
page read and write
|
||
693E000
|
stack
|
page read and write
|
||
55BE000
|
stack
|
page read and write
|
||
5B30000
|
trusted library allocation
|
page execute and read and write
|
||
3E2E000
|
trusted library allocation
|
page read and write
|
||
99B7000
|
heap
|
page read and write
|
||
5C0000
|
heap
|
page read and write
|
||
14FA000
|
trusted library allocation
|
page execute and read and write
|
||
B92B000
|
trusted library allocation
|
page readonly
|
||
8E0DBFE000
|
stack
|
page read and write
|
||
EFD000
|
trusted library allocation
|
page execute and read and write
|
||
629D000
|
stack
|
page read and write
|
||
1634000
|
trusted library allocation
|
page read and write
|
||
D43000
|
trusted library allocation
|
page read and write
|
||
559C000
|
stack
|
page read and write
|
||
6770000
|
trusted library allocation
|
page read and write
|
||
9210000
|
trusted library allocation
|
page read and write
|
||
224F6000
|
trusted library allocation
|
page read and write
|
||
DED000
|
trusted library allocation
|
page execute and read and write
|
||
96E000
|
heap
|
page read and write
|
||
B60A000
|
trusted library allocation
|
page readonly
|
||
1D05C4B0000
|
heap
|
page execute and read and write
|
||
EC04000
|
heap
|
page read and write
|
||
465B000
|
stack
|
page read and write
|
||
508D000
|
stack
|
page read and write
|
||
6C3E000
|
stack
|
page read and write
|
||
191F000
|
heap
|
page read and write
|
||
3144000
|
trusted library allocation
|
page read and write
|
||
22CEFE54000
|
heap
|
page read and write
|
||
65C0000
|
heap
|
page read and write
|
||
22CEAFA1000
|
trusted library allocation
|
page read and write
|
||
CD43000
|
trusted library allocation
|
page readonly
|
||
115BE000
|
trusted library allocation
|
page readonly
|
||
22CF00E8000
|
trusted library allocation
|
page read and write
|
||
C30000
|
trusted library allocation
|
page read and write
|
||
F2D6000
|
trusted library allocation
|
page read and write
|
||
1217000
|
heap
|
page read and write
|
||
F12000
|
trusted library allocation
|
page read and write
|
||
22CEFD10000
|
trusted library allocation
|
page read and write
|
||
1140000
|
heap
|
page read and write
|
||
3160000
|
trusted library allocation
|
page read and write
|
||
11A0000
|
heap
|
page read and write
|
||
1D076980000
|
heap
|
page read and write
|
||
7FFD9B682000
|
trusted library allocation
|
page read and write
|
||
308A000
|
trusted library allocation
|
page read and write
|
||
12953000
|
trusted library allocation
|
page read and write
|
||
22CEFD21000
|
trusted library allocation
|
page read and write
|
||
5F00000
|
trusted library allocation
|
page execute and read and write
|
||
22CF02E0000
|
trusted library allocation
|
page read and write
|
||
16DB000
|
heap
|
page read and write
|
||
176B000
|
trusted library allocation
|
page execute and read and write
|
||
1630000
|
trusted library allocation
|
page read and write
|
||
BC3D000
|
trusted library allocation
|
page readonly
|
||
1185000
|
heap
|
page read and write
|
||
F00000
|
trusted library allocation
|
page read and write
|
||
22CF00F1000
|
trusted library allocation
|
page read and write
|
||
D043000
|
trusted library allocation
|
page readonly
|
||
22CEA929000
|
heap
|
page read and write
|
||
D2E6000
|
trusted library allocation
|
page read and write
|
||
8673000
|
heap
|
page read and write
|
||
3450000
|
heap
|
page read and write
|
||
24E8000
|
trusted library allocation
|
page read and write
|
||
940000
|
trusted library allocation
|
page read and write
|
||
129A5000
|
trusted library allocation
|
page read and write
|
||
22E16000
|
trusted library allocation
|
page read and write
|
||
5BCF000
|
heap
|
page read and write
|
||
24DB000
|
trusted library allocation
|
page read and write
|
||
1658000
|
heap
|
page read and write
|
||
2B76000
|
trusted library allocation
|
page read and write
|
||
8E0CFFE000
|
stack
|
page read and write
|
||
22CEA88F000
|
heap
|
page read and write
|
||
5B7D000
|
heap
|
page read and write
|
||
D68000
|
trusted library allocation
|
page read and write
|
||
1D05C170000
|
heap
|
page read and write
|
||
22CEA894000
|
heap
|
page read and write
|
||
C53000
|
trusted library allocation
|
page read and write
|
||
4001000
|
trusted library allocation
|
page read and write
|
||
292F000
|
trusted library allocation
|
page read and write
|
||
1FDE000
|
stack
|
page read and write
|
||
3001000
|
trusted library allocation
|
page read and write
|
||
59FC000
|
stack
|
page read and write
|
||
1D0766F8000
|
unkown
|
page readonly
|
||
53EE000
|
stack
|
page read and write
|
||
555E000
|
stack
|
page read and write
|
||
7FFD9B4C2000
|
trusted library allocation
|
page read and write
|
||
5AEE000
|
heap
|
page read and write
|
||
22CEB104000
|
heap
|
page read and write
|
||
7FFD9B725000
|
trusted library allocation
|
page read and write
|
||
545F000
|
stack
|
page read and write
|
||
49F0000
|
trusted library allocation
|
page read and write
|
||
1C368000
|
trusted library allocation
|
page read and write
|
||
192C000
|
heap
|
page read and write
|
||
5FAC000
|
trusted library allocation
|
page read and write
|
||
7FFD9B667000
|
trusted library allocation
|
page read and write
|
||
1D07660C000
|
heap
|
page read and write
|
||
4EDB000
|
trusted library allocation
|
page read and write
|
||
536B000
|
stack
|
page read and write
|
||
AC0000
|
heap
|
page read and write
|
||
30A2000
|
trusted library allocation
|
page read and write
|
||
AB6000
|
trusted library allocation
|
page execute and read and write
|
||
9980000
|
heap
|
page read and write
|
||
105D5000
|
trusted library allocation
|
page readonly
|
||
22CEB015000
|
heap
|
page read and write
|
||
14DD000
|
trusted library allocation
|
page execute and read and write
|
||
3069000
|
trusted library allocation
|
page read and write
|
||
C60000
|
heap
|
page read and write
|
||
1D076604000
|
heap
|
page read and write
|
||
281C000
|
trusted library allocation
|
page read and write
|
||
FDE6000
|
trusted library allocation
|
page readonly
|
||
1282C000
|
trusted library allocation
|
page read and write
|
||
511000
|
unkown
|
page execute read
|
||
553B000
|
stack
|
page read and write
|
||
5960000
|
heap
|
page read and write
|
||
1922000
|
heap
|
page read and write
|
||
547D000
|
stack
|
page read and write
|
||
1EC3000
|
trusted library allocation
|
page read and write
|
||
8500000
|
trusted library allocation
|
page read and write
|
||
ABF8000
|
trusted library allocation
|
page readonly
|
||
506E000
|
stack
|
page read and write
|
||
5910000
|
trusted library allocation
|
page read and write
|
||
E66E000
|
trusted library allocation
|
page readonly
|
||
62EE000
|
stack
|
page read and write
|
||
BA5000
|
trusted library allocation
|
page execute and read and write
|
||
30EB000
|
trusted library allocation
|
page read and write
|
||
866E000
|
heap
|
page read and write
|
||
99E7000
|
heap
|
page read and write
|
||
6769000
|
trusted library allocation
|
page read and write
|
||
5970000
|
trusted library allocation
|
page execute and read and write
|
||
12749000
|
trusted library allocation
|
page read and write
|
||
8BC6000
|
trusted library allocation
|
page read and write
|
||
1D07659C000
|
heap
|
page read and write
|
||
113BE000
|
trusted library allocation
|
page readonly
|
||
22887000
|
trusted library allocation
|
page read and write
|
||
7FFD9B790000
|
trusted library allocation
|
page read and write
|
||
4CAF000
|
stack
|
page read and write
|
||
4770000
|
trusted library allocation
|
page read and write
|
||
129E3000
|
trusted library allocation
|
page read and write
|
||
2AB1000
|
trusted library allocation
|
page read and write
|
||
469D000
|
stack
|
page read and write
|
||
12605000
|
trusted library allocation
|
page read and write
|
||
1D05DE88000
|
trusted library allocation
|
page read and write
|
||
A5A000
|
heap
|
page read and write
|
||
57DE000
|
stack
|
page read and write
|
||
1273E000
|
trusted library allocation
|
page read and write
|
||
1D05C290000
|
heap
|
page read and write
|
||
5F10000
|
trusted library allocation
|
page read and write
|
||
22CEA85C000
|
heap
|
page read and write
|
||
1273000
|
heap
|
page read and write
|
||
2E54000
|
trusted library allocation
|
page read and write
|
||
8704000
|
heap
|
page read and write
|
||
E1677FE000
|
unkown
|
page readonly
|
||
1D05C042000
|
unkown
|
page readonly
|
||
DE3000
|
trusted library allocation
|
page execute and read and write
|
||
9DE7000
|
trusted library allocation
|
page readonly
|
||
1560000
|
heap
|
page read and write
|
||
C20000
|
heap
|
page read and write
|
||
1C901000
|
trusted library allocation
|
page read and write
|
||
DE2A000
|
trusted library allocation
|
page read and write
|
||
48F0000
|
heap
|
page read and write
|
||
1D076700000
|
trusted library allocation
|
page read and write
|
||
34C0000
|
heap
|
page read and write
|
||
22DD3000
|
trusted library allocation
|
page read and write
|
||
22C7D000
|
trusted library allocation
|
page read and write
|
||
5E80000
|
trusted library allocation
|
page read and write
|
||
191F000
|
heap
|
page read and write
|
||
6760000
|
trusted library allocation
|
page read and write
|
||
1D05C4C0000
|
heap
|
page read and write
|
||
5150000
|
trusted library allocation
|
page read and write
|
||
AB0000
|
trusted library allocation
|
page read and write
|
||
F06000
|
trusted library allocation
|
page execute and read and write
|
||
8F82000
|
trusted library allocation
|
page read and write
|
||
4BAF000
|
stack
|
page read and write
|
||
5BFE000
|
stack
|
page read and write
|
||
22CF0064000
|
trusted library allocation
|
page read and write
|
||
DF0000
|
heap
|
page read and write
|
||
108D2000
|
trusted library allocation
|
page readonly
|
||
27D0000
|
heap
|
page execute and read and write
|
||
2524000
|
trusted library allocation
|
page read and write
|
||
1930000
|
heap
|
page read and write
|
||
E1668FE000
|
unkown
|
page readonly
|
||
14D3000
|
trusted library allocation
|
page execute and read and write
|
||
2070000
|
heap
|
page read and write
|
||
51E6000
|
heap
|
page read and write
|
||
497E000
|
stack
|
page read and write
|
||
F56000
|
unkown
|
page readonly
|
||
250E000
|
trusted library allocation
|
page read and write
|
||
F1B000
|
trusted library allocation
|
page execute and read and write
|
||
5F1F000
|
stack
|
page read and write
|
||
22CEFD40000
|
trusted library allocation
|
page read and write
|
||
1130000
|
trusted library allocation
|
page read and write
|
||
5F5E000
|
stack
|
page read and write
|
||
5B3A000
|
heap
|
page read and write
|
||
22CEA878000
|
heap
|
page read and write
|
||
1D05DCE2000
|
unkown
|
page readonly
|
||
E888000
|
heap
|
page read and write
|
||
2B83000
|
trusted library allocation
|
page read and write
|
||
66B0000
|
heap
|
page execute and read and write
|
||
6720000
|
trusted library allocation
|
page read and write
|
||
2650000
|
trusted library allocation
|
page read and write
|
||
437C000
|
trusted library allocation
|
page read and write
|
||
E94F000
|
heap
|
page read and write
|
||
E167CFE000
|
stack
|
page read and write
|
||
22CEFE5F000
|
heap
|
page read and write
|
||
112E000
|
stack
|
page read and write
|
||
B009000
|
trusted library allocation
|
page readonly
|
||
22CF0015000
|
trusted library allocation
|
page read and write
|
||
CC59000
|
trusted library allocation
|
page readonly
|
||
22CEA8BA000
|
heap
|
page read and write
|
||
504F000
|
stack
|
page read and write
|
||
12524000
|
trusted library allocation
|
page read and write
|
||
8E0D2F9000
|
stack
|
page read and write
|
||
5C5F000
|
stack
|
page read and write
|
||
55FE000
|
stack
|
page read and write
|
||
6000000
|
trusted library allocation
|
page read and write
|
||
C141000
|
trusted library allocation
|
page readonly
|
||
E8BF000
|
heap
|
page read and write
|
||
5FA0000
|
trusted library allocation
|
page read and write
|
||
5B82000
|
heap
|
page read and write
|
||
EBA8000
|
heap
|
page read and write
|
||
5D28000
|
heap
|
page read and write
|
||
1800000
|
heap
|
page read and write
|
||
6D3E000
|
stack
|
page read and write
|
||
8E0CB42000
|
stack
|
page read and write
|
||
8BF6000
|
trusted library allocation
|
page read and write
|
||
2E43000
|
trusted library allocation
|
page read and write
|
||
4D40000
|
trusted library allocation
|
page read and write
|
||
4FF0000
|
trusted library allocation
|
page read and write
|
||
22CEA873000
|
heap
|
page read and write
|
||
CB8C000
|
trusted library allocation
|
page readonly
|
||
22CEB640000
|
trusted library allocation
|
page read and write
|
||
54BF000
|
stack
|
page read and write
|
||
E2A5000
|
trusted library allocation
|
page readonly
|
||
5B20000
|
heap
|
page read and write
|
||
ED31000
|
trusted library allocation
|
page read and write
|
||
10BAA000
|
trusted library allocation
|
page readonly
|
||
22CEB000000
|
heap
|
page read and write
|
||
E1E9000
|
trusted library allocation
|
page read and write
|
||
868E000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page read and write
|
||
52EE000
|
stack
|
page read and write
|
||
14BE000
|
stack
|
page read and write
|
||
E166FFB000
|
stack
|
page read and write
|
||
9C7000
|
heap
|
page read and write
|
||
5D9E000
|
stack
|
page read and write
|
||
7FFD9B663000
|
trusted library allocation
|
page read and write
|
||
22CF0091000
|
trusted library allocation
|
page read and write
|
||
22CF00BA000
|
trusted library allocation
|
page read and write
|
||
1D0769CD000
|
heap
|
page read and write
|
||
8623000
|
heap
|
page read and write
|
||
108F000
|
stack
|
page read and write
|
||
1FE4000
|
trusted library allocation
|
page read and write
|
||
DE4000
|
trusted library allocation
|
page read and write
|
||
EA74000
|
heap
|
page read and write
|
||
2A0000
|
unkown
|
page readonly
|
||
315C000
|
trusted library allocation
|
page read and write
|
||
1D05C470000
|
unkown
|
page readonly
|
||
22CF0050000
|
trusted library allocation
|
page read and write
|
||
EACE000
|
heap
|
page read and write
|
||
1241000
|
heap
|
page read and write
|
||
54FE000
|
stack
|
page read and write
|
||
22CF00A0000
|
trusted library allocation
|
page read and write
|
||
1D05DCB0000
|
unkown
|
page readonly
|
||
95D000
|
trusted library allocation
|
page execute and read and write
|
||
85C4000
|
heap
|
page read and write
|
||
63FD000
|
stack
|
page read and write
|
||
2670000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6E0000
|
trusted library allocation
|
page read and write
|
||
5E91000
|
trusted library allocation
|
page read and write
|
||
5560000
|
trusted library allocation
|
page execute and read and write
|
||
22CEFD22000
|
trusted library allocation
|
page read and write
|
||
60FE000
|
stack
|
page read and write
|
||
1110000
|
trusted library allocation
|
page execute and read and write
|
||
22CEFE30000
|
heap
|
page read and write
|
||
50FD000
|
stack
|
page read and write
|
||
84B0000
|
trusted library allocation
|
page read and write
|
||
58E0000
|
trusted library allocation
|
page read and write
|
||
5CFE000
|
stack
|
page read and write
|
||
6A3E000
|
stack
|
page read and write
|
||
D98000
|
stack
|
page read and write
|
||
8E0DDFE000
|
stack
|
page read and write
|
||
5D59000
|
heap
|
page read and write
|
||
129F7000
|
trusted library allocation
|
page read and write
|
||
1D05C390000
|
heap
|
page read and write
|
||
671B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B700000
|
trusted library allocation
|
page read and write
|
||
2BFE000
|
trusted library allocation
|
page read and write
|
||
C50000
|
trusted library allocation
|
page read and write
|
||
2FFF000
|
stack
|
page read and write
|
||
4D63000
|
heap
|
page read and write
|
||
22CEB11A000
|
heap
|
page read and write
|
||
65A8000
|
stack
|
page read and write
|
||
2E60000
|
trusted library allocation
|
page read and write
|
||
22CEFF04000
|
heap
|
page read and write
|
||
3097000
|
trusted library allocation
|
page read and write
|
||
22CF0370000
|
trusted library allocation
|
page read and write
|
||
5AEC000
|
heap
|
page read and write
|
||
2E40000
|
trusted library allocation
|
page read and write
|
||
22CEA8A9000
|
heap
|
page read and write
|
||
22CEFD20000
|
trusted library allocation
|
page read and write
|
||
5B04000
|
heap
|
page read and write
|
||
191F000
|
heap
|
page read and write
|
||
EA05000
|
heap
|
page read and write
|
||
3071000
|
trusted library allocation
|
page read and write
|
||
1507000
|
trusted library allocation
|
page execute and read and write
|
||
264C000
|
stack
|
page read and write
|
||
1D05DEB9000
|
trusted library allocation
|
page read and write
|
||
1C609000
|
trusted library allocation
|
page read and write
|
||
1EA7000
|
trusted library allocation
|
page read and write
|
||
9A4F000
|
heap
|
page read and write
|
||
99C4000
|
heap
|
page read and write
|
||
C42000
|
trusted library allocation
|
page read and write
|
||
234BF000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7E0000
|
trusted library allocation
|
page read and write
|
||
22CEFE66000
|
heap
|
page read and write
|
||
5E42000
|
trusted library allocation
|
page read and write
|
||
2A0B000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4C0000
|
trusted library allocation
|
page read and write
|
||
EAE5000
|
heap
|
page read and write
|
||
12481000
|
trusted library allocation
|
page read and write
|
||
7FFD9B5E0000
|
trusted library allocation
|
page execute and read and write
|
||
5B36000
|
heap
|
page read and write
|
||
1D05DF15000
|
trusted library allocation
|
page read and write
|
||
7FFD9B800000
|
trusted library allocation
|
page read and write
|
||
E31000
|
heap
|
page read and write
|
||
4EB3000
|
trusted library allocation
|
page read and write
|
||
61C9000
|
stack
|
page read and write
|
||
85D1000
|
heap
|
page read and write
|
||
22D6D000
|
trusted library allocation
|
page read and write
|
||
22CF00FC000
|
trusted library allocation
|
page read and write
|
||
1D05DE7A000
|
trusted library allocation
|
page read and write
|
||
111AE000
|
trusted library allocation
|
page readonly
|
||
250A000
|
trusted library allocation
|
page read and write
|
||
8E0D0FE000
|
stack
|
page read and write
|
||
22CEFE96000
|
heap
|
page read and write
|
||
6C30000
|
trusted library allocation
|
page execute and read and write
|
||
5E4E000
|
trusted library allocation
|
page read and write
|
||
CE3B000
|
trusted library allocation
|
page readonly
|
||
1EB8000
|
trusted library allocation
|
page read and write
|
||
51B0000
|
heap
|
page read and write
|
||
37E8000
|
trusted library allocation
|
page read and write
|
||
E82000
|
heap
|
page read and write
|
||
1C2CB000
|
trusted library allocation
|
page read and write
|
||
22CEFDF0000
|
trusted library allocation
|
page read and write
|
||
53AE000
|
stack
|
page read and write
|
||
BA0000
|
trusted library allocation
|
page read and write
|
||
5BB0000
|
heap
|
page read and write
|
||
43E5000
|
trusted library allocation
|
page read and write
|
||
126FE000
|
trusted library allocation
|
page read and write
|
||
116B7000
|
trusted library allocation
|
page readonly
|
||
5AFA000
|
stack
|
page read and write
|
||
1C20D000
|
trusted library allocation
|
page read and write
|
||
22CEB102000
|
heap
|
page read and write
|
||
22CEFD54000
|
trusted library allocation
|
page read and write
|
||
553000
|
unkown
|
page read and write
|
||
14F2000
|
trusted library allocation
|
page read and write
|
||
85F9000
|
heap
|
page read and write
|
||
2C1A000
|
trusted library allocation
|
page read and write
|
||
E167BFE000
|
unkown
|
page readonly
|
||
990D000
|
trusted library allocation
|
page readonly
|
||
5B40000
|
trusted library allocation
|
page read and write
|
||
29EE000
|
stack
|
page read and write
|
||
513E000
|
trusted library section
|
page read and write
|
||
B40E000
|
trusted library allocation
|
page readonly
|
||
5CF1000
|
heap
|
page read and write
|
||
1765000
|
trusted library allocation
|
page execute and read and write
|
||
5D3E000
|
stack
|
page read and write
|
||
634E000
|
stack
|
page read and write
|
||
4F20000
|
trusted library allocation
|
page read and write
|
||
97CD000
|
trusted library allocation
|
page readonly
|
||
2081000
|
trusted library allocation
|
page read and write
|
||
224CE000
|
trusted library allocation
|
page read and write
|
||
1BB81000
|
trusted library allocation
|
page read and write
|
||
1567000
|
heap
|
page read and write
|
||
5EB0000
|
trusted library allocation
|
page read and write
|
||
4CFE000
|
stack
|
page read and write
|
||
1D076674000
|
heap
|
page read and write
|
||
E90C000
|
heap
|
page read and write
|
||
243A1000
|
trusted library allocation
|
page read and write
|
||
7FFD9B6D0000
|
trusted library allocation
|
page execute and read and write
|
||
5B0000
|
heap
|
page read and write
|
||
22CEFEFD000
|
heap
|
page read and write
|
||
23500000
|
trusted library allocation
|
page read and write
|
||
5E6A000
|
trusted library allocation
|
page read and write
|
||
610000
|
unkown
|
page readonly
|
||
8718000
|
heap
|
page read and write
|
||
22CF00C2000
|
trusted library allocation
|
page read and write
|
||
E8D4000
|
heap
|
page read and write
|
||
1EA0000
|
trusted library allocation
|
page read and write
|
||
107C3000
|
trusted library allocation
|
page readonly
|
||
EAA3000
|
heap
|
page read and write
|
||
E8F4000
|
heap
|
page read and write
|
||
1149D000
|
trusted library allocation
|
page readonly
|
||
9266000
|
trusted library allocation
|
page read and write
|
||
E924000
|
heap
|
page read and write
|
||
5B44000
|
heap
|
page read and write
|
||
4800000
|
trusted library allocation
|
page execute and read and write
|
||
B86F000
|
trusted library allocation
|
page readonly
|
||
22CF00B0000
|
remote allocation
|
page read and write
|
||
4EB0000
|
trusted library allocation
|
page read and write
|
||
E9B4000
|
heap
|
page read and write
|
||
11AFD000
|
heap
|
page read and write
|
||
C91A000
|
trusted library allocation
|
page readonly
|
||
3088000
|
trusted library allocation
|
page read and write
|
||
AAD000
|
trusted library allocation
|
page execute and read and write
|
||
22CEFF0D000
|
heap
|
page read and write
|
||
7FFD9B6A0000
|
trusted library allocation
|
page read and write
|
||
6400000
|
heap
|
page read and write
|
||
223E1000
|
trusted library allocation
|
page read and write
|
||
128AB000
|
trusted library allocation
|
page read and write
|
||
1D0765C1000
|
heap
|
page read and write
|
||
4780000
|
heap
|
page execute and read and write
|
||
22CEA8FF000
|
heap
|
page read and write
|
||
7FFD9B576000
|
trusted library allocation
|
page read and write
|
||
1D05DDB1000
|
trusted library allocation
|
page read and write
|
||
11D6000
|
heap
|
page read and write
|
||
EC8C000
|
trusted library allocation
|
page readonly
|
||
6850000
|
trusted library allocation
|
page read and write
|
||
24FC000
|
trusted library allocation
|
page read and write
|
||
2262F000
|
trusted library allocation
|
page read and write
|
||
DE0000
|
heap
|
page read and write
|
||
5B73000
|
heap
|
page read and write
|
||
6A70000
|
trusted library allocation
|
page execute and read and write
|
||
2B72000
|
trusted library allocation
|
page read and write
|
||
1D05C3D0000
|
heap
|
page read and write
|
||
E900000
|
heap
|
page read and write
|
||
A9E000
|
stack
|
page read and write
|
||
6580000
|
trusted library allocation
|
page read and write
|
||
4F2E000
|
stack
|
page read and write
|
||
661D000
|
heap
|
page read and write
|
||
67FE000
|
stack
|
page read and write
|
||
1D05DFBF000
|
trusted library allocation
|
page read and write
|
||
4F30000
|
trusted library allocation
|
page execute and read and write
|
||
682C000
|
trusted library allocation
|
page read and write
|
||
1D05C040000
|
unkown
|
page readonly
|
||
421E000
|
stack
|
page read and write
|
||
61A0000
|
trusted library allocation
|
page read and write
|
||
191F000
|
heap
|
page read and write
|
||
C7A3000
|
trusted library allocation
|
page readonly
|
||
225D9000
|
trusted library allocation
|
page read and write
|
||
5E20000
|
trusted library allocation
|
page read and write
|
||
14E3000
|
trusted library allocation
|
page read and write
|
||
1E90000
|
trusted library allocation
|
page execute and read and write
|
||
167B000
|
heap
|
page read and write
|
||
51AF000
|
stack
|
page read and write
|
||
1120000
|
heap
|
page read and write
|
||
4FF7000
|
trusted library allocation
|
page read and write
|
||
24EC000
|
trusted library allocation
|
page read and write
|
||
14F0000
|
trusted library allocation
|
page read and write
|
||
C27000
|
heap
|
page read and write
|
||
5FDE000
|
stack
|
page read and write
|
||
126E1000
|
trusted library allocation
|
page read and write
|
||
110A9000
|
trusted library allocation
|
page readonly
|
||
525E000
|
stack
|
page read and write
|
||
1715000
|
heap
|
page read and write
|
||
3C26000
|
trusted library allocation
|
page read and write
|
||
1C0E2000
|
trusted library allocation
|
page read and write
|
||
4850000
|
trusted library allocation
|
page read and write
|
||
669C000
|
heap
|
page read and write
|
||
E8E7000
|
heap
|
page read and write
|
||
56ED000
|
stack
|
page read and write
|
||
22CEAFF0000
|
trusted library allocation
|
page read and write
|
||
22CEA790000
|
trusted library allocation
|
page read and write
|
||
2512000
|
trusted library allocation
|
page read and write
|
||
12A34000
|
trusted library allocation
|
page read and write
|
||
10AFB000
|
trusted library allocation
|
page readonly
|
||
7FFD9B4D3000
|
trusted library allocation
|
page read and write
|
||
65B0000
|
heap
|
page read and write
|
||
2EF0000
|
heap
|
page read and write
|
||
10256000
|
trusted library allocation
|
page readonly
|
||
5BA0000
|
trusted library allocation
|
page execute and read and write
|
||
5B70000
|
heap
|
page read and write
|
||
60B0000
|
trusted library allocation
|
page read and write
|
||
1007D000
|
trusted library allocation
|
page readonly
|
||
E847000
|
heap
|
page read and write
|
||
50AE000
|
stack
|
page read and write
|
||
57FE000
|
stack
|
page read and write
|
||
634F000
|
stack
|
page read and write
|
||
14F8000
|
stack
|
page read and write
|
||
69EC000
|
stack
|
page read and write
|
||
1D05DEF9000
|
trusted library allocation
|
page read and write
|
||
7FFD9B760000
|
trusted library allocation
|
page read and write
|
||
1D05C250000
|
heap
|
page read and write
|
||
1931000
|
heap
|
page read and write
|
||
1643000
|
trusted library allocation
|
page read and write
|
||
1D05C4E0000
|
heap
|
page execute and read and write
|
||
22CEFE00000
|
heap
|
page read and write
|
||
1D05C2D2000
|
heap
|
page read and write
|
||
8E0DCFE000
|
stack
|
page read and write
|
||
5090000
|
trusted library allocation
|
page read and write
|
||
EBE6000
|
heap
|
page read and write
|
||
22CEFF0A000
|
heap
|
page read and write
|
||
615E000
|
stack
|
page read and write
|
||
1D0766C2000
|
unkown
|
page readonly
|
||
584E000
|
stack
|
page read and write
|
||
86BC000
|
heap
|
page read and write
|
||
5B00000
|
heap
|
page read and write
|
||
E1676F9000
|
stack
|
page read and write
|
||
1D06DDD1000
|
trusted library allocation
|
page read and write
|
||
5430000
|
trusted library allocation
|
page execute and read and write
|
||
5D2A000
|
heap
|
page read and write
|
||
1D05C2D0000
|
heap
|
page read and write
|
||
5010000
|
trusted library allocation
|
page read and write
|
||
7FFD9B684000
|
trusted library allocation
|
page read and write
|
||
A3EE000
|
trusted library allocation
|
page readonly
|
||
535D000
|
stack
|
page read and write
|
||
30BE000
|
trusted library allocation
|
page read and write
|
||
67AD000
|
stack
|
page read and write
|
||
8E0DFFE000
|
stack
|
page read and write
|
||
86A8000
|
heap
|
page read and write
|
||
18FE000
|
heap
|
page read and write
|
||
22CEA87D000
|
heap
|
page read and write
|
||
545E000
|
stack
|
page read and write
|
||
661A000
|
heap
|
page read and write
|
||
1262E000
|
trusted library allocation
|
page read and write
|
||
3081000
|
trusted library allocation
|
page read and write
|
||
987000
|
heap
|
page read and write
|
||
5FE0000
|
trusted library allocation
|
page execute and read and write
|
||
17CE000
|
stack
|
page read and write
|
||
116CB000
|
trusted library allocation
|
page readonly
|
||
22CEFED1000
|
heap
|
page read and write
|
||
4DEF000
|
stack
|
page read and write
|
||
3AB1000
|
trusted library allocation
|
page read and write
|
||
8480000
|
trusted library allocation
|
page read and write
|
||
D45000
|
trusted library allocation
|
page read and write
|
||
9A6B000
|
heap
|
page read and write
|
||
8E0E33D000
|
stack
|
page read and write
|
||
1D05DEEB000
|
trusted library allocation
|
page read and write
|
||
1D07667D000
|
heap
|
page read and write
|
||
5260000
|
heap
|
page execute and read and write
|
||
4EAF000
|
stack
|
page read and write
|
||
1D05DFB8000
|
trusted library allocation
|
page read and write
|
||
5E64000
|
trusted library allocation
|
page read and write
|
||
9A25000
|
heap
|
page read and write
|
||
3BE2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7F0000
|
trusted library allocation
|
page execute and read and write
|
||
560E000
|
stack
|
page read and write
|
||
206E000
|
stack
|
page read and write
|
||
12642000
|
trusted library allocation
|
page read and write
|
||
1D076740000
|
heap
|
page read and write
|
||
1D06DDBD000
|
trusted library allocation
|
page read and write
|
||
7FFD9B670000
|
trusted library allocation
|
page read and write
|
||
24A4000
|
trusted library allocation
|
page read and write
|
||
8E0D9F6000
|
stack
|
page read and write
|
||
2B5D000
|
trusted library allocation
|
page read and write
|
||
C330000
|
trusted library allocation
|
page readonly
|
||
6020000
|
heap
|
page read and write
|
||
22CEFEF8000
|
heap
|
page read and write
|
||
4F43000
|
heap
|
page execute and read and write
|
||
1A1D000
|
stack
|
page read and write
|
||
5800000
|
trusted library allocation
|
page read and write
|
||
1D06DDC5000
|
trusted library allocation
|
page read and write
|
||
EAE8000
|
heap
|
page read and write
|
||
7FFD9B4C4000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4E0000
|
trusted library allocation
|
page read and write
|
||
C20C000
|
trusted library allocation
|
page readonly
|
||
64AC000
|
stack
|
page read and write
|
||
1D05DF03000
|
trusted library allocation
|
page read and write
|
||
556000
|
unkown
|
page readonly
|
||
53F0000
|
trusted library allocation
|
page read and write
|
||
22CEFDE0000
|
trusted library allocation
|
page read and write
|
||
1D076B92000
|
unkown
|
page readonly
|
||
163D000
|
trusted library allocation
|
page execute and read and write
|
||
6643000
|
heap
|
page read and write
|
||
30A9000
|
trusted library allocation
|
page read and write
|
||
EB5E000
|
heap
|
page read and write
|
||
14F6000
|
trusted library allocation
|
page execute and read and write
|
||
7FFD9B6B0000
|
trusted library allocation
|
page execute and read and write
|
||
22CF0056000
|
trusted library allocation
|
page read and write
|
||
662D000
|
stack
|
page read and write
|
||
2C00000
|
trusted library allocation
|
page read and write
|
||
2923000
|
trusted library allocation
|
page read and write
|
||
8E0D1FE000
|
stack
|
page read and write
|
||
7FFD9B748000
|
trusted library allocation
|
page read and write
|
||
9C5000
|
heap
|
page read and write
|
||
E16647B000
|
stack
|
page read and write
|
||
2C16000
|
trusted library allocation
|
page read and write
|
||
D38000
|
trusted library allocation
|
page read and write
|
||
1EC7000
|
trusted library allocation
|
page read and write
|
||
607E000
|
stack
|
page read and write
|
||
22CEB113000
|
heap
|
page read and write
|
||
676E000
|
stack
|
page read and write
|
||
5B10000
|
heap
|
page read and write
|
||
5FAE000
|
trusted library allocation
|
page read and write
|
||
2E50000
|
trusted library allocation
|
page read and write
|
||
22CEFD40000
|
trusted library allocation
|
page read and write
|
||
8FC000
|
stack
|
page read and write
|
||
662F000
|
heap
|
page read and write
|
||
116C7000
|
trusted library allocation
|
page readonly
|
||
3ECF000
|
trusted library allocation
|
page read and write
|
||
86D2000
|
heap
|
page read and write
|
||
22CEFDE0000
|
trusted library allocation
|
page read and write
|
||
10D00000
|
trusted library allocation
|
page readonly
|
||
E1667F7000
|
stack
|
page read and write
|
||
D6A000
|
trusted library allocation
|
page read and write
|
||
6AEE000
|
stack
|
page read and write
|
||
D3A9000
|
trusted library allocation
|
page read and write
|
||
22CF000E000
|
trusted library allocation
|
page read and write
|
||
9A64000
|
heap
|
page read and write
|
||
2B66000
|
trusted library allocation
|
page read and write
|
||
6716000
|
trusted library allocation
|
page read and write
|
||
608C000
|
stack
|
page read and write
|
||
862F000
|
heap
|
page read and write
|
||
12619000
|
trusted library allocation
|
page read and write
|
||
EB4E000
|
heap
|
page read and write
|
||
22CEA913000
|
heap
|
page read and write
|
||
7FFD9B7A0000
|
trusted library allocation
|
page read and write
|
||
12549000
|
trusted library allocation
|
page read and write
|
||
13B0000
|
heap
|
page read and write
|
||
22CF0020000
|
trusted library allocation
|
page read and write
|
||
6800000
|
trusted library allocation
|
page read and write
|
||
8530000
|
heap
|
page read and write
|
||
E1685FE000
|
unkown
|
page readonly
|
||
E9D8000
|
heap
|
page read and write
|
||
DFB000
|
heap
|
page read and write
|
||
DE0000
|
trusted library allocation
|
page read and write
|
||
6020000
|
trusted library allocation
|
page execute and read and write
|
||
22CF00E5000
|
trusted library allocation
|
page read and write
|
||
7FFD9B4EB000
|
trusted library allocation
|
page execute and read and write
|
||
A44000
|
heap
|
page read and write
|
||
50A0000
|
trusted library section
|
page read and write
|
||
511000
|
unkown
|
page execute read
|
||
7FFD9B6CB000
|
trusted library allocation
|
page read and write
|
||
12A20000
|
trusted library allocation
|
page read and write
|
||
96D1000
|
trusted library allocation
|
page read and write
|
||
17D0000
|
heap
|
page read and write
|
||
DBE000
|
stack
|
page read and write
|
||
1686000
|
heap
|
page read and write
|
||
5F20000
|
trusted library allocation
|
page read and write
|
||
10DC3000
|
trusted library allocation
|
page readonly
|
||
E9BD000
|
heap
|
page read and write
|
||
DB41000
|
trusted library allocation
|
page read and write
|
||
1D05DFD2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B730000
|
trusted library allocation
|
page read and write
|
||
960000
|
heap
|
page read and write
|
||
5790000
|
trusted library allocation
|
page read and write
|
||
5000000
|
trusted library allocation
|
page read and write
|
||
1760000
|
trusted library allocation
|
page read and write
|
||
126C5000
|
trusted library allocation
|
page read and write
|
||
22CEA87B000
|
heap
|
page read and write
|
||
85BE000
|
heap
|
page read and write
|
||
69F0000
|
heap
|
page read and write
|
||
BE2E000
|
trusted library allocation
|
page readonly
|
||
12812000
|
trusted library allocation
|
page read and write
|
||
22CF0360000
|
trusted library allocation
|
page read and write
|
||
84D0000
|
trusted library allocation
|
page read and write
|
||
1D05C3F0000
|
trusted library allocation
|
page read and write
|
||
4D50000
|
trusted library allocation
|
page read and write
|
||
22CEB100000
|
heap
|
page read and write
|
||
22CF0018000
|
trusted library allocation
|
page read and write
|
||
CF5E000
|
trusted library allocation
|
page readonly
|
||
5F80000
|
trusted library allocation
|
page read and write
|
||
E967000
|
heap
|
page read and write
|
||
17E0000
|
heap
|
page read and write
|
||
68AD000
|
stack
|
page read and write
|
||
594E000
|
stack
|
page read and write
|
||
5D01000
|
heap
|
page read and write
|
||
8E0D3FF000
|
stack
|
page read and write
|
||
99F6000
|
heap
|
page read and write
|
||
1ED0000
|
heap
|
page execute and read and write
|
||
6745000
|
trusted library allocation
|
page read and write
|
||
5420000
|
trusted library allocation
|
page read and write
|
||
1D05DCC4000
|
unkown
|
page readonly
|
||
7FFD9B6AD000
|
trusted library allocation
|
page read and write
|
||
1A27000
|
heap
|
page read and write
|
||
950000
|
trusted library allocation
|
page read and write
|
||
4088000
|
trusted library allocation
|
page read and write
|
||
22CEB880000
|
trusted library allocation
|
page read and write
|
||
6A60000
|
trusted library allocation
|
page read and write
|
||
22CEB11A000
|
heap
|
page read and write
|
||
1EC0000
|
trusted library allocation
|
page read and write
|
||
22CF0000000
|
trusted library allocation
|
page read and write
|
||
E915000
|
heap
|
page read and write
|
||
127D000
|
heap
|
page read and write
|
||
16CF000
|
heap
|
page read and write
|
||
5CE0000
|
heap
|
page read and write
|
||
E9F2000
|
heap
|
page read and write
|
||
66AA000
|
heap
|
page read and write
|
||
1BA41000
|
trusted library allocation
|
page read and write
|
||
37E1000
|
trusted library allocation
|
page read and write
|
||
1269C000
|
trusted library allocation
|
page read and write
|
||
7FFD9B7C0000
|
trusted library allocation
|
page read and write
|
||
6780000
|
trusted library allocation
|
page read and write
|
||
22CF0008000
|
trusted library allocation
|
page read and write
|
||
6810000
|
trusted library allocation
|
page read and write
|
||
22CF0107000
|
trusted library allocation
|
page read and write
|
||
22CEA800000
|
heap
|
page read and write
|
||
2A90000
|
trusted library allocation
|
page read and write
|
||
6820000
|
trusted library allocation
|
page read and write
|
||
5D81000
|
heap
|
page read and write
|
||
150B000
|
trusted library allocation
|
page execute and read and write
|
||
1D05C450000
|
unkown
|
page readonly
|
||
1259E000
|
trusted library allocation
|
page read and write
|
||
D60000
|
trusted library allocation
|
page read and write
|
||
EF3000
|
trusted library allocation
|
page read and write
|
||
110C000
|
stack
|
page read and write
|
||
E870000
|
heap
|
page read and write
|
||
599A000
|
heap
|
page read and write
|
||
5D6D000
|
heap
|
page read and write
|
||
6B90000
|
trusted library allocation
|
page execute and read and write
|
||
510000
|
unkown
|
page readonly
|
||
11BE000
|
heap
|
page read and write
|
||
864A000
|
heap
|
page read and write
|
||
F7E000
|
stack
|
page read and write
|
||
553000
|
unkown
|
page write copy
|
||
112A7000
|
trusted library allocation
|
page readonly
|
||
22CEA906000
|
heap
|
page read and write
|
||
5FA7000
|
trusted library allocation
|
page read and write
|
||
865D000
|
heap
|
page read and write
|
||
1147000
|
heap
|
page read and write
|
||
8781000
|
trusted library allocation
|
page read and write
|
||
5F90000
|
trusted library allocation
|
page read and write
|
||
86EB000
|
heap
|
page read and write
|
||
12788000
|
trusted library allocation
|
page read and write
|
||
12A0B000
|
trusted library allocation
|
page read and write
|
||
654C000
|
stack
|
page read and write
|
||
30E3000
|
trusted library allocation
|
page read and write
|
||
5B9E000
|
stack
|
page read and write
|
||
22CEFEEA000
|
heap
|
page read and write
|
||
E166DFC000
|
stack
|
page read and write
|
||
2A0D000
|
trusted library allocation
|
page read and write
|
||
D659000
|
trusted library allocation
|
page read and write
|
||
109A1000
|
trusted library allocation
|
page readonly
|
||
6A40000
|
trusted library allocation
|
page execute and read and write
|
||
2B48000
|
trusted library allocation
|
page read and write
|
||
8E0D7FB000
|
stack
|
page read and write
|
||
8F8000
|
stack
|
page read and write
|
||
127F8000
|
trusted library allocation
|
page read and write
|
||
22CEFF00000
|
heap
|
page read and write
|
||
63CE000
|
stack
|
page read and write
|
||
56FE000
|
stack
|
page read and write
|
||
2000000
|
trusted library allocation
|
page read and write
|
||
1010000
|
heap
|
page read and write
|
||
24F0000
|
trusted library allocation
|
page read and write
|
||
125F0000
|
trusted library allocation
|
page read and write
|
||
5FF0000
|
trusted library allocation
|
page execute and read and write
|
||
572E000
|
stack
|
page read and write
|
||
A9F7000
|
trusted library allocation
|
page readonly
|
||
1554000
|
trusted library allocation
|
page read and write
|
||
22CEFEE8000
|
heap
|
page read and write
|
||
9A40000
|
heap
|
page read and write
|
||
1D076601000
|
heap
|
page read and write
|
||
18FA000
|
heap
|
page read and write
|
||
5410000
|
trusted library allocation
|
page read and write
|
||
4EF9000
|
trusted library allocation
|
page read and write
|
||
84E0000
|
trusted library allocation
|
page read and write
|
||
22CF00A3000
|
trusted library allocation
|
page read and write
|
||
314D000
|
trusted library allocation
|
page read and write
|
||
AA3000
|
trusted library allocation
|
page read and write
|
||
126D6000
|
trusted library allocation
|
page read and write
|
||
22CEB002000
|
heap
|
page read and write
|
||
1D076D9C000
|
unkown
|
page readonly
|
||
540000
|
unkown
|
page readonly
|
||
E92000
|
heap
|
page read and write
|
||
E820000
|
heap
|
page read and write
|
||
3AB8000
|
trusted library allocation
|
page read and write
|
||
4CAD000
|
stack
|
page read and write
|
||
F0A000
|
trusted library allocation
|
page execute and read and write
|
||
E9C0000
|
heap
|
page read and write
|
||
1D05C500000
|
heap
|
page read and write
|
||
22CD1000
|
trusted library allocation
|
page read and write
|
||
F17000
|
trusted library allocation
|
page execute and read and write
|
||
E39E000
|
trusted library allocation
|
page readonly
|
||
8E0D6FB000
|
stack
|
page read and write
|
||
BF9B000
|
trusted library allocation
|
page readonly
|
||
5EC0000
|
trusted library allocation
|
page read and write
|
||
F02000
|
trusted library allocation
|
page read and write
|
||
7FFD9B740000
|
trusted library allocation
|
page read and write
|
||
638E000
|
stack
|
page read and write
|
||
1931000
|
heap
|
page read and write
|
||
12A73000
|
trusted library allocation
|
page read and write
|
||
E9B7000
|
heap
|
page read and write
|
||
22CEA8AE000
|
heap
|
page read and write
|
||
126DF000
|
trusted library allocation
|
page read and write
|
||
1170000
|
heap
|
page read and write
|
||
4EF0000
|
trusted library allocation
|
page read and write
|
||
99F9000
|
heap
|
page read and write
|
||
8E0E239000
|
stack
|
page read and write
|
||
229B5000
|
trusted library allocation
|
page read and write
|
||
FFB6000
|
trusted library allocation
|
page readonly
|
||
22CEB15A000
|
heap
|
page read and write
|
||
22CEA902000
|
heap
|
page read and write
|
||
7FFD9B744000
|
trusted library allocation
|
page read and write
|
||
1D076671000
|
heap
|
page read and write
|
||
46DE000
|
stack
|
page read and write
|
||
DFE000
|
heap
|
page read and write
|
||
22CEA750000
|
heap
|
page read and write
|
||
7FFD9B6C0000
|
trusted library allocation
|
page read and write
|
||
BA2000
|
trusted library allocation
|
page read and write
|
||
7FFD9B660000
|
trusted library allocation
|
page read and write
|
||
1500000
|
trusted library allocation
|
page read and write
|
||
8E0E63E000
|
stack
|
page read and write
|
||
63F0000
|
heap
|
page read and write
|
||
E94C000
|
heap
|
page read and write
|
||
995000
|
heap
|
page read and write
|
||
619E000
|
stack
|
page read and write
|
||
22CEAFD0000
|
trusted library allocation
|
page read and write
|
||
27AF000
|
stack
|
page read and write
|
||
5FC1000
|
trusted library allocation
|
page read and write
|
||
6590000
|
trusted library allocation
|
page execute and read and write
|
||
134A2000
|
trusted library allocation
|
page read and write
|
||
556000
|
unkown
|
page readonly
|
||
27E1000
|
trusted library allocation
|
page read and write
|
||
5008000
|
trusted library allocation
|
page read and write
|
||
8E0CEFE000
|
stack
|
page read and write
|
||
22435000
|
trusted library allocation
|
page read and write
|
||
1D0769A3000
|
heap
|
page read and write
|
||
4D3D000
|
stack
|
page read and write
|
||
22CEA8FF000
|
heap
|
page read and write
|
||
110C000
|
stack
|
page read and write
|
||
CA0000
|
heap
|
page read and write
|
||
5004000
|
trusted library allocation
|
page read and write
|
||
5ED0000
|
trusted library allocation
|
page execute and read and write
|
||
1C3B1000
|
trusted library allocation
|
page read and write
|
||
C0E000
|
stack
|
page read and write
|
||
1D06DDB1000
|
trusted library allocation
|
page read and write
|
||
E24000
|
heap
|
page read and write
|
||
99D5000
|
heap
|
page read and write
|
||
666E000
|
stack
|
page read and write
|
||
1D05C2FF000
|
heap
|
page read and write
|
||
12A49000
|
trusted library allocation
|
page read and write
|
||
6030000
|
trusted library allocation
|
page read and write
|
||
5020000
|
trusted library allocation
|
page read and write
|
||
F87000
|
heap
|
page read and write
|
||
7FFD9B4DD000
|
trusted library allocation
|
page execute and read and write
|
||
41B5000
|
trusted library allocation
|
page read and write
|
||
B9E3000
|
trusted library allocation
|
page readonly
|
||
5AE8000
|
heap
|
page read and write
|
||
8557000
|
heap
|
page read and write
|
||
10FB8000
|
trusted library allocation
|
page readonly
|
||
E166BFC000
|
stack
|
page read and write
|
||
24A2000
|
trusted library allocation
|
page read and write
|
||
EBD2000
|
heap
|
page read and write
|
||
6570000
|
trusted library allocation
|
page read and write
|
||
C37000
|
trusted library allocation
|
page read and write
|
||
A0E7000
|
trusted library allocation
|
page readonly
|
||
5B46000
|
heap
|
page read and write
|
||
6B3E000
|
unkown
|
page read and write
|
||
E89E000
|
heap
|
page read and write
|
||
5B20000
|
trusted library allocation
|
page read and write
|
||
EB90000
|
heap
|
page read and write
|
||
93F6000
|
trusted library allocation
|
page read and write
|
||
6A00000
|
heap
|
page read and write
|
||
518B000
|
stack
|
page read and write
|
||
7FFD9B719000
|
trusted library allocation
|
page read and write
|
||
252C000
|
trusted library allocation
|
page read and write
|
||
124FB000
|
trusted library allocation
|
page read and write
|
||
1280C000
|
trusted library allocation
|
page read and write
|
||
E964000
|
heap
|
page read and write
|
||
30AA000
|
trusted library allocation
|
page read and write
|
||
1D05DF9D000
|
trusted library allocation
|
page read and write
|
||
166B000
|
stack
|
page read and write
|
||
E935000
|
heap
|
page read and write
|
||
65CB000
|
heap
|
page read and write
|
||
22CEFEF4000
|
heap
|
page read and write
|
||
C01E000
|
trusted library allocation
|
page readonly
|
||
E945000
|
heap
|
page read and write
|
||
4ECA000
|
trusted library allocation
|
page read and write
|
||
570B000
|
stack
|
page read and write
|
||
1D05C040000
|
unkown
|
page readonly
|
||
22CEA916000
|
heap
|
page read and write
|
||
22CF011A000
|
trusted library allocation
|
page read and write
|
||
5CDE000
|
stack
|
page read and write
|
||
E16857E000
|
stack
|
page read and write
|
||
D50000
|
trusted library allocation
|
page read and write
|
||
30CB000
|
trusted library allocation
|
page read and write
|
||
22CEFEB6000
|
heap
|
page read and write
|
||
12862000
|
trusted library allocation
|
page read and write
|
||
BAB000
|
trusted library allocation
|
page execute and read and write
|
||
22CEFE23000
|
heap
|
page read and write
|
||
7FFD9B580000
|
trusted library allocation
|
page execute and read and write
|
||
2E3C000
|
stack
|
page read and write
|
||
E85C000
|
heap
|
page read and write
|
||
EA09000
|
heap
|
page read and write
|
||
F56000
|
unkown
|
page readonly
|
||
5E45000
|
trusted library allocation
|
page read and write
|
||
5900000
|
trusted library allocation
|
page execute and read and write
|
||
2C08000
|
trusted library allocation
|
page read and write
|
||
E166CFE000
|
unkown
|
page readonly
|
||
1558000
|
trusted library allocation
|
page read and write
|
||
22CF0000000
|
trusted library allocation
|
page read and write
|
||
1688000
|
heap
|
page read and write
|
||
1924000
|
heap
|
page read and write
|
||
1505000
|
trusted library allocation
|
page execute and read and write
|
||
96B000
|
heap
|
page read and write
|
||
22CEBCA0000
|
trusted library allocation
|
page read and write
|
||
6BEE000
|
stack
|
page read and write
|
||
E2A0000
|
trusted library allocation
|
page readonly
|
||
1D0766C0000
|
unkown
|
page readonly
|
||
660E000
|
stack
|
page read and write
|
||
8614000
|
heap
|
page read and write
|
||
22CF008E000
|
trusted library allocation
|
page read and write
|
||
6010000
|
trusted library allocation
|
page execute and read and write
|
||
4CEE000
|
stack
|
page read and write
|
||
12510000
|
trusted library allocation
|
page read and write
|
||
1FE0000
|
trusted library allocation
|
page read and write
|
||
1D05DF27000
|
trusted library allocation
|
page read and write
|
||
1C25D000
|
trusted library allocation
|
page read and write
|
||
22CF00F4000
|
trusted library allocation
|
page read and write
|
||
59A8000
|
heap
|
page read and write
|
||
E9C5000
|
heap
|
page read and write
|
||
22CEFD00000
|
trusted library allocation
|
page read and write
|
||
1FF0000
|
trusted library allocation
|
page read and write
|
||
C40F000
|
trusted library allocation
|
page readonly
|
||
1D05C4B3000
|
heap
|
page execute and read and write
|
||
C9C000
|
stack
|
page read and write
|
||
8E0CBCF000
|
stack
|
page read and write
|
||
8E0D8F6000
|
stack
|
page read and write
|
||
8E0E439000
|
stack
|
page read and write
|
||
14ED000
|
trusted library allocation
|
page execute and read and write
|
There are 1274 hidden memdumps, click here to show them.