IOC Report
PuranWipeDiskSetup.exe

loading gif

Files

File Path
Type
Category
Malicious
PuranWipeDiskSetup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Program Files\Puran Wipe Disk\Default.cjstyles (copy)
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\Puran Wipe Disk\Help\Wipe_Disk.chm (copy)
MS Windows HtmlHelp Data
dropped
C:\Program Files\Puran Wipe Disk\Help\is-JQLMN.tmp
MS Windows HtmlHelp Data
dropped
C:\Program Files\Puran Wipe Disk\Puran Wipe Disk.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Puran Wipe Disk\Puran Wipe Disk.url
MS Windows 95 Internet shortcut text (URL=<http://www.puransoftware.com>), ASCII text, with CRLF line terminators
dropped
C:\Program Files\Puran Wipe Disk\home.html (copy)
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Puran Wipe Disk\home.png (copy)
PNG image data, 55 x 21, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files\Puran Wipe Disk\homebutton.html (copy)
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Puran Wipe Disk\is-6S64H.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\Puran Wipe Disk\is-7J9I7.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Puran Wipe Disk\is-E3G21.tmp
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Puran Wipe Disk\is-II2TT.tmp
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Program Files\Puran Wipe Disk\is-JRBGR.tmp
PNG image data, 55 x 21, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files\Puran Wipe Disk\is-UDJ45.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\Puran Wipe Disk\unins000.dat
InnoSetup Log 64-bit Puran Wipe Disk, version 0x418, 5245 bytes, 899552\37\user\376, C:\Program Files\Puran Wipe Disk\376\377\3
dropped
C:\Program Files\Puran Wipe Disk\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Puran Wipe Disk\Puran Wipe Disk on the Web.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Puran Wipe Disk\Puran Wipe Disk.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Apr 17 20:27:13 2024, mtime=Wed Apr 17 20:27:13 2024, atime=Tue Apr 28 09:45:58 2020, length=984576, window=hide
dropped
C:\Users\user\AppData\Local\Microsoft\Internet Explorer\MSIMGSIZ.DAT
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\home[1].png
PNG image data, 55 x 21, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\YLNGKWRH\basicusageb1[1].PNG
PNG image data, 784 x 256, 8-bit/color RGB, non-interlaced
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZJCZETOO\npupage7[1].htm
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\fblike[1].jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 140x21, components 3
dropped
C:\Users\user\AppData\Local\Temp\IMTE83B.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\is-99JSC.tmp\PuranWipeDiskSetup.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-BUOCP.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-BUOCP.tmp\_isetup\_shfoldr.dll
PE32 executable (DLL) (GUI) Intel 80386 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\~DF226B5233800436BA.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Local\Temp\~DFAD402C8DF9D6ED10.TMP
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\HTML Help\hh.dat
MS Windows HtmlHelp Data
dropped
C:\Users\user\Desktop\Puran Wipe Disk.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Wed Apr 17 20:27:13 2024, mtime=Wed Apr 17 20:27:13 2024, atime=Tue Apr 28 09:45:58 2020, length=984576, window=hide
dropped
There are 22 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Puran Wipe Disk\Puran Wipe Disk.exe
"C:\Program Files\Puran Wipe Disk\Puran Wipe Disk.exe"
malicious
C:\Users\user\Desktop\PuranWipeDiskSetup.exe
"C:\Users\user\Desktop\PuranWipeDiskSetup.exe"
C:\Users\user\AppData\Local\Temp\is-99JSC.tmp\PuranWipeDiskSetup.tmp
"C:\Users\user\AppData\Local\Temp\is-99JSC.tmp\PuranWipeDiskSetup.tmp" /SL5="$10450,952714,192000,C:\Users\user\Desktop\PuranWipeDiskSetup.exe"
C:\Windows\hh.exe
"C:\Windows\hh.exe" C:\Program Files\Puran Wipe Disk\help\Wipe_Disk.chm

URLs

Name
IP
Malicious
http://www.innosetup.com/
unknown
http://www.purannetworks.com/pupage7c.html
unknown
http://www.purannetworks.com/home.pngnational)
unknown
http://www.purannetworks.com/npupage7.htmlPuran
unknown
http://www.purannetworks.com/home.png...nb
unknown
http://www.purannetworks.com/fblike.jpg...
unknown
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
http://www.puransoftware.com/
unknown
http://www.purannetworks.com/pupage7.html
unknown
http://www.purannetworks.com/npupage7.htmlUUC:
unknown
http://www.puransoftware.comq
unknown
http://www.purannetworks.com/npupage7.html6v
unknown
http://www.purannetworks.com/npupage7ty.html
unknown
http://www.purannetworks.com/npupage7.htmlS
unknown
http://www.purannetworks.com/npupage7.htmlttp://www.purannetworks.com/fblike.jpg...
unknown
http://www.purannetworks.com/npupage7.html
69.49.232.79
http://www.puransoftware.com
unknown
http://www.purannetworks.com/home.pngB
unknown
http://www.purannetworks.com/npupage7.html.dll
unknown
http://www.purannetworks.com/npupage7c.htmlhttp://www.purannetworks.com/npupage7ty.htmlhttp://www.pu
unknown
http://www.puransoftware.com/L
unknown
http://www.purannetworks.com/home.png
69.49.232.79
http://www.purannetworks.com/npupage7.htmlil.imgmll...e7.htmlent
unknown
http://www.purannetworks.com/rentVersion
unknown
http://www.purannetworks.com/npupage7.htmlC:
unknown
http://www.purannetworks.com/fblike.jpgF
unknown
http://www.purannetworks.com/npupage7c.html
unknown
http://www.purannetworks.com/npupage7.htmlannetworks.com/npupage7.html
unknown
http://www.puransoftware.comD~
unknown
http://www.puransoftware.com-default-browser-puran
unknown
http://www.purannetworks.com/fblike.jpgH
unknown
http://www.purannetworks.com/npupage7.htmlq
unknown
http://www.purannetworks.com/npupage7.html4Q
unknown
http://www.purannetworks.com/npupage7.htmls
unknown
http://www.remobjects.com/ps
unknown
http://www.puransoftware.com8http://www.puransoftware.com8http://www.puransoftware.com(
unknown
http://www.purannetworks.com/fblike.jpg
69.49.232.79
http://www.purannetworks.com/npupage7.htmlLMEMx
unknown
http://www.purannetworks.com/npupage7.htmlowsh
unknown
http://www.purannetworks.com/pupage7ty.html
unknown
There are 30 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
purannetworks.com
69.49.232.79
www.purannetworks.com
unknown

IPs

IP
Domain
Country
Malicious
69.49.232.79
purannetworks.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
Inno Setup: Selected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
Inno Setup: Deselected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
Inno Setup: Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\Puran Wipe Disk_is1
EstimatedSize
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\hh.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\hh.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch
Version
There are 18 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4A94000
trusted library allocation
page read and write
1E09CC7A000
heap
page read and write
2633000
heap
page read and write
262F000
heap
page read and write
23D0000
direct allocation
page read and write
35FF000
direct allocation
page read and write
2181000
direct allocation
page read and write
1E8A5370000
trusted library allocation
page read and write
704000
heap
page read and write
24FA000
direct allocation
page read and write
41C000
unkown
page readonly
704000
heap
page read and write
790000
heap
page read and write
93000
stack
page read and write
92B000
heap
page read and write
810000
heap
page read and write
1E8A5348000
trusted library allocation
page read and write
704000
heap
page read and write
263B000
heap
page read and write
704000
heap
page read and write
263B000
heap
page read and write
1E8A54FD000
heap
page read and write
704000
heap
page read and write
1E8A999D000
heap
page read and write
412000
unkown
page read and write
704000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
4A00000
trusted library allocation
page read and write
2632000
heap
page read and write
704000
heap
page read and write
47F7000
heap
page read and write
704000
heap
page read and write
2480000
direct allocation
page read and write
5B0000
stack
page read and write
704000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
262B000
heap
page read and write
840000
heap
page read and write
2495000
heap
page read and write
479D000
heap
page read and write
1E09EB5C000
heap
page read and write
704000
heap
page read and write
1E8A5529000
heap
page read and write
1E09EB30000
heap
page read and write
1E09EB1C000
heap
page read and write
4A28000
trusted library allocation
page read and write
1E8A54C6000
heap
page read and write
704000
heap
page read and write
21F6000
direct allocation
page read and write
909000
heap
page read and write
5F40000
heap
page read and write
704000
heap
page read and write
1E09FE20000
trusted library allocation
page read and write
8B6000
heap
page read and write
1E8A54EE000
heap
page read and write
21C9000
direct allocation
page read and write
2264000
direct allocation
page read and write
958000
heap
page read and write
ADF000
stack
page read and write
2631000
heap
page read and write
947000
heap
page read and write
1E09CC13000
heap
page read and write
704000
heap
page read and write
930000
heap
page read and write
263B000
heap
page read and write
263B000
heap
page read and write
704000
heap
page read and write
1E8A53CC000
trusted library allocation
page read and write
704000
heap
page read and write
509000
unkown
page read and write
1E8A54B9000
heap
page read and write
704000
heap
page read and write
1E09CBFE000
heap
page read and write
1E0A4CB0000
trusted library allocation
page read and write
2508000
direct allocation
page read and write
1E09CBC9000
heap
page read and write
1E09CBD8000
heap
page read and write
704000
heap
page read and write
1E8A5490000
heap
page read and write
7DF4B7751000
trusted library allocation
page execute read
2BC0000
trusted library allocation
page read and write
2631000
heap
page read and write
2632000
heap
page read and write
704000
heap
page read and write
38ED000
heap
page read and write
38EE000
heap
page read and write
990000
heap
page read and write
25A6000
direct allocation
page read and write
704000
heap
page read and write
400000
unkown
page readonly
704000
heap
page read and write
1E8A5517000
heap
page read and write
262E000
heap
page read and write
704000
heap
page read and write
263B000
heap
page read and write
263B000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
918000
heap
page read and write
1E8A5580000
heap
page read and write
704000
heap
page read and write
21B3000
direct allocation
page read and write
1E09EB1C000
heap
page read and write
1E8A53F0000
trusted library allocation
page read and write
25D1000
direct allocation
page read and write
361D000
direct allocation
page read and write
704000
heap
page read and write
4763000
heap
page read and write
704000
heap
page read and write
97FE8CE000
stack
page read and write
24D4000
direct allocation
page read and write
1E09EB2A000
heap
page read and write
97FE94E000
stack
page read and write
401000
unkown
page execute read
1E8A551B000
heap
page read and write
2630000
heap
page read and write
2632000
heap
page read and write
4710000
heap
page read and write
19C000
stack
page read and write
97FEC4E000
stack
page read and write
704000
heap
page read and write
704000
heap
page read and write
265B000
heap
page read and write
704000
heap
page read and write
962000
heap
page read and write
47C7000
heap
page read and write
2630000
heap
page read and write
49E0000
trusted library allocation
page read and write
262D000
heap
page read and write
97FEA4E000
stack
page read and write
9A6000
heap
page read and write
3309000
direct allocation
page read and write
2480000
direct allocation
page read and write
704000
heap
page read and write
704000
heap
page read and write
1E09EB53000
heap
page read and write
2239000
direct allocation
page read and write
32FD000
direct allocation
page read and write
704000
heap
page read and write
25BC000
direct allocation
page read and write
704000
heap
page read and write
978000
heap
page read and write
49E2000
trusted library allocation
page read and write
263B000
heap
page read and write
47EF000
heap
page read and write
7DF4B7760000
trusted library allocation
page readonly
4AA8000
trusted library allocation
page read and write
38B1000
heap
page read and write
704000
heap
page read and write
1E0A0960000
trusted library allocation
page read and write
2610000
heap
page read and write
1E8A5389000
trusted library allocation
page read and write
218F000
direct allocation
page read and write
1E8A5350000
trusted library allocation
page read and write
2630000
heap
page read and write
477A000
heap
page read and write
1E09EB52000
heap
page read and write
B020000
trusted library allocation
page read and write
2632000
heap
page read and write
1E09EB54000
heap
page read and write
1E09EBF0000
trusted library section
page read and write
704000
heap
page read and write
48C0000
heap
page read and write
6090000
direct allocation
page read and write
263B000
heap
page read and write
97FE9CE000
stack
page read and write
5E8D000
stack
page read and write
704000
heap
page read and write
4A08000
trusted library allocation
page read and write
1E8A54E6000
heap
page read and write
1E8A5338000
trusted library allocation
page read and write
1E09CF00000
heap
page read and write
704000
heap
page read and write
1E8A54DC000
heap
page read and write
263B000
heap
page read and write
704000
heap
page read and write
412000
unkown
page write copy
907F000
stack
page read and write
4F32000
heap
page read and write
262F000
heap
page read and write
4A2C000
trusted library allocation
page read and write
704000
heap
page read and write
1E8A5364000
trusted library allocation
page read and write
476A000
heap
page read and write
7FE33000
direct allocation
page read and write
99A000
heap
page read and write
2633000
heap
page read and write
1E0A0980000
trusted library allocation
page read and write
1E09EB41000
heap
page read and write
262E000
heap
page read and write
1E09EB41000
heap
page read and write
989000
heap
page read and write
347C000
stack
page read and write
95B000
heap
page read and write
2204000
direct allocation
page read and write
4F1A000
heap
page read and write
1E0A0990000
trusted library allocation
page read and write
1E09EB41000
heap
page read and write
25C3000
direct allocation
page read and write
262F000
heap
page read and write
1E8A53A8000
trusted library allocation
page read and write
929E000
stack
page read and write
263B000
heap
page read and write
2440000
heap
page read and write
7FD10000
direct allocation
page read and write
704000
heap
page read and write
2499000
heap
page read and write
1E8A54B5000
heap
page read and write
21FD000
direct allocation
page read and write
1E09EB28000
heap
page read and write
4803000
heap
page read and write
7FF6DF101000
unkown
page execute read
2516000
direct allocation
page read and write
224F000
direct allocation
page read and write
700000
heap
page read and write
704000
heap
page read and write
2753000
heap
page read and write
2633000
heap
page read and write
704000
heap
page read and write
1E09CC2B000
heap
page read and write
28B0000
heap
page read and write
47E7000
heap
page read and write
1E09CB80000
heap
page read and write
704000
heap
page read and write
1E8A5368000
trusted library allocation
page read and write
1E8A53B8000
trusted library allocation
page read and write
470F000
stack
page read and write
262B000
heap
page read and write
1E09EB3A000
heap
page read and write
93F000
heap
page read and write
704000
heap
page read and write
97FEB4B000
stack
page read and write
49DC000
trusted library allocation
page read and write
1E09EB27000
heap
page read and write
9703000
trusted library allocation
page read and write
1E09EB27000
heap
page read and write
704000
heap
page read and write
1E09EB37000
heap
page read and write
1E8A53BC000
trusted library allocation
page read and write
704000
heap
page read and write
1E09EAB4000
heap
page read and write
9710000
trusted library allocation
page read and write
704000
heap
page read and write
47DA000
heap
page read and write
27A0000
heap
page read and write
4A31000
trusted library allocation
page read and write
4A48000
trusted library allocation
page read and write
262D000
heap
page read and write
704000
heap
page read and write
52B000
unkown
page readonly
1E09EB47000
heap
page read and write
704000
heap
page read and write
4A80000
trusted library allocation
page read and write
1E09EB27000
heap
page read and write
49E8000
trusted library allocation
page read and write
1E8A54E0000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
1E0A5320000
heap
page read and write
80F000
stack
page read and write
704000
heap
page read and write
1E09EAD6000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
1E09EB41000
heap
page read and write
263B000
heap
page read and write
38B0000
heap
page read and write
704000
heap
page read and write
7FF6DF101000
unkown
page execute read
97FE340000
stack
page read and write
262E000
heap
page read and write
479B000
heap
page read and write
35C6000
direct allocation
page read and write
704000
heap
page read and write
436000
unkown
page readonly
262F000
heap
page read and write
97FE6FE000
stack
page read and write
1E09EB27000
heap
page read and write
2169000
direct allocation
page read and write
704000
heap
page read and write
4A04000
trusted library allocation
page read and write
1E8A540C000
trusted library allocation
page read and write
4750000
heap
page read and write
49F8000
trusted library allocation
page read and write
704000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
2634000
heap
page read and write
1E09EB22000
heap
page read and write
1E0A532D000
heap
page read and write
24B7000
direct allocation
page read and write
704000
heap
page read and write
401000
unkown
page execute read
94F0000
heap
page read and write
1E0A0970000
heap
page readonly
1E0A5324000
heap
page read and write
1E8A9961000
heap
page read and write
263B000
heap
page read and write
798000
heap
page read and write
1E8A5384000
trusted library allocation
page read and write
1E09CB88000
heap
page read and write
704000
heap
page read and write
265B000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
919000
heap
page read and write
4A90000
trusted library allocation
page read and write
2632000
heap
page read and write
2470000
heap
page read and write
37AE000
stack
page read and write
265B000
heap
page read and write
1E09EB30000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
2632000
heap
page read and write
7DF4B7750000
trusted library allocation
page readonly
4B2F000
stack
page read and write
704000
heap
page read and write
704000
heap
page read and write
2565000
direct allocation
page read and write
263B000
heap
page read and write
4E7D000
stack
page read and write
704000
heap
page read and write
2533000
direct allocation
page read and write
4F2C000
heap
page read and write
7FF6DF193000
unkown
page readonly
95D000
heap
page read and write
263C000
heap
page read and write
262F000
heap
page read and write
48D0000
heap
page read and write
1E0A4CB3000
trusted library allocation
page read and write
25B4000
direct allocation
page read and write
2543000
direct allocation
page read and write
1E8A5398000
trusted library allocation
page read and write
8FE000
heap
page read and write
1E8A556F000
heap
page read and write
2221000
direct allocation
page read and write
4A5C000
trusted library allocation
page read and write
49D8000
trusted library allocation
page read and write
704000
heap
page read and write
1E0A5144000
heap
page read and write
7AB000
heap
page read and write
1E09EB41000
heap
page read and write
1E8A53E0000
trusted library allocation
page read and write
4A0C000
trusted library allocation
page read and write
39B0000
heap
page read and write
263C000
heap
page read and write
947000
heap
page read and write
704000
heap
page read and write
38AF000
stack
page read and write
262E000
heap
page read and write
4A60000
trusted library allocation
page read and write
1E0A516A000
heap
page read and write
1E8A54CE000
heap
page read and write
9B000
stack
page read and write
5D8F000
stack
page read and write
47F5000
heap
page read and write
1E8A53E4000
trusted library allocation
page read and write
704000
heap
page read and write
1E8A54E4000
heap
page read and write
21E7000
direct allocation
page read and write
254B000
direct allocation
page read and write
1E09CBD2000
heap
page read and write
8090000
heap
page read and write
704000
heap
page read and write
1E09EB41000
heap
page read and write
7FF6DF100000
unkown
page readonly
48ED000
heap
page read and write
1E8A53D4000
trusted library allocation
page read and write
704000
heap
page read and write
1E8A5480000
heap
page read and write
21C2000
direct allocation
page read and write
1E09CB00000
heap
page read and write
2AF0000
trusted library allocation
page read and write
1E8A557E000
heap
page read and write
250F000
direct allocation
page read and write
704000
heap
page read and write
440000
heap
page read and write
263B000
heap
page read and write
1E09EB3A000
heap
page read and write
263B000
heap
page read and write
2231000
direct allocation
page read and write
48EA000
heap
page read and write
25CA000
direct allocation
page read and write
263B000
heap
page read and write
6245000
direct allocation
page read and write
6B0000
heap
page read and write
704000
heap
page read and write
256C000
direct allocation
page read and write
850000
heap
page read and write
2E9B000
stack
page read and write
4A20000
trusted library allocation
page read and write
263B000
heap
page read and write
2632000
heap
page read and write
800000
heap
page read and write
1E09EB10000
heap
page read and write
1E09EB30000
heap
page read and write
880000
heap
page read and write
21EE000
direct allocation
page read and write
1E0A0983000
trusted library allocation
page read and write
4A18000
trusted library allocation
page read and write
1E09EB41000
heap
page read and write
1E09CB30000
heap
page read and write
1E8A54A4000
heap
page read and write
21D0000
direct allocation
page read and write
BDF000
stack
page read and write
915000
heap
page read and write
263C000
heap
page read and write
1E8A9986000
heap
page read and write
219E000
direct allocation
page read and write
343E000
stack
page read and write
1E09CF05000
heap
page read and write
7120000
trusted library section
page readonly
4F2C000
heap
page read and write
986000
heap
page read and write
361A000
direct allocation
page read and write
1E8A5506000
heap
page read and write
262F000
heap
page read and write
1E09EB1C000
heap
page read and write
262F000
heap
page read and write
257B000
direct allocation
page read and write
704000
heap
page read and write
2636000
heap
page read and write
259F000
direct allocation
page read and write
704000
heap
page read and write
2632000
heap
page read and write
48CD000
heap
page read and write
704000
heap
page read and write
4716000
heap
page read and write
25D8000
direct allocation
page read and write
4783000
heap
page read and write
704000
heap
page read and write
24E3000
direct allocation
page read and write
262F000
heap
page read and write
1E8A999C000
heap
page read and write
501000
unkown
page write copy
1E09EB20000
heap
page read and write
704000
heap
page read and write
1E09EB27000
heap
page read and write
7FF6DF1C9000
unkown
page read and write
1E09CC30000
heap
page read and write
2632000
heap
page read and write
1E09EB20000
heap
page read and write
910000
heap
page read and write
1E09EB21000
heap
page read and write
704000
heap
page read and write
1E8A534C000
trusted library allocation
page read and write
1E0A4F70000
trusted library allocation
page read and write
704000
heap
page read and write
2500000
heap
page read and write
1E8A542C000
trusted library allocation
page read and write
4A6C000
trusted library allocation
page read and write
1E8A999C000
heap
page read and write
704000
heap
page read and write
263B000
heap
page read and write
711B000
stack
page read and write
2634000
heap
page read and write
704000
heap
page read and write
25AD000
direct allocation
page read and write
1E09EB28000
heap
page read and write
B30000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
262C000
heap
page read and write
704000
heap
page read and write
2637000
heap
page read and write
4F3E000
heap
page read and write
264A000
heap
page read and write
704000
heap
page read and write
32F0000
direct allocation
page read and write
704000
heap
page read and write
263B000
heap
page read and write
4A10000
trusted library allocation
page read and write
8BA2000
trusted library allocation
page read and write
704000
heap
page read and write
505000
unkown
page read and write
2460000
heap
page read and write
6EE000
stack
page read and write
704000
heap
page read and write
34CE000
stack
page read and write
330C000
direct allocation
page read and write
21DF000
direct allocation
page read and write
47AD000
heap
page read and write
704000
heap
page read and write
1E09EB47000
heap
page read and write
9591000
heap
page read and write
52F000
unkown
page readonly
704000
heap
page read and write
1E8A533C000
trusted library allocation
page read and write
35F7000
direct allocation
page read and write
1E8A8EB2000
trusted library allocation
page read and write
21BB000
direct allocation
page read and write
1E09CBC5000
heap
page read and write
501000
unkown
page read and write
4A78000
trusted library allocation
page read and write
2630000
heap
page read and write
1E8A5340000
trusted library allocation
page read and write
226C000
direct allocation
page read and write
2631000
heap
page read and write
2582000
direct allocation
page read and write
704000
heap
page read and write
512000
unkown
page readonly
1E09EB34000
heap
page read and write
1E8A53FC000
trusted library allocation
page read and write
96F0000
trusted library allocation
page read and write
704000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
1E09EB30000
heap
page read and write
6AE000
stack
page read and write
704000
heap
page read and write
263B000
heap
page read and write
96D000
heap
page read and write
24A0000
direct allocation
page read and write
704000
heap
page read and write
227A000
direct allocation
page read and write
50C000
unkown
page read and write
419000
unkown
page write copy
263B000
heap
page read and write
1E0A5159000
heap
page read and write
93C000
heap
page read and write
540000
heap
page read and write
1E0A515E000
heap
page read and write
4B70000
heap
page read and write
704000
heap
page read and write
1E09EB27000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
1E09E5C3000
heap
page read and write
704000
heap
page read and write
1E09EA90000
heap
page read and write
1E09EB20000
heap
page read and write
1E09EB27000
heap
page read and write
1E0A4CA0000
trusted library allocation
page read and write
4A24000
trusted library allocation
page read and write
43EF000
stack
page read and write
97FEACC000
trusted library allocation
page read and write
93A000
heap
page read and write
7FF4CD761000
trusted library allocation
page execute read
2256000
direct allocation
page read and write
1E8A54E2000
heap
page read and write
704000
heap
page read and write
2598000
direct allocation
page read and write
263B000
heap
page read and write
704000
heap
page read and write
4F12000
heap
page read and write
32F0000
direct allocation
page read and write
704000
heap
page read and write
21D7000
direct allocation
page read and write
362E000
direct allocation
page read and write
8B0000
heap
page read and write
2197000
direct allocation
page read and write
39B1000
heap
page read and write
47C3000
heap
page read and write
704000
heap
page read and write
925000
heap
page read and write
1E09EB24000
heap
page read and write
9A9000
heap
page read and write
1E0A0B20000
trusted library allocation
page read and write
1E8A5354000
trusted library allocation
page read and write
7DF4B7771000
trusted library allocation
page execute read
97FE77D000
stack
page read and write
251E000
direct allocation
page read and write
704000
heap
page read and write
2188000
direct allocation
page read and write
91C000
heap
page read and write
704000
heap
page read and write
2633000
heap
page read and write
1E09EB2F000
heap
page read and write
704000
heap
page read and write
1E09CBB9000
heap
page read and write
1E09EB30000
heap
page read and write
49F0000
trusted library allocation
page read and write
905000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
1E09EB1C000
heap
page read and write
704000
heap
page read and write
1E09EB30000
heap
page read and write
704000
heap
page read and write
4788000
heap
page read and write
21AC000
direct allocation
page read and write
704000
heap
page read and write
2F9C000
stack
page read and write
918E000
stack
page read and write
97FEBCF000
stack
page read and write
1E09EB41000
heap
page read and write
1E8A53B0000
trusted library allocation
page read and write
94D000
heap
page read and write
360A000
direct allocation
page read and write
49EC000
trusted library allocation
page read and write
1E8A5342000
trusted library allocation
page read and write
939C000
trusted library allocation
page read and write
1E09EB20000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
2505000
heap
page read and write
262E000
heap
page read and write
704000
heap
page read and write
4799000
heap
page read and write
24C6000
direct allocation
page read and write
2470000
unkown
page readonly
34D0000
direct allocation
page read and write
1E09EB30000
heap
page read and write
1E8A5360000
trusted library allocation
page read and write
945000
heap
page read and write
1E8A995F000
heap
page read and write
4F32000
heap
page read and write
704000
heap
page read and write
263C000
heap
page read and write
7FF6DF100000
unkown
page readonly
704000
heap
page read and write
2552000
direct allocation
page read and write
704000
heap
page read and write
704000
heap
page read and write
376F000
stack
page read and write
4797000
heap
page read and write
1E09EB28000
heap
page read and write
704000
heap
page read and write
1E0A4CC0000
trusted library allocation
page read and write
704000
heap
page read and write
360E000
direct allocation
page read and write
920000
heap
page read and write
1E8A53C8000
trusted library allocation
page read and write
704000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
255D000
direct allocation
page read and write
704000
heap
page read and write
38ED000
heap
page read and write
1E8A535C000
trusted library allocation
page read and write
2468000
heap
page read and write
1E09EB52000
heap
page read and write
704000
heap
page read and write
964000
heap
page read and write
2463000
heap
page read and write
704000
heap
page read and write
24F7000
direct allocation
page read and write
1E09EB61000
heap
page read and write
704000
heap
page read and write
2240000
direct allocation
page read and write
35F5000
direct allocation
page read and write
24F1000
direct allocation
page read and write
225D000
direct allocation
page read and write
704000
heap
page read and write
478A000
heap
page read and write
263B000
heap
page read and write
262F000
heap
page read and write
4A1C000
trusted library allocation
page read and write
263C000
heap
page read and write
1E09EB2A000
heap
page read and write
1E09E600000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
4772000
heap
page read and write
8E0000
heap
page read and write
936000
heap
page read and write
1E0A0960000
trusted library allocation
page read and write
4F32000
heap
page read and write
704000
heap
page read and write
5A0000
heap
page read and write
24CD000
direct allocation
page read and write
704000
heap
page read and write
6155000
direct allocation
page read and write
704000
heap
page read and write
985000
heap
page read and write
4A98000
trusted library allocation
page read and write
97FE7FD000
stack
page read and write
704000
heap
page read and write
263B000
heap
page read and write
98F000
stack
page read and write
1E8A997E000
heap
page read and write
704000
heap
page read and write
975000
heap
page read and write
8BC000
heap
page read and write
417000
unkown
page read and write
704000
heap
page read and write
263C000
heap
page read and write
704000
heap
page read and write
263B000
heap
page read and write
922000
heap
page read and write
1E09EB2A000
heap
page read and write
704000
heap
page read and write
262F000
heap
page read and write
7FF6DF1D5000
unkown
page readonly
980000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
660000
heap
page read and write
2631000
heap
page read and write
1E09EB35000
heap
page read and write
1E09CB10000
heap
page read and write
704000
heap
page read and write
44EE000
stack
page read and write
4A74000
trusted library allocation
page read and write
7FF4CD760000
trusted library allocation
page readonly
1E09EAF6000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
1E09EB09000
heap
page read and write
4790000
heap
page read and write
48C4000
heap
page read and write
704000
heap
page read and write
1E09EB1D000
heap
page read and write
1E8A98C0000
heap
page read and write
980000
heap
page read and write
2288000
direct allocation
page read and write
4F32000
heap
page read and write
4ED0000
heap
page read and write
4A88000
trusted library allocation
page read and write
704000
heap
page read and write
4795000
heap
page read and write
1E09EB27000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
1E8A53F8000
trusted library allocation
page read and write
704000
heap
page read and write
1E09EB28000
heap
page read and write
704000
heap
page read and write
263C000
heap
page read and write
2501000
direct allocation
page read and write
4F3A000
heap
page read and write
47FC000
heap
page read and write
1E09EB41000
heap
page read and write
704000
heap
page read and write
1E0A5140000
heap
page read and write
704000
heap
page read and write
4F2B000
heap
page read and write
704000
heap
page read and write
21A5000
direct allocation
page read and write
704000
heap
page read and write
1E8A5378000
trusted library allocation
page read and write
2281000
direct allocation
page read and write
2637000
heap
page read and write
2631000
heap
page read and write
8E7000
heap
page read and write
1E8A53A2000
trusted library allocation
page read and write
48D4000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
908000
heap
page read and write
704000
heap
page read and write
1E8A54DE000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
92F000
heap
page read and write
704000
heap
page read and write
925000
heap
page read and write
2211000
direct allocation
page read and write
263B000
heap
page read and write
7FF6DF1D5000
unkown
page readonly
97C000
heap
page read and write
4EFF000
heap
page read and write
704000
heap
page read and write
2632000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
49F4000
trusted library allocation
page read and write
1E09EB27000
heap
page read and write
860000
direct allocation
page execute and read and write
263C000
heap
page read and write
4776000
heap
page read and write
263B000
heap
page read and write
2630000
heap
page read and write
704000
heap
page read and write
7FF6DF193000
unkown
page readonly
704000
heap
page read and write
2633000
heap
page read and write
35E6000
direct allocation
page read and write
1E8A54C2000
heap
page read and write
93F000
heap
page read and write
7FF6DF1C9000
unkown
page write copy
1E09EB41000
heap
page read and write
1E09EAB0000
heap
page read and write
9700000
trusted library allocation
page read and write
908000
heap
page read and write
704000
heap
page read and write
704000
heap
page read and write
18E000
stack
page read and write
704000
heap
page read and write
1E8A5411000
trusted library allocation
page read and write
704000
heap
page read and write
704000
heap
page read and write
23D0000
direct allocation
page read and write
704000
heap
page read and write
1E09E5C0000
heap
page read and write
2273000
direct allocation
page read and write
916000
heap
page read and write
93C000
heap
page read and write
704000
heap
page read and write
400000
unkown
page readonly
65E000
stack
page read and write
1E09E590000
heap
page read and write
1E09EB20000
heap
page read and write
92D000
heap
page read and write
7DF4B7761000
trusted library allocation
page execute read
704000
heap
page read and write
27A3000
heap
page read and write
951000
heap
page read and write
704000
heap
page read and write
91C000
heap
page read and write
704000
heap
page read and write
2630000
heap
page read and write
1E09EB41000
heap
page read and write
704000
heap
page read and write
2632000
heap
page read and write
2590000
direct allocation
page read and write
704000
heap
page read and write
24EA000
direct allocation
page read and write
1E8A5374000
trusted library allocation
page read and write
704000
heap
page read and write
2490000
heap
page read and write
2589000
direct allocation
page read and write
704000
heap
page read and write
4A40000
trusted library allocation
page read and write
1E8A5380000
trusted library allocation
page read and write
704000
heap
page read and write
263C000
heap
page read and write
8F7000
heap
page read and write
2750000
heap
page read and write
704000
heap
page read and write
4A54000
trusted library allocation
page read and write
1E8A53A0000
trusted library allocation
page read and write
704000
heap
page read and write
50C000
unkown
page write copy
59E000
stack
page read and write
24B0000
direct allocation
page read and write
1E8A53D8000
trusted library allocation
page read and write
704000
heap
page read and write
913000
heap
page read and write
24DB000
direct allocation
page read and write
4F2A000
heap
page read and write
331D000
direct allocation
page read and write
704000
heap
page read and write
There are 828 hidden memdumps, click here to show them.