Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
PO64747835 PDF.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Bluetooth Suite help_ITA.chm
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\CDMDataEventHandler.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\RACOYIAN.hav
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\foromtalers.Fid
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\libLerc.dll
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\libenchant-2.dll
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\msvcr100.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nseD9AB.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\system-shutdown.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\zoom-out-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
There are 2 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\PO64747835 PDF.exe
|
"C:\Users\user\Desktop\PO64747835 PDF.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://donaldtrumpverse.com/kOrg_stUoodKu54.bin
|
|||
https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/sysInfoBase.schema.json
|
unknown
|
||
https://us1.api.ws-hp.com/clienttelemetry
|
unknown
|
||
https://stage-us1.api.ws-hp.com/clienttelemetry
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/originatorDetail.schema.json
|
unknown
|
||
https://pie-us1.api.ws-hp.com/clienttelemetry
|
unknown
|
||
https://schemaregistry.analysis.ext.hp.com/cdm/gun/com.hp.cdm.platform.software.domain.eventing.reso
|
unknown
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
192.168.2.1
|
unknown
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\HAAND\Benfisken85
|
detaljeprojektets
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\PARANTHRACENE
|
INTERPELLATION
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Valeward72\esc
|
Transfixation98
|
||
HKEY_CURRENT_USER\Software\DOMMERASPIRANTER\ETHERIIDAE
|
internalising
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
2920000
|
direct allocation
|
page execute and read and write
|
||
2285FC13000
|
heap
|
page read and write
|
||
20558456000
|
heap
|
page read and write
|
||
1FC9D854000
|
heap
|
page read and write
|
||
20558508000
|
heap
|
page read and write
|
||
1A756CAB000
|
heap
|
page read and write
|
||
172AB4AE000
|
heap
|
page read and write
|
||
1BE9C7F000
|
stack
|
page read and write
|
||
980BD7C000
|
stack
|
page read and write
|
||
183247E000
|
stack
|
page read and write
|
||
2158AAA7000
|
heap
|
page read and write
|
||
1390105C000
|
heap
|
page read and write
|
||
1A757585000
|
heap
|
page read and write
|
||
172AB474000
|
heap
|
page read and write
|
||
172B0AA1000
|
heap
|
page read and write
|
||
1A757518000
|
heap
|
page read and write
|
||
11EDD0CD000
|
heap
|
page read and write
|
||
95127FB000
|
stack
|
page read and write
|
||
229AF331000
|
heap
|
page read and write
|
||
11EDE102000
|
heap
|
page read and write
|
||
172AB457000
|
heap
|
page read and write
|
||
172B0A87000
|
heap
|
page read and write
|
||
11EDD1E1000
|
heap
|
page read and write
|
||
1A75757F000
|
heap
|
page read and write
|
||
1A757582000
|
heap
|
page read and write
|
||
172B0C20000
|
remote allocation
|
page read and write
|
||
1A756CA4000
|
heap
|
page read and write
|
||
3328F7F000
|
stack
|
page read and write
|
||
1BAC965B000
|
heap
|
page read and write
|
||
11EDD07C000
|
heap
|
page read and write
|
||
1BAC9664000
|
heap
|
page read and write
|
||
1A757582000
|
heap
|
page read and write
|
||
1A757575000
|
heap
|
page read and write
|
||
1F7603A5000
|
heap
|
page read and write
|
||
C36958F000
|
stack
|
page read and write
|
||
1E92F710000
|
heap
|
page read and write
|
||
1A75751A000
|
heap
|
page read and write
|
||
1A757573000
|
heap
|
page read and write
|
||
1BAC9702000
|
heap
|
page read and write
|
||
172B09D0000
|
trusted library allocation
|
page read and write
|
||
1A756C87000
|
heap
|
page read and write
|
||
1A7575A8000
|
heap
|
page read and write
|
||
1F75F9ED000
|
heap
|
page read and write
|
||
1831FAB000
|
stack
|
page read and write
|
||
987277E000
|
stack
|
page read and write
|
||
9138AF9000
|
stack
|
page read and write
|
||
11EDD029000
|
heap
|
page read and write
|
||
1F75FA87000
|
heap
|
page read and write
|
||
11EDD195000
|
heap
|
page read and write
|
||
91389FF000
|
stack
|
page read and write
|
||
1A757572000
|
heap
|
page read and write
|
||
2285FD02000
|
heap
|
page read and write
|
||
172AC2E0000
|
trusted library allocation
|
page read and write
|
||
9BEA5FE000
|
stack
|
page read and write
|
||
232F000
|
stack
|
page read and write
|
||
20558471000
|
heap
|
page read and write
|
||
1A757582000
|
heap
|
page read and write
|
||
CFB92FC000
|
stack
|
page read and write
|
||
13252332000
|
heap
|
page read and write
|
||
11EDE113000
|
heap
|
page read and write
|
||
1BAC9629000
|
heap
|
page read and write
|
||
11EDD052000
|
heap
|
page read and write
|
||
172B0C20000
|
remote allocation
|
page read and write
|
||
1BAC966D000
|
heap
|
page read and write
|
||
13251CE0000
|
heap
|
page read and write
|
||
2158A970000
|
heap
|
page read and write
|
||
1FC9D879000
|
heap
|
page read and write
|
||
980C1FE000
|
stack
|
page read and write
|
||
1FC9D913000
|
heap
|
page read and write
|
||
1A757582000
|
heap
|
page read and write
|
||
172B07A0000
|
trusted library allocation
|
page read and write
|
||
2055843C000
|
heap
|
page read and write
|
||
172AB492000
|
heap
|
page read and write
|
||
1E92F882000
|
heap
|
page read and write
|
||
11EDD690000
|
trusted library allocation
|
page read and write
|
||
9BEA7FE000
|
stack
|
page read and write
|
||
172B0A54000
|
heap
|
page read and write
|
||
229AF314000
|
heap
|
page read and write
|
||
20558513000
|
heap
|
page read and write
|
||
11EDD02E000
|
heap
|
page read and write
|
||
172B0A18000
|
heap
|
page read and write
|
||
2158B790000
|
heap
|
page readonly
|
||
A50000
|
trusted library allocation
|
page read and write
|
||
229AF314000
|
heap
|
page read and write
|
||
9138BF7000
|
stack
|
page read and write
|
||
980C5FF000
|
stack
|
page read and write
|
||
132519A0000
|
heap
|
page read and write
|
||
3328C7B000
|
stack
|
page read and write
|
||
205583E0000
|
trusted library allocation
|
page read and write
|
||
205581B0000
|
heap
|
page read and write
|
||
13901013000
|
heap
|
page read and write
|
||
2285FD13000
|
heap
|
page read and write
|
||
1F75FBA5000
|
heap
|
page read and write
|
||
11EDD0C6000
|
heap
|
page read and write
|
||
9BEA6FE000
|
stack
|
page read and write
|
||
1A757575000
|
heap
|
page read and write
|
||
11EDD080000
|
heap
|
page read and write
|
||
1A757571000
|
heap
|
page read and write
|
||
172B09F0000
|
trusted library allocation
|
page read and write
|
||
CFB907C000
|
stack
|
page read and write
|
||
172B0B00000
|
heap
|
page read and write
|
||
172AB478000
|
heap
|
page read and write
|
||
C3698F8000
|
stack
|
page read and write
|
||
3E4AFFB000
|
stack
|
page read and write
|
||
20558400000
|
heap
|
page read and write
|
||
33282F7000
|
stack
|
page read and write
|
||
13251C88000
|
heap
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
1F75F9ED000
|
heap
|
page read and write
|
||
9138F7E000
|
unkown
|
page read and write
|
||
7DA000
|
heap
|
page read and write
|
||
1A757A02000
|
heap
|
page read and write
|
||
23D4F402000
|
trusted library allocation
|
page read and write
|
||
1E92F829000
|
heap
|
page read and write
|
||
1FC9D828000
|
heap
|
page read and write
|
||
11EDE002000
|
heap
|
page read and write
|
||
7EA000
|
heap
|
page read and write
|
||
1FC9D813000
|
heap
|
page read and write
|
||
1F75FA36000
|
heap
|
page read and write
|
||
172B0D10000
|
trusted library allocation
|
page read and write
|
||
431000
|
unkown
|
page read and write
|
||
1390105E000
|
heap
|
page read and write
|
||
11EDCFE0000
|
trusted library allocation
|
page read and write
|
||
1E92F85E000
|
heap
|
page read and write
|
||
20558413000
|
heap
|
page read and write
|
||
236D000
|
stack
|
page read and write
|
||
1A757A03000
|
heap
|
page read and write
|
||
42C000
|
unkown
|
page read and write
|
||
1F75F9E4000
|
heap
|
page read and write
|
||
1A75759A000
|
heap
|
page read and write
|
||
2F1E000
|
stack
|
page read and write
|
||
1A7572F0000
|
remote allocation
|
page read and write
|
||
1A757587000
|
heap
|
page read and write
|
||
2158AA05000
|
heap
|
page read and write
|
||
229AF323000
|
heap
|
page read and write
|
||
2158AAAE000
|
heap
|
page read and write
|
||
229AF306000
|
heap
|
page read and write
|
||
1A75756F000
|
heap
|
page read and write
|
||
3327F5F000
|
stack
|
page read and write
|
||
172AB360000
|
trusted library allocation
|
page read and write
|
||
11EDD095000
|
heap
|
page read and write
|
||
534C27C000
|
stack
|
page read and write
|
||
1C9BDA30000
|
heap
|
page read and write
|
||
C3699FF000
|
stack
|
page read and write
|
||
1BAC9680000
|
heap
|
page read and write
|
||
1A757586000
|
heap
|
page read and write
|
||
1A757588000
|
heap
|
page read and write
|
||
205581A0000
|
heap
|
page read and write
|
||
5D630FF000
|
stack
|
page read and write
|
||
1A75756D000
|
heap
|
page read and write
|
||
534C67E000
|
stack
|
page read and write
|
||
5D62A7B000
|
stack
|
page read and write
|
||
1A757587000
|
heap
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
1A756C4C000
|
heap
|
page read and write
|
||
1BAC9679000
|
heap
|
page read and write
|
||
1A757577000
|
heap
|
page read and write
|
||
1A757574000
|
heap
|
page read and write
|
||
172ABC15000
|
heap
|
page read and write
|
||
830DD7F000
|
stack
|
page read and write
|
||
3215B0F000
|
stack
|
page read and write
|
||
1A756C4D000
|
heap
|
page read and write
|
||
229AF2F0000
|
heap
|
page read and write
|
||
1C9BDA75000
|
heap
|
page read and write
|
||
1BAC9662000
|
heap
|
page read and write
|
||
1FC9D860000
|
heap
|
page read and write
|
||
9872679000
|
stack
|
page read and write
|
||
1A75757A000
|
heap
|
page read and write
|
||
13901102000
|
heap
|
page read and write
|
||
1A757582000
|
heap
|
page read and write
|
||
229AF315000
|
heap
|
page read and write
|
||
2158AB60000
|
trusted library allocation
|
page read and write
|
||
1FC9D863000
|
heap
|
page read and write
|
||
172AC760000
|
trusted library allocation
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
1FC9D700000
|
heap
|
page read and write
|
||
46A000
|
unkown
|
page read and write
|
||
C369979000
|
stack
|
page read and write
|
||
33284FA000
|
stack
|
page read and write
|
||
13251CBA000
|
heap
|
page read and write
|
||
1A75754C000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
1A757582000
|
heap
|
page read and write
|
||
1A757582000
|
heap
|
page read and write
|
||
1BAC9E02000
|
trusted library allocation
|
page read and write
|
||
13251CC9000
|
heap
|
page read and write
|
||
229AF306000
|
heap
|
page read and write
|
||
11EDD0C6000
|
heap
|
page read and write
|
||
1A757575000
|
heap
|
page read and write
|
||
1A757596000
|
heap
|
page read and write
|
||
1F75FA27000
|
heap
|
page read and write
|
||
1BAC9663000
|
heap
|
page read and write
|
||
11A994B8000
|
heap
|
page read and write
|
||
1A757575000
|
heap
|
page read and write
|
||
951277E000
|
stack
|
page read and write
|
||
2158AAAE000
|
heap
|
page read and write
|
||
11EDD046000
|
heap
|
page read and write
|
||
2158B800000
|
trusted library allocation
|
page read and write
|
||
13900E70000
|
heap
|
page read and write
|
||
1E92F780000
|
heap
|
page read and write
|
||
13252300000
|
heap
|
page read and write
|
||
980C17B000
|
stack
|
page read and write
|
||
1E92F876000
|
heap
|
page read and write
|
||
172B08C0000
|
trusted library allocation
|
page read and write
|
||
11EDD03C000
|
heap
|
page read and write
|
||
C369A7C000
|
stack
|
page read and write
|
||
9138DF7000
|
stack
|
page read and write
|
||
C36987F000
|
stack
|
page read and write
|
||
1A756BD0000
|
trusted library allocation
|
page read and write
|
||
5D62AFE000
|
stack
|
page read and write
|
||
11EDCE80000
|
heap
|
page read and write
|
||
1BE9CFC000
|
stack
|
page read and write
|
||
172ABD18000
|
heap
|
page read and write
|
||
13251D02000
|
heap
|
page read and write
|
||
28A0000
|
trusted library allocation
|
page read and write
|
||
13901054000
|
heap
|
page read and write
|
||
2158A840000
|
trusted library allocation
|
page read and write
|
||
11EDD802000
|
heap
|
page read and write
|
||
1A75759A000
|
heap
|
page read and write
|
||
440000
|
unkown
|
page read and write
|
||
172B0A10000
|
trusted library allocation
|
page read and write
|
||
23D4EC29000
|
heap
|
page read and write
|
||
1F75F8F0000
|
heap
|
page read and write
|
||
1A757575000
|
heap
|
page read and write
|
||
3E4B17E000
|
stack
|
page read and write
|
||
2158A990000
|
heap
|
page read and write
|
||
172B0A61000
|
heap
|
page read and write
|
||
1A756CC9000
|
heap
|
page read and write
|
||
980C07E000
|
stack
|
page read and write
|
||
23D4EAD0000
|
heap
|
page read and write
|
||
1A75759A000
|
heap
|
page read and write
|
||
1BAC963E000
|
heap
|
page read and write
|
||
1F75F9F4000
|
heap
|
page read and write
|
||
1FC9D6A0000
|
heap
|
page read and write
|
||
1F75FA8E000
|
heap
|
page read and write
|
||
11EDD961000
|
heap
|
page read and write
|
||
23D4EC00000
|
heap
|
page read and write
|
||
1A75756F000
|
heap
|
page read and write
|
||
1A75758F000
|
heap
|
page read and write
|
||
11EDCEE0000
|
heap
|
page read and write
|
||
11EDD013000
|
heap
|
page read and write
|
||
3E4B0FD000
|
stack
|
page read and write
|
||
1A757575000
|
heap
|
page read and write
|
||
3328D7C000
|
stack
|
page read and write
|
||
1FC9D800000
|
heap
|
page read and write
|
||
1BAC9626000
|
heap
|
page read and write
|
||
980C3F7000
|
stack
|
page read and write
|
||
2158AA60000
|
heap
|
page read and write
|
||
1A757571000
|
heap
|
page read and write
|
||
1A757578000
|
heap
|
page read and write
|
||
1F75F9E4000
|
heap
|
page read and write
|
||
913897C000
|
stack
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1BAC9580000
|
heap
|
page read and write
|
||
33285FE000
|
stack
|
page read and write
|
||
913858E000
|
stack
|
page read and write
|
||
1A756CEA000
|
heap
|
page read and write
|
||
1A757583000
|
heap
|
page read and write
|
||
9138EF8000
|
stack
|
page read and write
|
||
1A7575DB000
|
heap
|
page read and write
|
||
13251BE0000
|
trusted library allocation
|
page read and write
|
||
1A756C13000
|
heap
|
page read and write
|
||
172B0A20000
|
trusted library allocation
|
page read and write
|
||
830DE7F000
|
stack
|
page read and write
|
||
2285FC3F000
|
heap
|
page read and write
|
||
11A99755000
|
heap
|
page read and write
|
||
1BE99FC000
|
stack
|
page read and write
|
||
1BAC9660000
|
heap
|
page read and write
|
||
229AF319000
|
heap
|
page read and write
|
||
1F75F9D1000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
1A757582000
|
heap
|
page read and write
|
||
1A756C29000
|
heap
|
page read and write
|
||
1E92F877000
|
heap
|
page read and write
|
||
20558210000
|
heap
|
page read and write
|
||
1A757A02000
|
heap
|
page read and write
|
||
1F75F9A0000
|
heap
|
page read and write
|
||
172B0A82000
|
heap
|
page read and write
|
||
1A757582000
|
heap
|
page read and write
|
||
172ABD02000
|
heap
|
page read and write
|
||
1C9BDACB000
|
heap
|
page read and write
|
||
172B0990000
|
trusted library allocation
|
page read and write
|
||
1F760030000
|
remote allocation
|
page read and write
|
||
1F75F960000
|
heap
|
page read and write
|
||
1A7575A9000
|
heap
|
page read and write
|
||
23D4EC13000
|
heap
|
page read and write
|
||
11EDE00A000
|
heap
|
page read and write
|
||
11EDD0E6000
|
heap
|
page read and write
|
||
20558A02000
|
trusted library allocation
|
page read and write
|
||
2158AABE000
|
heap
|
page read and write
|
||
9BEA8FF000
|
stack
|
page read and write
|
||
172B0A3C000
|
heap
|
page read and write
|
||
22860202000
|
trusted library allocation
|
page read and write
|
||
1BAC9613000
|
heap
|
page read and write
|
||
2285FC2A000
|
heap
|
page read and write
|
||
13251CC2000
|
heap
|
page read and write
|
||
1BE9DFD000
|
stack
|
page read and write
|
||
1A7575BA000
|
heap
|
page read and write
|
||
3215B8F000
|
stack
|
page read and write
|
||
11EDD05E000
|
heap
|
page read and write
|
||
13901108000
|
heap
|
page read and write
|
||
1A757594000
|
heap
|
page read and write
|
||
13901060000
|
heap
|
page read and write
|
||
1A75757E000
|
heap
|
page read and write
|
||
1A75757F000
|
heap
|
page read and write
|
||
2285FC77000
|
heap
|
page read and write
|
||
5D62EF7000
|
stack
|
page read and write
|
||
23D4EC3D000
|
heap
|
page read and write
|
||
1BAC965D000
|
heap
|
page read and write
|
||
1A757521000
|
heap
|
page read and write
|
||
11EDD089000
|
heap
|
page read and write
|
||
1A757594000
|
heap
|
page read and write
|
||
980BDFF000
|
stack
|
page read and write
|
||
1A757582000
|
heap
|
page read and write
|
||
172B0AFA000
|
heap
|
page read and write
|
||
1BAC967C000
|
heap
|
page read and write
|
||
11EDD938000
|
heap
|
page read and write
|
||
172B0AFC000
|
heap
|
page read and write
|
||
172AB1F0000
|
heap
|
page read and write
|
||
183237F000
|
stack
|
page read and write
|
||
1A757575000
|
heap
|
page read and write
|
||
1F760030000
|
remote allocation
|
page read and write
|
||
172B08C8000
|
trusted library allocation
|
page read and write
|
||
192887E000
|
stack
|
page read and write
|
||
2285FC6C000
|
heap
|
page read and write
|
||
2285FC00000
|
heap
|
page read and write
|
||
13901002000
|
heap
|
page read and write
|
||
13251CE6000
|
heap
|
page read and write
|
||
CFB96FD000
|
stack
|
page read and write
|
||
1FC9D802000
|
heap
|
page read and write
|
||
1390108A000
|
heap
|
page read and write
|
||
172B0AF4000
|
heap
|
page read and write
|
||
1A756CB0000
|
heap
|
page read and write
|
||
1928B7E000
|
stack
|
page read and write
|
||
734B1000
|
unkown
|
page execute read
|
||
1FC9D900000
|
heap
|
page read and write
|
||
11EDD90C000
|
heap
|
page read and write
|
||
1BAC967D000
|
heap
|
page read and write
|
||
11EDD1FD000
|
heap
|
page read and write
|
||
98727F9000
|
stack
|
page read and write
|
||
1A756CE4000
|
heap
|
page read and write
|
||
33287FB000
|
stack
|
page read and write
|
||
23D4EBA0000
|
remote allocation
|
page read and write
|
||
5D62B7E000
|
stack
|
page read and write
|
||
1A756CF9000
|
heap
|
page read and write
|
||
1A756D16000
|
heap
|
page read and write
|
||
CFB957D000
|
stack
|
page read and write
|
||
1BAC9661000
|
heap
|
page read and write
|
||
1C9BDA70000
|
heap
|
page read and write
|
||
1E92F84F000
|
heap
|
page read and write
|
||
1A756AD0000
|
heap
|
page read and write
|
||
23D4EAE0000
|
heap
|
page read and write
|
||
23D4EC58000
|
heap
|
page read and write
|
||
229AF590000
|
heap
|
page read and write
|
||
23D4EB40000
|
heap
|
page read and write
|
||
CFB937E000
|
stack
|
page read and write
|
||
1BAC9510000
|
heap
|
page read and write
|
||
172B0ADC000
|
heap
|
page read and write
|
||
1F75FA04000
|
heap
|
page read and write
|
||
13901802000
|
trusted library allocation
|
page read and write
|
||
192837B000
|
stack
|
page read and write
|
||
1A757A20000
|
heap
|
page read and write
|
||
1A757577000
|
heap
|
page read and write
|
||
1C9BDAC0000
|
heap
|
page read and write
|
||
172ABC02000
|
heap
|
page read and write
|
||
11EDD0DF000
|
heap
|
page read and write
|
||
172AB43D000
|
heap
|
page read and write
|
||
1A757575000
|
heap
|
page read and write
|
||
1BAC9666000
|
heap
|
page read and write
|
||
1BAC966F000
|
heap
|
page read and write
|
||
2158AA68000
|
heap
|
page read and write
|
||
172B0D30000
|
trusted library allocation
|
page read and write
|
||
3215EFB000
|
stack
|
page read and write
|
||
1F75FA07000
|
heap
|
page read and write
|
||
987247B000
|
stack
|
page read and write
|
||
2158AAB0000
|
heap
|
page read and write
|
||
13901045000
|
heap
|
page read and write
|
||
1A757586000
|
heap
|
page read and write
|
||
3E4B07C000
|
stack
|
page read and write
|
||
22860190000
|
trusted library allocation
|
page read and write
|
||
172B0A20000
|
heap
|
page read and write
|
||
229AF318000
|
heap
|
page read and write
|
||
229AF1E0000
|
heap
|
page read and write
|
||
23D4EC5A000
|
heap
|
page read and write
|
||
1A757575000
|
heap
|
page read and write
|
||
172AB426000
|
heap
|
page read and write
|
||
830D10B000
|
stack
|
page read and write
|
||
1A756A60000
|
heap
|
page read and write
|
||
1A75759A000
|
heap
|
page read and write
|
||
1F75FA0C000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
1F75FA04000
|
heap
|
page read and write
|
||
1BE9B7F000
|
stack
|
page read and write
|
||
1390105F000
|
heap
|
page read and write
|
||
23D4EB70000
|
trusted library allocation
|
page read and write
|
||
1F75F9F4000
|
heap
|
page read and write
|
||
1A757A02000
|
heap
|
page read and write
|
||
2158B7B0000
|
trusted library allocation
|
page read and write
|
||
13901000000
|
heap
|
page read and write
|
||
172AB4BB000
|
heap
|
page read and write
|
||
1F75FA87000
|
heap
|
page read and write
|
||
1A757A02000
|
heap
|
page read and write
|
||
1A7572F0000
|
remote allocation
|
page read and write
|
||
13251CCB000
|
heap
|
page read and write
|
||
172AB3F0000
|
trusted library allocation
|
page read and write
|
||
1F75F9ED000
|
heap
|
page read and write
|
||
11EDD913000
|
heap
|
page read and write
|
||
11A99300000
|
heap
|
page read and write
|
||
1A757587000
|
heap
|
page read and write
|
||
192877C000
|
stack
|
page read and write
|
||
1A757581000
|
heap
|
page read and write
|
||
172AB48C000
|
heap
|
page read and write
|
||
1928A7F000
|
stack
|
page read and write
|
||
1E92F854000
|
heap
|
page read and write
|
||
1BAC9659000
|
heap
|
page read and write
|
||
1BAC9600000
|
heap
|
page read and write
|
||
1A7575A9000
|
heap
|
page read and write
|
||
13901062000
|
heap
|
page read and write
|
||
5D62CFF000
|
stack
|
page read and write
|
||
1A757402000
|
heap
|
page read and write
|
||
1A756D08000
|
heap
|
page read and write
|
||
172AB514000
|
heap
|
page read and write
|
||
1BE9E7C000
|
stack
|
page read and write
|
||
1A757597000
|
heap
|
page read and write
|
||
1A757575000
|
heap
|
page read and write
|
||
734B4000
|
unkown
|
page readonly
|
||
1E92F813000
|
heap
|
page read and write
|
||
7CB000
|
heap
|
page read and write
|
||
172ABD18000
|
heap
|
page read and write
|
||
980C2FB000
|
stack
|
page read and write
|
||
40D000
|
unkown
|
page read and write
|
||
11EDE002000
|
heap
|
page read and write
|
||
13252202000
|
heap
|
page read and write
|
||
1A7575CC000
|
heap
|
page read and write
|
||
1A757586000
|
heap
|
page read and write
|
||
11EDCE90000
|
heap
|
page read and write
|
||
172AB200000
|
heap
|
page read and write
|
||
11EDD933000
|
heap
|
page read and write
|
||
172B0900000
|
trusted library allocation
|
page read and write
|
||
1A757500000
|
heap
|
page read and write
|
||
1928C7A000
|
stack
|
page read and write
|
||
1A757582000
|
heap
|
page read and write
|
||
77E000
|
stack
|
page read and write
|
||
9BEA47E000
|
stack
|
page read and write
|
||
1F75FBA0000
|
heap
|
page read and write
|
||
1F75F9A8000
|
heap
|
page read and write
|
||
1928979000
|
stack
|
page read and write
|
||
2158A830000
|
heap
|
page read and write
|
||
1F75F9D3000
|
heap
|
page read and write
|
||
9BEA12C000
|
stack
|
page read and write
|
||
11EDD900000
|
heap
|
page read and write
|
||
20558424000
|
heap
|
page read and write
|
||
11A99750000
|
heap
|
page read and write
|
||
1A756C4E000
|
heap
|
page read and write
|
||
1BAC9686000
|
heap
|
page read and write
|
||
11EDE071000
|
heap
|
page read and write
|
||
1A756CB6000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
13901029000
|
heap
|
page read and write
|
||
13900FE0000
|
trusted library allocation
|
page read and write
|
||
2158AA10000
|
trusted library allocation
|
page read and write
|
||
1A75757F000
|
heap
|
page read and write
|
||
172B0A00000
|
heap
|
page read and write
|
||
3E4AF7F000
|
stack
|
page read and write
|
||
9DE000
|
stack
|
page read and write
|
||
172ABD13000
|
heap
|
page read and write
|
||
1A75759A000
|
heap
|
page read and write
|
||
172ABD59000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
172B0990000
|
trusted library allocation
|
page read and write
|
||
172B0AE2000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
7DD000
|
heap
|
page read and write
|
||
1F75FA91000
|
heap
|
page read and write
|
||
1390103C000
|
heap
|
page read and write
|
||
1BAC966B000
|
heap
|
page read and write
|
||
790000
|
heap
|
page read and write
|
||
229AF323000
|
heap
|
page read and write
|
||
1A757599000
|
heap
|
page read and write
|
||
3327EDB000
|
stack
|
page read and write
|
||
20558449000
|
heap
|
page read and write
|
||
1BAC9648000
|
heap
|
page read and write
|
||
13251C29000
|
heap
|
page read and write
|
||
A86000
|
heap
|
page read and write
|
||
23D4EC23000
|
heap
|
page read and write
|
||
798000
|
heap
|
page read and write
|
||
172AB429000
|
heap
|
page read and write
|
||
1A7575BD000
|
heap
|
page read and write
|
||
1A757582000
|
heap
|
page read and write
|
||
11EDD113000
|
heap
|
page read and write
|
||
1A757581000
|
heap
|
page read and write
|
||
13251D13000
|
heap
|
page read and write
|
||
734B6000
|
unkown
|
page readonly
|
||
1A757575000
|
heap
|
page read and write
|
||
172B08C0000
|
trusted library allocation
|
page read and write
|
||
1A757A02000
|
heap
|
page read and write
|
||
1A75757F000
|
heap
|
page read and write
|
||
1FC9D690000
|
heap
|
page read and write
|
||
2285FC02000
|
heap
|
page read and write
|
||
1A757575000
|
heap
|
page read and write
|
||
7C7000
|
heap
|
page read and write
|
||
1A757582000
|
heap
|
page read and write
|
||
1A7575A7000
|
heap
|
page read and write
|
||
172B08CE000
|
trusted library allocation
|
page read and write
|
||
229AF0B0000
|
heap
|
page read and write
|
||
1BAC9647000
|
heap
|
page read and write
|
||
172ABD00000
|
heap
|
page read and write
|
||
C36950A000
|
stack
|
page read and write
|
||
13251A10000
|
heap
|
page read and write
|
||
13900EE0000
|
heap
|
page read and write
|
||
11A99450000
|
heap
|
page read and write
|
||
830DA7F000
|
stack
|
page read and write
|
||
2285F9C0000
|
heap
|
page read and write
|
||
172AB502000
|
heap
|
page read and write
|
||
1A757A02000
|
heap
|
page read and write
|
||
32161FF000
|
stack
|
page read and write
|
||
1E92F900000
|
heap
|
page read and write
|
||
11EDD0AD000
|
heap
|
page read and write
|
||
172AB507000
|
heap
|
page read and write
|
||
1F75FA27000
|
heap
|
page read and write
|
||
23D4EBA0000
|
remote allocation
|
page read and write
|
||
1A75759C000
|
heap
|
page read and write
|
||
2390000
|
heap
|
page read and write
|
||
1F75FA87000
|
heap
|
page read and write
|
||
A64000
|
heap
|
page read and write
|
||
229AF323000
|
heap
|
page read and write
|
||
11EDD0B5000
|
heap
|
page read and write
|
||
1BAC9668000
|
heap
|
page read and write
|
||
1A7575A8000
|
heap
|
page read and write
|
||
1A756C50000
|
heap
|
page read and write
|
||
1A757575000
|
heap
|
page read and write
|
||
1F75F9BA000
|
heap
|
page read and write
|
||
46C000
|
unkown
|
page readonly
|
||
1E92F83C000
|
heap
|
page read and write
|
||
1F75F980000
|
heap
|
page read and write
|
||
172B0990000
|
trusted library allocation
|
page read and write
|
||
1F7603A1000
|
heap
|
page read and write
|
||
1BAC9643000
|
heap
|
page read and write
|
||
11EDE11B000
|
heap
|
page read and write
|
||
830D57B000
|
stack
|
page read and write
|
||
1C9BDA10000
|
heap
|
page read and write
|
||
172AB4FD000
|
heap
|
page read and write
|
||
1BEA17C000
|
stack
|
page read and write
|
||
172AB4FD000
|
heap
|
page read and write
|
||
9138CFE000
|
stack
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
11EDE000000
|
heap
|
page read and write
|
||
830D97E000
|
stack
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
32162FF000
|
stack
|
page read and write
|
||
1A757A1A000
|
heap
|
page read and write
|
||
3E4AE7A000
|
stack
|
page read and write
|
||
1F75FA04000
|
heap
|
page read and write
|
||
2158AAAE000
|
heap
|
page read and write
|
||
1E92F720000
|
heap
|
page read and write
|
||
13251C6D000
|
heap
|
page read and write
|
||
2158AAC6000
|
heap
|
page read and write
|
||
46C000
|
unkown
|
page readonly
|
||
20558450000
|
heap
|
page read and write
|
||
1A757A1A000
|
heap
|
page read and write
|
||
1A756D13000
|
heap
|
page read and write
|
||
172B0B02000
|
heap
|
page read and write
|
||
534C87E000
|
stack
|
page read and write
|
||
2055848A000
|
heap
|
page read and write
|
||
172AB46E000
|
heap
|
page read and write
|
||
11EDD90E000
|
heap
|
page read and write
|
||
11EDD06D000
|
heap
|
page read and write
|
||
1FC9D868000
|
heap
|
page read and write
|
||
20558448000
|
heap
|
page read and write
|
||
172B08E4000
|
trusted library allocation
|
page read and write
|
||
229AF301000
|
heap
|
page read and write
|
||
172ABD59000
|
heap
|
page read and write
|
||
172B07B0000
|
trusted library allocation
|
page read and write
|
||
172ABBC0000
|
trusted library allocation
|
page read and write
|
||
980C4FE000
|
stack
|
page read and write
|
||
172B09E0000
|
trusted library allocation
|
page read and write
|
||
1BAC9677000
|
heap
|
page read and write
|
||
1E92F85E000
|
heap
|
page read and write
|
||
33283FA000
|
stack
|
page read and write
|
||
1F760030000
|
remote allocation
|
page read and write
|
||
1E92F7B0000
|
trusted library allocation
|
page read and write
|
||
1A756CAC000
|
heap
|
page read and write
|
||
1A757598000
|
heap
|
page read and write
|
||
734B0000
|
unkown
|
page readonly
|
||
13900E80000
|
heap
|
page read and write
|
||
172ABC00000
|
heap
|
page read and write
|
||
CFB95FE000
|
stack
|
page read and write
|
||
1A757587000
|
heap
|
page read and write
|
||
1F75FA87000
|
heap
|
page read and write
|
||
CFB91FE000
|
stack
|
page read and write
|
||
1FC9DE60000
|
trusted library allocation
|
page read and write
|
||
1E92F902000
|
heap
|
page read and write
|
||
18323FF000
|
stack
|
page read and write
|
||
1FC9D87F000
|
heap
|
page read and write
|
||
1F75FA27000
|
heap
|
page read and write
|
||
3E4AEFE000
|
stack
|
page read and write
|
||
1A757584000
|
heap
|
page read and write
|
||
20558402000
|
heap
|
page read and write
|
||
2158AA09000
|
heap
|
page read and write
|
||
172B0C20000
|
remote allocation
|
page read and write
|
||
229AF332000
|
heap
|
page read and write
|
||
1A756D02000
|
heap
|
page read and write
|
||
987287B000
|
stack
|
page read and write
|
||
11EDD1B8000
|
heap
|
page read and write
|
||
1FC9E002000
|
trusted library allocation
|
page read and write
|
||
98726F9000
|
stack
|
page read and write
|
||
172AB49E000
|
heap
|
page read and write
|
||
11A994B0000
|
heap
|
page read and write
|
||
1E930002000
|
trusted library allocation
|
page read and write
|
||
1BAC9641000
|
heap
|
page read and write
|
||
20558500000
|
heap
|
page read and write
|
||
1A7575A9000
|
heap
|
page read and write
|
||
11EDD081000
|
heap
|
page read and write
|
||
11EDE043000
|
heap
|
page read and write
|
||
1BAC9658000
|
heap
|
page read and write
|
||
1390105D000
|
heap
|
page read and write
|
||
2158AA50000
|
trusted library allocation
|
page read and write
|
||
1BAC9676000
|
heap
|
page read and write
|
||
172AB400000
|
heap
|
page read and write
|
||
13901100000
|
heap
|
page read and write
|
||
172ABBD0000
|
trusted library allocation
|
page read and write
|
||
1F75F9F4000
|
heap
|
page read and write
|
||
11EDD000000
|
heap
|
page read and write
|
||
1E92F913000
|
heap
|
page read and write
|
||
172AB413000
|
heap
|
page read and write
|
||
172ABD04000
|
heap
|
page read and write
|
||
23D4EBA0000
|
remote allocation
|
page read and write
|
||
2285FC5B000
|
heap
|
page read and write
|
||
11EDD060000
|
heap
|
page read and write
|
||
1F75F9CC000
|
heap
|
page read and write
|
||
11EDD037000
|
heap
|
page read and write
|
||
11EDD04A000
|
heap
|
page read and write
|
||
2158B560000
|
trusted library allocation
|
page read and write
|
||
172B0A89000
|
heap
|
page read and write
|
||
1E92F800000
|
heap
|
page read and write
|
||
11A99430000
|
heap
|
page read and write
|
||
33286FA000
|
stack
|
page read and write
|
||
1A7575A8000
|
heap
|
page read and write
|
||
1A757583000
|
heap
|
page read and write
|
||
1F75F9ED000
|
heap
|
page read and write
|
||
1A757A00000
|
heap
|
page read and write
|
||
1A756C3C000
|
heap
|
page read and write
|
||
1E92F908000
|
heap
|
page read and write
|
||
172B0A49000
|
heap
|
page read and write
|
||
1BEA27F000
|
stack
|
page read and write
|
||
1A7575A4000
|
heap
|
page read and write
|
||
172AB260000
|
heap
|
page read and write
|
||
11EDD0C3000
|
heap
|
page read and write
|
||
1F75F9E4000
|
heap
|
page read and write
|
||
11EDE054000
|
heap
|
page read and write
|
||
1BAC9646000
|
heap
|
page read and write
|
||
172AB3F3000
|
trusted library allocation
|
page read and write
|
||
229AF200000
|
heap
|
page read and write
|
||
11EDD068000
|
heap
|
page read and write
|
||
1E92F849000
|
heap
|
page read and write
|
||
1A757585000
|
heap
|
page read and write
|
||
229AF317000
|
heap
|
page read and write
|
||
229AF595000
|
heap
|
page read and write
|
||
1928CFF000
|
stack
|
page read and write
|
||
20558502000
|
heap
|
page read and write
|
||
11EDE01D000
|
heap
|
page read and write
|
||
1BAC95B0000
|
trusted library allocation
|
page read and write
|
||
1F75F9E4000
|
heap
|
page read and write
|
||
32160F7000
|
stack
|
page read and write
|
||
23D4EC02000
|
heap
|
page read and write
|
||
172B08E0000
|
trusted library allocation
|
page read and write
|
||
1A757598000
|
heap
|
page read and write
|
||
1FC9D824000
|
heap
|
page read and write
|
||
830DB7E000
|
stack
|
page read and write
|
||
2158AA00000
|
heap
|
page read and write
|
||
11EDD09E000
|
heap
|
page read and write
|
||
1A757582000
|
heap
|
page read and write
|
||
3E4B1FF000
|
stack
|
page read and write
|
||
1A757575000
|
heap
|
page read and write
|
||
172B09B0000
|
trusted library allocation
|
page read and write
|
||
1BAC9633000
|
heap
|
page read and write
|
||
1A75757D000
|
heap
|
page read and write
|
||
172AB502000
|
heap
|
page read and write
|
||
2055847E000
|
heap
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
2285FA30000
|
heap
|
page read and write
|
||
951230C000
|
stack
|
page read and write
|
||
1F7603A0000
|
heap
|
page read and write
|
||
2158AA30000
|
trusted library allocation
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
5D62FFF000
|
stack
|
page read and write
|
||
1A757A02000
|
heap
|
page read and write
|
||
1A757571000
|
heap
|
page read and write
|
||
1FC9D83C000
|
heap
|
page read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
1A756A70000
|
heap
|
page read and write
|
||
1A7572F0000
|
remote allocation
|
page read and write
|
||
1A756C00000
|
heap
|
page read and write
|
||
700000
|
trusted library allocation
|
page read and write
|
||
1BAC963C000
|
heap
|
page read and write
|
||
1F75F9D3000
|
heap
|
page read and write
|
||
1E92F84D000
|
heap
|
page read and write
|
||
172B0A2D000
|
heap
|
page read and write
|
||
1F7603A2000
|
heap
|
page read and write
|
||
11EDD03A000
|
heap
|
page read and write
|
||
7E0000
|
heap
|
page read and write
|
||
2158B7A0000
|
trusted library allocation
|
page read and write
|
||
913850B000
|
stack
|
page read and write
|
||
2158B566000
|
trusted library allocation
|
page read and write
|
||
1BE9F7D000
|
stack
|
page read and write
|
||
13901113000
|
heap
|
page read and write
|
||
3215FFB000
|
stack
|
page read and write
|
||
1BEA07E000
|
stack
|
page read and write
|
||
9BEA1AE000
|
stack
|
page read and write
|
||
172B0AE5000
|
heap
|
page read and write
|
||
1A757575000
|
heap
|
page read and write
|
||
23D4ED02000
|
heap
|
page read and write
|
||
1E92F871000
|
heap
|
page read and write
|
||
1A757586000
|
heap
|
page read and write
|
||
172B0C00000
|
trusted library allocation
|
page read and write
|
||
229AF314000
|
heap
|
page read and write
|
||
27DF000
|
stack
|
page read and write
|
||
1A756C71000
|
heap
|
page read and write
|
||
1BAC964F000
|
heap
|
page read and write
|
||
1A756CC2000
|
heap
|
page read and write
|
||
1A757575000
|
heap
|
page read and write
|
||
7BE000
|
heap
|
page read and write
|
||
23D4EC5C000
|
heap
|
page read and write
|
||
830D67F000
|
stack
|
page read and write
|
||
1A757574000
|
heap
|
page read and write
|
||
172B08F0000
|
trusted library allocation
|
page read and write
|
||
2158AA20000
|
trusted library allocation
|
page read and write
|
||
1F75FA35000
|
heap
|
page read and write
|
||
1F75F9F4000
|
heap
|
page read and write
|
||
1A756C2C000
|
heap
|
page read and write
|
||
1BAC9520000
|
heap
|
page read and write
|
||
11EDD09B000
|
heap
|
page read and write
|
||
2285F9D0000
|
heap
|
page read and write
|
||
951287E000
|
stack
|
page read and write
|
||
1BE95BC000
|
stack
|
page read and write
|
||
172B0904000
|
trusted library allocation
|
page read and write
|
||
830D77B000
|
stack
|
page read and write
|
||
1FC9D902000
|
heap
|
page read and write
|
||
13251C3E000
|
heap
|
page read and write
|
||
534C77B000
|
stack
|
page read and write
|
||
1F75FA04000
|
heap
|
page read and write
|
||
172B08E1000
|
trusted library allocation
|
page read and write
|
||
5D62DFB000
|
stack
|
page read and write
|
||
11EDD9D9000
|
heap
|
page read and write
|
||
534C57B000
|
stack
|
page read and write
|
||
1A75756D000
|
heap
|
page read and write
|
||
3215A8B000
|
stack
|
page read and write
|
||
1C9BD9A0000
|
heap
|
page read and write
|
||
13901081000
|
heap
|
page read and write
|
||
172B08F0000
|
trusted library allocation
|
page read and write
|
||
1A757589000
|
heap
|
page read and write
|
||
13251C00000
|
heap
|
page read and write
|
||
172B0B02000
|
heap
|
page read and write
|
||
1A757594000
|
heap
|
page read and write
|
||
11EDD9F2000
|
heap
|
page read and write
|
||
1A757582000
|
heap
|
page read and write
|
||
1A75757F000
|
heap
|
page read and write
|
||
913887E000
|
stack
|
page read and write
|
||
830DC7F000
|
stack
|
page read and write
|
||
13251C13000
|
heap
|
page read and write
|
||
132519B0000
|
heap
|
page read and write
|
||
11EDE100000
|
heap
|
page read and write
|
||
1A757596000
|
heap
|
page read and write
|
There are 753 hidden memdumps, click here to show them.