IOC Report
PO64747835 PDF.exe

loading gif

Files

File Path
Type
Category
Malicious
PO64747835 PDF.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Bluetooth Suite help_ITA.chm
MS Windows HtmlHelp Data
dropped
C:\Users\user\AppData\Local\Temp\CDMDataEventHandler.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\RACOYIAN.hav
data
dropped
C:\Users\user\AppData\Local\Temp\foromtalers.Fid
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\libLerc.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\libenchant-2.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\msvcr100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nseD9AB.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\system-shutdown.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\zoom-out-symbolic.svg
SVG Scalable Vector Graphics image
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PO64747835 PDF.exe
"C:\Users\user\Desktop\PO64747835 PDF.exe"
malicious

URLs

Name
IP
Malicious
http://donaldtrumpverse.com/kOrg_stUoodKu54.bin
malicious
https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/sysInfoBase.schema.json
unknown
https://us1.api.ws-hp.com/clienttelemetry
unknown
https://stage-us1.api.ws-hp.com/clienttelemetry
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/originatorDetail.schema.json
unknown
https://pie-us1.api.ws-hp.com/clienttelemetry
unknown
https://schemaregistry.analysis.ext.hp.com/cdm/gun/com.hp.cdm.platform.software.domain.eventing.reso
unknown

IPs

IP
Domain
Country
Malicious
192.168.2.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\HAAND\Benfisken85
detaljeprojektets
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\PARANTHRACENE
INTERPELLATION
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Valeward72\esc
Transfixation98
HKEY_CURRENT_USER\Software\DOMMERASPIRANTER\ETHERIIDAE
internalising

Memdumps

Base Address
Regiontype
Protect
Malicious
2920000
direct allocation
page execute and read and write
malicious
2285FC13000
heap
page read and write
20558456000
heap
page read and write
1FC9D854000
heap
page read and write
20558508000
heap
page read and write
1A756CAB000
heap
page read and write
172AB4AE000
heap
page read and write
1BE9C7F000
stack
page read and write
980BD7C000
stack
page read and write
183247E000
stack
page read and write
2158AAA7000
heap
page read and write
1390105C000
heap
page read and write
1A757585000
heap
page read and write
172AB474000
heap
page read and write
172B0AA1000
heap
page read and write
1A757518000
heap
page read and write
11EDD0CD000
heap
page read and write
95127FB000
stack
page read and write
229AF331000
heap
page read and write
11EDE102000
heap
page read and write
172AB457000
heap
page read and write
172B0A87000
heap
page read and write
11EDD1E1000
heap
page read and write
1A75757F000
heap
page read and write
1A757582000
heap
page read and write
172B0C20000
remote allocation
page read and write
1A756CA4000
heap
page read and write
3328F7F000
stack
page read and write
1BAC965B000
heap
page read and write
11EDD07C000
heap
page read and write
1BAC9664000
heap
page read and write
1A757582000
heap
page read and write
1A757575000
heap
page read and write
1F7603A5000
heap
page read and write
C36958F000
stack
page read and write
1E92F710000
heap
page read and write
1A75751A000
heap
page read and write
1A757573000
heap
page read and write
1BAC9702000
heap
page read and write
172B09D0000
trusted library allocation
page read and write
1A756C87000
heap
page read and write
1A7575A8000
heap
page read and write
1F75F9ED000
heap
page read and write
1831FAB000
stack
page read and write
987277E000
stack
page read and write
9138AF9000
stack
page read and write
11EDD029000
heap
page read and write
1F75FA87000
heap
page read and write
11EDD195000
heap
page read and write
91389FF000
stack
page read and write
1A757572000
heap
page read and write
2285FD02000
heap
page read and write
172AC2E0000
trusted library allocation
page read and write
9BEA5FE000
stack
page read and write
232F000
stack
page read and write
20558471000
heap
page read and write
1A757582000
heap
page read and write
CFB92FC000
stack
page read and write
13252332000
heap
page read and write
11EDE113000
heap
page read and write
1BAC9629000
heap
page read and write
11EDD052000
heap
page read and write
172B0C20000
remote allocation
page read and write
1BAC966D000
heap
page read and write
13251CE0000
heap
page read and write
2158A970000
heap
page read and write
1FC9D879000
heap
page read and write
980C1FE000
stack
page read and write
1FC9D913000
heap
page read and write
1A757582000
heap
page read and write
172B07A0000
trusted library allocation
page read and write
2055843C000
heap
page read and write
172AB492000
heap
page read and write
1E92F882000
heap
page read and write
11EDD690000
trusted library allocation
page read and write
9BEA7FE000
stack
page read and write
172B0A54000
heap
page read and write
229AF314000
heap
page read and write
20558513000
heap
page read and write
11EDD02E000
heap
page read and write
172B0A18000
heap
page read and write
2158B790000
heap
page readonly
A50000
trusted library allocation
page read and write
229AF314000
heap
page read and write
9138BF7000
stack
page read and write
980C5FF000
stack
page read and write
132519A0000
heap
page read and write
3328C7B000
stack
page read and write
205583E0000
trusted library allocation
page read and write
205581B0000
heap
page read and write
13901013000
heap
page read and write
2285FD13000
heap
page read and write
1F75FBA5000
heap
page read and write
11EDD0C6000
heap
page read and write
9BEA6FE000
stack
page read and write
1A757575000
heap
page read and write
11EDD080000
heap
page read and write
1A757571000
heap
page read and write
172B09F0000
trusted library allocation
page read and write
CFB907C000
stack
page read and write
172B0B00000
heap
page read and write
172AB478000
heap
page read and write
C3698F8000
stack
page read and write
3E4AFFB000
stack
page read and write
20558400000
heap
page read and write
33282F7000
stack
page read and write
13251C88000
heap
page read and write
5F0000
heap
page read and write
1F75F9ED000
heap
page read and write
9138F7E000
unkown
page read and write
7DA000
heap
page read and write
1A757A02000
heap
page read and write
23D4F402000
trusted library allocation
page read and write
1E92F829000
heap
page read and write
1FC9D828000
heap
page read and write
11EDE002000
heap
page read and write
7EA000
heap
page read and write
1FC9D813000
heap
page read and write
1F75FA36000
heap
page read and write
172B0D10000
trusted library allocation
page read and write
431000
unkown
page read and write
1390105E000
heap
page read and write
11EDCFE0000
trusted library allocation
page read and write
1E92F85E000
heap
page read and write
20558413000
heap
page read and write
236D000
stack
page read and write
1A757A03000
heap
page read and write
42C000
unkown
page read and write
1F75F9E4000
heap
page read and write
1A75759A000
heap
page read and write
2F1E000
stack
page read and write
1A7572F0000
remote allocation
page read and write
1A757587000
heap
page read and write
2158AA05000
heap
page read and write
229AF323000
heap
page read and write
2158AAAE000
heap
page read and write
229AF306000
heap
page read and write
1A75756F000
heap
page read and write
3327F5F000
stack
page read and write
172AB360000
trusted library allocation
page read and write
11EDD095000
heap
page read and write
534C27C000
stack
page read and write
1C9BDA30000
heap
page read and write
C3699FF000
stack
page read and write
1BAC9680000
heap
page read and write
1A757586000
heap
page read and write
1A757588000
heap
page read and write
205581A0000
heap
page read and write
5D630FF000
stack
page read and write
1A75756D000
heap
page read and write
534C67E000
stack
page read and write
5D62A7B000
stack
page read and write
1A757587000
heap
page read and write
A60000
heap
page read and write
1A756C4C000
heap
page read and write
1BAC9679000
heap
page read and write
1A757577000
heap
page read and write
1A757574000
heap
page read and write
172ABC15000
heap
page read and write
830DD7F000
stack
page read and write
3215B0F000
stack
page read and write
1A756C4D000
heap
page read and write
229AF2F0000
heap
page read and write
1C9BDA75000
heap
page read and write
1BAC9662000
heap
page read and write
1FC9D860000
heap
page read and write
9872679000
stack
page read and write
1A75757A000
heap
page read and write
13901102000
heap
page read and write
1A757582000
heap
page read and write
229AF315000
heap
page read and write
2158AB60000
trusted library allocation
page read and write
1FC9D863000
heap
page read and write
172AC760000
trusted library allocation
page read and write
99000
stack
page read and write
1FC9D700000
heap
page read and write
46A000
unkown
page read and write
C369979000
stack
page read and write
33284FA000
stack
page read and write
13251CBA000
heap
page read and write
1A75754C000
heap
page read and write
401000
unkown
page execute read
1A757582000
heap
page read and write
1A757582000
heap
page read and write
1BAC9E02000
trusted library allocation
page read and write
13251CC9000
heap
page read and write
229AF306000
heap
page read and write
11EDD0C6000
heap
page read and write
1A757575000
heap
page read and write
1A757596000
heap
page read and write
1F75FA27000
heap
page read and write
1BAC9663000
heap
page read and write
11A994B8000
heap
page read and write
1A757575000
heap
page read and write
951277E000
stack
page read and write
2158AAAE000
heap
page read and write
11EDD046000
heap
page read and write
2158B800000
trusted library allocation
page read and write
13900E70000
heap
page read and write
1E92F780000
heap
page read and write
13252300000
heap
page read and write
980C17B000
stack
page read and write
1E92F876000
heap
page read and write
172B08C0000
trusted library allocation
page read and write
11EDD03C000
heap
page read and write
C369A7C000
stack
page read and write
9138DF7000
stack
page read and write
C36987F000
stack
page read and write
1A756BD0000
trusted library allocation
page read and write
5D62AFE000
stack
page read and write
11EDCE80000
heap
page read and write
1BE9CFC000
stack
page read and write
172ABD18000
heap
page read and write
13251D02000
heap
page read and write
28A0000
trusted library allocation
page read and write
13901054000
heap
page read and write
2158A840000
trusted library allocation
page read and write
11EDD802000
heap
page read and write
1A75759A000
heap
page read and write
440000
unkown
page read and write
172B0A10000
trusted library allocation
page read and write
23D4EC29000
heap
page read and write
1F75F8F0000
heap
page read and write
1A757575000
heap
page read and write
3E4B17E000
stack
page read and write
2158A990000
heap
page read and write
172B0A61000
heap
page read and write
1A756CC9000
heap
page read and write
980C07E000
stack
page read and write
23D4EAD0000
heap
page read and write
1A75759A000
heap
page read and write
1BAC963E000
heap
page read and write
1F75F9F4000
heap
page read and write
1FC9D6A0000
heap
page read and write
1F75FA8E000
heap
page read and write
11EDD961000
heap
page read and write
23D4EC00000
heap
page read and write
1A75756F000
heap
page read and write
1A75758F000
heap
page read and write
11EDCEE0000
heap
page read and write
11EDD013000
heap
page read and write
3E4B0FD000
stack
page read and write
1A757575000
heap
page read and write
3328D7C000
stack
page read and write
1FC9D800000
heap
page read and write
1BAC9626000
heap
page read and write
980C3F7000
stack
page read and write
2158AA60000
heap
page read and write
1A757571000
heap
page read and write
1A757578000
heap
page read and write
1F75F9E4000
heap
page read and write
913897C000
stack
page read and write
408000
unkown
page readonly
1BAC9580000
heap
page read and write
33285FE000
stack
page read and write
913858E000
stack
page read and write
1A756CEA000
heap
page read and write
1A757583000
heap
page read and write
9138EF8000
stack
page read and write
1A7575DB000
heap
page read and write
13251BE0000
trusted library allocation
page read and write
1A756C13000
heap
page read and write
172B0A20000
trusted library allocation
page read and write
830DE7F000
stack
page read and write
2285FC3F000
heap
page read and write
11A99755000
heap
page read and write
1BE99FC000
stack
page read and write
1BAC9660000
heap
page read and write
229AF319000
heap
page read and write
1F75F9D1000
heap
page read and write
408000
unkown
page readonly
1A757582000
heap
page read and write
1A756C29000
heap
page read and write
1E92F877000
heap
page read and write
20558210000
heap
page read and write
1A757A02000
heap
page read and write
1F75F9A0000
heap
page read and write
172B0A82000
heap
page read and write
1A757582000
heap
page read and write
172ABD02000
heap
page read and write
1C9BDACB000
heap
page read and write
172B0990000
trusted library allocation
page read and write
1F760030000
remote allocation
page read and write
1F75F960000
heap
page read and write
1A7575A9000
heap
page read and write
23D4EC13000
heap
page read and write
11EDE00A000
heap
page read and write
11EDD0E6000
heap
page read and write
20558A02000
trusted library allocation
page read and write
2158AABE000
heap
page read and write
9BEA8FF000
stack
page read and write
172B0A3C000
heap
page read and write
22860202000
trusted library allocation
page read and write
1BAC9613000
heap
page read and write
2285FC2A000
heap
page read and write
13251CC2000
heap
page read and write
1BE9DFD000
stack
page read and write
1A7575BA000
heap
page read and write
3215B8F000
stack
page read and write
11EDD05E000
heap
page read and write
13901108000
heap
page read and write
1A757594000
heap
page read and write
13901060000
heap
page read and write
1A75757E000
heap
page read and write
1A75757F000
heap
page read and write
2285FC77000
heap
page read and write
5D62EF7000
stack
page read and write
23D4EC3D000
heap
page read and write
1BAC965D000
heap
page read and write
1A757521000
heap
page read and write
11EDD089000
heap
page read and write
1A757594000
heap
page read and write
980BDFF000
stack
page read and write
1A757582000
heap
page read and write
172B0AFA000
heap
page read and write
1BAC967C000
heap
page read and write
11EDD938000
heap
page read and write
172B0AFC000
heap
page read and write
172AB1F0000
heap
page read and write
183237F000
stack
page read and write
1A757575000
heap
page read and write
1F760030000
remote allocation
page read and write
172B08C8000
trusted library allocation
page read and write
192887E000
stack
page read and write
2285FC6C000
heap
page read and write
2285FC00000
heap
page read and write
13901002000
heap
page read and write
13251CE6000
heap
page read and write
CFB96FD000
stack
page read and write
1FC9D802000
heap
page read and write
1390108A000
heap
page read and write
172B0AF4000
heap
page read and write
1A756CB0000
heap
page read and write
1928B7E000
stack
page read and write
734B1000
unkown
page execute read
1FC9D900000
heap
page read and write
11EDD90C000
heap
page read and write
1BAC967D000
heap
page read and write
11EDD1FD000
heap
page read and write
98727F9000
stack
page read and write
1A756CE4000
heap
page read and write
33287FB000
stack
page read and write
23D4EBA0000
remote allocation
page read and write
5D62B7E000
stack
page read and write
1A756CF9000
heap
page read and write
1A756D16000
heap
page read and write
CFB957D000
stack
page read and write
1BAC9661000
heap
page read and write
1C9BDA70000
heap
page read and write
1E92F84F000
heap
page read and write
1A756AD0000
heap
page read and write
23D4EAE0000
heap
page read and write
23D4EC58000
heap
page read and write
229AF590000
heap
page read and write
23D4EB40000
heap
page read and write
CFB937E000
stack
page read and write
1BAC9510000
heap
page read and write
172B0ADC000
heap
page read and write
1F75FA04000
heap
page read and write
13901802000
trusted library allocation
page read and write
192837B000
stack
page read and write
1A757A20000
heap
page read and write
1A757577000
heap
page read and write
1C9BDAC0000
heap
page read and write
172ABC02000
heap
page read and write
11EDD0DF000
heap
page read and write
172AB43D000
heap
page read and write
1A757575000
heap
page read and write
1BAC9666000
heap
page read and write
1BAC966F000
heap
page read and write
2158AA68000
heap
page read and write
172B0D30000
trusted library allocation
page read and write
3215EFB000
stack
page read and write
1F75FA07000
heap
page read and write
987247B000
stack
page read and write
2158AAB0000
heap
page read and write
13901045000
heap
page read and write
1A757586000
heap
page read and write
3E4B07C000
stack
page read and write
22860190000
trusted library allocation
page read and write
172B0A20000
heap
page read and write
229AF318000
heap
page read and write
229AF1E0000
heap
page read and write
23D4EC5A000
heap
page read and write
1A757575000
heap
page read and write
172AB426000
heap
page read and write
830D10B000
stack
page read and write
1A756A60000
heap
page read and write
1A75759A000
heap
page read and write
1F75FA0C000
heap
page read and write
30000
heap
page read and write
1F75FA04000
heap
page read and write
1BE9B7F000
stack
page read and write
1390105F000
heap
page read and write
23D4EB70000
trusted library allocation
page read and write
1F75F9F4000
heap
page read and write
1A757A02000
heap
page read and write
2158B7B0000
trusted library allocation
page read and write
13901000000
heap
page read and write
172AB4BB000
heap
page read and write
1F75FA87000
heap
page read and write
1A757A02000
heap
page read and write
1A7572F0000
remote allocation
page read and write
13251CCB000
heap
page read and write
172AB3F0000
trusted library allocation
page read and write
1F75F9ED000
heap
page read and write
11EDD913000
heap
page read and write
11A99300000
heap
page read and write
1A757587000
heap
page read and write
192877C000
stack
page read and write
1A757581000
heap
page read and write
172AB48C000
heap
page read and write
1928A7F000
stack
page read and write
1E92F854000
heap
page read and write
1BAC9659000
heap
page read and write
1BAC9600000
heap
page read and write
1A7575A9000
heap
page read and write
13901062000
heap
page read and write
5D62CFF000
stack
page read and write
1A757402000
heap
page read and write
1A756D08000
heap
page read and write
172AB514000
heap
page read and write
1BE9E7C000
stack
page read and write
1A757597000
heap
page read and write
1A757575000
heap
page read and write
734B4000
unkown
page readonly
1E92F813000
heap
page read and write
7CB000
heap
page read and write
172ABD18000
heap
page read and write
980C2FB000
stack
page read and write
40D000
unkown
page read and write
11EDE002000
heap
page read and write
13252202000
heap
page read and write
1A7575CC000
heap
page read and write
1A757586000
heap
page read and write
11EDCE90000
heap
page read and write
172AB200000
heap
page read and write
11EDD933000
heap
page read and write
172B0900000
trusted library allocation
page read and write
1A757500000
heap
page read and write
1928C7A000
stack
page read and write
1A757582000
heap
page read and write
77E000
stack
page read and write
9BEA47E000
stack
page read and write
1F75FBA0000
heap
page read and write
1F75F9A8000
heap
page read and write
1928979000
stack
page read and write
2158A830000
heap
page read and write
1F75F9D3000
heap
page read and write
9BEA12C000
stack
page read and write
11EDD900000
heap
page read and write
20558424000
heap
page read and write
11A99750000
heap
page read and write
1A756C4E000
heap
page read and write
1BAC9686000
heap
page read and write
11EDE071000
heap
page read and write
1A756CB6000
heap
page read and write
40A000
unkown
page write copy
13901029000
heap
page read and write
13900FE0000
trusted library allocation
page read and write
2158AA10000
trusted library allocation
page read and write
1A75757F000
heap
page read and write
172B0A00000
heap
page read and write
3E4AF7F000
stack
page read and write
9DE000
stack
page read and write
172ABD13000
heap
page read and write
1A75759A000
heap
page read and write
172ABD59000
heap
page read and write
400000
unkown
page readonly
172B0990000
trusted library allocation
page read and write
172B0AE2000
heap
page read and write
401000
unkown
page execute read
7DD000
heap
page read and write
1F75FA91000
heap
page read and write
1390103C000
heap
page read and write
1BAC966B000
heap
page read and write
790000
heap
page read and write
229AF323000
heap
page read and write
1A757599000
heap
page read and write
3327EDB000
stack
page read and write
20558449000
heap
page read and write
1BAC9648000
heap
page read and write
13251C29000
heap
page read and write
A86000
heap
page read and write
23D4EC23000
heap
page read and write
798000
heap
page read and write
172AB429000
heap
page read and write
1A7575BD000
heap
page read and write
1A757582000
heap
page read and write
11EDD113000
heap
page read and write
1A757581000
heap
page read and write
13251D13000
heap
page read and write
734B6000
unkown
page readonly
1A757575000
heap
page read and write
172B08C0000
trusted library allocation
page read and write
1A757A02000
heap
page read and write
1A75757F000
heap
page read and write
1FC9D690000
heap
page read and write
2285FC02000
heap
page read and write
1A757575000
heap
page read and write
7C7000
heap
page read and write
1A757582000
heap
page read and write
1A7575A7000
heap
page read and write
172B08CE000
trusted library allocation
page read and write
229AF0B0000
heap
page read and write
1BAC9647000
heap
page read and write
172ABD00000
heap
page read and write
C36950A000
stack
page read and write
13251A10000
heap
page read and write
13900EE0000
heap
page read and write
11A99450000
heap
page read and write
830DA7F000
stack
page read and write
2285F9C0000
heap
page read and write
172AB502000
heap
page read and write
1A757A02000
heap
page read and write
32161FF000
stack
page read and write
1E92F900000
heap
page read and write
11EDD0AD000
heap
page read and write
172AB507000
heap
page read and write
1F75FA27000
heap
page read and write
23D4EBA0000
remote allocation
page read and write
1A75759C000
heap
page read and write
2390000
heap
page read and write
1F75FA87000
heap
page read and write
A64000
heap
page read and write
229AF323000
heap
page read and write
11EDD0B5000
heap
page read and write
1BAC9668000
heap
page read and write
1A7575A8000
heap
page read and write
1A756C50000
heap
page read and write
1A757575000
heap
page read and write
1F75F9BA000
heap
page read and write
46C000
unkown
page readonly
1E92F83C000
heap
page read and write
1F75F980000
heap
page read and write
172B0990000
trusted library allocation
page read and write
1F7603A1000
heap
page read and write
1BAC9643000
heap
page read and write
11EDE11B000
heap
page read and write
830D57B000
stack
page read and write
1C9BDA10000
heap
page read and write
172AB4FD000
heap
page read and write
1BEA17C000
stack
page read and write
172AB4FD000
heap
page read and write
9138CFE000
stack
page read and write
19A000
stack
page read and write
11EDE000000
heap
page read and write
830D97E000
stack
page read and write
40A000
unkown
page read and write
32162FF000
stack
page read and write
1A757A1A000
heap
page read and write
3E4AE7A000
stack
page read and write
1F75FA04000
heap
page read and write
2158AAAE000
heap
page read and write
1E92F720000
heap
page read and write
13251C6D000
heap
page read and write
2158AAC6000
heap
page read and write
46C000
unkown
page readonly
20558450000
heap
page read and write
1A757A1A000
heap
page read and write
1A756D13000
heap
page read and write
172B0B02000
heap
page read and write
534C87E000
stack
page read and write
2055848A000
heap
page read and write
172AB46E000
heap
page read and write
11EDD90E000
heap
page read and write
11EDD06D000
heap
page read and write
1FC9D868000
heap
page read and write
20558448000
heap
page read and write
172B08E4000
trusted library allocation
page read and write
229AF301000
heap
page read and write
172ABD59000
heap
page read and write
172B07B0000
trusted library allocation
page read and write
172ABBC0000
trusted library allocation
page read and write
980C4FE000
stack
page read and write
172B09E0000
trusted library allocation
page read and write
1BAC9677000
heap
page read and write
1E92F85E000
heap
page read and write
33283FA000
stack
page read and write
1F760030000
remote allocation
page read and write
1E92F7B0000
trusted library allocation
page read and write
1A756CAC000
heap
page read and write
1A757598000
heap
page read and write
734B0000
unkown
page readonly
13900E80000
heap
page read and write
172ABC00000
heap
page read and write
CFB95FE000
stack
page read and write
1A757587000
heap
page read and write
1F75FA87000
heap
page read and write
CFB91FE000
stack
page read and write
1FC9DE60000
trusted library allocation
page read and write
1E92F902000
heap
page read and write
18323FF000
stack
page read and write
1FC9D87F000
heap
page read and write
1F75FA27000
heap
page read and write
3E4AEFE000
stack
page read and write
1A757584000
heap
page read and write
20558402000
heap
page read and write
2158AA09000
heap
page read and write
172B0C20000
remote allocation
page read and write
229AF332000
heap
page read and write
1A756D02000
heap
page read and write
987287B000
stack
page read and write
11EDD1B8000
heap
page read and write
1FC9E002000
trusted library allocation
page read and write
98726F9000
stack
page read and write
172AB49E000
heap
page read and write
11A994B0000
heap
page read and write
1E930002000
trusted library allocation
page read and write
1BAC9641000
heap
page read and write
20558500000
heap
page read and write
1A7575A9000
heap
page read and write
11EDD081000
heap
page read and write
11EDE043000
heap
page read and write
1BAC9658000
heap
page read and write
1390105D000
heap
page read and write
2158AA50000
trusted library allocation
page read and write
1BAC9676000
heap
page read and write
172AB400000
heap
page read and write
13901100000
heap
page read and write
172ABBD0000
trusted library allocation
page read and write
1F75F9F4000
heap
page read and write
11EDD000000
heap
page read and write
1E92F913000
heap
page read and write
172AB413000
heap
page read and write
172ABD04000
heap
page read and write
23D4EBA0000
remote allocation
page read and write
2285FC5B000
heap
page read and write
11EDD060000
heap
page read and write
1F75F9CC000
heap
page read and write
11EDD037000
heap
page read and write
11EDD04A000
heap
page read and write
2158B560000
trusted library allocation
page read and write
172B0A89000
heap
page read and write
1E92F800000
heap
page read and write
11A99430000
heap
page read and write
33286FA000
stack
page read and write
1A7575A8000
heap
page read and write
1A757583000
heap
page read and write
1F75F9ED000
heap
page read and write
1A757A00000
heap
page read and write
1A756C3C000
heap
page read and write
1E92F908000
heap
page read and write
172B0A49000
heap
page read and write
1BEA27F000
stack
page read and write
1A7575A4000
heap
page read and write
172AB260000
heap
page read and write
11EDD0C3000
heap
page read and write
1F75F9E4000
heap
page read and write
11EDE054000
heap
page read and write
1BAC9646000
heap
page read and write
172AB3F3000
trusted library allocation
page read and write
229AF200000
heap
page read and write
11EDD068000
heap
page read and write
1E92F849000
heap
page read and write
1A757585000
heap
page read and write
229AF317000
heap
page read and write
229AF595000
heap
page read and write
1928CFF000
stack
page read and write
20558502000
heap
page read and write
11EDE01D000
heap
page read and write
1BAC95B0000
trusted library allocation
page read and write
1F75F9E4000
heap
page read and write
32160F7000
stack
page read and write
23D4EC02000
heap
page read and write
172B08E0000
trusted library allocation
page read and write
1A757598000
heap
page read and write
1FC9D824000
heap
page read and write
830DB7E000
stack
page read and write
2158AA00000
heap
page read and write
11EDD09E000
heap
page read and write
1A757582000
heap
page read and write
3E4B1FF000
stack
page read and write
1A757575000
heap
page read and write
172B09B0000
trusted library allocation
page read and write
1BAC9633000
heap
page read and write
1A75757D000
heap
page read and write
172AB502000
heap
page read and write
2055847E000
heap
page read and write
400000
unkown
page readonly
2285FA30000
heap
page read and write
951230C000
stack
page read and write
1F7603A0000
heap
page read and write
2158AA30000
trusted library allocation
page read and write
A80000
heap
page read and write
5D62FFF000
stack
page read and write
1A757A02000
heap
page read and write
1A757571000
heap
page read and write
1FC9D83C000
heap
page read and write
A70000
trusted library allocation
page read and write
1A756A70000
heap
page read and write
1A7572F0000
remote allocation
page read and write
1A756C00000
heap
page read and write
700000
trusted library allocation
page read and write
1BAC963C000
heap
page read and write
1F75F9D3000
heap
page read and write
1E92F84D000
heap
page read and write
172B0A2D000
heap
page read and write
1F7603A2000
heap
page read and write
11EDD03A000
heap
page read and write
7E0000
heap
page read and write
2158B7A0000
trusted library allocation
page read and write
913850B000
stack
page read and write
2158B566000
trusted library allocation
page read and write
1BE9F7D000
stack
page read and write
13901113000
heap
page read and write
3215FFB000
stack
page read and write
1BEA07E000
stack
page read and write
9BEA1AE000
stack
page read and write
172B0AE5000
heap
page read and write
1A757575000
heap
page read and write
23D4ED02000
heap
page read and write
1E92F871000
heap
page read and write
1A757586000
heap
page read and write
172B0C00000
trusted library allocation
page read and write
229AF314000
heap
page read and write
27DF000
stack
page read and write
1A756C71000
heap
page read and write
1BAC964F000
heap
page read and write
1A756CC2000
heap
page read and write
1A757575000
heap
page read and write
7BE000
heap
page read and write
23D4EC5C000
heap
page read and write
830D67F000
stack
page read and write
1A757574000
heap
page read and write
172B08F0000
trusted library allocation
page read and write
2158AA20000
trusted library allocation
page read and write
1F75FA35000
heap
page read and write
1F75F9F4000
heap
page read and write
1A756C2C000
heap
page read and write
1BAC9520000
heap
page read and write
11EDD09B000
heap
page read and write
2285F9D0000
heap
page read and write
951287E000
stack
page read and write
1BE95BC000
stack
page read and write
172B0904000
trusted library allocation
page read and write
830D77B000
stack
page read and write
1FC9D902000
heap
page read and write
13251C3E000
heap
page read and write
534C77B000
stack
page read and write
1F75FA04000
heap
page read and write
172B08E1000
trusted library allocation
page read and write
5D62DFB000
stack
page read and write
11EDD9D9000
heap
page read and write
534C57B000
stack
page read and write
1A75756D000
heap
page read and write
3215A8B000
stack
page read and write
1C9BD9A0000
heap
page read and write
13901081000
heap
page read and write
172B08F0000
trusted library allocation
page read and write
1A757589000
heap
page read and write
13251C00000
heap
page read and write
172B0B02000
heap
page read and write
1A757594000
heap
page read and write
11EDD9F2000
heap
page read and write
1A757582000
heap
page read and write
1A75757F000
heap
page read and write
913887E000
stack
page read and write
830DC7F000
stack
page read and write
13251C13000
heap
page read and write
132519B0000
heap
page read and write
11EDE100000
heap
page read and write
1A757596000
heap
page read and write
There are 753 hidden memdumps, click here to show them.