IOC Report
SCAN Swift 054545676700000000000000001.exe

loading gif

Files

File Path
Type
Category
Malicious
SCAN Swift 054545676700000000000000001.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Bllebrs.bar
ASCII text, with very long lines, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\Bluetooth Suite help_ITA.chm
MS Windows HtmlHelp Data
dropped
C:\Users\user\AppData\Local\Temp\CDMDataEventHandler.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\Pressekonferencens.maa
data
dropped
C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\libLerc.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\libenchant-2.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\msvcr100.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsy907D.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\system-shutdown.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\zoom-out-symbolic.svg
SVG Scalable Vector Graphics image
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe
"C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe"
malicious

URLs

Name
IP
Malicious
http://donaldtrumpverse.com/HUMBLE%202022_esIXilivcW48.bin
malicious
https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/sysInfoBase.schema.json
unknown
https://us1.api.ws-hp.com/clienttelemetry
unknown
https://stage-us1.api.ws-hp.com/clienttelemetry
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/originatorDetail.schema.json
unknown
https://pie-us1.api.ws-hp.com/clienttelemetry
unknown
https://schemaregistry.analysis.ext.hp.com/cdm/gun/com.hp.cdm.platform.software.domain.eventing.reso
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\HAAND\Benfisken85
detaljeprojektets
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\PARANTHRACENE
INTERPELLATION
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Valeward72\esc
Transfixation98
HKEY_CURRENT_USER\Software\DOMMERASPIRANTER\ETHERIIDAE
internalising

Memdumps

Base Address
Regiontype
Protect
Malicious
28E0000
direct allocation
page execute and read and write
malicious
2BF3ED07000
heap
page read and write
20335265000
heap
page read and write
52F239E000
stack
page read and write
1B55E8E0000
heap
page read and write
2033523E000
heap
page read and write
2BF440F9000
heap
page read and write
1FCF9415000
heap
page read and write
2F1E000
stack
page read and write
180AD282000
heap
page read and write
1CDCA8AE000
heap
page read and write
17900F55000
heap
page read and write
24492CD9000
heap
page read and write
FC9E7F000
stack
page read and write
2BF3ED02000
heap
page read and write
1FCF9640000
heap
page read and write
2BF3F215000
heap
page read and write
61CC8FB000
stack
page read and write
1B55E829000
heap
page read and write
FC9CF7000
stack
page read and write
1FCF9401000
heap
page read and write
1FCF9448000
heap
page read and write
25DBD7E0000
trusted library allocation
page read and write
2BF440A3000
heap
page read and write
236DA03C000
heap
page read and write
2BF44400000
remote allocation
page read and write
1FCF94A3000
heap
page read and write
1CDCB167000
heap
page read and write
180ADB3C000
heap
page read and write
236DA071000
heap
page read and write
236DA04C000
heap
page read and write
46C000
unkown
page readonly
15599FC0000
remote allocation
page read and write
1B204600000
heap
page read and write
2BF4402D000
heap
page read and write
236D9E70000
heap
page read and write
180AD29A000
heap
page read and write
431000
unkown
page read and write
1CDCA83A000
heap
page read and write
61CCA7E000
stack
page read and write
1559A023000
heap
page read and write
2BF44400000
remote allocation
page read and write
17900CA7000
heap
page read and write
2BF4430E000
trusted library allocation
page read and write
520000
trusted library allocation
page read and write
1CDCB1B6000
heap
page read and write
24492920000
heap
page read and write
A2E000
stack
page read and write
1FCF94A1000
heap
page read and write
1CDCA902000
heap
page read and write
2033523C000
heap
page read and write
1CDCB17B000
heap
page read and write
180AE313000
heap
page read and write
40A000
unkown
page write copy
1FCF93FC000
heap
page read and write
180AE202000
heap
page read and write
25DBE002000
trusted library allocation
page read and write
1CDCB193000
heap
page read and write
1CDCB602000
heap
page read and write
2BF440FE000
heap
page read and write
24492990000
heap
page read and write
2BF3F358000
heap
page read and write
1CDCB185000
heap
page read and write
2BF443C0000
trusted library allocation
page read and write
1CDCB193000
heap
page read and write
1905EA02000
trusted library allocation
page read and write
180AD395000
heap
page read and write
290DD6A000
stack
page read and write
20335229000
heap
page read and write
1CDCB125000
heap
page read and write
1B204E02000
trusted library allocation
page read and write
25DBD88A000
heap
page read and write
1CDCB11B000
heap
page read and write
22CD2FA000
stack
page read and write
1CDCA871000
heap
page read and write
2033525D000
heap
page read and write
F3E6B7A000
stack
page read and write
2BF443D0000
trusted library allocation
page read and write
3C86C7F000
stack
page read and write
2BF3EC29000
heap
page read and write
232CEAC0000
heap
page read and write
1CDCA83C000
heap
page read and write
2BF3F1A0000
trusted library allocation
page read and write
2BF4404F000
heap
page read and write
633000
heap
page read and write
52F2BF8000
stack
page read and write
1FCF94BA000
heap
page read and write
180AD23C000
heap
page read and write
1FCF946B000
heap
page read and write
B7E9FBE000
stack
page read and write
1CDCB1C4000
heap
page read and write
A21F8FE000
stack
page read and write
2033526B000
heap
page read and write
52F2AFE000
stack
page read and write
1CDCA916000
heap
page read and write
17900F50000
heap
page read and write
25DBD871000
heap
page read and write
24492A3B000
heap
page read and write
25DBD84E000
heap
page read and write
1CDCA8FE000
heap
page read and write
180AE200000
heap
page read and write
180AE300000
heap
page read and write
1CDCB184000
heap
page read and write
30000
heap
page read and write
1CDCB602000
heap
page read and write
1CDCB174000
heap
page read and write
25DBD858000
heap
page read and write
180AD020000
heap
page read and write
1CDCB1A4000
heap
page read and write
1CDCB193000
heap
page read and write
F58F17B000
stack
page read and write
180AE202000
heap
page read and write
1CDCB002000
heap
page read and write
20335880000
trusted library allocation
page read and write
244938F0000
trusted library allocation
page read and write
1CDCB602000
heap
page read and write
1FCF9610000
remote allocation
page read and write
180AE302000
heap
page read and write
2350000
heap
page read and write
1FCF9610000
remote allocation
page read and write
28FCFC68000
heap
page read and write
1CDCB196000
heap
page read and write
401000
unkown
page execute read
25DBD913000
heap
page read and write
1FCF9437000
heap
page read and write
1FCF9340000
heap
page read and write
2BF44105000
heap
page read and write
7BA58FE000
stack
page read and write
1CDCA851000
heap
page read and write
24492A57000
heap
page read and write
2DE3CD60000
heap
page read and write
2033527C000
heap
page read and write
580000
heap
page read and write
2BF3EC7C000
heap
page read and write
1905E0A0000
heap
page read and write
1FCF94BA000
heap
page read and write
2BF43F80000
trusted library allocation
page read and write
1CDCA813000
heap
page read and write
61CCBFC000
stack
page read and write
236DA05F000
heap
page read and write
2BF3EA40000
heap
page read and write
1CDCA913000
heap
page read and write
2BF44324000
trusted library allocation
page read and write
180AE31B000
heap
page read and write
2BF3ECB3000
heap
page read and write
2BF444F0000
trusted library allocation
page read and write
180ADB09000
heap
page read and write
2C61AFF000
stack
page read and write
F3E687C000
stack
page read and write
2033522F000
heap
page read and write
25DBD848000
heap
page read and write
24492A20000
heap
page read and write
734E1000
unkown
page execute read
25DBD680000
heap
page read and write
1CDCA760000
trusted library allocation
page read and write
550000
heap
page read and write
2BF440A0000
heap
page read and write
1FCF943A000
heap
page read and write
180AD25C000
heap
page read and write
17900CBD000
heap
page read and write
1CDCB193000
heap
page read and write
2BF3F304000
heap
page read and write
F523B7E000
stack
page read and write
7BA587F000
stack
page read and write
61CD17E000
stack
page read and write
798916E000
stack
page read and write
1CDCB1BA000
heap
page read and write
1CDCB1A4000
heap
page read and write
180AD244000
heap
page read and write
B7EA27E000
stack
page read and write
1B55F100000
heap
page read and write
1CDCA908000
heap
page read and write
61CCB7F000
stack
page read and write
1FCF9DF0000
heap
page read and write
1CDCB602000
heap
page read and write
28FCFB70000
heap
page read and write
99000
stack
page read and write
1CDCB194000
heap
page read and write
1CDCB1A4000
heap
page read and write
1B55E889000
heap
page read and write
25DBD829000
heap
page read and write
584000
heap
page read and write
1FCF94A1000
heap
page read and write
28FCFC3C000
heap
page read and write
1559A802000
trusted library allocation
page read and write
25DBD880000
heap
page read and write
1B55E680000
heap
page read and write
1CDCA829000
heap
page read and write
203350C0000
heap
page read and write
2BF3F302000
heap
page read and write
2BF440E0000
heap
page read and write
1CDCB170000
heap
page read and write
1559A05C000
heap
page read and write
17900CBE000
heap
page read and write
1B20465B000
heap
page read and write
1B204410000
heap
page read and write
1905E27F000
heap
page read and write
232CEB48000
heap
page read and write
28FD0330000
trusted library allocation
page read and write
2BF43FD0000
trusted library allocation
page read and write
2C60FBC000
stack
page read and write
1CDCB182000
heap
page read and write
1CDCA8CC000
heap
page read and write
3C869FE000
stack
page read and write
1CDCB1B5000
heap
page read and write
F3E6C7B000
stack
page read and write
1CDCB10E000
heap
page read and write
1B55E813000
heap
page read and write
22CD0FC000
stack
page read and write
1CDCA8EA000
heap
page read and write
20335A02000
trusted library allocation
page read and write
5F0000
heap
page read and write
734E6000
unkown
page readonly
28FCFD02000
heap
page read and write
1B55E690000
heap
page read and write
2BF3ED02000
heap
page read and write
1FCF94BA000
heap
page read and write
2BF3EC96000
heap
page read and write
24492A63000
heap
page read and write
180AD28C000
heap
page read and write
3C8687E000
stack
page read and write
46C000
unkown
page readonly
EEA7E7A000
stack
page read and write
1CDCB10C000
heap
page read and write
232CEEC5000
heap
page read and write
180AD23A000
heap
page read and write
2BF3FED1000
trusted library allocation
page read and write
180AE20A000
heap
page read and write
236DA04E000
heap
page read and write
24493880000
heap
page readonly
1559A102000
heap
page read and write
2BF3EC72000
heap
page read and write
2033524C000
heap
page read and write
EEA80FC000
stack
page read and write
52F277C000
stack
page read and write
1CDCB192000
heap
page read and write
1CDCB182000
heap
page read and write
290E0FD000
stack
page read and write
28FCFD00000
heap
page read and write
1FCF946C000
heap
page read and write
2BF3ED00000
heap
page read and write
2BF3ECA4000
heap
page read and write
180AD229000
heap
page read and write
7BA5BF7000
stack
page read and write
25DBD83C000
heap
page read and write
2BF3FA50000
trusted library allocation
page read and write
180AD260000
heap
page read and write
1FCF93D8000
heap
page read and write
52F2CF7000
stack
page read and write
24492CD5000
heap
page read and write
180AD2DA000
heap
page read and write
2BF3EC3F000
heap
page read and write
1CDCA8B8000
heap
page read and write
2BF3FF00000
trusted library allocation
page read and write
236DA802000
trusted library allocation
page read and write
180AD25E000
heap
page read and write
17900CA5000
heap
page read and write
2BF3ED00000
heap
page read and write
236DA102000
heap
page read and write
28FCFC7B000
heap
page read and write
1559A002000
heap
page read and write
1CDCB1B4000
heap
page read and write
17900CA8000
heap
page read and write
2BF44061000
heap
page read and write
1FCF9645000
heap
page read and write
F523AFD000
stack
page read and write
2BF43FE4000
trusted library allocation
page read and write
2BF3EC00000
heap
page read and write
24492CC0000
trusted library allocation
page read and write
244929F8000
heap
page read and write
2BF3F318000
heap
page read and write
46A000
unkown
page read and write
1905E250000
heap
page read and write
19A000
stack
page read and write
1CDCB170000
heap
page read and write
F3E697A000
stack
page read and write
1B55F132000
heap
page read and write
290E27C000
stack
page read and write
244938A0000
trusted library allocation
page read and write
2BF3F318000
heap
page read and write
180ADB00000
heap
page read and write
1B204480000
heap
page read and write
40A000
unkown
page read and write
1CDCB193000
heap
page read and write
1FCF9415000
heap
page read and write
180AD2C7000
heap
page read and write
180AD2E6000
heap
page read and write
22CCEF9000
stack
page read and write
180AE258000
heap
page read and write
1CDCB600000
heap
page read and write
180AD289000
heap
page read and write
24493870000
trusted library allocation
page read and write
1CDCB193000
heap
page read and write
2DE3CDB0000
heap
page read and write
1CDCA889000
heap
page read and write
7BA55DC000
stack
page read and write
1CDCA8B5000
heap
page read and write
B7E9F3C000
stack
page read and write
25DBD6E0000
heap
page read and write
1CDCB17A000
heap
page read and write
2C614FE000
stack
page read and write
1CDCB181000
heap
page read and write
1CDCB17A000
heap
page read and write
1CDCB1B5000
heap
page read and write
1FCF94BD000
heap
page read and write
2BF44013000
heap
page read and write
1CDCB1A4000
heap
page read and write
1CDCB1BA000
heap
page read and write
236DA113000
heap
page read and write
2BF43FE0000
trusted library allocation
page read and write
28FCFC13000
heap
page read and write
EEA81FF000
stack
page read and write
1905E313000
heap
page read and write
3C864BB000
stack
page read and write
2BF3F202000
heap
page read and write
2BF44300000
trusted library allocation
page read and write
28FCFD13000
heap
page read and write
649000
heap
page read and write
42C000
unkown
page read and write
1FCF94A1000
heap
page read and write
180AD2D2000
heap
page read and write
24492A51000
heap
page read and write
2BF3EC13000
heap
page read and write
52F28F9000
stack
page read and write
28FCFC28000
heap
page read and write
2BF3E9E0000
heap
page read and write
2BF43F90000
trusted library allocation
page read and write
22CC88B000
stack
page read and write
236DA05F000
heap
page read and write
20335285000
heap
page read and write
2033522E000
heap
page read and write
629000
heap
page read and write
1B204420000
heap
page read and write
1CDCB1A4000
heap
page read and write
3C86D7D000
stack
page read and write
2BF440AB000
heap
page read and write
180AD1D0000
trusted library allocation
page read and write
5F7000
heap
page read and write
2BF3E9D0000
heap
page read and write
20335249000
heap
page read and write
2BF43FA0000
trusted library allocation
page read and write
1CDCB1B5000
heap
page read and write
17900CB8000
heap
page read and write
290E07F000
stack
page read and write
1FCF9610000
remote allocation
page read and write
1CDCA84D000
heap
page read and write
1905E288000
heap
page read and write
2BF4401F000
heap
page read and write
4093DFF000
stack
page read and write
B7EA6FE000
stack
page read and write
203350B0000
heap
page read and write
15599E20000
heap
page read and write
2BF443E0000
trusted library allocation
page read and write
1B204657000
heap
page read and write
2033527D000
heap
page read and write
1CDCB185000
heap
page read and write
408000
unkown
page readonly
180AD213000
heap
page read and write
A21F1FB000
stack
page read and write
2BF440F7000
heap
page read and write
1CDCB185000
heap
page read and write
408000
unkown
page readonly
15599E90000
heap
page read and write
22CCFFE000
stack
page read and write
20335261000
heap
page read and write
1FCF93B0000
heap
page read and write
1559A013000
heap
page read and write
236DA000000
heap
page read and write
20335269000
heap
page read and write
1FCF9DF1000
heap
page read and write
180AD26B000
heap
page read and write
1B55E8CC000
heap
page read and write
2BF3EC78000
heap
page read and write
1905E249000
heap
page read and write
1FCF9448000
heap
page read and write
7BA5CFF000
stack
page read and write
400000
unkown
page readonly
180AD2BC000
heap
page read and write
1905E110000
heap
page read and write
2BF44321000
trusted library allocation
page read and write
2BF44400000
remote allocation
page read and write
244935C0000
trusted library allocation
page read and write
1B204602000
heap
page read and write
1FCF943C000
heap
page read and write
2C61CFE000
stack
page read and write
1CDCB189000
heap
page read and write
1CDCA85A000
heap
page read and write
180ADBD6000
heap
page read and write
28FCFBD0000
heap
page read and write
1905E300000
heap
page read and write
1CDCB176000
heap
page read and write
20335243000
heap
page read and write
1CDCA8C5000
heap
page read and write
17900BD0000
heap
page read and write
1B204629000
heap
page read and write
52F2D7F000
unkown
page read and write
2BF3F359000
heap
page read and write
1CDCB193000
heap
page read and write
180ADB07000
heap
page read and write
236DA108000
heap
page read and write
2BF43F00000
trusted library allocation
page read and write
1B204613000
heap
page read and write
236DA013000
heap
page read and write
1CDCB182000
heap
page read and write
1B55E844000
heap
page read and write
15599F90000
trusted library allocation
page read and write
2BF44370000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
1CDCB170000
heap
page read and write
2C618FE000
stack
page read and write
28FCFB60000
heap
page read and write
F523BFB000
stack
page read and write
2BF3EC59000
heap
page read and write
24493630000
trusted library allocation
page read and write
2BF43F10000
trusted library allocation
page read and write
236DA04A000
heap
page read and write
1CDCB187000
heap
page read and write
1CDCB188000
heap
page read and write
4093E7E000
stack
page read and write
28FCFC00000
heap
page read and write
3C8697C000
stack
page read and write
25DBD84C000
heap
page read and write
A70000
trusted library allocation
page read and write
180AD24B000
heap
page read and write
2BF443B0000
trusted library allocation
page read and write
2BF44308000
trusted library allocation
page read and write
28FCFC02000
heap
page read and write
20335276000
heap
page read and write
2BF44510000
trusted library allocation
page read and write
2BF44054000
heap
page read and write
2E1D000
stack
page read and write
1B20466F000
heap
page read and write
236DA089000
heap
page read and write
20335266000
heap
page read and write
244929B0000
heap
page read and write
20335271000
heap
page read and write
1B55E86F000
heap
page read and write
1CDCB151000
heap
page read and write
2DE3CCB0000
heap
page read and write
28FD0402000
trusted library allocation
page read and write
1CDCB17F000
heap
page read and write
1CDCB187000
heap
page read and write
F58F0FE000
stack
page read and write
180AD3FD000
heap
page read and write
1905E870000
trusted library allocation
page read and write
1FCF94C4000
heap
page read and write
1905E24B000
heap
page read and write
2BF44370000
trusted library allocation
page read and write
1CDCB602000
heap
page read and write
798967B000
stack
page read and write
1CDCB602000
heap
page read and write
1B204713000
heap
page read and write
2BF3FEF3000
trusted library allocation
page read and write
FC9D7F000
stack
page read and write
1CDCB100000
heap
page read and write
1CDCB182000
heap
page read and write
1B204664000
heap
page read and write
52F27FF000
stack
page read and write
1FCF9421000
heap
page read and write
2BF44102000
heap
page read and write
61CC4EB000
stack
page read and write
F3E707C000
stack
page read and write
180AD313000
heap
page read and write
1B55F002000
heap
page read and write
1CDCB619000
heap
page read and write
2033524A000
heap
page read and write
F58F1FE000
stack
page read and write
2DE3CDDB000
heap
page read and write
1CDCB1B5000
heap
page read and write
17900CA3000
heap
page read and write
24493890000
trusted library allocation
page read and write
20335246000
heap
page read and write
1FCF94C2000
heap
page read and write
180ADBF1000
heap
page read and write
2BF43FB0000
trusted library allocation
page read and write
1FCF94BA000
heap
page read and write
1CDCB1A5000
heap
page read and write
236DA029000
heap
page read and write
5CE000
stack
page read and write
1CDCB1A4000
heap
page read and write
EEA807C000
stack
page read and write
1905E213000
heap
page read and write
1CDCB184000
heap
page read and write
25DBD900000
heap
page read and write
1905E302000
heap
page read and write
61CCE7D000
stack
page read and write
1FCF9403000
heap
page read and write
1FCF93EA000
heap
page read and write
2C619FF000
stack
page read and write
17900CB9000
heap
page read and write
236D9E10000
heap
page read and write
236DA07E000
heap
page read and write
1FCF94BD000
heap
page read and write
20335262000
heap
page read and write
EEA7F7E000
stack
page read and write
290E1FF000
stack
page read and write
7BA59FB000
stack
page read and write
180AD22E000
heap
page read and write
180ADA02000
heap
page read and write
236DA04D000
heap
page read and write
1B20463D000
heap
page read and write
B7EA3FE000
stack
page read and write
1CDCB620000
heap
page read and write
25DBD670000
heap
page read and write
1559A03C000
heap
page read and write
180AD237000
heap
page read and write
1CDCB603000
heap
page read and write
24492CD0000
heap
page read and write
20335120000
heap
page read and write
25DBD847000
heap
page read and write
180AD286000
heap
page read and write
1FCF94B7000
heap
page read and write
1FCF94A3000
heap
page read and write
F58ECCC000
stack
page read and write
1CDCB178000
heap
page read and write
1CDCAE80000
remote allocation
page read and write
20335200000
heap
page read and write
2BF43FA0000
trusted library allocation
page read and write
F3E727E000
stack
page read and write
25DBD813000
heap
page read and write
25DBD908000
heap
page read and write
1CDCB1B5000
heap
page read and write
1CDCB193000
heap
page read and write
625000
heap
page read and write
2BF3EC90000
heap
page read and write
20335241000
heap
page read and write
1FCF945A000
heap
page read and write
EEA7EFE000
stack
page read and write
1CDCA850000
heap
page read and write
1B55E902000
heap
page read and write
1905E24E000
heap
page read and write
1CDCA855000
heap
page read and write
1CDCB170000
heap
page read and write
1CDCB602000
heap
page read and write
1905E308000
heap
page read and write
1FCF93D0000
heap
page read and write
7989777000
stack
page read and write
2C615FC000
stack
page read and write
17900CB9000
heap
page read and write
2BF3EC92000
heap
page read and write
22CCCFB000
stack
page read and write
232CEEC0000
heap
page read and write
639000
heap
page read and write
79891ED000
stack
page read and write
400000
unkown
page readonly
22CCDFA000
stack
page read and write
1559A056000
heap
page read and write
28FCFC59000
heap
page read and write
2C617FD000
stack
page read and write
AA0000
heap
page read and write
1B204676000
heap
page read and write
AA6000
heap
page read and write
F523C7A000
stack
page read and write
2DE3CD20000
heap
page read and write
180AD252000
heap
page read and write
24492CE0000
trusted library allocation
page read and write
20335213000
heap
page read and write
1FCF94A1000
heap
page read and write
20335277000
heap
page read and write
7BA5AFB000
stack
page read and write
20335260000
heap
page read and write
236DA050000
heap
page read and write
180AD200000
heap
page read and write
1CDCB193000
heap
page read and write
1CDCB1A5000
heap
page read and write
1CDCA660000
heap
page read and write
1FCF94A1000
heap
page read and write
24492A34000
heap
page read and write
1CDCB193000
heap
page read and write
236DA048000
heap
page read and write
1CDCB11B000
heap
page read and write
1FCF945A000
heap
page read and write
1559A029000
heap
page read and write
1FCF9421000
heap
page read and write
2DE3CDBE000
heap
page read and write
22CD37F000
stack
page read and write
2BF3F313000
heap
page read and write
F3E635B000
stack
page read and write
290DDEF000
stack
page read and write
180AD2AF000
heap
page read and write
2DE3CD50000
heap
page read and write
7BA5DFF000
stack
page read and write
25DBD855000
heap
page read and write
1B204580000
trusted library allocation
page read and write
F3E6777000
stack
page read and write
1905E24D000
heap
page read and write
61E000
heap
page read and write
20335247000
heap
page read and write
17900C96000
heap
page read and write
2BF44000000
heap
page read and write
17900C50000
heap
page read and write
2BF3F300000
heap
page read and write
2BF43FD0000
trusted library allocation
page read and write
1CDCB170000
heap
page read and write
798987F000
stack
page read and write
1CDCA800000
heap
page read and write
1CDCB17A000
heap
page read and write
1CDCAE80000
remote allocation
page read and write
1CDCA8EF000
heap
page read and write
20335245000
heap
page read and write
1CDCA84E000
heap
page read and write
F3E6A7E000
stack
page read and write
20335279000
heap
page read and write
236DA100000
heap
page read and write
180AD3B8000
heap
page read and write
25DBD850000
heap
page read and write
20335302000
heap
page read and write
1CDCB603000
heap
page read and write
232CEB20000
heap
page read and write
A21F5FF000
stack
page read and write
B7EA5FF000
stack
page read and write
180AD180000
trusted library allocation
page read and write
FC96EC000
stack
page read and write
F523A79000
stack
page read and write
2BF3ECA2000
heap
page read and write
FC9F7E000
stack
page read and write
1CDCB191000
heap
page read and write
28FCFC24000
heap
page read and write
180AD2CD000
heap
page read and write
180AD080000
heap
page read and write
2DE3CD55000
heap
page read and write
1FCF946C000
heap
page read and write
15599FC0000
remote allocation
page read and write
180AD29F000
heap
page read and write
1FCF94A3000
heap
page read and write
1CDCB193000
heap
page read and write
798957F000
stack
page read and write
1B55F112000
heap
page read and write
1905E229000
heap
page read and write
1B55E8C2000
heap
page read and write
1FCF94A3000
heap
page read and write
180ADB60000
heap
page read and write
401000
unkown
page execute read
2BF44380000
trusted library allocation
page read and write
EEA7FFB000
stack
page read and write
24492A50000
heap
page read and write
FC976E000
stack
page read and write
2C61BFF000
stack
page read and write
61CCD7B000
stack
page read and write
1CDCB11D000
heap
page read and write
1CDCB11D000
heap
page read and write
17900C91000
heap
page read and write
1559A000000
heap
page read and write
1CDCAE80000
remote allocation
page read and write
25DBD84D000
heap
page read and write
17900C30000
heap
page read and write
1B204702000
heap
page read and write
734E0000
unkown
page readonly
440000
unkown
page read and write
180AE243000
heap
page read and write
22CD1FF000
stack
page read and write
1CDCA84C000
heap
page read and write
279F000
stack
page read and write
236DA049000
heap
page read and write
2BF43FB0000
trusted library allocation
page read and write
1FCF94BE000
heap
page read and write
61CCF7F000
stack
page read and write
1CDCA5F0000
heap
page read and write
25DBD800000
heap
page read and write
79890EC000
stack
page read and write
20335264000
heap
page read and write
1905E262000
heap
page read and write
1CDCA857000
heap
page read and write
1CDCA600000
heap
page read and write
1CDCB193000
heap
page read and write
1905E270000
heap
page read and write
B7EA4FE000
stack
page read and write
1B55E885000
heap
page read and write
1FCF9434000
heap
page read and write
2BF3ED14000
heap
page read and write
1B55E7F0000
trusted library allocation
page read and write
798997F000
stack
page read and write
1FCF9DF1000
heap
page read and write
52F29F7000
stack
page read and write
1CDCB1A5000
heap
page read and write
2033527B000
heap
page read and write
20335280000
heap
page read and write
232CED10000
heap
page read and write
1FCF9448000
heap
page read and write
1CDCB193000
heap
page read and write
1FCF945A000
heap
page read and write
17900C96000
heap
page read and write
24492930000
trusted library allocation
page read and write
24492A3B000
heap
page read and write
4093EFE000
stack
page read and write
2860000
trusted library allocation
page read and write
2033523B000
heap
page read and write
180ADB33000
heap
page read and write
1B55E865000
heap
page read and write
180ADB13000
heap
page read and write
2C613FB000
stack
page read and write
234F000
stack
page read and write
17900C80000
heap
page read and write
61CCCFC000
stack
page read and write
61CD07D000
stack
page read and write
1905E24A000
heap
page read and write
1B55E8BB000
heap
page read and write
20335263000
heap
page read and write
1B55E800000
heap
page read and write
24492A57000
heap
page read and write
734E4000
unkown
page readonly
1FCF946C000
heap
page read and write
EEA817F000
stack
page read and write
1905E0B0000
heap
page read and write
2BF44042000
heap
page read and write
25DBD902000
heap
page read and write
1CDCB193000
heap
page read and write
1CDCB1A4000
heap
page read and write
180AD3E1000
heap
page read and write
1CDCB1C5000
heap
page read and write
1CDCA85B000
heap
page read and write
20335248000
heap
page read and write
79894FB000
stack
page read and write
1CDCB1B4000
heap
page read and write
290E178000
stack
page read and write
2DE3CDBB000
heap
page read and write
2BF44370000
trusted library allocation
page read and write
1905E23C000
heap
page read and write
2BF3FEF0000
trusted library allocation
page read and write
2033526F000
heap
page read and write
1CDCB14F000
heap
page read and write
F52387C000
stack
page read and write
232CEB40000
heap
page read and write
1B55E913000
heap
page read and write
15599FC0000
remote allocation
page read and write
244929F0000
heap
page read and write
236D9E00000
heap
page read and write
1FCF94A3000
heap
page read and write
20335232000
heap
page read and write
40D000
unkown
page read and write
1905E200000
heap
page read and write
1CDCB602000
heap
page read and write
20335242000
heap
page read and write
180AE21D000
heap
page read and write
180AD030000
heap
page read and write
FC9BFB000
stack
page read and write
3C86BFD000
stack
page read and write
1B204665000
heap
page read and write
52F231B000
stack
page read and write
1FCF9434000
heap
page read and write
FC97EE000
stack
page read and write
24493620000
trusted library allocation
page read and write
24492A3B000
heap
page read and write
1B55E6F0000
heap
page read and write
A21F6FB000
stack
page read and write
1CDCB18D000
heap
page read and write
1FCF940F000
heap
page read and write
2BF440F1000
heap
page read and write
A21F7FF000
stack
page read and write
2BF3F200000
heap
page read and write
4093C7A000
stack
page read and write
236D9F70000
trusted library allocation
page read and write
28FCFC64000
heap
page read and write
1FCF95A0000
heap
page read and write
1FCF9403000
heap
page read and write
25DBD88C000
heap
page read and write
1CDCB1B7000
heap
page read and write
52F267E000
stack
page read and write
15599E30000
heap
page read and write
There are 749 hidden memdumps, click here to show them.