Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
SCAN Swift 054545676700000000000000001.exe
|
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
|
initial sample
|
||
C:\Users\user\AppData\Local\Temp\Bllebrs.bar
|
ASCII text, with very long lines, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Bluetooth Suite help_ITA.chm
|
MS Windows HtmlHelp Data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\CDMDataEventHandler.dll
|
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\Pressekonferencens.maa
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\gspawn-win64-helper.exe
|
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\libLerc.dll
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\libenchant-2.dll
|
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\msvcr100.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\nsy907D.tmp\System.dll
|
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\system-shutdown.png
|
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\zoom-out-symbolic.svg
|
SVG Scalable Vector Graphics image
|
dropped
|
There are 2 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe
|
"C:\Users\user\Desktop\SCAN Swift 054545676700000000000000001.exe"
|
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://donaldtrumpverse.com/HUMBLE%202022_esIXilivcW48.bin
|
|||
https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/sysInfoBase.schema.json
|
unknown
|
||
https://us1.api.ws-hp.com/clienttelemetry
|
unknown
|
||
https://stage-us1.api.ws-hp.com/clienttelemetry
|
unknown
|
||
http://nsis.sf.net/NSIS_ErrorError
|
unknown
|
||
https://schemaregistry.analysis.ext.hp.com/cdm/id/sw/originatorDetail.schema.json
|
unknown
|
||
https://pie-us1.api.ws-hp.com/clienttelemetry
|
unknown
|
||
https://schemaregistry.analysis.ext.hp.com/cdm/gun/com.hp.cdm.platform.software.domain.eventing.reso
|
unknown
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\HAAND\Benfisken85
|
detaljeprojektets
|
||
HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\PARANTHRACENE
|
INTERPELLATION
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Valeward72\esc
|
Transfixation98
|
||
HKEY_CURRENT_USER\Software\DOMMERASPIRANTER\ETHERIIDAE
|
internalising
|
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
28E0000
|
direct allocation
|
page execute and read and write
|
||
2BF3ED07000
|
heap
|
page read and write
|
||
20335265000
|
heap
|
page read and write
|
||
52F239E000
|
stack
|
page read and write
|
||
1B55E8E0000
|
heap
|
page read and write
|
||
2033523E000
|
heap
|
page read and write
|
||
2BF440F9000
|
heap
|
page read and write
|
||
1FCF9415000
|
heap
|
page read and write
|
||
2F1E000
|
stack
|
page read and write
|
||
180AD282000
|
heap
|
page read and write
|
||
1CDCA8AE000
|
heap
|
page read and write
|
||
17900F55000
|
heap
|
page read and write
|
||
24492CD9000
|
heap
|
page read and write
|
||
FC9E7F000
|
stack
|
page read and write
|
||
2BF3ED02000
|
heap
|
page read and write
|
||
1FCF9640000
|
heap
|
page read and write
|
||
2BF3F215000
|
heap
|
page read and write
|
||
61CC8FB000
|
stack
|
page read and write
|
||
1B55E829000
|
heap
|
page read and write
|
||
FC9CF7000
|
stack
|
page read and write
|
||
1FCF9401000
|
heap
|
page read and write
|
||
1FCF9448000
|
heap
|
page read and write
|
||
25DBD7E0000
|
trusted library allocation
|
page read and write
|
||
2BF440A3000
|
heap
|
page read and write
|
||
236DA03C000
|
heap
|
page read and write
|
||
2BF44400000
|
remote allocation
|
page read and write
|
||
1FCF94A3000
|
heap
|
page read and write
|
||
1CDCB167000
|
heap
|
page read and write
|
||
180ADB3C000
|
heap
|
page read and write
|
||
236DA071000
|
heap
|
page read and write
|
||
236DA04C000
|
heap
|
page read and write
|
||
46C000
|
unkown
|
page readonly
|
||
15599FC0000
|
remote allocation
|
page read and write
|
||
1B204600000
|
heap
|
page read and write
|
||
2BF4402D000
|
heap
|
page read and write
|
||
236D9E70000
|
heap
|
page read and write
|
||
180AD29A000
|
heap
|
page read and write
|
||
431000
|
unkown
|
page read and write
|
||
1CDCA83A000
|
heap
|
page read and write
|
||
61CCA7E000
|
stack
|
page read and write
|
||
1559A023000
|
heap
|
page read and write
|
||
2BF44400000
|
remote allocation
|
page read and write
|
||
17900CA7000
|
heap
|
page read and write
|
||
2BF4430E000
|
trusted library allocation
|
page read and write
|
||
520000
|
trusted library allocation
|
page read and write
|
||
1CDCB1B6000
|
heap
|
page read and write
|
||
24492920000
|
heap
|
page read and write
|
||
A2E000
|
stack
|
page read and write
|
||
1FCF94A1000
|
heap
|
page read and write
|
||
1CDCA902000
|
heap
|
page read and write
|
||
2033523C000
|
heap
|
page read and write
|
||
1CDCB17B000
|
heap
|
page read and write
|
||
180AE313000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page write copy
|
||
1FCF93FC000
|
heap
|
page read and write
|
||
180AE202000
|
heap
|
page read and write
|
||
25DBE002000
|
trusted library allocation
|
page read and write
|
||
1CDCB193000
|
heap
|
page read and write
|
||
1CDCB602000
|
heap
|
page read and write
|
||
2BF440FE000
|
heap
|
page read and write
|
||
24492990000
|
heap
|
page read and write
|
||
2BF3F358000
|
heap
|
page read and write
|
||
1CDCB185000
|
heap
|
page read and write
|
||
2BF443C0000
|
trusted library allocation
|
page read and write
|
||
1CDCB193000
|
heap
|
page read and write
|
||
1905EA02000
|
trusted library allocation
|
page read and write
|
||
180AD395000
|
heap
|
page read and write
|
||
290DD6A000
|
stack
|
page read and write
|
||
20335229000
|
heap
|
page read and write
|
||
1CDCB125000
|
heap
|
page read and write
|
||
1B204E02000
|
trusted library allocation
|
page read and write
|
||
25DBD88A000
|
heap
|
page read and write
|
||
1CDCB11B000
|
heap
|
page read and write
|
||
22CD2FA000
|
stack
|
page read and write
|
||
1CDCA871000
|
heap
|
page read and write
|
||
2033525D000
|
heap
|
page read and write
|
||
F3E6B7A000
|
stack
|
page read and write
|
||
2BF443D0000
|
trusted library allocation
|
page read and write
|
||
3C86C7F000
|
stack
|
page read and write
|
||
2BF3EC29000
|
heap
|
page read and write
|
||
232CEAC0000
|
heap
|
page read and write
|
||
1CDCA83C000
|
heap
|
page read and write
|
||
2BF3F1A0000
|
trusted library allocation
|
page read and write
|
||
2BF4404F000
|
heap
|
page read and write
|
||
633000
|
heap
|
page read and write
|
||
52F2BF8000
|
stack
|
page read and write
|
||
1FCF94BA000
|
heap
|
page read and write
|
||
180AD23C000
|
heap
|
page read and write
|
||
1FCF946B000
|
heap
|
page read and write
|
||
B7E9FBE000
|
stack
|
page read and write
|
||
1CDCB1C4000
|
heap
|
page read and write
|
||
A21F8FE000
|
stack
|
page read and write
|
||
2033526B000
|
heap
|
page read and write
|
||
52F2AFE000
|
stack
|
page read and write
|
||
1CDCA916000
|
heap
|
page read and write
|
||
17900F50000
|
heap
|
page read and write
|
||
25DBD871000
|
heap
|
page read and write
|
||
24492A3B000
|
heap
|
page read and write
|
||
25DBD84E000
|
heap
|
page read and write
|
||
1CDCA8FE000
|
heap
|
page read and write
|
||
180AE200000
|
heap
|
page read and write
|
||
180AE300000
|
heap
|
page read and write
|
||
1CDCB184000
|
heap
|
page read and write
|
||
30000
|
heap
|
page read and write
|
||
1CDCB602000
|
heap
|
page read and write
|
||
1CDCB174000
|
heap
|
page read and write
|
||
25DBD858000
|
heap
|
page read and write
|
||
180AD020000
|
heap
|
page read and write
|
||
1CDCB1A4000
|
heap
|
page read and write
|
||
1CDCB193000
|
heap
|
page read and write
|
||
F58F17B000
|
stack
|
page read and write
|
||
180AE202000
|
heap
|
page read and write
|
||
1CDCB002000
|
heap
|
page read and write
|
||
20335880000
|
trusted library allocation
|
page read and write
|
||
244938F0000
|
trusted library allocation
|
page read and write
|
||
1CDCB602000
|
heap
|
page read and write
|
||
1FCF9610000
|
remote allocation
|
page read and write
|
||
180AE302000
|
heap
|
page read and write
|
||
2350000
|
heap
|
page read and write
|
||
1FCF9610000
|
remote allocation
|
page read and write
|
||
28FCFC68000
|
heap
|
page read and write
|
||
1CDCB196000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
25DBD913000
|
heap
|
page read and write
|
||
1FCF9437000
|
heap
|
page read and write
|
||
1FCF9340000
|
heap
|
page read and write
|
||
2BF44105000
|
heap
|
page read and write
|
||
7BA58FE000
|
stack
|
page read and write
|
||
1CDCA851000
|
heap
|
page read and write
|
||
24492A57000
|
heap
|
page read and write
|
||
2DE3CD60000
|
heap
|
page read and write
|
||
2033527C000
|
heap
|
page read and write
|
||
580000
|
heap
|
page read and write
|
||
2BF3EC7C000
|
heap
|
page read and write
|
||
1905E0A0000
|
heap
|
page read and write
|
||
1FCF94BA000
|
heap
|
page read and write
|
||
2BF43F80000
|
trusted library allocation
|
page read and write
|
||
1CDCA813000
|
heap
|
page read and write
|
||
61CCBFC000
|
stack
|
page read and write
|
||
236DA05F000
|
heap
|
page read and write
|
||
2BF3EA40000
|
heap
|
page read and write
|
||
1CDCA913000
|
heap
|
page read and write
|
||
2BF44324000
|
trusted library allocation
|
page read and write
|
||
180AE31B000
|
heap
|
page read and write
|
||
2BF3ECB3000
|
heap
|
page read and write
|
||
2BF444F0000
|
trusted library allocation
|
page read and write
|
||
180ADB09000
|
heap
|
page read and write
|
||
2C61AFF000
|
stack
|
page read and write
|
||
F3E687C000
|
stack
|
page read and write
|
||
2033522F000
|
heap
|
page read and write
|
||
25DBD848000
|
heap
|
page read and write
|
||
24492A20000
|
heap
|
page read and write
|
||
734E1000
|
unkown
|
page execute read
|
||
25DBD680000
|
heap
|
page read and write
|
||
1CDCA760000
|
trusted library allocation
|
page read and write
|
||
550000
|
heap
|
page read and write
|
||
2BF440A0000
|
heap
|
page read and write
|
||
1FCF943A000
|
heap
|
page read and write
|
||
180AD25C000
|
heap
|
page read and write
|
||
17900CBD000
|
heap
|
page read and write
|
||
1CDCB193000
|
heap
|
page read and write
|
||
2BF3F304000
|
heap
|
page read and write
|
||
F523B7E000
|
stack
|
page read and write
|
||
7BA587F000
|
stack
|
page read and write
|
||
61CD17E000
|
stack
|
page read and write
|
||
798916E000
|
stack
|
page read and write
|
||
1CDCB1BA000
|
heap
|
page read and write
|
||
1CDCB1A4000
|
heap
|
page read and write
|
||
180AD244000
|
heap
|
page read and write
|
||
B7EA27E000
|
stack
|
page read and write
|
||
1B55F100000
|
heap
|
page read and write
|
||
1CDCA908000
|
heap
|
page read and write
|
||
61CCB7F000
|
stack
|
page read and write
|
||
1FCF9DF0000
|
heap
|
page read and write
|
||
1CDCB602000
|
heap
|
page read and write
|
||
28FCFB70000
|
heap
|
page read and write
|
||
99000
|
stack
|
page read and write
|
||
1CDCB194000
|
heap
|
page read and write
|
||
1CDCB1A4000
|
heap
|
page read and write
|
||
1B55E889000
|
heap
|
page read and write
|
||
25DBD829000
|
heap
|
page read and write
|
||
584000
|
heap
|
page read and write
|
||
1FCF94A1000
|
heap
|
page read and write
|
||
28FCFC3C000
|
heap
|
page read and write
|
||
1559A802000
|
trusted library allocation
|
page read and write
|
||
25DBD880000
|
heap
|
page read and write
|
||
1B55E680000
|
heap
|
page read and write
|
||
1CDCA829000
|
heap
|
page read and write
|
||
203350C0000
|
heap
|
page read and write
|
||
2BF3F302000
|
heap
|
page read and write
|
||
2BF440E0000
|
heap
|
page read and write
|
||
1CDCB170000
|
heap
|
page read and write
|
||
1559A05C000
|
heap
|
page read and write
|
||
17900CBE000
|
heap
|
page read and write
|
||
1B20465B000
|
heap
|
page read and write
|
||
1B204410000
|
heap
|
page read and write
|
||
1905E27F000
|
heap
|
page read and write
|
||
232CEB48000
|
heap
|
page read and write
|
||
28FD0330000
|
trusted library allocation
|
page read and write
|
||
2BF43FD0000
|
trusted library allocation
|
page read and write
|
||
2C60FBC000
|
stack
|
page read and write
|
||
1CDCB182000
|
heap
|
page read and write
|
||
1CDCA8CC000
|
heap
|
page read and write
|
||
3C869FE000
|
stack
|
page read and write
|
||
1CDCB1B5000
|
heap
|
page read and write
|
||
F3E6C7B000
|
stack
|
page read and write
|
||
1CDCB10E000
|
heap
|
page read and write
|
||
1B55E813000
|
heap
|
page read and write
|
||
22CD0FC000
|
stack
|
page read and write
|
||
1CDCA8EA000
|
heap
|
page read and write
|
||
20335A02000
|
trusted library allocation
|
page read and write
|
||
5F0000
|
heap
|
page read and write
|
||
734E6000
|
unkown
|
page readonly
|
||
28FCFD02000
|
heap
|
page read and write
|
||
1B55E690000
|
heap
|
page read and write
|
||
2BF3ED02000
|
heap
|
page read and write
|
||
1FCF94BA000
|
heap
|
page read and write
|
||
2BF3EC96000
|
heap
|
page read and write
|
||
24492A63000
|
heap
|
page read and write
|
||
180AD28C000
|
heap
|
page read and write
|
||
3C8687E000
|
stack
|
page read and write
|
||
46C000
|
unkown
|
page readonly
|
||
EEA7E7A000
|
stack
|
page read and write
|
||
1CDCB10C000
|
heap
|
page read and write
|
||
232CEEC5000
|
heap
|
page read and write
|
||
180AD23A000
|
heap
|
page read and write
|
||
2BF3FED1000
|
trusted library allocation
|
page read and write
|
||
180AE20A000
|
heap
|
page read and write
|
||
236DA04E000
|
heap
|
page read and write
|
||
24493880000
|
heap
|
page readonly
|
||
1559A102000
|
heap
|
page read and write
|
||
2BF3EC72000
|
heap
|
page read and write
|
||
2033524C000
|
heap
|
page read and write
|
||
EEA80FC000
|
stack
|
page read and write
|
||
52F277C000
|
stack
|
page read and write
|
||
1CDCB192000
|
heap
|
page read and write
|
||
1CDCB182000
|
heap
|
page read and write
|
||
290E0FD000
|
stack
|
page read and write
|
||
28FCFD00000
|
heap
|
page read and write
|
||
1FCF946C000
|
heap
|
page read and write
|
||
2BF3ED00000
|
heap
|
page read and write
|
||
2BF3ECA4000
|
heap
|
page read and write
|
||
180AD229000
|
heap
|
page read and write
|
||
7BA5BF7000
|
stack
|
page read and write
|
||
25DBD83C000
|
heap
|
page read and write
|
||
2BF3FA50000
|
trusted library allocation
|
page read and write
|
||
180AD260000
|
heap
|
page read and write
|
||
1FCF93D8000
|
heap
|
page read and write
|
||
52F2CF7000
|
stack
|
page read and write
|
||
24492CD5000
|
heap
|
page read and write
|
||
180AD2DA000
|
heap
|
page read and write
|
||
2BF3EC3F000
|
heap
|
page read and write
|
||
1CDCA8B8000
|
heap
|
page read and write
|
||
2BF3FF00000
|
trusted library allocation
|
page read and write
|
||
236DA802000
|
trusted library allocation
|
page read and write
|
||
180AD25E000
|
heap
|
page read and write
|
||
17900CA5000
|
heap
|
page read and write
|
||
2BF3ED00000
|
heap
|
page read and write
|
||
236DA102000
|
heap
|
page read and write
|
||
28FCFC7B000
|
heap
|
page read and write
|
||
1559A002000
|
heap
|
page read and write
|
||
1CDCB1B4000
|
heap
|
page read and write
|
||
17900CA8000
|
heap
|
page read and write
|
||
2BF44061000
|
heap
|
page read and write
|
||
1FCF9645000
|
heap
|
page read and write
|
||
F523AFD000
|
stack
|
page read and write
|
||
2BF43FE4000
|
trusted library allocation
|
page read and write
|
||
2BF3EC00000
|
heap
|
page read and write
|
||
24492CC0000
|
trusted library allocation
|
page read and write
|
||
244929F8000
|
heap
|
page read and write
|
||
2BF3F318000
|
heap
|
page read and write
|
||
46A000
|
unkown
|
page read and write
|
||
1905E250000
|
heap
|
page read and write
|
||
19A000
|
stack
|
page read and write
|
||
1CDCB170000
|
heap
|
page read and write
|
||
F3E697A000
|
stack
|
page read and write
|
||
1B55F132000
|
heap
|
page read and write
|
||
290E27C000
|
stack
|
page read and write
|
||
244938A0000
|
trusted library allocation
|
page read and write
|
||
2BF3F318000
|
heap
|
page read and write
|
||
180ADB00000
|
heap
|
page read and write
|
||
1B204480000
|
heap
|
page read and write
|
||
40A000
|
unkown
|
page read and write
|
||
1CDCB193000
|
heap
|
page read and write
|
||
1FCF9415000
|
heap
|
page read and write
|
||
180AD2C7000
|
heap
|
page read and write
|
||
180AD2E6000
|
heap
|
page read and write
|
||
22CCEF9000
|
stack
|
page read and write
|
||
180AE258000
|
heap
|
page read and write
|
||
1CDCB600000
|
heap
|
page read and write
|
||
180AD289000
|
heap
|
page read and write
|
||
24493870000
|
trusted library allocation
|
page read and write
|
||
1CDCB193000
|
heap
|
page read and write
|
||
2DE3CDB0000
|
heap
|
page read and write
|
||
1CDCA889000
|
heap
|
page read and write
|
||
7BA55DC000
|
stack
|
page read and write
|
||
1CDCA8B5000
|
heap
|
page read and write
|
||
B7E9F3C000
|
stack
|
page read and write
|
||
25DBD6E0000
|
heap
|
page read and write
|
||
1CDCB17A000
|
heap
|
page read and write
|
||
2C614FE000
|
stack
|
page read and write
|
||
1CDCB181000
|
heap
|
page read and write
|
||
1CDCB17A000
|
heap
|
page read and write
|
||
1CDCB1B5000
|
heap
|
page read and write
|
||
1FCF94BD000
|
heap
|
page read and write
|
||
2BF44013000
|
heap
|
page read and write
|
||
1CDCB1A4000
|
heap
|
page read and write
|
||
1CDCB1BA000
|
heap
|
page read and write
|
||
236DA113000
|
heap
|
page read and write
|
||
2BF43FE0000
|
trusted library allocation
|
page read and write
|
||
28FCFC13000
|
heap
|
page read and write
|
||
EEA81FF000
|
stack
|
page read and write
|
||
1905E313000
|
heap
|
page read and write
|
||
3C864BB000
|
stack
|
page read and write
|
||
2BF3F202000
|
heap
|
page read and write
|
||
2BF44300000
|
trusted library allocation
|
page read and write
|
||
28FCFD13000
|
heap
|
page read and write
|
||
649000
|
heap
|
page read and write
|
||
42C000
|
unkown
|
page read and write
|
||
1FCF94A1000
|
heap
|
page read and write
|
||
180AD2D2000
|
heap
|
page read and write
|
||
24492A51000
|
heap
|
page read and write
|
||
2BF3EC13000
|
heap
|
page read and write
|
||
52F28F9000
|
stack
|
page read and write
|
||
28FCFC28000
|
heap
|
page read and write
|
||
2BF3E9E0000
|
heap
|
page read and write
|
||
2BF43F90000
|
trusted library allocation
|
page read and write
|
||
22CC88B000
|
stack
|
page read and write
|
||
236DA05F000
|
heap
|
page read and write
|
||
20335285000
|
heap
|
page read and write
|
||
2033522E000
|
heap
|
page read and write
|
||
629000
|
heap
|
page read and write
|
||
1B204420000
|
heap
|
page read and write
|
||
1CDCB1A4000
|
heap
|
page read and write
|
||
3C86D7D000
|
stack
|
page read and write
|
||
2BF440AB000
|
heap
|
page read and write
|
||
180AD1D0000
|
trusted library allocation
|
page read and write
|
||
5F7000
|
heap
|
page read and write
|
||
2BF3E9D0000
|
heap
|
page read and write
|
||
20335249000
|
heap
|
page read and write
|
||
2BF43FA0000
|
trusted library allocation
|
page read and write
|
||
1CDCB1B5000
|
heap
|
page read and write
|
||
17900CB8000
|
heap
|
page read and write
|
||
290E07F000
|
stack
|
page read and write
|
||
1FCF9610000
|
remote allocation
|
page read and write
|
||
1CDCA84D000
|
heap
|
page read and write
|
||
1905E288000
|
heap
|
page read and write
|
||
2BF4401F000
|
heap
|
page read and write
|
||
4093DFF000
|
stack
|
page read and write
|
||
B7EA6FE000
|
stack
|
page read and write
|
||
203350B0000
|
heap
|
page read and write
|
||
15599E20000
|
heap
|
page read and write
|
||
2BF443E0000
|
trusted library allocation
|
page read and write
|
||
1B204657000
|
heap
|
page read and write
|
||
2033527D000
|
heap
|
page read and write
|
||
1CDCB185000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
180AD213000
|
heap
|
page read and write
|
||
A21F1FB000
|
stack
|
page read and write
|
||
2BF440F7000
|
heap
|
page read and write
|
||
1CDCB185000
|
heap
|
page read and write
|
||
408000
|
unkown
|
page readonly
|
||
15599E90000
|
heap
|
page read and write
|
||
22CCFFE000
|
stack
|
page read and write
|
||
20335261000
|
heap
|
page read and write
|
||
1FCF93B0000
|
heap
|
page read and write
|
||
1559A013000
|
heap
|
page read and write
|
||
236DA000000
|
heap
|
page read and write
|
||
20335269000
|
heap
|
page read and write
|
||
1FCF9DF1000
|
heap
|
page read and write
|
||
180AD26B000
|
heap
|
page read and write
|
||
1B55E8CC000
|
heap
|
page read and write
|
||
2BF3EC78000
|
heap
|
page read and write
|
||
1905E249000
|
heap
|
page read and write
|
||
1FCF9448000
|
heap
|
page read and write
|
||
7BA5CFF000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
180AD2BC000
|
heap
|
page read and write
|
||
1905E110000
|
heap
|
page read and write
|
||
2BF44321000
|
trusted library allocation
|
page read and write
|
||
2BF44400000
|
remote allocation
|
page read and write
|
||
244935C0000
|
trusted library allocation
|
page read and write
|
||
1B204602000
|
heap
|
page read and write
|
||
1FCF943C000
|
heap
|
page read and write
|
||
2C61CFE000
|
stack
|
page read and write
|
||
1CDCB189000
|
heap
|
page read and write
|
||
1CDCA85A000
|
heap
|
page read and write
|
||
180ADBD6000
|
heap
|
page read and write
|
||
28FCFBD0000
|
heap
|
page read and write
|
||
1905E300000
|
heap
|
page read and write
|
||
1CDCB176000
|
heap
|
page read and write
|
||
20335243000
|
heap
|
page read and write
|
||
1CDCA8C5000
|
heap
|
page read and write
|
||
17900BD0000
|
heap
|
page read and write
|
||
1B204629000
|
heap
|
page read and write
|
||
52F2D7F000
|
unkown
|
page read and write
|
||
2BF3F359000
|
heap
|
page read and write
|
||
1CDCB193000
|
heap
|
page read and write
|
||
180ADB07000
|
heap
|
page read and write
|
||
236DA108000
|
heap
|
page read and write
|
||
2BF43F00000
|
trusted library allocation
|
page read and write
|
||
1B204613000
|
heap
|
page read and write
|
||
236DA013000
|
heap
|
page read and write
|
||
1CDCB182000
|
heap
|
page read and write
|
||
1B55E844000
|
heap
|
page read and write
|
||
15599F90000
|
trusted library allocation
|
page read and write
|
||
2BF44370000
|
trusted library allocation
|
page read and write
|
||
A60000
|
trusted library allocation
|
page read and write
|
||
1CDCB170000
|
heap
|
page read and write
|
||
2C618FE000
|
stack
|
page read and write
|
||
28FCFB60000
|
heap
|
page read and write
|
||
F523BFB000
|
stack
|
page read and write
|
||
2BF3EC59000
|
heap
|
page read and write
|
||
24493630000
|
trusted library allocation
|
page read and write
|
||
2BF43F10000
|
trusted library allocation
|
page read and write
|
||
236DA04A000
|
heap
|
page read and write
|
||
1CDCB187000
|
heap
|
page read and write
|
||
1CDCB188000
|
heap
|
page read and write
|
||
4093E7E000
|
stack
|
page read and write
|
||
28FCFC00000
|
heap
|
page read and write
|
||
3C8697C000
|
stack
|
page read and write
|
||
25DBD84C000
|
heap
|
page read and write
|
||
A70000
|
trusted library allocation
|
page read and write
|
||
180AD24B000
|
heap
|
page read and write
|
||
2BF443B0000
|
trusted library allocation
|
page read and write
|
||
2BF44308000
|
trusted library allocation
|
page read and write
|
||
28FCFC02000
|
heap
|
page read and write
|
||
20335276000
|
heap
|
page read and write
|
||
2BF44510000
|
trusted library allocation
|
page read and write
|
||
2BF44054000
|
heap
|
page read and write
|
||
2E1D000
|
stack
|
page read and write
|
||
1B20466F000
|
heap
|
page read and write
|
||
236DA089000
|
heap
|
page read and write
|
||
20335266000
|
heap
|
page read and write
|
||
244929B0000
|
heap
|
page read and write
|
||
20335271000
|
heap
|
page read and write
|
||
1B55E86F000
|
heap
|
page read and write
|
||
1CDCB151000
|
heap
|
page read and write
|
||
2DE3CCB0000
|
heap
|
page read and write
|
||
28FD0402000
|
trusted library allocation
|
page read and write
|
||
1CDCB17F000
|
heap
|
page read and write
|
||
1CDCB187000
|
heap
|
page read and write
|
||
F58F0FE000
|
stack
|
page read and write
|
||
180AD3FD000
|
heap
|
page read and write
|
||
1905E870000
|
trusted library allocation
|
page read and write
|
||
1FCF94C4000
|
heap
|
page read and write
|
||
1905E24B000
|
heap
|
page read and write
|
||
2BF44370000
|
trusted library allocation
|
page read and write
|
||
1CDCB602000
|
heap
|
page read and write
|
||
798967B000
|
stack
|
page read and write
|
||
1CDCB602000
|
heap
|
page read and write
|
||
1B204713000
|
heap
|
page read and write
|
||
2BF3FEF3000
|
trusted library allocation
|
page read and write
|
||
FC9D7F000
|
stack
|
page read and write
|
||
1CDCB100000
|
heap
|
page read and write
|
||
1CDCB182000
|
heap
|
page read and write
|
||
1B204664000
|
heap
|
page read and write
|
||
52F27FF000
|
stack
|
page read and write
|
||
1FCF9421000
|
heap
|
page read and write
|
||
2BF44102000
|
heap
|
page read and write
|
||
61CC4EB000
|
stack
|
page read and write
|
||
F3E707C000
|
stack
|
page read and write
|
||
180AD313000
|
heap
|
page read and write
|
||
1B55F002000
|
heap
|
page read and write
|
||
1CDCB619000
|
heap
|
page read and write
|
||
2033524A000
|
heap
|
page read and write
|
||
F58F1FE000
|
stack
|
page read and write
|
||
2DE3CDDB000
|
heap
|
page read and write
|
||
1CDCB1B5000
|
heap
|
page read and write
|
||
17900CA3000
|
heap
|
page read and write
|
||
24493890000
|
trusted library allocation
|
page read and write
|
||
20335246000
|
heap
|
page read and write
|
||
1FCF94C2000
|
heap
|
page read and write
|
||
180ADBF1000
|
heap
|
page read and write
|
||
2BF43FB0000
|
trusted library allocation
|
page read and write
|
||
1FCF94BA000
|
heap
|
page read and write
|
||
1CDCB1A5000
|
heap
|
page read and write
|
||
236DA029000
|
heap
|
page read and write
|
||
5CE000
|
stack
|
page read and write
|
||
1CDCB1A4000
|
heap
|
page read and write
|
||
EEA807C000
|
stack
|
page read and write
|
||
1905E213000
|
heap
|
page read and write
|
||
1CDCB184000
|
heap
|
page read and write
|
||
25DBD900000
|
heap
|
page read and write
|
||
1905E302000
|
heap
|
page read and write
|
||
61CCE7D000
|
stack
|
page read and write
|
||
1FCF9403000
|
heap
|
page read and write
|
||
1FCF93EA000
|
heap
|
page read and write
|
||
2C619FF000
|
stack
|
page read and write
|
||
17900CB9000
|
heap
|
page read and write
|
||
236D9E10000
|
heap
|
page read and write
|
||
236DA07E000
|
heap
|
page read and write
|
||
1FCF94BD000
|
heap
|
page read and write
|
||
20335262000
|
heap
|
page read and write
|
||
EEA7F7E000
|
stack
|
page read and write
|
||
290E1FF000
|
stack
|
page read and write
|
||
7BA59FB000
|
stack
|
page read and write
|
||
180AD22E000
|
heap
|
page read and write
|
||
180ADA02000
|
heap
|
page read and write
|
||
236DA04D000
|
heap
|
page read and write
|
||
1B20463D000
|
heap
|
page read and write
|
||
B7EA3FE000
|
stack
|
page read and write
|
||
1CDCB620000
|
heap
|
page read and write
|
||
25DBD670000
|
heap
|
page read and write
|
||
1559A03C000
|
heap
|
page read and write
|
||
180AD237000
|
heap
|
page read and write
|
||
1CDCB603000
|
heap
|
page read and write
|
||
24492CD0000
|
heap
|
page read and write
|
||
20335120000
|
heap
|
page read and write
|
||
25DBD847000
|
heap
|
page read and write
|
||
180AD286000
|
heap
|
page read and write
|
||
1FCF94B7000
|
heap
|
page read and write
|
||
1FCF94A3000
|
heap
|
page read and write
|
||
F58ECCC000
|
stack
|
page read and write
|
||
1CDCB178000
|
heap
|
page read and write
|
||
1CDCAE80000
|
remote allocation
|
page read and write
|
||
20335200000
|
heap
|
page read and write
|
||
2BF43FA0000
|
trusted library allocation
|
page read and write
|
||
F3E727E000
|
stack
|
page read and write
|
||
25DBD813000
|
heap
|
page read and write
|
||
25DBD908000
|
heap
|
page read and write
|
||
1CDCB1B5000
|
heap
|
page read and write
|
||
1CDCB193000
|
heap
|
page read and write
|
||
625000
|
heap
|
page read and write
|
||
2BF3EC90000
|
heap
|
page read and write
|
||
20335241000
|
heap
|
page read and write
|
||
1FCF945A000
|
heap
|
page read and write
|
||
EEA7EFE000
|
stack
|
page read and write
|
||
1CDCA850000
|
heap
|
page read and write
|
||
1B55E902000
|
heap
|
page read and write
|
||
1905E24E000
|
heap
|
page read and write
|
||
1CDCA855000
|
heap
|
page read and write
|
||
1CDCB170000
|
heap
|
page read and write
|
||
1CDCB602000
|
heap
|
page read and write
|
||
1905E308000
|
heap
|
page read and write
|
||
1FCF93D0000
|
heap
|
page read and write
|
||
7989777000
|
stack
|
page read and write
|
||
2C615FC000
|
stack
|
page read and write
|
||
17900CB9000
|
heap
|
page read and write
|
||
2BF3EC92000
|
heap
|
page read and write
|
||
22CCCFB000
|
stack
|
page read and write
|
||
232CEEC0000
|
heap
|
page read and write
|
||
639000
|
heap
|
page read and write
|
||
79891ED000
|
stack
|
page read and write
|
||
400000
|
unkown
|
page readonly
|
||
22CCDFA000
|
stack
|
page read and write
|
||
1559A056000
|
heap
|
page read and write
|
||
28FCFC59000
|
heap
|
page read and write
|
||
2C617FD000
|
stack
|
page read and write
|
||
AA0000
|
heap
|
page read and write
|
||
1B204676000
|
heap
|
page read and write
|
||
AA6000
|
heap
|
page read and write
|
||
F523C7A000
|
stack
|
page read and write
|
||
2DE3CD20000
|
heap
|
page read and write
|
||
180AD252000
|
heap
|
page read and write
|
||
24492CE0000
|
trusted library allocation
|
page read and write
|
||
20335213000
|
heap
|
page read and write
|
||
1FCF94A1000
|
heap
|
page read and write
|
||
20335277000
|
heap
|
page read and write
|
||
7BA5AFB000
|
stack
|
page read and write
|
||
20335260000
|
heap
|
page read and write
|
||
236DA050000
|
heap
|
page read and write
|
||
180AD200000
|
heap
|
page read and write
|
||
1CDCB193000
|
heap
|
page read and write
|
||
1CDCB1A5000
|
heap
|
page read and write
|
||
1CDCA660000
|
heap
|
page read and write
|
||
1FCF94A1000
|
heap
|
page read and write
|
||
24492A34000
|
heap
|
page read and write
|
||
1CDCB193000
|
heap
|
page read and write
|
||
236DA048000
|
heap
|
page read and write
|
||
1CDCB11B000
|
heap
|
page read and write
|
||
1FCF945A000
|
heap
|
page read and write
|
||
1559A029000
|
heap
|
page read and write
|
||
1FCF9421000
|
heap
|
page read and write
|
||
2DE3CDBE000
|
heap
|
page read and write
|
||
22CD37F000
|
stack
|
page read and write
|
||
2BF3F313000
|
heap
|
page read and write
|
||
F3E635B000
|
stack
|
page read and write
|
||
290DDEF000
|
stack
|
page read and write
|
||
180AD2AF000
|
heap
|
page read and write
|
||
2DE3CD50000
|
heap
|
page read and write
|
||
7BA5DFF000
|
stack
|
page read and write
|
||
25DBD855000
|
heap
|
page read and write
|
||
1B204580000
|
trusted library allocation
|
page read and write
|
||
F3E6777000
|
stack
|
page read and write
|
||
1905E24D000
|
heap
|
page read and write
|
||
61E000
|
heap
|
page read and write
|
||
20335247000
|
heap
|
page read and write
|
||
17900C96000
|
heap
|
page read and write
|
||
2BF44000000
|
heap
|
page read and write
|
||
17900C50000
|
heap
|
page read and write
|
||
2BF3F300000
|
heap
|
page read and write
|
||
2BF43FD0000
|
trusted library allocation
|
page read and write
|
||
1CDCB170000
|
heap
|
page read and write
|
||
798987F000
|
stack
|
page read and write
|
||
1CDCA800000
|
heap
|
page read and write
|
||
1CDCB17A000
|
heap
|
page read and write
|
||
1CDCAE80000
|
remote allocation
|
page read and write
|
||
1CDCA8EF000
|
heap
|
page read and write
|
||
20335245000
|
heap
|
page read and write
|
||
1CDCA84E000
|
heap
|
page read and write
|
||
F3E6A7E000
|
stack
|
page read and write
|
||
20335279000
|
heap
|
page read and write
|
||
236DA100000
|
heap
|
page read and write
|
||
180AD3B8000
|
heap
|
page read and write
|
||
25DBD850000
|
heap
|
page read and write
|
||
20335302000
|
heap
|
page read and write
|
||
1CDCB603000
|
heap
|
page read and write
|
||
232CEB20000
|
heap
|
page read and write
|
||
A21F5FF000
|
stack
|
page read and write
|
||
B7EA5FF000
|
stack
|
page read and write
|
||
180AD180000
|
trusted library allocation
|
page read and write
|
||
FC96EC000
|
stack
|
page read and write
|
||
F523A79000
|
stack
|
page read and write
|
||
2BF3ECA2000
|
heap
|
page read and write
|
||
FC9F7E000
|
stack
|
page read and write
|
||
1CDCB191000
|
heap
|
page read and write
|
||
28FCFC24000
|
heap
|
page read and write
|
||
180AD2CD000
|
heap
|
page read and write
|
||
180AD080000
|
heap
|
page read and write
|
||
2DE3CD55000
|
heap
|
page read and write
|
||
1FCF946C000
|
heap
|
page read and write
|
||
15599FC0000
|
remote allocation
|
page read and write
|
||
180AD29F000
|
heap
|
page read and write
|
||
1FCF94A3000
|
heap
|
page read and write
|
||
1CDCB193000
|
heap
|
page read and write
|
||
798957F000
|
stack
|
page read and write
|
||
1B55F112000
|
heap
|
page read and write
|
||
1905E229000
|
heap
|
page read and write
|
||
1B55E8C2000
|
heap
|
page read and write
|
||
1FCF94A3000
|
heap
|
page read and write
|
||
180ADB60000
|
heap
|
page read and write
|
||
401000
|
unkown
|
page execute read
|
||
2BF44380000
|
trusted library allocation
|
page read and write
|
||
EEA7FFB000
|
stack
|
page read and write
|
||
24492A50000
|
heap
|
page read and write
|
||
FC976E000
|
stack
|
page read and write
|
||
2C61BFF000
|
stack
|
page read and write
|
||
61CCD7B000
|
stack
|
page read and write
|
||
1CDCB11D000
|
heap
|
page read and write
|
||
1CDCB11D000
|
heap
|
page read and write
|
||
17900C91000
|
heap
|
page read and write
|
||
1559A000000
|
heap
|
page read and write
|
||
1CDCAE80000
|
remote allocation
|
page read and write
|
||
25DBD84D000
|
heap
|
page read and write
|
||
17900C30000
|
heap
|
page read and write
|
||
1B204702000
|
heap
|
page read and write
|
||
734E0000
|
unkown
|
page readonly
|
||
440000
|
unkown
|
page read and write
|
||
180AE243000
|
heap
|
page read and write
|
||
22CD1FF000
|
stack
|
page read and write
|
||
1CDCA84C000
|
heap
|
page read and write
|
||
279F000
|
stack
|
page read and write
|
||
236DA049000
|
heap
|
page read and write
|
||
2BF43FB0000
|
trusted library allocation
|
page read and write
|
||
1FCF94BE000
|
heap
|
page read and write
|
||
61CCF7F000
|
stack
|
page read and write
|
||
1CDCA5F0000
|
heap
|
page read and write
|
||
25DBD800000
|
heap
|
page read and write
|
||
79890EC000
|
stack
|
page read and write
|
||
20335264000
|
heap
|
page read and write
|
||
1905E262000
|
heap
|
page read and write
|
||
1CDCA857000
|
heap
|
page read and write
|
||
1CDCA600000
|
heap
|
page read and write
|
||
1CDCB193000
|
heap
|
page read and write
|
||
1905E270000
|
heap
|
page read and write
|
||
B7EA4FE000
|
stack
|
page read and write
|
||
1B55E885000
|
heap
|
page read and write
|
||
1FCF9434000
|
heap
|
page read and write
|
||
2BF3ED14000
|
heap
|
page read and write
|
||
1B55E7F0000
|
trusted library allocation
|
page read and write
|
||
798997F000
|
stack
|
page read and write
|
||
1FCF9DF1000
|
heap
|
page read and write
|
||
52F29F7000
|
stack
|
page read and write
|
||
1CDCB1A5000
|
heap
|
page read and write
|
||
2033527B000
|
heap
|
page read and write
|
||
20335280000
|
heap
|
page read and write
|
||
232CED10000
|
heap
|
page read and write
|
||
1FCF9448000
|
heap
|
page read and write
|
||
1CDCB193000
|
heap
|
page read and write
|
||
1FCF945A000
|
heap
|
page read and write
|
||
17900C96000
|
heap
|
page read and write
|
||
24492930000
|
trusted library allocation
|
page read and write
|
||
24492A3B000
|
heap
|
page read and write
|
||
4093EFE000
|
stack
|
page read and write
|
||
2860000
|
trusted library allocation
|
page read and write
|
||
2033523B000
|
heap
|
page read and write
|
||
180ADB33000
|
heap
|
page read and write
|
||
1B55E865000
|
heap
|
page read and write
|
||
180ADB13000
|
heap
|
page read and write
|
||
2C613FB000
|
stack
|
page read and write
|
||
234F000
|
stack
|
page read and write
|
||
17900C80000
|
heap
|
page read and write
|
||
61CCCFC000
|
stack
|
page read and write
|
||
61CD07D000
|
stack
|
page read and write
|
||
1905E24A000
|
heap
|
page read and write
|
||
1B55E8BB000
|
heap
|
page read and write
|
||
20335263000
|
heap
|
page read and write
|
||
1B55E800000
|
heap
|
page read and write
|
||
24492A57000
|
heap
|
page read and write
|
||
734E4000
|
unkown
|
page readonly
|
||
1FCF946C000
|
heap
|
page read and write
|
||
EEA817F000
|
stack
|
page read and write
|
||
1905E0B0000
|
heap
|
page read and write
|
||
2BF44042000
|
heap
|
page read and write
|
||
25DBD902000
|
heap
|
page read and write
|
||
1CDCB193000
|
heap
|
page read and write
|
||
1CDCB1A4000
|
heap
|
page read and write
|
||
180AD3E1000
|
heap
|
page read and write
|
||
1CDCB1C5000
|
heap
|
page read and write
|
||
1CDCA85B000
|
heap
|
page read and write
|
||
20335248000
|
heap
|
page read and write
|
||
79894FB000
|
stack
|
page read and write
|
||
1CDCB1B4000
|
heap
|
page read and write
|
||
290E178000
|
stack
|
page read and write
|
||
2DE3CDBB000
|
heap
|
page read and write
|
||
2BF44370000
|
trusted library allocation
|
page read and write
|
||
1905E23C000
|
heap
|
page read and write
|
||
2BF3FEF0000
|
trusted library allocation
|
page read and write
|
||
2033526F000
|
heap
|
page read and write
|
||
1CDCB14F000
|
heap
|
page read and write
|
||
F52387C000
|
stack
|
page read and write
|
||
232CEB40000
|
heap
|
page read and write
|
||
1B55E913000
|
heap
|
page read and write
|
||
15599FC0000
|
remote allocation
|
page read and write
|
||
244929F0000
|
heap
|
page read and write
|
||
236D9E00000
|
heap
|
page read and write
|
||
1FCF94A3000
|
heap
|
page read and write
|
||
20335232000
|
heap
|
page read and write
|
||
40D000
|
unkown
|
page read and write
|
||
1905E200000
|
heap
|
page read and write
|
||
1CDCB602000
|
heap
|
page read and write
|
||
20335242000
|
heap
|
page read and write
|
||
180AE21D000
|
heap
|
page read and write
|
||
180AD030000
|
heap
|
page read and write
|
||
FC9BFB000
|
stack
|
page read and write
|
||
3C86BFD000
|
stack
|
page read and write
|
||
1B204665000
|
heap
|
page read and write
|
||
52F231B000
|
stack
|
page read and write
|
||
1FCF9434000
|
heap
|
page read and write
|
||
FC97EE000
|
stack
|
page read and write
|
||
24493620000
|
trusted library allocation
|
page read and write
|
||
24492A3B000
|
heap
|
page read and write
|
||
1B55E6F0000
|
heap
|
page read and write
|
||
A21F6FB000
|
stack
|
page read and write
|
||
1CDCB18D000
|
heap
|
page read and write
|
||
1FCF940F000
|
heap
|
page read and write
|
||
2BF440F1000
|
heap
|
page read and write
|
||
A21F7FF000
|
stack
|
page read and write
|
||
2BF3F200000
|
heap
|
page read and write
|
||
4093C7A000
|
stack
|
page read and write
|
||
236D9F70000
|
trusted library allocation
|
page read and write
|
||
28FCFC64000
|
heap
|
page read and write
|
||
1FCF95A0000
|
heap
|
page read and write
|
||
1FCF9403000
|
heap
|
page read and write
|
||
25DBD88C000
|
heap
|
page read and write
|
||
1CDCB1B7000
|
heap
|
page read and write
|
||
52F267E000
|
stack
|
page read and write
|
||
15599E30000
|
heap
|
page read and write
|
There are 749 hidden memdumps, click here to show them.