IOC Report
ProduKey.chm

loading gif

Files

File Path
Type
Category
Malicious
ProduKey.chm
MS Windows HtmlHelp Data
initial sample
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9QTQHWWN\produkey_icon[1].gif
GIF image data, version 89a, 32 x 32
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\OTUW0Q90\main[1].css
assembler source, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\IMT4D03.tmp
data
dropped
C:\Users\user\AppData\Local\Temp\~DF5DD65DA5026806E4.TMP
data
dropped
C:\Users\user\AppData\Local\Temp\~DFD5FF97BB24F8E7A7.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Users\user\AppData\Roaming\Microsoft\HTML Help\hh.dat
MS Windows HtmlHelp Data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\hh.exe
"C:\Windows\hh.exe" C:\Users\user\Desktop\ProduKey.chm

URLs

Name
IP
Malicious
http://www.nirsoft.net/utils/product_cd_key_viewer.htmlheD
unknown
http://www.nirsoft.net/utils/product_cd_key_viewer.htmlF
unknown
http://www.nirsoft.net/utils/product_cd_key_viewer.htmlf
unknown
http://www.nirsoft.net/utils/product_cd_key_viewer.htmlche
unknown
http://blog.nirsoft.net/2009/05/17/antivirus-companies-cause-a-big-headache-to-small-developers/z
unknown
http://www.nirsoft.net/utils/product_cd_key_viewer.html
unknown
http://www.nirsoft.net/utils/product_cd_key_viewer.htmlrodukey.html9
unknown
http://blog.nirsoft.net/2009/05/17/antivirus-companies-cause-a-big-headache-to-small-developers/
unknown
http://www.nirsoft.net/utils/product_cd_key_viewer.html.
unknown
http://blog.nirsoft.net/2009/05/17/antivirus-companies-cause-a-big-headache-to-small-developers/v
unknown
http://www.nirsoft.net/utils/product_cd_key_viewer.htmll
unknown
http://www.nirsoft.net/utils/product_cd_key_viewer.htmlrodukey.htmlDAT
unknown
http://www.nirsoft.net/utils/product_cd_key_viewer.html6
unknown
http://www.nirsoft.net/utils/product_cd_key_viewer.htmlv
unknown
http://www.nirsoft.net/utils/product_cd_key_viewer.htmls
unknown
There are 5 hidden URLs, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2977FD40000
heap
page read and write
236F9FE0000
heap
page read and write
297030B4000
heap
page read and write
29703344000
trusted library allocation
page read and write
2977FDCD000
heap
page read and write
FF57B7E000
stack
page read and write
F3AE77D000
stack
page read and write
22B46350000
heap
page read and write
29703338000
trusted library allocation
page read and write
29703314000
trusted library allocation
page read and write
2977FDFC000
heap
page read and write
2977FDCD000
heap
page read and write
2977FDD8000
heap
page read and write
2977FDEB000
heap
page read and write
2107466A000
heap
page read and write
297032D1000
trusted library allocation
page read and write
2977FE07000
heap
page read and write
2E840102000
heap
page read and write
21075223000
heap
page read and write
2977FDEE000
heap
page read and write
2977FDD8000
heap
page read and write
2E83FFD0000
trusted library allocation
page read and write
E9966A1000
stack
page read and write
21074F22000
heap
page read and write
297033DC000
heap
page read and write
2977FE07000
heap
page read and write
2977FE0B000
heap
page read and write
22B46444000
heap
page read and write
29707A80000
heap
page read and write
2977FDF0000
heap
page read and write
2977FD8C000
heap
page read and write
7DF436110000
trusted library allocation
page readonly
29707CA0000
trusted library allocation
page read and write
2977F2D2000
heap
page read and write
2E840029000
heap
page read and write
21074E02000
heap
page read and write
2977FE35000
heap
page read and write
29703300000
trusted library allocation
page read and write
E996E7C000
trusted library allocation
page read and write
2977F2A4000
heap
page read and write
2977F27E000
heap
page read and write
2977FE38000
heap
page read and write
297030AD000
heap
page read and write
2378E280000
heap
page read and write
29707B75000
heap
page read and write
29707208000
trusted library allocation
page read and write
2977FE0C000
heap
page read and write
21074F6F000
heap
page read and write
2977F2AF000
heap
page read and write
2977FE2E000
heap
page read and write
2378E502000
heap
page read and write
2970787F000
heap
page read and write
2977FDE2000
heap
page read and write
2977FDF4000
heap
page read and write
21074480000
heap
page read and write
2977FDE2000
heap
page read and write
2977FDFE000
heap
page read and write
29703382000
heap
page read and write
31AE5FE000
stack
page read and write
2977FE13000
heap
page read and write
29707882000
heap
page read and write
2E840066000
heap
page read and write
29707270000
trusted library allocation
page read and write
21074687000
heap
page read and write
2977F2AA000
heap
page read and write
2977FDFC000
heap
page read and write
29707B85000
heap
page read and write
29702C30000
trusted library allocation
page read and write
2977FE12000
heap
page read and write
29707BA0000
heap
page read and write
2E840025000
heap
page read and write
2977FDFA000
heap
page read and write
29707B90000
heap
page read and write
297033A2000
heap
page read and write
236FA140000
trusted library allocation
page read and write
2E84006C000
heap
page read and write
2E840073000
heap
page read and write
2977F1E0000
heap
page read and write
FF57F7E000
stack
page read and write
29707B90000
heap
page read and write
FF57E7E000
stack
page read and write
29707CA0000
trusted library allocation
page read and write
29703354000
trusted library allocation
page read and write
E996AFE000
stack
page read and write
29703310000
trusted library allocation
page read and write
2E840000000
heap
page read and write
297032F4000
trusted library allocation
page read and write
29707228000
trusted library allocation
page read and write
2977FE0C000
heap
page read and write
29707270000
trusted library allocation
page read and write
7DF436101000
trusted library allocation
page execute read
E996EFE000
stack
page read and write
29707208000
trusted library allocation
page read and write
2977FE25000
heap
page read and write
22B46E02000
heap
page read and write
29703320000
trusted library allocation
page read and write
297033AA000
heap
page read and write
2977FE01000
heap
page read and write
297030A4000
heap
page read and write
29707228000
trusted library allocation
page read and write
29707A60000
trusted library allocation
page read and write
2977FDF4000
heap
page read and write
21074FC6000
heap
page read and write
578E9FF000
stack
page read and write
22B462E0000
heap
page read and write
2977FDF4000
heap
page read and write
2970331C000
trusted library allocation
page read and write
29703418000
heap
page read and write
29707B90000
heap
page read and write
2977F2DD000
heap
page read and write
2977FDE2000
heap
page read and write
2977FDF8000
heap
page read and write
29707B51000
heap
page read and write
2977FDE0000
heap
page read and write
297033A0000
heap
page read and write
2977FDFC000
heap
page read and write
2977F300000
heap
page read and write
F3AE47D000
stack
page read and write
2977F1E9000
heap
page read and write
2977F9E3000
heap
page read and write
2977FDF3000
heap
page read and write
2977F294000
heap
page read and write
2977FE13000
heap
page read and write
29707BA0000
heap
page read and write
2977F4DE000
heap
page read and write
2977FDC4000
heap
page read and write
2977FDDB000
heap
page read and write
210745E0000
trusted library allocation
page read and write
2977FDCD000
heap
page read and write
29703368000
trusted library allocation
page read and write
2977FDF5000
heap
page read and write
2977FE00000
heap
page read and write
2977FDF4000
heap
page read and write
29703298000
trusted library allocation
page read and write
31AE3FE000
stack
page read and write
2977FE33000
heap
page read and write
210747E5000
heap
page read and write
2378E513000
heap
page read and write
2977FDDB000
heap
page read and write
2977FDFC000
heap
page read and write
29703332000
trusted library allocation
page read and write
2977FDFC000
heap
page read and write
29707BAE000
heap
page read and write
29707B89000
heap
page read and write
2977FE0C000
heap
page read and write
2107478E000
heap
page read and write
2378E45B000
heap
page read and write
2977F4D5000
heap
page read and write
29707238000
trusted library allocation
page read and write
2977F248000
heap
page read and write
2977FDD8000
heap
page read and write
2E840058000
heap
page read and write
2378E475000
heap
page read and write
2977FDDB000
heap
page read and write
2977FE07000
heap
page read and write
8C801FD000
stack
page read and write
2970339E000
heap
page read and write
29707B90000
heap
page read and write
1EA2A940000
heap
page read and write
2977FDFC000
heap
page read and write
21074FBE000
heap
page read and write
2977FE00000
heap
page read and write
22B464C1000
heap
page read and write
297033A6000
heap
page read and write
2107465F000
heap
page read and write
2E84005C000
heap
page read and write
29707B90000
heap
page read and write
29702420000
trusted library allocation
page read and write
2977FDDB000
heap
page read and write
29707C90000
trusted library allocation
page read and write
1EA2A970000
trusted library allocation
page read and write
22B46400000
heap
page read and write
297030B0000
heap
page read and write
22B46470000
heap
page read and write
F3AE5FD000
stack
page read and write
29707224000
trusted library allocation
page read and write
31AE17F000
stack
page read and write
22B46F00000
heap
page read and write
21074692000
heap
page read and write
2977FE04000
heap
page read and write
2977FE04000
heap
page read and write
578E3FC000
stack
page read and write
31AE4FA000
stack
page read and write
2977F2DD000
heap
page read and write
2977FE00000
heap
page read and write
578E8FB000
stack
page read and write
22B46429000
heap
page read and write
297032E2000
trusted library allocation
page read and write
21074629000
heap
page read and write
2977FE04000
heap
page read and write
2977F246000
heap
page read and write
2977FE00000
heap
page read and write
29703260000
heap
page read and write
236FA236000
heap
page read and write
2977F760000
heap
page read and write
29703304000
trusted library allocation
page read and write
578DFDB000
stack
page read and write
2977FDF5000
heap
page read and write
29703415000
heap
page read and write
2977FE35000
heap
page read and write
2977FE04000
heap
page read and write
2977F2DD000
heap
page read and write
29707228000
trusted library allocation
page read and write
236FA170000
remote allocation
page read and write
2107465B000
heap
page read and write
2977FE13000
heap
page read and write
2977F2DD000
heap
page read and write
21074671000
heap
page read and write
2E840057000
heap
page read and write
21075227000
heap
page read and write
2977F9E0000
heap
page read and write
210744E0000
heap
page read and write
29707B74000
heap
page read and write
2977F2B3000
heap
page read and write
2E84003A000
heap
page read and write
29707218000
trusted library allocation
page read and write
29707224000
trusted library allocation
page read and write
2378E467000
heap
page read and write
29707A70000
heap
page readonly
236FA213000
heap
page read and write
2977FE33000
heap
page read and write
2977FE00000
heap
page read and write
2977FE26000
heap
page read and write
2E840076000
heap
page read and write
29707BAC000
heap
page read and write
29707224000
trusted library allocation
page read and write
2977FDB5000
heap
page read and write
22B464CB000
heap
page read and write
29703324000
trusted library allocation
page read and write
2977FDAE000
heap
page read and write
297030A0000
heap
page read and write
29702FF0000
trusted library allocation
page read and write
2977FE35000
heap
page read and write
FF57AFE000
stack
page read and write
8C802FF000
stack
page read and write
29703338000
trusted library allocation
page read and write
29707270000
trusted library allocation
page read and write
F3AE27D000
stack
page read and write
F3ADD1B000
stack
page read and write
297032E8000
trusted library allocation
page read and write
2977FDF4000
heap
page read and write
2977F29F000
heap
page read and write
2E840031000
heap
page read and write
2977FE13000
heap
page read and write
21074652000
heap
page read and write
2977F2D2000
heap
page read and write
29707B82000
heap
page read and write
29703288000
trusted library allocation
page read and write
2977FD60000
heap
page read and write
29707BA0000
heap
page read and write
2977FD9B000
heap
page read and write
2970338A000
heap
page read and write
FF57A7B000
stack
page read and write
29702E20000
trusted library allocation
page read and write
AF42DFA000
stack
page read and write
297033F6000
heap
page read and write
2378E429000
heap
page read and write
2977FDF4000
heap
page read and write
578E87D000
stack
page read and write
2E840040000
heap
page read and write
29707BAE000
heap
page read and write
21074692000
heap
page read and write
297033BB000
heap
page read and write
2E83FF40000
heap
page read and write
1EA2A8E0000
heap
page read and write
2977FE04000
heap
page read and write
1EA2AA02000
heap
page read and write
21074600000
heap
page read and write
21075202000
heap
page read and write
2977FE3B000
heap
page read and write
578EBFD000
stack
page read and write
2977F4D0000
heap
page read and write
21074713000
heap
page read and write
2977F2D2000
heap
page read and write
2977FDFA000
heap
page read and write
2977FDFA000
heap
page read and write
E996C7E000
stack
page read and write
2E84005F000
heap
page read and write
2977FDE2000
heap
page read and write
236F9FD0000
heap
page read and write
21074DA0000
trusted library allocation
page read and write
2E840013000
heap
page read and write
1EA2AA46000
heap
page read and write
29707B84000
heap
page read and write
236FA302000
heap
page read and write
2970330C000
trusted library allocation
page read and write
31ADFFE000
stack
page read and write
2977F278000
heap
page read and write
8CFFEFB000
stack
page read and write
297033E5000
heap
page read and write
29707BAE000
heap
page read and write
2970332C000
trusted library allocation
page read and write
7DF436100000
trusted library allocation
page readonly
8C806FE000
stack
page read and write
2977FDE2000
heap
page read and write
7DF436121000
trusted library allocation
page execute read
29703354000
trusted library allocation
page read and write
22B462F0000
heap
page read and write
2977FDF4000
heap
page read and write
31AE6FA000
stack
page read and write
297032E0000
trusted library allocation
page read and write
2E840044000
heap
page read and write
2977FDD8000
heap
page read and write
2977FDFC000
heap
page read and write
2E84007D000
heap
page read and write
2977FE1D000
heap
page read and write
2E84004E000
heap
page read and write
2977FDF4000
heap
page read and write
2977FDF3000
heap
page read and write
2977FDF4000
heap
page read and write
29702D60000
heap
page read and write
2977FDDB000
heap
page read and write
2977F2AF000
heap
page read and write
1EA2AA3D000
heap
page read and write
297065F4000
trusted library allocation
page read and write
21074627000
heap
page read and write
FF57D7E000
stack
page read and write
31ADF7F000
stack
page read and write
2977FE00000
heap
page read and write
2977FDFA000
heap
page read and write
2977F2A4000
heap
page read and write
297030C8000
heap
page read and write
31ADBAB000
stack
page read and write
29703370000
heap
page read and write
29707BAC000
heap
page read and write
2977FE01000
heap
page read and write
2970337C000
heap
page read and write
2977FE12000
heap
page read and write
297030DA000
heap
page read and write
2977FDFA000
heap
page read and write
2107468C000
heap
page read and write
AF42BFE000
stack
page read and write
2378E380000
trusted library allocation
page read and write
297032F0000
trusted library allocation
page read and write
2E840060000
heap
page read and write
2977FE1A000
heap
page read and write
21074F92000
heap
page read and write
29703340000
trusted library allocation
page read and write
2977FDF4000
heap
page read and write
2977FDF4000
heap
page read and write
8CFFA7B000
stack
page read and write
29707270000
trusted library allocation
page read and write
2977FDFC000
heap
page read and write
2E84006A000
heap
page read and write
2977FD7B000
heap
page read and write
2E84005A000
heap
page read and write
2977FE07000
heap
page read and write
297032CC000
trusted library allocation
page read and write
21074613000
heap
page read and write
8C800FF000
stack
page read and write
2E840074000
heap
page read and write
2977FE38000
heap
page read and write
2977FDDB000
heap
page read and write
2977FE1A000
heap
page read and write
297030D7000
heap
page read and write
297033CA000
heap
page read and write
297032FC000
trusted library allocation
page read and write
2977FDCD000
heap
page read and write
2970787F000
heap
page read and write
29702D40000
trusted library allocation
page read and write
29703240000
trusted library section
page readonly
2977FE08000
heap
page read and write
22B46380000
trusted library allocation
page read and write
2970787F000
heap
page read and write
29707B87000
heap
page read and write
2977FE13000
heap
page read and write
29703340000
trusted library allocation
page read and write
29703318000
trusted library allocation
page read and write
8C803FF000
stack
page read and write
2107463C000
heap
page read and write
21074FB0000
heap
page read and write
2977FDF4000
heap
page read and write
2378E210000
heap
page read and write
2977FDDB000
heap
page read and write
2977F22B000
heap
page read and write
2977FDF4000
heap
page read and write
2977F27E000
heap
page read and write
2977F222000
heap
page read and write
7DF436111000
trusted library allocation
page execute read
29703368000
trusted library allocation
page read and write
297033A8000
heap
page read and write
F3AE4FF000
stack
page read and write
2977FE07000
heap
page read and write
29707BBE000
heap
page read and write
2977F2D2000
heap
page read and write
236FA170000
remote allocation
page read and write
2977FE38000
heap
page read and write
29703368000
trusted library allocation
page read and write
2977FDF4000
heap
page read and write
2977FDF8000
heap
page read and write
297033AC000
heap
page read and write
29707BBE000
heap
page read and write
8C804FF000
stack
page read and write
578E6FE000
stack
page read and write
578ECFF000
stack
page read and write
29703354000
trusted library allocation
page read and write
2977F212000
heap
page read and write
2977FE07000
heap
page read and write
29707C90000
trusted library allocation
page read and write
2977FE1A000
heap
page read and write
2378E413000
heap
page read and write
2970728C000
trusted library allocation
page read and write
29707B63000
heap
page read and write
2977FDF5000
heap
page read and write
1EA2AA29000
heap
page read and write
1EA2AA13000
heap
page read and write
2977FE04000
heap
page read and write
2977FE2B000
heap
page read and write
22B464BA000
heap
page read and write
29707C90000
trusted library allocation
page read and write
1EA2AA4C000
heap
page read and write
2977FDF4000
heap
page read and write
2977FE15000
heap
page read and write
236FA202000
heap
page read and write
2977F24C000
heap
page read and write
2E840047000
heap
page read and write
2378E400000
heap
page read and write
1EA2AA2F000
heap
page read and write
2977FE35000
heap
page read and write
2E840002000
heap
page read and write
29707B89000
heap
page read and write
2E84005E000
heap
page read and write
8CFFDFE000
stack
page read and write
E996D7B000
stack
page read and write
29707860000
heap
page read and write
2977FDF8000
heap
page read and write
2977FE15000
heap
page read and write
297033B8000
heap
page read and write
21074F00000
heap
page read and write
2977FE0B000
heap
page read and write
2977FDFC000
heap
page read and write
29707B87000
heap
page read and write
2977FDF4000
heap
page read and write
236FA200000
heap
page read and write
2977FE07000
heap
page read and write
2977FDEA000
heap
page read and write
29703386000
heap
page read and write
E9967FF000
stack
page read and write
2378E402000
heap
page read and write
21074674000
heap
page read and write
7DF4360F0000
trusted library allocation
page readonly
1EA2AA00000
heap
page read and write
2E840059000
heap
page read and write
2977FE00000
heap
page read and write
29707238000
trusted library allocation
page read and write
2E840079000
heap
page read and write
8CFFFFE000
stack
page read and write
2977FDDF000
heap
page read and write
29703392000
heap
page read and write
2E840A02000
trusted library allocation
page read and write
29701410000
trusted library section
page read and write
2E840046000
heap
page read and write
22B46489000
heap
page read and write
22B46513000
heap
page read and write
2E83FFA0000
heap
page read and write
2378E220000
heap
page read and write
29707B60000
heap
page read and write
29703330000
trusted library allocation
page read and write
29702C20000
trusted library allocation
page read and write
21074F54000
heap
page read and write
2977F2B9000
heap
page read and write
AF42CFA000
stack
page read and write
29707A60000
trusted library allocation
page read and write
578EAFE000
stack
page read and write
297030D2000
heap
page read and write
2E840041000
heap
page read and write
29703332000
trusted library allocation
page read and write
1EA2B402000
trusted library allocation
page read and write
2977FDEE000
heap
page read and write
297072BC000
trusted library allocation
page read and write
2977FDCD000
heap
page read and write
2977FE07000
heap
page read and write
2977F278000
heap
page read and write
AF42FFF000
stack
page read and write
2977FDF4000
heap
page read and write
E996F7E000
stack
page read and write
29703330000
trusted library allocation
page read and write
29707278000
trusted library allocation
page read and write
2E84007A000
heap
page read and write
29707C93000
trusted library allocation
page read and write
29706612000
trusted library allocation
page read and write
2977FDFC000
heap
page read and write
21075230000
heap
page read and write
297033E0000
heap
page read and write
2977FE00000
heap
page read and write
29707B7B000
heap
page read and write
236FA040000
heap
page read and write
29703368000
trusted library allocation
page read and write
2977F24C000
heap
page read and write
2E840045000
heap
page read and write
2E84003D000
heap
page read and write
2977FE0B000
heap
page read and write
2977FDF4000
heap
page read and write
29703290000
trusted library allocation
page read and write
21074F43000
heap
page read and write
2977FDDB000
heap
page read and write
1EA2AA53000
heap
page read and write
2977FDFE000
heap
page read and write
29703397000
heap
page read and write
2977F0A0000
heap
page read and write
29707B75000
heap
page read and write
29707CB0000
trusted library allocation
page read and write
29703278000
trusted library allocation
page read and write
29703399000
heap
page read and write
29707238000
trusted library allocation
page read and write
2977FE1A000
heap
page read and write
2977FE1A000
heap
page read and write
2977FE07000
heap
page read and write
2977FE00000
heap
page read and write
29707218000
trusted library allocation
page read and write
2977FE0B000
heap
page read and write
29703344000
trusted library allocation
page read and write
578E77C000
stack
page read and write
8CFFC7B000
stack
page read and write
21075213000
heap
page read and write
2E840061000
heap
page read and write
2977F950000
heap
page read and write
236FA170000
remote allocation
page read and write
29707B90000
heap
page read and write
2977F2E0000
heap
page read and write
236FA240000
heap
page read and write
2977F2A5000
heap
page read and write
2977F2DD000
heap
page read and write
2977FE0B000
heap
page read and write
F3AE67E000
stack
page read and write
2977FE00000
heap
page read and write
2E840069000
heap
page read and write
297032A0000
trusted library allocation
page read and write
AF427CC000
stack
page read and write
AF42EFF000
stack
page read and write
2977FDDB000
heap
page read and write
2977FDE9000
heap
page read and write
E996DFE000
stack
page read and write
21075230000
heap
page read and write
F3AE1FF000
stack
page read and write
2E83FF30000
heap
page read and write
2378E441000
heap
page read and write
21074F02000
heap
page read and write
2E840042000
heap
page read and write
2977FE12000
heap
page read and write
29707BAC000
heap
page read and write
2E840083000
heap
page read and write
21074470000
heap
page read and write
2977FE3B000
heap
page read and write
29707B8E000
heap
page read and write
236FA229000
heap
page read and write
297032B8000
trusted library allocation
page read and write
F3AE37E000
stack
page read and write
29707B90000
heap
page read and write
2977FDDB000
heap
page read and write
2977FE07000
heap
page read and write
29707C93000
trusted library allocation
page read and write
2970332C000
trusted library allocation
page read and write
1EA2AB02000
heap
page read and write
2977FE07000
heap
page read and write
29702C23000
trusted library allocation
page read and write
21075200000
heap
page read and write
2977FE04000
heap
page read and write
2970786E000
heap
page read and write
2977FE1D000
heap
page read and write
29707C80000
trusted library allocation
page read and write
29707B5F000
heap
page read and write
31AE27B000
stack
page read and write
29707C95000
trusted library allocation
page read and write
29703394000
heap
page read and write
236FAA02000
trusted library allocation
page read and write
21074652000
heap
page read and write
297033C2000
heap
page read and write
7DF4360F1000
trusted library allocation
page execute read
578E5FF000
stack
page read and write
236FA258000
heap
page read and write
2977FE04000
heap
page read and write
210747B9000
heap
page read and write
E996B7C000
stack
page read and write
8C805FF000
stack
page read and write
21074F22000
heap
page read and write
21074663000
heap
page read and write
E996CFF000
stack
page read and write
1EA2A8F0000
heap
page read and write
2977FDFC000
heap
page read and write
31AE2F9000
stack
page read and write
22B46502000
heap
page read and write
2977FDD8000
heap
page read and write
2977FE04000
heap
page read and write
2977FE1A000
heap
page read and write
1EA2AA37000
heap
page read and write
2378EC02000
trusted library allocation
page read and write
2977FE12000
heap
page read and write
22B46413000
heap
page read and write
2977FE35000
heap
page read and write
2977F2D2000
heap
page read and write
There are 581 hidden memdumps, click here to show them.