IOC Report
https://physlets.org/tracker/installers/download.php?file=Tracker-6.2.0-windows-x64-installer.exe

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\AppData\Local\Temp\BRL00001ffc\BRD51C.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\BRL00001ffc\BRD57B.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\BRL00001ffc\BRD5DA.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\BRL00001ffc\BRD5FA.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\BRL00001ffc\BRD60B.tmp
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\BRL00001ffc\BRD63B.tmp
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\BRL00001ffc\BRD64B.tmp
PE32+ executable (DLL) (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\BRL00001ffc\BRD7E3.tmp
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\BRL00001ffc\BRD9C8.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\BRL00001ffc\BRD9E8.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\BRL00001ffc\BRDE3F.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\BRL00001ffc\BRDE4F.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\BRL00001ffc\BRDE60.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\BRL00001ffc\BRDE70.tmp
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Nov 19 20:47:07 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Nov 19 20:47:07 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:05:01 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Nov 19 20:47:07 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Nov 19 20:47:07 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Tue Nov 19 20:47:07 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\Downloads\Tracker-6.2.0-windows-x64-installer.exe (copy)
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\Downloads\Unconfirmed 415754.crdownload
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
C:\Users\user\Downloads\d3599b48-6882-4652-928c-7c3771e8e95b.tmp
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
There are 14 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1992 --field-trial-handle=1996,i,11750231315309060857,8759801983077189053,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "https://physlets.org/tracker/installers/download.php?file=Tracker-6.2.0-windows-x64-installer.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5160 --field-trial-handle=1996,i,11750231315309060857,8759801983077189053,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Users\user\Downloads\Tracker-6.2.0-windows-x64-installer.exe
"C:\Users\user\Downloads\Tracker-6.2.0-windows-x64-installer.exe"

URLs

Name
IP
Malicious
https://physlets.org/tracker/installers/download.php?file=Tracker-6.2.0-windows-x64-installer.exe
http://tcl.sf.net
unknown
http://forum.java.sun.com/thread.jspa?threadID=426291&messageID=1997063
unknown
http://www.iana.org/assignments/character-sets
unknown
http://docs.fedoraproject.org/en-US/Fedora/13/html/SELinux_FAQ/index.html#id3037154
unknown
http://wiki.tcl.tk/
unknown
http://www.inria.fr/koala/colas/
unknown
http://www.freedesktop.org/standards/shared-mime-info
unknown
http://docs.fedoraproject.org/en-US/Fedora/13/html/SELinux_FAQ/index.html#id3037154ds_disconnect_se
unknown
http://support.micr
unknown
http://www.tdom.org
unknown
http://blogs.msdn.com/b/oldnewthing/archive/2004/01/30/65013.aspx
unknown
http://www.opensourcephysics.org/
unknown
http://download.bitrock.com/feedback.phpsions
unknown
https://update.bitrock.com/api/1_0
unknown
http://www.google.com
unknown
http://www.cabrillo.edu/~dbrown/tracker/
unknown
http://tkcon.sourceforge.net/
unknown
http://www.activestate.com/tcl/
unknown
http://blogs.msdn.com/oldnewthing/archive/2003/08/21/54675.aspx
unknown
http://www.cs.wm.edu/~hallyn/des/weak
unknown
http://download.bitrock.com/feedback.php
unknown
There are 11 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
142.250.186.78
unknown
United States
165.227.222.255
unknown
United States
1.1.1.1
unknown
Australia
108.177.15.84
unknown
United States
239.255.255.250
unknown
Reserved
216.58.212.142
unknown
United States
142.250.186.163
unknown
United States
172.217.18.4
unknown
United States
192.168.2.16
unknown
unknown
192.168.2.4
unknown
unknown
142.250.185.227
unknown
United States
There are 1 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Session Manager\Environment
InstallBuilder

Memdumps

Base Address
Regiontype
Protect
Malicious
3139000
heap
page read and write
5118000
heap
page read and write
360A000
heap
page read and write
620F000
heap
page read and write
63EB000
heap
page read and write
30AE000
heap
page read and write
5DE3000
heap
page read and write
6872000
heap
page read and write
710C1000
unkown
page execute read
6612000
heap
page read and write
4AD1000
heap
page read and write
388D000
heap
page read and write
5094000
heap
page read and write
4300000
heap
page read and write
69C9000
heap
page read and write
6A1B7000
unkown
page readonly
2F82000
heap
page read and write
58EB000
heap
page read and write
710E1000
unkown
page readonly
4998000
heap
page read and write
67E16000
unkown
page readonly
5CD9000
heap
page read and write
A41000
unkown
page read and write
46C2000
heap
page read and write
592D000
heap
page read and write
7236000
heap
page read and write
4DF7000
heap
page read and write
67D08000
unkown
page readonly
14CE000
stack
page read and write
3874000
heap
page read and write
6830000
heap
page read and write
75F1000
heap
page read and write
710D2000
unkown
page read and write
B0A000
heap
page read and write
6E44000
heap
page read and write
51DE000
heap
page read and write
2F8A000
heap
page read and write
2FB9000
heap
page read and write
6A0C000
heap
page read and write
52000000
unkown
page readonly
67C80000
unkown
page readonly
5625000
heap
page read and write
5629000
heap
page read and write
31C0000
heap
page read and write
66C01000
unkown
page execute read
5541000
heap
page read and write
30B6000
heap
page read and write
7112000
heap
page read and write
486B000
heap
page read and write
6668C000
unkown
page read and write
7545000
heap
page read and write
72E2000
heap
page read and write
4326000
heap
page read and write
2F86000
heap
page read and write
2F9A000
heap
page read and write
387E000
heap
page read and write
2F65000
heap
page read and write
3011000
heap
page read and write
6321000
heap
page read and write
5716000
heap
page read and write
31BF000
heap
page read and write
6609D000
unkown
page readonly
710C0000
unkown
page readonly
4319000
heap
page read and write
6317000
heap
page read and write
42C6000
heap
page read and write
3011000
heap
page read and write
3EC2000
heap
page read and write
3F04000
heap
page read and write
6662000
heap
page read and write
579A000
heap
page read and write
7020000
heap
page read and write
442A000
heap
page read and write
3FAA000
heap
page read and write
50D6000
heap
page read and write
2FBF000
heap
page read and write
4130000
heap
page read and write
47D6000
heap
page read and write
5A35000
heap
page read and write
4300000
heap
page read and write
5FB4000
heap
page read and write
2F10000
heap
page read and write
2F3D000
heap
page read and write
3764000
heap
page read and write
63A9000
heap
page read and write
3860000
heap
page read and write
781000
unkown
page execute read
66681000
unkown
page execute read
4870000
heap
page read and write
44B4000
heap
page read and write
6CA05000
unkown
page readonly
5E25000
heap
page read and write
67E01000
unkown
page execute read
3842000
heap
page read and write
6083000
heap
page read and write
1760000
heap
page read and write
52011000
unkown
page readonly
63990000
unkown
page readonly
4878000
heap
page read and write
7110000
heap
page read and write
6EEB000
heap
page read and write
321D000
heap
page read and write
4675000
heap
page read and write
5758000
heap
page read and write
4330000
heap
page read and write
2F8C000
heap
page read and write
6620000
heap
page read and write
16CE000
stack
page read and write
5CEE000
heap
page read and write
547B000
heap
page read and write
3053000
heap
page read and write
71F4000
heap
page read and write
5620000
heap
page read and write
2F76000
heap
page read and write
35B0000
heap
page read and write
2F86000
heap
page read and write
6AD5000
heap
page read and write
418E000
heap
page read and write
5583000
heap
page read and write
374D000
heap
page read and write
6A1A3000
unkown
page readonly
42C2000
heap
page read and write
4305000
heap
page read and write
709E000
heap
page read and write
3664000
heap
page read and write
4336000
heap
page read and write
705C000
heap
page read and write
54FF000
heap
page read and write
4654000
heap
page read and write
6C585000
unkown
page readonly
5825000
heap
page read and write
5607000
heap
page read and write
463F000
heap
page read and write
6041000
heap
page read and write
536A000
heap
page read and write
4A5F000
heap
page read and write
66C12000
unkown
page read and write
414C000
heap
page read and write
2F76000
heap
page read and write
498D000
heap
page read and write
497D000
heap
page read and write
65FB000
heap
page read and write
4985000
heap
page read and write
3604000
heap
page read and write
4752000
heap
page read and write
710DA000
unkown
page read and write
6C581000
unkown
page execute read
2F93000
heap
page read and write
68BD000
heap
page read and write
4319000
heap
page read and write
66080000
unkown
page readonly
6DA5000
heap
page read and write
6FD5000
heap
page read and write
5EAC000
heap
page read and write
2F8A000
heap
page read and write
6C590000
unkown
page read and write
6605000
heap
page read and write
7062000
heap
page read and write
B0A000
heap
page read and write
4546000
heap
page read and write
485B000
heap
page read and write
5200C000
unkown
page read and write
4B6E000
heap
page read and write
69D4000
heap
page read and write
581E000
heap
page read and write
5E67000
heap
page read and write
6310E000
unkown
page readonly
710DD000
unkown
page readonly
4890000
heap
page read and write
3893000
heap
page read and write
63980000
unkown
page readonly
561C000
heap
page read and write
2F7B000
heap
page read and write
455D000
heap
page read and write
618B000
heap
page read and write
457B000
heap
page read and write
69E8000
heap
page read and write
434A000
heap
page read and write
66E6000
heap
page read and write
64F3000
heap
page read and write
319A000
heap
page read and write
63992000
unkown
page readonly
6535000
heap
page read and write
3716000
heap
page read and write
4026000
heap
page read and write
6BC8000
heap
page read and write
63112000
unkown
page readonly
642D000
heap
page read and write
66691000
unkown
page readonly
75F7000
heap
page read and write
5634000
heap
page read and write
4140000
heap
page read and write
A47000
unkown
page read and write
3FBA000
heap
page read and write
710DF000
unkown
page readonly
3972000
heap
page read and write
2FAF000
heap
page read and write
4611000
heap
page read and write
432B000
heap
page read and write
37E3000
heap
page read and write
37DF000
heap
page read and write
37C5000
heap
page read and write
72CA000
heap
page read and write
35C2000
heap
page read and write
4206000
heap
page read and write
73A4000
heap
page read and write
4EBD000
heap
page read and write
701A000
heap
page read and write
73AE000
heap
page read and write
2FB9000
heap
page read and write
4531000
heap
page read and write
6A1B5000
unkown
page readonly
42F4000
heap
page read and write
4681000
heap
page read and write
4868000
heap
page read and write
4273000
heap
page read and write
317B000
heap
page read and write
6C580000
unkown
page readonly
564E000
heap
page read and write
A45000
unkown
page readonly
4BBF000
heap
page read and write
4F41000
heap
page read and write
4AA1000
heap
page read and write
4D31000
heap
page read and write
69F0000
heap
page read and write
700000
heap
page read and write
71B2000
heap
page read and write
6728000
heap
page read and write
4680000
heap
page read and write
45E2000
heap
page read and write
38B4000
heap
page read and write
5C52000
heap
page read and write
7408000
heap
page read and write
4968000
heap
page read and write
360F000
heap
page read and write
2F6A000
heap
page read and write
42CE000
heap
page read and write
63981000
unkown
page execute read
3862000
heap
page read and write
B08000
heap
page read and write
4561000
heap
page read and write
3608000
heap
page read and write
3889000
heap
page read and write
5B89000
heap
page read and write
4193000
heap
page read and write
2F82000
heap
page read and write
67D04000
unkown
page readonly
52001000
unkown
page execute read
311E000
heap
page read and write
411A000
heap
page read and write
5631000
heap
page read and write
4525000
heap
page read and write
4AE4000
heap
page read and write
6F81000
heap
page read and write
6293000
heap
page read and write
4861000
heap
page read and write
2F8A000
heap
page read and write
3897000
heap
page read and write
3202000
heap
page read and write
395D000
heap
page read and write
2F67000
heap
page read and write
62E8000
heap
page read and write
370C000
heap
page read and write
4228000
heap
page read and write
36CA000
heap
page read and write
370B000
heap
page read and write
413E000
heap
page read and write
6251000
heap
page read and write
7105000
heap
page read and write
4BD5000
heap
page read and write
6577000
heap
page read and write
5650000
heap
page read and write
A4D000
unkown
page write copy
4999000
heap
page read and write
5C10000
heap
page read and write
434D000
heap
page read and write
3E80000
heap
page read and write
5648000
heap
page read and write
6A6A000
heap
page read and write
75F6000
heap
page read and write
71EA000
heap
page read and write
3825000
heap
page read and write
361E000
heap
page read and write
6D51000
heap
page read and write
2F7D000
heap
page read and write
66C15000
unkown
page readonly
72C0000
heap
page read and write
4071000
heap
page read and write
4656000
heap
page read and write
6609F000
unkown
page readonly
66686000
unkown
page readonly
63105000
unkown
page readonly
64B1000
heap
page read and write
B0E000
heap
page read and write
4535000
heap
page read and write
430C000
heap
page read and write
52006000
unkown
page read and write
397A000
heap
page read and write
70A4000
heap
page read and write
AE0000
heap
page read and write
6C67000
heap
page read and write
62E1000
heap
page read and write
65B9000
heap
page read and write
3893000
heap
page read and write
3217000
heap
page read and write
3646000
heap
page read and write
72CA000
heap
page read and write
2FC9000
heap
page read and write
5DA1000
heap
page read and write
51FFA000
unkown
page read and write
740C000
heap
page read and write
66C0C000
unkown
page readonly
3790000
heap
page read and write
10059000
unkown
page read and write
58BD000
heap
page read and write
72D7000
heap
page read and write
710D3000
unkown
page readonly
A16000
unkown
page readonly
4645000
heap
page read and write
3580000
heap
page read and write
63986000
unkown
page readonly
451C000
heap
page read and write
63101000
unkown
page execute read
66A4000
heap
page read and write
2FB9000
heap
page read and write
67E17000
unkown
page read and write
9A6000
unkown
page read and write
A78000
unkown
page readonly
38AA000
heap
page read and write
54BD000
heap
page read and write
4521000
heap
page read and write
736C000
heap
page read and write
AB0000
heap
page read and write
6149000
heap
page read and write
4888000
heap
page read and write
466B000
heap
page read and write
2F76000
heap
page read and write
306A000
heap
page read and write
70CD000
heap
page read and write
53AC000
heap
page read and write
5B7D000
heap
page read and write
3622000
heap
page read and write
383A000
heap
page read and write
5C94000
heap
page read and write
7394000
heap
page read and write
5BCE000
heap
page read and write
67E1A000
unkown
page readonly
5B82000
heap
page read and write
31CA000
heap
page read and write
4EFF000
heap
page read and write
AE1000
heap
page read and write
66685000
unkown
page read and write
69F2000
heap
page read and write
4145000
heap
page read and write
FF1000
stack
page read and write
3F3C000
heap
page read and write
9AF000
unkown
page read and write
45C7000
heap
page read and write
5010000
heap
page read and write
53F7000
heap
page read and write
3052000
heap
page read and write
3201000
heap
page read and write
67E10000
unkown
page read and write
6610000
heap
page read and write
75F6000
heap
page read and write
9C2000
unkown
page readonly
77EF000
stack
page read and write
3581000
heap
page read and write
6ED1000
heap
page read and write
59B1000
heap
page read and write
4611000
heap
page read and write
70FC000
heap
page read and write
2F7A000
heap
page read and write
2FB8000
heap
page read and write
5439000
heap
page read and write
5C8A000
heap
page read and write
4309000
heap
page read and write
5A77000
heap
page read and write
3620000
heap
page read and write
72DD000
heap
page read and write
30B5000
heap
page read and write
6A181000
unkown
page execute read
73C6000
heap
page read and write
4E39000
heap
page read and write
4818000
heap
page read and write
43BA000
heap
page read and write
414D000
heap
page read and write
4561000
heap
page read and write
3096000
heap
page read and write
4262000
heap
page read and write
6398B000
unkown
page read and write
44DB000
heap
page read and write
55C5000
heap
page read and write
5052000
heap
page read and write
6A70000
heap
page read and write
4277000
heap
page read and write
6AB8000
heap
page read and write
4533000
heap
page read and write
4187000
heap
page read and write
A90000
heap
page read and write
99D000
unkown
page read and write
63100000
unkown
page readonly
38B5000
heap
page read and write
51FF5000
unkown
page readonly
5200F000
unkown
page readonly
44D3000
heap
page read and write
4709000
heap
page read and write
996000
unkown
page read and write
36F9000
heap
page read and write
564A000
heap
page read and write
780000
unkown
page readonly
10001000
unkown
page execute read
5CD6000
heap
page read and write
4323000
heap
page read and write
63110000
unkown
page readonly
6CA01000
unkown
page execute read
3AC4000
heap
page read and write
9AA000
unkown
page read and write
66693000
unkown
page readonly
2F7A000
heap
page read and write
35C2000
heap
page read and write
5FF6000
heap
page read and write
3604000
heap
page read and write
4DB5000
heap
page read and write
A46000
unkown
page write copy
711D000
heap
page read and write
488D000
heap
page read and write
361B000
heap
page read and write
67AC000
heap
page read and write
6CB2000
heap
page read and write
75F8000
heap
page read and write
6617000
heap
page read and write
52E6000
heap
page read and write
4B9A000
heap
page read and write
45A2000
heap
page read and write
302C000
heap
page read and write
6668F000
unkown
page readonly
47DA000
heap
page read and write
10042000
unkown
page readonly
6A90000
heap
page read and write
302E000
heap
page read and write
6A9B000
heap
page read and write
67CE9000
unkown
page readonly
519C000
heap
page read and write
38C2000
heap
page read and write
321E000
heap
page read and write
2F7F000
heap
page read and write
66C0B000
unkown
page read and write
3878000
heap
page read and write
487E000
heap
page read and write
7008000
heap
page read and write
4E7B000
heap
page read and write
5B86000
heap
page read and write
4875000
heap
page read and write
389D000
heap
page read and write
728B000
heap
page read and write
67E1E000
unkown
page readonly
5AB9000
heap
page read and write
72DA000
heap
page read and write
3011000
heap
page read and write
66C11000
unkown
page readonly
6C13000
heap
page read and write
498B000
heap
page read and write
4312000
heap
page read and write
2F86000
heap
page read and write
433E000
heap
page read and write
75F5000
heap
page read and write
710C000
heap
page read and write
2F67000
heap
page read and write
3772000
heap
page read and write
708A000
heap
page read and write
730000
heap
page read and write
6FEC000
heap
page read and write
2F82000
heap
page read and write
67E00000
unkown
page readonly
397E000
heap
page read and write
67EE000
heap
page read and write
58A9000
heap
page read and write
4989000
heap
page read and write
4866000
heap
page read and write
67D05000
unkown
page read and write
3090000
heap
page read and write
69C8000
heap
page read and write
66C19000
unkown
page readonly
733B000
heap
page read and write
42AD000
heap
page read and write
4462000
heap
page read and write
3214000
heap
page read and write
3FA1000
heap
page read and write
6668B000
unkown
page readonly
2F98000
heap
page read and write
3816000
heap
page read and write
2F91000
heap
page read and write
5B46000
heap
page read and write
74CD000
heap
page read and write
5692000
heap
page read and write
43E8000
heap
page read and write
6398E000
unkown
page readonly
B07000
heap
page read and write
6943000
heap
page read and write
4B2C000
heap
page read and write
3688000
heap
page read and write
6CA00000
unkown
page readonly
10000000
unkown
page readonly
646F000
heap
page read and write
66C00000
unkown
page readonly
5220000
heap
page read and write
6609A000
unkown
page read and write
56D4000
heap
page read and write
6985000
heap
page read and write
712B000
heap
page read and write
6B29000
heap
page read and write
4864000
heap
page read and write
70EF000
heap
page read and write
3913000
heap
page read and write
4349000
heap
page read and write
5E69000
heap
page read and write
AB7000
heap
page read and write
12CC000
stack
page read and write
66081000
unkown
page execute read
2F57000
heap
page read and write
464D000
heap
page read and write
57DC000
heap
page read and write
62D5000
heap
page read and write
3F9B000
heap
page read and write
6A04000
heap
page read and write
42F3000
heap
page read and write
5B80000
heap
page read and write
4F83000
heap
page read and write
703A000
heap
page read and write
38BC000
heap
page read and write
430C000
heap
page read and write
4560000
heap
page read and write
52007000
unkown
page readonly
2F7A000
heap
page read and write
4308000
heap
page read and write
470D000
heap
page read and write
4FCE000
heap
page read and write
6B7D000
heap
page read and write
52A4000
heap
page read and write
465A000
heap
page read and write
485A000
heap
page read and write
2F76000
heap
page read and write
B0B000
heap
page read and write
661A000
heap
page read and write
4651000
heap
page read and write
992000
unkown
page write copy
385C000
heap
page read and write
4CE6000
heap
page read and write
5D1D000
heap
page read and write
48E3000
heap
page read and write
3844000
heap
page read and write
596F000
heap
page read and write
7208000
heap
page read and write
3219000
heap
page read and write
465A000
heap
page read and write
45A2000
heap
page read and write
5627000
heap
page read and write
6C597000
unkown
page readonly
5D5F000
heap
page read and write
35BC000
heap
page read and write
6DF0000
heap
page read and write
414C000
heap
page read and write
51FF0000
unkown
page readonly
3871000
heap
page read and write
66C17000
unkown
page readonly
6F1C000
heap
page read and write
6A6F000
heap
page read and write
42F4000
heap
page read and write
3867000
heap
page read and write
3216000
heap
page read and write
562B000
heap
page read and write
3847000
heap
page read and write
5F30000
heap
page read and write
2FDA000
heap
page read and write
4220000
heap
page read and write
3FE4000
heap
page read and write
4982000
heap
page read and write
382D000
heap
page read and write
3010000
heap
page read and write
43A6000
heap
page read and write
48A1000
heap
page read and write
7170000
heap
page read and write
B0B000
heap
page read and write
70EC000
heap
page read and write
515A000
heap
page read and write
37D2000
heap
page read and write
354F000
stack
page read and write
4BAA000
heap
page read and write
4AC6000
heap
page read and write
563B000
heap
page read and write
6F36000
heap
page read and write
67E1C000
unkown
page readonly
72B6000
heap
page read and write
317E000
heap
page read and write
712E000
heap
page read and write
49DB000
heap
page read and write
3FDB000
heap
page read and write
660A1000
unkown
page readonly
6367000
heap
page read and write
6619000
heap
page read and write
3F46000
heap
page read and write
67E15000
unkown
page read and write
563E000
heap
page read and write
60C5000
heap
page read and write
7122000
heap
page read and write
38A5000
heap
page read and write
4794000
heap
page read and write
321B000
heap
page read and write
3343000
heap
page read and write
6A1B3000
unkown
page readonly
7281000
heap
page read and write
4124000
heap
page read and write
4D73000
heap
page read and write
ADB000
heap
page read and write
702E000
heap
page read and write
710000
heap
page read and write
734E000
heap
page read and write
7542000
heap
page read and write
31A2000
heap
page read and write
6CA09000
unkown
page readonly
5328000
heap
page read and write
72F4000
heap
page read and write
4C9B000
heap
page read and write
435B000
heap
page read and write
3340000
heap
page read and write
61CD000
heap
page read and write
66090000
unkown
page readonly
6A8C000
heap
page read and write
729F000
heap
page read and write
5262000
heap
page read and write
6A1B0000
unkown
page read and write
5CD7000
heap
page read and write
4BFB000
heap
page read and write
706E000
heap
page read and write
67CE8000
unkown
page read and write
452F000
heap
page read and write
62F9000
heap
page read and write
35A4000
heap
page read and write
66680000
unkown
page readonly
41D5000
heap
page read and write
9AD000
unkown
page read and write
6310B000
unkown
page read and write
4967000
heap
page read and write
31B6000
heap
page read and write
6107000
heap
page read and write
7220000
heap
page read and write
4C3D000
heap
page read and write
561B000
heap
page read and write
4BDD000
heap
page read and write
2FA9000
heap
page read and write
5B04000
heap
page read and write
464B000
heap
page read and write
5867000
heap
page read and write
4326000
heap
page read and write
6A180000
unkown
page readonly
5F72000
heap
page read and write
2F86000
heap
page read and write
466B000
heap
page read and write
4925000
heap
page read and write
70AA000
heap
page read and write
431D000
heap
page read and write
6D06000
heap
page read and write
3967000
heap
page read and write
31B9000
heap
page read and write
67C81000
unkown
page execute read
44AE000
heap
page read and write
451E000
heap
page read and write
6C595000
unkown
page readonly
397C000
heap
page read and write
7091000
heap
page read and write
1720000
heap
page read and write
40E0000
heap
page read and write
446C000
heap
page read and write
6900000
heap
page read and write
6A4E000
heap
page read and write
581F000
heap
page read and write
75F9000
heap
page read and write
3F91000
heap
page read and write
4305000
heap
page read and write
67E11000
unkown
page readonly
4A1D000
heap
page read and write
45C8000
heap
page read and write
72F3000
heap
page read and write
69ED000
heap
page read and write
40CF000
heap
page read and write
6E8F000
heap
page read and write
710D9000
unkown
page readonly
67CE4000
unkown
page write copy
69FE000
heap
page read and write
992000
unkown
page read and write
38D1000
heap
page read and write
1005A000
unkown
page readonly
3853000
heap
page read and write
676A000
heap
page read and write
4BB0000
heap
page read and write
562E000
heap
page read and write
51FF1000
unkown
page execute read
31BF000
heap
page read and write
4319000
heap
page read and write
59F3000
heap
page read and write
2FB3000
heap
page read and write
2FA7000
heap
page read and write
6CA0A000
unkown
page read and write
5EEE000
heap
page read and write
66099000
unkown
page readonly
There are 696 hidden memdumps, click here to show them.