IOC Report
FSCaptureSetup107.exe

loading gif

Files

File Path
Type
Category
Malicious
FSCaptureSetup107.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
C:\Program Files (x86)\FastStone Capture\Credits.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Program Files (x86)\FastStone Capture\Draw.db
data
dropped
C:\Program Files (x86)\FastStone Capture\FSCIcon.db
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FastStone Capture\FSCPlugin01.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FastStone Capture\FSCPlugin02.dll
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files (x86)\FastStone Capture\FSCPlugin03.dll
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FastStone Capture\FSCPlugin04.dll
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FastStone Capture\FSCPlugin05.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FastStone Capture\FSCPlugin06.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FastStone Capture\FSCPlugin07.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Program Files (x86)\FastStone Capture\FSCapture.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FastStone Capture\FSCaptureHelp.chm
MS Windows HtmlHelp Data
dropped
C:\Program Files (x86)\FastStone Capture\FSCrossHair.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FastStone Capture\FSFocus.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FastStone Capture\FSLogo.png
PNG image data, 210 x 55, 8-bit/color RGBA, non-interlaced
dropped
C:\Program Files (x86)\FastStone Capture\FSRecorder.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FastStone Capture\Languages\FSC02.fslang
data
dropped
C:\Program Files (x86)\FastStone Capture\Languages\FSC03.fslang
data
dropped
C:\Program Files (x86)\FastStone Capture\Languages\FSC05.fslang
data
dropped
C:\Program Files (x86)\FastStone Capture\Languages\FSC06.fslang
data
dropped
C:\Program Files (x86)\FastStone Capture\Languages\FSC07.fslang
data
dropped
C:\Program Files (x86)\FastStone Capture\Languages\FSC08.fslang
data
dropped
C:\Program Files (x86)\FastStone Capture\Languages\FSC10.fslang
data
dropped
C:\Program Files (x86)\FastStone Capture\Languages\FSC11.fslang
data
dropped
C:\Program Files (x86)\FastStone Capture\Languages\FSC12.fslang
data
dropped
C:\Program Files (x86)\FastStone Capture\Languages\FSC13.fslang
data
dropped
C:\Program Files (x86)\FastStone Capture\Languages\FSC15.fslang
data
dropped
C:\Program Files (x86)\FastStone Capture\Languages\FSC16.fslang
data
dropped
C:\Program Files (x86)\FastStone Capture\Languages\FSC17.fslang
data
dropped
C:\Program Files (x86)\FastStone Capture\Languages\FSC19.fslang
data
dropped
C:\Program Files (x86)\FastStone Capture\Languages\FSC20.fslang
data
dropped
C:\Program Files (x86)\FastStone Capture\Languages\FSC21.fslang
data
dropped
C:\Program Files (x86)\FastStone Capture\Languages\FSC22.fslang
data
dropped
C:\Program Files (x86)\FastStone Capture\Languages\FSCaptureHelp_11.chm
MS Windows HtmlHelp Data
dropped
C:\Program Files (x86)\FastStone Capture\LicenseAgreement.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\FastStone Capture\Website.url
MS Windows 95 Internet shortcut text (URL=<http://www.faststone.org>), ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\FastStone Capture\libsharpyuv.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FastStone Capture\libwebp.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\FastStone Capture\uninst.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\FastStone Capture\FastStone Capture Help.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Fri May 17 21:58:50 2024, mtime=Mon Oct 7 08:00:34 2024, atime=Fri May 17 21:58:50 2024, length=176729, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\FastStone Capture\FastStone Capture.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Tue Aug 20 23:18:26 2024, mtime=Mon Oct 7 08:00:32 2024, atime=Tue Aug 20 23:18:26 2024, length=7563656, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\FastStone Capture\Uninstall FastStone Capture.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Tue Aug 20 23:36:40 2024, mtime=Mon Oct 7 08:00:34 2024, atime=Tue Aug 20 23:36:40 2024, length=86264, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\FastStone Capture\Visit www.FastStone.org.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Mon Oct 7 08:00:35 2024, mtime=Mon Oct 7 08:00:35 2024, atime=Mon Oct 7 08:00:35 2024, length=50, window=hide
dropped
C:\Users\Public\Desktop\FastStone Capture.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Tue Aug 20 23:18:26 2024, mtime=Mon Oct 7 08:00:35 2024, atime=Tue Aug 20 23:18:26 2024, length=7563656, window=hide
dropped
C:\Users\user\AppData\Local\Temp\nsf6353.tmp\InstallOptions.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsf6353.tmp\ShellExecAsUser.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsf6353.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsf6353.tmp\ioSpecial.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsf6353.tmp\modern-wizard.bmp
PC bitmap, Windows 3.x format, 164 x 314 x 4, image size 26376, resolution 2834 x 2834 px/m, cbSize 26494, bits offset 118
dropped
C:\Users\user\AppData\Local\Temp\nsk6323.tmp
data
dropped
There are 41 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\FSCaptureSetup107.exe
"C:\Users\user\Desktop\FSCaptureSetup107.exe"
C:\Program Files (x86)\FastStone Capture\FSCapture.exe
"C:\Program Files (x86)\FastStone Capture\FSCapture.exe"

URLs

Name
IP
Malicious
http://www.datastead.com/WMScriptWriterU
unknown
http://www.faststone.org
unknown
http://www.datastead.com/_download/WMFDist11.zip
unknown
http://www.faststone.org/FSCTutorial.htmU
unknown
http://www.faststone.org/FSCTutorial.htm
unknown
https://www.faststone.org/order.htmU
unknown
http://www.axis.com/techsup/software/amc/index.htm
unknown
http://www.matroska.org/
unknown
http://sourceforge.net/projects/gplmpgdec/
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.faststone.org/order.htm
unknown
http://www.faststone.org/
unknown
http://www.datastead.com/WMScriptWriter
unknown
http://avisynth.org
unknown
http://www.faststone.org/U
unknown
There are 5 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FastStone.fsc
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FastStone.fsc\DefaultIcon
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FastStone.fsc\shell
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FastStone.fsc\shell\open\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\.fsc\OpenWithProgids
FastStone.fsc
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FastStone-Capture
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FastStone-Capture\DefaultIcon
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\FastStone-Capture\shell\open\command
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\FastStone Capture\Capabilities
ApplicationDescription
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\FastStone Capture\Capabilities\FileAssociations
.fsc
HKEY_LOCAL_MACHINE\SOFTWARE\RegisteredApplications
FastStone-Capture
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\FSCapture.exe
NULL
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FastStone Capture
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FastStone Capture
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FastStone Capture
DisplayIcon
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FastStone Capture
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FastStone Capture
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\FastStone Capture
Publisher
HKEY_CURRENT_USER\SOFTWARE\8322898
7168
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
33D0000
trusted library allocation
page read and write
51CF000
stack
page read and write
BF6000
unkown
page write copy
5766000
direct allocation
page read and write
5A8000
heap
page read and write
33D0000
trusted library allocation
page read and write
435000
unkown
page read and write
37AE000
stack
page read and write
48E000
stack
page read and write
537000
heap
page read and write
30B0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
48D0000
trusted library allocation
page read and write
12C6000
heap
page read and write
33D0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
2F8B000
direct allocation
page read and write
30B0000
trusted library allocation
page read and write
1298000
heap
page read and write
537000
heap
page read and write
C1C000
unkown
page write copy
2EEC000
direct allocation
page read and write
40A000
unkown
page read and write
38D2000
direct allocation
page read and write
38D4000
direct allocation
page read and write
30B0000
trusted library allocation
page read and write
2230000
heap
page read and write
55A000
heap
page read and write
81BE000
stack
page read and write
56B000
heap
page read and write
30B0000
trusted library allocation
page read and write
124E000
heap
page read and write
5762000
direct allocation
page read and write
96000
stack
page read and write
30B0000
trusted library allocation
page read and write
56FF000
direct allocation
page read and write
38DF000
direct allocation
page read and write
42B000
unkown
page read and write
361E000
stack
page read and write
2E85000
heap
page read and write
555000
heap
page read and write
30B0000
trusted library allocation
page read and write
6C02000
direct allocation
page read and write
33D0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
56F7000
direct allocation
page read and write
2EE5000
direct allocation
page read and write
33D0000
trusted library allocation
page read and write
56D7000
direct allocation
page read and write
490000
heap
page read and write
558000
heap
page read and write
2FCC000
direct allocation
page read and write
33D0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
86A000
heap
page read and write
422000
unkown
page read and write
30B0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
351D000
stack
page read and write
51D0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
38B0000
direct allocation
page read and write
574C000
direct allocation
page read and write
33D0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
12CD000
heap
page read and write
1370000
heap
page read and write
594000
heap
page read and write
33D0000
trusted library allocation
page read and write
2F6A000
direct allocation
page read and write
33D0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
2F42000
direct allocation
page read and write
594000
heap
page read and write
33D0000
trusted library allocation
page read and write
1350000
heap
page read and write
2EB9000
direct allocation
page read and write
30B0000
trusted library allocation
page read and write
38D0000
direct allocation
page read and write
30B0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
7AF000
stack
page read and write
30B0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
2EFA000
direct allocation
page read and write
56E7000
direct allocation
page read and write
33D0000
trusted library allocation
page read and write
3934000
direct allocation
page read and write
33D0000
trusted library allocation
page read and write
10076000
unkown
page read and write
33D0000
trusted library allocation
page read and write
394A000
direct allocation
page read and write
3020000
trusted library allocation
page read and write
C19000
unkown
page read and write
33D0000
trusted library allocation
page read and write
57AD000
direct allocation
page read and write
77E7000
unkown
page read and write
30B0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
6BF2000
direct allocation
page read and write
33D0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
2EB5000
direct allocation
page read and write
33D0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
3020000
trusted library allocation
page read and write
32D0000
heap
page read and write
C0E000
unkown
page read and write
10000000
unkown
page readonly
10079000
unkown
page readonly
570F000
direct allocation
page read and write
33D0000
trusted library allocation
page read and write
400000
unkown
page readonly
33D0000
trusted library allocation
page read and write
BFD000
unkown
page read and write
12C3000
heap
page read and write
33D0000
trusted library allocation
page read and write
57A3000
direct allocation
page read and write
BF6000
unkown
page read and write
3870000
direct allocation
page read and write
57D9000
direct allocation
page read and write
33D0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
3875000
direct allocation
page read and write
6B95000
direct allocation
page read and write
3872000
direct allocation
page read and write
6B8B000
direct allocation
page read and write
30B0000
trusted library allocation
page read and write
2F49000
direct allocation
page read and write
56C0000
direct allocation
page read and write
25BE000
stack
page read and write
59A000
heap
page read and write
30B0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
3083000
heap
page read and write
33D0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
2FDA000
direct allocation
page read and write
33D0000
trusted library allocation
page read and write
2EB0000
direct allocation
page read and write
33D0000
trusted library allocation
page read and write
594000
heap
page read and write
C0A000
unkown
page read and write
33D0000
trusted library allocation
page read and write
5736000
direct allocation
page read and write
57F0000
direct allocation
page read and write
33D0000
trusted library allocation
page read and write
4E0000
heap
page read and write
30B0000
trusted library allocation
page read and write
4FF000
heap
page read and write
56ED000
direct allocation
page read and write
398E000
direct allocation
page read and write
210F000
stack
page read and write
33D0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
2F84000
direct allocation
page read and write
440000
heap
page read and write
30B0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
584000
heap
page read and write
30B0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
2F59000
direct allocation
page read and write
77E9000
unkown
page read and write
1240000
heap
page read and write
57C8000
direct allocation
page read and write
6BAA000
direct allocation
page read and write
2F33000
direct allocation
page read and write
30B0000
trusted library allocation
page read and write
710000
unkown
page readonly
33D0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
5724000
direct allocation
page read and write
397A000
direct allocation
page read and write
33D0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
124A000
heap
page read and write
C08000
unkown
page read and write
128D000
heap
page read and write
711000
unkown
page execute read
30B0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
5A6000
heap
page read and write
33D0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
57B000
heap
page read and write
4C0000
heap
page read and write
30B0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
542000
heap
page read and write
30B0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
585000
heap
page read and write
30B0000
trusted library allocation
page read and write
3170000
trusted library allocation
page read and write
57A0000
direct allocation
page read and write
30B0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
427000
unkown
page read and write
33D0000
trusted library allocation
page read and write
3950000
direct allocation
page read and write
2EDE000
direct allocation
page read and write
38A8000
direct allocation
page read and write
6B8D000
direct allocation
page read and write
57B2000
direct allocation
page read and write
83C0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
57D3000
direct allocation
page read and write
3020000
heap
page read and write
10067000
unkown
page readonly
2E80000
heap
page read and write
56C7000
direct allocation
page read and write
4FD000
heap
page read and write
33D0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
12CD000
heap
page read and write
579E000
direct allocation
page read and write
38D8000
direct allocation
page read and write
30B0000
trusted library allocation
page read and write
76C000
unkown
page execute read
33D0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
7840000
heap
page read and write
12CC000
heap
page read and write
425000
unkown
page read and write
53B000
heap
page read and write
220F000
stack
page read and write
30B0000
trusted library allocation
page read and write
40A000
unkown
page write copy
51D0000
trusted library allocation
page read and write
2234000
heap
page read and write
33D0000
trusted library allocation
page read and write
77D0000
unkown
page readonly
77D1000
unkown
page execute read
56CC000
direct allocation
page read and write
30B0000
trusted library allocation
page read and write
43B000
unkown
page read and write
2F99000
direct allocation
page read and write
30B0000
trusted library allocation
page read and write
542000
heap
page read and write
5783000
direct allocation
page read and write
4E8000
heap
page read and write
9E20000
heap
page read and write
12C9000
heap
page read and write
30B0000
trusted library allocation
page read and write
10001000
unkown
page execute read
5753000
direct allocation
page read and write
30B0000
trusted library allocation
page read and write
59D000
heap
page read and write
33D0000
trusted library allocation
page read and write
36AE000
stack
page read and write
5786000
direct allocation
page read and write
555000
heap
page read and write
33D0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
2F7A000
direct allocation
page read and write
3010000
heap
page read and write
2EBF000
direct allocation
page read and write
448E000
stack
page read and write
38DA000
direct allocation
page read and write
56F2000
direct allocation
page read and write
33D0000
trusted library allocation
page read and write
EE2000
stack
page read and write
5714000
direct allocation
page read and write
33D0000
trusted library allocation
page read and write
C23000
unkown
page readonly
57F000
heap
page read and write
80BF000
stack
page read and write
43D000
unkown
page readonly
33D0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
2FC4000
direct allocation
page read and write
33D0000
trusted library allocation
page read and write
3020000
heap
page read and write
30B0000
trusted library allocation
page read and write
77EB000
unkown
page readonly
3030000
direct allocation
page execute and read and write
5781000
direct allocation
page read and write
5745000
direct allocation
page read and write
397C000
direct allocation
page read and write
77E1000
unkown
page readonly
C12000
unkown
page read and write
44CE000
stack
page read and write
33D0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
408000
unkown
page readonly
26E2000
heap
page read and write
33D0000
trusted library allocation
page read and write
7EE000
stack
page read and write
2FBD000
direct allocation
page read and write
33D0000
trusted library allocation
page read and write
2F0F000
direct allocation
page read and write
30B0000
trusted library allocation
page read and write
2F60000
direct allocation
page read and write
401000
unkown
page execute read
6BE7000
direct allocation
page read and write
2FAF000
direct allocation
page read and write
5707000
direct allocation
page read and write
33D0000
trusted library allocation
page read and write
FEB000
stack
page read and write
6B83000
direct allocation
page read and write
30B0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
12B9000
heap
page read and write
30B0000
trusted library allocation
page read and write
38A3000
direct allocation
page read and write
2F92000
direct allocation
page read and write
78C0000
heap
page read and write
30B0000
trusted library allocation
page read and write
12BF000
heap
page read and write
359E000
stack
page read and write
26BF000
stack
page read and write
1360000
heap
page read and write
580000
heap
page read and write
408000
unkown
page readonly
30B0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
2E8B000
heap
page read and write
33D0000
trusted library allocation
page read and write
59A000
heap
page read and write
2FA0000
direct allocation
page read and write
2F16000
direct allocation
page read and write
43D000
unkown
page readonly
53B000
heap
page read and write
57D5000
direct allocation
page read and write
12C9000
heap
page read and write
2F24000
direct allocation
page read and write
34C0000
heap
page read and write
33D0000
trusted library allocation
page read and write
3410000
heap
page read and write
1285000
heap
page read and write
33D0000
trusted library allocation
page read and write
1375000
heap
page read and write
77E8000
unkown
page write copy
33D0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
59A000
heap
page read and write
33D0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
2F3B000
direct allocation
page read and write
19A000
stack
page read and write
30B0000
trusted library allocation
page read and write
401000
unkown
page execute read
397F000
direct allocation
page read and write
3170000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
57AA000
direct allocation
page read and write
400000
unkown
page readonly
538000
heap
page read and write
57B000
heap
page read and write
33D0000
trusted library allocation
page read and write
C1C000
unkown
page read and write
83E000
stack
page read and write
865000
heap
page read and write
578E000
direct allocation
page read and write
33D0000
trusted library allocation
page read and write
3630000
heap
page read and write
12C7000
heap
page read and write
33D0000
trusted library allocation
page read and write
2FE8000
direct allocation
page read and write
30B0000
trusted library allocation
page read and write
860000
heap
page read and write
30B0000
trusted library allocation
page read and write
C7C000
unkown
page readonly
30B0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
576E000
direct allocation
page read and write
59C000
heap
page read and write
3080000
heap
page read and write
12CC000
heap
page read and write
33D0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
30B0000
trusted library allocation
page read and write
33D0000
trusted library allocation
page read and write
There are 391 hidden memdumps, click here to show them.