IOC Report
Mtcn_1637256355_pdf.jar

loading gif

Files

File Path
Type
Category
Malicious
Mtcn_1637256355_pdf.jar
Zip archive data, at least v2.0 to extract, compression method=deflate
initial sample
malicious
C:\ProgramData\Oracle\Java\.oracle_jre_usage\b5820291038aa69c.timestamp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\hsperfdata_user\6484
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\83aa4cc77f591dfc2374580bbd95f6ba_9e146be9-c76a-4720-bcdb-53011b87bd06
data
dropped
C:\cmdlinestart.log
ASCII text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
"C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Mtcn_1637256355_pdf.jar"
malicious
C:\Windows\SysWOW64\tasklist.exe
tasklist.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Program Files (x86)\Java\jre-1.8\bin\java.exe" -javaagent:"C:\Users\user\AppData\Local\Temp\jartracer.jar" -jar "C:\Users\user\Desktop\Mtcn_1637256355_pdf.jar"" >> C:\cmdlinestart.log 2>&1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\icacls.exe
C:\Windows\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)M
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://soakawaypit.s3.eu-west-1.amazonaws.com/server.jar
unknown
http://crl.xrampsecurity.com/XGCA.crl
unknown
http://crl.chambersign.org/chambersroot.crl0
unknown
https://soakawaypit.s3.eu-west-1.amazonaws.com/res.jar
unknown
https://repository.luxtrust.lu0
unknown
http://bugreport.sun.com/bugreport/
unknown
http://cps.chambersign.org/cps/chambersroot.html0
unknown
https://soakawaypit.s3.eu-west-1.amazonaws.com/server1.jar
unknown
https://soakawaypit.s3.eu-west-1.amazonaws.com/ext.jar
unknown
http://java.oracle.com/
unknown
http://null.oracle.com/
unknown
http://www.chambersign.org1
unknown
https://soakawaypit.s3.eu-west-1.amazonaws.com/startup.jar
unknown
http://repository.swisssign.com/0
unknown
https://branchlock.net
unknown
http://policy.camerfirma.com
unknown
http://repository.swisssign.com/3
unknown
https://ocsp.quovadisoffshore.com
unknown
http://crl.securetrust.com/STCA.crl0
unknown
http://www.quovadisglobal.com/cps
unknown
http://cps.chambersign.org/cps/chambersroot.html
unknown
https://branchlock.netU
unknown
http://crl.securetrust.com/STCA.crl
unknown
https://repository.luxtrust.lu
unknown
http://www.quovadisglobal.com/cps0
unknown
http://crl.xrampsecurity.com/XGCA.crl0
unknown
https://soakawaypit.s3.eu-west-1.amazonaws.com/neft.pdf
unknown
http://www.quovadis.bm
unknown
http://www.quovadis.bm0
unknown
https://ocsp.quovadisoffshore.com0
unknown
http://crl.chambersign.org/chambersroot.crl
unknown
http://repository.swisssign.com/
unknown
http://www.chambersign.org
unknown
https://soakawaypit.s3.eu-west-1.amazonaws.com/def.jar
unknown
http://policy.camerfirma.com0
unknown
https://soakawaypit.s3.eu-west-1.amazonaws.com/email.js
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s3-r-w.eu-west-1.amazonaws.com
52.218.60.168
soakawaypit.s3.eu-west-1.amazonaws.com
unknown

IPs

IP
Domain
Country
Malicious
52.218.60.168
s3-r-w.eu-west-1.amazonaws.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
1078000
heap
page read and write
malicious
15250000
heap
page read and write
malicious
A402000
trusted library allocation
page read and write
15A9A000
heap
page read and write
4EB6000
trusted library allocation
page read and write
2AC7000
trusted library allocation
page execute and read and write
4FD9000
trusted library allocation
page read and write
4C58000
trusted library allocation
page read and write
A514000
trusted library allocation
page read and write
4E0D000
trusted library allocation
page read and write
4FA8000
trusted library allocation
page read and write
503C000
trusted library allocation
page read and write
FFE000
stack
page read and write
4F55000
trusted library allocation
page read and write
4C28000
trusted library allocation
page read and write
4DFC000
trusted library allocation
page read and write
DCE000
stack
page read and write
4E51000
trusted library allocation
page read and write
4FFA000
trusted library allocation
page read and write
4A20000
trusted library allocation
page read and write
289D000
stack
page read and write
4E70000
trusted library allocation
page read and write
4F85000
trusted library allocation
page read and write
4D59000
trusted library allocation
page read and write
4F24000
trusted library allocation
page read and write
4EFE000
trusted library allocation
page read and write
4D02000
trusted library allocation
page read and write
4D0D000
trusted library allocation
page read and write
4C19000
trusted library allocation
page read and write
4CBD000
trusted library allocation
page read and write
4CED000
trusted library allocation
page read and write
4D1D000
trusted library allocation
page read and write
4F79000
trusted library allocation
page read and write
5034000
trusted library allocation
page read and write
4CB1000
trusted library allocation
page read and write
4D10000
trusted library allocation
page read and write
98E000
stack
page read and write
4D0A000
trusted library allocation
page read and write
4C36000
trusted library allocation
page read and write
5042000
trusted library allocation
page read and write
4F44000
trusted library allocation
page read and write
4DB6000
trusted library allocation
page read and write
2A00000
heap
page read and write
161E0000
trusted library allocation
page read and write
4CDB000
trusted library allocation
page read and write
4C1B000
trusted library allocation
page read and write
2A20000
trusted library allocation
page execute and read and write
4C05000
trusted library allocation
page read and write
1577D000
unkown
page read and write
1240000
unkown
page read and write
4DDA000
trusted library allocation
page read and write
4FCD000
trusted library allocation
page read and write
5030000
trusted library allocation
page read and write
A490000
trusted library allocation
page read and write
4D94000
trusted library allocation
page read and write
4C3F000
trusted library allocation
page read and write
1506F000
heap
page read and write
1580E000
unkown
page read and write
A1F8000
trusted library allocation
page read and write
5037000
trusted library allocation
page read and write
4E14000
trusted library allocation
page read and write
4EAA000
trusted library allocation
page read and write
4EB4000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
150AE000
stack
page read and write
4DD7000
trusted library allocation
page read and write
2F99000
heap
page read and write
151CE000
unkown
page read and write
504A000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
4E12000
trusted library allocation
page read and write
4D3B000
trusted library allocation
page read and write
4E43000
trusted library allocation
page read and write
4F87000
trusted library allocation
page read and write
29C0000
heap
page read and write
4C45000
trusted library allocation
page read and write
4E2F000
trusted library allocation
page read and write
4D4B000
trusted library allocation
page read and write
4DBC000
trusted library allocation
page read and write
501E000
trusted library allocation
page read and write
4E33000
trusted library allocation
page read and write
A1E3000
trusted library allocation
page read and write
4F2B000
trusted library allocation
page read and write
4F36000
trusted library allocation
page read and write
4C2D000
trusted library allocation
page read and write
4E55000
trusted library allocation
page read and write
4EB8000
trusted library allocation
page read and write
4DA9000
trusted library allocation
page read and write
D40000
heap
page read and write
4FCA000
trusted library allocation
page read and write
117E000
stack
page read and write
D0E000
stack
page read and write
4ED9000
trusted library allocation
page read and write
4E4C000
trusted library allocation
page read and write
4FA1000
trusted library allocation
page read and write
4FD0000
trusted library allocation
page read and write
4EBC000
trusted library allocation
page read and write
4C0F000
trusted library allocation
page read and write
4F1C000
trusted library allocation
page read and write
4CD4000
trusted library allocation
page read and write
4C38000
trusted library allocation
page read and write
4D92000
trusted library allocation
page read and write
4C3D000
trusted library allocation
page read and write
4F6B000
trusted library allocation
page read and write
4FE2000
trusted library allocation
page read and write
2F60000
heap
page read and write
89C000
stack
page read and write
2F10000
heap
page read and write
4F8D000
trusted library allocation
page read and write
503F000
trusted library allocation
page read and write
4C0B000
trusted library allocation
page read and write
2F99000
heap
page read and write
2F81000
heap
page read and write
4D7B000
trusted library allocation
page read and write
4FC4000
trusted library allocation
page read and write
4E31000
trusted library allocation
page read and write
E20000
heap
page read and write
4E77000
trusted library allocation
page read and write
4D52000
trusted library allocation
page read and write
F6E000
stack
page read and write
5045000
trusted library allocation
page read and write
4F62000
trusted library allocation
page read and write
4CCC000
trusted library allocation
page read and write
2F81000
heap
page read and write
514D000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
4E6D000
trusted library allocation
page read and write
4DE0000
trusted library allocation
page read and write
2F8A000
heap
page read and write
9CF000
stack
page read and write
4D1B000
trusted library allocation
page read and write
4D61000
trusted library allocation
page read and write
4C9E000
trusted library allocation
page read and write
2A5A000
trusted library allocation
page execute and read and write
4F4A000
trusted library allocation
page read and write
2F5F000
stack
page read and write
4EF2000
trusted library allocation
page read and write
4D32000
trusted library allocation
page read and write
4EC9000
trusted library allocation
page read and write
4D8F000
trusted library allocation
page read and write
4E94000
trusted library allocation
page read and write
2F7D000
heap
page read and write
4DCC000
trusted library allocation
page read and write
4FBC000
trusted library allocation
page read and write
2F9E000
heap
page read and write
150ED000
stack
page read and write
4E03000
trusted library allocation
page read and write
4E72000
trusted library allocation
page read and write
4FA4000
trusted library allocation
page read and write
4E08000
trusted library allocation
page read and write
152F3000
heap
page read and write
4EB0000
trusted library allocation
page read and write
4C3B000
trusted library allocation
page read and write
5125000
trusted library allocation
page read and write
4F83000
trusted library allocation
page read and write
1517D000
stack
page read and write
4C52000
trusted library allocation
page read and write
4B30000
trusted library allocation
page read and write
4E88000
trusted library allocation
page read and write
4CF7000
trusted library allocation
page read and write
4E4E000
trusted library allocation
page read and write
162E0000
heap
page read and write
A4CC000
trusted library allocation
page read and write
4EAC000
trusted library allocation
page read and write
4D9D000
trusted library allocation
page read and write
15AFC000
heap
page read and write
5010000
trusted library allocation
page read and write
1250000
heap
page read and write
4F6E000
trusted library allocation
page read and write
4D27000
trusted library allocation
page read and write
4F1E000
trusted library allocation
page read and write
5048000
trusted library allocation
page read and write
2DE0000
heap
page read and write
4DF3000
trusted library allocation
page read and write
4CEA000
trusted library allocation
page read and write
4D17000
trusted library allocation
page read and write
4D66000
trusted library allocation
page read and write
4EDB000
trusted library allocation
page read and write
4D6A000
trusted library allocation
page read and write
2A62000
trusted library allocation
page execute and read and write
4E41000
trusted library allocation
page read and write
4E18000
trusted library allocation
page read and write
4D77000
trusted library allocation
page read and write
5013000
trusted library allocation
page read and write
2FAB000
heap
page read and write
A20D000
trusted library allocation
page read and write
4EEE000
trusted library allocation
page read and write
BDC000
stack
page read and write
4E23000
trusted library allocation
page read and write
4F52000
trusted library allocation
page read and write
A3FE000
trusted library allocation
page read and write
4CB6000
trusted library allocation
page read and write
4D37000
trusted library allocation
page read and write
4E9C000
trusted library allocation
page read and write
4FE7000
trusted library allocation
page read and write
2F8B000
heap
page read and write
4F0F000
trusted library allocation
page read and write
5003000
trusted library allocation
page read and write
4E79000
trusted library allocation
page read and write
157BD000
stack
page read and write
4FA6000
trusted library allocation
page read and write
4C8F000
trusted library allocation
page read and write
4C8D000
trusted library allocation
page read and write
2F99000
heap
page read and write
4C84000
trusted library allocation
page read and write
4CFB000
trusted library allocation
page read and write
4EE1000
trusted library allocation
page read and write
4C4B000
trusted library allocation
page read and write
4D63000
trusted library allocation
page read and write
4D5D000
trusted library allocation
page read and write
2F28000
heap
page read and write
4FFD000
trusted library allocation
page read and write
14F83000
trusted library allocation
page read and write
4EDE000
trusted library allocation
page read and write
504F000
trusted library allocation
page read and write
4FC8000
trusted library allocation
page read and write
4F33000
trusted library allocation
page read and write
4C25000
trusted library allocation
page read and write
4C1F000
trusted library allocation
page read and write
A1F4000
trusted library allocation
page read and write
4C5B000
trusted library allocation
page read and write
4F4C000
trusted library allocation
page read and write
4DB9000
trusted library allocation
page read and write
1000000
heap
page read and write
4F94000
trusted library allocation
page read and write
512B000
trusted library allocation
page read and write
2FAB000
heap
page read and write
163B0000
heap
page read and write
FBE000
stack
page read and write
1572D000
stack
page read and write
2FA7000
heap
page read and write
4FB1000
trusted library allocation
page read and write
4CDF000
trusted library allocation
page read and write
4DD5000
trusted library allocation
page read and write
4F01000
trusted library allocation
page read and write
5006000
trusted library allocation
page read and write
15A54000
heap
page read and write
4D56000
trusted library allocation
page read and write
4C68000
trusted library allocation
page read and write
4DCA000
trusted library allocation
page read and write
4F31000
trusted library allocation
page read and write
4F57000
trusted library allocation
page read and write
502C000
trusted library allocation
page read and write
4C8A000
trusted library allocation
page read and write
4EBA000
trusted library allocation
page read and write
4D35000
trusted library allocation
page read and write
4E7E000
trusted library allocation
page read and write
4C56000
trusted library allocation
page read and write
4F92000
trusted library allocation
page read and write
4F14000
trusted library allocation
page read and write
4F28000
trusted library allocation
page read and write
4E80000
trusted library allocation
page read and write
4FF2000
trusted library allocation
page read and write
2A73000
trusted library allocation
page execute and read and write
4E3F000
trusted library allocation
page read and write
4C7E000
trusted library allocation
page read and write
4C94000
trusted library allocation
page read and write
4ED2000
trusted library allocation
page read and write
16B63000
trusted library allocation
page read and write
4C9C000
trusted library allocation
page read and write
4F71000
trusted library allocation
page read and write
14C00000
trusted library allocation
page read and write
D45000
heap
page read and write
4F66000
trusted library allocation
page read and write
4C60000
trusted library allocation
page read and write
4D70000
trusted library allocation
page read and write
2F7D000
heap
page read and write
A5DC000
trusted library allocation
page read and write
4E2C000
trusted library allocation
page read and write
A40B000
trusted library allocation
page read and write
4EA7000
trusted library allocation
page read and write
4E83000
trusted library allocation
page read and write
4C77000
trusted library allocation
page read and write
1216000
unkown
page read and write
103B000
heap
page read and write
4D04000
trusted library allocation
page read and write
4E36000
trusted library allocation
page read and write
4DA3000
trusted library allocation
page read and write
4C98000
trusted library allocation
page read and write
A641000
trusted library allocation
page read and write
4F3A000
trusted library allocation
page read and write
4CB0000
heap
page read and write
4F22000
trusted library allocation
page read and write
4E1A000
trusted library allocation
page read and write
5024000
trusted library allocation
page read and write
4C2B000
trusted library allocation
page read and write
4D98000
trusted library allocation
page read and write
4CC2000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
2FAB000
heap
page read and write
4FEE000
trusted library allocation
page read and write
4DCF000
trusted library allocation
page read and write
2D4F000
stack
page read and write
4EA4000
trusted library allocation
page read and write
A150000
trusted library allocation
page read and write
4CF5000
trusted library allocation
page read and write
4CE1000
trusted library allocation
page read and write
4F98000
trusted library allocation
page read and write
4D75000
trusted library allocation
page read and write
4D2D000
trusted library allocation
page read and write
1524D000
stack
page read and write
2F99000
heap
page read and write
4D47000
trusted library allocation
page read and write
4F41000
trusted library allocation
page read and write
4CCA000
trusted library allocation
page read and write
16AE0000
trusted library allocation
page read and write
4FFF000
trusted library allocation
page read and write
4CD7000
trusted library allocation
page read and write
2AB7000
trusted library allocation
page execute and read and write
4C4D000
trusted library allocation
page read and write
4E5C000
trusted library allocation
page read and write
4D42000
trusted library allocation
page read and write
4E75000
trusted library allocation
page read and write
4F3D000
trusted library allocation
page read and write
503A000
trusted library allocation
page read and write
10EA000
heap
page read and write
4CA4000
trusted library allocation
page read and write
2A22000
trusted library allocation
page execute and read and write
2FAB000
heap
page read and write
4F96000
trusted library allocation
page read and write
4EC3000
trusted library allocation
page read and write
4CAB000
trusted library allocation
page read and write
4F0C000
trusted library allocation
page read and write
4DC5000
trusted library allocation
page read and write
4FC6000
trusted library allocation
page read and write
4FB4000
trusted library allocation
page read and write
4CB4000
trusted library allocation
page read and write
4E25000
trusted library allocation
page read and write
E40000
heap
page read and write
4C6E000
trusted library allocation
page read and write
4D79000
trusted library allocation
page read and write
4E2A000
trusted library allocation
page read and write
4DDD000
trusted library allocation
page read and write
4CCF000
trusted library allocation
page read and write
4DED000
trusted library allocation
page read and write
4D4E000
trusted library allocation
page read and write
2F68000
heap
page read and write
4C65000
trusted library allocation
page read and write
4FC0000
trusted library allocation
page read and write
4DC1000
trusted library allocation
page read and write
4FE5000
trusted library allocation
page read and write
4EC6000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
4D8C000
trusted library allocation
page read and write
4FE9000
trusted library allocation
page read and write
4D9F000
trusted library allocation
page read and write
4C80000
heap
page read and write
4F68000
trusted library allocation
page read and write
4CFD000
trusted library allocation
page read and write
4CE7000
trusted library allocation
page read and write
4C32000
trusted library allocation
page read and write
4FF7000
trusted library allocation
page read and write
4BCB000
stack
page read and write
15CA0000
trusted library allocation
page read and write
15C7F000
heap
page read and write
2A6B000
trusted library allocation
page execute and read and write
4F80000
trusted library allocation
page read and write
4CA0000
trusted library allocation
page read and write
4EE8000
trusted library allocation
page read and write
4D87000
trusted library allocation
page read and write
E0F000
stack
page read and write
4C15000
trusted library allocation
page read and write
4E0F000
trusted library allocation
page read and write
4F7D000
trusted library allocation
page read and write
4F74000
trusted library allocation
page read and write
A49D000
trusted library allocation
page read and write
4D40000
trusted library allocation
page read and write
A24F000
trusted library allocation
page read and write
4DE9000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
4F89000
trusted library allocation
page read and write
28DD000
stack
page read and write
2F7F000
heap
page read and write
2F99000
heap
page read and write
2F18000
heap
page read and write
4E8F000
trusted library allocation
page read and write
1513E000
unkown
page read and write
4F18000
trusted library allocation
page read and write
E26000
heap
page read and write
4CC6000
trusted library allocation
page read and write
4FAC000
trusted library allocation
page read and write
4D9A000
trusted library allocation
page read and write
4F46000
trusted library allocation
page read and write
4FF4000
trusted library allocation
page read and write
4D20000
trusted library allocation
page read and write
4ED4000
trusted library allocation
page read and write
4C08000
trusted library allocation
page read and write
4CF0000
trusted library allocation
page read and write
4F11000
trusted library allocation
page read and write
4C92000
trusted library allocation
page read and write
4E1E000
trusted library allocation
page read and write
4E60000
trusted library allocation
page read and write
164ED000
heap
page read and write
502E000
trusted library allocation
page read and write
4DB3000
trusted library allocation
page read and write
4F5E000
trusted library allocation
page read and write
4C30000
trusted library allocation
page read and write
EAF000
stack
page read and write
2D0E000
stack
page read and write
4D2A000
trusted library allocation
page read and write
4C02000
trusted library allocation
page read and write
4E9E000
trusted library allocation
page read and write
4E85000
trusted library allocation
page read and write
4D12000
trusted library allocation
page read and write
4CAE000
trusted library allocation
page read and write
5028000
trusted library allocation
page read and write
4C22000
trusted library allocation
page read and write
512D000
trusted library allocation
page read and write
4EFB000
trusted library allocation
page read and write
4DAB000
trusted library allocation
page read and write
4FD6000
trusted library allocation
page read and write
1030000
heap
page read and write
4DB0000
trusted library allocation
page read and write
4DF9000
trusted library allocation
page read and write
4DC8000
trusted library allocation
page read and write
D8E000
stack
page read and write
4F9F000
trusted library allocation
page read and write
4C73000
trusted library allocation
page read and write
4C6B000
trusted library allocation
page read and write
4E53000
trusted library allocation
page read and write
4D3E000
trusted library allocation
page read and write
4CBF000
trusted library allocation
page read and write
8DC000
stack
page read and write
513A000
trusted library allocation
page read and write
A645000
trusted library allocation
page read and write
A20F000
trusted library allocation
page read and write
4DA7000
trusted library allocation
page read and write
500A000
trusted library allocation
page read and write
4D85000
trusted library allocation
page read and write
4EE6000
trusted library allocation
page read and write
4FDE000
trusted library allocation
page read and write
4E68000
trusted library allocation
page read and write
4DFF000
trusted library allocation
page read and write
4FAE000
trusted library allocation
page read and write
154EF000
unkown
page read and write
501B000
trusted library allocation
page read and write
4ECB000
trusted library allocation
page read and write
E50000
heap
page read and write
4D30000
trusted library allocation
page read and write
4C87000
trusted library allocation
page read and write
4DF6000
trusted library allocation
page read and write
2F9D000
heap
page read and write
A479000
trusted library allocation
page read and write
5020000
trusted library allocation
page read and write
4DE6000
trusted library allocation
page read and write
154F0000
heap
page read and write
4CA2000
trusted library allocation
page read and write
29BF000
stack
page read and write
4E39000
trusted library allocation
page read and write
4D07000
trusted library allocation
page read and write
4FB7000
trusted library allocation
page read and write
E46000
heap
page read and write
2930000
heap
page read and write
4F2E000
trusted library allocation
page read and write
4E45000
trusted library allocation
page read and write
4D68000
trusted library allocation
page read and write
4E0B000
trusted library allocation
page read and write
4C7B000
trusted library allocation
page read and write
9D0000
heap
page read and write
2F1E000
stack
page read and write
4ECE000
trusted library allocation
page read and write
4F9A000
trusted library allocation
page read and write
E6E000
stack
page read and write
297E000
stack
page read and write
4DE2000
trusted library allocation
page read and write
4C42000
trusted library allocation
page read and write
4D22000
trusted library allocation
page read and write
4EF7000
trusted library allocation
page read and write
4C0D000
trusted library allocation
page read and write
A4C2000
trusted library allocation
page read and write
4D82000
trusted library allocation
page read and write
1531E000
heap
page read and write
4F09000
trusted library allocation
page read and write
4E49000
trusted library allocation
page read and write
4C63000
trusted library allocation
page read and write
4EF9000
trusted library allocation
page read and write
4DAD000
trusted library allocation
page read and write
5019000
trusted library allocation
page read and write
4F77000
trusted library allocation
page read and write
11CD000
stack
page read and write
4D7E000
trusted library allocation
page read and write
4CC4000
trusted library allocation
page read and write
2F99000
heap
page read and write
4E20000
trusted library allocation
page read and write
4ED7000
trusted library allocation
page read and write
4CBA000
trusted library allocation
page read and write
4E91000
trusted library allocation
page read and write
2D70000
heap
page read and write
5015000
trusted library allocation
page read and write
158A0000
heap
page read and write
4EF4000
trusted library allocation
page read and write
4FEC000
trusted library allocation
page read and write
4F3F000
trusted library allocation
page read and write
4CD2000
trusted library allocation
page read and write
4C5D000
trusted library allocation
page read and write
504D000
trusted library allocation
page read and write
4E3C000
trusted library allocation
page read and write
4F5C000
trusted library allocation
page read and write
4C12000
trusted library allocation
page read and write
B8C000
stack
page read and write
4E8A000
trusted library allocation
page read and write
4EA1000
trusted library allocation
page read and write
4CA8000
trusted library allocation
page read and write
15DA0000
trusted library allocation
page read and write
158E4000
heap
page read and write
2FAB000
heap
page read and write
4D8A000
trusted library allocation
page read and write
2ABE000
trusted library allocation
page execute and read and write
16322000
heap
page read and write
4D25000
trusted library allocation
page read and write
4D6C000
trusted library allocation
page read and write
940000
heap
page read and write
4E01000
trusted library allocation
page read and write
4FD3000
trusted library allocation
page read and write
4DD1000
trusted library allocation
page read and write
4FBA000
trusted library allocation
page read and write
4E59000
trusted library allocation
page read and write
4C48000
trusted library allocation
page read and write
502A000
trusted library allocation
page read and write
4CF2000
trusted library allocation
page read and write
There are 510 hidden memdumps, click here to show them.