IOC Report
phantomtoolsv2.exe

loading gif

Files

File Path
Type
Category
Malicious
phantomtoolsv2.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
initial sample
malicious
C:\Users\user\Desktop\phantomtoolsv2.exe:a.dll
PE32+ executable (DLL) (console) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
\Device\Null
ASCII text, with CRLF line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\phantomtoolsv2.exe
"C:\Users\user\Desktop\phantomtoolsv2.exe"
malicious
C:\Users\user\Desktop\phantomtoolsv2.exe
"C:\Users\user\Desktop\phantomtoolsv2.exe"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\user\Desktop\phantomtoolsv2.exe"
malicious
C:\Windows\System32\PING.EXE
ping 1.1.1.1 -n 1 -w 3000
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.13.205
https://gcc.gnu.org/bugs/):
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
https://support.mozilla.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://ns.microsoft.t/Regi
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ipify.org
104.26.13.205

IPs

IP
Domain
Country
Malicious
79.137.202.152
unknown
Russian Federation
malicious
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
210212FC000
heap
page read and write
210212DD000
heap
page read and write
21021351000
heap
page read and write
21021C82000
heap
page read and write
210207A7000
heap
page read and write
210212BF000
heap
page read and write
210207C9000
heap
page read and write
21023F74000
heap
page read and write
2102125A000
heap
page read and write
21023EC8000
heap
page read and write
21021755000
heap
page read and write
21023EAF000
heap
page read and write
21021229000
heap
page read and write
E5C07F7000
stack
page read and write
210215EC000
heap
page read and write
2102143F000
heap
page read and write
21021322000
heap
page read and write
21024048000
heap
page read and write
2101EA64000
heap
page read and write
21023AF4000
heap
page read and write
21023EE8000
heap
page read and write
210233CA000
heap
page read and write
2101EA84000
heap
page read and write
21023EB8000
heap
page read and write
210212B1000
heap
page read and write
2101EA33000
heap
page read and write
21020BEE000
heap
page read and write
21021345000
heap
page read and write
210212A5000
heap
page read and write
210212D4000
heap
page read and write
210214D5000
heap
page read and write
21022C1C000
heap
page read and write
21023474000
heap
page read and write
21020DBF000
heap
page read and write
2102345F000
heap
page read and write
21021746000
heap
page read and write
2102128B000
heap
page read and write
2102126C000
heap
page read and write
210207E3000
heap
page read and write
2102126A000
heap
page read and write
210241F2000
heap
page read and write
21023F57000
heap
page read and write
E5C15FE000
stack
page read and write
210216BE000
heap
page read and write
21020D81000
heap
page read and write
21023F6B000
heap
page read and write
7FF7B8AA4000
unkown
page readonly
210212A5000
heap
page read and write
21021A56000
heap
page read and write
7FF7B8800000
unkown
page readonly
2102166E000
heap
page read and write
21023F7E000
heap
page read and write
21020D7D000
heap
page read and write
21024164000
heap
page read and write
210215C9000
heap
page read and write
2102131F000
heap
page read and write
21021AF7000
heap
page read and write
21021293000
heap
page read and write
21021E33000
heap
page read and write
21023FE4000
heap
page read and write
2102126A000
heap
page read and write
21021285000
heap
page read and write
2102354A000
heap
page read and write
7FF7B8800000
unkown
page readonly
21021E03000
heap
page read and write
21023F17000
heap
page read and write
21021A6F000
heap
page read and write
21021316000
heap
page read and write
21020DE7000
heap
page read and write
210212B0000
heap
page read and write
2102127F000
heap
page read and write
210211D9000
heap
page read and write
21020C1F000
heap
page read and write
2102135A000
heap
page read and write
21021D62000
heap
page read and write
2102167E000
heap
page read and write
21024000000
heap
page read and write
2102135B000
heap
page read and write
21023EC3000
heap
page read and write
210212FE000
heap
page read and write
21023452000
heap
page read and write
E5C13FE000
stack
page read and write
21021B80000
heap
page read and write
21021295000
heap
page read and write
E5C08FE000
stack
page read and write
21023F70000
heap
page read and write
2102158E000
heap
page read and write
21024172000
heap
page read and write
21023361000
heap
page read and write
2101EA5B000
heap
page read and write
21020D5F000
heap
page read and write
210215C4000
heap
page read and write
21020E12000
heap
page read and write
2102131B000
heap
page read and write
21021881000
heap
page read and write
7FF7B890F000
unkown
page write copy
2102126A000
heap
page read and write
E5C17FC000
stack
page read and write
21020BB4000
heap
page read and write
21023368000
heap
page read and write
2102401D000
heap
page read and write
210215CF000
heap
page read and write
210233D4000
heap
page read and write
2102128B000
heap
page read and write
2102144D000
heap
page read and write
2102125A000
heap
page read and write
21022B8A000
heap
page read and write
21020BEF000
heap
page read and write
21020680000
heap
page read and write
210217A9000
heap
page read and write
2102126C000
heap
page read and write
21021502000
heap
page read and write
2102126D000
heap
page read and write
21024956000
heap
page read and write
21023EE3000
heap
page read and write
21024239000
heap
page read and write
2102348A000
heap
page read and write
7FF7B8801000
unkown
page execute read
21021444000
heap
page read and write
21021448000
heap
page read and write
21023F10000
heap
page read and write
2102143E000
heap
page read and write
2102132A000
heap
page read and write
21021918000
heap
page read and write
21021351000
heap
page read and write
21021351000
heap
page read and write
21020DBD000
heap
page read and write
21020C92000
heap
page read and write
7FF7B8AA0000
unkown
page write copy
21023319000
heap
page read and write
21020855000
heap
page read and write
210215EB000
heap
page read and write
21022DD3000
heap
page read and write
21021278000
heap
page read and write
7FF7B890D000
unkown
page read and write
210211B2000
heap
page read and write
210207C3000
heap
page read and write
2102132C000
heap
page read and write
21023F52000
heap
page read and write
2101EA85000
heap
page read and write
7FF7B8AA0000
unkown
page write copy
E5C09FE000
stack
page read and write
2102125A000
heap
page read and write
21022BC7000
heap
page read and write
2101EA5B000
heap
page read and write
21021B07000
heap
page read and write
21023339000
heap
page read and write
21021447000
heap
page read and write
1B5E1990000
heap
page read and write
2102150E000
heap
page read and write
2102144D000
heap
page read and write
1B5E16B0000
heap
page read and write
2102144D000
heap
page read and write
11D75220000
heap
page read and write
21023EE5000
heap
page read and write
21021453000
heap
page read and write
21020E0D000
heap
page read and write
21021BA6000
heap
page read and write
2101E950000
heap
page read and write
21020D7B000
heap
page read and write
2101EA32000
heap
page read and write
21021456000
heap
page read and write
210212A1000
heap
page read and write
2102157E000
heap
page read and write
21020BCC000
heap
page read and write
2101EA77000
heap
page read and write
21024200000
heap
page read and write
2101EA85000
heap
page read and write
21021447000
heap
page read and write
21021278000
heap
page read and write
21020BD7000
heap
page read and write
2102330F000
heap
page read and write
210212D5000
heap
page read and write
2102134E000
heap
page read and write
210212C8000
heap
page read and write
21021357000
heap
page read and write
210211E3000
heap
page read and write
21021869000
heap
page read and write
21021597000
heap
page read and write
21023323000
heap
page read and write
2101EA64000
heap
page read and write
2101EA64000
heap
page read and write
210232FD000
heap
page read and write
210210C0000
heap
page read and write
21021452000
heap
page read and write
21024156000
heap
page read and write
21020C84000
heap
page read and write
21021724000
heap
page read and write
21021351000
heap
page read and write
21022CB1000
heap
page read and write
210212D2000
heap
page read and write
21020DF6000
heap
page read and write
2102079C000
heap
page read and write
2101EA8A000
heap
page read and write
1B5E16D0000
heap
page read and write
210212A5000
heap
page read and write
210212A5000
heap
page read and write
21020A9B000
heap
page read and write
210212EB000
heap
page read and write
210241AB000
heap
page read and write
21020E28000
heap
page read and write
210233AC000
heap
page read and write
21023EBA000
heap
page read and write
1B5E18B0000
trusted library allocation
page read and write
21024148000
heap
page read and write
21021272000
heap
page read and write
2102130C000
heap
page read and write
1B5E1995000
heap
page read and write
21021440000
heap
page read and write
21020EA8000
heap
page read and write
21021440000
heap
page read and write
2102070F000
heap
page read and write
2102144D000
heap
page read and write
7FF7B8801000
unkown
page execute read
7FF7B8AA0000
unkown
page read and write
21020690000
heap
page read and write
21022C0B000
heap
page read and write
21021285000
heap
page read and write
2102135A000
heap
page read and write
21021348000
heap
page read and write
21022CE9000
heap
page read and write
210206C8000
heap
page read and write
210216C6000
heap
page read and write
2102126C000
heap
page read and write
21023ECF000
heap
page read and write
21021306000
heap
page read and write
21022DB3000
heap
page read and write
2102411D000
heap
page read and write
21021791000
heap
page read and write
21021850000
heap
page read and write
210212E9000
heap
page read and write
210215D7000
heap
page read and write
21020CB2000
heap
page read and write
21021319000
heap
page read and write
21021E5B000
heap
page read and write
210214BC000
heap
page read and write
21024300000
heap
page read and write
21021440000
heap
page read and write
2101EA5B000
heap
page read and write
2102171C000
heap
page read and write
21024181000
heap
page read and write
21021351000
heap
page read and write
21020C0E000
heap
page read and write
2102144D000
heap
page read and write
21023EC5000
heap
page read and write
21021A37000
heap
page read and write
21021314000
heap
page read and write
21021453000
heap
page read and write
210215FE000
heap
page read and write
2102155D000
heap
page read and write
2102144D000
heap
page read and write
21020D4A000
heap
page read and write
210206F6000
heap
page read and write
210215E6000
heap
page read and write
210217C1000
heap
page read and write
21020D73000
heap
page read and write
210212A5000
heap
page read and write
21024100000
heap
page read and write
21022BCC000
heap
page read and write
210242AB000
heap
page read and write
21021442000
heap
page read and write
21021801000
heap
page read and write
2102338D000
heap
page read and write
21021451000
heap
page read and write
210240E4000
heap
page read and write
21021304000
heap
page read and write
21021337000
heap
page read and write
21021286000
heap
page read and write
210211F9000
heap
page read and write
2102168F000
heap
page read and write
210207DB000
heap
page read and write
210242D6000
heap
page read and write
21020939000
heap
page read and write
2102144D000
heap
page read and write
21020708000
heap
page read and write
21024264000
heap
page read and write
7FF7B8801000
unkown
page execute read
210211B4000
heap
page read and write
2101EA64000
heap
page read and write
210212DD000
heap
page read and write
2102422B000
heap
page read and write
21023EAA000
heap
page read and write
2102129E000
heap
page read and write
2101EA62000
heap
page read and write
2101E999000
heap
page read and write
2102144D000
heap
page read and write
21021328000
heap
page read and write
21021B16000
heap
page read and write
2102133A000
heap
page read and write
210216C5000
heap
page read and write
7FF7B8801000
unkown
page execute read
210242C8000
heap
page read and write
21021211000
heap
page read and write
21020939000
heap
page read and write
21021447000
heap
page read and write
2102144D000
heap
page read and write
21021461000
heap
page read and write
1B5E18B0000
trusted library allocation
page read and write
21022E93000
heap
page read and write
21020E24000
heap
page read and write
210240C8000
heap
page read and write
2102144D000
heap
page read and write
2102066C000
heap
page read and write
1B5E16D6000
heap
page read and write
210212A5000
heap
page read and write
210215E1000
heap
page read and write
21021338000
heap
page read and write
21021307000
heap
page read and write
2101EA32000
heap
page read and write
21023F59000
heap
page read and write
21020C2E000
heap
page read and write
210232F2000
heap
page read and write
21020D52000
heap
page read and write
2102126A000
heap
page read and write
210240AB000
heap
page read and write
21023EA3000
heap
page read and write
2101EA62000
heap
page read and write
21021334000
heap
page read and write
210206F1000
heap
page read and write
11D75200000
heap
page read and write
21022B9F000
heap
page read and write
210214CD000
heap
page read and write
21021307000
heap
page read and write
21021328000
heap
page read and write
2102125A000
heap
page read and write
21021272000
heap
page read and write
2102144D000
heap
page read and write
7FF7B890D000
unkown
page write copy
2101EA85000
heap
page read and write
210207D3000
heap
page read and write
21020728000
heap
page read and write
21021B78000
heap
page read and write
21022B4C000
heap
page read and write
21022BB6000
heap
page read and write
21021285000
heap
page read and write
21020BAA000
heap
page read and write
21020BE9000
heap
page read and write
21020C88000
heap
page read and write
2102144D000
heap
page read and write
2101EA62000
heap
page read and write
21022BC0000
heap
page read and write
210233A4000
heap
page read and write
210212FC000
heap
page read and write
2102126B000
heap
page read and write
2102074A000
heap
page read and write
1AFDCFF000
stack
page read and write
21022C15000
heap
page read and write
2102134E000
heap
page read and write
21020D1D000
heap
page read and write
210212DA000
heap
page read and write
21021338000
heap
page read and write
21022230000
heap
page read and write
2102346A000
heap
page read and write
210206F1000
heap
page read and write
21021351000
heap
page read and write
21023F54000
heap
page read and write
21021324000
heap
page read and write
2102126A000
heap
page read and write
7FF7B890F000
unkown
page write copy
210241D6000
heap
page read and write
2102355F000
heap
page read and write
21020C2B000
heap
page read and write
21021334000
heap
page read and write
210211B1000
heap
page read and write
21023F4B000
heap
page read and write
21022B82000
heap
page read and write
21021E22000
heap
page read and write
21023ECA000
heap
page read and write
21021666000
heap
page read and write
2101EA62000
heap
page read and write
2102135A000
heap
page read and write
21020C0D000
heap
page read and write
2102144D000
heap
page read and write
21020D08000
heap
page read and write
21020C74000
heap
page read and write
21022324000
heap
page read and write
21020C7B000
heap
page read and write
21021EAA000
heap
page read and write
11D7529A000
heap
page read and write
2102127F000
heap
page read and write
2102144D000
heap
page read and write
21021285000
heap
page read and write
210212D5000
heap
page read and write
210217C8000
heap
page read and write
21021447000
heap
page read and write
2102144D000
heap
page read and write
21021A4F000
heap
page read and write
210233A6000
heap
page read and write
21020A9C000
heap
page read and write
21021278000
heap
page read and write
2101E95C000
heap
page read and write
21021ADE000
heap
page read and write
21020BCD000
heap
page read and write
21020708000
heap
page read and write
2102409D000
heap
page read and write
21020BE8000
heap
page read and write
21021297000
heap
page read and write
21022C49000
heap
page read and write
21022D88000
heap
page read and write
2102135A000
heap
page read and write
2102410F000
heap
page read and write
221E3FF000
stack
page read and write
21023F67000
heap
page read and write
2102133A000
heap
page read and write
2101EA2C000
heap
page read and write
2102135A000
heap
page read and write
1B5E1AA3000
heap
page read and write
2102126C000
heap
page read and write
21020E32000
heap
page read and write
21020BD6000
heap
page read and write
21021A3D000
heap
page read and write
2102133D000
heap
page read and write
210206D0000
heap
page read and write
21020C62000
heap
page read and write
210235EA000
heap
page read and write
21023494000
heap
page read and write
21021285000
heap
page read and write
2102144D000
heap
page read and write
21021338000
heap
page read and write
21021444000
heap
page read and write
21020BB7000
heap
page read and write
21021E09000
heap
page read and write
21023F72000
heap
page read and write
210240B9000
heap
page read and write
2102132C000
heap
page read and write
E5C12FB000
stack
page read and write
21021249000
heap
page read and write
21024139000
heap
page read and write
21021286000
heap
page read and write
21022DA9000
heap
page read and write
2102131E000
heap
page read and write
210216AE000
heap
page read and write
21021278000
heap
page read and write
11D751F0000
heap
page read and write
2102160B000
heap
page read and write
21021456000
heap
page read and write
2102134E000
heap
page read and write
21021452000
heap
page read and write
21021336000
heap
page read and write
2102087B000
heap
page read and write
21021286000
heap
page read and write
21021302000
heap
page read and write
21021278000
heap
page read and write
21021334000
heap
page read and write
21021278000
heap
page read and write
21023D38000
heap
page read and write
7FF7B8AA1000
unkown
page write copy
2101E810000
heap
page read and write
210241E4000
heap
page read and write
2102144D000
heap
page read and write
21023F62000
heap
page read and write
210212DA000
heap
page read and write
21023FF2000
heap
page read and write
210212A5000
heap
page read and write
21023EDF000
heap
page read and write
21021219000
heap
page read and write
210233B6000
heap
page read and write
21021766000
heap
page read and write
21021294000
heap
page read and write
21021285000
heap
page read and write
2102128D000
heap
page read and write
2101EA8C000
heap
page read and write
210210CA000
heap
page read and write
2102144D000
heap
page read and write
2102339C000
heap
page read and write
21020DF4000
heap
page read and write
2102130E000
heap
page read and write
2101EA85000
heap
page read and write
21021328000
heap
page read and write
2102421D000
heap
page read and write
210212A5000
heap
page read and write
210233F4000
heap
page read and write
21021633000
heap
page read and write
21021272000
heap
page read and write
2102128D000
heap
page read and write
21021475000
heap
page read and write
21023F77000
heap
page read and write
21021272000
heap
page read and write
210215F5000
heap
page read and write
2102133D000
heap
page read and write
21021698000
heap
page read and write
21021E1B000
heap
page read and write
21023F60000
heap
page read and write
210212A5000
heap
page read and write
21020BFD000
heap
page read and write
2102135A000
heap
page read and write
21021447000
heap
page read and write
21022D13000
heap
page read and write
2102127A000
heap
page read and write
210211FA000
heap
page read and write
21021453000
heap
page read and write
21020C14000
heap
page read and write
210216A6000
heap
page read and write
210217E1000
heap
page read and write
21021272000
heap
page read and write
210212E0000
heap
page read and write
21023EDA000
heap
page read and write
21020D32000
heap
page read and write
210212DA000
heap
page read and write
21021F72000
heap
page read and write
21023344000
heap
page read and write
21021586000
heap
page read and write
2102126C000
heap
page read and write
21022CA9000
heap
page read and write
21021711000
heap
page read and write
210214B8000
heap
page read and write
2102144D000
heap
page read and write
21020D90000
heap
page read and write
21022BFB000
heap
page read and write
21021BE2000
heap
page read and write
2101EA84000
heap
page read and write
1B5E18B0000
trusted library allocation
page read and write
210207FB000
heap
page read and write
21022C25000
heap
page read and write
21020C2D000
heap
page read and write
11D75290000
heap
page read and write
21020D3D000
heap
page read and write
210212A1000
heap
page read and write
210233EA000
heap
page read and write
21021338000
heap
page read and write
2102144D000
heap
page read and write
21021336000
heap
page read and write
2102135A000
heap
page read and write
210232ED000
heap
page read and write
2102135A000
heap
page read and write
21023EE1000
heap
page read and write
21022C03000
heap
page read and write
21024256000
heap
page read and write
21021336000
heap
page read and write
210217AF000
heap
page read and write
21023340000
heap
page read and write
210214D8000
heap
page read and write
21020D89000
heap
page read and write
21021316000
heap
page read and write
21021324000
heap
page read and write
21021622000
heap
page read and write
2102133D000
heap
page read and write
2102075C000
heap
page read and write
21024056000
heap
page read and write
2101E990000
heap
page read and write
21021731000
heap
page read and write
21021299000
heap
page read and write
21022B51000
heap
page read and write
21021341000
heap
page read and write
21021279000
heap
page read and write
7FF7B8911000
unkown
page readonly
210212A5000
heap
page read and write
21021458000
heap
page read and write
21023394000
heap
page read and write
E5C0FFE000
stack
page read and write
2102135A000
heap
page read and write
210205E0000
remote allocation
page read and write
2101EA62000
heap
page read and write
2101EA39000
heap
page read and write
2101E8F0000
heap
page read and write
21020BBB000
heap
page read and write
21020697000
heap
page read and write
21021330000
heap
page read and write
2101EA10000
heap
page read and write
2102128A000
heap
page read and write
21021285000
heap
page read and write
7FF7B8AA4000
unkown
page readonly
2102131B000
heap
page read and write
21022DBE000
heap
page read and write
210233C6000
heap
page read and write
21020EF2000
heap
page read and write
21020D10000
heap
page read and write
210214F8000
heap
page read and write
21021352000
heap
page read and write
21021285000
heap
page read and write
21020E16000
heap
page read and write
21021E3B000
heap
page read and write
21021334000
heap
page read and write
21022B5C000
heap
page read and write
21021272000
heap
page read and write
2101E955000
heap
page read and write
2102087B000
heap
page read and write
2102133C000
heap
page read and write
21021453000
heap
page read and write
2102152D000
heap
page read and write
210212A5000
heap
page read and write
21023EA8000
heap
page read and write
21023554000
heap
page read and write
21020E06000
heap
page read and write
21020C52000
heap
page read and write
21021447000
heap
page read and write
210212B1000
heap
page read and write
210232F7000
heap
page read and write
21022231000
heap
page read and write
21020B9F000
heap
page read and write
11D75460000
heap
page read and write
21021AFF000
heap
page read and write
7FF7B8800000
unkown
page readonly
2102132A000
heap
page read and write
210211D2000
heap
page read and write
21020E1D000
heap
page read and write
21021290000
heap
page read and write
21023FD6000
heap
page read and write
210205E0000
remote allocation
page read and write
2102127F000
heap
page read and write
210240F2000
heap
page read and write
2102144D000
heap
page read and write
2101E95B000
heap
page read and write
21023F5E000
heap
page read and write
21023634000
heap
page read and write
2102419D000
heap
page read and write
210242B9000
heap
page read and write
21020DDD000
heap
page read and write
21021A67000
heap
page read and write
21021336000
heap
page read and write
2102132C000
heap
page read and write
210212FB000
heap
page read and write
E5C07ED000
stack
page read and write
21021BED000
heap
page read and write
2101EA33000
heap
page read and write
21023EBC000
heap
page read and write
21020BB8000
heap
page read and write
21020E44000
heap
page read and write
21022BCE000
heap
page read and write
21020C15000
heap
page read and write
210214E6000
heap
page read and write
2102144D000
heap
page read and write
210210C0000
heap
page read and write
21024272000
heap
page read and write
21023F12000
heap
page read and write
21021336000
heap
page read and write
2102429D000
heap
page read and write
21021612000
heap
page read and write
21021278000
heap
page read and write
2101EA36000
heap
page read and write
2102133D000
heap
page read and write
2102161E000
heap
page read and write
21021351000
heap
page read and write
2101E9FA000
heap
page read and write
210207F3000
heap
page read and write
2101EA77000
heap
page read and write
21020BF7000
heap
page read and write
210214B0000
heap
page read and write
21021440000
heap
page read and write
21020764000
heap
page read and write
21021616000
heap
page read and write
21021272000
heap
page read and write
21021EC3000
heap
page read and write
21021B98000
heap
page read and write
210212F2000
heap
page read and write
21021357000
heap
page read and write
2102134E000
heap
page read and write
210216A6000
heap
page read and write
2102400F000
heap
page read and write
21020754000
heap
page read and write
21021469000
heap
page read and write
210216B6000
heap
page read and write
2102069A000
heap
page read and write
21021334000
heap
page read and write
21021322000
heap
page read and write
21021447000
heap
page read and write
21021327000
heap
page read and write
21020E1A000
heap
page read and write
210212A5000
heap
page read and write
21021272000
heap
page read and write
210241C8000
heap
page read and write
21021440000
heap
page read and write
21020E3A000
heap
page read and write
2102128B000
heap
page read and write
21022C29000
heap
page read and write
7FF7B8911000
unkown
page readonly
11D752B6000
heap
page read and write
E5C0DFF000
stack
page read and write
21021345000
heap
page read and write
21020BB0000
heap
page read and write
210212D8000
heap
page read and write
21021336000
heap
page read and write
21021676000
heap
page read and write
2102125A000
heap
page read and write
210212D0000
heap
page read and write
2102144D000
heap
page read and write
21021308000
heap
page read and write
21021B0F000
heap
page read and write
21020B9C000
heap
page read and write
2101EA36000
heap
page read and write
210214C0000
heap
page read and write
2102143E000
heap
page read and write
2102125A000
heap
page read and write
21022CF3000
heap
page read and write
21020C01000
heap
page read and write
21021275000
heap
page read and write
210242E4000
heap
page read and write
21020D72000
heap
page read and write
21021EE2000
heap
page read and write
7FF7B890F000
unkown
page write copy
21024072000
heap
page read and write
21022B6E000
heap
page read and write
21020DEC000
heap
page read and write
2102144D000
heap
page read and write
2102132C000
heap
page read and write
2101EA64000
heap
page read and write
21020BBA000
heap
page read and write
21020720000
heap
page read and write
21020BE1000
heap
page read and write
21021307000
heap
page read and write
21021272000
heap
page read and write
2102135A000
heap
page read and write
21023EB3000
heap
page read and write
21021285000
heap
page read and write
21020CA8000
heap
page read and write
21021786000
heap
page read and write
21020BFE000
heap
page read and write
21021326000
heap
page read and write
21020D69000
heap
page read and write
2102343F000
heap
page read and write
21021BC2000
heap
page read and write
21021338000
heap
page read and write
2102420F000
heap
page read and write
21023ECC000
heap
page read and write
210212E5000
heap
page read and write
2102126A000
heap
page read and write
221E5FF000
stack
page read and write
21021576000
heap
page read and write
2102127F000
heap
page read and write
21022B90000
heap
page read and write
210215FD000
heap
page read and write
21020D28000
heap
page read and write
210206F0000
heap
page read and write
2101EA62000
heap
page read and write
21023F4E000
heap
page read and write
21020610000
trusted library allocation
page read and write
21021338000
heap
page read and write
2102143F000
heap
page read and write
21021451000
heap
page read and write
21020660000
heap
page read and write
2102135A000
heap
page read and write
210205E0000
remote allocation
page read and write
21021879000
heap
page read and write
21021325000
heap
page read and write
2102143F000
heap
page read and write
21021447000
heap
page read and write
210206E5000
heap
page read and write
21022C05000
heap
page read and write
21021278000
heap
page read and write
21020BAF000
heap
page read and write
2101EA64000
heap
page read and write
210212B8000
heap
page read and write
210215BF000
heap
page read and write
210212B1000
heap
page read and write
210210C4000
heap
page read and write
21023ED8000
heap
page read and write
2102131B000
heap
page read and write
210234BF000
heap
page read and write
2102143E000
heap
page read and write
210214EE000
heap
page read and write
2102163F000
heap
page read and write
21020D48000
heap
page read and write
21023EC1000
heap
page read and write
2102168D000
heap
page read and write
2102418F000
heap
page read and write
2101EA5B000
heap
page read and write
21022B78000
heap
page read and write
2102127F000
heap
page read and write
21023EBF000
heap
page read and write
11D75625000
heap
page read and write
2102126C000
heap
page read and write
210212A5000
heap
page read and write
2101EA64000
heap
page read and write
21023EB1000
heap
page read and write
2101E910000
heap
page read and write
21021345000
heap
page read and write
21023F6E000
heap
page read and write
21020BAB000
heap
page read and write
21020C02000
heap
page read and write
1B5E18B0000
heap
page read and write
21021629000
heap
page read and write
2102412B000
heap
page read and write
2102133D000
heap
page read and write
21021605000
heap
page read and write
2102127F000
heap
page read and write
21023EDC000
heap
page read and write
2101EA62000
heap
page read and write
140000000
remote allocation
page execute and read and write
21021328000
heap
page read and write
21022BF3000
heap
page read and write
7FF7B8911000
unkown
page readonly
210211FF000
heap
page read and write
21020E08000
heap
page read and write
21021888000
heap
page read and write
21021447000
heap
page read and write
21020BF6000
heap
page read and write
21022C53000
heap
page read and write
210214E2000
heap
page read and write
210242F2000
heap
page read and write
2102131C000
heap
page read and write
2101EA39000
heap
page read and write
21022B56000
heap
page read and write
21023F15000
heap
page read and write
2102127F000
heap
page read and write
21021441000
heap
page read and write
21021345000
heap
page read and write
21021447000
heap
page read and write
2102336D000
heap
page read and write
21022B98000
heap
page read and write
21023EA1000
heap
page read and write
2102144D000
heap
page read and write
21022CD3000
heap
page read and write
21023F69000
heap
page read and write
21020C64000
heap
page read and write
2102402B000
heap
page read and write
210215E2000
heap
page read and write
2102332B000
heap
page read and write
21023F64000
heap
page read and write
2101EA8A000
heap
page read and write
210215C2000
heap
page read and write
21023574000
heap
page read and write
21020DB8000
heap
page read and write
21020D47000
heap
page read and write
210217D9000
heap
page read and write
21020700000
heap
page read and write
21024064000
heap
page read and write
7FF7B8AA4000
unkown
page readonly
21021285000
heap
page read and write
21022CBE000
heap
page read and write
210216BC000
heap
page read and write
210211FA000
heap
page read and write
210240D6000
heap
page read and write
21023F80000
heap
page read and write
21021316000
heap
page read and write
21021ED3000
heap
page read and write
21022BAF000
heap
page read and write
210210B0000
heap
page read and write
21022325000
heap
page read and write
2102124E000
heap
page read and write
2102081B000
heap
page read and write
1AFDAFC000
stack
page read and write
E5C11FF000
stack
page read and write
7FF7B8AA0000
unkown
page write copy
21021595000
heap
page read and write
7FF7B890D000
unkown
page write copy
2102144D000
heap
page read and write
2101EA85000
heap
page read and write
21021BB8000
heap
page read and write
210214CE000
heap
page read and write
210214B6000
heap
page read and write
21021328000
heap
page read and write
7FF7B8800000
unkown
page readonly
2102126A000
heap
page read and write
210215CC000
heap
page read and write
21021345000
heap
page read and write
21024248000
heap
page read and write
210207A8000
heap
page read and write
21022DC9000
heap
page read and write
21021341000
heap
page read and write
210233BD000
heap
page read and write
21021272000
heap
page read and write
21021688000
heap
page read and write
21020DFC000
heap
page read and write
2102344A000
heap
page read and write
21021616000
heap
page read and write
21021456000
heap
page read and write
21020D4D000
heap
page read and write
21021447000
heap
page read and write
21022E49000
heap
page read and write
2101E9C0000
heap
page read and write
210212E0000
heap
page read and write
21021457000
heap
page read and write
21023529000
heap
page read and write
2102126C000
heap
page read and write
210212B1000
heap
page read and write
21022C33000
heap
page read and write
2102126C000
heap
page read and write
21021306000
heap
page read and write
210231DE000
heap
page read and write
210215CD000
heap
page read and write
2102126C000
heap
page read and write
21021447000
heap
page read and write
21021345000
heap
page read and write
210207FC000
heap
page read and write
21021CA2000
heap
page read and write
21021348000
heap
page read and write
21020C5A000
heap
page read and write
2102356A000
heap
page read and write
21022CC9000
heap
page read and write
2102125A000
heap
page read and write
21021641000
heap
page read and write
21021EDB000
heap
page read and write
21021447000
heap
page read and write
21021C8D000
heap
page read and write
2102175C000
heap
page read and write
21021353000
heap
page read and write
2102169C000
heap
page read and write
2101EA8D000
heap
page read and write
21021334000
heap
page read and write
2102407D000
heap
page read and write
21022C9E000
heap
page read and write
2102428F000
heap
page read and write
2101E9BE000
heap
page read and write
210215B8000
heap
page read and write
2102125A000
heap
page read and write
2101EA36000
heap
page read and write
21020C26000
heap
page read and write
21020DA7000
heap
page read and write
21021BA2000
heap
page read and write
21021C57000
heap
page read and write
21020DA0000
heap
page read and write
21021328000
heap
page read and write
2101E9FA000
heap
page read and write
210234B4000
heap
page read and write
E5C14FE000
stack
page read and write
2102087C000
heap
page read and write
1AFDBFF000
unkown
page read and write
21021209000
heap
page read and write
21021A8F000
heap
page read and write
2102127F000
heap
page read and write
11D752B4000
heap
page read and write
21020610000
trusted library allocation
page read and write
21021451000
heap
page read and write
210241B9000
heap
page read and write
210217FB000
heap
page read and write
1B5E18B0000
trusted library allocation
page read and write
21020DE4000
heap
page read and write
1B5E16A0000
heap
page read and write
21020DB1000
heap
page read and write
2101E9B9000
heap
page read and write
2102134E000
heap
page read and write
21021272000
heap
page read and write
210212A5000
heap
page read and write
21020774000
heap
page read and write
21021C97000
heap
page read and write
21023ED5000
heap
page read and write
21020D42000
heap
page read and write
2102408F000
heap
page read and write
2102132A000
heap
page read and write
7FF7B8911000
unkown
page readonly
1B5E16DC000
heap
page read and write
2102077C000
heap
page read and write
210212A5000
heap
page read and write
21021522000
heap
page read and write
21021ECB000
heap
page read and write
21020BE0000
heap
page read and write
210216A2000
heap
page read and write
21020C6A000
heap
page read and write
21022BA3000
heap
page read and write
21021447000
heap
page read and write
210212A5000
heap
page read and write
2102173C000
heap
page read and write
21023E9F000
heap
page read and write
21020D94000
heap
page read and write
2102336F000
heap
page read and write
11D75620000
heap
page read and write
7FF7B8AA4000
unkown
page readonly
21021328000
heap
page read and write
21022BEC000
heap
page read and write
221E1FB000
stack
page read and write
21021B8D000
heap
page read and write
2102133D000
heap
page read and write
210206F0000
heap
page read and write
2102165F000
heap
page read and write
21021452000
heap
page read and write
2102126A000
heap
page read and write
2102163E000
heap
page read and write
21021871000
heap
page read and write
21021283000
heap
page read and write
2102086B000
heap
page read and write
210211B0000
heap
page read and write
21020CFD000
heap
page read and write
21022B59000
heap
page read and write
21023357000
heap
page read and write
210212F2000
heap
page read and write
21021453000
heap
page read and write
2102144D000
heap
page read and write
21024281000
heap
page read and write
21021231000
heap
page read and write
7FF7B890D000
unkown
page write copy
21021278000
heap
page read and write
21021286000
heap
page read and write
2102134E000
heap
page read and write
2102163A000
heap
page read and write
21021211000
heap
page read and write
21023350000
heap
page read and write
2102144D000
heap
page read and write
21023331000
heap
page read and write
21024039000
heap
page read and write
21021C78000
heap
page read and write
21021295000
heap
page read and write
2102126A000
heap
page read and write
21021241000
heap
page read and write
E5C0BFF000
stack
page read and write
1B5E1AAB000
heap
page read and write
21021678000
heap
page read and write
2101E9B8000
heap
page read and write
21020744000
heap
page read and write
21022D1E000
heap
page read and write
21021603000
heap
page read and write
210232FA000
heap
page read and write
210210B1000
heap
page read and write
21023F50000
heap
page read and write
21020BB5000
heap
page read and write
21022A3D000
heap
page read and write
21023F5B000
heap
page read and write
21020C4B000
heap
page read and write
21021314000
heap
page read and write
There are 988 hidden memdumps, click here to show them.