IOC Report
nitro_pro14.exe

loading gif

Files

File Path
Type
Category
Malicious
nitro_pro14.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Windows\Temp\{FF9FB498-690B-42AD-8947-9DAF033FB533}\.cr\nitro_pro14.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\Nitro_PDF_Pro_20241014053733.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Nitro\PDF Pro\14\nitro_pro14-bugsplat-7044.log
ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\1028\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\1029\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\1030\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\1031\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\1032\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\1035\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\1036\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\1038\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\1040\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\1041\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\1042\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\1043\mbapreq.wxl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\1044\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\1045\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\1046\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\1049\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\1051\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\1053\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\1055\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\1060\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\2052\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\2070\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\3082\mbapreq.wxl
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\AcceptandInstall.png
PNG image data, 150 x 78, 8-bit/color RGB, non-interlaced
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\Background.png
PNG image data, 485 x 300, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\BootstrapperApplicationData.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with very long lines (609), with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\BootstrapperCore.config
XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\BootstrapperCore.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\Cancel.png
PNG image data, 62 x 78, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\Close.png
PNG image data, 62 x 78, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\CloseWindow.png
PNG image data, 20 x 60, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\GalaSoft.MvvmLight.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\Microsoft.Deployment.WindowsInstaller.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\Nitro.bmp
PC bitmap, Windows 3.x format, 148 x 60 x 24, image size 26640, resolution 2835 x 2835 px/m, cbSize 26694, bits offset 54
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\NitroBA.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\PageTransitions.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\ProgressBar.png
PNG image data, 4 x 10, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\de\NitroBA.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\es\NitroBA.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\fr\NitroBA.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\it\NitroBA.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\mbahost.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\mbapreq.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\mbapreq.png
PNG image data, 63 x 63, 8-bit/color RGBA, non-interlaced
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\mbapreq.thm
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\mbapreq.wxl
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\metrics.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Temp\{6E12AC3B-4BC0-4764-A2BD-1C246CC66772}\.ba\nl\NitroBA.resources.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
There are 42 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\Temp\{FF9FB498-690B-42AD-8947-9DAF033FB533}\.cr\nitro_pro14.exe
"C:\Windows\Temp\{FF9FB498-690B-42AD-8947-9DAF033FB533}\.cr\nitro_pro14.exe" -burn.clean.room="C:\Users\user\Desktop\nitro_pro14.exe" -burn.filehandle.attached=652 -burn.filehandle.self=680
malicious
C:\Users\user\Desktop\nitro_pro14.exe
"C:\Users\user\Desktop\nitro_pro14.exe"

URLs

Name
IP
Malicious
http://www.galasoft.ch/s/dialogmessage.
unknown
http://www.gonitro.com/
unknown
http://wixtoolset.org/schemas/thmutil/2010
unknown
http://www.gonitro.com/en/support/privacy-po
unknown
http://www.gonitro.com/en/support/privacy-policy09
unknown
http://www.gonitro.com///support/privacy-policy
unknown
https://go.micro
unknown
http://wixtoolset.org/Whttp://wixtoolset.org/telemetry/v
unknown
http://www.gonitro.com/services/linkredirector.aspx?lr_loc=en&lr_src=retail&lr_prod=Professional&lr_
unknown
https://desktop.gonitro.comhttps://desktop.gonitrodev.commetrics.use_dev_servert
unknown
http://www.google.com)WPD
unknown
http://wixtoolset.org/news/
unknown
https://desktop.gonitro.com/v14.29.1.0/events=
unknown
http://wixtoolset.org/releases/SCreating
unknown
http://www.gonitro.com/services/linkredirector.aspx?lr_loc=
unknown
https://desktop.gonitro.com/
unknown
https://downloads.gonitro.com/professional_14.29.1.0/en/retail/nitro_pro14_ba_x64.msi
unknown
http://wixtoolset.org/releases/
unknown
http://appsyndication.org/2006/appsynapplicationc:
unknown
http://www.galasoft.ch4
unknown
http://wixtoolset.org/
unknown
http://wixtoolset.org/telemetry/v
unknown
https://wixtoolset.org/
unknown
http://www.google.com
unknown
http://www.gonitro.com/en/support/privacy-policyx
unknown
http://www.galasoft.ch
unknown
http://www.gonitro.com/en/support/privacy-policy
unknown
http://www.galasoft.chN
unknown
https://desktop.gonitrodev.com
unknown
https://downloads.gonitro.com/professional_14.29.1.0/en
unknown
https://www.gonitro.com
unknown
https://desktop.gonitro.com/v14.29.1.0/events
104.16.123.109
https://desktop.gonitro.com/M
unknown
https://desktop.gonitro.com
unknown
http://appsyndication.org/2006/appsyn
unknown
https://go.microI
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
desktop.gonitro.com
104.16.123.109

IPs

IP
Domain
Country
Malicious
104.16.123.109
desktop.gonitro.com
United States

Memdumps

Base Address
Regiontype
Protect
Malicious
9E8F000
trusted library allocation
page read and write
72F0000
heap
page read and write
68A0000
trusted library allocation
page read and write
98E0000
trusted library allocation
page read and write
746B000
heap
page read and write
DE8000
heap
page read and write
12E000
unkown
page read and write
9940000
trusted library allocation
page read and write
BE13000
heap
page read and write
6DF0000
unkown
page readonly
C556000
heap
page read and write
33CF000
stack
page read and write
A06C000
stack
page read and write
F71000
heap
page read and write
99A0000
trusted library allocation
page read and write
C576000
heap
page read and write
7457000
heap
page read and write
73D4000
heap
page read and write
97A3000
heap
page read and write
69E0000
trusted library allocation
page read and write
7EF86000
trusted library allocation
page execute read
2FFB000
heap
page read and write
9FA0000
heap
page read and write
971A000
heap
page read and write
3189000
trusted library allocation
page execute and read and write
67BD000
heap
page read and write
C32000
heap
page read and write
BE62000
heap
page read and write
970F000
heap
page read and write
9500000
trusted library allocation
page read and write
72B3000
heap
page read and write
97AC000
heap
page read and write
741B000
heap
page read and write
D70000
heap
page read and write
31E0000
heap
page read and write
9BA0000
heap
page read and write
68EA000
heap
page read and write
67DD000
heap
page read and write
73D0000
heap
page read and write
BE13000
heap
page read and write
9CFA000
heap
page read and write
E9A000
heap
page read and write
4526000
trusted library allocation
page read and write
99A0000
trusted library allocation
page read and write
73FB000
heap
page read and write
10E000
unkown
page readonly
7446000
heap
page read and write
31F0000
heap
page read and write
687D000
heap
page read and write
687D000
heap
page read and write
7305000
heap
page read and write
69E0000
trusted library allocation
page read and write
CBF000
heap
page read and write
BD90000
heap
page read and write
73BF000
heap
page read and write
31C0000
heap
page read and write
9F93000
heap
page read and write
E98000
heap
page read and write
1200000
heap
page read and write
73DB000
heap
page read and write
9F96000
heap
page read and write
69E0000
trusted library allocation
page read and write
7EF85000
trusted library allocation
page readonly
ECE000
heap
page read and write
6D1A000
heap
page read and write
7480000
heap
page read and write
97DD000
heap
page read and write
31C3000
heap
page read and write
2DE0000
trusted library allocation
page read and write
C563000
heap
page read and write
69E0000
trusted library allocation
page read and write
72AD000
heap
page read and write
9799000
heap
page read and write
7EF8C000
trusted library allocation
page execute read
9CF2000
heap
page read and write
E64000
heap
page read and write
98C0000
trusted library allocation
page read and write
979A000
heap
page read and write
6DF2000
unkown
page readonly
73D7000
heap
page read and write
C3E7000
heap
page read and write
9900000
trusted library allocation
page read and write
73D4000
heap
page read and write
E80000
heap
page read and write
CC8000
heap
page read and write
7EF82000
trusted library allocation
page execute read
99B0000
trusted library allocation
page read and write
97A3000
heap
page read and write
7421000
heap
page read and write
B8BC000
heap
page read and write
73B8000
heap
page read and write
2BB0000
heap
page read and write
E7A000
heap
page read and write
7412000
heap
page read and write
9E80000
trusted library allocation
page read and write
97D4000
heap
page read and write
3170000
heap
page execute and read and write
BDE1000
heap
page read and write
11B0000
unkown
page read and write
5114000
trusted library allocation
page read and write
73FD000
heap
page read and write
9520000
trusted library allocation
page read and write
E8D000
heap
page read and write
E80000
heap
page read and write
7464000
heap
page read and write
73D7000
heap
page read and write
9ACE000
heap
page read and write
72D0000
heap
page read and write
7290000
heap
page read and write
E40000
heap
page read and write
713B000
stack
page read and write
69E0000
trusted library allocation
page read and write
732B000
heap
page read and write
98A0000
trusted library allocation
page read and write
97A5000
heap
page read and write
E98000
heap
page read and write
6D16000
heap
page read and write
A011000
heap
page read and write
E2F000
heap
page read and write
6893000
heap
page read and write
6AF0000
heap
page read and write
9900000
trusted library allocation
page read and write
7EF61000
trusted library allocation
page execute read
69F0000
trusted library allocation
page read and write
C7D000
heap
page read and write
312C000
stack
page read and write
C1000
unkown
page execute read
C566000
heap
page read and write
9DC6000
heap
page read and write
69E0000
trusted library allocation
page read and write
73DD000
heap
page read and write
98B0000
trusted library allocation
page read and write
CBD000
heap
page read and write
9FF6000
heap
page read and write
C478000
trusted library allocation
page read and write
C79000
heap
page read and write
11C0000
heap
page read and write
BDA3000
heap
page read and write
7EF7F000
trusted library allocation
page execute read
73FD000
heap
page read and write
6D10000
heap
page read and write
F2F000
heap
page read and write
9710000
heap
page read and write
7EF89000
trusted library allocation
page readonly
BE1C000
heap
page read and write
F73000
heap
page read and write
9FD7000
heap
page read and write
73EA000
heap
page read and write
BE1C000
heap
page read and write
9B86000
heap
page read and write
7EF8E000
trusted library allocation
page execute read
2E20000
heap
page read and write
6D1F000
heap
page read and write
6D0F000
heap
page read and write
6D13000
heap
page read and write
6FB0000
remote allocation
page read and write
31A0000
trusted library allocation
page execute and read and write
CF6000
heap
page read and write
BD93000
heap
page read and write
6D1A000
heap
page read and write
BE9C000
heap
page read and write
70EF000
stack
page read and write
94F0000
trusted library allocation
page read and write
9FE6000
heap
page read and write
9FB0000
heap
page read and write
64DE000
stack
page read and write
2FBD000
trusted library allocation
page execute and read and write
C20000
heap
page read and write
7412000
heap
page read and write
9FB6000
heap
page read and write
6D1A000
heap
page read and write
73EA000
heap
page read and write
C3A000
heap
page read and write
98E0000
trusted library allocation
page read and write
7EF75000
trusted library allocation
page execute read
7EF8A000
trusted library allocation
page execute read
69E0000
trusted library allocation
page read and write
7EF76000
trusted library allocation
page readonly
7421000
heap
page read and write
6D16000
heap
page read and write
C450000
trusted library allocation
page read and write
9D33000
heap
page read and write
C83000
heap
page read and write
9C67000
heap
page read and write
9910000
trusted library allocation
page read and write
C45F000
trusted library allocation
page read and write
73DB000
heap
page read and write
6D03000
heap
page read and write
6FEE000
stack
page read and write
9B15000
heap
page read and write
69E0000
trusted library allocation
page read and write
7446000
heap
page read and write
6893000
heap
page read and write
10E000
unkown
page readonly
7448000
heap
page read and write
73B7000
heap
page read and write
730B000
heap
page read and write
C81000
heap
page read and write
E2F000
heap
page read and write
CC1000
heap
page read and write
2CA0000
trusted library section
page read and write
6CD0000
heap
page read and write
9E99000
trusted library allocation
page read and write
9F4F000
heap
page read and write
6BCE000
stack
page read and write
BE1C000
heap
page read and write
9F80000
heap
page read and write
7448000
heap
page read and write
9DBC000
heap
page read and write
6D1F000
heap
page read and write
69F0000
trusted library allocation
page read and write
9ACA000
heap
page read and write
6D1F000
heap
page read and write
740B000
heap
page read and write
6D1A000
heap
page read and write
9719000
heap
page read and write
746B000
heap
page read and write
C350000
trusted library allocation
page read and write
2CD3000
trusted library allocation
page execute and read and write
9530000
trusted library allocation
page read and write
C469000
trusted library allocation
page read and write
31B0000
trusted library allocation
page read and write
9AD6000
heap
page read and write
9510000
trusted library allocation
page read and write
B9B2000
trusted library allocation
page read and write
7EF60000
trusted library allocation
page readonly
BE1C000
heap
page read and write
3183000
trusted library allocation
page read and write
6D0F000
heap
page read and write
9FBD000
heap
page read and write
7EF7E000
trusted library allocation
page readonly
6D1F000
heap
page read and write
9757000
heap
page read and write
AD1000
unkown
page readonly
B980000
heap
page read and write
7EF7B000
trusted library allocation
page execute read
6D14000
heap
page read and write
E36000
heap
page read and write
9B61000
heap
page read and write
7465000
heap
page read and write
C450000
trusted library allocation
page read and write
31F0000
heap
page read and write
C420000
heap
page read and write
7386000
heap
page read and write
CC6000
heap
page read and write
37F0000
trusted library allocation
page read and write
7EF77000
trusted library allocation
page execute read
9CAE000
heap
page read and write
ECB000
heap
page read and write
E1E000
heap
page read and write
9520000
trusted library allocation
page read and write
6889000
heap
page read and write
9FA6000
heap
page read and write
687B000
heap
page read and write
9B4D000
heap
page read and write
CCA000
heap
page read and write
2DC5000
trusted library allocation
page execute and read and write
5105000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
9810000
trusted library allocation
page read and write
6E4D000
stack
page read and write
C35C000
heap
page read and write
97A7000
heap
page read and write
7457000
heap
page read and write
9FC6000
heap
page read and write
7402000
heap
page read and write
C36000
heap
page read and write
308E000
heap
page read and write
69E0000
trusted library allocation
page read and write
979F000
heap
page read and write
7400000
heap
page read and write
ACE000
unkown
page read and write
A61000
unkown
page execute read
73D4000
heap
page read and write
979B000
heap
page read and write
33D0000
trusted library allocation
page read and write
2CB0000
heap
page read and write
69E0000
trusted library allocation
page read and write
6632000
unkown
page readonly
9870000
trusted library allocation
page read and write
2FAE000
stack
page read and write
2FD7000
heap
page execute and read and write
7EF71000
trusted library allocation
page execute read
73B7000
heap
page read and write
2D90000
trusted library allocation
page read and write
97A4000
heap
page read and write
9D2B000
heap
page read and write
7EF70000
trusted library allocation
page readonly
E69000
heap
page read and write
6CC08000
unkown
page readonly
BDA1000
heap
page read and write
33F0000
trusted library allocation
page read and write
E1E000
heap
page read and write
9F86000
heap
page read and write
9940000
trusted library allocation
page read and write
73BF000
heap
page read and write
C0000
unkown
page readonly
131000
unkown
page readonly
7339000
heap
page read and write
9CF0000
heap
page read and write
6A558000
unkown
page read and write
C463000
trusted library allocation
page read and write
741B000
heap
page read and write
7464000
heap
page read and write
2C2C000
stack
page read and write
9920000
trusted library allocation
page read and write
6D06000
heap
page read and write
C630000
heap
page read and write
E90000
heap
page read and write
6898000
heap
page read and write
72AD000
heap
page read and write
CC5000
heap
page read and write
746B000
heap
page read and write
CC7000
heap
page read and write
98F0000
trusted library allocation
page read and write
7402000
heap
page read and write
97F0000
trusted library allocation
page execute and read and write
730E000
heap
page read and write
69E0000
trusted library allocation
page read and write
9C5B000
heap
page read and write
2DCB000
trusted library allocation
page execute and read and write
2CC0000
trusted library allocation
page read and write
9E8B000
heap
page read and write
D03000
heap
page read and write
61FE000
stack
page read and write
9B00000
trusted library allocation
page read and write
1170000
heap
page read and write
649C000
stack
page read and write
9F16000
heap
page read and write
72D0000
heap
page read and write
6DE1000
trusted library allocation
page read and write
73E4000
heap
page read and write
680C000
heap
page read and write
72F5000
heap
page read and write
94F0000
trusted library allocation
page read and write
7464000
heap
page read and write
6619000
stack
page read and write
6D13000
heap
page read and write
7EF84000
trusted library allocation
page execute read
73E4000
heap
page read and write
BDE1000
heap
page read and write
C64D000
heap
page read and write
73BF000
heap
page read and write
3186000
trusted library allocation
page execute and read and write
30A0000
heap
page read and write
9761000
heap
page read and write
9700000
trusted library allocation
page read and write
6630000
unkown
page readonly
B945000
heap
page read and write
E70000
heap
page read and write
9AC0000
heap
page read and write
7457000
heap
page read and write
7423000
heap
page read and write
7490000
trusted library allocation
page read and write
AD1000
unkown
page readonly
BF0000
heap
page read and write
BE97000
heap
page read and write
746B000
heap
page read and write
CCD000
heap
page read and write
69E0000
trusted library allocation
page read and write
6819000
heap
page read and write
E7A000
heap
page read and write
9A60000
trusted library allocation
page read and write
9FD6000
heap
page read and write
2E2A000
heap
page read and write
740B000
heap
page read and write
6200000
unkown
page readonly
9EA8000
trusted library allocation
page read and write
DE0000
heap
page read and write
98E0000
trusted library allocation
page read and write
98D0000
trusted library allocation
page read and write
7480000
heap
page read and write
9A50000
trusted library allocation
page read and write
C3F000
heap
page read and write
BE1A000
heap
page read and write
9E9C000
trusted library allocation
page read and write
CFE000
heap
page read and write
3190000
heap
page read and write
E82000
heap
page read and write
73DD000
heap
page read and write
99BA000
trusted library allocation
page read and write
6D14000
heap
page read and write
9FA0000
heap
page read and write
72EA000
heap
page read and write
9B55000
heap
page read and write
F7B000
heap
page read and write
33F0000
heap
page read and write
73B2000
heap
page read and write
6D04000
heap
page read and write
9950000
trusted library allocation
page read and write
7EF81000
trusted library allocation
page readonly
738D000
heap
page read and write
9AD3000
heap
page read and write
3290000
heap
page read and write
7EF8B000
trusted library allocation
page readonly
7EF73000
trusted library allocation
page execute read
12E000
unkown
page write copy
30BF000
heap
page read and write
CD2000
heap
page read and write
663A000
unkown
page readonly
E82000
heap
page read and write
98A0000
trusted library allocation
page read and write
3180000
trusted library allocation
page read and write
9798000
heap
page read and write
7400000
heap
page read and write
9510000
trusted library allocation
page read and write
680B000
heap
page read and write
98F0000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
2DF0000
trusted library allocation
page execute and read and write
2E00000
heap
page read and write
9760000
heap
page read and write
73A8000
heap
page read and write
9DF7000
heap
page read and write
73A8000
heap
page read and write
6898000
heap
page read and write
9B57000
heap
page read and write
97E0000
trusted library allocation
page read and write
9AC2000
heap
page read and write
740B000
heap
page read and write
6D16000
heap
page read and write
C646000
heap
page read and write
BD99000
heap
page read and write
E48000
heap
page read and write
6D1A000
heap
page read and write
2CDD000
trusted library allocation
page execute and read and write
732C000
heap
page read and write
9EA1000
trusted library allocation
page read and write
99BE000
trusted library allocation
page read and write
746B000
heap
page read and write
6FB0000
remote allocation
page read and write
C3EF000
heap
page read and write
682E000
heap
page read and write
9B5D000
heap
page read and write
99B7000
trusted library allocation
page read and write
6D21000
heap
page read and write
6874000
heap
page read and write
979D000
heap
page read and write
7480000
heap
page read and write
E08000
heap
page read and write
6AC000
stack
page read and write
ACE000
unkown
page write copy
9F8D000
heap
page read and write
7457000
heap
page read and write
65DD000
stack
page read and write
D3B000
stack
page read and write
7400000
heap
page read and write
6CBF1000
unkown
page execute read
99C4000
trusted library allocation
page read and write
A61000
unkown
page execute read
69F0000
trusted library allocation
page read and write
C1000
unkown
page execute read
C653000
heap
page read and write
316E000
stack
page read and write
9700000
trusted library allocation
page read and write
72B7000
heap
page read and write
97D3000
heap
page read and write
98A0000
trusted library allocation
page read and write
7446000
heap
page read and write
D00000
heap
page read and write
C26000
heap
page read and write
97DE000
heap
page read and write
11D0000
heap
page read and write
69E0000
trusted library allocation
page read and write
730E000
heap
page read and write
740D000
heap
page read and write
9FD0000
heap
page read and write
CC3000
heap
page read and write
6D13000
heap
page read and write
40F0000
heap
page read and write
69E0000
trusted library allocation
page read and write
9FDD000
heap
page read and write
69F0000
trusted library allocation
page read and write
C86000
heap
page read and write
40EE000
stack
page read and write
6D10000
heap
page read and write
A10000
heap
page read and write
73D7000
heap
page read and write
C3A3000
heap
page read and write
69ED000
trusted library allocation
page read and write
9B55000
heap
page read and write
7453000
heap
page read and write
69E8000
trusted library allocation
page read and write
6FB0000
remote allocation
page read and write
9500000
trusted library allocation
page read and write
2DC7000
trusted library allocation
page execute and read and write
99B0000
trusted library allocation
page read and write
687B000
heap
page read and write
6D1F000
heap
page read and write
975B000
heap
page read and write
7448000
heap
page read and write
7412000
heap
page read and write
6D14000
heap
page read and write
9BDE000
heap
page read and write
6CBF0000
unkown
page readonly
6889000
heap
page read and write
33E0000
heap
page read and write
9756000
heap
page read and write
9AA0000
heap
page read and write
CBC000
heap
page read and write
C656000
heap
page read and write
67DF000
heap
page read and write
3042000
heap
page read and write
6794000
stack
page read and write
DC8000
stack
page read and write
6A380000
unkown
page readonly
6642000
unkown
page readonly
69F0000
trusted library allocation
page read and write
9930000
trusted library allocation
page read and write
7EF79000
trusted library allocation
page execute read
BEA1000
heap
page read and write
6CC12000
unkown
page readonly
9900000
trusted library allocation
page read and write
7EF88000
trusted library allocation
page execute read
9FC0000
heap
page read and write
98F0000
trusted library allocation
page read and write
9C2A000
heap
page read and write
7389000
heap
page read and write
C3C000
heap
page read and write
B947000
heap
page read and write
73AF000
heap
page read and write
E66000
heap
page read and write
6936000
heap
page read and write
BD99000
heap
page read and write
A60000
unkown
page readonly
72B7000
heap
page read and write
7EF78000
trusted library allocation
page readonly
AAE000
unkown
page readonly
99B0000
heap
page read and write
A60000
unkown
page readonly
2CE0000
heap
page read and write
E69000
heap
page read and write
72EA000
heap
page read and write
7448000
heap
page read and write
7480000
heap
page read and write
99AE000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
6CC10000
unkown
page read and write
9B01000
heap
page read and write
6D1F000
heap
page read and write
C7A000
heap
page read and write
682E000
heap
page read and write
2CD0000
trusted library allocation
page read and write
2CD4000
trusted library allocation
page read and write
11D9000
heap
page read and write
9E80000
trusted library allocation
page read and write
6D16000
heap
page read and write
9B53000
heap
page read and write
97AD000
heap
page read and write
67B3000
heap
page read and write
7EF72000
trusted library allocation
page readonly
6A381000
unkown
page execute read
6D02000
heap
page read and write
6F4C000
stack
page read and write
639C000
stack
page read and write
9910000
trusted library allocation
page read and write
9B92000
heap
page read and write
CC5000
heap
page read and write
73B1000
heap
page read and write
7238000
stack
page read and write
CCF000
heap
page read and write
7406000
heap
page read and write
CC5000
heap
page read and write
9B11000
heap
page read and write
9E80000
trusted library allocation
page read and write
2D94000
trusted library allocation
page read and write
7EF80000
trusted library allocation
page execute read
AAE000
unkown
page readonly
CF7000
heap
page read and write
9FE3000
heap
page read and write
7EF7A000
trusted library allocation
page readonly
2FC0000
trusted library allocation
page read and write
BE9A000
heap
page read and write
73BF000
heap
page read and write
BE1A000
heap
page read and write
6CF4000
heap
page read and write
B903000
heap
page read and write
9B8E000
heap
page read and write
6640000
unkown
page readonly
6D1A000
heap
page read and write
9720000
trusted library allocation
page read and write
98C0000
trusted library allocation
page read and write
73FD000
heap
page read and write
1170000
trusted library allocation
page read and write
BDE2000
heap
page read and write
72BC000
heap
page read and write
6801000
heap
page read and write
97D8000
heap
page read and write
1190000
trusted library allocation
page read and write
9910000
trusted library allocation
page read and write
740F000
heap
page read and write
E91000
heap
page read and write
C640000
heap
page read and write
6214000
unkown
page readonly
31D0000
trusted library allocation
page read and write
72BC000
heap
page read and write
9AA0000
trusted library allocation
page read and write
747A000
heap
page read and write
C471000
trusted library allocation
page read and write
6874000
heap
page read and write
6B10000
heap
page execute and read and write
9AE6000
heap
page read and write
E80000
heap
page read and write
69EA000
trusted library allocation
page read and write
6CCE000
stack
page read and write
72A0000
heap
page read and write
6A55A000
unkown
page write copy
BE13000
heap
page read and write
7386000
heap
page read and write
C350000
trusted library allocation
page read and write
C591000
heap
page read and write
72F5000
heap
page read and write
9910000
trusted library allocation
page read and write
2D70000
heap
page read and write
6620000
trusted library allocation
page read and write
6CE0000
heap
page read and write
6CFF000
heap
page read and write
5101000
trusted library allocation
page read and write
7EF90000
trusted library allocation
page execute and read and write
9AC6000
heap
page read and write
68A3000
heap
page read and write
6967000
heap
page read and write
65E0000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
9C22000
heap
page read and write
65E0000
trusted library allocation
page read and write
73F1000
heap
page read and write
BD9D000
heap
page read and write
7421000
heap
page read and write
DB0000
heap
page read and write
9AB0000
trusted library allocation
page execute and read and write
B94F000
heap
page read and write
9F1E000
heap
page read and write
6A564000
unkown
page read and write
68A0000
trusted library allocation
page read and write
7315000
heap
page read and write
98E0000
trusted library allocation
page read and write
9B59000
heap
page read and write
7305000
heap
page read and write
72B3000
heap
page read and write
9ACD000
heap
page read and write
9FD1000
heap
page read and write
733B000
heap
page read and write
73A8000
heap
page read and write
4101000
trusted library allocation
page read and write
CFA000
heap
page read and write
E57000
heap
page read and write
689E000
heap
page read and write
C33000
heap
page read and write
73EA000
heap
page read and write
EE8000
heap
page read and write
98C0000
trusted library allocation
page read and write
BD9E000
heap
page read and write
729C000
heap
page read and write
C3C000
stack
page read and write
6202000
unkown
page readonly
7A8000
stack
page read and write
CBE000
heap
page read and write
C55D000
heap
page read and write
6E00000
trusted library allocation
page read and write
E90000
heap
page read and write
9500000
trusted library allocation
page read and write
1170000
trusted library allocation
page read and write
69E0000
trusted library allocation
page read and write
9B4B000
heap
page read and write
E90000
heap
page read and write
67A0000
heap
page read and write
3400000
trusted library allocation
page read and write
E9D000
heap
page read and write
2FE0000
heap
page read and write
9B09000
heap
page read and write
C550000
heap
page read and write
7480000
heap
page read and write
741B000
heap
page read and write
6D1F000
heap
page read and write
9940000
trusted library allocation
page read and write
7413000
heap
page read and write
2C90000
trusted library section
page read and write
9714000
heap
page read and write
2E10000
trusted library allocation
page read and write
FAC000
heap
page read and write
7464000
heap
page read and write
69E0000
trusted library allocation
page read and write
2DA0000
heap
page read and write
73B1000
heap
page read and write
73E4000
heap
page read and write
69E0000
trusted library allocation
page read and write
2DC0000
trusted library allocation
page read and write
98A0000
trusted library allocation
page read and write
6CE7000
heap
page read and write
69E0000
trusted library allocation
page read and write
7448000
heap
page read and write
73DB000
heap
page read and write
9F14000
heap
page read and write
C661000
heap
page read and write
2DC2000
trusted library allocation
page read and write
733F000
heap
page read and write
EA5000
heap
page read and write
EDA000
heap
page read and write
7EF7D000
trusted library allocation
page execute read
9ED2000
heap
page read and write
6A565000
unkown
page readonly
99A0000
trusted library allocation
page read and write
98F0000
trusted library allocation
page read and write
C46C000
trusted library allocation
page read and write
D80000
heap
page read and write
9DBE000
heap
page read and write
730B000
heap
page read and write
7386000
heap
page read and write
BDA8000
heap
page read and write
7446000
heap
page read and write
9950000
trusted library allocation
page read and write
BE66000
heap
page read and write
7453000
heap
page read and write
2FD0000
heap
page execute and read and write
E82000
heap
page read and write
98D0000
trusted library allocation
page read and write
9860000
trusted library allocation
page read and write
11D0000
heap
page read and write
2F80000
heap
page read and write
32F8000
trusted library allocation
page read and write
73DD000
heap
page read and write
7409000
heap
page read and write
72F0000
heap
page read and write
9FC3000
heap
page read and write
9950000
trusted library allocation
page read and write
EDA000
heap
page read and write
6A55D000
unkown
page read and write
7402000
heap
page read and write
73D0000
heap
page read and write
9B97000
heap
page read and write
6D1A000
heap
page read and write
98C0000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
7EFA8000
trusted library allocation
page execute and read and write
6D16000
heap
page read and write
69F0000
trusted library allocation
page read and write
73F7000
heap
page read and write
CBB000
heap
page read and write
6A4EA000
unkown
page readonly
732B000
heap
page read and write
69E0000
trusted library allocation
page read and write
BD94000
heap
page read and write
9910000
trusted library allocation
page read and write
9D7A000
heap
page read and write
7404000
heap
page read and write
999E000
stack
page read and write
CC9000
heap
page read and write
6D13000
heap
page read and write
9C20000
heap
page read and write
6D14000
heap
page read and write
733F000
heap
page read and write
6819000
heap
page read and write
7339000
heap
page read and write
C0000
unkown
page readonly
97A2000
heap
page read and write
C667000
heap
page read and write
65E0000
trusted library allocation
page read and write
97A2000
heap
page read and write
7483000
heap
page read and write
733D000
heap
page read and write
9A50000
trusted library allocation
page read and write
747D000
heap
page read and write
C3E5000
heap
page read and write
7457000
heap
page read and write
733F000
heap
page read and write
BE97000
heap
page read and write
9710000
trusted library allocation
page read and write
6D16000
heap
page read and write
11D6000
heap
page read and write
BEA1000
heap
page read and write
BDA1000
heap
page read and write
689E000
heap
page read and write
131000
unkown
page readonly
6D13000
heap
page read and write
There are 765 hidden memdumps, click here to show them.