IOC Report
Ozn#U00e1men#U00ed o poru#U0161en#U00ed autorsk#U00fdch pr#U00e1v.zip

loading gif

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Users\user\Desktop\Ozn men o poru en autorsk ch pr v\Ozn men o poru en autorsk ch pr v.exe
"C:\Users\user\Desktop\Ozn men o poru en autorsk ch pr v\Ozn men o poru en autorsk ch pr v.exe"
C:\Users\user\Desktop\Ozn men o poru en autorsk ch pr v\Ozn men o poru en autorsk ch pr v.exe
"C:\Users\user\Desktop\Ozn men o poru en autorsk ch pr v\Ozn men o poru en autorsk ch pr v.exe"

URLs

Name
IP
Malicious
http://www.zeniko.ch/#SumatraPDFSimon
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://blog.kowalczyk.info/software/sumatrapdf/translators.htmlThe
unknown
http://www.drm-x.net/http://cn.drm-x.com/LicPrepare2008.aspxLicPrepare20082013.aspx.drm-x.com/2/%s?c
unknown
http://www.haihaisoft.comlibmupdf.pdbSumatraPDF.pdbSumatraPDF-prereleaseSumatraPDF.pdbSumatraPDF-1.5
unknown
http://www.drm-x.com/pdfversion.htmV
unknown
http://itexmac.sourceforge.net/SyncTeX.htmlJ
unknown
http://HDMHDMLoading...%s
unknown
http://www.drm-x.com/pdfversion.htm1.5.7.0..http://www.haihaisoft.com/PDF_Reader_download.aspxopenSo
unknown
http://www.flashvidz.tk/Zenonprogram
unknown
http://p.yusukekamiyamane.com/Yusuke
unknown
http://mailto:EmbeddedFilesTypeFilespecD%s%dR%s%sA%s%sKids.seen.seen.seenNumsSPStD%s.%d:%d:%dInfoPag
unknown
http://purl.oen
unknown
http://www.haihaisoft.com/Contact.aspx
unknown
http://www.ascendercorp.com/http://www.ascendercorp.com/typedesigners.htmlLicensed
unknown
http://www.freetype.org/FreeTypefont
unknown
http://www.haihaisoft.com/PDF_Reader_download.aspxhttp://www.drm-x.com/pdfversion.htmMS
unknown
http://blog.kowalczyk.info/software/sumatrapdf/translations.htmlContribute
unknown
http://william.famille-blum.org/William
unknown
http://www.apache.org/licenses/LICENSE-2.0Digitized
unknown
http://www.drm-x.com/pdfversion.htmo76
unknown
http://www.drm-x.com/pdfversion.htmv
unknown
http://mupdf.comMuPDFpdf
unknown
http://www.drm-x.com/pdfversion.htmt
unknown
http://www.winimage.com/zLibDllbad
unknown
http://www.winimage.com/zLibDll
unknown
http://cn.haihaisoft.com/%E6%B5%B7%E6%B5%B7%E8%BD%AF%E4%BB%B6PDF%E9%98%85%E8%AF%BB%E5%99%A8.aspxopen
unknown
http://www.haihaisoft.com/Contact.aspx%u%?.Install_DirSoftware
unknown
http://cn.haihaisoft.comhttp://www.haihaisoft.comcnhttp://cn.haihaisoft.com/%E6%B5%B7%E6%B5%B7%E8%BD
unknown
http://www.drm-x.com/pdfversion.htm
163.171.128.241
http://blog.kowalczyk.infoKrzysztof
unknown
http://www.haihaisoft.comSumatraPDF
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.drm-x.com.wswebpic.com
163.171.128.241
www.drm-x.com
unknown

IPs

IP
Domain
Country
Malicious
163.171.128.241
www.drm-x.com.wswebpic.com
European Union

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Haihaisoft PDF Reader
UpdateDate
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
1
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1
NodeSlot
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3\1
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\15\Shell
SniffedFolderType
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\pdf
0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\pdf
MRUListEx
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\*
0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\OpenSavePidlMRU\*
MRUListEx
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
0
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\CIDSizeMRU
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\15\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
Mode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\15\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
LogicalViewMode
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\15\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
FFlags
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\15\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
IconSize
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\15\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
Sort
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\15\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
ColInfo
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\15\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupView
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\15\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupByKey:FMTID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\15\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupByKey:PID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\15\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
GroupByDirection
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\CIDOpen\Modules\GlobalSettings\ProperTreeModuleInner
ProperTreeModuleInner
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU\3
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\BagMRU
NodeSlots
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\ComDlg32\LastVisitedPidlMRU
MRUListEx
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\Bags\15\ComDlg\{7D49D726-3C21-4F05-99AA-FDC2C9474656}
FFlags
There are 20 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
752D000
heap
page read and write
75CE000
heap
page read and write
7535000
heap
page read and write
8F81000
heap
page read and write
30C1000
heap
page read and write
7528000
heap
page read and write
8F68000
heap
page read and write
CC4000
heap
page read and write
14995DA0000
heap
page read and write
753B000
heap
page read and write
8F79000
heap
page read and write
B62000
heap
page read and write
753B000
heap
page read and write
308D000
heap
page read and write
B28000
heap
page read and write
8EC9000
heap
page read and write
7535000
heap
page read and write
8EC3000
heap
page read and write
30A9000
heap
page read and write
149960C5000
heap
page read and write
6C6F000
stack
page read and write
8F97000
heap
page read and write
8EA0000
heap
page read and write
75B2000
heap
page read and write
75C5000
heap
page read and write
8ED0000
heap
page read and write
575F000
stack
page read and write
6A58000
heap
page read and write
30E5000
heap
page read and write
CDF000
heap
page read and write
561F000
stack
page read and write
589F000
stack
page read and write
7525000
heap
page read and write
B4E000
heap
page read and write
CAE000
heap
page read and write
7597000
heap
page read and write
6A4F000
heap
page read and write
8F20000
heap
page read and write
7590000
heap
page read and write
8EA4000
heap
page read and write
14995ED0000
heap
page read and write
6A4F000
heap
page read and write
758C000
heap
page read and write
B30000
heap
page read and write
30AD000
heap
page read and write
2A30000
heap
page read and write
3290000
heap
page read and write
B5B000
heap
page read and write
8FB3000
heap
page read and write
7567000
heap
page read and write
8EAF000
heap
page read and write
8F8F000
heap
page read and write
6A58000
heap
page read and write
9F6000
unkown
page read and write
30BF000
heap
page read and write
7584000
heap
page read and write
8E000
stack
page read and write
69FE000
heap
page read and write
6A05000
heap
page read and write
579E000
stack
page read and write
870D000
stack
page read and write
CB5000
heap
page read and write
B20000
heap
page read and write
8F50000
heap
page read and write
1008000
heap
page read and write
B0E000
heap
page read and write
2A80000
heap
page read and write
8F72000
heap
page read and write
8FA9000
heap
page read and write
8F59000
heap
page read and write
6A51000
heap
page read and write
758C000
heap
page read and write
7595000
heap
page read and write
93000
stack
page read and write
7537000
heap
page read and write
8EA4000
heap
page read and write
8EEA000
heap
page read and write
14995CC0000
heap
page read and write
115E000
stack
page read and write
6A59000
heap
page read and write
8189000
stack
page read and write
A30000
heap
page read and write
551E000
stack
page read and write
75AC000
heap
page read and write
6B6E000
stack
page read and write
2A84000
heap
page read and write
B62000
heap
page read and write
3480000
heap
page read and write
74D0000
heap
page read and write
772D000
heap
page read and write
83CD000
stack
page read and write
8F8F000
heap
page read and write
76F5000
heap
page read and write
8F93000
heap
page read and write
754E000
heap
page read and write
8F6E000
heap
page read and write
74CA000
stack
page read and write
AFD000
heap
page read and write
69FB000
heap
page read and write
B32000
heap
page read and write
8EAD000
heap
page read and write
1166000
heap
page read and write
2A88000
heap
page read and write
8F53000
heap
page read and write
6C9000
unkown
page readonly
CA8000
heap
page read and write
4BE0000
trusted library allocation
page read and write
6DAF000
stack
page read and write
8EC8000
heap
page read and write
C97000
heap
page read and write
8FA9000
heap
page read and write
8EB2000
heap
page read and write
7540000
heap
page read and write
9DF000
unkown
page read and write
CA0000
heap
page read and write
54DF000
stack
page read and write
CE2000
heap
page read and write
B4E000
heap
page read and write
B9A000
heap
page read and write
69F6000
heap
page read and write
B56000
heap
page read and write
7510000
heap
page read and write
8EC6000
heap
page read and write
75CE000
heap
page read and write
19A000
stack
page read and write
DBE000
stack
page read and write
7190000
heap
page read and write
8F7D000
heap
page read and write
C6E000
heap
page read and write
5A1E000
stack
page read and write
874E000
stack
page read and write
753A000
heap
page read and write
8EEC000
heap
page read and write
8F5F000
heap
page read and write
7584000
heap
page read and write
CDD000
heap
page read and write
97F000
unkown
page write copy
6A3F000
heap
page read and write
8F95000
heap
page read and write
B8E000
heap
page read and write
7592000
heap
page read and write
32D0000
heap
page read and write
309D000
heap
page read and write
751F000
heap
page read and write
7555000
heap
page read and write
8F68000
heap
page read and write
58DE000
stack
page read and write
7597000
heap
page read and write
587C000
stack
page read and write
8FAF000
heap
page read and write
753A000
heap
page read and write
C90000
heap
page read and write
7525000
heap
page read and write
B19000
heap
page read and write
7558000
heap
page read and write
2A40000
heap
page read and write
8F30000
heap
page read and write
9E2000
unkown
page read and write
539F000
heap
page read and write
7532000
heap
page read and write
7589000
heap
page read and write
1116000
heap
page read and write
565E000
stack
page read and write
8F64000
heap
page read and write
B06000
heap
page read and write
B30000
heap
page read and write
BAE000
stack
page read and write
75B0000
heap
page read and write
97F000
unkown
page read and write
753B000
heap
page read and write
751C000
heap
page read and write
8FAD000
heap
page read and write
8EB1000
heap
page read and write
CD7000
heap
page read and write
30B5000
heap
page read and write
7564000
heap
page read and write
7514000
heap
page read and write
B8D000
heap
page read and write
9E7000
unkown
page read and write
75CA000
heap
page read and write
8F97000
heap
page read and write
1110000
heap
page read and write
5B7D000
stack
page read and write
7539000
heap
page read and write
CAC000
heap
page read and write
8FAD000
heap
page read and write
7589000
heap
page read and write
F0F000
stack
page read and write
C9B000
heap
page read and write
BE0000
heap
page read and write
C10000
heap
page read and write
B58000
heap
page read and write
B08000
heap
page read and write
B54000
heap
page read and write
B7F000
heap
page read and write
6C9000
unkown
page readonly
73CC000
stack
page read and write
2A60000
heap
page read and write
A80000
heap
page read and write
9C0000
unkown
page read and write
69F5000
heap
page read and write
7526000
heap
page read and write
2B6F000
stack
page read and write
6A3E000
heap
page read and write
5730000
heap
page read and write
CB5000
heap
page read and write
CD7000
heap
page read and write
CB9000
heap
page read and write
7512000
heap
page read and write
7540000
heap
page read and write
7545000
heap
page read and write
593C000
stack
page read and write
8F66000
heap
page read and write
1160000
heap
page read and write
8FA0000
heap
page read and write
B28000
heap
page read and write
8EE1000
heap
page read and write
6A53000
heap
page read and write
7521000
heap
page read and write
7557000
heap
page read and write
8EBE000
heap
page read and write
8EA2000
heap
page read and write
8F8C000
heap
page read and write
75C8000
heap
page read and write
CF2000
heap
page read and write
537D000
heap
page read and write
B60000
heap
page read and write
8EF1000
heap
page read and write
B5F000
heap
page read and write
71A0000
heap
page read and write
752D000
heap
page read and write
7589000
heap
page read and write
A30000
heap
page read and write
69F9000
heap
page read and write
75AC000
heap
page read and write
7555000
heap
page read and write
537F000
heap
page read and write
4B70000
trusted library allocation
page read and write
5B50000
heap
page read and write
3EFD15E000
stack
page read and write
8EB2000
heap
page read and write
9E2000
unkown
page read and write
6A3E000
heap
page read and write
B07000
heap
page read and write
CF7000
heap
page read and write
C9B000
heap
page read and write
97F000
unkown
page read and write
75A1000
heap
page read and write
8FA9000
heap
page read and write
8F00000
heap
page read and write
7551000
heap
page read and write
1004000
heap
page read and write
7520000
heap
page read and write
752E000
heap
page read and write
8EA4000
heap
page read and write
B10000
heap
page read and write
7532000
heap
page read and write
7551000
heap
page read and write
B74000
heap
page read and write
2A63000
heap
page read and write
753F000
heap
page read and write
B25000
heap
page read and write
14995DD0000
heap
page read and write
8ED4000
heap
page read and write
8F7D000
heap
page read and write
6DEE000
stack
page read and write
537C000
heap
page read and write
307C000
stack
page read and write
8F97000
heap
page read and write
8F7A000
heap
page read and write
CEA000
heap
page read and write
C76000
heap
page read and write
8EEC000
heap
page read and write
75B8000
heap
page read and write
30D1000
heap
page read and write
7520000
heap
page read and write
752B000
heap
page read and write
7029000
stack
page read and write
C89000
heap
page read and write
116A000
heap
page read and write
6A05000
heap
page read and write
C7F000
heap
page read and write
C9A000
heap
page read and write
72CA000
stack
page read and write
B3D000
heap
page read and write
3EFD47F000
stack
page read and write
7532000
heap
page read and write
B91000
heap
page read and write
B91000
heap
page read and write
B86000
heap
page read and write
6CAE000
stack
page read and write
753A000
heap
page read and write
69F8000
heap
page read and write
6A3E000
heap
page read and write
3370000
heap
page read and write
9FC000
unkown
page readonly
7521000
heap
page read and write
75AF000
heap
page read and write
6A4E000
heap
page read and write
7537000
heap
page read and write
7520000
heap
page read and write
8F83000
heap
page read and write
6C9000
unkown
page readonly
8F5B000
heap
page read and write
3099000
heap
page read and write
FFF000
stack
page read and write
75B8000
heap
page read and write
751C000
heap
page read and write
B19000
heap
page read and write
7562000
heap
page read and write
8F93000
heap
page read and write
6A3F000
heap
page read and write
B78000
heap
page read and write
8F66000
heap
page read and write
AA9000
heap
page read and write
C84000
heap
page read and write
8F8C000
heap
page read and write
8F85000
heap
page read and write
7525000
heap
page read and write
7509000
heap
page read and write
753D000
heap
page read and write
537F000
heap
page read and write
7520000
heap
page read and write
8F90000
heap
page read and write
30C5000
heap
page read and write
5BFC000
stack
page read and write
2A63000
heap
page read and write
758C000
heap
page read and write
6A3F000
heap
page read and write
751D000
heap
page read and write
B7A000
heap
page read and write
B56000
heap
page read and write
C9D000
heap
page read and write
3089000
heap
page read and write
8EB7000
heap
page read and write
10F0000
heap
page read and write
751C000
heap
page read and write
B9A000
heap
page read and write
B9B000
heap
page read and write
149960C0000
heap
page read and write
75C3000
heap
page read and write
69F6000
heap
page read and write
538D000
heap
page read and write
758E000
heap
page read and write
401000
unkown
page execute read
B96000
heap
page read and write
7551000
heap
page read and write
8F7F000
heap
page read and write
10DE000
stack
page read and write
6A4E000
heap
page read and write
8F64000
heap
page read and write
7543000
heap
page read and write
69F3000
heap
page read and write
69F0000
heap
page read and write
29BF000
stack
page read and write
C54000
heap
page read and write
30B5000
heap
page read and write
7525000
heap
page read and write
69FC000
heap
page read and write
348C000
heap
page read and write
6A4F000
heap
page read and write
8EEC000
heap
page read and write
7599000
heap
page read and write
751C000
heap
page read and write
8F91000
heap
page read and write
B97000
heap
page read and write
29FE000
stack
page read and write
7520000
heap
page read and write
8EB2000
heap
page read and write
8EC3000
heap
page read and write
69FE000
heap
page read and write
8EAF000
heap
page read and write
6A53000
heap
page read and write
8F8D000
heap
page read and write
9DD000
unkown
page read and write
7520000
heap
page read and write
C1E000
heap
page read and write
53A0000
heap
page read and write
B6E000
stack
page read and write
5BBC000
stack
page read and write
B78000
heap
page read and write
AB5000
heap
page read and write
754B000
heap
page read and write
3EFD1DE000
stack
page read and write
E0E000
stack
page read and write
751C000
heap
page read and write
7540000
heap
page read and write
B82000
heap
page read and write
758C000
heap
page read and write
C1A000
heap
page read and write
B82000
heap
page read and write
75AD000
heap
page read and write
8F57000
heap
page read and write
EFE000
stack
page read and write
69FE000
heap
page read and write
6A3E000
heap
page read and write
B1F000
heap
page read and write
CB2000
heap
page read and write
7525000
heap
page read and write
10EE000
stack
page read and write
8EAF000
heap
page read and write
5A7C000
stack
page read and write
C7A000
heap
page read and write
8EAF000
heap
page read and write
7539000
heap
page read and write
A7E000
stack
page read and write
7543000
heap
page read and write
8F8C000
heap
page read and write
884E000
stack
page read and write
8FB3000
heap
page read and write
C7F000
heap
page read and write
B95000
heap
page read and write
BDE000
stack
page read and write
400000
unkown
page readonly
3EFD0DC000
stack
page read and write
6A4E000
heap
page read and write
716B000
stack
page read and write
AA0000
heap
page read and write
7528000
heap
page read and write
539F000
heap
page read and write
706C000
stack
page read and write
8F00000
heap
page read and write
7715000
heap
page read and write
B9D000
heap
page read and write
75C7000
heap
page read and write
396E000
stack
page read and write
7521000
heap
page read and write
8FAD000
heap
page read and write
7532000
heap
page read and write
EBE000
stack
page read and write
8FB1000
heap
page read and write
B98000
heap
page read and write
752D000
heap
page read and write
7584000
heap
page read and write
9F6000
unkown
page read and write
B90000
heap
page read and write
B8A000
heap
page read and write
8F36000
heap
page read and write
538F000
heap
page read and write
1000000
heap
page read and write
751D000
heap
page read and write
7552000
heap
page read and write
8EE4000
heap
page read and write
196000
stack
page read and write
8EB1000
heap
page read and write
7584000
heap
page read and write
14995DD9000
heap
page read and write
7705000
heap
page read and write
5370000
heap
page read and write
6A53000
heap
page read and write
8EB2000
heap
page read and write
CE9000
heap
page read and write
758C000
heap
page read and write
74F7000
heap
page read and write
7537000
heap
page read and write
6A3E000
heap
page read and write
8F6E000
heap
page read and write
2B8F000
stack
page read and write
CA4000
heap
page read and write
7590000
heap
page read and write
69FB000
heap
page read and write
B4E000
heap
page read and write
750A000
heap
page read and write
8EE1000
heap
page read and write
8EBA000
heap
page read and write
6EEF000
stack
page read and write
10E0000
heap
page read and write
B3A000
heap
page read and write
C76000
heap
page read and write
2A30000
heap
page read and write
6A02000
heap
page read and write
BE6000
heap
page read and write
860C000
stack
page read and write
B7F000
heap
page read and write
2A60000
heap
page read and write
ADE000
heap
page read and write
6F2C000
stack
page read and write
100F000
stack
page read and write
8ECE000
heap
page read and write
B1D000
heap
page read and write
6A58000
heap
page read and write
32C0000
heap
page read and write
30BD000
heap
page read and write
8FA9000
heap
page read and write
B26000
heap
page read and write
111A000
heap
page read and write
59DD000
stack
page read and write
B0A000
heap
page read and write
B9D000
heap
page read and write
2A20000
heap
page read and write
8F5D000
heap
page read and write
752D000
heap
page read and write
BEE000
stack
page read and write
B0F000
heap
page read and write
8F5B000
heap
page read and write
B62000
heap
page read and write
14997810000
heap
page read and write
2A0F000
stack
page read and write
8EAC000
heap
page read and write
B6B000
heap
page read and write
752D000
heap
page read and write
5B1E000
stack
page read and write
There are 492 hidden memdumps, click here to show them.