IOC Report
Autodesk_Inventor_Professional_2025_1_2_en-US_setup_webinstall.exe

loading gif

Files

File Path
Type
Category
Malicious
Autodesk_Inventor_Professional_2025_1_2_en-US_setup_webinstall.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\ProgramData\Autodesk\ADPSDK\JSON\2fc8918c-67fb-4d8c-b655-2c390a0a29e8_5.json.user (copy)
JSON data
dropped
C:\ProgramData\Autodesk\ADPSDK\JSON\2fc8918c-67fb-4d8c-b655-2c390a0a29e8_5.json.user.saving
JSON data
dropped
C:\ProgramData\Autodesk\ADPSDK\JSON\2fc8918c-67fb-4d8c-b655-2c390a0a29e8_6.json.user (copy)
JSON data
dropped
C:\ProgramData\Autodesk\ADPSDK\JSON\2fc8918c-67fb-4d8c-b655-2c390a0a29e8_6.json.user.saving
JSON data
dropped
C:\ProgramData\Autodesk\ADPSDK\JSON\2fc8918c-67fb-4d8c-b655-2c390a0a29e8_i3.json.user (copy)
JSON data
dropped
C:\ProgramData\Autodesk\ADPSDK\JSON\2fc8918c-67fb-4d8c-b655-2c390a0a29e8_i3.json.user.saving
JSON data
dropped
C:\ProgramData\Autodesk\ADPSDK\JSON\2fc8918c-67fb-4d8c-b655-2c390a0a29e8_i4.json.user (copy)
JSON data
dropped
C:\ProgramData\Autodesk\ADPSDK\JSON\2fc8918c-67fb-4d8c-b655-2c390a0a29e8_i4.json.user.saving
JSON data
dropped
C:\ProgramData\Autodesk\ADPSDK\JSON\2fc8918c-67fb-4d8c-b655-2c390a0a29e8_i7.json.user (copy)
JSON data
dropped
C:\ProgramData\Autodesk\ADPSDK\JSON\2fc8918c-67fb-4d8c-b655-2c390a0a29e8_i7.json.user.saving
JSON data
dropped
C:\ProgramData\Autodesk\ADPSDK\JSON\921cb97e-6ffc-48e8-8f23-9c137052aa6a_i1.json.user (copy)
JSON data
dropped
C:\ProgramData\Autodesk\ADPSDK\JSON\921cb97e-6ffc-48e8-8f23-9c137052aa6a_i1.json.user.saving
JSON data
dropped
C:\ProgramData\Autodesk\ADPSDK\JSON\Urgent\bad15008-50f2-4d72-bd57-c7ecfccc87be_2.json.user (copy)
JSON data
dropped
C:\ProgramData\Autodesk\ADPSDK\JSON\Urgent\bad15008-50f2-4d72-bd57-c7ecfccc87be_2.json.user.saving
JSON data
dropped
C:\ProgramData\Autodesk\ADPSDK\canWrite6940.6880
ASCII text, with no line terminators
dropped
C:\ProgramData\Autodesk\ADPSDK\canWrite6940.6976
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Autodesk\ODIS\DLM.log
ASCII text, with very long lines (365), with CRLF line terminators
modified
C:\Users\user\AppData\Local\Autodesk\ODIS\Setup.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\7z-license.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\7za.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\Autodesk_dialog_512x512.png
PNG image data, 512 x 512, 8-bit/color RGBA, non-interlaced
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\Microsoft.Diagnostics.Runtime.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\UPI.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\cer_core.dll
PE32+ executable (DLL) (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\cs-CZ\senddmp.resources.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\de-DE\senddmp.resources.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\en-US\senddmp.resources.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\en-US\senddmp_cli.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\es-ES\senddmp.resources.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\fr-FR\senddmp.resources.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\hu-HU\senddmp.resources.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\it-IT\senddmp.resources.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\ja-JP\senddmp.resources.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\ko-KR\senddmp.resources.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\libcrypto-3-x64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\libssl-3-x64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\msvcp140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\pl-PL\senddmp.resources.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\pt-BR\senddmp.resources.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\pt-PT\senddmp.resources.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\ru-RU\senddmp.resources.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\senddmp.exe
PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\senddmp.exe.config
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\senddmp_cli.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\upiconfig.xml
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\vcruntime140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\vcruntime140_1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\zh-CN\senddmp.resources.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\CER\zh-TW\senddmp.resources.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\DownloadManager.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\bootstrap.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\odis.bs.win\AdHttpLib.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\odis.bs.win\AdpSDKCore.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\odis.bs.win\AdpSDKWrapper.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\odis.bs.win\msvcp140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\odis.bs.win\odis.bs.win.manifest
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\odis.bs.win\vcruntime140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\odis.bs.win\vcruntime140_1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\odis.bs.wx\odis.bs.wx.manifest
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\odis.bs.wx\wxbase32u_vc.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\odis.bs.wx\wxmsw32u_core_vc.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\strings.xml
XML 1.0 document, Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\Setup.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\Setup.exe.config
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\SetupRes\ad.logconfig
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\7z36D71A90\SetupRes\add.logconfig
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\odis_download_dest\16718949653529810453\Autodesk_Inventor_Professional_2025_en-US_setup.dat
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\odis_download_dest\16718949653529810453\Autodesk_Inventor_Professional_2025_en-US_setup.dat.info
data
dropped
C:\Users\user\AppData\Roaming\Autodesk\ADPSDK\AdpSDKGlobal.config
JSON data
dropped
C:\Users\user\AppData\Roaming\canWrite6940.6976
ASCII text, with no line terminators
dropped
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped
There are 62 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Autodesk_Inventor_Professional_2025_1_2_en-US_setup_webinstall.exe
"C:\Users\user\Desktop\Autodesk_Inventor_Professional_2025_1_2_en-US_setup_webinstall.exe"
C:\Users\user\AppData\Local\Temp\7z36D71A90\Setup.exe
C:\Users\user\AppData\Local\Temp\7z36D71A90\Setup.exe
C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\DownloadManager.exe
"C:\Users\user\AppData\Local\Temp\7z36D71A90\ODIS\DownloadManager.exe" -u "https://trial2.autodesk.com/NetSWDLD/ODIS/prd/2025/INVPROSA/E578CB4E-CF55-3E4D-9A8A-213245140B78/WI/Autodesk_Inventor_Professional_2025_en-US_setup.dat" -p "C:\Users\user\AppData\Local\Temp\odis_download_dest\16718949653529810453\Autodesk_Inventor_Professional_2025_en-US_setup.dat" --productname Bootstrap --productversion 2.10.0.4
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://compsvc.delivery.autodesk.com/compsvc/componentServiceI
unknown
https://github.com/nidud/asmc
unknown
http://www.appinf.com/properties/bla-activation-threshold
unknown
https://manifest.delivery.autodesk.comLICENSEj
unknown
https://stg-manifest.delivery.autodesk.comTwW
unknown
http://www.appinf.com/features/enable-partial-reads
unknown
https://manage.autodesk.com/home1Label_ResultView_Text_131Label_ResultView_Text_141Label_ResultView_
unknown
https://manifest.delivery.autodesk.comTHn
unknown
http://sourceforge.net/projects/p7zip/
unknown
https://compsvc.delivery.autodesk.com/compsvc/componentServiceB
unknown
https://adppa.api.autodesk.com/api/v1/whitelist/
unknown
http://crl3.digice1
unknown
https://dds.autodesk.com/8
unknown
https://knowledge.autodesk.com/contact-support
unknown
https://dds.autodesk.com/
unknown
https://dds.autodesk.com/manifest.xsdmanifest_ext.xsdC:
unknown
http://www.appinf.com/features/no-whitespace-in-element-content#node
unknown
http://xml.org/sax/features/namespace-prefixes
unknown
http://www.autodesk.com/company/autodesk-analyticsDialogPrivacyURLhttp://www.autodesk.com/company/le
unknown
https://trial2.autodesk.com/NetSWDLD/ODIS/prd/2025/INVPROSA/E578CB4E-CF55-3E4D-9A8A-213245140B78/WI/
unknown
http://crl3.digi
unknown
https://compsvc.delivery.autodesk.com/compsvc/componentServiceP
unknown
http://xml.org/sax/features/string-interning
unknown
https://ase-stg.autodesk.com/adp/v1/analytics/batch
unknown
http://xml.org/sax/features/external-parameter-entities
unknown
https://ase.autodesk.com/adp/v1/analytics/batch
unknown
https://stg-manifest.delivery.autodesk.comNSE
unknown
https://curl.se/docs/hsts.html
unknown
https://compsvc.delivery.autodesk.com/compsvc/componentServicej
unknown
https://dev-compsvc.delivery.autodesk.com/compsvc/componentService
unknown
https://github.com/Microsoft/clrmd
unknown
http://www.appinf.com/properties/bla-maximum-amplification
unknown
http://www.autodesk.com/company/autodesk-analytics
unknown
https://dds.autodesk.com/s3u
unknown
https://dev-manifest.delivery.autodesk.comNSE
unknown
https://compsvc.delivery.autodesk.com/compsvc/componentServicez
unknown
https://manifest.delivery.autodesk.com
unknown
http://www.autodesk.com/company/legal-notices-trademarks/privacy-statement
unknown
https://adppa-stg.api.autodesk.com/api/v1/whitelist/
unknown
https://emsfs.autodesk.com/utility/odis/1/update/prd/update.xml
unknown
https://manifest.delivery.autodesk.comDCENSE
unknown
https://www.autodesk.com/company/legal-notices-trademarks/privacy-statement
unknown
https://dds.autodesk.com/#
unknown
https://stg-compsvc.delivery.autodesk.com/compsvc/componentService9
unknown
https://dev-manifest.delivery.autodesk.comDpX
unknown
https://manifest.delivery.autodesk.comOURCESX
unknown
http://www.appinf.com/features/no-whitespace-in-element-content
unknown
http://xml.org/sax/features/validationhttp://xml.org/sax/features/namespaceshttp://xml.org/sax/featu
unknown
https://stg-manifest.delivery.autodesk.comORW
unknown
https://manifest.delivery.autodesk.comj
unknown
http://cacerts.dig
unknown
https://curl.se/docs/http-cookies.html
unknown
https://dds.autodesk.com/n
unknown
https://emsfs.autodesk.com/utility/odis/OS--propsminVersion--tmpdirarchitecture-tunsupportedVersions
unknown
http://xml.org/sax/features/external-general-entities
unknown
https://manifest.delivery.autodesk.comLICENSE
unknown
http://xml.org/sax/features/namespaces
unknown
http://www.7-zip.org
unknown
https://curl.se/docs/alt-svc.html
unknown
http://crl3.digiK
unknown
https://stg-manifest.delivery.autodesk.comFEST
unknown
https://errorreport.autodesk.com/whatHappens.jsp?language=
unknown
https://dev-manifest.delivery.autodesk.comFEST
unknown
https://errorreport.autodesk.com
unknown
https://manifest.delivery.autodesk.comMANIFEST
unknown
https://errorreport.autodesk.comCER_PROXY_SERVERusing
unknown
http://xml.org/sax/properties/declaration-handler
unknown
http://cacerts.digicert.O
unknown
https://emsfs.autodesk.com/utility/odis/buildmap.xmln
unknown
http://www.7-zip.org/sdk.html
unknown
http://xml.org/sax/features/validation
unknown
https://www.openssl.org/H
unknown
https://adppa-stg.api.autodesk.com/api/v1/whitelist/FacetFilterWhitelistURLhttps://adppa.api.autodes
unknown
http://www.winimage.com/zLibDll
unknown
https://compsvc.delivery.autodesk.com/compsvc/componentService:
unknown
https://stg-compsvc.delivery.autodesk.com/compsvc/componentService
unknown
https://compsvc.delivery.autodesk.com/compsvc/componentService6
unknown
https://dev-manifest.delivery.autodesk.com
unknown
https://compsvc.delivery.autodesk.com/compsvc/componentService
unknown
http://www.w.org/1999/02/22-rdf-syntax-ns#
unknown
https://forums.autodesk.com?
unknown
https://stg-manifest.delivery.autodesk.com
unknown
http://xml.org/sax/properties/lexical-handler
unknown
https://ase.autodesk.com/adp/v1/analytics/batch52
unknown
There are 74 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
manifest.delivery.autodesk.com
54.158.70.36
trial2.autodesk.com
unknown

IPs

IP
Domain
Country
Malicious
54.158.70.36
manifest.delivery.autodesk.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Autodesk\DDA\DLM\CER\2.10.0.2
SessionStartCount
HKEY_CURRENT_USER\SOFTWARE\Autodesk\DDA\DLM\CER\2.10.0.2
SessionCleanCloseCount
HKEY_CURRENT_USER\SOFTWARE\Autodesk\DDA\DLM\CER\2.10.0.2
Uptime
HKEY_CURRENT_USER\SOFTWARE\Autodesk\DDA\DLM\CER\2.10.0.2
CalUptime

Memdumps

Base Address
Regiontype
Protect
Malicious
19CCC48E000
heap
page read and write
21409552000
heap
page read and write
21409888000
heap
page read and write
7FF77E116000
unkown
page readonly
214079D4000
heap
page read and write
21409380000
heap
page read and write
4DB000
heap
page read and write
21409799000
heap
page read and write
4DD5000
heap
page read and write
4DFD000
heap
page read and write
21409456000
heap
page read and write
21409471000
heap
page read and write
7FFDF9F64000
unkown
page readonly
21407900000
heap
page read and write
21409896000
heap
page read and write
19CCC46A000
heap
page read and write
214095F6000
heap
page read and write
21409599000
heap
page read and write
2140945E000
heap
page read and write
214098D1000
heap
page read and write
2140965B000
heap
page read and write
21409683000
heap
page read and write
21409836000
heap
page read and write
4ED000
heap
page read and write
214097AA000
heap
page read and write
21409861000
heap
page read and write
5332DFC000
stack
page read and write
4E2B000
heap
page read and write
7FFDFA08D000
unkown
page readonly
7FF77E102000
unkown
page readonly
2140989A000
heap
page read and write
214097B2000
heap
page read and write
21407AE0000
heap
page read and write
19CCC575000
heap
page read and write
7FFDFB58B000
unkown
page readonly
7FF6A2413000
unkown
page readonly
7FFDFAF88000
unkown
page write copy
21409710000
heap
page read and write
19CCC483000
heap
page read and write
19CCC400000
heap
page read and write
2140969D000
heap
page read and write
7FFDF9D58000
unkown
page readonly
7FF77D6C1000
unkown
page execute read
7FF6A2216000
unkown
page read and write
7FFDFAA7C000
unkown
page execute read
214097A6000
heap
page read and write
9C000
stack
page read and write
41E000
unkown
page readonly
214097A6000
heap
page read and write
21409633000
heap
page read and write
19CCC485000
heap
page read and write
7FFDFA119000
unkown
page execute read
7FFDFBA4A000
unkown
page readonly
7FFDFA514000
unkown
page execute read
7FFDF9C41000
unkown
page execute read
21409610000
heap
page read and write
7FFDFAF89000
unkown
page read and write
4E57000
heap
page read and write
214079E7000
heap
page read and write
214093C6000
heap
page read and write
2140947B000
heap
page read and write
7FFDFBA1D000
unkown
page read and write
214079AD000
heap
page read and write
19CCC461000
heap
page read and write
21409683000
heap
page read and write
2140937E000
heap
page read and write
7FFDFB081000
unkown
page readonly
5332558000
stack
page read and write
401000
unkown
page execute read
4CED000
heap
page read and write
214093A1000
heap
page read and write
7FFDFA579000
unkown
page execute read
5332FFE000
stack
page read and write
2140989C000
heap
page read and write
214095F6000
heap
page read and write
21409888000
heap
page read and write
4C1F000
heap
page read and write
4F45000
heap
page read and write
214096BC000
heap
page read and write
2C71000
heap
page read and write
1F19000
heap
page read and write
7FFDFA089000
unkown
page read and write
7FF6A12E1000
unkown
page execute read
214079C5000
heap
page read and write
21409593000
heap
page read and write
21409706000
heap
page read and write
21409565000
heap
page read and write
21409500000
heap
page read and write
7FFDFAD3B000
unkown
page readonly
21409894000
heap
page read and write
19CCC48D000
heap
page read and write
2140969D000
heap
page read and write
34D0000
heap
page read and write
9ADF7FF000
stack
page read and write
7FFE13391000
unkown
page read and write
5332EFE000
stack
page read and write
7FFDFAF73000
unkown
page read and write
7FF6A21FE000
unkown
page write copy
2140981E000
heap
page read and write
21409880000
heap
page read and write
19CCC48D000
heap
page read and write
19CCC47C000
heap
page read and write
7FFE14630000
unkown
page readonly
27CF000
heap
page read and write
9ADFBFE000
stack
page read and write
214096A5000
heap
page read and write
400000
unkown
page readonly
21409418000
heap
page read and write
7FFDFA087000
unkown
page write copy
5332AFE000
stack
page read and write
19CCC489000
heap
page read and write
214095D2000
heap
page read and write
214079E1000
heap
page read and write
7FFE003D1000
unkown
page read and write
21407995000
heap
page read and write
214079D9000
heap
page read and write
214098B5000
heap
page read and write
7FF77E060000
unkown
page write copy
21409868000
heap
page read and write
408000
unkown
page readonly
4F72000
heap
page read and write
441D000
heap
page read and write
2140985A000
heap
page read and write
2140797D000
heap
page read and write
7FFE003CF000
unkown
page read and write
7FFDFA4D6000
unkown
page execute read
23B9000
heap
page read and write
2140956D000
heap
page read and write
445E000
heap
page read and write
9ADF8FC000
stack
page read and write
21407986000
heap
page read and write
2140A2E0000
remote allocation
page read and write
7FFE14638000
unkown
page readonly
21409388000
heap
page read and write
409000
unkown
page read and write
19CCC500000
heap
page read and write
7FFE00340000
unkown
page readonly
3ED0000
heap
page read and write
7FF6A1EBB000
unkown
page readonly
21409756000
heap
page read and write
21409473000
heap
page read and write
7FF77E102000
unkown
page readonly
19CCC45E000
heap
page read and write
6EF9000
heap
page read and write
7FF6A2235000
unkown
page read and write
214079FC000
heap
page read and write
7FF77D6C1000
unkown
page execute read
21409634000
heap
page read and write
1EF2000
heap
page read and write
21407935000
heap
page read and write
7FFDFAEF3000
unkown
page read and write
19CCC487000
heap
page read and write
2140939B000
heap
page read and write
21409799000
heap
page read and write
7FF6A12E1000
unkown
page execute read
7FFDFA0B0000
unkown
page readonly
214093A2000
heap
page read and write
7FF77E063000
unkown
page read and write
21409503000
heap
page read and write
53329FE000
stack
page read and write
1EB0000
heap
page read and write
6E0000
heap
page read and write
21409F57000
heap
page read and write
19CCC484000
heap
page read and write
214079C0000
heap
page read and write
19CCE1E0000
remote allocation
page read and write
4E4C000
heap
page read and write
214098C0000
heap
page read and write
21409888000
heap
page read and write
7FF77E086000
unkown
page read and write
2140964B000
heap
page read and write
21409561000
heap
page read and write
21409F60000
heap
page read and write
21409756000
heap
page read and write
7FFDFAF96000
unkown
page read and write
19CCC570000
heap
page read and write
7FF77D6C0000
unkown
page readonly
53331FE000
stack
page read and write
7FFE13380000
unkown
page readonly
40C000
unkown
page readonly
4B0000
heap
page read and write
21407A00000
heap
page read and write
7FFDFAF8E000
unkown
page read and write
7FFDFB06D000
unkown
page readonly
19CCC471000
heap
page read and write
21409375000
heap
page read and write
7FF77E08B000
unkown
page readonly
43F9000
heap
page read and write
21409399000
heap
page read and write
2140951F000
heap
page read and write
214079D1000
heap
page read and write
4C7B000
heap
page read and write
7FFDF9D20000
unkown
page readonly
7FF6A231D000
unkown
page readonly
2E40000
heap
page read and write
4363000
heap
page read and write
2140970C000
heap
page read and write
214093A0000
heap
page read and write
21409799000
heap
page read and write
7FFDFAF90000
unkown
page write copy
53332FD000
stack
page read and write
4A0000
heap
page read and write
21409444000
heap
page read and write
2140793E000
heap
page read and write
21409568000
heap
page read and write
21407934000
heap
page read and write
21409826000
heap
page read and write
21407937000
heap
page read and write
21407972000
heap
page read and write
214093C9000
heap
page read and write
2140981D000
heap
page read and write
9ADF8F4000
stack
page read and write
21409392000
heap
page read and write
21409648000
heap
page read and write
7FFE003D0000
unkown
page write copy
214097A6000
heap
page read and write
21407906000
heap
page read and write
7FFDFAF3F000
unkown
page read and write
2D49000
heap
page read and write
4F15000
heap
page read and write
214097B2000
heap
page read and write
9ADFDFF000
stack
page read and write
2DBA000
heap
page read and write
7FF77E065000
unkown
page write copy
7FFDFA085000
unkown
page read and write
21409391000
heap
page read and write
7FFDF9D54000
unkown
page write copy
2140B7D0000
heap
page read and write
4911000
heap
page read and write
5E0000
heap
page read and write
7FFDFB0B0000
unkown
page readonly
21407939000
heap
page read and write
7FF6A12E0000
unkown
page readonly
4D0000
heap
page read and write
214096B9000
heap
page read and write
7FFDFA123000
unkown
page execute read
21409832000
heap
page read and write
2959000
heap
page read and write
2140A2E0000
remote allocation
page read and write
2140938B000
heap
page read and write
21409868000
heap
page read and write
21409647000
heap
page read and write
21409814000
heap
page read and write
9ADFAFE000
stack
page read and write
7FFDFAF37000
unkown
page read and write
19CCC47F000
heap
page read and write
9ADF3EB000
stack
page read and write
2140952F000
heap
page read and write
7FFDFAD62000
unkown
page readonly
7FFDFA538000
unkown
page execute read
53330FE000
stack
page read and write
21407969000
heap
page read and write
2140CF70000
trusted library allocation
page read and write
7FFE0EC62000
unkown
page readonly
7FFDFAE09000
unkown
page readonly
19CCC492000
heap
page read and write
7FFDFAFB4000
unkown
page readonly
19CCE1E0000
remote allocation
page read and write
21409568000
heap
page read and write
7FF77E08B000
unkown
page readonly
214079F7000
heap
page read and write
21407943000
heap
page read and write
7FFDF9C40000
unkown
page readonly
7FF6A210A000
unkown
page write copy
21409370000
heap
page read and write
21409888000
heap
page read and write
2140963F000
heap
page read and write
7FF77E05C000
unkown
page write copy
4134000
heap
page read and write
5E1D000
heap
page read and write
1FB8000
heap
page read and write
9ADF9FC000
stack
page read and write
7FFDF9D71000
unkown
page execute read
21409300000
heap
page read and write
4DED000
heap
page read and write
2140964A000
heap
page read and write
214098C1000
heap
page read and write
7FFDFAEF0000
unkown
page readonly
2140989A000
heap
page read and write
214096AF000
heap
page read and write
19CCC46D000
heap
page read and write
19CCC483000
heap
page read and write
21409683000
heap
page read and write
21409868000
heap
page read and write
7FFE1338D000
unkown
page readonly
7FFDFA0B1000
unkown
page execute read
2140988A000
heap
page read and write
2140938E000
heap
page read and write
2140939B000
heap
page read and write
7FF77D6C0000
unkown
page readonly
19CCC406000
heap
page read and write
7FFDFBA47000
unkown
page read and write
2CAE000
heap
page read and write
7FFE13392000
unkown
page readonly
7FFDFA166000
unkown
page execute read
214096AE000
heap
page read and write
21407968000
heap
page read and write
2966000
heap
page read and write
2140967E000
heap
page read and write
21407932000
heap
page read and write
21409390000
heap
page read and write
21409407000
heap
page read and write
2140989A000
heap
page read and write
7FFDFB9FB000
unkown
page write copy
19CCC47F000
heap
page read and write
7FFDFBA25000
unkown
page read and write
21409645000
heap
page read and write
2140796F000
heap
page read and write
214095AE000
heap
page read and write
2140963E000
heap
page read and write
28D1000
heap
page read and write
7FFDFB9F9000
unkown
page read and write
2140982D000
heap
page read and write
196000
stack
page read and write
21409820000
heap
page read and write
2140985A000
heap
page read and write
7FF6A2241000
unkown
page readonly
21409410000
heap
page read and write
2140985A000
heap
page read and write
7FF6A2413000
unkown
page readonly
7FFDFA0E7000
unkown
page execute read
7FF6A231D000
unkown
page readonly
4E31000
heap
page read and write
7FFDFAA2C000
unkown
page execute read
214079F7000
heap
page read and write
21409460000
heap
page read and write
704000
heap
page read and write
21409510000
heap
page read and write
7FFDF9D53000
unkown
page read and write
2D0A000
heap
page read and write
21409868000
heap
page read and write
9ADFCFE000
stack
page read and write
4F31000
heap
page read and write
214098BF000
heap
page read and write
7FFDFB04F000
unkown
page readonly
214097A6000
heap
page read and write
2140958F000
heap
page read and write
214098AB000
heap
page read and write
19CCE1F7000
heap
page read and write
214098D1000
heap
page read and write
21409799000
heap
page read and write
214094A0000
heap
page read and write
404C000
heap
page read and write
21409756000
heap
page read and write
214096AF000
heap
page read and write
2140796E000
heap
page read and write
4BAE000
heap
page read and write
2140793D000
heap
page read and write
7FFDFA08B000
unkown
page read and write
2140797F000
heap
page read and write
2140A2E0000
remote allocation
page read and write
7FFE0EBE1000
unkown
page execute read
2140797F000
heap
page read and write
7FF77E05C000
unkown
page read and write
7FF6A210A000
unkown
page read and write
7FFDFACCA000
unkown
page readonly
2140959F000
heap
page read and write
2933000
heap
page read and write
704000
heap
page read and write
214097B6000
heap
page read and write
214096AF000
heap
page read and write
4E23000
heap
page read and write
7FF6A12E0000
unkown
page readonly
7FF77DE65000
unkown
page readonly
7FFE003D3000
unkown
page readonly
214079E2000
heap
page read and write
21409600000
heap
page read and write
7FFDFA0D4000
unkown
page execute read
7FFDFB9F4000
unkown
page write copy
7FFE14635000
unkown
page readonly
401000
unkown
page execute read
21409896000
heap
page read and write
214093A0000
heap
page read and write
214095D6000
heap
page read and write
7FFE13381000
unkown
page execute read
21409896000
heap
page read and write
7FFDFB057000
unkown
page readonly
21409704000
heap
page read and write
21409845000
heap
page read and write
7FF6A1CE1000
unkown
page execute read
214097DB000
heap
page read and write
7FF6A1EBB000
unkown
page readonly
2140797E000
heap
page read and write
7FF77E082000
unkown
page read and write
21409893000
heap
page read and write
21409540000
heap
page read and write
19CCC320000
heap
page read and write
7FFDFB9F3000
unkown
page read and write
19CCC520000
heap
page read and write
3F6C000
heap
page read and write
19CCC47E000
heap
page read and write
7FFE14637000
unkown
page read and write
214079CF000
heap
page read and write
7FFE00341000
unkown
page execute read
3FB9000
heap
page read and write
7FF6A1CE1000
unkown
page execute read
214096CE000
heap
page read and write
2949000
heap
page read and write
4E08000
heap
page read and write
214079D4000
heap
page read and write
2140963A000
heap
page read and write
21409645000
heap
page read and write
681D000
heap
page read and write
214093BF000
heap
page read and write
2C3A000
heap
page read and write
338D000
heap
page read and write
2140969D000
heap
page read and write
2D79000
heap
page read and write
7FFE0EC5E000
unkown
page read and write
21409610000
heap
page read and write
7FFDF9D70000
unkown
page readonly
214079BE000
heap
page read and write
19CCC488000
heap
page read and write
214097B2000
heap
page read and write
43BB000
heap
page read and write
541D000
heap
page read and write
21407996000
heap
page read and write
21407959000
heap
page read and write
2140947E000
heap
page read and write
21409685000
heap
page read and write
214096BC000
heap
page read and write
2140794A000
heap
page read and write
41E000
unkown
page readonly
2C38000
heap
page read and write
2140794F000
heap
page read and write
6FEF000
heap
page read and write
21409889000
heap
page read and write
21409756000
heap
page read and write
214096B8000
heap
page read and write
2DAA000
heap
page read and write
7FFDF9FB9000
unkown
page readonly
4E67000
heap
page read and write
21407957000
heap
page read and write
700000
heap
page read and write
214079AC000
heap
page read and write
214079F1000
heap
page read and write
21409473000
heap
page read and write
5332BFF000
stack
page read and write
4DE2000
heap
page read and write
214079CF000
heap
page read and write
9AE00FF000
stack
page read and write
21409599000
heap
page read and write
214097B6000
heap
page read and write
19CCC458000
heap
page read and write
431000
unkown
page readonly
214096A0000
heap
page read and write
214098B4000
heap
page read and write
21409868000
heap
page read and write
21409470000
heap
page read and write
21409845000
heap
page read and write
21409824000
heap
page read and write
9ADF6FF000
stack
page read and write
4961000
heap
page read and write
214097B2000
heap
page read and write
2140947E000
heap
page read and write
7FFDFAF8B000
unkown
page write copy
4F51000
heap
page read and write
7FFDFBA97000
unkown
page readonly
214096F2000
heap
page read and write
214097B6000
heap
page read and write
214079FA000
heap
page read and write
214097B6000
heap
page read and write
21409861000
heap
page read and write
21409635000
heap
page read and write
3F80000
heap
page read and write
7FF6A2241000
unkown
page readonly
19CCE1E0000
remote allocation
page read and write
19CCC40C000
heap
page read and write
21409381000
heap
page read and write
2140938E000
heap
page read and write
19CCC44D000
heap
page read and write
21409861000
heap
page read and write
2140982B000
heap
page read and write
53328FD000
stack
page read and write
408000
unkown
page readonly
21407934000
heap
page read and write
21407973000
heap
page read and write
7FF77DE65000
unkown
page readonly
214096AD000
heap
page read and write
21409444000
heap
page read and write
2140965B000
heap
page read and write
21407937000
heap
page read and write
214097AA000
heap
page read and write
7FFE0EC3F000
unkown
page readonly
5332CFE000
stack
page read and write
2140798B000
heap
page read and write
214097EE000
heap
page read and write
21409812000
heap
page read and write
7FFDFBA11000
unkown
page read and write
4E3C000
heap
page read and write
3FFE000
heap
page read and write
21407995000
heap
page read and write
21407937000
heap
page read and write
21407942000
heap
page read and write
7FFDFAF9B000
unkown
page read and write
4E1B000
heap
page read and write
2140A14E000
heap
page read and write
7FFDFA111000
unkown
page execute read
19CCC452000
heap
page read and write
7FFDF9D55000
unkown
page read and write
400000
unkown
page readonly
214093A2000
heap
page read and write
470000
unkown
page readonly
21409861000
heap
page read and write
7FFDFA47E000
unkown
page execute read
7FFDFB08E000
unkown
page readonly
4008000
heap
page read and write
21409757000
heap
page read and write
7FFDFAF09000
unkown
page read and write
214093A2000
heap
page read and write
431000
unkown
page readonly
7FFDFA24F000
unkown
page execute read
2140938E000
heap
page read and write
2140797B000
heap
page read and write
7FF77E116000
unkown
page readonly
2140963B000
heap
page read and write
40C000
unkown
page readonly
7FFE14631000
unkown
page execute read
214096A3000
heap
page read and write
7FFDFB0B1000
unkown
page execute read
7FFE0EBE0000
unkown
page readonly
214079AA000
heap
page read and write
296D000
heap
page read and write
214079E1000
heap
page read and write
2140970B000
heap
page read and write
7FF6A212B000
unkown
page write copy
470000
unkown
page readonly
7FFE00392000
unkown
page readonly
2140985A000
heap
page read and write
2140953F000
heap
page read and write
9ADF8ED000
stack
page read and write
7FFE003D9000
unkown
page readonly
21407990000
heap
page read and write
3462000
heap
page read and write
3FF6000
heap
page read and write
There are 525 hidden memdumps, click here to show them.