IOC Report
http://amtso.eicar.org/PotentiallyUnwanted.exe

loading gif

Files

File Path
Type
Category
Malicious
C:\Users\user\Downloads\0ef1f9d5-2a2c-4596-ae0d-720967c37bbd.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Downloads\PotentiallyUnwanted.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\Downloads\Unconfirmed 953330.crdownload
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
Chrome Cache Entry: 78
PE32 executable (GUI) Intel 80386, for MS Windows
downloaded
malicious
C:\Users\user\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx
data
dropped
C:\Users\user\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\D3DSCache\e8010882af4f153f\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val
Matlab v4 mat-file (little endian) (, numeric, rows 0, columns 16, imaginary
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 31 17:36:46 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 31 17:36:46 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Fri Oct 6 08:54:41 2023, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 31 17:36:46 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 31 17:36:46 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 31 17:36:46 2024, atime=Mon Oct 2 20:46:57 2023, length=1210144, window=hide
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized "about:blank"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2076 --field-trial-handle=1996,i,9677582239789433466,1390415878745248934,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" "http://amtso.eicar.org/PotentiallyUnwanted.exe"
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilReadIcon --lang=en-US --service-sandbox-type=icon_reader --mojo-platform-channel-handle=5512 --field-trial-handle=1996,i,9677582239789433466,1390415878745248934,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Users\user\Downloads\PotentiallyUnwanted.exe
"C:\Users\user\Downloads\PotentiallyUnwanted.exe"
C:\Windows\System32\Taskmgr.exe
"C:\Windows\system32\taskmgr.exe" /0
C:\Windows\System32\Taskmgr.exe
"C:\Windows\system32\taskmgr.exe" /0

URLs

Name
IP
Malicious
http://amtso.eicar.org/PotentiallyUnwanted.exe
malicious
https://amtso.eicar.org/PotentiallyUnwanted.exe
81.7.7.163
http://www.amtso.org/feature-settings-check.html
unknown

Domains

Name
IP
Malicious
www.google.com
142.250.185.196
amtso.eicar.org
81.7.7.163

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
142.250.185.196
www.google.com
United States
192.168.2.17
unknown
unknown
81.7.7.163
amtso.eicar.org
Germany

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\TaskManager
Preferences
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\TaskManager
Preferences

Memdumps

Base Address
Regiontype
Protect
Malicious
2282DF25000
heap
page read and write
2282DDD6000
heap
page read and write
22829BEA000
heap
page read and write
2282DEF7000
heap
page read and write
2282DDE3000
heap
page read and write
22829BFB000
heap
page read and write
2282E3E4000
heap
page read and write
2282DEC9000
heap
page read and write
22829BA6000
heap
page read and write
2282DCAD000
heap
page read and write
2282DE5E000
heap
page read and write
2282DD93000
heap
page read and write
22829BF1000
heap
page read and write
2282E0A4000
heap
page read and write
2282DE01000
heap
page read and write
2282DDC1000
heap
page read and write
2282DE48000
heap
page read and write
2282DE9D000
heap
page read and write
A09000
unkown
page write copy
2282DF29000
heap
page read and write
22829BDE000
heap
page read and write
2282DC3D000
heap
page read and write
2282DE9B000
heap
page read and write
2282DD5B000
heap
page read and write
22829C1D000
heap
page read and write
2282DF06000
heap
page read and write
2282DF0E000
heap
page read and write
2282E03B000
heap
page read and write
2282DD59000
heap
page read and write
2282DECD000
heap
page read and write
2282DC3D000
heap
page read and write
869000
stack
page read and write
2282DDCE000
heap
page read and write
2282DCA6000
heap
page read and write
2282E031000
heap
page read and write
2282DC59000
heap
page read and write
2282DDFF000
heap
page read and write
2282DE58000
heap
page read and write
2282DCDA000
heap
page read and write
2282DF28000
heap
page read and write
2282DC86000
heap
page read and write
2950000
heap
page read and write
2282DCCA000
heap
page read and write
2282E03F000
heap
page read and write
2282DEA6000
heap
page read and write
2282DEC1000
heap
page read and write
2282DF28000
heap
page read and write
2282DE3B000
heap
page read and write
2282DC9F000
heap
page read and write
B7E68AB000
stack
page read and write
2282E006000
heap
page read and write
2282DCA7000
heap
page read and write
2282E146000
heap
page read and write
2282DCDC000
heap
page read and write
2282E06E000
heap
page read and write
22829BC7000
heap
page read and write
2282DD4A000
heap
page read and write
2282DF01000
heap
page read and write
B7E70FE000
stack
page read and write
2282B5B0000
heap
page read and write
2282E036000
heap
page read and write
2282DBED000
heap
page read and write
2282DC8E000
heap
page read and write
22829AF0000
heap
page read and write
2282E03A000
heap
page read and write
22829B70000
heap
page read and write
2B5F000
stack
page read and write
2282E07C000
heap
page read and write
B7E747F000
stack
page read and write
2282DC41000
heap
page read and write
2282DC9F000
heap
page read and write
2282E097000
heap
page read and write
2282E043000
heap
page read and write
2282DC0D000
heap
page read and write
2282E031000
heap
page read and write
2282DE29000
heap
page read and write
2282DD6B000
heap
page read and write
2282DEA8000
heap
page read and write
22829C1D000
heap
page read and write
2282DC83000
heap
page read and write
22829C2E000
heap
page read and write
2282DE34000
heap
page read and write
2282DE28000
heap
page read and write
2282E085000
heap
page read and write
2282DE0D000
heap
page read and write
2282E134000
heap
page read and write
2282DEF1000
heap
page read and write
22829CC0000
heap
page read and write
2282DD37000
heap
page read and write
2282DE79000
heap
page read and write
2282DFF1000
heap
page read and write
2282E0E2000
heap
page read and write
2282DFFD000
heap
page read and write
2282DD81000
heap
page read and write
2282E02D000
heap
page read and write
2282E027000
heap
page read and write
2282DDCB000
heap
page read and write
2282DFFF000
heap
page read and write
2282DEA1000
heap
page read and write
2282DC6B000
heap
page read and write
C08000
heap
page read and write
27A4000
heap
page read and write
22829BC4000
heap
page read and write
2282E072000
heap
page read and write
2282DC88000
heap
page read and write
2282DE5E000
heap
page read and write
22829BE3000
heap
page read and write
2282DEAD000
heap
page read and write
22829C00000
heap
page read and write
2282DFF2000
heap
page read and write
BFF000
heap
page read and write
2282E099000
heap
page read and write
22829A10000
heap
page read and write
2282DD7C000
heap
page read and write
2282DC6C000
heap
page read and write
2282DCD1000
heap
page read and write
2282DC31000
heap
page read and write
2282DF28000
heap
page read and write
2282E096000
heap
page read and write
2282B590000
trusted library allocation
page read and write
2282DC41000
heap
page read and write
2282DEBA000
heap
page read and write
2282DF2C000
heap
page read and write
2282E03F000
heap
page read and write
2282E075000
heap
page read and write
2282DEC9000
heap
page read and write
2282DEAD000
heap
page read and write
2282E03E000
heap
page read and write
2282E010000
heap
page read and write
2282DE26000
heap
page read and write
2282DF28000
heap
page read and write
2282DC1D000
heap
page read and write
2282DF90000
unkown
page readonly
22829C15000
heap
page read and write
2282DCAC000
heap
page read and write
2282DC15000
heap
page read and write
2282DE6D000
heap
page read and write
2282DF03000
heap
page read and write
2282DE31000
heap
page read and write
2282E12B000
heap
page read and write
22829BDB000
heap
page read and write
2282E079000
heap
page read and write
2282DEBE000
heap
page read and write
C05000
heap
page read and write
2A5F000
stack
page read and write
2282DD38000
heap
page read and write
2282DC82000
heap
page read and write
2282DDBF000
heap
page read and write
2282DEBA000
heap
page read and write
2282DEAB000
heap
page read and write
2282DF0D000
heap
page read and write
22829BEC000
heap
page read and write
2282E036000
heap
page read and write
2282E090000
heap
page read and write
2282DF28000
heap
page read and write
2282E04F000
heap
page read and write
2282D250000
trusted library allocation
page read and write
22829BF4000
heap
page read and write
2282DE97000
heap
page read and write
2282E017000
heap
page read and write
2282E027000
heap
page read and write
2282DDF5000
heap
page read and write
2282DE06000
heap
page read and write
2282DE46000
heap
page read and write
2282E09C000
heap
page read and write
2282DD3F000
heap
page read and write
2282DEF5000
heap
page read and write
2282E079000
heap
page read and write
2282E089000
heap
page read and write
22829BEA000
heap
page read and write
B7E69AD000
stack
page read and write
2282DC15000
heap
page read and write
2282E039000
heap
page read and write
C0C000
heap
page read and write
2282DD66000
heap
page read and write
2282DD7A000
heap
page read and write
2282DD7C000
heap
page read and write
2282DDE2000
heap
page read and write
22829BF4000
heap
page read and write
2282DFF2000
heap
page read and write
2282DD46000
heap
page read and write
22829C11000
heap
page read and write
2282DE38000
heap
page read and write
22829BF0000
heap
page read and write
22829C61000
heap
page read and write
2282DF0F000
heap
page read and write
2282E014000
heap
page read and write
A0B000
unkown
page readonly
2282E019000
heap
page read and write
2282DFE1000
heap
page read and write
2282DE11000
heap
page read and write
22829BBF000
heap
page read and write
22829C67000
heap
page read and write
22829B9E000
heap
page read and write
22829C6B000
heap
page read and write
2282DC75000
heap
page read and write
2282DFFF000
heap
page read and write
2282E06E000
heap
page read and write
2282DD46000
heap
page read and write
22829D25000
heap
page read and write
2282DE69000
heap
page read and write
2282DC73000
heap
page read and write
2282E099000
heap
page read and write
2282DE97000
heap
page read and write
2282DE80000
heap
page read and write
28EE000
stack
page read and write
2282DCB9000
heap
page read and write
22829C69000
heap
page read and write
2282DC6B000
heap
page read and write
22829D2B000
heap
page read and write
2282DFEE000
heap
page read and write
2282DFEE000
heap
page read and write
2282DECD000
heap
page read and write
2282DE5E000
heap
page read and write
2282E000000
heap
page read and write
2282DFF8000
heap
page read and write
2282E074000
heap
page read and write
2282DD61000
heap
page read and write
22829BBD000
heap
page read and write
2790000
heap
page read and write
2282DCA9000
heap
page read and write
2282DDEC000
heap
page read and write
22829BE0000
heap
page read and write
2282DE9E000
heap
page read and write
2282DF2E000
heap
page read and write
2282E0F0000
heap
page read and write
28F5000
heap
page read and write
2282DEBF000
heap
page read and write
2282DE09000
heap
page read and write
9E0000
heap
page read and write
2282DC7B000
heap
page read and write
2282DFE0000
heap
page read and write
22829BEA000
heap
page read and write
2282DEF1000
heap
page read and write
2282E118000
heap
page read and write
2282E043000
heap
page read and write
22829C26000
heap
page read and write
2282E083000
heap
page read and write
2282DD74000
heap
page read and write
BE0000
heap
page read and write
22829C1A000
heap
page read and write
22829BFD000
heap
page read and write
2282DDFF000
heap
page read and write
2282DEA5000
heap
page read and write
2282E033000
heap
page read and write
2282DCC6000
heap
page read and write
2282DF0F000
heap
page read and write
2282DDFC000
heap
page read and write
2282DD79000
heap
page read and write
C08000
heap
page read and write
2282DF28000
heap
page read and write
28F0000
heap
page read and write
2282DCC2000
heap
page read and write
2282E0DE000
heap
page read and write
2282DEB0000
heap
page read and write
2282DD48000
heap
page read and write
2282DBF0000
heap
page read and write
2BFE000
stack
page read and write
2282DD38000
heap
page read and write
2282DE1C000
heap
page read and write
2282E03E000
heap
page read and write
2282DD64000
heap
page read and write
2282E044000
heap
page read and write
2282E02A000
heap
page read and write
2282E025000
heap
page read and write
22829BD5000
heap
page read and write
2282E054000
heap
page read and write
2282DF0E000
heap
page read and write
2282DE99000
heap
page read and write
2282DC36000
heap
page read and write
2282E000000
heap
page read and write
2282DE0A000
heap
page read and write
22829C24000
heap
page read and write
22829C15000
heap
page read and write
2282DE30000
heap
page read and write
22829BEA000
heap
page read and write
2282B5B3000
heap
page read and write
2282DEB4000
heap
page read and write
2282E088000
heap
page read and write
2282DFEC000
heap
page read and write
22829BFD000
heap
page read and write
2282DEEF000
heap
page read and write
2282DD72000
heap
page read and write
22829BA6000
heap
page read and write
2282E043000
heap
page read and write
22829C0F000
heap
page read and write
2282E093000
heap
page read and write
2282DD69000
heap
page read and write
2282DE7E000
heap
page read and write
2282E0A4000
heap
page read and write
2282DEF7000
heap
page read and write
2282DCC2000
heap
page read and write
2282DDA7000
heap
page read and write
B7E692D000
stack
page read and write
22829C05000
heap
page read and write
22829BC2000
heap
page read and write
2282E099000
heap
page read and write
2282DE44000
heap
page read and write
2282DCA8000
heap
page read and write
22829C11000
heap
page read and write
2282DE9B000
heap
page read and write
2282DCBE000
heap
page read and write
2282DF03000
heap
page read and write
2282E027000
heap
page read and write
22829BDD000
heap
page read and write
2282DF2E000
heap
page read and write
22829B20000
heap
page read and write
2282DCBE000
heap
page read and write
293E000
stack
page read and write
2282DD3B000
heap
page read and write
2282DD5F000
heap
page read and write
2282DC8B000
heap
page read and write
2282DE77000
heap
page read and write
22829C17000
heap
page read and write
2282DC75000
heap
page read and write
2282DE65000
heap
page read and write
2282DE31000
heap
page read and write
2282DFEC000
heap
page read and write
22829BF1000
heap
page read and write
2CFF000
stack
page read and write
2282DE1C000
heap
page read and write
2282E036000
heap
page read and write
2282DEFD000
heap
page read and write
2282DD51000
heap
page read and write
2282DE04000
heap
page read and write
2282E010000
heap
page read and write
2780000
heap
page read and write
2282DE82000
heap
page read and write
2282DE0D000
heap
page read and write
2282E028000
heap
page read and write
2282DFF6000
heap
page read and write
B7E6C7E000
stack
page read and write
2282DCBC000
heap
page read and write
2282E031000
heap
page read and write
22829BB4000
heap
page read and write
2282DC22000
heap
page read and write
2282DCA2000
heap
page read and write
2282E017000
heap
page read and write
2282E027000
heap
page read and write
2282E092000
heap
page read and write
2282DD85000
heap
page read and write
2282DD7C000
heap
page read and write
2282E096000
heap
page read and write
2282DCDE000
heap
page read and write
2282E00F000
heap
page read and write
2282DF0D000
heap
page read and write
2282DCA1000
heap
page read and write
2282DE4F000
heap
page read and write
2282E092000
heap
page read and write
22829C2A000
heap
page read and write
2282DD6D000
heap
page read and write
2282DDB7000
heap
page read and write
2282DFFF000
heap
page read and write
B7E6E7B000
stack
page read and write
2282E070000
heap
page read and write
2282DE46000
heap
page read and write
2282DE14000
heap
page read and write
2282E043000
heap
page read and write
2282E043000
heap
page read and write
2282DC11000
heap
page read and write
2282E029000
heap
page read and write
22829BB9000
heap
page read and write
2282DCDC000
heap
page read and write
2282DC7B000
heap
page read and write
2282DDC9000
heap
page read and write
2282DEC9000
heap
page read and write
22829BE8000
heap
page read and write
22829C60000
heap
page read and write
96C000
stack
page read and write
A00000
unkown
page readonly
2282DDF3000
heap
page read and write
2282DFF1000
heap
page read and write
22829BEE000
heap
page read and write
2282DCB6000
heap
page read and write
2282E13D000
heap
page read and write
2282E088000
heap
page read and write
2282DBE6000
heap
page read and write
2282DCC8000
heap
page read and write
2282E08D000
heap
page read and write
2282DF05000
heap
page read and write
2282DBE0000
heap
page read and write
2282DCD7000
heap
page read and write
22829BC5000
heap
page read and write
2282E080000
heap
page read and write
2282DE58000
heap
page read and write
2282DE29000
heap
page read and write
2282DFE9000
heap
page read and write
2282DCAF000
heap
page read and write
22829C12000
heap
page read and write
2282E003000
heap
page read and write
2282DFFF000
heap
page read and write
A09000
unkown
page read and write
2282DDC5000
heap
page read and write
2282DC9F000
heap
page read and write
2282DCC2000
heap
page read and write
22829C1B000
heap
page read and write
2282DF0A000
heap
page read and write
2282E0DC000
heap
page read and write
2282DE40000
heap
page read and write
A70000
heap
page read and write
2282E0E9000
heap
page read and write
2282DF0F000
heap
page read and write
2282DE9B000
heap
page read and write
2282DC09000
heap
page read and write
2282DF03000
heap
page read and write
C0D000
heap
page read and write
2282DE65000
heap
page read and write
2282DA50000
heap
page read and write
2282DDCE000
heap
page read and write
2282DE25000
heap
page read and write
2282DDAB000
heap
page read and write
22829C0E000
heap
page read and write
22829BF9000
heap
page read and write
2282DC0D000
heap
page read and write
2282DDB7000
heap
page read and write
22829C00000
heap
page read and write
22829C0C000
heap
page read and write
2282DDB2000
heap
page read and write
2282E089000
heap
page read and write
2282DC55000
heap
page read and write
2282E04A000
heap
page read and write
2282E0AE000
heap
page read and write
2282DE7C000
heap
page read and write
2282E06E000
heap
page read and write
22829BF1000
heap
page read and write
2282E036000
heap
page read and write
2282DD7C000
heap
page read and write
2282DEB4000
heap
page read and write
2282E0EE000
heap
page read and write
2282DE65000
heap
page read and write
2282E0E3000
heap
page read and write
2282DF2E000
heap
page read and write
2282DE7C000
heap
page read and write
2282DD5B000
heap
page read and write
2282DD4C000
heap
page read and write
2282DE04000
heap
page read and write
22829BFB000
heap
page read and write
2282E044000
heap
page read and write
2282DDA7000
heap
page read and write
2282DD44000
heap
page read and write
2282E0F0000
heap
page read and write
2282E01B000
heap
page read and write
2282DC20000
heap
page read and write
2282DC4B000
heap
page read and write
2282DCDB000
heap
page read and write
2282E028000
heap
page read and write
2282DE58000
heap
page read and write
2282E043000
heap
page read and write
22829BF9000
heap
page read and write
2282DDA7000
heap
page read and write
2D3E000
stack
page read and write
2282DEF5000
heap
page read and write
22829C12000
heap
page read and write
2282DCDD000
heap
page read and write
2282DC8E000
heap
page read and write
2282E004000
heap
page read and write
2282DBF2000
heap
page read and write
2282E054000
heap
page read and write
22829C03000
heap
page read and write
2282DE82000
heap
page read and write
2282DC2A000
heap
page read and write
2282DE1C000
heap
page read and write
2282DF03000
heap
page read and write
2282DE82000
heap
page read and write
2282DC41000
heap
page read and write
22829BAC000
heap
page read and write
2282E02C000
heap
page read and write
44E0000
trusted library allocation
page read and write
2282DC6F000
heap
page read and write
22829C2F000
heap
page read and write
A06000
unkown
page readonly
2282DF00000
heap
page read and write
2282DEAC000
heap
page read and write
2282DE1E000
heap
page read and write
2282DD44000
heap
page read and write
BEA000
heap
page read and write
A01000
unkown
page execute read
2282E018000
heap
page read and write
2282DE9B000
heap
page read and write
2282DDF6000
heap
page read and write
B7E6D79000
stack
page read and write
2282DE18000
heap
page read and write
22829C2B000
heap
page read and write
22829C1A000
heap
page read and write
2282E03E000
heap
page read and write
2282DF0E000
heap
page read and write
2282DDD6000
heap
page read and write
2282DDCE000
heap
page read and write
2282DF0C000
heap
page read and write
2282DC6C000
heap
page read and write
2282DDBC000
heap
page read and write
2282E090000
heap
page read and write
22829C26000
heap
page read and write
22829D20000
heap
page read and write
B7E707E000
stack
page read and write
2282E0B1000
heap
page read and write
2282DDCA000
heap
page read and write
2282DE26000
heap
page read and write
2282DC6F000
heap
page read and write
2282DD4A000
heap
page read and write
2282E0DD000
heap
page read and write
2282DE30000
heap
page read and write
2282DF23000
heap
page read and write
22829C1A000
heap
page read and write
2282E093000
heap
page read and write
2E3F000
stack
page read and write
2282DD81000
heap
page read and write
2282DC27000
heap
page read and write
2282DD7F000
heap
page read and write
2282DEA8000
heap
page read and write
2282DC63000
heap
page read and write
2282E099000
heap
page read and write
2282DD59000
heap
page read and write
28F9000
heap
page read and write
22829C27000
heap
page read and write
2282DD3F000
heap
page read and write
2282DDB2000
heap
page read and write
22829C03000
heap
page read and write
2282DCC8000
heap
page read and write
2282E147000
heap
page read and write
2282DF28000
heap
page read and write
22829BA9000
heap
page read and write
22829C00000
heap
page read and write
2282E00E000
heap
page read and write
2282DD4A000
heap
page read and write
2282DC3D000
heap
page read and write
22829C03000
heap
page read and write
2282DBEF000
heap
page read and write
22829BEE000
heap
page read and write
9D0000
heap
page read and write
22829C04000
heap
page read and write
BEE000
heap
page read and write
A06000
unkown
page readonly
2282DD30000
heap
page read and write
2282DE67000
heap
page read and write
2282DDBF000
heap
page read and write
2282DE67000
heap
page read and write
2282DE77000
heap
page read and write
2282DE18000
heap
page read and write
2282E043000
heap
page read and write
22829C17000
heap
page read and write
2282DFFF000
heap
page read and write
2282E043000
heap
page read and write
2282E00F000
heap
page read and write
27A0000
heap
page read and write
2282DFF8000
heap
page read and write
2282E0E8000
heap
page read and write
22829BB9000
heap
page read and write
2282DCC6000
heap
page read and write
2282DCB7000
heap
page read and write
22829BE6000
heap
page read and write
2282DDB7000
heap
page read and write
2282DF07000
heap
page read and write
2282DF25000
heap
page read and write
2282DFF2000
heap
page read and write
2282DC7C000
heap
page read and write
22829C1D000
heap
page read and write
2282DE21000
heap
page read and write
2282DCAC000
heap
page read and write
There are 549 hidden memdumps, click here to show them.