IOC Report
pf-setup-en.exe

loading gif

Files

File Path
Type
Category
Malicious
pf-setup-en.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
C:\Program Files (x86)\PhotoFiltre\License.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\PhotoFiltre\Masks\Brush.gif
GIF image data, version 89a, 200 x 240
dropped
C:\Program Files (x86)\PhotoFiltre\Masks\Bubbles.gif
GIF image data, version 89a, 200 x 250
dropped
C:\Program Files (x86)\PhotoFiltre\Masks\Camera.gif
GIF image data, version 89a, 200 x 250
dropped
C:\Program Files (x86)\PhotoFiltre\Masks\Chaos.gif
GIF image data, version 89a, 200 x 250
dropped
C:\Program Files (x86)\PhotoFiltre\Masks\Diffuse.gif
GIF image data, version 89a, 200 x 250
dropped
C:\Program Files (x86)\PhotoFiltre\Masks\Dilution.gif
GIF image data, version 89a, 200 x 250
dropped
C:\Program Files (x86)\PhotoFiltre\Masks\Ellipse.gif
GIF image data, version 89a, 200 x 250
dropped
C:\Program Files (x86)\PhotoFiltre\Masks\Flame.gif
GIF image data, version 89a, 200 x 240
dropped
C:\Program Files (x86)\PhotoFiltre\Masks\Fog.gif
GIF image data, version 89a, 200 x 250
dropped
C:\Program Files (x86)\PhotoFiltre\Masks\Ink.gif
GIF image data, version 89a, 200 x 250
dropped
C:\Program Files (x86)\PhotoFiltre\Masks\Keyhole.gif
GIF image data, version 89a, 200 x 250
dropped
C:\Program Files (x86)\PhotoFiltre\Masks\Lines.gif
GIF image data, version 89a, 200 x 250
dropped
C:\Program Files (x86)\PhotoFiltre\Masks\Pastels.gif
GIF image data, version 89a, 200 x 250
dropped
C:\Program Files (x86)\PhotoFiltre\Masks\Slide.gif
GIF image data, version 89a, 203 x 250
dropped
C:\Program Files (x86)\PhotoFiltre\Masks\Snowflake.gif
GIF image data, version 89a, 200 x 250
dropped
C:\Program Files (x86)\PhotoFiltre\Masks\Sponge.gif
GIF image data, version 89a, 200 x 250
dropped
C:\Program Files (x86)\PhotoFiltre\Masks\Spray.gif
GIF image data, version 89a, 200 x 250
dropped
C:\Program Files (x86)\PhotoFiltre\Masks\Star.gif
GIF image data, version 89a, 200 x 250
dropped
C:\Program Files (x86)\PhotoFiltre\Masks\Sun.gif
GIF image data, version 89a, 200 x 250
dropped
C:\Program Files (x86)\PhotoFiltre\Masks\Torn.gif
GIF image data, version 89a, 200 x 250
dropped
C:\Program Files (x86)\PhotoFiltre\Masks\Twirl.gif
GIF image data, version 89a, 200 x 250
dropped
C:\Program Files (x86)\PhotoFiltre\Masks\Watercolor.gif
GIF image data, version 89a, 200 x 250
dropped
C:\Program Files (x86)\PhotoFiltre\Masks\Wet.gif
GIF image data, version 89a, 200 x 250
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Canvas01.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Canvas02.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Canvas03.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Color01.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Color02.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Color03.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 128x128, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Fabric01.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Fabric02.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Fabric03.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Marble01.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Marble02.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Marble03.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Metal01.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Metal02.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Metal03.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Nature01.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Nature02.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Nature03.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Paper01.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Paper02.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 300x300, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Paper03.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Sandstone01.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Sandstone02.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Sandstone03.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Scanlines01.gif
GIF image data, version 87a, 200 x 200
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Scanlines02.gif
GIF image data, version 87a, 200 x 200
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Scanlines03.gif
GIF image data, version 87a, 200 x 200
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Wall01.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Wall02.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Wall03.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Wood01.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Wood02.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\Patterns\Wood03.jpg
JPEG image data, JFIF standard 1.01, aspect ratio, density 1x1, segment length 16, baseline, precision 8, 200x200, components 3
dropped
C:\Program Files (x86)\PhotoFiltre\PhotoFiltre.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\PhotoFiltre\PhotoFiltre.htm
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\PhotoFiltre\PhotoMasque.htm
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\PhotoFiltre\Plugins\Read-me.txt
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\PhotoFiltre\Selections\Arrow01.pfs
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\PhotoFiltre\Selections\Arrow02.pfs
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\PhotoFiltre\Selections\Arrow03.pfs
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\PhotoFiltre\Selections\Balloon01.pfs
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\PhotoFiltre\Selections\Balloon02.pfs
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\PhotoFiltre\Selections\Cross.pfs
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\PhotoFiltre\Selections\Hexagon.pfs
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\PhotoFiltre\Selections\RightAngledTriangle.pfs
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\PhotoFiltre\Selections\Star01.pfs
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\PhotoFiltre\Selections\Star02.pfs
ASCII text, with CRLF line terminators
dropped
C:\Program Files (x86)\PhotoFiltre\TranslationEN.plg
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\PhotoFiltre\Uninst.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
C:\Users\user\AppData\Local\Temp\nshFFC0.tmp\AskInstallChecker.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nshFFC0.tmp\InstallOptions.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nshFFC0.tmp\StartMenu.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nshFFC0.tmp\ioSpecial.ini
Generic INItialization configuration [Field 1]
dropped
C:\Users\user\AppData\Local\Temp\nshFFC0.tmp\modern-wizard.bmp
PC bitmap, Windows 3.x format, 164 x 314 x 24, image size 154488, resolution 2834 x 2834 px/m, cbSize 154542, bits offset 54
dropped
C:\Users\user\AppData\Local\Temp\nshFFC0.tmp\nsDialogs.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\PhotoFiltre\PhotoFiltre Information.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Nov 12 08:41:08 2009, mtime=Mon Nov 25 09:33:16 2024, atime=Thu Nov 12 08:41:08 2009, length=31567, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\PhotoFiltre\PhotoFiltre.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Tue Jun 29 12:47:42 2010, mtime=Mon Nov 25 09:33:16 2024, atime=Tue Jun 29 12:47:42 2010, length=2823168, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\PhotoFiltre\PhotoMasque Information.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Sun Oct 1 17:09:48 2006, mtime=Mon Nov 25 09:33:16 2024, atime=Sun Oct 1 17:09:48 2006, length=7270, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\PhotoFiltre\Uninstall PhotoFiltre.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Mon Nov 25 09:33:21 2024, mtime=Mon Nov 25 09:33:22 2024, atime=Mon Nov 25 09:33:22 2024, length=85657, window=hide
dropped
C:\Users\user\Desktop\PhotoFiltre.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Tue Jun 29 12:47:42 2010, mtime=Mon Nov 25 09:33:22 2024, atime=Tue Jun 29 12:47:42 2010, length=2823168, window=hide
dropped
There are 75 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\pf-setup-en.exe
"C:\Users\user\Desktop\pf-setup-en.exe"
malicious
C:\Users\user\AppData\Local\Temp\nshFFC0.tmp\AskInstallChecker.exe
"C:\Users\user\AppData\Local\Temp\nshFFC0.tmp\AskInstallChecker.exe" PTF
malicious
C:\Program Files (x86)\PhotoFiltre\PhotoFiltre.exe
"C:\Program Files (x86)\PhotoFiltre\PhotoFiltre.exe"

URLs

Name
IP
Malicious
http://sp.ask.com/en/docs/about/terms_of_service.shtml0
unknown
http://sp.ask.com/en/docs/about/privacy.shtml
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
http://websearch.ask.com/preinstall?client=ic&tb=%s&r=0&ipid=%s&npid=%s&iev=%d&ielu=%d&fflu=%d&iv=%s
unknown
http://websearch.ask.com/preinstall?client=ic&tb=PTF&r=0&ipid=&npid=PTF&iev=9&ielu=0&fflu=0&iv=&nv=1
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
http://img.apnanalytics.com/images/nocache/apn/tr.gif?ev=eichk&cb=&encb=&chk=invbr&ts=6pYIy&guid=
unknown
http://about.ask.com/en/docs/about/ask_eula.shtml
unknown
http://about.ask.com/en/docs/about/ask_eula.shtmlopen
unknown
http://www.photofiltre.comopenU
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://img.apnanalytics.com/images/nocache/apn/tr.gif?ev=eichk&cb=&encb=&chk=invbr&ts=6pYIy&guid=O
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://about.ask.com/en/docs/about/ask_eula.shtmlhttp://sp.ask.com/en/docs/about/privacy.shtmlopen
unknown
http://forum.photofiltre.com
unknown
http://img.apnanalytics.com/images/nocache/apn/tr.gif?ev=eichk&cb=%s&encb=%s&chk=
unknown
http://www.photofiltre.com
unknown
http://img.apnanalytics.com/images/nocache/apn/tr.gif?ev=eichk&cb=&encb=&chk=invbr&ts=6pYIy&guid=L
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://forum.photofiltre.comopen
unknown
There are 13 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
img.apnanalytics.com
34.117.224.112
websearch.ask.com
unknown

IPs

IP
Domain
Country
Malicious
34.117.224.112
img.apnanalytics.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\PhotoFiltre
NULL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PhotoFiltre
DisplayName
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\PhotoFiltre
UninstallString
HKEY_CURRENT_USER\SOFTWARE\PhotoFiltre
Start Menu Folder

Memdumps

Base Address
Regiontype
Protect
Malicious
2808000
heap
page read and write
2807000
heap
page read and write
79A000
heap
page read and write
73B000
heap
page read and write
796000
heap
page read and write
49E0000
trusted library allocation
page read and write
777000
heap
page read and write
784000
heap
page read and write
A01000
heap
page read and write
2F80000
heap
page read and write
31C0000
trusted library allocation
page read and write
2809000
heap
page read and write
2804000
heap
page read and write
34CD000
stack
page read and write
280A000
heap
page read and write
79A000
heap
page read and write
31C0000
trusted library allocation
page read and write
280A000
heap
page read and write
7B0000
heap
page read and write
920000
heap
page read and write
790000
heap
page read and write
796000
heap
page read and write
610000
unkown
page read and write
790000
heap
page read and write
790000
heap
page read and write
3500000
trusted library allocation
page read and write
51EF000
heap
page read and write
796000
heap
page read and write
79A000
heap
page read and write
784000
heap
page read and write
784000
heap
page read and write
79A000
heap
page read and write
3500000
trusted library allocation
page read and write
790000
heap
page read and write
31C0000
trusted library allocation
page read and write
790000
heap
page read and write
31C0000
trusted library allocation
page read and write
790000
heap
page read and write
3500000
trusted library allocation
page read and write
790000
heap
page read and write
32D0000
trusted library allocation
page read and write
790000
heap
page read and write
621000
unkown
page read and write
784000
heap
page read and write
3500000
trusted library allocation
page read and write
136C000
heap
page read and write
790000
heap
page read and write
280A000
heap
page read and write
790000
heap
page read and write
36CF000
stack
page read and write
796000
heap
page read and write
790000
heap
page read and write
2801000
heap
page read and write
2801000
heap
page read and write
784000
heap
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
33CF000
stack
page read and write
790000
heap
page read and write
7C2000
heap
page read and write
3500000
trusted library allocation
page read and write
790000
heap
page read and write
796000
heap
page read and write
2802000
heap
page read and write
2803000
heap
page read and write
400000
unkown
page readonly
79A000
heap
page read and write
79A000
heap
page read and write
790000
heap
page read and write
796000
heap
page read and write
A23000
heap
page read and write
796000
heap
page read and write
31C0000
trusted library allocation
page read and write
96000
stack
page read and write
31C0000
trusted library allocation
page read and write
79A000
heap
page read and write
784000
heap
page read and write
31C0000
trusted library allocation
page read and write
79A000
heap
page read and write
280D000
heap
page read and write
3500000
trusted library allocation
page read and write
79A000
heap
page read and write
79A000
heap
page read and write
784000
heap
page read and write
246E000
stack
page read and write
795000
heap
page read and write
784000
heap
page read and write
9FE000
heap
page read and write
790000
heap
page read and write
3500000
trusted library allocation
page read and write
407000
unkown
page readonly
31C0000
trusted library allocation
page read and write
2800000
heap
page read and write
796000
heap
page read and write
2CFF000
stack
page read and write
2808000
heap
page read and write
796000
heap
page read and write
784000
heap
page read and write
3500000
trusted library allocation
page read and write
773000
heap
page read and write
440000
heap
page read and write
31C0000
trusted library allocation
page read and write
5C1000
unkown
page execute read
79A000
heap
page read and write
400000
unkown
page readonly
3500000
trusted library allocation
page read and write
784000
heap
page read and write
3500000
trusted library allocation
page read and write
790000
heap
page read and write
796000
heap
page read and write
3500000
trusted library allocation
page read and write
280D000
heap
page read and write
38E0000
heap
page read and write
790000
heap
page read and write
3500000
trusted library allocation
page read and write
2805000
heap
page read and write
3500000
trusted library allocation
page read and write
79A000
heap
page read and write
5EA000
unkown
page write copy
610000
heap
page read and write
796000
heap
page read and write
51EF000
heap
page read and write
2D3E000
stack
page read and write
790000
heap
page read and write
79A000
heap
page read and write
790000
heap
page read and write
4B10000
direct allocation
page read and write
2801000
heap
page read and write
135D000
heap
page read and write
3500000
trusted library allocation
page read and write
79A000
heap
page read and write
796000
heap
page read and write
31C0000
trusted library allocation
page read and write
60C000
unkown
page read and write
5FF000
unkown
page write copy
784000
heap
page read and write
796000
heap
page read and write
784000
heap
page read and write
792000
heap
page read and write
79A000
heap
page read and write
3500000
trusted library allocation
page read and write
5CE000
stack
page read and write
79A000
heap
page read and write
796000
heap
page read and write
796000
heap
page read and write
51EF000
heap
page read and write
923000
heap
page read and write
784000
heap
page read and write
3500000
trusted library allocation
page read and write
766000
heap
page read and write
796000
heap
page read and write
2804000
heap
page read and write
2A8C000
heap
page read and write
784000
heap
page read and write
11DE000
stack
page read and write
79A000
heap
page read and write
784000
heap
page read and write
790000
heap
page read and write
790000
heap
page read and write
796000
heap
page read and write
280B000
heap
page read and write
79A000
heap
page read and write
79A000
heap
page read and write
790000
heap
page read and write
1150000
heap
page read and write
3500000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
47C000
unkown
page execute read
784000
heap
page read and write
2805000
heap
page read and write
790000
heap
page read and write
10F4000
stack
page read and write
796000
heap
page read and write
790000
heap
page read and write
3140000
trusted library allocation
page read and write
A0F000
heap
page read and write
790000
heap
page read and write
3500000
trusted library allocation
page read and write
79A000
heap
page read and write
407000
unkown
page readonly
2A76000
heap
page read and write
430000
unkown
page readonly
3B50000
heap
page read and write
280A000
heap
page read and write
2802000
heap
page read and write
784000
heap
page read and write
79A000
heap
page read and write
3500000
trusted library allocation
page read and write
790000
heap
page read and write
31C0000
trusted library allocation
page read and write
784000
heap
page read and write
784000
heap
page read and write
790000
heap
page read and write
3A10000
heap
page read and write
790000
heap
page read and write
3500000
trusted library allocation
page read and write
763000
heap
page read and write
79A000
heap
page read and write
784000
heap
page read and write
790000
heap
page read and write
784000
heap
page read and write
31C0000
trusted library allocation
page read and write
784000
heap
page read and write
796000
heap
page read and write
133C000
heap
page read and write
790000
heap
page read and write
2410000
heap
page read and write
400000
unkown
page readonly
3500000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
606000
unkown
page read and write
79A000
heap
page read and write
79A000
heap
page read and write
784000
heap
page read and write
2803000
heap
page read and write
79A000
heap
page read and write
784000
heap
page read and write
2808000
heap
page read and write
6D0000
heap
page read and write
796000
heap
page read and write
79A000
heap
page read and write
3500000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
7C2000
heap
page read and write
77B000
heap
page read and write
3500000
trusted library allocation
page read and write
790000
heap
page read and write
3500000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
790000
heap
page read and write
9C0000
heap
page read and write
79A000
heap
page read and write
784000
heap
page read and write
796000
heap
page read and write
784000
heap
page read and write
38F0000
heap
page read and write
815000
heap
page read and write
2805000
heap
page read and write
31C0000
trusted library allocation
page read and write
796000
heap
page read and write
3500000
trusted library allocation
page read and write
790000
heap
page read and write
2807000
heap
page read and write
796000
heap
page read and write
784000
heap
page read and write
2D4F000
stack
page read and write
784000
heap
page read and write
784000
heap
page read and write
5C1000
unkown
page execute read
7E7000
heap
page read and write
3500000
trusted library allocation
page read and write
94000
stack
page read and write
37CF000
stack
page read and write
31C0000
trusted library allocation
page read and write
79A000
heap
page read and write
796000
heap
page read and write
7B1000
heap
page read and write
790000
heap
page read and write
3130000
heap
page read and write
51EF000
heap
page read and write
2807000
heap
page read and write
3500000
trusted library allocation
page read and write
790000
heap
page read and write
3500000
trusted library allocation
page read and write
2802000
heap
page read and write
79A000
heap
page read and write
3500000
trusted library allocation
page read and write
7B1000
heap
page read and write
79A000
heap
page read and write
796000
heap
page read and write
79A000
heap
page read and write
79A000
heap
page read and write
A02000
heap
page read and write
796000
heap
page read and write
3500000
trusted library allocation
page read and write
3280000
trusted library allocation
page read and write
790000
heap
page read and write
5C0000
unkown
page readonly
796000
heap
page read and write
31C0000
trusted library allocation
page read and write
1190000
heap
page read and write
3500000
trusted library allocation
page read and write
796000
heap
page read and write
3500000
trusted library allocation
page read and write
796000
heap
page read and write
31C0000
trusted library allocation
page read and write
790000
heap
page read and write
796000
heap
page read and write
57E000
stack
page read and write
7DA000
heap
page read and write
580000
heap
page read and write
3500000
trusted library allocation
page read and write
796000
heap
page read and write
2801000
heap
page read and write
784000
heap
page read and write
796000
heap
page read and write
784000
heap
page read and write
3500000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
280A000
heap
page read and write
796000
heap
page read and write
3500000
trusted library allocation
page read and write
5EA000
unkown
page read and write
784000
heap
page read and write
3500000
trusted library allocation
page read and write
79A000
heap
page read and write
31C0000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
618000
unkown
page read and write
5E3000
unkown
page readonly
79A000
heap
page read and write
796000
heap
page read and write
784000
heap
page read and write
3500000
trusted library allocation
page read and write
2460000
direct allocation
page read and write
79A000
heap
page read and write
A16000
heap
page read and write
2E3F000
stack
page read and write
79A000
heap
page read and write
280B000
heap
page read and write
784000
heap
page read and write
784000
heap
page read and write
796000
heap
page read and write
796000
heap
page read and write
790000
heap
page read and write
3500000
trusted library allocation
page read and write
5EE000
unkown
page readonly
79A000
heap
page read and write
31C0000
trusted library allocation
page read and write
796000
heap
page read and write
31C0000
trusted library allocation
page read and write
784000
heap
page read and write
784000
heap
page read and write
79A000
heap
page read and write
3500000
trusted library allocation
page read and write
3810000
heap
page read and write
5C0000
unkown
page readonly
790000
heap
page read and write
3500000
trusted library allocation
page read and write
280A000
heap
page read and write
602000
unkown
page write copy
31C0000
trusted library allocation
page read and write
79A000
heap
page read and write
51EF000
heap
page read and write
3280000
trusted library allocation
page read and write
79A000
heap
page read and write
3500000
trusted library allocation
page read and write
2804000
heap
page read and write
2806000
heap
page read and write
79A000
heap
page read and write
3500000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
A1C000
heap
page read and write
26AF000
stack
page read and write
79A000
heap
page read and write
790000
heap
page read and write
3500000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
79A000
heap
page read and write
784000
heap
page read and write
79A000
heap
page read and write
784000
heap
page read and write
79A000
heap
page read and write
79A000
heap
page read and write
81A000
heap
page read and write
796000
heap
page read and write
784000
heap
page read and write
2F0E000
stack
page read and write
796000
heap
page read and write
79A000
heap
page read and write
790000
heap
page read and write
3500000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
796000
heap
page read and write
79A000
heap
page read and write
79A000
heap
page read and write
796000
heap
page read and write
256F000
stack
page read and write
9DD000
heap
page read and write
622000
unkown
page write copy
79A000
heap
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
79A000
heap
page read and write
790000
heap
page read and write
790000
heap
page read and write
2809000
heap
page read and write
12EA000
heap
page read and write
796000
heap
page read and write
796000
heap
page read and write
79A000
heap
page read and write
7B4000
heap
page read and write
A02000
heap
page read and write
790000
heap
page read and write
784000
heap
page read and write
796000
heap
page read and write
3500000
trusted library allocation
page read and write
615000
heap
page read and write
31C0000
trusted library allocation
page read and write
790000
heap
page read and write
2F4E000
stack
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
2803000
heap
page read and write
3500000
trusted library allocation
page read and write
1140000
heap
page read and write
79A000
heap
page read and write
784000
heap
page read and write
5F0000
heap
page read and write
12E0000
heap
page read and write
784000
heap
page read and write
790000
heap
page read and write
2BFE000
stack
page read and write
796000
heap
page read and write
790000
heap
page read and write
58A000
heap
page read and write
401000
unkown
page execute read
280B000
heap
page read and write
2807000
heap
page read and write
790000
heap
page read and write
784000
heap
page read and write
3500000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
790000
heap
page read and write
80F000
stack
page read and write
79A000
heap
page read and write
3500000
trusted library allocation
page read and write
2806000
heap
page read and write
790000
heap
page read and write
8D0000
direct allocation
page execute and read and write
A1F000
heap
page read and write
51EF000
heap
page read and write
35CD000
stack
page read and write
31C0000
trusted library allocation
page read and write
77B000
heap
page read and write
790000
heap
page read and write
790000
heap
page read and write
31C0000
trusted library allocation
page read and write
796000
heap
page read and write
1371000
heap
page read and write
31C0000
trusted library allocation
page read and write
280E000
heap
page read and write
3500000
trusted library allocation
page read and write
784000
heap
page read and write
784000
heap
page read and write
784000
heap
page read and write
790000
heap
page read and write
3500000
trusted library allocation
page read and write
790000
heap
page read and write
784000
heap
page read and write
401000
unkown
page execute read
3500000
trusted library allocation
page read and write
280A000
heap
page read and write
784000
heap
page read and write
796000
heap
page read and write
A19000
heap
page read and write
67E000
unkown
page readonly
A21000
heap
page read and write
7B0000
heap
page read and write
784000
heap
page read and write
3500000
trusted library allocation
page read and write
796000
heap
page read and write
19B000
stack
page read and write
790000
heap
page read and write
3500000
trusted library allocation
page read and write
1377000
heap
page read and write
3500000
trusted library allocation
page read and write
796000
heap
page read and write
79A000
heap
page read and write
795000
heap
page read and write
12DE000
stack
page read and write
2A9F000
heap
page read and write
784000
heap
page read and write
3500000
trusted library allocation
page read and write
280D000
heap
page read and write
79A000
heap
page read and write
2802000
heap
page read and write
9CA000
heap
page read and write
31C0000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
790000
heap
page read and write
3500000
trusted library allocation
page read and write
796000
heap
page read and write
796000
heap
page read and write
74D000
heap
page read and write
31C0000
trusted library allocation
page read and write
784000
heap
page read and write
79A000
heap
page read and write
790000
heap
page read and write
280D000
heap
page read and write
608000
unkown
page read and write
784000
heap
page read and write
280D000
heap
page read and write
6A8000
unkown
page readonly
3500000
trusted library allocation
page read and write
790000
heap
page read and write
790000
heap
page read and write
7AF000
heap
page read and write
79A000
heap
page read and write
2ECE000
stack
page read and write
3500000
trusted library allocation
page read and write
790000
heap
page read and write
2D8D000
stack
page read and write
784000
heap
page read and write
2806000
heap
page read and write
784000
heap
page read and write
79A000
heap
page read and write
790000
heap
page read and write
724000
heap
page read and write
1196000
heap
page read and write
796000
heap
page read and write
790000
heap
page read and write
784000
heap
page read and write
31C0000
trusted library allocation
page read and write
79A000
heap
page read and write
31C0000
trusted library allocation
page read and write
5E3000
unkown
page readonly
784000
heap
page read and write
3500000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
280B000
heap
page read and write
784000
heap
page read and write
784000
heap
page read and write
784000
heap
page read and write
790000
heap
page read and write
627000
unkown
page readonly
9F8000
heap
page read and write
2807000
heap
page read and write
777000
heap
page read and write
784000
heap
page read and write
2801000
heap
page read and write
3500000
trusted library allocation
page read and write
280B000
heap
page read and write
6B3000
unkown
page readonly
3D30000
trusted library allocation
page read and write
71F000
stack
page read and write
79A000
heap
page read and write
3500000
trusted library allocation
page read and write
784000
heap
page read and write
2804000
heap
page read and write
790000
heap
page read and write
3280000
trusted library allocation
page read and write
520000
heap
page read and write
796000
heap
page read and write
730000
heap
page read and write
79A000
heap
page read and write
31C0000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
3BE0000
heap
page read and write
796000
heap
page read and write
3500000
trusted library allocation
page read and write
796000
heap
page read and write
31C0000
trusted library allocation
page read and write
12FC000
heap
page read and write
2804000
heap
page read and write
1210000
heap
page read and write
31C0000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
3BA0000
heap
page read and write
3500000
trusted library allocation
page read and write
280B000
heap
page read and write
8E0000
heap
page read and write
3500000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
79A000
heap
page read and write
796000
heap
page read and write
68C000
unkown
page readonly
DDB000
stack
page read and write
784000
heap
page read and write
3500000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
796000
heap
page read and write
31C0000
trusted library allocation
page read and write
790000
heap
page read and write
3500000
trusted library allocation
page read and write
2800000
heap
page read and write
796000
heap
page read and write
790000
heap
page read and write
4310000
trusted library allocation
page read and write
7AE000
heap
page read and write
790000
heap
page read and write
796000
heap
page read and write
31C0000
trusted library allocation
page read and write
796000
heap
page read and write
784000
heap
page read and write
790000
heap
page read and write
31C0000
trusted library allocation
page read and write
79A000
heap
page read and write
784000
heap
page read and write
280D000
heap
page read and write
79A000
heap
page read and write
8C0000
heap
page read and write
790000
heap
page read and write
773000
heap
page read and write
790000
heap
page read and write
790000
heap
page read and write
31C0000
trusted library allocation
page read and write
5EE000
unkown
page readonly
A18000
heap
page read and write
2804000
heap
page read and write
79A000
heap
page read and write
31C0000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
796000
heap
page read and write
3500000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
796000
heap
page read and write
2808000
heap
page read and write
3500000
trusted library allocation
page read and write
79A000
heap
page read and write
79A000
heap
page read and write
796000
heap
page read and write
129E000
stack
page read and write
810000
heap
page read and write
79A000
heap
page read and write
20CF000
stack
page read and write
421000
unkown
page read and write
3500000
trusted library allocation
page read and write
19A000
stack
page read and write
784000
heap
page read and write
790000
heap
page read and write
784000
heap
page read and write
2804000
heap
page read and write
2A84000
heap
page read and write
409000
unkown
page read and write
790000
heap
page read and write
3140000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
280E000
heap
page read and write
790000
heap
page read and write
720000
heap
page read and write
A1F000
heap
page read and write
31C0000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
796000
heap
page read and write
5DC000
unkown
page read and write
31C0000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
2805000
heap
page read and write
796000
heap
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
25AE000
stack
page read and write
790000
heap
page read and write
79A000
heap
page read and write
3500000
trusted library allocation
page read and write
79A000
heap
page read and write
784000
heap
page read and write
890000
heap
page read and write
2700000
heap
page read and write
280E000
heap
page read and write
125E000
stack
page read and write
7DE000
heap
page read and write
280C000
heap
page read and write
79A000
heap
page read and write
784000
heap
page read and write
3400000
heap
page read and write
79A000
heap
page read and write
31C0000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
784000
heap
page read and write
2803000
heap
page read and write
51EF000
heap
page read and write
784000
heap
page read and write
31C0000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
37E0000
heap
page read and write
2DC0000
heap
page read and write
135B000
heap
page read and write
784000
heap
page read and write
796000
heap
page read and write
3500000
trusted library allocation
page read and write
796000
heap
page read and write
2804000
heap
page read and write
5DC000
unkown
page write copy
796000
heap
page read and write
31C0000
trusted library allocation
page read and write
430000
unkown
page readonly
796000
heap
page read and write
796000
heap
page read and write
784000
heap
page read and write
401000
unkown
page execute read
31C0000
trusted library allocation
page read and write
3500000
trusted library allocation
page read and write
409000
unkown
page write copy
79A000
heap
page read and write
796000
heap
page read and write
429000
unkown
page read and write
1351000
heap
page read and write
2806000
heap
page read and write
784000
heap
page read and write
784000
heap
page read and write
796000
heap
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
790000
heap
page read and write
585000
heap
page read and write
796000
heap
page read and write
79A000
heap
page read and write
280D000
heap
page read and write
79A000
heap
page read and write
7A4000
heap
page read and write
790000
heap
page read and write
31C0000
trusted library allocation
page read and write
There are 705 hidden memdumps, click here to show them.