IOC Report
fLNzmBM9hR.exe

loading gif

Files

File Path
Type
Category
Malicious
fLNzmBM9hR.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmp7751.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\run.dat
ISO-8859 text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\dgKDUvhlvCiVpa.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\DNS Host\dnshost.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MSBuild.exe_f553dd681214908324f05d7ad9ebff8e6dc2a494_1623435c_b407573d-7935-418a-89b8-f36dbc0c1682\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4924.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4963.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC6F3.tmp.dmp
Mini DuMP crash report, 15 streams, Thu May 23 13:49:04 2024, 0x1205a4 type
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MSBuild.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dgKDUvhlvCiVpa.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\dnshost.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fLNzmBM9hR.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bxf515li.ghq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hz5jt5ps.pz5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oiyaziqw.sfh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qgufgmvk.ob1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp802A.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\catalog.dat
data
modified
C:\Users\user\AppData\Roaming\9E146BE9-C76A-4720-BCDB-53011B87BD06\storage.dat
data
dropped
C:\Users\user\AppData\Roaming\dgKDUvhlvCiVpa.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 14 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\fLNzmBM9hR.exe
"C:\Users\user\Desktop\fLNzmBM9hR.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\dgKDUvhlvCiVpa.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dgKDUvhlvCiVpa" /XML "C:\Users\user\AppData\Local\Temp\tmp7751.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Users\user\AppData\Roaming\dgKDUvhlvCiVpa.exe
C:\Users\user\AppData\Roaming\dgKDUvhlvCiVpa.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\dgKDUvhlvCiVpa" /XML "C:\Users\user\AppData\Local\Temp\tmp802A.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files (x86)\DNS Host\dnshost.exe
"C:\Program Files (x86)\DNS Host\dnshost.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7012 -s 1416
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
maxlogs.webhop.me
malicious
newsddawork.3utilities.com
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://upx.sf.net
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://google.com
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.monotype.
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
newsddawork.3utilities.com
104.243.242.165
malicious
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
104.243.242.165
newsddawork.3utilities.com
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run
DNS Host
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProgramId
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
FileId
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LowerCaseLongPath
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LongPathHash
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Name
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
OriginalFileName
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Publisher
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Version
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinFileVersion
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinaryType
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProductName
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProductVersion
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LinkDate
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinProductVersion
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
AppxPackageFullName
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
AppxPackageRelativeId
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Size
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Language
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
IsOsComponent
\REGISTRY\A\{64e6b72b-758c-efea-7e7f-78fb565db1a3}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3241000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3D2F000
trusted library allocation
page read and write
malicious
3DB0000
trusted library allocation
page read and write
malicious
3F09000
trusted library allocation
page read and write
malicious
6A90000
trusted library section
page read and write
malicious
2F01000
trusted library allocation
page read and write
malicious
7567000
heap
page read and write
6D50000
heap
page read and write
4F40000
heap
page read and write
17CC000
stack
page read and write
8BD8000
trusted library allocation
page read and write
385A000
trusted library allocation
page read and write
7F7000
stack
page read and write
5A80000
heap
page read and write
1430000
heap
page read and write
717F000
stack
page read and write
B15000
heap
page read and write
CAD000
trusted library allocation
page execute and read and write
62FE000
stack
page read and write
4F56000
trusted library allocation
page read and write
A54F000
stack
page read and write
30B6000
trusted library allocation
page read and write
DFD000
trusted library allocation
page execute and read and write
5480000
heap
page read and write
5F20000
trusted library section
page read and write
2AD0000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
770D000
stack
page read and write
12CE000
stack
page read and write
3BB1000
trusted library allocation
page read and write
9CA0000
heap
page read and write
E50000
trusted library allocation
page execute and read and write
5400000
heap
page read and write
F80000
heap
page read and write
42C1000
trusted library allocation
page read and write
B08000
heap
page read and write
3CF1000
trusted library allocation
page read and write
746E000
heap
page read and write
675C000
stack
page read and write
5CB0000
heap
page read and write
1145000
trusted library allocation
page read and write
2AD6000
trusted library allocation
page read and write
10AB000
stack
page read and write
2DC0000
trusted library allocation
page read and write
2F4F000
stack
page read and write
C20000
heap
page read and write
A2ED000
stack
page read and write
7E0000
heap
page read and write
7D0C000
stack
page read and write
57E0000
trusted library allocation
page execute and read and write
6860000
heap
page read and write
1256000
trusted library allocation
page execute and read and write
775F000
stack
page read and write
3100000
trusted library allocation
page read and write
F6E000
stack
page read and write
A8BE000
stack
page read and write
DB0000
heap
page read and write
CB3000
trusted library allocation
page read and write
F87000
trusted library allocation
page read and write
B81000
heap
page read and write
E01000
heap
page read and write
4543000
trusted library allocation
page read and write
5F1E000
stack
page read and write
171A000
trusted library allocation
page execute and read and write
D13000
heap
page read and write
5800000
trusted library allocation
page read and write
384E000
trusted library allocation
page read and write
15C6000
heap
page read and write
C30000
trusted library allocation
page read and write
5D5E000
stack
page read and write
5810000
heap
page execute and read and write
FF090000
trusted library allocation
page execute and read and write
5393000
heap
page read and write
685C000
stack
page read and write
5240000
heap
page execute and read and write
FD0000
trusted library allocation
page execute and read and write
759C000
heap
page read and write
6E30000
heap
page read and write
1018000
heap
page read and write
30B0000
trusted library allocation
page read and write
1560000
trusted library allocation
page read and write
30D1000
trusted library allocation
page read and write
51A0000
trusted library section
page readonly
2A71000
trusted library allocation
page read and write
16E0000
trusted library allocation
page read and write
3AF3000
trusted library allocation
page read and write
4A8D000
stack
page read and write
46CB000
trusted library allocation
page read and write
2F0E000
stack
page read and write
367C000
trusted library allocation
page read and write
5043000
heap
page read and write
D3E000
stack
page read and write
75B7000
heap
page read and write
E10000
heap
page read and write
29A4000
trusted library allocation
page read and write
2BFF000
unkown
page read and write
36CA000
trusted library allocation
page read and write
29FF000
stack
page read and write
15AE000
heap
page read and write
B00000
heap
page read and write
106F000
stack
page read and write
7760000
trusted library section
page read and write
4436000
trusted library allocation
page read and write
157D000
stack
page read and write
178E000
stack
page read and write
31B0000
heap
page read and write
5390000
heap
page read and write
35FC000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
640000
unkown
page readonly
A1CB000
stack
page read and write
CA3000
trusted library allocation
page execute and read and write
C62000
trusted library allocation
page read and write
2DDA000
trusted library allocation
page read and write
14DF000
stack
page read and write
5E5E000
stack
page read and write
4F91000
trusted library allocation
page read and write
51FE000
stack
page read and write
53D0000
heap
page read and write
4A90000
trusted library allocation
page execute and read and write
71C0000
trusted library allocation
page read and write
7720000
trusted library section
page read and write
2B42000
trusted library allocation
page read and write
1140000
trusted library allocation
page read and write
3716000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
3690000
trusted library allocation
page read and write
377E000
trusted library allocation
page read and write
C90000
heap
page read and write
FF7000
heap
page read and write
1580000
heap
page read and write
7710000
trusted library section
page read and write
32AD000
trusted library allocation
page read and write
B22000
heap
page read and write
1120000
trusted library allocation
page read and write
6AE0000
trusted library allocation
page read and write
6AF0000
heap
page read and write
6E0000
unkown
page readonly
1133000
trusted library allocation
page read and write
5200000
heap
page read and write
C10000
heap
page read and write
7D0000
heap
page read and write
43D1000
trusted library allocation
page read and write
36A0000
trusted library allocation
page read and write
1710000
trusted library allocation
page read and write
1100000
heap
page execute and read and write
4A40000
trusted library allocation
page read and write
D37000
heap
page read and write
5FFE000
stack
page read and write
2A00000
trusted library allocation
page read and write
65E1000
stack
page read and write
77C0000
trusted library allocation
page read and write
CB0000
trusted library allocation
page read and write
10F2000
trusted library allocation
page read and write
1807000
heap
page read and write
5361000
trusted library allocation
page read and write
A60000
heap
page read and write
5E9E000
stack
page read and write
720D000
stack
page read and write
E03000
trusted library allocation
page read and write
1520000
heap
page read and write
B37000
heap
page read and write
C40000
trusted library allocation
page read and write
D97000
heap
page read and write
30CE000
trusted library allocation
page read and write
5AC0000
heap
page read and write
34F4000
trusted library allocation
page read and write
1128000
trusted library allocation
page read and write
9DED000
stack
page read and write
147E000
stack
page read and write
363C000
trusted library allocation
page read and write
7E10000
trusted library allocation
page read and write
FE4000
trusted library allocation
page read and write
1230000
trusted library allocation
page read and write
3552000
trusted library allocation
page read and write
885E000
stack
page read and write
F30000
heap
page read and write
2DD5000
trusted library allocation
page read and write
3067000
heap
page read and write
A2F0000
heap
page read and write
FE0000
trusted library allocation
page read and write
3650000
trusted library allocation
page read and write
3E45000
trusted library allocation
page read and write
CBD000
trusted library allocation
page execute and read and write
2DD0000
trusted library allocation
page read and write
12D0000
heap
page read and write
4F60000
trusted library allocation
page execute and read and write
107F000
stack
page read and write
5AB0000
trusted library allocation
page execute and read and write
AB3D000
stack
page read and write
3774000
trusted library allocation
page read and write
2F86000
trusted library allocation
page read and write
5530000
heap
page read and write
C3D000
trusted library allocation
page execute and read and write
2B8F000
stack
page read and write
671F000
stack
page read and write
5372000
trusted library allocation
page read and write
3675000
trusted library allocation
page read and write
7F200000
trusted library allocation
page execute and read and write
547E000
stack
page read and write
55DE000
stack
page read and write
533D000
stack
page read and write
29F5000
trusted library allocation
page read and write
FE6000
trusted library allocation
page read and write
503C000
stack
page read and write
E3A000
stack
page read and write
1250000
trusted library allocation
page read and write
760C000
stack
page read and write
757E000
heap
page read and write
2F8E000
stack
page read and write
29BE000
trusted library allocation
page read and write
1435000
heap
page read and write
1700000
trusted library allocation
page read and write
2B1A000
trusted library allocation
page read and write
3BB9000
trusted library allocation
page read and write
2A20000
trusted library allocation
page read and write
29A0000
trusted library allocation
page read and write
C95000
heap
page read and write
30D6000
trusted library allocation
page read and write
3707000
trusted library allocation
page read and write
4EDB000
trusted library allocation
page read and write
1598000
heap
page read and write
7560000
heap
page read and write
E60000
trusted library allocation
page read and write
5340000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
6C4E000
stack
page read and write
3010000
heap
page read and write
4639000
trusted library allocation
page read and write
4F50000
trusted library section
page readonly
1540000
heap
page read and write
1262000
trusted library allocation
page read and write
2ACD000
stack
page read and write
CC0000
trusted library allocation
page read and write
65DE000
stack
page read and write
CD5000
heap
page read and write
79F0000
trusted library section
page read and write
A4EE000
stack
page read and write
3BDE000
trusted library allocation
page read and write
589E000
stack
page read and write
4ED0000
trusted library allocation
page read and write
AEE000
stack
page read and write
4FFD000
stack
page read and write
534B000
trusted library allocation
page read and write
C34000
trusted library allocation
page read and write
36B1000
trusted library allocation
page read and write
4A3E000
stack
page read and write
2A81000
trusted library allocation
page read and write
4B7B000
stack
page read and write
3130000
heap
page execute and read and write
5C50000
heap
page read and write
4EE0000
trusted library allocation
page read and write
172B000
trusted library allocation
page execute and read and write
4723000
trusted library allocation
page read and write
C5E000
stack
page read and write
17F4000
trusted library allocation
page read and write
A50000
heap
page read and write
7E0C000
stack
page read and write
F45000
heap
page read and write
323F000
stack
page read and write
1110000
trusted library allocation
page read and write
2BBE000
unkown
page read and write
10E6000
trusted library allocation
page read and write
44AD000
trusted library allocation
page read and write
54D5000
heap
page read and write
7B80000
trusted library allocation
page read and write
4FF3000
heap
page read and write
2840000
heap
page read and write
DA4000
heap
page read and write
77F0000
heap
page read and write
5366000
trusted library allocation
page read and write
2DCC000
trusted library allocation
page read and write
1150000
heap
page read and write
FE9000
stack
page read and write
5A90000
heap
page execute and read and write
6E2000
unkown
page readonly
3A09000
trusted library allocation
page read and write
1682000
heap
page read and write
3F01000
trusted library allocation
page read and write
2B40000
heap
page read and write
2A01000
trusted library allocation
page read and write
7A00000
trusted library section
page read and write
F38000
stack
page read and write
58DE000
stack
page read and write
5210000
heap
page execute and read and write
B2A000
heap
page read and write
C50000
trusted library allocation
page read and write
533E000
stack
page read and write
6B00000
heap
page read and write
C52000
trusted library allocation
page read and write
E17000
trusted library allocation
page execute and read and write
5811000
trusted library allocation
page read and write
A44E000
stack
page read and write
6AD0000
trusted library section
page read and write
B10000
heap
page read and write
54E0000
trusted library allocation
page read and write
CA0000
trusted library allocation
page read and write
CF0000
trusted library allocation
page read and write
C90000
heap
page read and write
7A30000
trusted library section
page read and write
51B0000
trusted library allocation
page execute and read and write
2DF0000
heap
page execute and read and write
734D000
stack
page read and write
13DE000
stack
page read and write
1722000
trusted library allocation
page read and write
4CAE000
stack
page read and write
5FA7000
heap
page read and write
2EFF000
stack
page read and write
2B1C000
trusted library allocation
page read and write
5510000
trusted library allocation
page execute and read and write
3756000
trusted library allocation
page read and write
4EC0000
heap
page read and write
299E000
stack
page read and write
151B000
stack
page read and write
E2B000
trusted library allocation
page execute and read and write
30F5000
trusted library allocation
page read and write
4A46000
trusted library allocation
page read and write
10C4000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
D6A000
heap
page read and write
305C000
trusted library allocation
page read and write
6A0D000
stack
page read and write
2B4E000
trusted library allocation
page read and write
6FA000
stack
page read and write
CC6000
trusted library allocation
page execute and read and write
4289000
trusted library allocation
page read and write
A72E000
stack
page read and write
3A57000
trusted library allocation
page read and write
373A000
trusted library allocation
page read and write
35DA000
trusted library allocation
page read and write
57C0000
heap
page read and write
77D0000
trusted library allocation
page execute and read and write
FF0000
heap
page read and write
17E0000
trusted library allocation
page execute and read and write
A9BE000
stack
page read and write
4EE0000
trusted library allocation
page execute and read and write
2A76000
trusted library allocation
page read and write
F80000
trusted library allocation
page read and write
6A4F000
unkown
page read and write
5E5E000
stack
page read and write
5420000
trusted library allocation
page execute and read and write
E8E000
stack
page read and write
1126000
trusted library allocation
page read and write
AC3E000
stack
page read and write
C4D000
trusted library allocation
page execute and read and write
2AF1000
trusted library allocation
page read and write
1740000
trusted library allocation
page read and write
1010000
heap
page read and write
4F11000
trusted library allocation
page read and write
10ED000
trusted library allocation
page read and write
7AC000
stack
page read and write
5AA0000
heap
page execute and read and write
E27000
trusted library allocation
page execute and read and write
35F5000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
30BB000
trusted library allocation
page read and write
15BA000
heap
page read and write
724C000
stack
page read and write
A02F000
stack
page read and write
2B9A000
trusted library allocation
page read and write
5040000
heap
page read and write
2A00000
heap
page read and write
7740000
trusted library allocation
page read and write
8E7F000
stack
page read and write
7BCC000
stack
page read and write
CD1000
heap
page read and write
748D000
stack
page read and write
1234000
trusted library allocation
page read and write
79F8000
trusted library section
page read and write
5710000
heap
page read and write
5D5E000
stack
page read and write
45E0000
trusted library allocation
page read and write
2A70000
heap
page read and write
10FE000
stack
page read and write
7B7D000
stack
page read and write
77E0000
trusted library section
page read and write
3060000
heap
page read and write
377C000
trusted library allocation
page read and write
4F54000
trusted library section
page readonly
A9FC000
stack
page read and write
A2CC000
stack
page read and write
5495000
heap
page read and write
591E000
stack
page read and write
B44000
heap
page read and write
1267000
trusted library allocation
page execute and read and write
D60000
trusted library allocation
page execute and read and write
E1A000
trusted library allocation
page execute and read and write
5560000
trusted library allocation
page read and write
124D000
trusted library allocation
page execute and read and write
123D000
trusted library allocation
page execute and read and write
16F3000
trusted library allocation
page execute and read and write
35F1000
trusted library allocation
page read and write
53F0000
heap
page read and write
5F60000
heap
page read and write
523D000
stack
page read and write
371F000
trusted library allocation
page read and write
7770000
trusted library section
page read and write
5C5E000
stack
page read and write
15F5000
heap
page read and write
7A28000
trusted library section
page read and write
36A5000
trusted library allocation
page read and write
CD7000
trusted library allocation
page execute and read and write
4F1B000
trusted library allocation
page read and write
535E000
trusted library allocation
page read and write
525E000
stack
page read and write
55AD000
stack
page read and write
5344000
trusted library allocation
page read and write
DF3000
trusted library allocation
page execute and read and write
AF8000
stack
page read and write
36FC000
trusted library allocation
page read and write
5500000
trusted library allocation
page read and write
2D2D000
trusted library allocation
page read and write
2FB8000
trusted library allocation
page read and write
9F2E000
stack
page read and write
F0C000
stack
page read and write
12F5000
stack
page read and write
54D0000
heap
page read and write
31B8000
heap
page read and write
35EA000
trusted library allocation
page read and write
2B70000
heap
page read and write
CD4000
heap
page read and write
29C6000
trusted library allocation
page read and write
D70000
heap
page read and write
2A56000
trusted library allocation
page read and write
A30D000
stack
page read and write
DB1000
heap
page read and write
1049000
heap
page read and write
46B9000
trusted library allocation
page read and write
F7F000
stack
page read and write
364C000
trusted library allocation
page read and write
10C0000
trusted library allocation
page read and write
75BF000
heap
page read and write
7589000
heap
page read and write
3550000
trusted library allocation
page read and write
1100000
trusted library allocation
page read and write
DAF000
heap
page read and write
3D71000
trusted library allocation
page read and write
7A7C000
stack
page read and write
30E2000
trusted library allocation
page read and write
52A0000
heap
page read and write
D8F000
heap
page read and write
125A000
trusted library allocation
page execute and read and write
CC6000
heap
page read and write
D7E000
heap
page read and write
DE0000
trusted library allocation
page read and write
3612000
trusted library allocation
page read and write
17F0000
trusted library allocation
page read and write
376A000
trusted library allocation
page read and write
AAFC000
stack
page read and write
6F53000
heap
page read and write
2A50000
heap
page execute and read and write
1280000
trusted library allocation
page read and write
36B9000
trusted library allocation
page read and write
4F00000
trusted library allocation
page read and write
7CCD000
stack
page read and write
7460000
heap
page read and write
D40000
heap
page read and write
C0D000
stack
page read and write
10FD000
stack
page read and write
5540000
trusted library allocation
page execute and read and write
4A48000
trusted library allocation
page read and write
71A0000
trusted library allocation
page read and write
16A0000
heap
page read and write
7082000
trusted library allocation
page read and write
3EB9000
trusted library allocation
page read and write
3A81000
trusted library allocation
page read and write
7750000
trusted library section
page read and write
2B3E000
stack
page read and write
1712000
trusted library allocation
page read and write
CA4000
trusted library allocation
page read and write
4321000
trusted library allocation
page read and write
103A000
heap
page read and write
F7E000
stack
page read and write
ECE000
stack
page read and write
3D51000
trusted library allocation
page read and write
F10000
trusted library allocation
page execute and read and write
AF7000
stack
page read and write
54F1000
trusted library allocation
page read and write
1727000
trusted library allocation
page execute and read and write
529E000
stack
page read and write
CDB000
trusted library allocation
page execute and read and write
10DE000
trusted library allocation
page read and write
5EDD000
stack
page read and write
60FE000
stack
page read and write
5520000
trusted library allocation
page read and write
E70000
heap
page read and write
4F40000
heap
page read and write
35C6000
trusted library allocation
page read and write
5780000
trusted library allocation
page read and write
7790000
trusted library section
page read and write
C56000
trusted library allocation
page execute and read and write
1564000
trusted library allocation
page read and write
738E000
stack
page read and write
1233000
trusted library allocation
page execute and read and write
2BAE000
stack
page read and write
2AA0000
heap
page read and write
C6E000
stack
page read and write
10E1000
trusted library allocation
page read and write
5BFE000
stack
page read and write
4508000
trusted library allocation
page read and write
5F5E000
stack
page read and write
77A0000
trusted library section
page read and write
C5A000
trusted library allocation
page execute and read and write
707E000
stack
page read and write
52F0000
trusted library allocation
page execute and read and write
6AB0000
trusted library allocation
page read and write
29CD000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
4FF0000
heap
page read and write
30DD000
trusted library allocation
page read and write
7060000
trusted library allocation
page read and write
104C000
heap
page read and write
536D000
trusted library allocation
page read and write
2FD0000
heap
page read and write
C6B000
trusted library allocation
page execute and read and write
6F71000
heap
page read and write
F85000
trusted library allocation
page read and write
4EF0000
trusted library allocation
page read and write
29E0000
trusted library allocation
page read and write
A62E000
stack
page read and write
6B4E000
stack
page read and write
17D7000
heap
page read and write
9EEE000
stack
page read and write
F40000
heap
page read and write
3618000
trusted library allocation
page read and write
1350000
heap
page read and write
C20000
trusted library allocation
page read and write
CB8000
heap
page read and write
FF2A0000
trusted library allocation
page execute and read and write
C67000
trusted library allocation
page execute and read and write
5490000
heap
page read and write
305F000
trusted library allocation
page read and write
4241000
trusted library allocation
page read and write
C33000
trusted library allocation
page execute and read and write
AAE000
stack
page read and write
3680000
trusted library allocation
page read and write
7A4E000
stack
page read and write
25DA000
stack
page read and write
CD0000
heap
page read and write
2B98000
trusted library allocation
page read and write
16F0000
trusted library allocation
page read and write
5130000
heap
page execute and read and write
71B0000
trusted library allocation
page execute and read and write
2B0A000
stack
page read and write
CC2000
trusted library allocation
page read and write
288E000
unkown
page read and write
FCE000
stack
page read and write
3C5E000
trusted library allocation
page read and write
4B9B000
stack
page read and write
559E000
stack
page read and write
477B000
trusted library allocation
page read and write
126B000
trusted library allocation
page execute and read and write
5FAB000
heap
page read and write
36F0000
trusted library allocation
page read and write
1547000
heap
page read and write
7A3E000
trusted library section
page read and write
5F70000
heap
page read and write
D78000
heap
page read and write
28CF000
unkown
page read and write
BF0000
heap
page read and write
4FEB000
stack
page read and write
6AC0000
trusted library allocation
page execute and read and write
1140000
heap
page read and write
121E000
stack
page read and write
C60000
heap
page read and write
166A000
heap
page read and write
4ED2000
trusted library allocation
page read and write
54E0000
trusted library section
page read and write
E00000
trusted library allocation
page read and write
3A01000
trusted library allocation
page read and write
3CDD000
trusted library allocation
page read and write
54BE000
stack
page read and write
1130000
trusted library allocation
page read and write
55E0000
heap
page read and write
30F0000
trusted library allocation
page read and write
2FE0000
heap
page read and write
1590000
heap
page read and write
3110000
trusted library allocation
page read and write
29C1000
trusted library allocation
page read and write
FD0000
heap
page read and write
36DC000
trusted library allocation
page read and write
C98000
heap
page read and write
28D0000
heap
page read and write
5970000
heap
page read and write
3AA5000
trusted library allocation
page read and write
4F30000
trusted library allocation
page read and write
1120000
heap
page read and write
710C000
stack
page read and write
5CAE000
stack
page read and write
369C000
trusted library allocation
page read and write
3728000
trusted library allocation
page read and write
85D6000
trusted library allocation
page read and write
475B000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
3554000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
C80000
trusted library allocation
page read and write
642000
unkown
page readonly
6A8C000
stack
page read and write
1570000
heap
page read and write
CAE000
stack
page read and write
4ED6000
trusted library allocation
page read and write
10B0000
trusted library allocation
page read and write
1720000
trusted library allocation
page read and write
A40E000
stack
page read and write
422000
remote allocation
page execute and read and write
16F4000
trusted library allocation
page read and write
42A7000
trusted library allocation
page read and write
4379000
trusted library allocation
page read and write
5973000
heap
page read and write
758F000
heap
page read and write
28F0000
heap
page read and write
2DCF000
trusted library allocation
page read and write
3733000
trusted library allocation
page read and write
1158000
heap
page read and write
1550000
trusted library allocation
page execute and read and write
366C000
trusted library allocation
page read and write
3B73000
trusted library allocation
page read and write
7F560000
trusted library allocation
page execute and read and write
371A000
trusted library allocation
page read and write
75CA000
heap
page read and write
4F5B000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
259D000
stack
page read and write
543E000
stack
page read and write
7780000
trusted library section
page read and write
4472000
trusted library allocation
page read and write
1220000
trusted library allocation
page read and write
C9E000
heap
page read and write
5C3E000
stack
page read and write
17D0000
heap
page read and write
4F70000
trusted library allocation
page read and write
4F52000
trusted library allocation
page read and write
5AA3000
heap
page execute and read and write
102E000
heap
page read and write
C80000
trusted library allocation
page read and write
29D2000
trusted library allocation
page read and write
DF4000
trusted library allocation
page read and write
5190000
trusted library allocation
page read and write
112B000
trusted library allocation
page read and write
9C9D000
stack
page read and write
3120000
trusted library allocation
page read and write
3A89000
trusted library allocation
page read and write
6D49000
stack
page read and write
3644000
trusted library allocation
page read and write
54C0000
trusted library section
page read and write
77A000
stack
page read and write
29F0000
trusted library allocation
page read and write
CD2000
trusted library allocation
page read and write
34D1000
trusted library allocation
page read and write
16FD000
trusted library allocation
page execute and read and write
1716000
trusted library allocation
page execute and read and write
53B0000
trusted library allocation
page read and write
5CC0000
heap
page read and write
6F40000
heap
page read and write
35B8000
trusted library allocation
page read and write
29E0000
heap
page execute and read and write
1685000
heap
page read and write
D2C000
heap
page read and write
61FE000
stack
page read and write
C43000
trusted library allocation
page read and write
B6F000
heap
page read and write
1800000
heap
page read and write
7B40000
trusted library section
page read and write
2A0B000
heap
page read and write
A5EE000
stack
page read and write
3050000
trusted library allocation
page read and write
CCA000
trusted library allocation
page execute and read and write
2BB1000
trusted library allocation
page read and write
10BE000
stack
page read and write
FCD000
stack
page read and write
585E000
stack
page read and write
2FCF000
stack
page read and write
170D000
trusted library allocation
page execute and read and write
There are 665 hidden memdumps, click here to show them.