IOC Report
nowe zam#U00f3wienie.exe

loading gif

Files

File Path
Type
Category
Malicious
nowe zam#U00f3wienie.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\nowe zam#U00f3wienie.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp5F3C.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\fUamrQdFSPAg.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\fUamrQdFSPAg.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8F6F.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Nov 19 07:47:46 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER90E7.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9117.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER99BF.tmp.dmp
Mini DuMP crash report, 15 streams, Tue Nov 19 07:47:49 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9B37.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9B77.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\fUamrQdFSPAg.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5tjvzgyz.32y.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gj2gwolf.n1w.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gziroowc.esv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oxxar0jn.iro.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_psp0fd04.24h.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q2bdyvxf.ehs.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rbmunj44.ph3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y1wu0u1r.54j.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp6A86.tmp
XML 1.0 document, ASCII text
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\nowe zam#U00f3wienie.exe
"C:\Users\user\Desktop\nowe zam#U00f3wienie.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\nowe zam#U00f3wienie.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\fUamrQdFSPAg.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fUamrQdFSPAg" /XML "C:\Users\user\AppData\Local\Temp\tmp5F3C.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Users\user\AppData\Roaming\fUamrQdFSPAg.exe
C:\Users\user\AppData\Roaming\fUamrQdFSPAg.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fUamrQdFSPAg" /XML "C:\Users\user\AppData\Local\Temp\tmp6A86.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7852 -s 1556
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 8180 -s 1560
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
http://checkip.dyndns.org
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://tempuri.org/project_mgtDataSet.xsdOproject_mgt_system.Properties.Resources
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://checkip.dyndns.org/
unknown
http://checkip.dyndns.org/q
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://checkip.dyndns.com
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.210.172
s-part-0017.t-0009.t-msedge.net
13.107.246.45
fp2e7a.wpc.phicdn.net
192.229.221.95
checkip.dyndns.com
132.226.247.73
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
132.226.8.169
unknown
United States
193.122.6.168
unknown
United States
193.122.130.0
unknown
United States
158.101.44.242
unknown
United States
132.226.247.73
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileDirectory
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProgramId
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
FileId
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LowerCaseLongPath
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LongPathHash
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Name
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
OriginalFileName
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Publisher
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Version
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinFileVersion
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinaryType
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProductName
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
ProductVersion
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
LinkDate
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
BinProductVersion
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
AppxPackageFullName
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
AppxPackageRelativeId
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Size
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Language
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
IsOsComponent
\REGISTRY\A\{1d40a7a5-6392-cce9-6908-884a81d0c645}\Root\InventoryApplicationFile\msbuild.exe|94596b7cc5f070ff
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 27 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
403000
remote allocation
page execute and read and write
malicious
2DE1000
trusted library allocation
page read and write
malicious
3559000
trusted library allocation
page read and write
malicious
2F31000
trusted library allocation
page read and write
malicious
163D000
trusted library allocation
page execute and read and write
3455000
trusted library allocation
page read and write
1640000
trusted library allocation
page read and write
6E0E000
stack
page read and write
56E0000
trusted library allocation
page execute and read and write
4F00000
heap
page read and write
2CCD000
stack
page read and write
2717000
heap
page read and write
333F000
trusted library allocation
page read and write
337D000
trusted library allocation
page read and write
3DE7000
trusted library allocation
page read and write
7540000
heap
page read and write
334F000
trusted library allocation
page read and write
2CA0000
trusted library allocation
page read and write
502E000
stack
page read and write
BB4E000
stack
page read and write
2B60000
trusted library allocation
page read and write
3349000
trusted library allocation
page read and write
6460000
trusted library allocation
page read and write
AD2E000
stack
page read and write
5BD0000
heap
page read and write
566E000
trusted library allocation
page read and write
830000
heap
page read and write
3391000
trusted library allocation
page read and write
33B9000
trusted library allocation
page read and write
63BE000
stack
page read and write
42A7000
trusted library allocation
page read and write
2CD0000
heap
page execute and read and write
74E0000
heap
page read and write
5270000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
2E20000
heap
page read and write
342B000
trusted library allocation
page read and write
4489000
trusted library allocation
page read and write
4B70000
heap
page read and write
3431000
trusted library allocation
page read and write
820000
trusted library allocation
page read and write
AFAD000
stack
page read and write
15E0000
heap
page read and write
1253000
trusted library allocation
page execute and read and write
13E0000
heap
page read and write
B90E000
stack
page read and write
6E30000
trusted library allocation
page read and write
6E80000
trusted library allocation
page read and write
5914000
trusted library section
page readonly
5710000
trusted library allocation
page read and write
94C000
heap
page read and write
4B85000
heap
page read and write
42C8000
trusted library allocation
page read and write
22FD000
stack
page read and write
5650000
trusted library allocation
page read and write
1690000
trusted library allocation
page execute and read and write
B2EE000
stack
page read and write
897000
heap
page read and write
F36000
heap
page read and write
3425000
trusted library allocation
page read and write
3419000
trusted library allocation
page read and write
79B000
trusted library allocation
page execute and read and write
BA4E000
stack
page read and write
865000
trusted library allocation
page read and write
2E99000
trusted library allocation
page read and write
1870000
trusted library allocation
page read and write
1680000
trusted library allocation
page read and write
4B90000
heap
page read and write
1662000
trusted library allocation
page read and write
2CB7000
trusted library allocation
page execute and read and write
2668000
trusted library allocation
page read and write
BF5000
heap
page read and write
53A4000
trusted library allocation
page read and write
EE9000
stack
page read and write
1280000
trusted library allocation
page read and write
3437000
trusted library allocation
page read and write
590E000
stack
page read and write
3351000
trusted library allocation
page read and write
3355000
trusted library allocation
page read and write
76D000
trusted library allocation
page execute and read and write
1190000
heap
page read and write
11E8000
heap
page read and write
569D000
stack
page read and write
6662000
trusted library allocation
page read and write
4A70000
heap
page read and write
5910000
trusted library section
page readonly
343F000
trusted library allocation
page read and write
1875000
trusted library allocation
page read and write
33F7000
trusted library allocation
page read and write
1422000
heap
page read and write
F90000
heap
page read and write
4BB0000
heap
page read and write
870000
heap
page read and write
FB0000
heap
page read and write
A6F000
stack
page read and write
5290000
heap
page read and write
343D000
trusted library allocation
page read and write
27AA000
trusted library allocation
page read and write
12EE000
stack
page read and write
750000
trusted library allocation
page read and write
2BEE000
stack
page read and write
BF0C000
stack
page read and write
DF0000
heap
page read and write
2C30000
heap
page read and write
5520000
trusted library allocation
page read and write
558D000
stack
page read and write
3369000
trusted library allocation
page read and write
336F000
trusted library allocation
page read and write
3453000
trusted library allocation
page read and write
B58E000
stack
page read and write
528B000
trusted library allocation
page read and write
78A000
trusted library allocation
page execute and read and write
2C7E000
unkown
page read and write
627F000
stack
page read and write
6A40000
heap
page read and write
613F000
stack
page read and write
1140000
heap
page read and write
11E0000
heap
page read and write
33C9000
trusted library allocation
page read and write
43BF000
trusted library allocation
page read and write
6A4E000
heap
page read and write
344D000
trusted library allocation
page read and write
780000
trusted library allocation
page read and write
76FE000
stack
page read and write
90E000
heap
page read and write
5515000
trusted library allocation
page read and write
6450000
trusted library allocation
page read and write
11FE000
heap
page read and write
164D000
trusted library allocation
page execute and read and write
5220000
trusted library allocation
page read and write
4F2E000
heap
page read and write
786000
trusted library allocation
page execute and read and write
911000
heap
page read and write
33F1000
trusted library allocation
page read and write
B6E000
stack
page read and write
133E000
unkown
page read and write
DF5000
heap
page read and write
B0AD000
stack
page read and write
3363000
trusted library allocation
page read and write
530C000
stack
page read and write
33A9000
trusted library allocation
page read and write
764000
trusted library allocation
page read and write
B0B1000
heap
page read and write
3445000
trusted library allocation
page read and write
6C35000
heap
page read and write
B42E000
stack
page read and write
33ED000
trusted library allocation
page read and write
88F000
heap
page read and write
2BA0000
heap
page read and write
341F000
trusted library allocation
page read and write
588D000
stack
page read and write
800000
heap
page read and write
145E000
unkown
page read and write
42E7000
trusted library allocation
page read and write
63CC000
heap
page read and write
3449000
trusted library allocation
page read and write
3377000
trusted library allocation
page read and write
233A000
stack
page read and write
3403000
trusted library allocation
page read and write
F1E000
heap
page read and write
341B000
trusted library allocation
page read and write
65BF000
stack
page read and write
3407000
trusted library allocation
page read and write
537000
stack
page read and write
12FF000
unkown
page read and write
B44E000
stack
page read and write
3401000
trusted library allocation
page read and write
120E000
stack
page read and write
2551000
trusted library allocation
page read and write
49F0000
heap
page read and write
56C0000
heap
page read and write
16A0000
trusted library allocation
page read and write
33C5000
trusted library allocation
page read and write
1667000
trusted library allocation
page execute and read and write
3353000
trusted library allocation
page read and write
33AB000
trusted library allocation
page read and write
7120000
trusted library allocation
page read and write
5280000
trusted library allocation
page read and write
3397000
trusted library allocation
page read and write
12AE000
stack
page read and write
B56F000
stack
page read and write
6C16000
heap
page read and write
1810000
trusted library allocation
page read and write
5A5E000
stack
page read and write
3441000
trusted library allocation
page read and write
B2B000
stack
page read and write
840000
trusted library allocation
page read and write
337F000
trusted library allocation
page read and write
3447000
trusted library allocation
page read and write
4219000
trusted library allocation
page read and write
33F5000
trusted library allocation
page read and write
97E0000
trusted library allocation
page read and write
FB4000
heap
page read and write
97E8000
trusted library allocation
page read and write
6E40000
trusted library allocation
page read and write
266A000
trusted library allocation
page read and write
33D9000
trusted library allocation
page read and write
2D2A000
heap
page read and write
141E000
unkown
page read and write
23EE000
unkown
page read and write
3361000
trusted library allocation
page read and write
B81C000
stack
page read and write
763000
trusted library allocation
page execute and read and write
1297000
trusted library allocation
page execute and read and write
8A4000
heap
page read and write
342F000
trusted library allocation
page read and write
1450000
heap
page read and write
1880000
trusted library allocation
page read and write
62EE000
heap
page read and write
2CAA000
trusted library allocation
page execute and read and write
64A0000
trusted library allocation
page read and write
B32E000
stack
page read and write
5600000
heap
page execute and read and write
343B000
trusted library allocation
page read and write
1633000
trusted library allocation
page execute and read and write
631E000
stack
page read and write
11D0000
trusted library allocation
page read and write
333B000
trusted library allocation
page read and write
33CD000
trusted library allocation
page read and write
242C000
stack
page read and write
1254000
trusted library allocation
page read and write
670000
heap
page read and write
18A7000
heap
page read and write
5654000
trusted library allocation
page read and write
8470000
trusted library section
page read and write
760000
trusted library allocation
page read and write
797000
trusted library allocation
page execute and read and write
7700000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
3383000
trusted library allocation
page read and write
AF6F000
stack
page read and write
BE0C000
stack
page read and write
1630000
trusted library allocation
page read and write
2A10000
heap
page read and write
8D8F000
stack
page read and write
42F4000
trusted library allocation
page read and write
33FF000
trusted library allocation
page read and write
5265000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
6E10000
trusted library section
page read and write
6ECE000
stack
page read and write
33DB000
trusted library allocation
page read and write
601E000
stack
page read and write
33D5000
trusted library allocation
page read and write
33CB000
trusted library allocation
page read and write
2F2E000
stack
page read and write
26DF000
stack
page read and write
33DF000
trusted library allocation
page read and write
1240000
trusted library allocation
page read and write
2440000
heap
page execute and read and write
D00000
trusted library allocation
page read and write
33D7000
trusted library allocation
page read and write
AE2E000
stack
page read and write
33C7000
trusted library allocation
page read and write
FE7000
stack
page read and write
3100000
heap
page execute and read and write
B7D0000
heap
page read and write
13DD000
stack
page read and write
1130000
heap
page read and write
334B000
trusted library allocation
page read and write
4422000
trusted library allocation
page read and write
77D000
trusted library allocation
page execute and read and write
33F9000
trusted library allocation
page read and write
33E3000
trusted library allocation
page read and write
2CD0000
trusted library allocation
page read and write
BF4D000
stack
page read and write
33A1000
trusted library allocation
page read and write
33B5000
trusted library allocation
page read and write
30F0000
trusted library allocation
page read and write
254E000
stack
page read and write
C08E000
stack
page read and write
435A000
trusted library allocation
page read and write
49B6000
trusted library allocation
page read and write
53A6000
trusted library allocation
page read and write
338B000
trusted library allocation
page read and write
2EBC000
trusted library allocation
page read and write
33CF000
trusted library allocation
page read and write
3211000
trusted library allocation
page read and write
3435000
trusted library allocation
page read and write
1270000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
3457000
trusted library allocation
page read and write
298D000
stack
page read and write
3393000
trusted library allocation
page read and write
3389000
trusted library allocation
page read and write
1414000
heap
page read and write
1643000
trusted library allocation
page read and write
F08000
heap
page read and write
2B70000
heap
page read and write
1660000
trusted library allocation
page read and write
1652000
trusted library allocation
page read and write
D20000
trusted library allocation
page read and write
B90000
heap
page read and write
1218000
heap
page read and write
33C3000
trusted library allocation
page read and write
7900000
trusted library allocation
page execute and read and write
4990000
trusted library allocation
page read and write
15DE000
stack
page read and write
2CBB000
trusted library allocation
page execute and read and write
5370000
heap
page read and write
2CB0000
trusted library allocation
page read and write
3415000
trusted library allocation
page read and write
C04E000
stack
page read and write
499B000
trusted library allocation
page read and write
2B90000
trusted library allocation
page execute and read and write
3F59000
trusted library allocation
page read and write
33B3000
trusted library allocation
page read and write
33A5000
trusted library allocation
page read and write
3427000
trusted library allocation
page read and write
2CDF000
unkown
page read and write
333D000
trusted library allocation
page read and write
1806000
trusted library allocation
page read and write
49B1000
trusted library allocation
page read and write
33B1000
trusted library allocation
page read and write
BA0E000
stack
page read and write
5B70000
trusted library allocation
page execute and read and write
334D000
trusted library allocation
page read and write
4A30000
heap
page execute and read and write
1820000
heap
page read and write
B68E000
stack
page read and write
810000
trusted library allocation
page execute and read and write
3365000
trusted library allocation
page read and write
782000
trusted library allocation
page read and write
335D000
trusted library allocation
page read and write
B1ED000
stack
page read and write
AE6E000
stack
page read and write
3395000
trusted library allocation
page read and write
6FD0000
trusted library allocation
page execute and read and write
2E1D000
stack
page read and write
878000
heap
page read and write
23A0000
heap
page read and write
3339000
trusted library allocation
page read and write
B6CD000
stack
page read and write
5BC0000
heap
page read and write
120A000
heap
page read and write
56D2000
trusted library allocation
page read and write
C18F000
stack
page read and write
2C90000
trusted library allocation
page read and write
344B000
trusted library allocation
page read and write
BDC000
stack
page read and write
4211000
trusted library allocation
page read and write
300A000
trusted library allocation
page read and write
62BE000
stack
page read and write
2F2F000
stack
page read and write
4A50000
trusted library allocation
page read and write
87E000
heap
page read and write
574E000
stack
page read and write
3371000
trusted library allocation
page read and write
17FE000
stack
page read and write
3761000
trusted library allocation
page read and write
2DDE000
stack
page read and write
120000
unkown
page readonly
3357000
trusted library allocation
page read and write
16B0000
heap
page read and write
1290000
trusted library allocation
page read and write
336B000
trusted library allocation
page read and write
339F000
trusted library allocation
page read and write
33AF000
trusted library allocation
page read and write
76BE000
stack
page read and write
567D000
trusted library allocation
page read and write
1656000
trusted library allocation
page execute and read and write
128A000
trusted library allocation
page execute and read and write
947000
heap
page read and write
33BF000
trusted library allocation
page read and write
2FFE000
trusted library allocation
page read and write
12B0000
heap
page read and write
3381000
trusted library allocation
page read and write
F2A000
heap
page read and write
56DD000
stack
page read and write
2FE7000
trusted library allocation
page read and write
337B000
trusted library allocation
page read and write
6462000
trusted library allocation
page read and write
D97000
stack
page read and write
1620000
trusted library allocation
page read and write
1804000
trusted library allocation
page read and write
340F000
trusted library allocation
page read and write
3F37000
trusted library allocation
page read and write
1292000
trusted library allocation
page read and write
33BD000
trusted library allocation
page read and write
336D000
trusted library allocation
page read and write
129B000
trusted library allocation
page execute and read and write
6D0E000
stack
page read and write
5B5D000
stack
page read and write
14C3000
heap
page read and write
33E9000
trusted library allocation
page read and write
63C0000
heap
page read and write
335B000
trusted library allocation
page read and write
186B000
stack
page read and write
2C83000
trusted library allocation
page execute and read and write
773000
trusted library allocation
page read and write
464C000
stack
page read and write
33A3000
trusted library allocation
page read and write
85DE000
stack
page read and write
1420000
heap
page read and write
1634000
trusted library allocation
page read and write
267E000
stack
page read and write
43A000
stack
page read and write
4F3C000
heap
page read and write
3429000
trusted library allocation
page read and write
1250000
heap
page read and write
55FE000
stack
page read and write
4B5B000
stack
page read and write
3345000
trusted library allocation
page read and write
33FD000
trusted library allocation
page read and write
53F0000
heap
page read and write
33EB000
trusted library allocation
page read and write
3337000
trusted library allocation
page read and write
5676000
trusted library allocation
page read and write
BE0000
heap
page read and write
B85E000
stack
page read and write
340B000
trusted library allocation
page read and write
2C80000
heap
page read and write
6E20000
trusted library allocation
page execute and read and write
B95E000
stack
page read and write
2E93000
trusted library allocation
page read and write
2F6F000
stack
page read and write
1260000
heap
page read and write
53BB000
trusted library allocation
page read and write
565B000
trusted library allocation
page read and write
6402000
heap
page read and write
5BB0000
heap
page read and write
4B60000
trusted library section
page readonly
4F40000
heap
page read and write
3343000
trusted library allocation
page read and write
2CF0000
heap
page execute and read and write
5274000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
33DD000
trusted library allocation
page read and write
5B0000
heap
page read and write
33FB000
trusted library allocation
page read and write
850000
trusted library allocation
page read and write
7517000
heap
page read and write
595E000
stack
page read and write
3373000
trusted library allocation
page read and write
166B000
trusted library allocation
page execute and read and write
3375000
trusted library allocation
page read and write
4994000
trusted library allocation
page read and write
F00000
heap
page read and write
5671000
trusted library allocation
page read and write
320E000
stack
page read and write
17BE000
stack
page read and write
2710000
heap
page read and write
5773000
heap
page read and write
2358000
trusted library allocation
page read and write
33B7000
trusted library allocation
page read and write
59B0000
heap
page execute and read and write
FE6000
heap
page read and write
335F000
trusted library allocation
page read and write
3411000
trusted library allocation
page read and write
4A73000
heap
page read and write
3551000
trusted library allocation
page read and write
33C1000
trusted library allocation
page read and write
FC0000
heap
page read and write
118E000
stack
page read and write
2690000
heap
page read and write
4A60000
trusted library allocation
page read and write
4B80000
heap
page read and write
59A0000
heap
page read and write
3423000
trusted library allocation
page read and write
770000
trusted library allocation
page read and write
1650000
trusted library allocation
page read and write
23F0000
heap
page read and write
56D0000
trusted library allocation
page read and write
4A02000
trusted library allocation
page read and write
5276000
trusted library allocation
page read and write
B46E000
stack
page read and write
584E000
stack
page read and write
1300000
heap
page read and write
6C5F000
heap
page read and write
B7CD000
stack
page read and write
3341000
trusted library allocation
page read and write
2CA6000
trusted library allocation
page execute and read and write
112C000
stack
page read and write
2D20000
heap
page read and write
611E000
stack
page read and write
53D0000
heap
page read and write
7710000
trusted library allocation
page execute and read and write
2E90000
trusted library allocation
page read and write
594E000
stack
page read and write
62E0000
heap
page read and write
4F09000
heap
page read and write
617E000
stack
page read and write
74FD000
heap
page read and write
58CE000
stack
page read and write
3387000
trusted library allocation
page read and write
371F000
trusted library allocation
page read and write
3417000
trusted library allocation
page read and write
6640000
trusted library allocation
page read and write
7B0000
trusted library allocation
page read and write
3DE1000
trusted library allocation
page read and write
4287000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
4424000
trusted library allocation
page read and write
33AD000
trusted library allocation
page read and write
576B000
stack
page read and write
33D1000
trusted library allocation
page read and write
C9B000
stack
page read and write
49BD000
trusted library allocation
page read and write
53B0000
heap
page read and write
3E09000
trusted library allocation
page read and write
3451000
trusted library allocation
page read and write
6440000
trusted library allocation
page execute and read and write
3F31000
trusted library allocation
page read and write
63E000
stack
page read and write
570F000
stack
page read and write
2C84000
trusted library allocation
page read and write
29CA000
stack
page read and write
3379000
trusted library allocation
page read and write
3334000
trusted library allocation
page read and write
11CD000
stack
page read and write
B54F000
stack
page read and write
643E000
stack
page read and write
B71B000
stack
page read and write
33E1000
trusted library allocation
page read and write
5710000
heap
page execute and read and write
2FFA000
trusted library allocation
page read and write
1286000
trusted library allocation
page execute and read and write
7FE000
stack
page read and write
13EA000
heap
page read and write
33F3000
trusted library allocation
page read and write
2FE2000
trusted library allocation
page read and write
2FEA000
trusted library allocation
page read and write
2E9B000
trusted library allocation
page read and write
33BB000
trusted library allocation
page read and write
3367000
trusted library allocation
page read and write
2D3E000
stack
page read and write
641E000
stack
page read and write
53A0000
trusted library allocation
page read and write
4BA0000
trusted library allocation
page execute and read and write
2CB2000
trusted library allocation
page read and write
2C8D000
trusted library allocation
page execute and read and write
3284000
trusted library allocation
page read and write
402000
remote allocation
page execute and read and write
3421000
trusted library allocation
page read and write
13EE000
heap
page read and write
49AE000
trusted library allocation
page read and write
5B60000
heap
page read and write
2CE0000
trusted library allocation
page execute and read and write
2FD0000
heap
page read and write
165A000
trusted library allocation
page execute and read and write
1800000
trusted library allocation
page read and write
64B0000
heap
page read and write
53E0000
heap
page read and write
338D000
trusted library allocation
page read and write
3439000
trusted library allocation
page read and write
33A7000
trusted library allocation
page read and write
64B5000
heap
page read and write
D30000
heap
page read and write
1260000
heap
page read and write
3385000
trusted library allocation
page read and write
339D000
trusted library allocation
page read and write
3347000
trusted library allocation
page read and write
43DF000
trusted library allocation
page read and write
3433000
trusted library allocation
page read and write
792000
trusted library allocation
page read and write
D37000
heap
page read and write
5A0000
heap
page read and write
3409000
trusted library allocation
page read and write
263F000
unkown
page read and write
338F000
trusted library allocation
page read and write
1305000
heap
page read and write
341D000
trusted library allocation
page read and write
701E000
stack
page read and write
33EF000
trusted library allocation
page read and write
3443000
trusted library allocation
page read and write
18A0000
heap
page read and write
BF0000
heap
page read and write
33E7000
trusted library allocation
page read and write
344F000
trusted library allocation
page read and write
3058000
trusted library allocation
page read and write
2FDF000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page execute and read and write
B570000
heap
page read and write
1010000
heap
page read and write
3405000
trusted library allocation
page read and write
340D000
trusted library allocation
page read and write
33D3000
trusted library allocation
page read and write
794E000
stack
page read and write
4A00000
trusted library allocation
page read and write
5FE000
stack
page read and write
ACEE000
stack
page read and write
342D000
trusted library allocation
page read and write
BCCE000
stack
page read and write
339B000
trusted library allocation
page read and write
4EED000
stack
page read and write
6BF0000
heap
page read and write
8B1000
heap
page read and write
BDCF000
stack
page read and write
122000
unkown
page readonly
63C8000
heap
page read and write
5770000
heap
page read and write
4A10000
trusted library allocation
page execute and read and write
4EDE000
stack
page read and write
4EF0000
heap
page read and write
3359000
trusted library allocation
page read and write
3413000
trusted library allocation
page read and write
33E5000
trusted library allocation
page read and write
2C90000
heap
page read and write
125D000
trusted library allocation
page execute and read and write
EF7000
stack
page read and write
53B0000
trusted library allocation
page read and write
860000
trusted library allocation
page read and write
798E000
stack
page read and write
129B000
heap
page read and write
3399000
trusted library allocation
page read and write
621E000
stack
page read and write
There are 596 hidden memdumps, click here to show them.