IOC Report
TmmiCE5Ulm.exe

loading gif

Files

File Path
Type
Category
Malicious
TmmiCE5Ulm.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_TmmiCE5Ulm.exe_35e225ef6e75852b82d9993be1976e3524db6_9989bd0e_5ec9a849-ba9f-49b2-a7bc-42651bb1cac4\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4C02.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Dec 23 06:26:53 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4DA9.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4DC9.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\TmmiCE5Ulm.exe
"C:\Users\user\Desktop\TmmiCE5Ulm.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5600 -s 1924

URLs

Name
IP
Malicious
https://community.fastly.steamstatic.com/public/shared/images/responsive/header_menu_hamburger.png
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://player.vimeo.com
unknown
https://duckduckgo.com/ac/?q=
unknown
https://community.fastly.steamstatic.com/public/css/promo/summer2017/stickers.css?v=Ncr6N09yZIap&amp
unknown
https://steamcommunity.com/?subsection=broadcasts
unknown
https://bitbucket.org/TU
unknown
https://bridge.sfo1.admarketplace.net/ctp?version=16.0.0&key=1696425136400800000.2&ci=1696425136743.
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/
unknown
https://store.steampowered.com/subscriber_agreement/
unknown
https://www.gstatic.cn/recaptcha/
unknown
aspecteirs.lat
https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/manifest.js?v=hyEE
unknown
http://www.valvesoftware.com/legal.htm
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_global.css?v=wuA4X_n5-mo0&l=en
unknown
https://www.youtube.com
unknown
https://www.google.com
unknown
sweepyribs.lat
https://www.valvesoftware.com/en/contact?contact-person=Translation%20Team%20Feedback
unknown
https://community.fastly.steamstatic.com/public/javascript/applications/community/libraries~b28b7af6
unknown
https://cdn.fastly.steamstatic.com/steamcommunity/public/assets/
unknown
sustainskelet.lat
https://aui-cdn.atlassian.com/
unknown
rapeflowwj.lat
https://community.fastly.steamstatic.com/public/shared/css/motiva_sans.css?v=-yZgCk0Nu7kH&l=engl
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/profilev2.css?v=fe66ET2uI50l&l=englis
unknown
https://community.fastly.steamstatic.com/public/javascript/scriptaculous/_combined.js?v=pbdAKOcDIgbC
unknown
https://s.ytimg.com;
unknown
https://community.fastly.steamstatic.com/public/images/skin_1/footerLogo_valve.png?v=1
unknown
https://community.fastly.steamstatic.com/public/shared/css/buttons.css?v=qhQgyjWi6LgJ&l=english&
unknown
https://community.fastly.steamstatic.com/
unknown
https://lev-tolstoi.com/d
unknown
https://steam.tv/
unknown
https://lev-tolstoi.com/pi:
unknown
https://lev-tolstoi.com/b
unknown
https://bitbucket.org/
unknown
https://steamcommunity.com/profiles/76561199724331900
23.55.153.106
https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net
unknown
https://bitbucket.org:443/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe
unknown
https://community.fastly.steamstatic.com/public/javascript/promo/stickers.js?v=CcLRHsa04otQ&l=en
unknown
https://lev-tolstoi.com/
unknown
http://store.steampowered.com/privacy_agreement/
unknown
https://store.steampowered.com/points/shop/
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
https://lev-tolstoi.com/tF
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
energyaffai.lat
https://community.fastly.steamstatic.com/public/javascript/modalv2.js?v=zBXEuexVQ0FZ&l=english&a
unknown
https://sketchfab.com
unknown
https://www.ecosia.org/newtab/
unknown
https://lv.queniujq.cn
unknown
https://steamcommunity.com/profiles/76561199724331900/inventory/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://www.youtube.com/
unknown
https://store.steampowered.com/privacy_agreement/
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/modalContent.css?v=WXAusLHclDIt&l=eng
unknown
https://lev-tolstoi.com/api
104.21.66.86
https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net
unknown
https://cdn.cookielaw.org/
unknown
https://community.fastly.steamstatic.com/public/javascript/global.js?v=jWc2JLWHx5Kn&l=english&am
unknown
https://www.google.com/recaptcha/
unknown
https://checkout.steampowered.com/
unknown
https://www.bestbuy.com/site/electronics/top-deals/pcmcat1563299784494.c/?id=pcmcat1563299784494&ref
unknown
grannyejh.lat
https://store.steampowered.com/;
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-pg=q
unknown
https://store.steampowered.com/about/
unknown
https://steamcommunity.com/my/wishlist/
unknown
https://bbuseruploads.s3.amazonaws.com/70e84e0b-e14f-45c5-ab65-07760e9609fc/downloads/eaef3307-3cc1-
unknown
https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exef
unknown
https://community.fastly.steamstatic.com/public/shared/css/shared_responsive.css?v=JL1e4uQSrVGe&
unknown
necklacebudi.lat
https://help.steampowered.com/en/
unknown
https://steamcommunity.com/market/
unknown
https://store.steampowered.com/news/
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4Qqm4p8dfCfm4pbW1pbWfpbW7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://community.fastly.steamstatic.com/public/javascript/webui/clientcom.js?v=St3gSJx2HFUZ&l=e
unknown
https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe_1
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://store.steampowered.com/subscriber_agreement/
unknown
https://steamcommunity.com/linkfilter/?u=http%3A%2F%2Fwww.geonames.org
unknown
https://recaptcha.net/recaptcha/;
unknown
https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net
unknown
https://steamcommunity.com/discussions/
unknown
https://lev-tolstoi.com/=9
unknown
https://store.steampowered.com/stats/
unknown
https://community.fastly.steamstatic.com/public/shared/javascript/shared_global.js?v=Gr6TbGRvDtNE&am
unknown
https://medal.tv
unknown
https://broadcast.st.dl.eccdnx.com
unknown
https://community.fastly.steamstatic.com/public/shared/images/responsive/logo_valve_footer.png
unknown
https://community.fastly.steamstatic.com/public/css/skin_1/header.css?v=EM4kCu67DNda&l=english&a
unknown
https://store.steampowered.com/steam_refunds/
unknown
https://remote-app-switcher.prod-east.frontend.public.atl-paas.net
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe.0.0
unknown
https://bitbucket.org/mynewworkspace123312/scnd/downloads/FormattingCharitable.exe
185.166.143.49
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s3-w.us-east-1.amazonaws.com
3.5.16.86
bitbucket.org
185.166.143.49
steamcommunity.com
23.55.153.106
lev-tolstoi.com
104.21.66.86
bbuseruploads.s3.amazonaws.com
unknown
sweepyribs.lat
unknown
necklacebudi.lat
unknown
sustainskelet.lat
unknown
crosshuaht.lat
unknown
rapeflowwj.lat
unknown
grannyejh.lat
unknown
aspecteirs.lat
unknown
discokeyus.lat
unknown
energyaffai.lat
unknown
There are 4 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
104.21.66.86
lev-tolstoi.com
United States
23.55.153.106
steamcommunity.com
United States
185.166.143.49
bitbucket.org
Germany
3.5.16.86
s3-w.us-east-1.amazonaws.com
United States

Registry

Path
Value
Malicious
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
ProgramId
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
FileId
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
LowerCaseLongPath
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
LongPathHash
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
Name
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
OriginalFileName
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
Publisher
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
Version
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
BinFileVersion
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
BinaryType
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
ProductName
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
ProductVersion
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
LinkDate
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
BinProductVersion
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
AppxPackageFullName
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
AppxPackageRelativeId
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
Size
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
Language
\REGISTRY\A\{6b150e31-152b-4fd1-56fd-124cebc1506f}\Root\InventoryApplicationFile\tmmice5ulm.exe|496602244e67979f
Usn
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
4F70000
direct allocation
page read and write
malicious
CDB000
stack
page read and write
5FD0000
trusted library allocation
page read and write
1143000
heap
page read and write
5B18000
trusted library allocation
page read and write
5D81000
trusted library allocation
page read and write
11A4000
heap
page read and write
1192000
heap
page read and write
5F25000
trusted library allocation
page read and write
1113000
heap
page read and write
11BE000
heap
page read and write
110E000
heap
page read and write
11BE000
heap
page read and write
5AC6000
trusted library allocation
page read and write
5B6E000
trusted library allocation
page read and write
5B06000
trusted library allocation
page read and write
5AC1000
trusted library allocation
page read and write
10F8000
heap
page read and write
4AE1000
heap
page read and write
36EE000
stack
page read and write
5B11000
trusted library allocation
page read and write
5E13000
trusted library allocation
page read and write
5B0B000
trusted library allocation
page read and write
50D0000
direct allocation
page execute and read and write
5B8E000
trusted library allocation
page read and write
5ABA000
trusted library allocation
page read and write
4AE1000
heap
page read and write
4AE1000
heap
page read and write
1199000
heap
page read and write
5A97000
trusted library allocation
page read and write
11BE000
heap
page read and write
5F2F000
trusted library allocation
page read and write
5A93000
trusted library allocation
page read and write
5A97000
trusted library allocation
page read and write
97C000
unkown
page execute and write copy
603C000
trusted library allocation
page read and write
60B4000
trusted library allocation
page read and write
138E000
stack
page read and write
5A97000
trusted library allocation
page read and write
961000
unkown
page execute and read and write
5F21000
trusted library allocation
page read and write
8C9000
unkown
page execute and write copy
60DF000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
472E000
stack
page read and write
6170000
trusted library allocation
page readonly
96C000
unkown
page execute and write copy
11A6000
heap
page read and write
9DA000
unkown
page execute and write copy
5ADF000
trusted library allocation
page read and write
4AD0000
direct allocation
page read and write
5B16000
trusted library allocation
page read and write
1143000
heap
page read and write
1188000
heap
page read and write
5B06000
trusted library allocation
page read and write
50F0000
direct allocation
page execute and read and write
1128000
heap
page read and write
5B07000
trusted library allocation
page read and write
5F20000
trusted library allocation
page read and write
1149000
heap
page read and write
110D000
heap
page read and write
5AFE000
trusted library allocation
page read and write
9A6000
unkown
page execute and read and write
5AAE000
trusted library allocation
page read and write
5B08000
trusted library allocation
page read and write
58EE000
stack
page read and write
110E000
heap
page read and write
5B0A000
trusted library allocation
page read and write
60CA000
trusted library allocation
page read and write
114D000
heap
page read and write
60F7000
trusted library allocation
page read and write
5F27000
trusted library allocation
page read and write
110E000
heap
page read and write
5FD1000
trusted library allocation
page read and write
3BEE000
stack
page read and write
5B17000
trusted library allocation
page read and write
53ED000
trusted library allocation
page read and write
5B0B000
trusted library allocation
page read and write
4FAC000
stack
page read and write
32EF000
stack
page read and write
5ADF000
trusted library allocation
page read and write
50C0000
direct allocation
page execute and read and write
5A92000
trusted library allocation
page read and write
50FD000
stack
page read and write
5D87000
trusted library allocation
page read and write
5B06000
trusted library allocation
page read and write
1143000
heap
page read and write
5F26000
trusted library allocation
page read and write
5D8C000
trusted library allocation
page read and write
11A6000
heap
page read and write
5AAE000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
113E000
heap
page read and write
5B88000
trusted library allocation
page read and write
5A97000
trusted library allocation
page read and write
4AE1000
heap
page read and write
5F2D000
trusted library allocation
page read and write
5AC8000
trusted library allocation
page read and write
5A90000
trusted library allocation
page read and write
3CEF000
stack
page read and write
5AC8000
trusted library allocation
page read and write
5B4E000
trusted library allocation
page read and write
36AF000
stack
page read and write
5B19000
trusted library allocation
page read and write
5AB2000
trusted library allocation
page read and write
5B88000
trusted library allocation
page read and write
5B08000
trusted library allocation
page read and write
5F21000
trusted library allocation
page read and write
9CF000
unkown
page execute and write copy
4AE1000
heap
page read and write
5FFD000
trusted library allocation
page read and write
119C000
heap
page read and write
432F000
stack
page read and write
1184000
heap
page read and write
4AE1000
heap
page read and write
1108000
heap
page read and write
5F27000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
1154000
heap
page read and write
5B0B000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
606F000
trusted library allocation
page read and write
5B39000
trusted library allocation
page read and write
5B17000
trusted library allocation
page read and write
1184000
heap
page read and write
6040000
trusted library allocation
page read and write
536E000
stack
page read and write
3F6F000
stack
page read and write
55D0000
remote allocation
page read and write
446F000
stack
page read and write
6009000
trusted library allocation
page read and write
5FEB000
trusted library allocation
page read and write
609B000
trusted library allocation
page read and write
5F2A000
trusted library allocation
page read and write
5DB8000
trusted library allocation
page read and write
1184000
heap
page read and write
606E000
trusted library allocation
page read and write
744000
unkown
page execute and write copy
5B19000
trusted library allocation
page read and write
41EF000
stack
page read and write
4AD0000
direct allocation
page read and write
5ACB000
trusted library allocation
page read and write
2F2F000
stack
page read and write
750000
unkown
page execute and write copy
4FB2000
direct allocation
page read and write
5F20000
trusted library allocation
page read and write
932000
unkown
page execute and write copy
5B00000
trusted library allocation
page read and write
5FDF000
trusted library allocation
page read and write
5110000
direct allocation
page execute and read and write
5B81000
trusted library allocation
page read and write
1147000
heap
page read and write
1113000
heap
page read and write
346E000
stack
page read and write
4AE1000
heap
page read and write
6F1000
unkown
page execute and write copy
95B000
unkown
page execute and write copy
5AC4000
trusted library allocation
page read and write
5AAE000
trusted library allocation
page read and write
5B03000
trusted library allocation
page read and write
60EB000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
1149000
heap
page read and write
5BB9000
trusted library allocation
page read and write
1143000
heap
page read and write
11BE000
heap
page read and write
94F000
unkown
page execute and write copy
5AAC000
trusted library allocation
page read and write
8C9000
unkown
page execute and read and write
5B19000
trusted library allocation
page read and write
114D000
heap
page read and write
1199000
heap
page read and write
5B99000
trusted library allocation
page read and write
1025000
heap
page read and write
5B58000
trusted library allocation
page read and write
619B000
trusted library allocation
page read and write
5B99000
trusted library allocation
page read and write
1113000
heap
page read and write
5A9C000
trusted library allocation
page read and write
1184000
heap
page read and write
53E3000
trusted library allocation
page read and write
6799000
trusted library allocation
page read and write
3AAE000
stack
page read and write
5A95000
trusted library allocation
page read and write
55D0000
remote allocation
page read and write
112B000
heap
page read and write
114D000
heap
page read and write
5F21000
trusted library allocation
page read and write
396E000
stack
page read and write
5B01000
trusted library allocation
page read and write
53DA000
trusted library allocation
page read and write
1184000
heap
page read and write
5A97000
trusted library allocation
page read and write
5B16000
trusted library allocation
page read and write
5AA4000
trusted library allocation
page read and write
6079000
trusted library allocation
page read and write
1184000
heap
page read and write
11BE000
heap
page read and write
1105000
heap
page read and write
9E9000
unkown
page execute and write copy
5F28000
trusted library allocation
page read and write
2D2C000
heap
page read and write
5FD6000
trusted library allocation
page read and write
5B81000
trusted library allocation
page read and write
1149000
heap
page read and write
2D20000
heap
page read and write
5B00000
trusted library allocation
page read and write
5B88000
trusted library allocation
page read and write
90E000
unkown
page execute and read and write
5B88000
trusted library allocation
page read and write
5B81000
trusted library allocation
page read and write
118B000
heap
page read and write
50F0000
direct allocation
page execute and read and write
1146000
heap
page read and write
5B58000
trusted library allocation
page read and write
93C000
unkown
page execute and read and write
5B03000
trusted library allocation
page read and write
5970000
heap
page read and write
5B56000
trusted library allocation
page read and write
1128000
heap
page read and write
733000
unkown
page execute and read and write
5AA6000
trusted library allocation
page read and write
356F000
stack
page read and write
5AAC000
trusted library allocation
page read and write
8FA000
unkown
page execute and read and write
5DD8000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
97E000
unkown
page execute and read and write
962000
unkown
page execute and write copy
6032000
trusted library allocation
page read and write
50F0000
direct allocation
page execute and read and write
4AD0000
direct allocation
page read and write
5B00000
trusted library allocation
page read and write
1147000
heap
page read and write
1149000
heap
page read and write
6164000
trusted library allocation
page read and write
30AE000
stack
page read and write
5F2C000
trusted library allocation
page read and write
119F000
heap
page read and write
5A8A000
trusted library allocation
page read and write
4AD0000
direct allocation
page read and write
54AD000
stack
page read and write
5AD9000
trusted library allocation
page read and write
5B0A000
trusted library allocation
page read and write
4AD0000
direct allocation
page read and write
5B07000
trusted library allocation
page read and write
5F21000
trusted library allocation
page read and write
5ABF000
trusted library allocation
page read and write
114A000
heap
page read and write
5B02000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
92B000
unkown
page execute and read and write
546F000
stack
page read and write
13CE000
stack
page read and write
5ADF000
trusted library allocation
page read and write
6270000
trusted library allocation
page readonly
1143000
heap
page read and write
6179000
trusted library allocation
page readonly
5B17000
trusted library allocation
page read and write
110A000
heap
page read and write
5AB9000
trusted library allocation
page read and write
2CCE000
stack
page read and write
5AAE000
trusted library allocation
page read and write
5B81000
trusted library allocation
page read and write
118C000
heap
page read and write
5FCF000
trusted library allocation
page read and write
5B4E000
trusted library allocation
page read and write
6010000
trusted library allocation
page read and write
5B2B000
trusted library allocation
page read and write
2D27000
heap
page read and write
5F21000
trusted library allocation
page read and write
5B38000
trusted library allocation
page read and write
5B99000
trusted library allocation
page read and write
92C000
unkown
page execute and write copy
6069000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5B53000
trusted library allocation
page read and write
4AE1000
heap
page read and write
5B00000
trusted library allocation
page read and write
5B5B000
trusted library allocation
page read and write
90F000
unkown
page execute and write copy
9D3000
unkown
page execute and write copy
44AE000
stack
page read and write
5973000
heap
page read and write
9C0000
unkown
page execute and read and write
1184000
heap
page read and write
5F27000
trusted library allocation
page read and write
588F000
stack
page read and write
55D0000
remote allocation
page read and write
8D3000
unkown
page execute and read and write
5B9E000
trusted library allocation
page read and write
2F6E000
stack
page read and write
5F2B000
trusted library allocation
page read and write
5B3B000
trusted library allocation
page read and write
37EF000
stack
page read and write
1146000
heap
page read and write
951000
unkown
page execute and read and write
5A8A000
trusted library allocation
page read and write
6F0000
unkown
page readonly
4BE0000
trusted library allocation
page read and write
8F9000
unkown
page execute and write copy
600A000
trusted library allocation
page read and write
1154000
heap
page read and write
1184000
heap
page read and write
901000
unkown
page execute and write copy
5132000
trusted library allocation
page read and write
35AE000
stack
page read and write
112B000
heap
page read and write
1184000
heap
page read and write
617C000
trusted library allocation
page read and write
5B81000
trusted library allocation
page read and write
5B07000
trusted library allocation
page read and write
5B18000
trusted library allocation
page read and write
5AAC000
trusted library allocation
page read and write
5F25000
trusted library allocation
page read and write
1143000
heap
page read and write
31AF000
stack
page read and write
5B04000
trusted library allocation
page read and write
1149000
heap
page read and write
602E000
trusted library allocation
page read and write
422E000
stack
page read and write
5ADD000
trusted library allocation
page read and write
10C0000
heap
page read and write
5EF0000
trusted library allocation
page read and write
1193000
heap
page read and write
382E000
stack
page read and write
5F23000
trusted library allocation
page read and write
5C3A000
trusted library allocation
page read and write
1150000
heap
page read and write
5F27000
trusted library allocation
page read and write
5B25000
trusted library allocation
page read and write
4F70000
direct allocation
page read and write
5B00000
trusted library allocation
page read and write
5F28000
trusted library allocation
page read and write
4F70000
direct allocation
page read and write
5B10000
trusted library allocation
page read and write
5B56000
trusted library allocation
page read and write
5AA8000
trusted library allocation
page read and write
2D10000
heap
page read and write
6F1000
unkown
page execute and read and write
602C000
trusted library allocation
page read and write
5AB9000
trusted library allocation
page read and write
4AD0000
direct allocation
page read and write
5AF4000
trusted library allocation
page read and write
744000
unkown
page execute and read and write
613D000
trusted library allocation
page read and write
1193000
heap
page read and write
5FE4000
trusted library allocation
page read and write
436E000
stack
page read and write
5B18000
trusted library allocation
page read and write
8AE000
unkown
page execute and write copy
5B3B000
trusted library allocation
page read and write
5B09000
trusted library allocation
page read and write
4AD0000
direct allocation
page read and write
5B0C000
trusted library allocation
page read and write
5BB9000
trusted library allocation
page read and write
4AE1000
heap
page read and write
5AA8000
trusted library allocation
page read and write
5B02000
trusted library allocation
page read and write
1128000
heap
page read and write
3BAF000
stack
page read and write
5B90000
trusted library allocation
page read and write
5E60000
trusted library allocation
page read and write
4AE1000
heap
page read and write
1186000
heap
page read and write
112B000
heap
page read and write
5FC6000
trusted library allocation
page read and write
1143000
heap
page read and write
5AC8000
trusted library allocation
page read and write
5F2F000
trusted library allocation
page read and write
1154000
heap
page read and write
5AB1000
trusted library allocation
page read and write
1149000
heap
page read and write
5FC5000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
4AE1000
heap
page read and write
5B4B000
trusted library allocation
page read and write
5B0B000
trusted library allocation
page read and write
9DA000
unkown
page execute and write copy
5B90000
trusted library allocation
page read and write
5B08000
trusted library allocation
page read and write
5A8D000
trusted library allocation
page read and write
522E000
stack
page read and write
5B06000
trusted library allocation
page read and write
11A0000
heap
page read and write
5AFE000
trusted library allocation
page read and write
4AD0000
direct allocation
page read and write
5F23000
trusted library allocation
page read and write
60AD000
trusted library allocation
page read and write
5B48000
trusted library allocation
page read and write
5B0B000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
5F23000
trusted library allocation
page read and write
46EF000
stack
page read and write
1154000
heap
page read and write
1113000
heap
page read and write
5FCC000
trusted library allocation
page read and write
5ABE000
trusted library allocation
page read and write
5F29000
trusted library allocation
page read and write
11B9000
heap
page read and write
1143000
heap
page read and write
5F29000
trusted library allocation
page read and write
5B1C000
trusted library allocation
page read and write
4AD0000
direct allocation
page read and write
5B36000
trusted library allocation
page read and write
1128000
heap
page read and write
614D000
trusted library allocation
page read and write
1143000
heap
page read and write
5B3C000
trusted library allocation
page read and write
5B25000
trusted library allocation
page read and write
5BB9000
trusted library allocation
page read and write
1184000
heap
page read and write
5A8D000
trusted library allocation
page read and write
5B10000
trusted library allocation
page read and write
482F000
stack
page read and write
5A96000
trusted library allocation
page read and write
5960000
trusted library allocation
page read and write
5A97000
trusted library allocation
page read and write
6041000
trusted library allocation
page read and write
6040000
trusted library allocation
page read and write
4AE1000
heap
page read and write
5AA7000
trusted library allocation
page read and write
1020000
heap
page read and write
5B63000
trusted library allocation
page read and write
1154000
heap
page read and write
5B90000
trusted library allocation
page read and write
5120000
direct allocation
page execute and read and write
5F2F000
trusted library allocation
page read and write
40AF000
stack
page read and write
5A8D000
trusted library allocation
page read and write
5B48000
trusted library allocation
page read and write
5AB4000
trusted library allocation
page read and write
50AF000
stack
page read and write
5A92000
trusted library allocation
page read and write
5F2A000
trusted library allocation
page read and write
1184000
heap
page read and write
532D000
stack
page read and write
4AF1000
heap
page read and write
96D000
unkown
page execute and read and write
5B11000
trusted library allocation
page read and write
8AB000
unkown
page execute and read and write
1149000
heap
page read and write
55AE000
stack
page read and write
5B00000
trusted library allocation
page read and write
5A93000
trusted library allocation
page read and write
4AE1000
heap
page read and write
50F0000
direct allocation
page execute and read and write
5B21000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
6480000
heap
page read and write
4AAF000
stack
page read and write
606F000
trusted library allocation
page read and write
1184000
heap
page read and write
5B06000
trusted library allocation
page read and write
5B09000
trusted library allocation
page read and write
602A000
trusted library allocation
page read and write
5B0B000
trusted library allocation
page read and write
14CE000
stack
page read and write
963000
unkown
page execute and read and write
5F20000
trusted library allocation
page read and write
5FEB000
trusted library allocation
page read and write
5A8A000
trusted library allocation
page read and write
5B99000
trusted library allocation
page read and write
113E000
heap
page read and write
1113000
heap
page read and write
931000
unkown
page execute and read and write
6171000
trusted library allocation
page execute read
5BD3000
trusted library allocation
page read and write
5B06000
trusted library allocation
page read and write
1161000
heap
page read and write
5B02000
trusted library allocation
page read and write
3D2E000
stack
page read and write
595C000
stack
page read and write
5B81000
trusted library allocation
page read and write
1154000
heap
page read and write
1128000
heap
page read and write
1040000
heap
page read and write
5B17000
trusted library allocation
page read and write
5B1C000
trusted library allocation
page read and write
601B000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
306F000
stack
page read and write
11AB000
heap
page read and write
5F20000
trusted library allocation
page read and write
5ABF000
trusted library allocation
page read and write
486E000
stack
page read and write
1149000
heap
page read and write
10CA000
heap
page read and write
5B08000
trusted library allocation
page read and write
110D000
heap
page read and write
5E28000
trusted library allocation
page read and write
10BE000
stack
page read and write
3A6F000
stack
page read and write
611E000
trusted library allocation
page read and write
5B0D000
trusted library allocation
page read and write
5ADD000
trusted library allocation
page read and write
578E000
stack
page read and write
5B22000
trusted library allocation
page read and write
5F2F000
trusted library allocation
page read and write
628D000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
6009000
trusted library allocation
page read and write
5B8A000
trusted library allocation
page read and write
1195000
heap
page read and write
5B90000
trusted library allocation
page read and write
1193000
heap
page read and write
5B19000
trusted library allocation
page read and write
112B000
heap
page read and write
5B02000
trusted library allocation
page read and write
5F2E000
trusted library allocation
page read and write
50F0000
direct allocation
page execute and read and write
9EA000
unkown
page execute and write copy
5B06000
trusted library allocation
page read and write
4AD0000
direct allocation
page read and write
5B02000
trusted library allocation
page read and write
94C000
unkown
page execute and write copy
5AAC000
trusted library allocation
page read and write
5B0B000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
5B18000
trusted library allocation
page read and write
9CF000
unkown
page execute and write copy
5B08000
trusted library allocation
page read and write
1154000
heap
page read and write
5B19000
trusted library allocation
page read and write
5AF4000
trusted library allocation
page read and write
53FC000
trusted library allocation
page read and write
10CE000
heap
page read and write
11B8000
heap
page read and write
4AE1000
heap
page read and write
5B33000
trusted library allocation
page read and write
113B000
heap
page read and write
1193000
heap
page read and write
45AF000
stack
page read and write
5E50000
trusted library allocation
page read and write
5B0B000
trusted library allocation
page read and write
9C6000
unkown
page execute and write copy
1149000
heap
page read and write
4AB0000
heap
page read and write
332E000
stack
page read and write
11A4000
heap
page read and write
1143000
heap
page read and write
5D81000
trusted library allocation
page read and write
5AAC000
trusted library allocation
page read and write
602F000
trusted library allocation
page read and write
113E000
heap
page read and write
119F000
heap
page read and write
5B06000
trusted library allocation
page read and write
5AAF000
trusted library allocation
page read and write
2D0B000
stack
page read and write
8E5000
unkown
page execute and read and write
11A6000
heap
page read and write
1184000
heap
page read and write
5B1C000
trusted library allocation
page read and write
4AE1000
heap
page read and write
119C000
heap
page read and write
615B000
trusted library allocation
page read and write
5CC8000
trusted library allocation
page read and write
6036000
trusted library allocation
page read and write
6067000
trusted library allocation
page read and write
5F2F000
trusted library allocation
page read and write
3FAE000
stack
page read and write
11AB000
heap
page read and write
5100000
direct allocation
page execute and read and write
5B06000
trusted library allocation
page read and write
5B99000
trusted library allocation
page read and write
5B0B000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
113E000
heap
page read and write
3E2F000
stack
page read and write
5B09000
trusted library allocation
page read and write
5F27000
trusted library allocation
page read and write
1149000
heap
page read and write
5B90000
trusted library allocation
page read and write
5B02000
trusted library allocation
page read and write
5FF3000
trusted library allocation
page read and write
50E0000
direct allocation
page execute and read and write
118C000
heap
page read and write
1149000
heap
page read and write
5B03000
trusted library allocation
page read and write
561D000
stack
page read and write
5B27000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
1184000
heap
page read and write
114D000
heap
page read and write
1149000
heap
page read and write
5AA3000
trusted library allocation
page read and write
1128000
heap
page read and write
496F000
stack
page read and write
40ED000
stack
page read and write
31EE000
stack
page read and write
11A6000
heap
page read and write
6F0000
unkown
page read and write
2E2F000
stack
page read and write
8E4000
unkown
page execute and write copy
49AE000
stack
page read and write
8BC000
unkown
page execute and read and write
5A8C000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
52DD000
trusted library allocation
page read and write
5B0D000
trusted library allocation
page read and write
5A97000
trusted library allocation
page read and write
11A6000
heap
page read and write
5B81000
trusted library allocation
page read and write
8D2000
unkown
page execute and write copy
5B08000
trusted library allocation
page read and write
5D8A000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
5F26000
trusted library allocation
page read and write
4AE1000
heap
page read and write
5B19000
trusted library allocation
page read and write
5B00000
trusted library allocation
page read and write
114D000
heap
page read and write
5FFA000
trusted library allocation
page read and write
5F22000
trusted library allocation
page read and write
1154000
heap
page read and write
5ABE000
trusted library allocation
page read and write
5B02000
trusted library allocation
page read and write
5B13000
trusted library allocation
page read and write
4AE1000
heap
page read and write
5BAF000
trusted library allocation
page read and write
118B000
heap
page read and write
5F23000
trusted library allocation
page read and write
5DA0000
trusted library allocation
page read and write
94E000
unkown
page execute and read and write
5AFA000
trusted library allocation
page read and write
5F24000
trusted library allocation
page read and write
1195000
heap
page read and write
4AD0000
direct allocation
page read and write
5B0C000
trusted library allocation
page read and write
5ABF000
trusted library allocation
page read and write
606E000
trusted library allocation
page read and write
4AD0000
direct allocation
page read and write
5B90000
trusted library allocation
page read and write
5B08000
trusted library allocation
page read and write
5B33000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
4AE0000
heap
page read and write
926000
unkown
page execute and write copy
5AF4000
trusted library allocation
page read and write
1185000
heap
page read and write
11BE000
heap
page read and write
5E58000
trusted library allocation
page read and write
5ACE000
trusted library allocation
page read and write
5B16000
trusted library allocation
page read and write
5AC6000
trusted library allocation
page read and write
5B16000
trusted library allocation
page read and write
342F000
stack
page read and write
571D000
stack
page read and write
4AE1000
heap
page read and write
5B16000
trusted library allocation
page read and write
9BE000
unkown
page execute and write copy
5B80000
trusted library allocation
page read and write
4AE1000
heap
page read and write
5A80000
trusted library allocation
page read and write
5B54000
trusted library allocation
page read and write
45EE000
stack
page read and write
5F23000
trusted library allocation
page read and write
11A5000
heap
page read and write
118B000
heap
page read and write
1050000
heap
page read and write
5B90000
trusted library allocation
page read and write
9D2000
unkown
page execute and read and write
5B90000
trusted library allocation
page read and write
5BAA000
trusted library allocation
page read and write
616D000
stack
page read and write
4AE1000
heap
page read and write
5FD7000
trusted library allocation
page read and write
5F23000
trusted library allocation
page read and write
1154000
heap
page read and write
5AFA000
trusted library allocation
page read and write
1184000
heap
page read and write
5B38000
trusted library allocation
page read and write
1199000
heap
page read and write
5AA1000
trusted library allocation
page read and write
11A6000
heap
page read and write
1149000
heap
page read and write
5B0D000
trusted library allocation
page read and write
1143000
heap
page read and write
6023000
trusted library allocation
page read and write
618F000
trusted library allocation
page read and write
5AB1000
trusted library allocation
page read and write
5B81000
trusted library allocation
page read and write
9E9000
unkown
page execute and read and write
3E6E000
stack
page read and write
5D83000
trusted library allocation
page read and write
5B08000
trusted library allocation
page read and write
5B18000
trusted library allocation
page read and write
5B04000
trusted library allocation
page read and write
5F22000
trusted library allocation
page read and write
11A6000
heap
page read and write
5B08000
trusted library allocation
page read and write
1147000
heap
page read and write
5F26000
trusted library allocation
page read and write
5BB1000
trusted library allocation
page read and write
5B19000
trusted library allocation
page read and write
605A000
trusted library allocation
page read and write
5B54000
trusted library allocation
page read and write
4AE1000
heap
page read and write
4F6E000
stack
page read and write
602C000
trusted library allocation
page read and write
5C1D000
trusted library allocation
page read and write
5A7F000
stack
page read and write
5BB9000
trusted library allocation
page read and write
1154000
heap
page read and write
1149000
heap
page read and write
1193000
heap
page read and write
1113000
heap
page read and write
5B19000
trusted library allocation
page read and write
6050000
trusted library allocation
page read and write
600B000
trusted library allocation
page read and write
5A93000
trusted library allocation
page read and write
4AE1000
heap
page read and write
5B03000
trusted library allocation
page read and write
910000
unkown
page execute and read and write
392F000
stack
page read and write
4AD0000
direct allocation
page read and write
5B18000
trusted library allocation
page read and write
11AD000
heap
page read and write
5B38000
trusted library allocation
page read and write
119D000
heap
page read and write
4AD0000
direct allocation
page read and write
1198000
heap
page read and write
112B000
heap
page read and write
5B2B000
trusted library allocation
page read and write
5B90000
trusted library allocation
page read and write
50F0000
direct allocation
page execute and read and write
DDA000
stack
page read and write
There are 720 hidden memdumps, click here to show them.