IOC Report
Contract #U2116 KB #U2013 08152024 - 1.pif.exe

loading gif

Files

File Path
Type
Category
Malicious
Contract #U2116 KB #U2013 08152024 - 1.pif.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Contract #U2116 KB #U2013 08152024 - 1.pif.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpFABF.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\pnizSfmxsGVsXD.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\pnizSfmxsGVsXD.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\pnizSfmxsGVsXD.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0vk1iw1y.ahk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fosrrkmq.4q5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jjgnn4id.djb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t4uzyaul.hl5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpC43.tmp
XML 1.0 document, ASCII text
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Contract #U2116 KB #U2013 08152024 - 1.pif.exe
"C:\Users\user\Desktop\Contract #U2116 KB #U2013 08152024 - 1.pif.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\pnizSfmxsGVsXD.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pnizSfmxsGVsXD" /XML "C:\Users\user\AppData\Local\Temp\tmpFABF.tmp"
malicious
C:\Users\user\Desktop\Contract #U2116 KB #U2013 08152024 - 1.pif.exe
"C:\Users\user\Desktop\Contract #U2116 KB #U2013 08152024 - 1.pif.exe"
malicious
C:\Users\user\AppData\Roaming\pnizSfmxsGVsXD.exe
C:\Users\user\AppData\Roaming\pnizSfmxsGVsXD.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pnizSfmxsGVsXD" /XML "C:\Users\user\AppData\Local\Temp\tmpC43.tmp"
malicious
C:\Users\user\AppData\Roaming\pnizSfmxsGVsXD.exe
"C:\Users\user\AppData\Roaming\pnizSfmxsGVsXD.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Text
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/sct
unknown
https://duckduckgo.com/chrome_newtab
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/sc/dk
unknown
https://duckduckgo.com/ac/?q=
unknown
http://tempuri.org/Entity/Id23ResponseD
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#HexBinary
unknown
http://tempuri.org/Entity/Id12Response
unknown
http://tempuri.org/
unknown
http://tempuri.org/Entity/Id2Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/sc/dk/p_sha1
unknown
http://tempuri.org/Entity/Id21Response
unknown
http://schemas.xmlsoap.org/2005/02/trust/spnego#GSS_Wrap
unknown
http://tempuri.org/Entity/Id9
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLID
unknown
http://tempuri.org/Entity/Id8
unknown
http://tempuri.org/Entity/Id5
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Prepare
unknown
http://tempuri.org/Entity/Id4
unknown
http://tempuri.org/Entity/Id7
unknown
http://purl.oen
unknown
http://tempuri.org/Entity/Id6
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust#BinarySecret
unknown
http://tempuri.org/Entity/Id19Response
unknown
http://docs.oasis-open.org/wss/oasis-wss-rel-token-profile-1.0.pdf#license
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Aborted
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/TerminateSequence
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/fault
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKey
unknown
http://tempuri.org/Entity/Id15Response
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Renew
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/Register
unknown
http://tempuri.org/Entity/Id6Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/SymmetricKey
unknown
https://api.ip.sb/ip
unknown
http://schemas.xmlsoap.org/ws/2004/04/sc
unknown
http://tempuri.org/Entity/Id1ResponseD
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Volatile2PC
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RSTR/SCT/Cancel
unknown
http://tempuri.org/Entity/Id9Response
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://tempuri.org/Entity/Id20
unknown
http://tempuri.org/Entity/Id21
unknown
http://tempuri.org/Entity/Id22
unknown
http://docs.oasis-open.org/wss/oasis-wss-kerberos-token-profile-1.1#Kerberosv5APREQSHA1
unknown
http://tempuri.org/Entity/Id23
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/CK/PSHA1
unknown
http://tempuri.org/Entity/Id24
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/Issue
unknown
http://tempuri.org/Entity/Id24Response
unknown
https://www.ecosia.org/newtab/
unknown
http://tempuri.org/Entity/Id1Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/rm/AckRequested
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/ReadOnly
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Replay
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/tlsnego
unknown
http://docs.oasis-open.org/wss/2004/01/oasis-200401-wss-soap-message-security-1.0#Base64Binary
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Durable2PC
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/SymmetricKey
unknown
http://schemas.xmlsoap.org/ws/2004/08/addressing
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/Issue
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Completion
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust
unknown
http://tempuri.org/Entity/Id10
unknown
http://tempuri.org/Entity/Id11
unknown
http://tempuri.org/Entity/Id12
unknown
http://tempuri.org/Entity/Id16Response
unknown
http://schemas.xmlsoap.org/ws/2004/10/wscoor/CreateCoordinationContextResponse
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/RST/SCT/Cancel
unknown
http://tempuri.org/Entity/Id13
unknown
http://tempuri.org/Entity/Id14
unknown
http://tempuri.org/Entity/Id15
unknown
http://tempuri.org/Entity/Id16
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Nonce
unknown
http://tempuri.org/Entity/Id17
unknown
http://tempuri.org/Entity/Id18
unknown
http://tempuri.org/Entity/Id5Response
unknown
http://tempuri.org/Entity/Id19
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/dns
unknown
http://tempuri.org/Entity/Id10Response
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/Renew
unknown
http://tempuri.org/Entity/Id8Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.1#SAMLV2.0
unknown
http://docs.oasis-open.org/wss/oasis-wss-saml-token-profile-1.0#SAMLAssertionID
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RST/SCT
unknown
http://schemas.xmlsoap.org/ws/2006/02/addressingidentity
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust/PublicKey
unknown
http://docs.oasis-open.org/wss/oasis-wss-soap-message-security-1.1#EncryptedKeySHA1
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://schemas.xmlsoap.org/ws/2005/02/trust
unknown
http://schemas.xmlsoap.org/ws/2004/10/wsat/Rollback
unknown
http://tempuri.org/Entity/Id3ResponseD
unknown
http://tempuri.org/Entity/Id23Response
unknown
http://schemas.xmlsoap.org/ws/2004/04/security/trust/RSTR/SCT
unknown
http://tempuri.org/D
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
141.98.10.33
unknown
Lithuania
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash

Memdumps

Base Address
Regiontype
Protect
Malicious
3026000
trusted library allocation
page read and write
malicious
2C66000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
387A000
trusted library allocation
page read and write
malicious
3820000
trusted library allocation
page read and write
malicious
3759000
trusted library allocation
page read and write
malicious
31FF000
trusted library allocation
page read and write
6B07000
heap
page read and write
14CE000
stack
page read and write
303C000
trusted library allocation
page read and write
56F0000
trusted library allocation
page read and write
8E1000
heap
page read and write
72EF000
stack
page read and write
5314000
trusted library allocation
page read and write
26E1000
trusted library allocation
page read and write
98DF000
stack
page read and write
6070000
trusted library allocation
page read and write
255D000
trusted library allocation
page read and write
3237000
trusted library allocation
page read and write
4C40000
trusted library allocation
page read and write
E2D000
trusted library allocation
page execute and read and write
FBE000
stack
page read and write
757E000
stack
page read and write
2BAE000
stack
page read and write
2B80000
heap
page read and write
3220000
trusted library allocation
page read and write
46E8000
trusted library allocation
page read and write
C5B000
heap
page read and write
4CCC000
stack
page read and write
32D5000
trusted library allocation
page read and write
2670000
trusted library allocation
page read and write
6D2E000
stack
page read and write
4BC0000
heap
page read and write
2D33000
trusted library allocation
page read and write
6DA7000
trusted library allocation
page read and write
9B5D000
stack
page read and write
5110000
trusted library allocation
page read and write
8AE000
heap
page read and write
4CE2000
trusted library allocation
page read and write
31D0000
trusted library allocation
page read and write
892000
trusted library allocation
page read and write
30E5000
trusted library allocation
page read and write
8035000
heap
page read and write
317F000
trusted library allocation
page read and write
33CC000
trusted library allocation
page read and write
36E9000
trusted library allocation
page read and write
2680000
heap
page read and write
2F80000
heap
page execute and read and write
7FDC000
heap
page read and write
3A42000
trusted library allocation
page read and write
E40000
trusted library allocation
page read and write
7978000
trusted library allocation
page read and write
4364000
trusted library allocation
page read and write
4F30000
heap
page read and write
B10000
trusted library allocation
page read and write
2BB0000
trusted library allocation
page read and write
6BF1000
heap
page read and write
30B0000
trusted library allocation
page read and write
6AF4000
trusted library allocation
page read and write
2BB8000
trusted library allocation
page read and write
2737000
trusted library allocation
page read and write
60FB000
stack
page read and write
4CE0000
trusted library allocation
page read and write
51DE000
trusted library allocation
page read and write
7F320000
trusted library allocation
page execute and read and write
6800000
heap
page read and write
656E000
heap
page read and write
5FB7000
heap
page read and write
A2AE000
stack
page read and write
53E8000
trusted library allocation
page read and write
5F38000
heap
page read and write
F95000
heap
page read and write
7AC0000
trusted library allocation
page execute and read and write
7F74000
heap
page read and write
2DC8000
trusted library allocation
page read and write
E57000
trusted library allocation
page execute and read and write
53A0000
heap
page read and write
69C0000
heap
page read and write
53E5000
trusted library allocation
page read and write
2B20000
trusted library allocation
page read and write
7FAB000
heap
page read and write
5D10000
heap
page read and write
5335000
trusted library allocation
page read and write
87D000
trusted library allocation
page execute and read and write
F90000
heap
page read and write
2740000
heap
page execute and read and write
433E000
trusted library allocation
page read and write
30A6000
trusted library allocation
page read and write
7DC0000
trusted library allocation
page execute and read and write
26F0000
trusted library allocation
page read and write
9A2000
trusted library allocation
page read and write
5590000
trusted library allocation
page read and write
4434000
trusted library allocation
page read and write
6589000
heap
page read and write
2D39000
trusted library allocation
page read and write
31E5000
trusted library allocation
page read and write
30E8000
trusted library allocation
page read and write
1337000
trusted library allocation
page execute and read and write
2B10000
trusted library allocation
page read and write
12DE000
stack
page read and write
4C16000
trusted library allocation
page read and write
8320000
heap
page read and write
2720000
trusted library section
page readonly
5120000
heap
page read and write
31D7000
trusted library allocation
page read and write
6F0E000
stack
page read and write
4CE3000
heap
page read and write
69B0000
heap
page read and write
798F000
trusted library allocation
page read and write
6C37000
heap
page read and write
6C85000
trusted library allocation
page read and write
1320000
trusted library allocation
page read and write
53C0000
trusted library allocation
page read and write
B3A000
trusted library allocation
page execute and read and write
C5FE000
stack
page read and write
27E1000
trusted library allocation
page read and write
2B90000
trusted library allocation
page read and write
BB0000
heap
page read and write
2BEF000
stack
page read and write
2B0E000
unkown
page read and write
4D0000
heap
page read and write
254E000
trusted library allocation
page read and write
60B0000
trusted library allocation
page read and write
30DD000
trusted library allocation
page read and write
26C0000
trusted library allocation
page execute and read and write
31CA000
trusted library allocation
page read and write
74D4000
trusted library allocation
page read and write
74CE000
stack
page read and write
33FF000
trusted library allocation
page read and write
46A000
stack
page read and write
5D00000
trusted library allocation
page read and write
870000
trusted library allocation
page read and write
9D9E000
stack
page read and write
4C70000
heap
page read and write
30F9000
trusted library allocation
page read and write
3320000
trusted library allocation
page read and write
30EF000
trusted library allocation
page read and write
4439000
trusted library allocation
page read and write
65C4000
heap
page read and write
6D80000
trusted library allocation
page read and write
883000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
6D4C000
stack
page read and write
A1AD000
stack
page read and write
6F10000
trusted library allocation
page execute and read and write
C5BE000
stack
page read and write
79E5000
trusted library allocation
page read and write
6C3A000
heap
page read and write
3091000
trusted library allocation
page read and write
51E1000
trusted library allocation
page read and write
3037000
trusted library allocation
page read and write
3FEA000
trusted library allocation
page read and write
4C36000
trusted library allocation
page read and write
5C6E000
stack
page read and write
26D0000
heap
page read and write
10B0000
heap
page read and write
63CE000
stack
page read and write
6BA1000
heap
page read and write
10BF000
stack
page read and write
7A5E000
stack
page read and write
436A000
trusted library allocation
page read and write
36E1000
trusted library allocation
page read and write
7B1E000
stack
page read and write
31F0000
trusted library allocation
page read and write
43A9000
trusted library allocation
page read and write
6270000
trusted library allocation
page execute and read and write
51D2000
trusted library allocation
page read and write
5CF0000
trusted library allocation
page read and write
43B5000
trusted library allocation
page read and write
2751000
trusted library allocation
page read and write
320F000
trusted library allocation
page read and write
E70000
trusted library allocation
page read and write
3420000
trusted library allocation
page read and write
4BFB000
trusted library allocation
page read and write
487C000
stack
page read and write
6C30000
trusted library allocation
page read and write
D1C000
heap
page read and write
43CE000
trusted library allocation
page read and write
9C9E000
stack
page read and write
1147000
heap
page read and write
2C30000
heap
page read and write
3F91000
trusted library allocation
page read and write
2F70000
trusted library allocation
page read and write
A10000
heap
page read and write
7530000
heap
page read and write
C4BD000
stack
page read and write
266F000
unkown
page read and write
50FE000
stack
page read and write
C23F000
stack
page read and write
6D50000
trusted library allocation
page read and write
1303000
trusted library allocation
page execute and read and write
6DA0000
trusted library allocation
page read and write
56D2000
trusted library allocation
page read and write
4427000
trusted library allocation
page read and write
4193000
trusted library allocation
page read and write
64E0000
heap
page read and write
2B02000
trusted library allocation
page read and write
600E000
stack
page read and write
C0FE000
stack
page read and write
11B0000
heap
page read and write
443F000
trusted library allocation
page read and write
26C2000
trusted library allocation
page read and write
60A0000
trusted library allocation
page read and write
5D30000
trusted library allocation
page execute and read and write
6ECE000
stack
page read and write
31D8000
trusted library allocation
page read and write
30E9000
trusted library allocation
page read and write
64DA000
heap
page read and write
2AF1000
trusted library allocation
page read and write
3BF1000
trusted library allocation
page read and write
E3D000
trusted library allocation
page execute and read and write
9EDF000
stack
page read and write
90A000
heap
page read and write
7FF5000
heap
page read and write
984000
heap
page read and write
E55000
trusted library allocation
page execute and read and write
692E000
stack
page read and write
5340000
trusted library allocation
page read and write
2669000
stack
page read and write
253B000
trusted library allocation
page read and write
2570000
trusted library allocation
page read and write
7AB0000
trusted library allocation
page read and write
B14000
trusted library allocation
page read and write
4185000
trusted library allocation
page read and write
6D7A000
trusted library allocation
page read and write
39B9000
trusted library allocation
page read and write
A27000
heap
page read and write
2B15000
trusted library allocation
page read and write
5590000
heap
page execute and read and write
2A38000
trusted library allocation
page read and write
7DBE000
stack
page read and write
446000
remote allocation
page execute and read and write
60F0000
trusted library allocation
page execute and read and write
4BF0000
trusted library allocation
page read and write
436F000
trusted library allocation
page read and write
8C8000
heap
page read and write
AF7000
stack
page read and write
4F40000
trusted library allocation
page execute and read and write
4C0E000
trusted library allocation
page read and write
6E1E000
stack
page read and write
79E0000
trusted library allocation
page read and write
3204000
trusted library allocation
page read and write
95D0000
heap
page read and write
8E8000
heap
page read and write
5F89000
heap
page read and write
29EE000
stack
page read and write
2AD0000
trusted library allocation
page read and write
60D0000
trusted library allocation
page read and write
3253000
trusted library allocation
page read and write
60C0000
trusted library allocation
page execute and read and write
3C55000
trusted library allocation
page read and write
7965000
trusted library allocation
page read and write
2D63000
trusted library allocation
page read and write
25A0000
heap
page read and write
6DC0000
heap
page read and write
32DE000
trusted library allocation
page read and write
7370000
trusted library allocation
page read and write
7962000
trusted library allocation
page read and write
3216000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
97DF000
stack
page read and write
1360000
trusted library allocation
page execute and read and write
434B000
trusted library allocation
page read and write
3301000
trusted library allocation
page read and write
B23000
trusted library allocation
page read and write
51AE000
stack
page read and write
68E0000
trusted library allocation
page read and write
43ED000
trusted library allocation
page read and write
B42000
trusted library allocation
page read and write
6521000
heap
page read and write
30D6000
trusted library allocation
page read and write
51C6000
trusted library allocation
page read and write
1350000
trusted library allocation
page read and write
43A6000
trusted library allocation
page read and write
4C6C000
stack
page read and write
6C80000
trusted library allocation
page read and write
5CC0000
trusted library allocation
page read and write
890000
trusted library allocation
page read and write
332C000
trusted library allocation
page read and write
1310000
trusted library allocation
page read and write
7FC10000
trusted library allocation
page execute and read and write
706E000
stack
page read and write
5530000
trusted library allocation
page read and write
10FE000
stack
page read and write
2D5F000
trusted library allocation
page read and write
2AFD000
trusted library allocation
page read and write
6A2F000
stack
page read and write
65B1000
heap
page read and write
6B54000
heap
page read and write
8CE000
heap
page read and write
8039000
heap
page read and write
9A5D000
stack
page read and write
7FA000
stack
page read and write
6561000
heap
page read and write
43A4000
trusted library allocation
page read and write
2530000
trusted library allocation
page read and write
30AE000
trusted library allocation
page read and write
B13000
trusted library allocation
page execute and read and write
8A0000
heap
page read and write
3B0000
heap
page read and write
89A000
trusted library allocation
page execute and read and write
53C2000
trusted library allocation
page read and write
65BA000
heap
page read and write
5330000
trusted library allocation
page read and write
6D52000
trusted library allocation
page read and write
5EC2000
heap
page read and write
860000
heap
page read and write
3949000
trusted library allocation
page read and write
113C000
stack
page read and write
6B50000
heap
page read and write
30EF000
trusted library allocation
page read and write
B47000
trusted library allocation
page execute and read and write
73CB000
stack
page read and write
4C90000
trusted library allocation
page read and write
613E000
stack
page read and write
56BE000
trusted library allocation
page read and write
30F3000
trusted library allocation
page read and write
27A2000
trusted library allocation
page read and write
43E2000
trusted library allocation
page read and write
A2EE000
stack
page read and write
30ED000
trusted library allocation
page read and write
C30000
heap
page read and write
514D000
stack
page read and write
313F000
trusted library allocation
page read and write
6850000
trusted library section
page read and write
35DB000
trusted library allocation
page read and write
556E000
stack
page read and write
6BE0000
trusted library allocation
page read and write
C69000
heap
page read and write
798A000
trusted library allocation
page read and write
654E000
heap
page read and write
B60000
heap
page read and write
EA3000
heap
page read and write
960E000
heap
page read and write
864E000
stack
page read and write
2556000
trusted library allocation
page read and write
3219000
trusted library allocation
page read and write
4414000
trusted library allocation
page read and write
7F6C000
heap
page read and write
6090000
trusted library allocation
page execute and read and write
30C9000
trusted library allocation
page read and write
F90000
heap
page read and write
4C1D000
trusted library allocation
page read and write
1304000
trusted library allocation
page read and write
3104000
trusted library allocation
page read and write
432000
remote allocation
page execute and read and write
4F90000
heap
page read and write
7B9E000
stack
page read and write
10AE000
stack
page read and write
6CEE000
stack
page read and write
EA0000
heap
page read and write
E52000
trusted library allocation
page read and write
30C6000
trusted library allocation
page read and write
52EE000
trusted library allocation
page read and write
5440000
trusted library allocation
page read and write
2D45000
trusted library allocation
page read and write
3547000
trusted library allocation
page read and write
B2D000
trusted library allocation
page execute and read and write
415E000
trusted library allocation
page read and write
202000
unkown
page readonly
6570000
heap
page read and write
A3EF000
stack
page read and write
F8E000
stack
page read and write
3751000
trusted library allocation
page read and write
9A7000
trusted library allocation
page execute and read and write
4430000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
33F8000
trusted library allocation
page read and write
56CA000
trusted library allocation
page read and write
51BB000
trusted library allocation
page read and write
26E0000
heap
page read and write
4C93000
heap
page read and write
53D0000
trusted library allocation
page execute and read and write
6C50000
trusted library allocation
page execute and read and write
6AB0000
heap
page read and write
550F000
stack
page read and write
4C90000
heap
page read and write
5100000
trusted library allocation
page read and write
5F2D000
heap
page read and write
5540000
trusted library allocation
page execute and read and write
516E000
stack
page read and write
4ED0000
heap
page read and write
DBE000
stack
page read and write
321B000
trusted library allocation
page read and write
4C50000
trusted library allocation
page read and write
9C0000
trusted library allocation
page read and write
13BE000
stack
page read and write
52D7000
trusted library allocation
page read and write
6D75000
trusted library allocation
page read and write
3042000
trusted library allocation
page read and write
E50000
trusted library allocation
page read and write
26C0000
trusted library allocation
page read and write
30FB000
trusted library allocation
page read and write
484B000
stack
page read and write
7958000
trusted library allocation
page read and write
56E0000
trusted library allocation
page read and write
2AEE000
trusted library allocation
page read and write
5F46000
heap
page read and write
5F0F000
heap
page read and write
4FE0000
trusted library allocation
page read and write
1140000
heap
page read and write
6AD6000
heap
page read and write
2D61000
trusted library allocation
page read and write
5FFC000
stack
page read and write
32F4000
trusted library allocation
page read and write
A10000
trusted library allocation
page execute and read and write
43FF000
trusted library allocation
page read and write
64CE000
stack
page read and write
5320000
trusted library allocation
page read and write
7F9F000
heap
page read and write
43DB000
trusted library allocation
page read and write
4F70000
trusted library allocation
page read and write
6D55000
trusted library allocation
page read and write
438A000
trusted library allocation
page read and write
56D0000
trusted library allocation
page read and write
A16C000
stack
page read and write
8026000
heap
page read and write
3032000
trusted library allocation
page read and write
2D95000
trusted library allocation
page read and write
6050000
trusted library allocation
page read and write
7944000
trusted library allocation
page read and write
51B0000
trusted library allocation
page read and write
2A06000
trusted library allocation
page read and write
51F6000
trusted library allocation
page read and write
626C000
stack
page read and write
437000
remote allocation
page execute and read and write
960A000
heap
page read and write
131D000
trusted library allocation
page execute and read and write
4C30000
trusted library allocation
page read and write
5FA6000
heap
page read and write
520B000
trusted library allocation
page read and write
330E000
trusted library allocation
page read and write
5EC4000
heap
page read and write
64D0000
heap
page read and write
4BE0000
trusted library allocation
page read and write
3FB1000
trusted library allocation
page read and write
3FB3000
trusted library allocation
page read and write
5D40000
trusted library allocation
page execute and read and write
C8F000
stack
page read and write
5F41000
heap
page read and write
1300000
trusted library allocation
page read and write
7950000
trusted library allocation
page read and write
88D000
trusted library allocation
page execute and read and write
CBF000
stack
page read and write
309D000
trusted library allocation
page read and write
7985000
trusted library allocation
page read and write
627E000
stack
page read and write
33ED000
trusted library allocation
page read and write
5210000
heap
page execute and read and write
4E9000
stack
page read and write
880000
trusted library allocation
page read and write
2A3F000
stack
page read and write
53E0000
trusted library allocation
page read and write
5205000
trusted library allocation
page read and write
CBFE000
stack
page read and write
6AE6000
trusted library allocation
page read and write
3C0000
heap
page read and write
386B000
trusted library allocation
page read and write
56A1000
trusted library allocation
page read and write
2562000
trusted library allocation
page read and write
2B60000
heap
page read and write
797A000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
9DDD000
stack
page read and write
52D4000
trusted library allocation
page read and write
52D0000
trusted library allocation
page read and write
2732000
trusted library allocation
page read and write
4F80000
heap
page read and write
C25000
heap
page read and write
5F82000
heap
page read and write
3F9F000
trusted library allocation
page read and write
5F96000
heap
page read and write
4FC0000
heap
page read and write
56D5000
trusted library allocation
page read and write
30F5000
trusted library allocation
page read and write
2BA0000
trusted library allocation
page execute and read and write
6D88000
trusted library allocation
page read and write
3BDF000
trusted library allocation
page read and write
7ABE000
trusted library allocation
page read and write
652A000
heap
page read and write
64F4000
heap
page read and write
6D68000
trusted library allocation
page read and write
896000
trusted library allocation
page execute and read and write
B30000
trusted library allocation
page read and write
961B000
heap
page read and write
A80000
heap
page read and write
53A3000
heap
page read and write
70CE000
stack
page read and write
4F1B000
stack
page read and write
2D69000
trusted library allocation
page read and write
6AAE000
stack
page read and write
5F6E000
heap
page read and write
2BD0000
heap
page read and write
CABC000
stack
page read and write
4391000
trusted library allocation
page read and write
4CD0000
trusted library section
page read and write
2F91000
trusted library allocation
page read and write
7E36000
heap
page read and write
5F8F000
heap
page read and write
3212000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
BFE000
stack
page read and write
780000
trusted library allocation
page read and write
53B0000
heap
page read and write
B32000
trusted library allocation
page read and write
333C000
trusted library allocation
page read and write
7FE9000
heap
page read and write
65A4000
heap
page read and write
B4B000
trusted library allocation
page execute and read and write
3327000
trusted library allocation
page read and write
2D3F000
trusted library allocation
page read and write
A17000
heap
page read and write
8EA000
heap
page read and write
4C22000
trusted library allocation
page read and write
A0E000
stack
page read and write
658F000
heap
page read and write
33AD000
trusted library allocation
page read and write
6060000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
6E00000
trusted library allocation
page read and write
52FD000
trusted library allocation
page read and write
389C000
trusted library allocation
page read and write
1332000
trusted library allocation
page read and write
732E000
stack
page read and write
26D0000
trusted library allocation
page execute and read and write
7969000
trusted library allocation
page read and write
C20000
heap
page read and write
8F6000
heap
page read and write
C27D000
stack
page read and write
520E000
trusted library allocation
page read and write
8AD000
stack
page read and write
3315000
trusted library allocation
page read and write
5F02000
heap
page read and write
30A1000
trusted library allocation
page read and write
5FAE000
heap
page read and write
74E0000
trusted library allocation
page read and write
583F000
stack
page read and write
3409000
trusted library allocation
page read and write
B1D000
trusted library allocation
page execute and read and write
3404000
trusted library allocation
page read and write
655C000
heap
page read and write
1322000
trusted library allocation
page read and write
7E31000
heap
page read and write
653E000
heap
page read and write
25B8000
trusted library allocation
page read and write
4FA0000
heap
page read and write
5581000
trusted library allocation
page read and write
6DD0000
trusted library allocation
page execute and read and write
53EA000
trusted library allocation
page read and write
6D6F000
trusted library allocation
page read and write
2AF6000
trusted library allocation
page read and write
2580000
trusted library allocation
page read and write
821E000
stack
page read and write
662E000
stack
page read and write
6506000
heap
page read and write
3191000
trusted library allocation
page read and write
326E000
trusted library allocation
page read and write
95CE000
stack
page read and write
6F7000
stack
page read and write
6CA0000
trusted library allocation
page execute and read and write
56A6000
trusted library allocation
page read and write
4F50000
heap
page execute and read and write
4D30000
trusted library section
page readonly
BFFE000
stack
page read and write
33C0000
trusted library allocation
page read and write
133B000
trusted library allocation
page execute and read and write
5690000
trusted library allocation
page read and write
6AE3000
trusted library allocation
page read and write
2F5C000
stack
page read and write
4EED000
stack
page read and write
850000
heap
page read and write
5ED2000
heap
page read and write
2B40000
trusted library allocation
page read and write
94CE000
stack
page read and write
4436000
trusted library allocation
page read and write
A06B000
stack
page read and write
8E3000
heap
page read and write
6B59000
heap
page read and write
43AF000
trusted library allocation
page read and write
43FA000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
356E000
trusted library allocation
page read and write
43A0000
trusted library allocation
page read and write
6E10000
heap
page read and write
4421000
trusted library allocation
page read and write
6D85000
trusted library allocation
page read and write
30AD000
trusted library allocation
page read and write
1616000
heap
page read and write
417B000
trusted library allocation
page read and write
F97000
heap
page read and write
5090000
heap
page read and write
5710000
trusted library allocation
page execute and read and write
77E000
stack
page read and write
5EC0000
heap
page read and write
4C80000
trusted library allocation
page execute and read and write
BAE000
stack
page read and write
5D70000
trusted library allocation
page read and write
3991000
trusted library allocation
page read and write
532E000
trusted library allocation
page read and write
4C34000
trusted library allocation
page read and write
160B000
stack
page read and write
5045000
heap
page read and write
52DE000
trusted library allocation
page read and write
1330000
trusted library allocation
page read and write
5ED000
stack
page read and write
51EA000
trusted library allocation
page read and write
5EA0000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
5F58000
heap
page read and write
2590000
trusted library allocation
page read and write
623C000
stack
page read and write
5F2A000
heap
page read and write
55A0000
trusted library allocation
page read and write
CAFE000
stack
page read and write
440A000
trusted library allocation
page read and write
30BC000
trusted library allocation
page read and write
991E000
stack
page read and write
6D58000
trusted library allocation
page read and write
6C35000
trusted library allocation
page read and write
6D72000
trusted library allocation
page read and write
593E000
stack
page read and write
EF7000
stack
page read and write
6C60000
trusted library allocation
page read and write
5040000
heap
page read and write
30F4000
trusted library allocation
page read and write
8C9000
heap
page read and write
9A1F000
stack
page read and write
73E000
stack
page read and write
31F2000
trusted library allocation
page read and write
437A000
trusted library allocation
page read and write
3BD1000
trusted library allocation
page read and write
31E3000
trusted library allocation
page read and write
6D6A000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
3186000
trusted library allocation
page read and write
2F74000
trusted library allocation
page read and write
1326000
trusted library allocation
page execute and read and write
7940000
trusted library allocation
page read and write
2690000
heap
page read and write
E46000
trusted library allocation
page execute and read and write
F40000
heap
page read and write
6AF0000
trusted library allocation
page read and write
6576000
heap
page read and write
C13E000
stack
page read and write
C73D000
stack
page read and write
1117000
heap
page read and write
569B000
trusted library allocation
page read and write
E5B000
trusted library allocation
page execute and read and write
EB0000
heap
page read and write
543E000
stack
page read and write
5360000
trusted library allocation
page read and write
10E8000
heap
page read and write
2D67000
trusted library allocation
page read and write
8E6000
heap
page read and write
27E0000
heap
page read and write
B00000
trusted library allocation
page read and write
26B0000
heap
page execute and read and write
972000
heap
page read and write
10E0000
heap
page read and write
4CD0000
heap
page read and write
6555000
heap
page read and write
2534000
trusted library allocation
page read and write
110A000
heap
page read and write
4F85000
heap
page read and write
2D6D000
trusted library allocation
page read and write
401B000
trusted library allocation
page read and write
3414000
trusted library allocation
page read and write
26E8000
heap
page read and write
5CB0000
trusted library allocation
page execute and read and write
6DB0000
trusted library allocation
page execute and read and write
2BC0000
heap
page execute and read and write
33B6000
trusted library allocation
page read and write
2B0000
unkown
page readonly
E20000
trusted library allocation
page read and write
5EEE000
heap
page read and write
12F0000
trusted library allocation
page read and write
2B4F000
unkown
page read and write
4F20000
heap
page read and write
A20000
heap
page read and write
B60000
trusted library allocation
page read and write
3258000
trusted library allocation
page read and write
4397000
trusted library allocation
page read and write
26E0000
heap
page read and write
3C0B000
trusted library allocation
page read and write
5EE000
unkown
page read and write
52F1000
trusted library allocation
page read and write
7E20000
heap
page read and write
5030000
trusted library allocation
page read and write
3348000
trusted library allocation
page read and write
C9BC000
stack
page read and write
3FC2000
trusted library allocation
page read and write
269A000
heap
page read and write
318D000
trusted library allocation
page read and write
322B000
trusted library allocation
page read and write
1610000
heap
page read and write
5310000
trusted library allocation
page read and write
7AA0000
trusted library allocation
page read and write
439B000
trusted library allocation
page read and write
795000
heap
page read and write
3207000
trusted library allocation
page read and write
6D7F000
trusted library allocation
page read and write
43C1000
trusted library allocation
page read and write
3263000
trusted library allocation
page read and write
5F50000
heap
page read and write
E42000
trusted library allocation
page read and write
4C55000
trusted library allocation
page read and write
56C1000
trusted library allocation
page read and write
C37D000
stack
page read and write
8D6000
heap
page read and write
6E5F000
stack
page read and write
C380000
heap
page read and write
39FB000
trusted library allocation
page read and write
6F6E000
stack
page read and write
34A000
stack
page read and write
51F1000
trusted library allocation
page read and write
32E8000
trusted library allocation
page read and write
5EB0000
trusted library allocation
page execute and read and write
51C1000
trusted library allocation
page read and write
4BF4000
trusted library allocation
page read and write
6080000
trusted library allocation
page execute and read and write
8C0000
heap
page read and write
5150000
heap
page read and write
5EA3000
trusted library allocation
page read and write
2BBA000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
55B0000
trusted library allocation
page execute and read and write
7A9F000
stack
page read and write
6D59000
trusted library allocation
page read and write
95DE000
stack
page read and write
2D42000
trusted library allocation
page read and write
6D50000
trusted library allocation
page read and write
13C0000
heap
page read and write
5510000
trusted library allocation
page read and write
790000
heap
page read and write
736E000
stack
page read and write
29F0000
trusted library allocation
page read and write
6AE0000
trusted library allocation
page read and write
42D000
stack
page read and write
7F0B0000
trusted library allocation
page execute and read and write
4C11000
trusted library allocation
page read and write
2B92000
trusted library allocation
page read and write
6547000
heap
page read and write
3376000
trusted library allocation
page read and write
3DFA000
trusted library allocation
page read and write
4FDB000
heap
page read and write
3928000
trusted library allocation
page read and write
9B60000
heap
page read and write
637C000
stack
page read and write
8A66000
heap
page read and write
6100000
trusted library allocation
page execute and read and write
6DAC000
stack
page read and write
69AE000
stack
page read and write
5F14000
heap
page read and write
161E000
heap
page read and write
E80000
trusted library allocation
page execute and read and write
52F6000
trusted library allocation
page read and write
5EFC000
heap
page read and write
442B000
trusted library allocation
page read and write
6E80000
trusted library allocation
page read and write
31C1000
trusted library allocation
page read and write
79F0000
trusted library allocation
page read and write
33D9000
trusted library allocation
page read and write
6E60000
trusted library allocation
page read and write
31D5000
trusted library allocation
page read and write
503B000
trusted library allocation
page read and write
2BB5000
trusted library allocation
page read and write
2650000
trusted library allocation
page read and write
2EFC000
trusted library allocation
page read and write
3331000
trusted library allocation
page read and write
65D0000
trusted library allocation
page read and write
114A000
heap
page read and write
6DB0000
trusted library allocation
page read and write
3840000
trusted library allocation
page read and write
1370000
heap
page read and write
E24000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
2A10000
trusted library allocation
page read and write
5160000
heap
page read and write
797F000
trusted library allocation
page read and write
8A50000
heap
page read and write
5200000
trusted library allocation
page read and write
873000
trusted library allocation
page execute and read and write
3066000
trusted library allocation
page read and write
56DB000
trusted library allocation
page read and write
4DE0000
heap
page execute and read and write
56B2000
trusted library allocation
page read and write
961000
heap
page read and write
F8C000
stack
page read and write
15CF000
stack
page read and write
7FD7000
heap
page read and write
39B5000
trusted library allocation
page read and write
831E000
stack
page read and write
961E000
stack
page read and write
5520000
trusted library allocation
page read and write
377C000
trusted library allocation
page read and write
33BE000
trusted library allocation
page read and write
4352000
trusted library allocation
page read and write
A6C000
stack
page read and write
3812000
trusted library allocation
page read and write
D0D000
heap
page read and write
C83F000
stack
page read and write
3F23000
trusted library allocation
page read and write
398B000
trusted library allocation
page read and write
26B0000
heap
page read and write
2BD1000
trusted library allocation
page read and write
65A7000
heap
page read and write
95FA000
heap
page read and write
E10000
trusted library allocation
page read and write
1335000
trusted library allocation
page execute and read and write
6584000
heap
page read and write
7B5E000
stack
page read and write
71EE000
stack
page read and write
7960000
trusted library allocation
page read and write
E4A000
trusted library allocation
page execute and read and write
252F000
stack
page read and write
56DE000
trusted library allocation
page read and write
114E000
heap
page read and write
939000
heap
page read and write
4384000
trusted library allocation
page read and write
A70000
trusted library allocation
page read and write
9AB000
trusted library allocation
page execute and read and write
2670000
heap
page read and write
441A000
trusted library allocation
page read and write
9FD000
stack
page read and write
907000
heap
page read and write
552E000
stack
page read and write
2ADB000
trusted library allocation
page read and write
BAE000
stack
page read and write
2A20000
heap
page read and write
32E6000
trusted library allocation
page read and write
7FC3000
heap
page read and write
2595000
trusted library allocation
page read and write
540F000
stack
page read and write
130D000
trusted library allocation
page execute and read and write
5700000
trusted library allocation
page read and write
37C7000
trusted library allocation
page read and write
4CE0000
heap
page read and write
200000
unkown
page readonly
6B95000
heap
page read and write
6E70000
trusted library allocation
page execute and read and write
435D000
trusted library allocation
page read and write
B8E000
stack
page read and write
6B65000
heap
page read and write
4CF0000
trusted library allocation
page execute and read and write
6F1D000
stack
page read and write
5730000
heap
page read and write
27CE000
stack
page read and write
7AD0000
trusted library allocation
page read and write
74F0000
heap
page read and write
3583000
trusted library allocation
page read and write
33E6000
trusted library allocation
page read and write
2D48000
trusted library allocation
page read and write
321D000
trusted library allocation
page read and write
7F630000
trusted library allocation
page execute and read and write
E23000
trusted library allocation
page execute and read and write
2851000
trusted library allocation
page read and write
5CE0000
trusted library allocation
page execute and read and write
405D000
trusted library allocation
page read and write
B36000
trusted library allocation
page execute and read and write
E90000
trusted library allocation
page read and write
2730000
heap
page read and write
6C06000
heap
page read and write
26AF000
stack
page read and write
2D36000
trusted library allocation
page read and write
BB0000
heap
page read and write
329E000
trusted library allocation
page read and write
69AC000
stack
page read and write
7F20000
heap
page read and write
2551000
trusted library allocation
page read and write
132A000
trusted library allocation
page execute and read and write
874000
trusted library allocation
page read and write
BDA000
stack
page read and write
6B8C000
heap
page read and write
31C7000
trusted library allocation
page read and write
7955000
trusted library allocation
page read and write
4C60000
trusted library allocation
page read and write
C6FE000
stack
page read and write
26D0000
heap
page read and write
5F9F000
heap
page read and write
2A1E000
trusted library allocation
page read and write
4D00000
trusted library allocation
page read and write
5302000
trusted library allocation
page read and write
5E7000
stack
page read and write
659E000
heap
page read and write
6C2E000
stack
page read and write
60E0000
trusted library allocation
page read and write
52DB000
trusted library allocation
page read and write
2A04000
trusted library allocation
page read and write
79E2000
trusted library allocation
page read and write
43F4000
trusted library allocation
page read and write
9770000
trusted library allocation
page read and write
5F7C000
heap
page read and write
3C13000
trusted library allocation
page read and write
962B000
heap
page read and write
2AD4000
trusted library allocation
page read and write
3176000
trusted library allocation
page read and write
31FD000
trusted library allocation
page read and write
2A00000
trusted library allocation
page read and write
4C80000
trusted library allocation
page read and write
There are 890 hidden memdumps, click here to show them.