IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_nslookup.exe_3c5336c3a91c2d57579c766c54c3ffcf93cb0a8_d8dedb28_c4ffb878-36ea-48a3-949b-383c3d1710f8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_nslookup.exe_64fbbdcacf35376b87949de1959088ed3364abd_d8dedb28_066a074e-8a60-45db-8770-e67f5e74a0b0\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\383775\Fridge.pif
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_bad_module_info_f5b4a6202a53ee73c263cc4c99e711b13cd935ac_85207d7d_5197b056-45af-426f-a652-3994f53f1be0\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER82F2.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Sep 28 22:54:26 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER83DD.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER83FD.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9997.tmp.dmp
Mini DuMP crash report, 15 streams, Sat Sep 28 22:54:32 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9A63.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER9A83.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA522.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERA542.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\383775\C
data
dropped
C:\Users\user\AppData\Local\Temp\Depending
data
dropped
C:\Users\user\AppData\Local\Temp\Depression
data
dropped
C:\Users\user\AppData\Local\Temp\Did
data
dropped
C:\Users\user\AppData\Local\Temp\Gathering
data
dropped
C:\Users\user\AppData\Local\Temp\Interface
data
dropped
C:\Users\user\AppData\Local\Temp\Jacket
data
dropped
C:\Users\user\AppData\Local\Temp\Messenger
ASCII text, with very long lines (1111), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Messenger.bat (copy)
ASCII text, with very long lines (1111), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Populations
data
dropped
C:\Users\user\AppData\Local\Temp\Proposals
data
dropped
C:\Users\user\AppData\Local\Temp\WERA511.tmp.WERDataCollectionStatus.txt
Unicode text, UTF-16, little-endian text, with CRLF, LF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Zip
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 17 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c move Messenger Messenger.bat & Messenger.bat
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "wrsa opssvc"
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /I "avastui avgui bdservicehost nswscsvc sophoshealth"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c md 383775
malicious
C:\Windows\SysWOW64\findstr.exe
findstr /V "ManufacturedBuyingTouchSecond" Jacket
malicious
C:\Windows\SysWOW64\cmd.exe
cmd /c copy /b ..\Interface + ..\Populations + ..\Gathering + ..\Did + ..\Depression + ..\Depending + ..\Proposals C
malicious
C:\Users\user\AppData\Local\Temp\383775\Fridge.pif
Fridge.pif C
malicious
C:\Windows\SysWOW64\nslookup.exe
C:\Windows\SysWOW64\nslookup.exe
malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\tasklist.exe
tasklist
C:\Windows\SysWOW64\choice.exe
choice /d y /t 5
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 1608
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 1620
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 6200 -s 1608
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
fragnantbui.shop
malicious
gutterydhowi.shop
malicious
offensivedzvju.shop
malicious
https://gutterydhowi.shop/api
172.67.132.32
malicious
drawzhotdog.shop
malicious
ghostreedmnu.shop
malicious
stogeneratmns.shop
malicious
reinforcenh.shop
malicious
vozmeatillu.shop
malicious
http://www.autoitscript.com/autoit3/J
unknown
http://upx.sf.net
unknown
https://gutterydhowi.shop/
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.autoitscript.com/autoit3/
unknown
https://gutterydhowi.shop/apiLD
unknown
https://gutterydhowi.shop/t
unknown
https://gutterydhowi.shop/api;
unknown
There are 7 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
gutterydhowi.shop
172.67.132.32
malicious
nrbDrRupdENT.nrbDrRupdENT
unknown

IPs

IP
Domain
Country
Malicious
172.67.132.32
gutterydhowi.shop
United States
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{640d53e8-e3c3-cdcb-9384-00210a455653}\Root\InventoryApplicationFile\nslookup.exe|3eeaeaa523b6285d
ProgramId
malicious
\REGISTRY\A\{640d53e8-e3c3-cdcb-9384-00210a455653}\Root\InventoryApplicationFile\nslookup.exe|3eeaeaa523b6285d
FileId
malicious
\REGISTRY\A\{640d53e8-e3c3-cdcb-9384-00210a455653}\Root\InventoryApplicationFile\nslookup.exe|3eeaeaa523b6285d
LowerCaseLongPath
malicious
\REGISTRY\A\{640d53e8-e3c3-cdcb-9384-00210a455653}\Root\InventoryApplicationFile\nslookup.exe|3eeaeaa523b6285d
LongPathHash
malicious
\REGISTRY\A\{640d53e8-e3c3-cdcb-9384-00210a455653}\Root\InventoryApplicationFile\nslookup.exe|3eeaeaa523b6285d
Name
malicious
\REGISTRY\A\{640d53e8-e3c3-cdcb-9384-00210a455653}\Root\InventoryApplicationFile\nslookup.exe|3eeaeaa523b6285d
OriginalFileName
malicious
\REGISTRY\A\{640d53e8-e3c3-cdcb-9384-00210a455653}\Root\InventoryApplicationFile\nslookup.exe|3eeaeaa523b6285d
Publisher
malicious
\REGISTRY\A\{640d53e8-e3c3-cdcb-9384-00210a455653}\Root\InventoryApplicationFile\nslookup.exe|3eeaeaa523b6285d
Version
malicious
\REGISTRY\A\{640d53e8-e3c3-cdcb-9384-00210a455653}\Root\InventoryApplicationFile\nslookup.exe|3eeaeaa523b6285d
BinFileVersion
malicious
\REGISTRY\A\{640d53e8-e3c3-cdcb-9384-00210a455653}\Root\InventoryApplicationFile\nslookup.exe|3eeaeaa523b6285d
BinaryType
malicious
\REGISTRY\A\{640d53e8-e3c3-cdcb-9384-00210a455653}\Root\InventoryApplicationFile\nslookup.exe|3eeaeaa523b6285d
ProductName
malicious
\REGISTRY\A\{640d53e8-e3c3-cdcb-9384-00210a455653}\Root\InventoryApplicationFile\nslookup.exe|3eeaeaa523b6285d
ProductVersion
malicious
\REGISTRY\A\{640d53e8-e3c3-cdcb-9384-00210a455653}\Root\InventoryApplicationFile\nslookup.exe|3eeaeaa523b6285d
LinkDate
malicious
\REGISTRY\A\{640d53e8-e3c3-cdcb-9384-00210a455653}\Root\InventoryApplicationFile\nslookup.exe|3eeaeaa523b6285d
BinProductVersion
malicious
\REGISTRY\A\{640d53e8-e3c3-cdcb-9384-00210a455653}\Root\InventoryApplicationFile\nslookup.exe|3eeaeaa523b6285d
AppxPackageFullName
malicious
\REGISTRY\A\{640d53e8-e3c3-cdcb-9384-00210a455653}\Root\InventoryApplicationFile\nslookup.exe|3eeaeaa523b6285d
AppxPackageRelativeId
malicious
\REGISTRY\A\{640d53e8-e3c3-cdcb-9384-00210a455653}\Root\InventoryApplicationFile\nslookup.exe|3eeaeaa523b6285d
Size
malicious
\REGISTRY\A\{640d53e8-e3c3-cdcb-9384-00210a455653}\Root\InventoryApplicationFile\nslookup.exe|3eeaeaa523b6285d
Language
malicious
\REGISTRY\A\{640d53e8-e3c3-cdcb-9384-00210a455653}\Root\InventoryApplicationFile\nslookup.exe|3eeaeaa523b6285d
IsOsComponent
malicious
\REGISTRY\A\{640d53e8-e3c3-cdcb-9384-00210a455653}\Root\InventoryApplicationFile\nslookup.exe|3eeaeaa523b6285d
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00B8F8B0D2B
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 16 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2C60000
unkown
page execute and read and write
malicious
4954000
trusted library allocation
page read and write
CC6000
heap
page read and write
29A6000
heap
page read and write
3801000
heap
page read and write
48B8000
trusted library allocation
page read and write
48B1000
trusted library allocation
page read and write
48B6000
trusted library allocation
page read and write
36AF000
heap
page read and write
593000
heap
page read and write
4973000
trusted library allocation
page read and write
4374000
trusted library allocation
page read and write
36A9000
heap
page read and write
5C3000
heap
page read and write
28CC000
heap
page read and write
5220000
heap
page read and write
363E000
stack
page read and write
19A000
stack
page read and write
42B1000
trusted library allocation
page read and write
370000
heap
page read and write
5440000
heap
page read and write
48B4000
trusted library allocation
page read and write
3801000
heap
page read and write
4786000
trusted library allocation
page read and write
48B7000
trusted library allocation
page read and write
36AF000
heap
page read and write
5BA000
heap
page read and write
5A3000
heap
page read and write
48B9000
trusted library allocation
page read and write
4954000
trusted library allocation
page read and write
2980000
heap
page read and write
593000
heap
page read and write
368B000
heap
page read and write
55E000
heap
page read and write
496C000
trusted library allocation
page read and write
376000
heap
page read and write
369C000
heap
page read and write
2983000
heap
page read and write
4983000
trusted library allocation
page read and write
48BA000
trusted library allocation
page read and write
49FD000
trusted library allocation
page read and write
3801000
heap
page read and write
2B1E000
stack
page read and write
593000
heap
page read and write
3680000
heap
page read and write
369C000
heap
page read and write
297E000
heap
page read and write
5F3000
heap
page read and write
48BC000
trusted library allocation
page read and write
400000
unkown
page readonly
496C000
trusted library allocation
page read and write
401000
unkown
page execute read
368C000
stack
page read and write
48B4000
trusted library allocation
page read and write
3570000
heap
page read and write
2ADF000
stack
page read and write
44B1000
trusted library allocation
page read and write
4B1C000
unkown
page read and write
5A7000
heap
page read and write
48BB000
trusted library allocation
page read and write
225E000
stack
page read and write
367F000
heap
page read and write
5A0000
heap
page read and write
3801000
heap
page read and write
2E8E000
unkown
page read and write
364F000
stack
page read and write
29AC000
heap
page read and write
4986000
trusted library allocation
page read and write
369C000
heap
page read and write
390000
heap
page read and write
52AF000
unkown
page read and write
3801000
heap
page read and write
4955000
trusted library allocation
page read and write
4959000
trusted library allocation
page read and write
298B000
heap
page read and write
48B0000
trusted library allocation
page read and write
28CE000
heap
page read and write
5A7000
heap
page read and write
3801000
heap
page read and write
3683000
heap
page read and write
497F000
trusted library allocation
page read and write
48B8000
trusted library allocation
page read and write
48B7000
trusted library allocation
page read and write
5BE000
heap
page read and write
2E90000
unkown
page read and write
48B9000
trusted library allocation
page read and write
88F000
stack
page read and write
48B8000
trusted library allocation
page read and write
4981000
trusted library allocation
page read and write
44B1000
trusted library allocation
page read and write
4969000
trusted library allocation
page read and write
2B5F000
stack
page read and write
4946000
trusted library allocation
page read and write
AE4000
heap
page read and write
48BF000
trusted library allocation
page read and write
48B8000
trusted library allocation
page read and write
4764000
trusted library allocation
page read and write
48B4000
trusted library allocation
page read and write
3801000
heap
page read and write
48B0000
trusted library allocation
page read and write
494F000
trusted library allocation
page read and write
53BF000
stack
page read and write
36AB000
heap
page read and write
498E000
trusted library allocation
page read and write
2C3B000
stack
page read and write
3801000
heap
page read and write
E46000
unkown
page readonly
2CBE000
unkown
page execute and read and write
3801000
heap
page read and write
3801000
heap
page read and write
5BE000
heap
page read and write
48B4000
trusted library allocation
page read and write
778000
heap
page read and write
3440000
heap
page read and write
770000
heap
page read and write
9CF000
stack
page read and write
257E000
stack
page read and write
48B6000
trusted library allocation
page read and write
2CE0000
unkown
page readonly
4983000
trusted library allocation
page read and write
5A7000
heap
page read and write
297F000
heap
page read and write
2960000
heap
page read and write
29AE000
heap
page read and write
2F5D000
heap
page read and write
53FE000
stack
page read and write
495C000
trusted library allocation
page read and write
3801000
heap
page read and write
AE4000
heap
page read and write
4969000
trusted library allocation
page read and write
5BB000
heap
page read and write
5A3000
heap
page read and write
4955000
trusted library allocation
page read and write
4984000
trusted library allocation
page read and write
4A2D000
trusted library allocation
page read and write
3801000
heap
page read and write
48BB000
trusted library allocation
page read and write
4A1B000
trusted library allocation
page read and write
36AD000
heap
page read and write
327C000
stack
page read and write
48BA000
trusted library allocation
page read and write
72F000
stack
page read and write
3801000
heap
page read and write
4F4000
unkown
page readonly
35BE000
stack
page read and write
593000
heap
page read and write
4EE000
stack
page read and write
2F3A000
heap
page read and write
E59000
unkown
page readonly
3801000
heap
page read and write
5BE000
heap
page read and write
42B1000
trusted library allocation
page read and write
5C6000
heap
page read and write
48BF000
trusted library allocation
page read and write
2BE0000
heap
page read and write
48B7000
trusted library allocation
page read and write
4A47000
trusted library allocation
page read and write
740000
heap
page read and write
28CD000
heap
page read and write
369C000
heap
page read and write
730000
heap
page read and write
42B1000
trusted library allocation
page read and write
650000
heap
page read and write
2DC000
stack
page read and write
2210000
heap
page read and write
586000
heap
page read and write
48B7000
trusted library allocation
page read and write
4F4000
unkown
page readonly
51EE000
unkown
page read and write
368C000
heap
page read and write
2983000
heap
page read and write
2F00000
heap
page read and write
4959000
trusted library allocation
page read and write
48BF000
trusted library allocation
page read and write
48B5000
trusted library allocation
page read and write
458F000
trusted library allocation
page read and write
4977000
trusted library allocation
page read and write
4ADE000
unkown
page read and write
48B0000
trusted library allocation
page read and write
36A9000
heap
page read and write
496D000
trusted library allocation
page read and write
494F000
trusted library allocation
page read and write
48B0000
trusted library allocation
page read and write
48BA000
trusted library allocation
page read and write
2D00000
heap
page read and write
22E0000
heap
page read and write
D40000
trusted library allocation
page read and write
48B8000
trusted library allocation
page read and write
5BE000
heap
page read and write
4967000
trusted library allocation
page read and write
48BE000
trusted library allocation
page read and write
593000
heap
page read and write
29A7000
heap
page read and write
367F000
heap
page read and write
44B1000
trusted library allocation
page read and write
3801000
heap
page read and write
36A9000
heap
page read and write
526E000
unkown
page read and write
2CD0000
unkown
page readonly
59F000
heap
page read and write
4947000
trusted library allocation
page read and write
48BF000
trusted library allocation
page read and write
48B6000
trusted library allocation
page read and write
5A3000
heap
page read and write
4942000
trusted library allocation
page read and write
2983000
heap
page read and write
59F000
heap
page read and write
46D0000
heap
page read and write
34BF000
stack
page read and write
4975000
trusted library allocation
page read and write
494D000
trusted library allocation
page read and write
E20000
unkown
page readonly
46F0000
heap
page read and write
4A4D000
trusted library allocation
page read and write
498B000
trusted library allocation
page read and write
35C000
stack
page read and write
28CB000
heap
page read and write
48B9000
trusted library allocation
page read and write
4C1D000
unkown
page read and write
3801000
heap
page read and write
42B1000
trusted library allocation
page read and write
36AD000
heap
page read and write
4AE000
stack
page read and write
495E000
trusted library allocation
page read and write
29A0000
heap
page read and write
2E20000
unkown
page read and write
299C000
heap
page read and write
3801000
heap
page read and write
5A3000
heap
page read and write
4973000
trusted library allocation
page read and write
21EE000
stack
page read and write
D40000
trusted library allocation
page read and write
2EC0000
heap
page read and write
50AF000
unkown
page read and write
36AF000
heap
page read and write
27BE000
stack
page read and write
36A9000
heap
page read and write
48B9000
trusted library allocation
page read and write
22C0000
heap
page read and write
33D8000
heap
page read and write
2190000
heap
page read and write
496E000
trusted library allocation
page read and write
2F08000
heap
page read and write
4940000
trusted library allocation
page read and write
2968000
heap
page read and write
D91000
unkown
page execute read
59F000
heap
page read and write
4FAE000
unkown
page read and write
3801000
heap
page read and write
4953000
trusted library allocation
page read and write
3801000
heap
page read and write
48B5000
trusted library allocation
page read and write
59F000
heap
page read and write
401000
unkown
page execute read
48BD000
trusted library allocation
page read and write
3801000
heap
page read and write
4950000
trusted library allocation
page read and write
4C20000
trusted library allocation
page read and write
5A7000
heap
page read and write
496C000
trusted library allocation
page read and write
4989000
trusted library allocation
page read and write
4958000
trusted library allocation
page read and write
5A7000
heap
page read and write
5F3000
heap
page read and write
497B000
trusted library allocation
page read and write
44B1000
trusted library allocation
page read and write
49FD000
trusted library allocation
page read and write
48BD000
trusted library allocation
page read and write
28BF000
stack
page read and write
31C000
stack
page read and write
4A2E000
trusted library allocation
page read and write
55A000
heap
page read and write
48B2000
trusted library allocation
page read and write
D90000
unkown
page readonly
4A26000
trusted library allocation
page read and write
590000
heap
page read and write
48B3000
trusted library allocation
page read and write
5C3000
heap
page read and write
4964000
trusted library allocation
page read and write
45AB000
trusted library allocation
page read and write
78E000
stack
page read and write
4A2C000
trusted library allocation
page read and write
4C1C000
stack
page read and write
299F000
heap
page read and write
59F000
heap
page read and write
2F4F000
heap
page read and write
48B0000
trusted library allocation
page read and write
3801000
heap
page read and write
494D000
trusted library allocation
page read and write
3668000
heap
page read and write
AB0000
heap
page read and write
2370000
heap
page read and write
49DD000
unkown
page read and write
48BA000
trusted library allocation
page read and write
4972000
trusted library allocation
page read and write
48B9000
trusted library allocation
page read and write
297F000
heap
page read and write
40B000
unkown
page write copy
2B9E000
stack
page read and write
2F1C000
heap
page read and write
5C6000
heap
page read and write
48BB000
trusted library allocation
page read and write
48B1000
trusted library allocation
page read and write
E50000
unkown
page write copy
3801000
heap
page read and write
2A9E000
stack
page read and write
28C7000
heap
page read and write
48B4000
trusted library allocation
page read and write
593000
heap
page read and write
4960000
trusted library allocation
page read and write
48BA000
trusted library allocation
page read and write
543F000
stack
page read and write
3801000
heap
page read and write
4950000
trusted library allocation
page read and write
1064000
heap
page read and write
36A8000
heap
page read and write
3801000
heap
page read and write
48B1000
trusted library allocation
page read and write
5A7000
heap
page read and write
3683000
heap
page read and write
369C000
heap
page read and write
3801000
heap
page read and write
593000
heap
page read and write
690000
heap
page read and write
4946000
trusted library allocation
page read and write
48BB000
trusted library allocation
page read and write
3801000
heap
page read and write
4986000
trusted library allocation
page read and write
48B6000
trusted library allocation
page read and write
4A5F000
trusted library allocation
page read and write
5BE000
heap
page read and write
22F0000
heap
page read and write
237B000
heap
page read and write
354E000
stack
page read and write
48BF000
trusted library allocation
page read and write
6A0000
heap
page read and write
4981000
trusted library allocation
page read and write
497A000
trusted library allocation
page read and write
34FE000
stack
page read and write
29B0000
heap
page read and write
497E000
trusted library allocation
page read and write
299C000
heap
page read and write
48B0000
trusted library allocation
page read and write
4967000
trusted library allocation
page read and write
593000
heap
page read and write
3801000
heap
page read and write
4971000
trusted library allocation
page read and write
49DE000
trusted library allocation
page read and write
28C7000
heap
page read and write
3801000
heap
page read and write
5A3000
heap
page read and write
5A7000
heap
page read and write
343E000
stack
page read and write
2E7B000
heap
page read and write
600000
heap
page read and write
353E000
stack
page read and write
29AE000
heap
page read and write
59F000
heap
page read and write
4A0D000
trusted library allocation
page read and write
459C000
trusted library allocation
page read and write
48B0000
trusted library allocation
page read and write
32BC000
stack
page read and write
5470000
heap
page read and write
3470000
heap
page read and write
498E000
trusted library allocation
page read and write
3410000
heap
page read and write
3320000
heap
page read and write
59F000
heap
page read and write
5A3000
heap
page read and write
6EE000
stack
page read and write
5BE000
heap
page read and write
2BDF000
stack
page read and write
2214000
heap
page read and write
48B5000
trusted library allocation
page read and write
4986000
trusted library allocation
page read and write
3801000
heap
page read and write
538000
unkown
page readonly
98000
stack
page read and write
2E40000
heap
page read and write
48B2000
trusted library allocation
page read and write
D40000
trusted library allocation
page read and write
28C6000
heap
page read and write
498E000
trusted library allocation
page read and write
E54000
unkown
page write copy
39C000
stack
page read and write
28C7000
heap
page read and write
25BF000
stack
page read and write
408000
unkown
page readonly
1053000
heap
page read and write
538000
unkown
page readonly
3476000
heap
page read and write
64E000
stack
page read and write
8CE000
stack
page read and write
29EB000
stack
page read and write
48B9000
trusted library allocation
page read and write
541E000
unkown
page read and write
48B8000
trusted library allocation
page read and write
48BA000
trusted library allocation
page read and write
3683000
heap
page read and write
4963000
trusted library allocation
page read and write
4961000
trusted library allocation
page read and write
3578000
heap
page read and write
28C4000
heap
page read and write
3801000
heap
page read and write
4982000
trusted library allocation
page read and write
48BC000
trusted library allocation
page read and write
3801000
heap
page read and write
2375000
heap
page read and write
48B2000
trusted library allocation
page read and write
5A3000
heap
page read and write
4968000
trusted library allocation
page read and write
3801000
heap
page read and write
494D000
trusted library allocation
page read and write
498A000
trusted library allocation
page read and write
495C000
trusted library allocation
page read and write
3801000
heap
page read and write
3660000
heap
page read and write
30FF000
unkown
page read and write
299C000
heap
page read and write
367F000
heap
page read and write
531D000
unkown
page read and write
4962000
trusted library allocation
page read and write
497F000
trusted library allocation
page read and write
4673000
trusted library allocation
page read and write
45A8000
trusted library allocation
page read and write
49E3000
trusted library allocation
page read and write
48BD000
trusted library allocation
page read and write
41F000
unkown
page read and write
44B1000
trusted library allocation
page read and write
299C000
heap
page read and write
48B3000
trusted library allocation
page read and write
2E1E000
unkown
page read and write
48B7000
trusted library allocation
page read and write
2CF0000
unkown
page readonly
5A3000
heap
page read and write
369C000
heap
page read and write
48B3000
trusted library allocation
page read and write
36A9000
heap
page read and write
4958000
trusted library allocation
page read and write
48B7000
trusted library allocation
page read and write
48B8000
trusted library allocation
page read and write
4F0000
heap
page read and write
5A3000
heap
page read and write
5A7000
heap
page read and write
2BE7000
heap
page read and write
28CA000
heap
page read and write
48B2000
trusted library allocation
page read and write
44B1000
trusted library allocation
page read and write
59F000
heap
page read and write
29AB000
heap
page read and write
400000
unkown
page readonly
745000
heap
page read and write
2F2E000
heap
page read and write
3801000
heap
page read and write
5A3000
heap
page read and write
297F000
heap
page read and write
3801000
heap
page read and write
29AA000
heap
page read and write
4958000
trusted library allocation
page read and write
497F000
trusted library allocation
page read and write
31FE000
unkown
page read and write
495E000
trusted library allocation
page read and write
49DD000
trusted library allocation
page read and write
4940000
trusted library allocation
page read and write
4951000
trusted library allocation
page read and write
498E000
trusted library allocation
page read and write
5A7000
heap
page read and write
28CA000
heap
page read and write
68F000
stack
page read and write
408000
unkown
page readonly
299C000
heap
page read and write
4962000
trusted library allocation
page read and write
59F000
heap
page read and write
5A7000
heap
page read and write
2F43000
heap
page read and write
4690000
trusted library allocation
page read and write
4973000
trusted library allocation
page read and write
48B5000
trusted library allocation
page read and write
40B000
unkown
page read and write
48B5000
trusted library allocation
page read and write
48BE000
trusted library allocation
page read and write
48B0000
trusted library allocation
page read and write
461000
unkown
page read and write
48B0000
trusted library allocation
page read and write
35FF000
stack
page read and write
497E000
trusted library allocation
page read and write
50ED000
unkown
page read and write
496C000
trusted library allocation
page read and write
2E45000
heap
page read and write
299C000
heap
page read and write
4A3E000
trusted library allocation
page read and write
48B5000
trusted library allocation
page read and write
550000
heap
page read and write
4958000
trusted library allocation
page read and write
2E31000
unkown
page readonly
48BD000
trusted library allocation
page read and write
There are 486 hidden memdumps, click here to show them.