IOC Report
wcz289366876.exe

loading gif

Files

File Path
Type
Category
Malicious
wcz289366876.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
C:\Users\user\AppData\Local\Temp\_MEI67482\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67482\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67482\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67482\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67482\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67482\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67482\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67482\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67482\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI67482\certifi\cacert.pem
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI67482\charset_normalizer\md.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67482\charset_normalizer\md__mypyc.cp312-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67482\libcrypto-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67482\libssl-3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67482\python312.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI67482\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
modified
C:\Users\user\AppData\Local\Temp\_MEI67482\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\Desktop\wcz289366876.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
C:\Users\user\Desktop\windows.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Windows\System32\Orion.exe
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Windows\System32\libequix.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\wcz289366876.exe
"C:\Users\user\Desktop\wcz289366876.exe"
C:\Users\user\Desktop\wcz289366876.exe
"C:\Users\user\Desktop\wcz289366876.exe"
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c C:\Users\user\Desktop\wcz289366876.bat
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\timeout.exe
timeout /t 2

URLs

Name
IP
Malicious
https://github.com/mono/linker/issues/1731
unknown
https://aka.ms/dotnet/info
unknown
http://crl.dhimyotis.com/certignarootca.crl0
unknown
http://crl.dhimyotis.com/certignarootca.crluO%
unknown
https://nlog-project.org/
unknown
https://aka.ms/dotnet/app-launch-failed
unknown
http://repository.swisssign.com/2
unknown
https://github.com/m4rs-mt/ILGPU
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
https://github.com/mono/linker/issues/1895v
unknown
https://tools.ietf.org/html/rfc2388#section-4.4
unknown
https://docs.python.org/3.11/library/binascii.html#binascii.a2b_base64
unknown
http://43.199.41.35:8080/windows.zip
43.199.41.35
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/denyonlysid
unknown
https://aka.ms/nativeaot-compatibility
unknown
http://crl.dhimyotis.com/certignarootca.crl(Fu
unknown
http://crl.dhimyotis.com/certignarootca.crl
unknown
http://curl.haxx.se/rfc/cookie_spec.html
unknown
http://ocsp.accv.es
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://httpbin.org/get
unknown
https://aka.ms/dotnet/download%s%sInstall
unknown
https://wwww.certigna.fr/autorites/0m
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://github.com/python/cpython/issues/86361.
unknown
https://aka.ms/dotnet-illink/com
unknown
http://crl.securetrust.com/SGCA.crluest(
unknown
https://httpbin.org/
unknown
https://wwww.certigna.fr/autorites/
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.Loader.exec_module
unknown
https://www.nuget.org/packages/NLog.Web.AspNetCore
unknown
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
unknown
http://crl.securetrust.com/STCA.crle
unknown
http://crl.securetrust.com/STCA.crl
unknown
http://wwwsearch.sf.net/):
unknown
https://aka.ms/dotnet/sdk-not-foundProbing
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
http://www.accv.es/legislacion_c.htm
unknown
http://crl.xrampsecurity.com/XGCA.crl0
unknown
http://www.cert.fnmt.es/dpcs/
unknown
https://github.com/dotnet/runtime/issues/50820
unknown
https://google.com/mail
unknown
http://www.accv.es00
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
unknown
https://github.com/novotnyllc/bc-csharp
unknown
https://aka.ms/dotnet/download
unknown
http://www.quovadisglobal.com/cps?v&
unknown
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
unknown
http://google.com/
unknown
http://html4/loose.dtd
unknown
https://mahler:8092/site-updates.py
unknown
https://github.com/mono/linker/pull/2125.
unknown
http://crl.securetrust.com/SGCA.crl
unknown
http://.../back.jpeg
unknown
https://tools.ietf.org/html/rfc7231#section-4.3.6)
unknown
https://httpbin.org/post
unknown
https://urllib3.readthedocs.io/en/latest/advanced-usage.html#tls-warningsN
unknown
http://schemas.xmlsoap.org/soap/envelope/
unknown
https://github.com/Ousret/charset_normalizer
unknown
http://ocsp.accv.ese
unknown
http://www.firmaprofesional.com/cps0
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.PathEntryFinder.find_spec
unknown
http://.css
unknown
http://crl.securetrust.com/SGCA.crl0
unknown
https://docs.python.org/3/library/importlib.html#importlib.abc.ResourceLoader.get_data
unknown
https://yahoo.com/
unknown
http://crl.securetrust.com/STCA.crl0
unknown
https://aka.ms/dotnet-core-applaunch?
unknown
https://aka.ms/dotnet-illink/com)
unknown
https://github.com/dotnet/runtime
unknown
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
unknown
https://aka.ms/dotnet-warnings/
unknown
https://html.spec.whatwg.org/multipage/
unknown
http://www.quovadisglobal.com/cps0
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl
unknown
http://nlog-project.org/dummynamespace/
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0
unknown
https://www.rfc-editor.org/rfc/rfc8259#section-8.1
unknown
https://aka.ms/serializationformat-binary-obsolete
unknown
https://aka.ms/binaryformatter
unknown
https://requests.readthedocs.io
unknown
http://.jpg
unknown
http://20.2.154.66:48080/admin-api/ore/wallet/getPriYReceived
unknown
http://repository.swisssign.com/
unknown
https://github.com/JamesNK/Newtonsoft.Json
unknown
http://crl.xrampsecurity.com/XGCA.crl
unknown
https://www.python.org
unknown
http://code.activestate.com/recipes/577452-a-memoize-decorator-for-instance-methods/
unknown
https://github.com/NLog/NLog.git
unknown
http://www.cert.fnmt.es/dpcs/m
unknown
http://www.accv.es/legislacion_c.htm0U
unknown
http://ocsp.accv.es0
unknown
https://github.com/mono/linker/issues/1416.
unknown
https://www.python.org/
unknown
https://json.org
unknown
https://github.com/spectreconsole/spectre.console
unknown
https://docs.python.org/3/howto/mro.html.
unknown
https://twitter.com/
unknown
http://james.newtonking.com/projects/json
unknown
There are 90 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
43.199.41.35
unknown
Japan

Memdumps

Base Address
Regiontype
Protect
Malicious
22673EC5000
heap
page read and write
22675EFA000
heap
page read and write
22676463000
heap
page read and write
226763D4000
heap
page read and write
22676536000
heap
page read and write
22675ED9000
heap
page read and write
22675DCA000
heap
page read and write
22676254000
heap
page read and write
2267624E000
heap
page read and write
22676AF1000
heap
page read and write
236C33DC000
heap
page read and write
22675F63000
heap
page read and write
226759E1000
heap
page read and write
236C33D3000
heap
page read and write
236C3330000
heap
page read and write
87C87ED000
stack
page read and write
2267596D000
heap
page read and write
226763CF000
heap
page read and write
2267625B000
heap
page read and write
22675A0D000
heap
page read and write
236C33D3000
heap
page read and write
22675E65000
heap
page read and write
2267649E000
heap
page read and write
7FF74F3EE000
unkown
page write copy
226759ED000
heap
page read and write
22675967000
heap
page read and write
2267623F000
heap
page read and write
22675DD9000
heap
page read and write
226759A7000
heap
page read and write
22675DC3000
heap
page read and write
226763DA000
heap
page read and write
2267623D000
heap
page read and write
2267644F000
heap
page read and write
22676B99000
heap
page read and write
22673EF1000
heap
page read and write
236C33D3000
heap
page read and write
226759B2000
heap
page read and write
22675994000
heap
page read and write
22675DB1000
heap
page read and write
22675F12000
heap
page read and write
22675F0A000
heap
page read and write
22675EFF000
heap
page read and write
7FF74F3EE000
unkown
page read and write
226769E4000
heap
page read and write
236C33D3000
heap
page read and write
2267642A000
heap
page read and write
22675993000
heap
page read and write
236C33D4000
heap
page read and write
226763E3000
heap
page read and write
226762DF000
heap
page read and write
22675EF5000
heap
page read and write
2267624B000
heap
page read and write
22673EEC000
heap
page read and write
236C33D4000
heap
page read and write
8CFC6FC000
stack
page read and write
22673EC3000
heap
page read and write
2267619C000
heap
page read and write
226759E2000
heap
page read and write
22675EF6000
heap
page read and write
22673EED000
heap
page read and write
22673EDB000
heap
page read and write
22676237000
heap
page read and write
22675DDD000
heap
page read and write
22676BA8000
heap
page read and write
2AF83A78000
heap
page read and write
22675DAD000
heap
page read and write
2267649E000
heap
page read and write
22675DB2000
heap
page read and write
22676473000
heap
page read and write
22675F00000
heap
page read and write
226762BC000
heap
page read and write
22675F52000
heap
page read and write
22676255000
heap
page read and write
2267649E000
heap
page read and write
22675F63000
heap
page read and write
22676361000
heap
page read and write
22675F12000
heap
page read and write
2267645C000
heap
page read and write
226759FB000
heap
page read and write
226762B7000
heap
page read and write
22675F0A000
heap
page read and write
22676265000
heap
page read and write
22676536000
heap
page read and write
22675A16000
heap
page read and write
22676AF1000
heap
page read and write
226764C5000
heap
page read and write
22675DD6000
heap
page read and write
2267625B000
heap
page read and write
22676536000
heap
page read and write
22676256000
heap
page read and write
22676484000
heap
page read and write
22675F44000
heap
page read and write
22676C59000
heap
page read and write
22675DBC000
heap
page read and write
2267731B000
heap
page read and write
22675E2B000
heap
page read and write
22676506000
heap
page read and write
22677401000
heap
page read and write
2267653E000
heap
page read and write
22676AF1000
heap
page read and write
2267645C000
heap
page read and write
22676218000
heap
page read and write
226762A1000
heap
page read and write
22675DE2000
heap
page read and write
22676536000
heap
page read and write
236C33D3000
heap
page read and write
226762C5000
heap
page read and write
22676218000
heap
page read and write
22675F7D000
heap
page read and write
87C87E3000
stack
page read and write
226764AA000
heap
page read and write
226762DD000
heap
page read and write
226759C7000
heap
page read and write
22675EFB000
heap
page read and write
22676B8E000
heap
page read and write
22676459000
heap
page read and write
226763CB000
heap
page read and write
22673EF9000
heap
page read and write
22675A13000
heap
page read and write
22675EE4000
heap
page read and write
22675F63000
heap
page read and write
22675F63000
heap
page read and write
22676E6B000
heap
page read and write
226759FA000
heap
page read and write
22675EA4000
heap
page read and write
2267646B000
heap
page read and write
226769E9000
heap
page read and write
2267649E000
heap
page read and write
2267625B000
heap
page read and write
22675E6A000
heap
page read and write
22673ED1000
heap
page read and write
22676AF1000
heap
page read and write
22676536000
heap
page read and write
22675985000
heap
page read and write
22675DDC000
heap
page read and write
22676238000
heap
page read and write
22675DD5000
heap
page read and write
22675ED7000
heap
page read and write
22675952000
heap
page read and write
226763DA000
heap
page read and write
22676336000
heap
page read and write
22675A3E000
heap
page read and write
22675DE4000
heap
page read and write
22675F12000
heap
page read and write
236C33CD000
heap
page read and write
22675979000
heap
page read and write
22676456000
heap
page read and write
8CFC7FE000
unkown
page read and write
22675F36000
heap
page read and write
22676484000
heap
page read and write
22675F0A000
heap
page read and write
226763CC000
heap
page read and write
22676362000
heap
page read and write
22676536000
heap
page read and write
22675975000
heap
page read and write
2267628E000
heap
page read and write
22676262000
heap
page read and write
236C33DB000
heap
page read and write
22676484000
heap
page read and write
22676365000
heap
page read and write
22676CB8000
heap
page read and write
226764C0000
heap
page read and write
226759FA000
heap
page read and write
226762A5000
heap
page read and write
236C33D3000
heap
page read and write
236C33E1000
heap
page read and write
226762DE000
heap
page read and write
22676AF1000
heap
page read and write
226762C5000
heap
page read and write
2267633C000
heap
page read and write
226769EA000
heap
page read and write
22676262000
heap
page read and write
2267625B000
heap
page read and write
22675F76000
heap
page read and write
22675F63000
heap
page read and write
226759DF000
heap
page read and write
22676536000
heap
page read and write
22676536000
heap
page read and write
22675E52000
heap
page read and write
22676536000
heap
page read and write
226762C5000
heap
page read and write
226769E9000
heap
page read and write
8CFC8FE000
stack
page read and write
2267618B000
heap
page read and write
22675976000
heap
page read and write
22675DAE000
heap
page read and write
2267642F000
heap
page read and write
226769EA000
heap
page read and write
226759B2000
heap
page read and write
22675F6D000
heap
page read and write
22676536000
heap
page read and write
2267645C000
heap
page read and write
22676AF1000
heap
page read and write
22675D97000
heap
page read and write
2267599A000
heap
page read and write
226763DA000
heap
page read and write
22676D1C000
heap
page read and write
22675DB5000
heap
page read and write
22676536000
heap
page read and write
2267623D000
heap
page read and write
226764A0000
heap
page read and write
226764BC000
heap
page read and write
226769E2000
heap
page read and write
226759FA000
heap
page read and write
22677403000
heap
page read and write
22675F63000
heap
page read and write
2267645C000
heap
page read and write
226762E0000
heap
page read and write
22675EB0000
heap
page read and write
226759CC000
heap
page read and write
22675E49000
heap
page read and write
22676229000
heap
page read and write
22675ED0000
heap
page read and write
226763CB000
heap
page read and write
22675A01000
heap
page read and write
22675F0A000
heap
page read and write
226769E6000
heap
page read and write
226764FD000
heap
page read and write
22675EA2000
heap
page read and write
2267635F000
heap
page read and write
2267625B000
heap
page read and write
226763CB000
heap
page read and write
226772F2000
heap
page read and write
2267621A000
heap
page read and write
226762A1000
heap
page read and write
22675981000
heap
page read and write
22675F52000
heap
page read and write
236C33D4000
heap
page read and write
22675E13000
heap
page read and write
22676339000
heap
page read and write
226759FA000
heap
page read and write
22675EA0000
heap
page read and write
2267645C000
heap
page read and write
2267625B000
heap
page read and write
22676211000
heap
page read and write
22675E56000
heap
page read and write
22675A1E000
heap
page read and write
22676365000
heap
page read and write
22675978000
heap
page read and write
22675E63000
heap
page read and write
22675DE7000
heap
page read and write
2267635F000
heap
page read and write
226763E3000
heap
page read and write
22675DAD000
heap
page read and write
2AF83A00000
heap
page read and write
22675DD6000
heap
page read and write
2267649B000
heap
page read and write
2267599B000
heap
page read and write
226761CF000
heap
page read and write
2267624A000
heap
page read and write
22676C59000
heap
page read and write
22675A00000
heap
page read and write
22676D1C000
heap
page read and write
22676C59000
heap
page read and write
22675E52000
heap
page read and write
22DB6097000
heap
page read and write
226764C5000
heap
page read and write
226761B3000
heap
page read and write
22675DD6000
heap
page read and write
2267653C000
heap
page read and write
22676484000
heap
page read and write
22675983000
heap
page read and write
22675EA4000
heap
page read and write
22676333000
heap
page read and write
226769EB000
heap
page read and write
226759CB000
heap
page read and write
226761B3000
heap
page read and write
2267594D000
heap
page read and write
22675F14000
heap
page read and write
22676536000
heap
page read and write
22675F35000
heap
page read and write
22676266000
heap
page read and write
22675DAB000
heap
page read and write
22675EB4000
heap
page read and write
22675DCD000
heap
page read and write
22675941000
heap
page read and write
22676B7B000
heap
page read and write
22675982000
heap
page read and write
22675E23000
heap
page read and write
22675EBB000
heap
page read and write
2AF83A04000
heap
page read and write
2267645C000
heap
page read and write
226761B3000
heap
page read and write
2267625B000
heap
page read and write
236C33C3000
heap
page read and write
226761B3000
heap
page read and write
226759D9000
heap
page read and write
22675DDA000
heap
page read and write
22675E8F000
heap
page read and write
D3A815F000
stack
page read and write
226761E8000
heap
page read and write
22675E97000
heap
page read and write
2267642A000
heap
page read and write
22DB6070000
heap
page read and write
22675DCE000
heap
page read and write
226769EC000
heap
page read and write
226764FE000
heap
page read and write
226759AC000
heap
page read and write
22676484000
heap
page read and write
22676365000
heap
page read and write
22673EB6000
heap
page read and write
226764FE000
heap
page read and write
2267597D000
heap
page read and write
226761A1000
heap
page read and write
22675EAC000
heap
page read and write
226759FA000
heap
page read and write
7FF74F3F4000
unkown
page readonly
D3A81DF000
stack
page read and write
22675F0A000
heap
page read and write
22676AF1000
heap
page read and write
7FF74F3F4000
unkown
page readonly
22675EDA000
heap
page read and write
22676292000
heap
page read and write
236C4D20000
heap
page read and write
22675DCC000
heap
page read and write
226772FA000
heap
page read and write
2267642A000
heap
page read and write
2AF839B0000
heap
page read and write
22675F24000
heap
page read and write
22675EEB000
heap
page read and write
226764A3000
heap
page read and write
7FF74F3B0000
unkown
page readonly
2267599A000
heap
page read and write
87C89DE000
stack
page read and write
226763DA000
heap
page read and write
22676D1C000
heap
page read and write
226759F5000
heap
page read and write
226764C5000
heap
page read and write
236C33D2000
heap
page read and write
22675A0F000
heap
page read and write
22675E5A000
heap
page read and write
22675F52000
heap
page read and write
22675E79000
heap
page read and write
236C33B0000
heap
page read and write
22676484000
heap
page read and write
22675DD1000
heap
page read and write
22676210000
heap
page read and write
22675DBC000
heap
page read and write
22676366000
heap
page read and write
22676199000
heap
page read and write
22675F23000
heap
page read and write
2267649E000
heap
page read and write
22676C59000
heap
page read and write
2267653E000
heap
page read and write
22675DE2000
heap
page read and write
22DB60C8000
heap
page read and write
226759B2000
heap
page read and write
22675E78000
heap
page read and write
22676329000
heap
page read and write
22675ECA000
heap
page read and write
2267642A000
heap
page read and write
226762C5000
heap
page read and write
2267635B000
heap
page read and write
22676536000
heap
page read and write
22676404000
heap
page read and write
22675E13000
heap
page read and write
22673E9C000
heap
page read and write
226769ED000
heap
page read and write
22675F52000
heap
page read and write
22676484000
heap
page read and write
22675E02000
heap
page read and write
22675970000
heap
page read and write
22675E00000
heap
page read and write
22675E42000
heap
page read and write
22675EBB000
heap
page read and write
22675DDD000
heap
page read and write
22675E57000
heap
page read and write
22675F22000
heap
page read and write
226762B7000
heap
page read and write
22676484000
heap
page read and write
22676266000
heap
page read and write
22675A0F000
heap
page read and write
226763E3000
heap
page read and write
22675DE2000
heap
page read and write
2267598D000
heap
page read and write
22676AF1000
heap
page read and write
22DB60C8000
heap
page read and write
22675DAE000
heap
page read and write
226774DF000
heap
page read and write
22676C59000
heap
page read and write
22675F03000
heap
page read and write
22676291000
heap
page read and write
226772FB000
heap
page read and write
226769E9000
heap
page read and write
7FF74F3DB000
unkown
page readonly
226759F5000
heap
page read and write
22676234000
heap
page read and write
22675EE5000
heap
page read and write
236C33D4000
heap
page read and write
2267650E000
heap
page read and write
226769E0000
heap
page read and write
22675A3D000
heap
page read and write
2267599A000
heap
page read and write
226759F0000
heap
page read and write
2267626C000
heap
page read and write
22676C59000
heap
page read and write
226759F5000
heap
page read and write
22675EE5000
heap
page read and write
226759F6000
heap
page read and write
22675990000
heap
page read and write
22675E7E000
heap
page read and write
22675977000
heap
page read and write
22675E27000
heap
page read and write
7FF74F3B0000
unkown
page readonly
22676237000
heap
page read and write
22675F63000
heap
page read and write
226772F7000
heap
page read and write
22675E7A000
heap
page read and write
22675E89000
heap
page read and write
22676461000
heap
page read and write
22675E9F000
heap
page read and write
22675DE8000
heap
page read and write
22676536000
heap
page read and write
2267731D000
heap
page read and write
22676496000
heap
page read and write
226769E9000
heap
page read and write
22676220000
heap
page read and write
22676247000
heap
page read and write
22675ECF000
heap
page read and write
87C8BCE000
stack
page read and write
22676C1B000
heap
page read and write
22675F52000
heap
page read and write
7FF74F3F2000
unkown
page read and write
22675F0A000
heap
page read and write
22676211000
heap
page read and write
22676496000
heap
page read and write
22676C59000
heap
page read and write
7FF74F3B1000
unkown
page execute read
22675F12000
heap
page read and write
236C33D3000
heap
page read and write
226759E2000
heap
page read and write
226764C5000
heap
page read and write
22676536000
heap
page read and write
226764C5000
heap
page read and write
22676AF1000
heap
page read and write
2267599F000
heap
page read and write
2267642A000
heap
page read and write
22675E2B000
heap
page read and write
7FF74F3DB000
unkown
page readonly
22676AF1000
heap
page read and write
226761E8000
heap
page read and write
22677402000
heap
page read and write
22676410000
heap
page read and write
226764F7000
heap
page read and write
226763CF000
heap
page read and write
22676329000
heap
page read and write
226772F2000
heap
page read and write
7FF74F3DB000
unkown
page readonly
2267653E000
heap
page read and write
22675F52000
heap
page read and write
236C33D4000
heap
page read and write
22676536000
heap
page read and write
226764B6000
heap
page read and write
7FF74F3B0000
unkown
page readonly
226762A4000
heap
page read and write
22676536000
heap
page read and write
226759FA000
heap
page read and write
226762B7000
heap
page read and write
236C4D60000
heap
page read and write
226763CB000
heap
page read and write
226764FE000
heap
page read and write
2267740B000
heap
page read and write
226769ED000
heap
page read and write
2267619F000
heap
page read and write
226763E4000
heap
page read and write
226759FB000
heap
page read and write
22675E6A000
heap
page read and write
22677405000
heap
page read and write
226769E0000
direct allocation
page read and write
22676463000
heap
page read and write
22DB61C0000
heap
page read and write
22676439000
heap
page read and write
2267599F000
heap
page read and write
22676332000
heap
page read and write
22676484000
heap
page read and write
226763DA000
heap
page read and write
22676435000
heap
page read and write
2AF839C0000
heap
page read and write
226759DE000
heap
page read and write
2267626C000
heap
page read and write
226759CC000
heap
page read and write
22676218000
heap
page read and write
226764C5000
heap
page read and write
22675A12000
heap
page read and write
226759D9000
heap
page read and write
22676362000
heap
page read and write
226759D4000
heap
page read and write
226763E3000
heap
page read and write
22676484000
heap
page read and write
22675E6A000
heap
page read and write
22673ECE000
heap
page read and write
2267645C000
heap
page read and write
226763CB000
heap
page read and write
22675986000
heap
page read and write
226759C8000
heap
page read and write
2267653E000
heap
page read and write
22676551000
heap
page read and write
226761C6000
heap
page read and write
2267645C000
heap
page read and write
22676481000
heap
page read and write
22676486000
heap
page read and write
22675EB0000
heap
page read and write
22675EC5000
heap
page read and write
22675F0E000
heap
page read and write
22675969000
heap
page read and write
22676496000
heap
page read and write
2267626E000
heap
page read and write
22675982000
heap
page read and write
2267599F000
heap
page read and write
226769E0000
direct allocation
page read and write
22675F78000
heap
page read and write
22675A17000
heap
page read and write
22676B8E000
heap
page read and write
22675F78000
heap
page read and write
226761A0000
heap
page read and write
22673EEF000
heap
page read and write
226769E2000
heap
page read and write
226759E3000
heap
page read and write
226769E8000
heap
page read and write
22676D1B000
heap
page read and write
22675DDA000
heap
page read and write
236C33D3000
heap
page read and write
22675E30000
heap
page read and write
22675E45000
heap
page read and write
236C3300000
heap
page read and write
22676D1C000
heap
page read and write
22676224000
heap
page read and write
226761B3000
heap
page read and write
2267642A000
heap
page read and write
2267645C000
heap
page read and write
22675EB6000
heap
page read and write
226763DA000
heap
page read and write
22675E56000
heap
page read and write
226759E4000
heap
page read and write
22675945000
heap
page read and write
2267596F000
heap
page read and write
22675F63000
heap
page read and write
22676362000
heap
page read and write
236C33D3000
heap
page read and write
22676536000
heap
page read and write
226772F1000
heap
page read and write
226763CB000
heap
page read and write
2267635F000
heap
page read and write
22675993000
heap
page read and write
22675E69000
heap
page read and write
22675F34000
heap
page read and write
7FF74F3B1000
unkown
page execute read
226769E0000
heap
page read and write
226762D7000
heap
page read and write
22DB6050000
heap
page read and write
22676209000
heap
page read and write
226764B9000
heap
page read and write
22676212000
heap
page read and write
2267628F000
heap
page read and write
22675E64000
heap
page read and write
7FF74F3B1000
unkown
page execute read
2267597C000
heap
page read and write
22676536000
heap
page read and write
22675EE3000
heap
page read and write
226772F7000
heap
page read and write
2267594F000
heap
page read and write
2267645C000
heap
page read and write
22676366000
heap
page read and write
22675989000
heap
page read and write
226759FA000
heap
page read and write
22675EA1000
heap
page read and write
226763CB000
heap
page read and write
236C3220000
heap
page read and write
22676536000
heap
page read and write
226761B3000
heap
page read and write
22675E2F000
heap
page read and write
22676536000
heap
page read and write
236C33B9000
heap
page read and write
22676AF1000
heap
page read and write
22675990000
heap
page read and write
22676269000
heap
page read and write
22675F41000
heap
page read and write
22675F0A000
heap
page read and write
22676218000
heap
page read and write
22676536000
heap
page read and write
2AF83A70000
heap
page read and write
22675EF5000
heap
page read and write
22675E4C000
heap
page read and write
226772F4000
heap
page read and write
226764EB000
heap
page read and write
22673EEF000
heap
page read and write
226759D9000
heap
page read and write
2267653E000
heap
page read and write
226759FE000
heap
page read and write
226761EA000
heap
page read and write
22675E91000
heap
page read and write
2267626C000
heap
page read and write
22675E9C000
heap
page read and write
22675F78000
heap
page read and write
22675DDD000
heap
page read and write
2267626C000
heap
page read and write
22675DE3000
heap
page read and write
22675E42000
heap
page read and write
22675E0C000
heap
page read and write
22675DC3000
heap
page read and write
22676C59000
heap
page read and write
226764E4000
heap
page read and write
2267595B000
heap
page read and write
226759FA000
heap
page read and write
22676536000
heap
page read and write
22676225000
heap
page read and write
22675DB5000
heap
page read and write
226759D5000
heap
page read and write
2267598C000
heap
page read and write
226759D5000
heap
page read and write
22676AF1000
heap
page read and write
22675A14000
heap
page read and write
22675EFF000
heap
page read and write
22676218000
heap
page read and write
22675F52000
heap
page read and write
226762A1000
heap
page read and write
22675F02000
heap
page read and write
22DB6090000
heap
page read and write
226759FC000
heap
page read and write
22676AF1000
heap
page read and write
2267751F000
heap
page read and write
22676C12000
heap
page read and write
226763CB000
heap
page read and write
2267654F000
heap
page read and write
22675F0A000
heap
page read and write
226764C5000
heap
page read and write
226759BA000
heap
page read and write
22675DAA000
heap
page read and write
226761E8000
heap
page read and write
22676291000
heap
page read and write
22675DD2000
heap
page read and write
22675995000
heap
page read and write
22673EF0000
heap
page read and write
22676B99000
heap
page read and write
2267623F000
heap
page read and write
226772FB000
heap
page read and write
226769E0000
heap
page read and write
22676473000
heap
page read and write
22675987000
heap
page read and write
2267626C000
heap
page read and write
226761B3000
heap
page read and write
226763D3000
heap
page read and write
22675F7B000
heap
page read and write
22DB5F70000
heap
page read and write
22675E73000
heap
page read and write
226769E5000
heap
page read and write
226759A4000
heap
page read and write
22676536000
heap
page read and write
22676CED000
heap
page read and write
22675D93000
heap
page read and write
2267653E000
heap
page read and write
22675E45000
heap
page read and write
22676AF1000
heap
page read and write
2267597B000
heap
page read and write
2267625A000
heap
page read and write
22673EDA000
heap
page read and write
22676CA0000
heap
page read and write
22675EA2000
heap
page read and write
22676DCE000
heap
page read and write
2267595B000
heap
page read and write
22675EBE000
heap
page read and write
2267635F000
heap
page read and write
226762A4000
heap
page read and write
226759A4000
heap
page read and write
22675DC9000
heap
page read and write
236C33D4000
heap
page read and write
22675A13000
heap
page read and write
22676224000
heap
page read and write
22675E7E000
heap
page read and write
22DB60B3000
heap
page read and write
22675DAB000
heap
page read and write
22673EEE000
heap
page read and write
22676291000
heap
page read and write
22675E65000
heap
page read and write
22676D1C000
heap
page read and write
22676D1C000
heap
page read and write
22676433000
heap
page read and write
236C33D3000
heap
page read and write
22677403000
heap
page read and write
22675E2C000
heap
page read and write
226762CE000
heap
page read and write
22676484000
heap
page read and write
22676185000
heap
page read and write
226763DA000
heap
page read and write
22675F0B000
heap
page read and write
22675A02000
heap
page read and write
226762BC000
heap
page read and write
22675DC3000
heap
page read and write
2267646C000
heap
page read and write
22673EC1000
heap
page read and write
22675DB1000
heap
page read and write
236C33D4000
heap
page read and write
22677400000
heap
page read and write
22675DC0000
heap
page read and write
226764E6000
heap
page read and write
22675EFB000
heap
page read and write
22675E7E000
heap
page read and write
226764AD000
heap
page read and write
22675984000
heap
page read and write
22675F12000
heap
page read and write
22675A3E000
heap
page read and write
22675F52000
heap
page read and write
22676AF1000
heap
page read and write
2267632A000
heap
page read and write
2267649E000
heap
page read and write
2267642A000
heap
page read and write
226764EA000
heap
page read and write
22676193000
heap
page read and write
22675EAE000
heap
page read and write
226761E8000
heap
page read and write
2267626C000
heap
page read and write
22675DA8000
heap
page read and write
226759FA000
heap
page read and write
22675981000
heap
page read and write
22676225000
heap
page read and write
22675E00000
heap
page read and write
22673EF2000
heap
page read and write
2267649E000
heap
page read and write
226759C7000
heap
page read and write
226763E3000
heap
page read and write
22675F63000
heap
page read and write
2267646F000
heap
page read and write
226763CB000
heap
page read and write
22676C59000
heap
page read and write
226763CB000
heap
page read and write
22676D1C000
heap
page read and write
22675E49000
heap
page read and write
22675F0A000
heap
page read and write
226764F4000
heap
page read and write
2267625B000
heap
page read and write
22673EBC000
heap
page read and write
226761A2000
heap
page read and write
22675F23000
heap
page read and write
22676214000
heap
page read and write
22673EC7000
heap
page read and write
22675D94000
heap
page read and write
226772FA000
heap
page read and write
2267635F000
heap
page read and write
226759FC000
heap
page read and write
22675ED8000
heap
page read and write
22675E78000
heap
page read and write
22675E5F000
heap
page read and write
22675A1E000
heap
page read and write
22677408000
heap
page read and write
226769E4000
heap
page read and write
226759EC000
heap
page read and write
22675F0A000
heap
page read and write
22676B74000
heap
page read and write
22675F4B000
heap
page read and write
2267740F000
heap
page read and write
22675E2B000
heap
page read and write
22676536000
heap
page read and write
D3A80DC000
stack
page read and write
22675948000
heap
page read and write
22675DD4000
heap
page read and write
22676473000
heap
page read and write
2267626C000
heap
page read and write
22675DDE000
heap
page read and write
22676463000
heap
page read and write
2267596E000
heap
page read and write
22676515000
heap
page read and write
226759E0000
heap
page read and write
2267642A000
heap
page read and write
22675F63000
heap
page read and write
22675E9C000
heap
page read and write
22675DDD000
heap
page read and write
22676237000
heap
page read and write
22675987000
heap
page read and write
22DB60BC000
heap
page read and write
22DB60C8000
heap
page read and write
226761A0000
heap
page read and write
22677405000
heap
page read and write
2267599A000
heap
page read and write
22676B99000
heap
page read and write
22675F65000
heap
page read and write
2267599F000
heap
page read and write
22675F0D000
heap
page read and write
22676C59000
heap
page read and write
22676329000
heap
page read and write
22676456000
heap
page read and write
2267625B000
heap
page read and write
7FF74F3F4000
unkown
page readonly
226759C3000
heap
page read and write
7FF74F3EE000
unkown
page write copy
22675F52000
heap
page read and write
22675A0F000
heap
page read and write
226761B3000
heap
page read and write
226763CB000
heap
page read and write
226764C3000
heap
page read and write
22DB60C9000
heap
page read and write
226764A0000
heap
page read and write
226772F2000
heap
page read and write
22676329000
heap
page read and write
226759FE000
heap
page read and write
226764E7000
heap
page read and write
226759B0000
heap
page read and write
2267598B000
heap
page read and write
22DB61C4000
heap
page read and write
2267598D000
heap
page read and write
22675E67000
heap
page read and write
22675E0D000
heap
page read and write
22675A1E000
heap
page read and write
22676AF1000
heap
page read and write
226764CF000
heap
page read and write
22675D81000
heap
page read and write
22673EDE000
heap
page read and write
2267653E000
heap
page read and write
2AF83A10000
heap
page read and write
22676259000
heap
page read and write
22676C58000
heap
page read and write
226764D2000
heap
page read and write
226759FA000
heap
page read and write
236C33D9000
heap
page read and write
226759FA000
heap
page read and write
2267595B000
heap
page read and write
22675DE1000
heap
page read and write
226759CB000
heap
page read and write
22676D1C000
heap
page read and write
22675F1D000
heap
page read and write
226763CB000
heap
page read and write
22676B99000
heap
page read and write
226763E3000
heap
page read and write
226759D6000
heap
page read and write
22675E4C000
heap
page read and write
22675E9B000
heap
page read and write
226764C5000
heap
page read and write
22675DD9000
heap
page read and write
22676D1C000
heap
page read and write
22675E29000
heap
page read and write
22673EF2000
heap
page read and write
2267653E000
heap
page read and write
226764B4000
heap
page read and write
22676439000
heap
page read and write
22676496000
heap
page read and write
22675DC3000
heap
page read and write
22675DB8000
heap
page read and write
22676427000
heap
page read and write
22675E6A000
heap
page read and write
22676C1A000
heap
page read and write
22675995000
heap
page read and write
226759EF000
heap
page read and write
22676484000
heap
page read and write
22DB61D0000
heap
page read and write
22675EE3000
heap
page read and write
236C33E2000
heap
page read and write
226773DD000
heap
page read and write
There are 836 hidden memdumps, click here to show them.