IOC Report
nft438A5fN.exe

loading gif

Files

File Path
Type
Category
Malicious
nft438A5fN.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\Public\Libraries\Wuqtggvo
OpenPGP Public Key
dropped
malicious
C:\Users\Public\Libraries\Wuqtggvo.PIF
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\Public\Libraries\ovggtquW.cmd
DOS batch file, Unicode text, UTF-8 text, with very long lines (324), with CRLF line terminators
dropped
malicious
C:\Users\Public\Wuqtggvo.url
MS Windows 95 Internet shortcut text (URL=<file:"C:\\Users\\Public\\Libraries\\Wuqtggvo.PIF">), ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SndVol.exe_2a34d4499138a07f93f374c737745cafe30b7df_15f2fd1e_2ed2e291-1011-42c6-840c-dbd314cdf520\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_SndVol.exe_30a7c05382919c22758b99127e1564cf8a12d6a0_15f2fd1e_6f6af954-d08e-4f2a-95c1-614b15e172ca\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_colorcpl.exe_175fe811589184573733f29f8d90926c9d3acb6_ddba1c1d_896fd093-19ca-4a1e-8301-677a8a25e309\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_colorcpl.exe_3c3ed7f6d1b6f2b663d0a68a61f2223ae3ea1ea_ddba1c1d_100e9fa7-8485-408d-890e-a42f32003c03\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_colorcpl.exe_e08f44738a680ff1812c472f8c239d2dca1238f_ddba1c1d_97cf7208-2971-4814-be7b-50919cf9034b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_colorcpl.exe_e08f44738a680ff1812c472f8c239d2dca1238f_ddba1c1d_dae9bb0e-fa00-4fd8-8cf0-dc60dd63b84a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER810D.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Nov 26 07:12:26 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER82C3.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER8322.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAB2A.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Nov 26 07:12:37 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERAC44.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERACE2.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB5F8.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Nov 26 07:12:39 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB695.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB6C5.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC2C9.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Nov 26 07:12:43 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC3B4.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERC3F4.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCD29.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Nov 26 07:12:45 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCE53.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERCE73.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE351.tmp.dmp
Mini DuMP crash report, 14 streams, Tue Nov 26 07:12:51 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE40E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE42E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\Public\Libraries\PNO
ASCII text, with CRLF line terminators
dropped
C:\Users\Public\alpha.pif
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\Public\xpha.pif
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with CRLF, CR line terminators
dropped
\Device\Null
ASCII text, with CRLF, CR line terminators
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\nft438A5fN.exe
"C:\Users\user\Desktop\nft438A5fN.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\Public\Libraries\ovggtquW.cmd" "
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\cmd.exe /d C:\\Users\\Public\\alpha.pif /o
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl /y C:\\Windows\\System32\\ping.exe /d C:\\Users\\Public\\xpha.pif /o
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows "
malicious
C:\Windows\SysWOW64\esentutl.exe
C:\\Windows\\System32\\esentutl.exe /y C:\Users\user\Desktop\nft438A5fN.exe /d C:\\Users\\Public\\Libraries\\Wuqtggvo.PIF /o
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c mkdir "\\?\C:\Windows \SysWOW64"
malicious
C:\Windows\SysWOW64\colorcpl.exe
C:\Windows\System32\colorcpl.exe
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10
malicious
C:\Users\Public\xpha.pif
C:\\Users\\Public\\xpha.pif 127.0.0.1 -n 10
malicious
C:\Users\Public\Libraries\Wuqtggvo.PIF
"C:\Users\Public\Libraries\Wuqtggvo.PIF"
malicious
C:\Windows\SysWOW64\colorcpl.exe
C:\Windows\System32\colorcpl.exe
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c del "C:\Users\Public\xpha.pif"
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \SysWOW64
malicious
C:\Users\Public\alpha.pif
C:\\Users\\Public\\alpha.pif /c rmdir "C:\Windows \"
malicious
C:\Users\Public\Libraries\Wuqtggvo.PIF
"C:\Users\Public\Libraries\Wuqtggvo.PIF"
malicious
C:\Windows\SysWOW64\SndVol.exe
C:\Windows\System32\SndVol.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 652
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 432 -s 668
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4280 -s 660
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 432 -s 676
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 608
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1376 -s 624
There are 15 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://crl.sectigo.com/SectigoPublicCodeSigningCAEVR36.crl0
unknown
http://geoplugin.net/json.gp
unknown
https://drive.usercontent.google.com/dow
unknown
https://sectigo.com/CPS0
unknown
http://crl.sectigo.com/SectigoPublicCodeSigningRootR46.crl0
unknown
http://ocsp.sectigo.com0
unknown
https://drive.usercontent.google.com:443/download?id=1dnXhBmgnD9HLHSDJbmDBCMsTIXqIwKdiX?
unknown
http://geoplugin.net/json.gp/C
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningCAEVR36.crt0#
unknown
https://drive.usercontent.google.com/download?id=1dnXhBmgnD9HLHSDJbmDBCMsTIXqIwKdi
142.250.181.129
http://upx.sf.net
unknown
http://crt.sectigo.com/SectigoPublicCodeSigningRootR46.p7c0#
unknown
http://www.pmail.com
unknown
http://ocsp.sectigo.com0C
unknown
https://drive.usercontent.google.com/t
unknown
There are 5 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.usercontent.google.com
142.250.181.129

IPs

IP
Domain
Country
Malicious
142.250.181.129
drive.usercontent.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Wuqtggvo
malicious
\REGISTRY\A\{d4d87a8b-f5c9-89e9-ac1f-efe6783adc82}\Root\InventoryApplicationFile\colorcpl.exe|96dc59bdd2c9d72a
ProgramId
\REGISTRY\A\{d4d87a8b-f5c9-89e9-ac1f-efe6783adc82}\Root\InventoryApplicationFile\colorcpl.exe|96dc59bdd2c9d72a
FileId
\REGISTRY\A\{d4d87a8b-f5c9-89e9-ac1f-efe6783adc82}\Root\InventoryApplicationFile\colorcpl.exe|96dc59bdd2c9d72a
LowerCaseLongPath
\REGISTRY\A\{d4d87a8b-f5c9-89e9-ac1f-efe6783adc82}\Root\InventoryApplicationFile\colorcpl.exe|96dc59bdd2c9d72a
LongPathHash
\REGISTRY\A\{d4d87a8b-f5c9-89e9-ac1f-efe6783adc82}\Root\InventoryApplicationFile\colorcpl.exe|96dc59bdd2c9d72a
Name
\REGISTRY\A\{d4d87a8b-f5c9-89e9-ac1f-efe6783adc82}\Root\InventoryApplicationFile\colorcpl.exe|96dc59bdd2c9d72a
OriginalFileName
\REGISTRY\A\{d4d87a8b-f5c9-89e9-ac1f-efe6783adc82}\Root\InventoryApplicationFile\colorcpl.exe|96dc59bdd2c9d72a
Publisher
\REGISTRY\A\{d4d87a8b-f5c9-89e9-ac1f-efe6783adc82}\Root\InventoryApplicationFile\colorcpl.exe|96dc59bdd2c9d72a
Version
\REGISTRY\A\{d4d87a8b-f5c9-89e9-ac1f-efe6783adc82}\Root\InventoryApplicationFile\colorcpl.exe|96dc59bdd2c9d72a
BinFileVersion
\REGISTRY\A\{d4d87a8b-f5c9-89e9-ac1f-efe6783adc82}\Root\InventoryApplicationFile\colorcpl.exe|96dc59bdd2c9d72a
BinaryType
\REGISTRY\A\{d4d87a8b-f5c9-89e9-ac1f-efe6783adc82}\Root\InventoryApplicationFile\colorcpl.exe|96dc59bdd2c9d72a
ProductName
\REGISTRY\A\{d4d87a8b-f5c9-89e9-ac1f-efe6783adc82}\Root\InventoryApplicationFile\colorcpl.exe|96dc59bdd2c9d72a
ProductVersion
\REGISTRY\A\{d4d87a8b-f5c9-89e9-ac1f-efe6783adc82}\Root\InventoryApplicationFile\colorcpl.exe|96dc59bdd2c9d72a
LinkDate
\REGISTRY\A\{d4d87a8b-f5c9-89e9-ac1f-efe6783adc82}\Root\InventoryApplicationFile\colorcpl.exe|96dc59bdd2c9d72a
BinProductVersion
\REGISTRY\A\{d4d87a8b-f5c9-89e9-ac1f-efe6783adc82}\Root\InventoryApplicationFile\colorcpl.exe|96dc59bdd2c9d72a
AppxPackageFullName
\REGISTRY\A\{d4d87a8b-f5c9-89e9-ac1f-efe6783adc82}\Root\InventoryApplicationFile\colorcpl.exe|96dc59bdd2c9d72a
AppxPackageRelativeId
\REGISTRY\A\{d4d87a8b-f5c9-89e9-ac1f-efe6783adc82}\Root\InventoryApplicationFile\colorcpl.exe|96dc59bdd2c9d72a
Size
\REGISTRY\A\{d4d87a8b-f5c9-89e9-ac1f-efe6783adc82}\Root\InventoryApplicationFile\colorcpl.exe|96dc59bdd2c9d72a
Language
\REGISTRY\A\{d4d87a8b-f5c9-89e9-ac1f-efe6783adc82}\Root\InventoryApplicationFile\colorcpl.exe|96dc59bdd2c9d72a
IsOsComponent
\REGISTRY\A\{d4d87a8b-f5c9-89e9-ac1f-efe6783adc82}\Root\InventoryApplicationFile\colorcpl.exe|96dc59bdd2c9d72a
Usn
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00B8F8B0D2B
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C00B8F8B0D2B
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3200000
remote allocation
page execute and read and write
malicious
2E80000
remote allocation
page execute and read and write
malicious
2D17000
direct allocation
page execute and read and write
malicious
7E810000
direct allocation
page read and write
malicious
3290000
remote allocation
page execute and read and write
malicious
2740000
heap
page read and write
2CBE000
direct allocation
page read and write
6E000
unkown
page read and write
2FAE000
stack
page read and write
5250000
heap
page read and write
40000
unkown
page readonly
3042000
heap
page read and write
3052000
heap
page read and write
2B24000
heap
page read and write
3A53F000
heap
page read and write
3052000
heap
page read and write
295E000
heap
page read and write
7F310000
direct allocation
page read and write
2BA10000
heap
page read and write
8A000
unkown
page readonly
3042000
heap
page read and write
7EC80000
direct allocation
page read and write
3052000
heap
page read and write
826000
heap
page read and write
E40000
heap
page read and write
303E000
heap
page read and write
2FB0000
heap
page read and write
3310000
heap
page read and write
1CF000
stack
page read and write
3025000
heap
page read and write
3052000
heap
page read and write
7EBE0000
direct allocation
page read and write
303F000
heap
page read and write
540C000
heap
page read and write
2B3D000
stack
page read and write
540C000
heap
page read and write
9FF000
stack
page read and write
3052000
heap
page read and write
4B4000
heap
page read and write
396D3000
direct allocation
page read and write
287A000
direct allocation
page read and write
39E2E000
stack
page read and write
3A563000
heap
page read and write
3041000
heap
page read and write
7EA50000
direct allocation
page read and write
38B0000
heap
page read and write
8A000
unkown
page readonly
884000
heap
page read and write
32EF000
stack
page read and write
3025000
heap
page read and write
7E700000
direct allocation
page read and write
250E000
stack
page read and write
7FD90000
direct allocation
page read and write
303E000
heap
page read and write
610000
heap
page read and write
23E3000
direct allocation
page read and write
3062000
heap
page read and write
7EB50000
direct allocation
page read and write
303E000
heap
page read and write
20D1E000
stack
page read and write
7E630000
direct allocation
page read and write
7E9C0000
direct allocation
page read and write
87E000
stack
page read and write
6E000
unkown
page read and write
2290000
heap
page read and write
3052000
heap
page read and write
3AD40000
heap
page read and write
8D0000
heap
page read and write
468000
unkown
page read and write
741000
heap
page read and write
2290000
direct allocation
page read and write
22B0000
heap
page read and write
2A8E000
stack
page read and write
6F0000
heap
page read and write
3052000
heap
page read and write
288E000
stack
page read and write
6E000
unkown
page write copy
41000
unkown
page execute read
4C5000
heap
page read and write
2282000
direct allocation
page read and write
7FC20000
direct allocation
page read and write
3052000
heap
page read and write
3304000
remote allocation
page execute and read and write
1F0000
heap
page read and write
2EB0000
heap
page read and write
6E000
unkown
page write copy
22C3000
direct allocation
page read and write
80A000
heap
page read and write
2C9E000
stack
page read and write
3A738000
heap
page read and write
2FFE000
stack
page read and write
247D000
stack
page read and write
40000
unkown
page readonly
2ACFE000
stack
page read and write
7FC30000
direct allocation
page read and write
3010000
heap
page read and write
7FC70000
direct allocation
page read and write
303E000
heap
page read and write
2915000
heap
page read and write
3AD50000
trusted library allocation
page read and write
350000
heap
page read and write
2AF0000
heap
page read and write
2E5A000
heap
page read and write
6E000
unkown
page read and write
8E000
unkown
page readonly
2A794000
direct allocation
page read and write
3A6CF000
stack
page read and write
2322000
direct allocation
page read and write
2371000
direct allocation
page read and write
2BD50000
heap
page read and write
23D0000
heap
page read and write
3960E000
direct allocation
page read and write
3024000
heap
page read and write
303E000
heap
page read and write
9F0000
heap
page read and write
645000
heap
page read and write
3A534000
heap
page read and write
815000
heap
page read and write
3051000
heap
page read and write
3210000
heap
page read and write
27DD000
stack
page read and write
3052000
heap
page read and write
3042000
heap
page read and write
2C3E000
direct allocation
page read and write
330F000
stack
page read and write
39AEF000
stack
page read and write
8A000
unkown
page readonly
3052000
heap
page read and write
5850000
direct allocation
page read and write
303F000
heap
page read and write
28DA000
direct allocation
page read and write
31AF000
stack
page read and write
735000
heap
page read and write
8A000
unkown
page readonly
2A90000
heap
page read and write
2A7AA000
direct allocation
page read and write
3042000
heap
page read and write
27F0000
heap
page read and write
3052000
heap
page read and write
3052000
heap
page read and write
41000
unkown
page execute read
4AA000
heap
page read and write
3A6AF000
heap
page read and write
303F000
heap
page read and write
2D3F000
stack
page read and write
2B8FF000
stack
page read and write
303E000
heap
page read and write
3052000
heap
page read and write
2C11000
direct allocation
page execute read
381F000
stack
page read and write
800000
heap
page read and write
8A000
unkown
page readonly
200E0000
heap
page read and write
610000
heap
page read and write
4CB000
heap
page read and write
2A8FF000
stack
page read and write
8E000
unkown
page readonly
3A58E000
stack
page execute and read and write
303E000
heap
page read and write
303E000
heap
page read and write
2873000
direct allocation
page read and write
256E000
stack
page read and write
32F0000
heap
page read and write
303E000
heap
page read and write
2C30000
heap
page read and write
2E50000
heap
page read and write
28BC000
heap
page read and write
7EAC0000
direct allocation
page read and write
39FA0000
remote allocation
page read and write
2F74000
remote allocation
page execute and read and write
2E0B000
direct allocation
page execute and read and write
3024000
heap
page read and write
254E000
stack
page read and write
468000
unkown
page read and write
710000
heap
page read and write
3052000
heap
page read and write
4CD000
heap
page read and write
3024000
heap
page read and write
3052000
heap
page read and write
610000
heap
page read and write
3042000
heap
page read and write
28E1000
direct allocation
page read and write
3A458000
heap
page read and write
A80000
direct allocation
page read and write
3A290000
heap
page read and write
40000
unkown
page readonly
9B000
stack
page read and write
303E000
heap
page read and write
4B5000
heap
page read and write
6E000
unkown
page read and write
303F000
heap
page read and write
3052000
heap
page read and write
2ACE000
stack
page execute and read and write
74E000
stack
page read and write
303E000
heap
page read and write
53EB000
heap
page read and write
3052000
heap
page read and write
3052000
heap
page read and write
2F90000
heap
page read and write
3AAFE000
stack
page read and write
7EB40000
direct allocation
page read and write
7EF8F000
direct allocation
page read and write
883000
heap
page read and write
3052000
heap
page read and write
23F1000
direct allocation
page read and write
3A6BC000
direct allocation
page read and write
F6000
unkown
page readonly
72000
unkown
page read and write
2EF0000
heap
page read and write
7F140000
direct allocation
page read and write
5260000
heap
page read and write
3024000
heap
page read and write
3410000
heap
page read and write
3061000
heap
page read and write
A96000
heap
page read and write
2ACA000
stack
page read and write
3052000
heap
page read and write
2C95000
direct allocation
page read and write
3A9BE000
stack
page read and write
2AA3F000
stack
page read and write
2C41000
direct allocation
page execute read
45D000
unkown
page write copy
2FC0000
heap
page read and write
303F000
heap
page read and write
815000
heap
page read and write
7FCCC000
direct allocation
page read and write
2ABBE000
stack
page read and write
3052000
heap
page read and write
2563000
heap
page read and write
8E000
unkown
page readonly
B8C000
stack
page read and write
2EE0000
heap
page read and write
5050000
trusted library allocation
page read and write
303F000
heap
page read and write
7F140000
direct allocation
page read and write
2BB6F000
stack
page read and write
4F5D000
stack
page read and write
3052000
heap
page read and write
2C32000
heap
page read and write
3308000
remote allocation
page execute and read and write
7F0000
heap
page read and write
7FB3F000
direct allocation
page read and write
2EFA000
heap
page read and write
3A84E000
stack
page read and write
23EA000
direct allocation
page read and write
19D000
stack
page read and write
3052000
heap
page read and write
2378000
direct allocation
page read and write
2363000
direct allocation
page read and write
880000
heap
page read and write
5CA0000
trusted library allocation
page read and write
2FD0000
heap
page read and write
9F6000
heap
page read and write
2420000
direct allocation
page execute and read and write
8A000
unkown
page readonly
550F000
stack
page read and write
41000
unkown
page execute read
399EF000
stack
page read and write
32F4000
remote allocation
page execute and read and write
6E000
unkown
page read and write
4C5000
heap
page read and write
7E910000
direct allocation
page read and write
7F240000
direct allocation
page read and write
6E000
unkown
page read and write
5200000
heap
page read and write
39FA0000
remote allocation
page read and write
2410000
heap
page read and write
7FC9F000
direct allocation
page read and write
3A315000
heap
page read and write
2BFE000
stack
page read and write
F6000
unkown
page readonly
E2C000
stack
page read and write
2FB0000
heap
page read and write
3025000
heap
page read and write
2F60000
heap
page read and write
7FC20000
direct allocation
page read and write
9FF000
stack
page read and write
22350000
heap
page read and write
2EF8000
remote allocation
page execute and read and write
3046000
heap
page read and write
303E000
heap
page read and write
2EF4000
remote allocation
page execute and read and write
7FC20000
direct allocation
page read and write
68E000
stack
page read and write
7F100000
direct allocation
page read and write
7EC80000
direct allocation
page read and write
4CD000
heap
page read and write
3052000
heap
page read and write
7FC20000
direct allocation
page read and write
7F440000
direct allocation
page read and write
22B4000
direct allocation
page read and write
8A000
unkown
page readonly
2346000
direct allocation
page read and write
82C000
heap
page read and write
3052000
heap
page read and write
3DF000
stack
page read and write
2ADE000
stack
page read and write
4B4000
heap
page read and write
97D000
stack
page read and write
7CE000
stack
page read and write
27AF000
stack
page read and write
3052000
heap
page read and write
23E0000
trusted library allocation
page read and write
3A48C000
stack
page read and write
8E000
unkown
page readonly
39CED000
stack
page read and write
7F14A000
direct allocation
page read and write
397EF000
stack
page read and write
6E000
unkown
page write copy
236A000
direct allocation
page read and write
2A78D000
direct allocation
page read and write
2C97000
direct allocation
page execute and read and write
3042000
heap
page read and write
362A000
heap
page read and write
53D0000
heap
page read and write
7F310000
direct allocation
page read and write
F4000
unkown
page write copy
620000
heap
page read and write
7EAD2000
direct allocation
page read and write
2EF0000
heap
page read and write
22D8000
direct allocation
page read and write
3052000
heap
page read and write
3A58F000
stack
page read and write
BCD000
stack
page read and write
3042000
heap
page read and write
4B4000
heap
page read and write
26DD000
stack
page read and write
303E000
heap
page read and write
3052000
heap
page read and write
540C000
heap
page read and write
4C5000
heap
page read and write
396C4000
direct allocation
page read and write
3052000
heap
page read and write
303F000
heap
page read and write
3024000
heap
page read and write
7F440000
direct allocation
page read and write
7E7D0000
direct allocation
page read and write
7EA30000
direct allocation
page read and write
3A538000
heap
page read and write
303F000
heap
page read and write
46C000
unkown
page write copy
303F000
heap
page read and write
3A5CE000
stack
page read and write
640000
heap
page read and write
303E000
heap
page read and write
2D8F000
direct allocation
page execute and read and write
7FAB0000
direct allocation
page read and write
3052000
heap
page read and write
25AA000
heap
page read and write
209E7000
heap
page read and write
20040000
heap
page read and write
87F000
stack
page read and write
7FAD0000
direct allocation
page read and write
A20000
direct allocation
page execute and read and write
3051000
heap
page read and write
5406000
heap
page read and write
DA000
stack
page read and write
2002E000
stack
page read and write
303E000
heap
page read and write
29B3000
heap
page read and write
53BE000
stack
page read and write
40000
unkown
page readonly
645000
heap
page read and write
3A94F000
stack
page read and write
7FC20000
direct allocation
page read and write
303E000
heap
page read and write
7EAE0000
direct allocation
page read and write
3026000
heap
page read and write
2F20000
heap
page read and write
41000
unkown
page execute read
3052000
heap
page read and write
303E000
heap
page read and write
3025000
heap
page read and write
3AABF000
stack
page read and write
E30000
heap
page read and write
327D000
stack
page read and write
3026000
heap
page read and write
3052000
heap
page read and write
65D000
heap
page read and write
303E000
heap
page read and write
323C000
stack
page read and write
23D4000
direct allocation
page read and write
5406000
heap
page read and write
3A0EF000
stack
page read and write
3042000
heap
page read and write
40000
unkown
page readonly
7EF00000
direct allocation
page read and write
3052000
heap
page read and write
3052000
heap
page read and write
3042000
heap
page read and write
3042000
heap
page read and write
80A000
heap
page read and write
340E000
stack
page read and write
400000
unkown
page readonly
3024000
heap
page read and write
3100000
heap
page read and write
3480000
heap
page read and write
2C10000
heap
page read and write
2800000
heap
page read and write
303E000
heap
page read and write
3052000
heap
page read and write
2AA7E000
stack
page read and write
2C91000
direct allocation
page execute read
524E000
stack
page read and write
2410000
direct allocation
page execute and read and write
2DA000
stack
page read and write
7E910000
direct allocation
page read and write
29EE000
stack
page read and write
2696000
heap
page read and write
4CD000
heap
page read and write
8E000
unkown
page readonly
284F000
stack
page read and write
2A7B8000
direct allocation
page read and write
85B000
heap
page read and write
6E000
unkown
page write copy
345E000
stack
page read and write
3052000
heap
page read and write
70E000
stack
page read and write
396E1000
direct allocation
page read and write
39D2E000
stack
page read and write
537F000
stack
page read and write
3052000
heap
page read and write
9D000
stack
page read and write
82C000
heap
page read and write
815000
heap
page read and write
2AB7F000
stack
page read and write
8E000
unkown
page readonly
8E000
unkown
page readonly
618000
heap
page read and write
40000
unkown
page readonly
303F000
heap
page read and write
209E0000
heap
page read and write
8E000
unkown
page readonly
3025000
heap
page read and write
1F0000
heap
page read and write
468000
unkown
page read and write
320F000
stack
page read and write
7FC20000
direct allocation
page read and write
340000
heap
page read and write
2E0F000
stack
page read and write
28B6000
direct allocation
page read and write
7EA2F000
direct allocation
page read and write
7FC20000
direct allocation
page read and write
303E000
heap
page read and write
278E000
stack
page read and write
3A510000
heap
page read and write
3052000
heap
page read and write
540C000
heap
page read and write
294E000
stack
page read and write
53F5000
heap
page read and write
2FF0000
heap
page read and write
39BEF000
stack
page read and write
3A4F1000
heap
page read and write
7EEF0000
direct allocation
page read and write
7F900000
direct allocation
page read and write
2DE0000
heap
page read and write
2CC3000
direct allocation
page read and write
401000
unkown
page execute read
290E000
stack
page read and write
3A56C000
heap
page read and write
397EE000
stack
page execute and read and write
8FF000
stack
page read and write
80A000
heap
page read and write
3AC3E000
stack
page read and write
303F000
heap
page read and write
3052000
heap
page read and write
3052000
heap
page read and write
23DC000
direct allocation
page read and write
980000
direct allocation
page read and write
7E99F000
direct allocation
page read and write
41000
unkown
page execute read
2410000
heap
page read and write
7FA30000
direct allocation
page read and write
8E000
unkown
page readonly
80E000
heap
page read and write
3A8E6000
heap
page read and write
2940000
heap
page read and write
78F000
stack
page read and write
7FC6F000
direct allocation
page read and write
77E000
stack
page read and write
7EB8F000
direct allocation
page read and write
8CF000
heap
page read and write
41000
unkown
page execute read
5406000
heap
page read and write
28BD000
direct allocation
page read and write
18E000
stack
page read and write
2008F000
stack
page read and write
4CD000
heap
page read and write
2CC7000
direct allocation
page execute and read and write
2A9A000
heap
page read and write
3042000
heap
page read and write
3042000
heap
page read and write
3A170000
heap
page read and write
3052000
heap
page read and write
7EB8F000
direct allocation
page read and write
2ACBE000
stack
page read and write
2CA0000
heap
page read and write
3042000
heap
page read and write
700000
heap
page read and write
A30000
heap
page read and write
4F9B000
stack
page read and write
27DE000
stack
page read and write
3A17F000
heap
page read and write
3024000
heap
page read and write
3042000
heap
page read and write
2520000
heap
page read and write
2560000
heap
page read and write
F1000
unkown
page execute read
8CB000
heap
page read and write
8E000
unkown
page readonly
7F150000
direct allocation
page read and write
30EF000
stack
page read and write
3025000
heap
page read and write
7E9A0000
direct allocation
page read and write
303E000
heap
page read and write
2B8BE000
stack
page read and write
7F900000
direct allocation
page read and write
490000
heap
page read and write
8E000
unkown
page readonly
7E930000
direct allocation
page read and write
2BB2E000
stack
page read and write
20830000
heap
page read and write
8CE000
stack
page read and write
41000
unkown
page execute read
2570000
heap
page read and write
3052000
heap
page read and write
28A8000
direct allocation
page read and write
626000
heap
page read and write
40000
unkown
page readonly
4F99000
stack
page read and write
2F2A000
heap
page read and write
3ABFE000
stack
page read and write
39FA0000
remote allocation
page read and write
249C000
stack
page read and write
23CD000
direct allocation
page read and write
879000
heap
page read and write
3052000
heap
page read and write
2F0E000
stack
page read and write
2B3F000
stack
page read and write
32FD000
stack
page read and write
2B0E000
stack
page read and write
395DE000
direct allocation
page read and write
303E000
heap
page read and write
4CB000
heap
page read and write
70A000
heap
page read and write
303E000
heap
page read and write
294A000
heap
page read and write
3052000
heap
page read and write
7FCAF000
direct allocation
page read and write
7F240000
direct allocation
page read and write
3A2A5000
heap
page read and write
2A6E000
stack
page read and write
40000
unkown
page readonly
3051000
heap
page read and write
3052000
heap
page read and write
3274000
remote allocation
page execute and read and write
46A000
unkown
page read and write
A90000
heap
page read and write
2790000
heap
page read and write
5406000
heap
page read and write
398EF000
stack
page read and write
6E000
unkown
page write copy
20870000
heap
page read and write
3024000
heap
page read and write
7E90F000
direct allocation
page read and write
3041000
heap
page read and write
F0000
unkown
page readonly
7EFC0000
direct allocation
page read and write
3042000
heap
page read and write
2ADFF000
stack
page read and write
40000
unkown
page readonly
3052000
heap
page read and write
2A93E000
stack
page read and write
4AA000
heap
page read and write
8A000
unkown
page readonly
3025000
heap
page read and write
7EC80000
direct allocation
page read and write
3278000
remote allocation
page execute and read and write
8A000
unkown
page readonly
3042000
heap
page read and write
2395000
direct allocation
page read and write
2B9F8000
heap
page read and write
396DA000
direct allocation
page read and write
2A77F000
direct allocation
page read and write
3A567000
heap
page read and write
28CE000
stack
page read and write
4CE0000
direct allocation
page read and write
27EE000
stack
page read and write
3024000
heap
page read and write
396A8000
direct allocation
page read and write
1FFDF000
stack
page read and write
28D3000
direct allocation
page read and write
2690000
heap
page read and write
8A000
unkown
page readonly
2A7A3000
direct allocation
page read and write
28E8000
direct allocation
page read and write
F4000
unkown
page read and write
471000
unkown
page readonly
7FC30000
direct allocation
page read and write
303E000
heap
page read and write
28C4000
direct allocation
page read and write
358F000
stack
page read and write
2B80000
heap
page read and write
396BD000
direct allocation
page read and write
3052000
heap
page read and write
3042000
heap
page read and write
3A58A000
stack
page read and write
2ACE000
stack
page read and write
A00000
heap
page read and write
3A80F000
stack
page read and write
2354000
direct allocation
page read and write
2590000
heap
page read and write
8D6000
heap
page read and write
70E000
heap
page read and write
23BC000
stack
page read and write
7EB8F000
direct allocation
page read and write
342F000
stack
page read and write
8A000
unkown
page readonly
3024000
heap
page read and write
3A2A7000
heap
page read and write
2330000
direct allocation
page read and write
395B0000
direct allocation
page read and write
2B900000
heap
page read and write
3052000
heap
page read and write
22BC000
direct allocation
page read and write
2ACF000
stack
page read and write
2A3D000
stack
page read and write
3052000
heap
page read and write
68E000
stack
page read and write
22D1000
direct allocation
page read and write
303E000
heap
page read and write
53EA000
heap
page read and write
29F0000
heap
page read and write
3052000
heap
page read and write
46A000
unkown
page read and write
6E000
unkown
page write copy
1E0000
heap
page read and write
2B9F0000
heap
page read and write
303F000
heap
page read and write
7F1D0000
direct allocation
page read and write
498000
heap
page read and write
9B000
stack
page read and write
41000
unkown
page execute read
303E000
heap
page read and write
3025000
heap
page read and write
2BD0000
heap
page read and write
303E000
heap
page read and write
303E000
heap
page read and write
7FC50000
direct allocation
page read and write
3042000
heap
page read and write
9E0000
heap
page read and write
234D000
direct allocation
page read and write
29D000
stack
page read and write
19D000
stack
page read and write
303E000
heap
page read and write
39FEE000
stack
page read and write
3A4FC000
heap
page read and write
39E6E000
stack
page read and write
4E40000
trusted library allocation
page read and write
209CF000
stack
page read and write
2D40000
heap
page read and write
2E0E000
direct allocation
page execute and read and write
40000
unkown
page readonly
3052000
heap
page read and write
1D0000
heap
page read and write
22310000
heap
page read and write
7F20F000
direct allocation
page read and write
7EB40000
direct allocation
page read and write
3052000
heap
page read and write
20840000
heap
page read and write
3025000
heap
page read and write
27E0000
heap
page read and write
3052000
heap
page read and write
3052000
heap
page read and write
F1000
unkown
page execute read
4AC000
heap
page read and write
3AD3F000
stack
page read and write
2C65000
direct allocation
page read and write
7F440000
direct allocation
page read and write
82C000
heap
page read and write
45D000
unkown
page read and write
140000
heap
page read and write
3052000
heap
page read and write
4CB000
heap
page read and write
7FC20000
direct allocation
page read and write
7E8A0000
direct allocation
page read and write
2E4F000
stack
page read and write
3E0000
heap
page read and write
396A0000
direct allocation
page read and write
7FC20000
direct allocation
page read and write
396AF000
direct allocation
page read and write
41000
unkown
page execute read
303F000
heap
page read and write
2C93000
direct allocation
page read and write
3A730000
trusted library allocation
page read and write
53D9000
heap
page read and write
8E000
unkown
page readonly
9B000
stack
page read and write
3042000
heap
page read and write
259F000
heap
page read and write
7ECF0000
direct allocation
page read and write
303E000
heap
page read and write
30F0000
heap
page read and write
3026000
heap
page read and write
A30000
heap
page read and write
3AD5F000
trusted library allocation
page read and write
2E00000
heap
page read and write
40000
unkown
page readonly
19D000
stack
page read and write
7FCD0000
direct allocation
page read and write
3052000
heap
page read and write
4AC000
heap
page read and write
3042000
heap
page read and write
2F8D000
stack
page read and write
2CEE000
stack
page read and write
3052000
heap
page read and write
2C90000
direct allocation
page readonly
28AF000
direct allocation
page read and write
826000
heap
page read and write
397EA000
stack
page read and write
39F6E000
stack
page read and write
303E000
heap
page read and write
40000
unkown
page readonly
3A183000
heap
page read and write
2400000
heap
page read and write
22AD000
direct allocation
page read and write
3052000
heap
page read and write
3026000
heap
page read and write
3052000
heap
page read and write
303E000
heap
page read and write
2C6E000
direct allocation
page read and write
31EE000
stack
page read and write
4CB000
heap
page read and write
7EF00000
direct allocation
page read and write
5580000
heap
page read and write
7EC70000
direct allocation
page read and write
A33000
heap
page read and write
23DD000
stack
page read and write
7EB20000
direct allocation
page read and write
2AD3000
heap
page read and write
320F000
unkown
page read and write
3062000
heap
page read and write
2B9D000
stack
page read and write
9F0000
heap
page read and write
3052000
heap
page read and write
3A73F000
trusted library allocation
page read and write
396B6000
direct allocation
page read and write
3025000
heap
page read and write
22CA000
direct allocation
page read and write
2A7FE000
stack
page read and write
640000
heap
page read and write
3052000
heap
page read and write
7FC60000
direct allocation
page read and write
2D8B000
direct allocation
page execute and read and write
7E918000
direct allocation
page read and write
2A786000
direct allocation
page read and write
830000
heap
page read and write
3052000
heap
page read and write
826000
heap
page read and write
3052000
heap
page read and write
A2E000
unkown
page read and write
3062000
heap
page read and write
3052000
heap
page read and write
45D000
unkown
page read and write
22E0000
heap
page read and write
3051000
heap
page read and write
3024000
heap
page read and write
23F8000
direct allocation
page read and write
9DF000
stack
page read and write
2AFD000
stack
page read and write
2D40000
heap
page read and write
38C0000
heap
page read and write
3384000
remote allocation
page execute and read and write
730000
heap
page read and write
396CC000
direct allocation
page read and write
2F30000
heap
page read and write
3052000
heap
page read and write
3A4F0000
heap
page read and write
301B000
heap
page read and write
3052000
heap
page read and write
8A000
unkown
page readonly
2CFE000
stack
page read and write
20100000
heap
page read and write
3A530000
heap
page read and write
3A5E0000
heap
page read and write
7F1AF000
direct allocation
page read and write
235C000
direct allocation
page read and write
7E888000
direct allocation
page read and write
3052000
heap
page read and write
3052000
heap
page read and write
7F150000
direct allocation
page read and write
41000
unkown
page execute read
750000
heap
page read and write
29A0000
heap
page read and write
3042000
heap
page read and write
3052000
heap
page read and write
2A70A000
direct allocation
page read and write
45D000
unkown
page read and write
2859000
heap
page read and write
1F0000
heap
page read and write
7F900000
direct allocation
page read and write
283A000
direct allocation
page read and write
303E000
heap
page read and write
540C000
heap
page read and write
26FD000
stack
page read and write
39626000
direct allocation
page read and write
53F5000
heap
page read and write
24BD000
stack
page read and write
3A70E000
stack
page read and write
2DBB000
direct allocation
page execute and read and write
39E000
stack
page read and write
41000
unkown
page execute read
2098E000
stack
page read and write
DEC000
stack
page read and write
3051000
heap
page read and write
7F080000
direct allocation
page read and write
3052000
heap
page read and write
7FC20000
direct allocation
page read and write
3025000
heap
page read and write
7EB40000
direct allocation
page read and write
3024000
heap
page read and write
2C1A000
heap
page read and write
7F9000
heap
page read and write
7F0E0000
direct allocation
page read and write
200E8000
heap
page read and write
7FB60000
direct allocation
page read and write
3A56D000
heap
page read and write
2911000
heap
page read and write
20D5E000
stack
page read and write
396E8000
direct allocation
page read and write
81E000
stack
page read and write
3052000
heap
page read and write
41000
unkown
page execute read
23B0000
direct allocation
page read and write
3024000
heap
page read and write
303F000
heap
page read and write
2A40000
heap
page read and write
F0000
unkown
page readonly
82C000
heap
page read and write
3052000
heap
page read and write
3620000
heap
page read and write
3052000
heap
page read and write
2A7B1000
direct allocation
page read and write
6CE000
stack
page read and write
23EF000
trusted library allocation
page read and write
303E000
heap
page read and write
3052000
heap
page read and write
293D000
stack
page read and write
There are 838 hidden memdumps, click here to show them.