IOC Report
z69ClienteNFe-Faturada-15042024.msi

loading gif

Files

File Path
Type
Category
Malicious
z69ClienteNFe-Faturada-15042024.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {B5D78B8B-DFC1-4A2C-B088-3448D87C823D}, Number of Words: 10, Subject: DaemonToolsPro, Author: Daemon Tools Pro, Name of Creating Application: DaemonToolsPro, Template: ;1033, Comments: This installer database contains the logic and data required to install DaemonToolsPro., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Sat Apr 13 20:11:52 2024, Last Saved Time/Date: Sat Apr 13 20:11:52 2024, Last Printed: Sat Apr 13 20:11:52 2024, Number of Pages: 450
initial sample
malicious
C:\Users\user\AppData\Roaming\DTCommonRes.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Config.Msi\69234a.rbs
data
modified
C:\Users\user\AppData\Roaming\FomsTudio .exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Windows\Installer\692348.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {B5D78B8B-DFC1-4A2C-B088-3448D87C823D}, Number of Words: 10, Subject: DaemonToolsPro, Author: Daemon Tools Pro, Name of Creating Application: DaemonToolsPro, Template: ;1033, Comments: This installer database contains the logic and data required to install DaemonToolsPro., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Sat Apr 13 20:11:52 2024, Last Saved Time/Date: Sat Apr 13 20:11:52 2024, Last Printed: Sat Apr 13 20:11:52 2024, Number of Pages: 450
dropped
C:\Windows\Installer\MSI24DE.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI25AA.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI25DA.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI261A.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI2669.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI26D7.tmp
data
dropped
C:\Windows\Installer\SourceHash{7CF68476-6C14-470A-B502-0AF87529D6C4}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\~DF17ED5E811BFCD075.TMP
data
dropped
C:\Windows\Temp\~DF29CA92E203D81D61.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF3C7E6D4BA676129A.TMP
data
dropped
C:\Windows\Temp\~DF78DF37D97A064E06.TMP
data
dropped
C:\Windows\Temp\~DF7BE61B08C4E9F100.TMP
data
dropped
C:\Windows\Temp\~DF9E288FBEF4E52C9B.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFAECB8B62FBF941A8.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFBD1BCB0C64FB00ED.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFD0DCFE88B6D5D3FC.TMP
data
dropped
C:\Windows\Temp\~DFD824A2E40EC93280.TMP
data
dropped
C:\Windows\Temp\~DFF50F701B66727A4C.TMP
data
dropped
C:\Windows\Temp\~DFFFC47546BC8256A1.TMP
Composite Document File V2 Document, Cannot read section info
dropped
There are 16 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\AppData\Roaming\FomsTudio .exe
"C:\Users\user\AppData\Roaming\FomsTudio .exe"
malicious
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\msiexec.exe" /i "C:\Users\user\Desktop\z69ClienteNFe-Faturada-15042024.msi"
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 90E3F561E19B31EB596B0EC133B15279

URLs

Name
IP
Malicious
https://www.daemon-tools.cc/contacts/producttechnicalsupporthttps://www.daemon-tools.cc/account/seri
unknown
https://i.pinimg.com/236x/5b/f8/1a/5bf81a501ab9d26db806e7fec4edfa75.jpgp
unknown
https://www.reportscustomer.store/j
unknown
https://pix.servebbs.com/com7
unknown
https://pix.servebbs.com/th
unknown
https://i.pinimg.com/236x/5bN
unknown
https://pix.servebbs.com/f
unknown
https://pix.servebbs.com/senddata.php03
unknown
https://pix.servebbs.com/sendonline.phpA03
unknown
https://pix.servebbs.com/sendonline.phpike
unknown
https://pix.servebbs.com/h
unknown
https://www.reportscustomer.store/p
unknown
https://www.daemon-tools.cc/account/serials?email=%shttps://www.daemon-tools.cc/cart/set_upgrade?con
unknown
https://pix.servebbs.com/comB
unknown
https://pix.servebbs.com:443/sendonline.php
unknown
https://pix.servebbs.com/n
unknown
https://pix.servebbs.com/p
unknown
https://pix.servebbs.com/bs.com/
unknown
https://pix.servebbs.com/k
unknown
https://pix.servebbs.com/l
unknown
https://www.reportscustomer.store/gui/index.phpF
unknown
https://pix.servebbs.com/tw
unknown
https://pix.servebbs.com/w
unknown
https://i.pinimg.com/236x/5b/f8/1a/5bf81a501ab9d26db806e7fec4edfa75.jpg6D7
unknown
https://www.daemon-tools.cc/contacts/producttechnicalsupport?&product=%s&os=%s&hwkey=%sonFindSpecial
unknown
https://i.pinimg.com/236x/5b/f8/1a/5bf81a501ab9d26db806e7fec4edfa75.jpg
151.101.12.84
https://pix.servebbs.com/sendonline.php
178.128.15.164
https://www.daemon-tools.cc/cart/buy_check?abbr=%s&coupon_code=20off%s&system_key=%s&utm_source=%s&u
unknown
https://pix.servebbs.com/sendlog.php03
unknown
https://i.pinimg.com/I
unknown
https://pix.servebbs.com/F
unknown
https://pix.servebbs.com/G
unknown
https://pix.servebbs.com/sendonline.php-
unknown
https://pix.servebbs.com/sendonline.php.
unknown
https://www.reportscustomer.store/gui/index.phpA
unknown
https://www.reportscustomer.store/w$w
unknown
https://pix.servebbs.com/com
unknown
https://pix.servebbs.com:443/sendonline.phpG
unknown
https://pix.servA
unknown
https://pix.servebbs.com/pP
unknown
https://pix.servebbs.com/sendonline.php4
unknown
https://pix.servebbs.com/P
unknown
https://pix.servebbs.com:443/2
unknown
https://i.pinimg.com/ore
unknown
https://pix.servebbs.com/sendonline.php0
unknown
https://pix.servebbs.com:443/
unknown
https://pix.serv5
unknown
https://pix.servebbs.com/R
unknown
https://pix.servebbs.com/
178.128.15.164
https://pix.servebbs.com:443/sendonline.phpW
unknown
https://pix.servebbs.com/sendonline.php4j
unknown
https://pix.servebbs.com/sendonline.phpB
unknown
https://pix.servebbs.com/sendonline.phpM
unknown
https://i.pinimg.com:443/236x/5b/f8/1a/5bf81a501ab9d26db806e7fec4edfa75.jpg
unknown
https://pix.serv
unknown
https://www.reportscustomer.store:443/gui/index.phpC
unknown
https://www.reportscustomer.store/
unknown
https://ix.servebbs.com/er.store/gui/index.php
unknown
https://pix.servebbs.com/POST
unknown
https://pix.servebbs.com/sendonline.phpP
unknown
https://pix.servebbs.com/sendonline.phpZmM
unknown
https://pix.servebbs.com/sendonline.phpR
unknown
https://pix.servebbs.com/coms
unknown
https://pix.servebbs.com/7
unknown
https://pix.servebbs.com/sendonline.php-8Content-Type
unknown
https://www.reportscustomer.store/gui/index.php
187.1.138.172
https://pix.servebbs.com/2
unknown
https://www.reportscustomer.store/?
unknown
https://pix.servebbs.com/comp
unknown
https://pix.servebbs.com/sendonline.phpX
unknown
https://pix.servebbs.com/4
unknown
https://pix.servebbs.com/5
unknown
https://pix.servebbs.com/sendonline.phpebbs
unknown
https://pix.servebbs.com/senddataB.php03
unknown
https://pix.servebbs.com/sendonline.phpd
unknown
https://i.pinimg.com/236x/5b/f8/1a/5bf81a501ab9d26db806e7fec4edfa75.jpgP
unknown
https://pix.servebbs.com/z
unknown
https://pix.servebbscom/
unknown
https://pix.servebbs.com:443/sendonline.phpn64;
unknown
https://pix.servebbs.com/sendonline.phph
unknown
https://www.daemon-tools.cc/account/serialsAdd
unknown
There are 71 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pix.servebbs.com
178.128.15.164
www.reportscustomer.store
187.1.138.172
dualstack.pinterest.map.fastly.net
151.101.12.84
i.pinimg.com
unknown

IPs

IP
Domain
Country
Malicious
178.128.15.164
pix.servebbs.com
Netherlands
151.101.12.84
dualstack.pinterest.map.fastly.net
United States
187.1.138.172
www.reportscustomer.store
Brazil

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\69234a.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\69234a.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\Microsoft\Installer\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\3CB28F16924C1634DB4E15C25BA5C054
67486FC741C6A0745B20A08F57926D4C
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\81D5FA2980CB71E4DA56BA9BAC29F70C
67486FC741C6A0745B20A08F57926D4C
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\3D9F9F883D04F91488E349689A01DAD5
67486FC741C6A0745B20A08F57926D4C
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\4387993669AF29D4AA93C889D57DA013
67486FC741C6A0745B20A08F57926D4C
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1002\Components\5DFB1026E44FA28489E6330EA50CFA1B
67486FC741C6A0745B20A08F57926D4C
HKEY_CURRENT_USER\SOFTWARE\Daemon Tools Pro\DaemonToolsPro
Version
HKEY_CURRENT_USER\SOFTWARE\Daemon Tools Pro\DaemonToolsPro
Path
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\System32\ci.dll,-100
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\System32\ci.dll,-101
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\System32\fveui.dll,-843
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\System32\fveui.dll,-844
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\24\417C44EB
@%SystemRoot%\system32\NgcRecovery.dll,-100
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF7AE7F8000
unkown
page readonly
7FF7AE8D9000
unkown
page readonly
19D75480000
trusted library allocation
page read and write
19D777BB000
heap
page read and write
19D7343E000
heap
page read and write
19D75300000
heap
page read and write
6669F000
unkown
page read and write
19D7343C000
heap
page read and write
19D77708000
heap
page read and write
19D7343E000
heap
page read and write
19D77773000
heap
page read and write
19D77781000
heap
page read and write
19D73415000
heap
page read and write
19D73358000
heap
page read and write
19D777D1000
heap
page read and write
19D73419000
heap
page read and write
19D776F8000
heap
page read and write
19D77757000
heap
page read and write
19D77955000
trusted library allocation
page read and write
19D7770D000
heap
page read and write
19D777B9000
heap
page read and write
666A8000
unkown
page write copy
666AB000
unkown
page readonly
19D73435000
heap
page read and write
66631000
unkown
page write copy
19D77951000
trusted library allocation
page read and write
19D7339A000
heap
page read and write
19D73437000
heap
page read and write
494DEFE000
stack
page read and write
19D77708000
heap
page read and write
19D73420000
heap
page read and write
19D733CD000
heap
page read and write
19D75710000
heap
page read and write
19D7778D000
heap
page read and write
19D733F0000
heap
page read and write
66651000
unkown
page write copy
19D7341D000
heap
page read and write
19D77950000
trusted library allocation
page read and write
19D73415000
heap
page read and write
19D776FE000
heap
page read and write
19D7343D000
heap
page read and write
19D73388000
heap
page read and write
19D777B7000
heap
page read and write
19D776FF000
heap
page read and write
19D77701000
heap
page read and write
19D77953000
trusted library allocation
page read and write
19D77757000
heap
page read and write
19D77773000
heap
page read and write
19D77757000
heap
page read and write
19D733CA000
heap
page read and write
19D77777000
heap
page read and write
19D777C9000
heap
page read and write
19D73443000
heap
page read and write
19D777A4000
heap
page read and write
19D73438000
heap
page read and write
19D77777000
heap
page read and write
19D77701000
heap
page read and write
19D75575000
heap
page read and write
19D73413000
heap
page read and write
19D77757000
heap
page read and write
19D73436000
heap
page read and write
19D74D38000
direct allocation
page read and write
19D7770D000
heap
page read and write
19D74D21000
direct allocation
page read and write
19D776FE000
heap
page read and write
6664B000
unkown
page read and write
6664F000
unkown
page write copy
19D77701000
heap
page read and write
19D733F0000
heap
page read and write
19D732F5000
heap
page read and write
19D7775A000
heap
page read and write
19D73420000
heap
page read and write
19D777CD000
heap
page read and write
19D77781000
heap
page read and write
19D7777C000
heap
page read and write
19D77757000
heap
page read and write
19D73443000
heap
page read and write
19D73415000
heap
page read and write
19D733EB000
heap
page read and write
19D73436000
heap
page read and write
19D777AC000
heap
page read and write
19D73387000
heap
page read and write
19D73443000
heap
page read and write
19D77708000
heap
page read and write
19D777BB000
heap
page read and write
66698000
unkown
page read and write
19D77781000
heap
page read and write
7FF7AE8D4000
unkown
page read and write
19D73443000
heap
page read and write
19D77766000
heap
page read and write
19D73415000
heap
page read and write
19D75500000
heap
page read and write
19D774E0000
remote allocation
page read and write
66660000
unkown
page write copy
19D733F0000
heap
page read and write
19D777D1000
heap
page read and write
494E1F9000
stack
page read and write
19D7778D000
heap
page read and write
19D75510000
heap
page read and write
19D777B9000
heap
page read and write
19D7778D000
heap
page read and write
19D777CB000
heap
page read and write
19D777BB000
heap
page read and write
19D7340D000
heap
page read and write
19D732B0000
heap
page read and write
19D7770D000
heap
page read and write
19D77773000
heap
page read and write
7FF7AE957000
unkown
page readonly
666A9000
unkown
page readonly
19D73421000
heap
page read and write
6664D000
unkown
page read and write
19D73415000
heap
page read and write
66664000
unkown
page write copy
19D75620000
heap
page read and write
19D77660000
heap
page read and write
19D7341D000
heap
page read and write
494DDFE000
stack
page read and write
494D73A000
stack
page read and write
19D7777C000
heap
page read and write
19D7341B000
heap
page read and write
19D777A9000
heap
page read and write
19D777A7000
heap
page read and write
19D77770000
heap
page read and write
19D777B2000
heap
page read and write
19D73431000
heap
page read and write
19D733CA000
heap
page read and write
19D7770D000
heap
page read and write
19D774A0000
heap
page read and write
6666E000
unkown
page write copy
19D7343E000
heap
page read and write
19D733EB000
heap
page read and write
494E4FE000
stack
page read and write
7FF7AE5C0000
unkown
page readonly
19D73438000
heap
page read and write
19D77708000
heap
page read and write
7FF7AE8BE000
unkown
page write copy
19D74D56000
direct allocation
page read and write
19D77950000
trusted library allocation
page read and write
19D7340D000
heap
page read and write
19D73426000
heap
page read and write
19D74DBF000
direct allocation
page read and write
19D74D19000
direct allocation
page read and write
19D73435000
heap
page read and write
19D733F0000
heap
page read and write
494E5FD000
stack
page read and write
19D7770D000
heap
page read and write
19D777A7000
heap
page read and write
19D777A7000
heap
page read and write
19D77957000
trusted library allocation
page read and write
19D7776E000
heap
page read and write
19D7343E000
heap
page read and write
19D754D0000
heap
page read and write
19D74D9C000
direct allocation
page read and write
19D77781000
heap
page read and write
19D75620000
heap
page read and write
19D7779F000
heap
page read and write
19D7343E000
heap
page read and write
6665F000
unkown
page read and write
19D74D84000
direct allocation
page read and write
19D776FE000
heap
page read and write
66240000
unkown
page readonly
19D77781000
heap
page read and write
19D7778D000
heap
page read and write
19D74D48000
direct allocation
page read and write
19D77766000
heap
page read and write
19D74DC6000
direct allocation
page read and write
19D7339A000
heap
page read and write
19D77757000
heap
page read and write
66659000
unkown
page read and write
66654000
unkown
page read and write
19D7778D000
heap
page read and write
19D7770D000
heap
page read and write
19D777D0000
heap
page read and write
19D73438000
heap
page read and write
19D7770E000
heap
page read and write
19D777A2000
heap
page read and write
19D7341B000
heap
page read and write
19D77766000
heap
page read and write
7FF7AE957000
unkown
page readonly
19D73300000
heap
page read and write
19D73443000
heap
page read and write
19D7770E000
heap
page read and write
19D7779F000
heap
page read and write
19D7770D000
heap
page read and write
19D776D0000
heap
page read and write
19D77954000
trusted library allocation
page read and write
19D733CD000
heap
page read and write
19D7779F000
heap
page read and write
19D73443000
heap
page read and write
19D77766000
heap
page read and write
7FF7AE8CD000
unkown
page read and write
66687000
unkown
page write copy
19D77701000
heap
page read and write
19D77777000
heap
page read and write
19D74CEC000
direct allocation
page read and write
19D7770E000
heap
page read and write
19D7779F000
heap
page read and write
19D73443000
heap
page read and write
19D77757000
heap
page read and write
7FF7AE910000
unkown
page readonly
19D777D1000
heap
page read and write
19D77757000
heap
page read and write
19D77708000
heap
page read and write
19D757D0000
heap
page read and write
19D77781000
heap
page read and write
19D77700000
heap
page read and write
19D733CA000
heap
page read and write
66644000
unkown
page read and write
19D754E0000
heap
page read and write
19D7341D000
heap
page read and write
66686000
unkown
page read and write
19D7779F000
heap
page read and write
19D77950000
trusted library allocation
page read and write
19D7779F000
heap
page read and write
7FF7AE8C1000
unkown
page read and write
19D7779F000
heap
page read and write
19D777B9000
heap
page read and write
19D77781000
heap
page read and write
19D777C9000
heap
page read and write
19D777A8000
heap
page read and write
7FF7AE7F8000
unkown
page readonly
19D7341F000
heap
page read and write
19D7779F000
heap
page read and write
19D777B0000
heap
page read and write
19D74DCD000
direct allocation
page read and write
19D733EB000
heap
page read and write
19D73438000
heap
page read and write
19D7343F000
heap
page read and write
19D7779F000
heap
page read and write
19D774E0000
remote allocation
page read and write
19D77708000
heap
page read and write
19D777B0000
heap
page read and write
19D74DF1000
direct allocation
page read and write
19D776FD000
heap
page read and write
19D73443000
heap
page read and write
19D77950000
trusted library allocation
page read and write
19D77777000
heap
page read and write
19D7343C000
heap
page read and write
19D7778D000
heap
page read and write
19D77781000
heap
page read and write
19D77781000
heap
page read and write
19D776E0000
heap
page read and write
19D73443000
heap
page read and write
19D7770D000
heap
page read and write
7FF7AE8BF000
unkown
page write copy
19D77757000
heap
page read and write
19D77757000
heap
page read and write
19D77703000
heap
page read and write
19D7343C000
heap
page read and write
19D758E0000
heap
page read and write
19D777CD000
heap
page read and write
19D75585000
heap
page read and write
19D7770D000
heap
page read and write
6664C000
unkown
page write copy
66658000
unkown
page write copy
19D77757000
heap
page read and write
19D777B7000
heap
page read and write
19D754A0000
heap
page read and write
66657000
unkown
page read and write
19D733CD000
heap
page read and write
19D77701000
heap
page read and write
19D77959000
trusted library allocation
page read and write
19D77757000
heap
page read and write
666A3000
unkown
page read and write
19D777C9000
heap
page read and write
19D777AC000
heap
page read and write
19D74D4F000
direct allocation
page read and write
19D7340D000
heap
page read and write
19D73443000
heap
page read and write
19D75690000
heap
page read and write
19D74DB8000
direct allocation
page read and write
19D74CF9000
direct allocation
page read and write
19D777B9000
heap
page read and write
19D77708000
heap
page read and write
19D7770D000
heap
page read and write
19D777BB000
heap
page read and write
666A2000
unkown
page write copy
66241000
unkown
page execute read
19D77781000
heap
page read and write
19D77701000
heap
page read and write
19D77701000
heap
page read and write
19D7779F000
heap
page read and write
19D777BB000
heap
page read and write
19D77708000
heap
page read and write
19D73421000
heap
page read and write
19D75140000
direct allocation
page execute and read and write
19D74D7D000
direct allocation
page read and write
19D77701000
heap
page read and write
19D777BB000
heap
page read and write
19D73414000
heap
page read and write
19D7778D000
heap
page read and write
66655000
unkown
page write copy
19D77708000
heap
page read and write
19D75303000
heap
page read and write
19D732F0000
heap
page read and write
19D73411000
heap
page read and write
19D73435000
heap
page read and write
7FF7AE8D9000
unkown
page readonly
19D77757000
heap
page read and write
19D7770D000
heap
page read and write
19D77771000
heap
page read and write
6665B000
unkown
page write copy
19D77952000
trusted library allocation
page read and write
19D7778D000
heap
page read and write
19D7343E000
heap
page read and write
19D777BB000
heap
page read and write
19D74DA3000
direct allocation
page read and write
19D77708000
heap
page read and write
19D75680000
heap
page read and write
6668C000
unkown
page write copy
19D77708000
heap
page read and write
19D77774000
heap
page read and write
19D73350000
heap
page read and write
19D7339A000
heap
page read and write
19D777B9000
heap
page read and write
19D77781000
heap
page read and write
19D77770000
heap
page read and write
19D73443000
heap
page read and write
66663000
unkown
page read and write
19D7779F000
heap
page read and write
19D777B3000
heap
page read and write
19D74D02000
direct allocation
page read and write
19D77708000
heap
page read and write
19D74DE3000
direct allocation
page read and write
19D7342B000
heap
page read and write
19D732A0000
heap
page read and write
19D777BB000
heap
page read and write
19D75580000
heap
page read and write
19D77800000
heap
page read and write
19D77781000
heap
page read and write
19D74D09000
direct allocation
page read and write
19D777B9000
heap
page read and write
19D74D30000
direct allocation
page read and write
19D73443000
heap
page read and write
6663A000
unkown
page write copy
19D77580000
heap
page read and write
494E2FF000
stack
page read and write
19D7343D000
heap
page read and write
19D75900000
trusted library allocation
page read and write
66645000
unkown
page write copy
19D7777C000
heap
page read and write
66641000
unkown
page write copy
19D75560000
heap
page read and write
19D7779F000
heap
page read and write
19D74D67000
direct allocation
page read and write
19D77757000
heap
page read and write
19D75870000
heap
page read and write
19D73443000
heap
page read and write
19D777BB000
heap
page read and write
19D75740000
heap
page read and write
19D75490000
heap
page read and write
19D75570000
heap
page read and write
494DCE7000
stack
page read and write
19D74D75000
direct allocation
page read and write
19D7343C000
heap
page read and write
19D77757000
heap
page read and write
19D7778D000
heap
page read and write
7FF7AE8BE000
unkown
page read and write
19D77766000
heap
page read and write
19D73443000
heap
page read and write
19D73411000
heap
page read and write
66694000
unkown
page read and write
19D77956000
trusted library allocation
page read and write
19D77777000
heap
page read and write
19D75565000
heap
page read and write
19D777A5000
heap
page read and write
19D77757000
heap
page read and write
19D777B2000
heap
page read and write
19D76100000
heap
page read and write
19D777AB000
heap
page read and write
6669A000
unkown
page read and write
19D7338C000
heap
page read and write
19D777C9000
heap
page read and write
19D77702000
heap
page read and write
19D776C0000
heap
page read and write
19D733EB000
heap
page read and write
19D7343E000
heap
page read and write
19D77702000
heap
page read and write
19D74CE6000
direct allocation
page read and write
19D73415000
heap
page read and write
19D777B9000
heap
page read and write
19D73413000
heap
page read and write
19D777B9000
heap
page read and write
19D75270000
heap
page read and write
19D77708000
heap
page read and write
19D7341B000
heap
page read and write
19D733F0000
heap
page read and write
19D73443000
heap
page read and write
19D7777E000
heap
page read and write
19D774B9000
heap
page read and write
19D73421000
heap
page read and write
19D73435000
heap
page read and write
19D77958000
trusted library allocation
page read and write
19D7342E000
heap
page read and write
19D73443000
heap
page read and write
19D777AB000
heap
page read and write
19D777B9000
heap
page read and write
7FF7AE5C1000
unkown
page execute read
19D7343E000
heap
page read and write
19D7340E000
heap
page read and write
19D7779F000
heap
page read and write
19D77708000
heap
page read and write
19D73443000
heap
page read and write
666A5000
unkown
page write copy
7FF7AE910000
unkown
page readonly
19D776F0000
heap
page read and write
19D77708000
heap
page read and write
19D7778D000
heap
page read and write
19D7770D000
heap
page read and write
494E0FD000
stack
page read and write
19D733CA000
heap
page read and write
19D7343D000
heap
page read and write
666A7000
unkown
page read and write
494E3FB000
stack
page read and write
19D74D93000
direct allocation
page read and write
19D73415000
heap
page read and write
19D77771000
heap
page read and write
19D7770D000
heap
page read and write
19D74DDC000
direct allocation
page read and write
19D73443000
heap
page read and write
19D733CD000
heap
page read and write
19D7343F000
heap
page read and write
19D7339B000
heap
page read and write
19D777AC000
heap
page read and write
7FF7AE5C0000
unkown
page readonly
19D733CD000
heap
page read and write
19D733CA000
heap
page read and write
19D74DEA000
direct allocation
page read and write
7FF7AE5C1000
unkown
page execute read
19D774B0000
heap
page read and write
19D73435000
heap
page read and write
19D75480000
heap
page read and write
19D77781000
heap
page read and write
66650000
unkown
page read and write
19D74D6E000
direct allocation
page read and write
6668B000
unkown
page read and write
19D757A0000
heap
page read and write
19D77781000
heap
page read and write
19D774E0000
remote allocation
page read and write
19D7341D000
heap
page read and write
19D77701000
heap
page read and write
19D777C9000
heap
page read and write
19D774F0000
heap
page read and write
19D77774000
heap
page read and write
19D73411000
heap
page read and write
19D732FD000
heap
page read and write
19D73420000
heap
page read and write
7FF7AE8C4000
unkown
page write copy
19D77708000
heap
page read and write
19D73443000
heap
page read and write
66268000
unkown
page execute read
66633000
unkown
page read and write
19D777B9000
heap
page read and write
19D733EB000
heap
page read and write
494DFFB000
stack
page read and write
66630000
unkown
page read and write
66640000
unkown
page read and write
19D7779F000
heap
page read and write
19D777A5000
heap
page read and write
19D74DAB000
direct allocation
page read and write
19D7343E000
heap
page read and write
19D777AB000
heap
page read and write
19D73443000
heap
page read and write
19D77770000
heap
page read and write
There are 454 hidden memdumps, click here to show them.