IOC Report
UQO06iOMKZMPZ4A.exe

loading gif

Files

File Path
Type
Category
Malicious
UQO06iOMKZMPZ4A.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_UQO06iOMKZMPZ4A._f857fe58ea09b799fdb0ec55b4d30f47170d3_88b9e8b8_b665316b-1a8c-4954-a90d-ffa3e7949e10\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4FB8.tmp.dmp
Mini DuMP crash report, 15 streams, Fri Apr 26 05:38:53 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER518E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER51CE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\UQO06iOMKZMPZ4A.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\17-EIW25
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\UQO06iOMKZMPZ4A.exe
"C:\Users\user\Desktop\UQO06iOMKZMPZ4A.exe"
malicious
C:\Users\user\Desktop\UQO06iOMKZMPZ4A.exe
"C:\Users\user\Desktop\UQO06iOMKZMPZ4A.exe"
malicious
C:\Program Files (x86)\AXXGpedivmBaBhwRBklJNWbmzUNZwuCMAoieyGUklDlnfywYEYYnjONA\DpzZIqplfZXGlyHqisknlKbWCP.exe
"C:\Program Files (x86)\AXXGpedivmBaBhwRBklJNWbmzUNZwuCMAoieyGUklDlnfywYEYYnjONA\DpzZIqplfZXGlyHqisknlKbWCP.exe"
malicious
C:\Windows\SysWOW64\unlodctr.exe
"C:\Windows\SysWOW64\unlodctr.exe"
malicious
C:\Program Files (x86)\AXXGpedivmBaBhwRBklJNWbmzUNZwuCMAoieyGUklDlnfywYEYYnjONA\DpzZIqplfZXGlyHqisknlKbWCP.exe
"C:\Program Files (x86)\AXXGpedivmBaBhwRBklJNWbmzUNZwuCMAoieyGUklDlnfywYEYYnjONA\DpzZIqplfZXGlyHqisknlKbWCP.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7616 -s 1432

URLs

Name
IP
Malicious
http://www.gattosat.icu/qruc/
109.123.121.243
malicious
http://www.gattosat.icu/qruc/?xl=UAq9CzGRql0qbxLJ0VHAxYbE6gcH95yIoC7W/FPBEpHWNGr0R1xACLnBcwEc3ZkTuU45ULwzGu2M7+E0XrmRKTDELq+4Gy/k2I5T6z62BN58jG7ys8mA5gg=&vFLHF=St8dDlnHzrct7
109.123.121.243
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.fontbureau.com/designersG
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.quantumboulevard.xyz/qruc/?xl=TKQjCngekOUXb4wYgtIljeQn8ysV0DQxkVDYFHPguHHgtawi326eHXwL5/LbdhSUHl1rH91YHPKtuSAwSH4DrTeIYMFIFWvJ0j7VceHyTVuRqxxukq8+akA=&vFLHF=St8dDlnHzrct7
66.29.135.159
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
https://nojs.domaincntrol.com
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.dntchunkysalsa.com/qruc/?vFLHF=St8dDlnHzrct7&xl=ebTrY2reCe2ZTSPQmCOT7uftBIKel9RxJULKIziXTH46LqUEJduuafb87psJAf6uxD5XXi6v1WxfauXtOkGyHWMQjIrD11Zkal8n9/6ZGFCOuXv54YqdQOw=
154.213.73.100
http://www.quantumboulevard.xyz/qruc/
66.29.135.159
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.dntchunkysalsa.com
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
https://domaincntrol.com/?orighost=
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.linbreoffice.org/qruc/
64.225.91.73
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://www.linbreoffice.org/qruc/?vFLHF=St8dDlnHzrct7&xl=Xmo1lInOanbZEZR5AfqbZqRP40VXQk0TYIBV9i+RFmbCb5D19+w35N1Is2bkZ42QIXmVJTObgj0BeJUqj9w3SBcjawfNBsE/jQutHm2oP9EVAL/0u02x0DQ=
64.225.91.73
http://www.sakkal.com
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.litespeedtech.com/error-page
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://upx.sf.net
unknown
https://www.ecosia.org/newtab/
unknown
https://www.chiark.greenend.org.uk/~sgtatham/putty/0
unknown
http://www.carterandcone.coml
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
http://www.dntchunkysalsa.com/qruc/
154.213.73.100
http://www.fontbureau.com/designers8
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.klingerlumberltd.com/qruc/?vFLHF=St8dDlnHzrct7&xl=4y8JdVmVqWeea5bbMhnz8aXW/zBNuVIx9gyDCHl5L7QB29ig52mkDYCfyusGnjDf+1nAg1jN2XuDrRbFj9LrVx3K8AcskdL8Q9MgXuVmjPqiRPQTvnH80A0=
109.70.148.57
There are 39 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.quantumboulevard.xyz
66.29.135.159
malicious
www.gattosat.icu
109.123.121.243
malicious
www.klingerlumberltd.com
unknown
malicious
www.linbreoffice.org
64.225.91.73
www.dntchunkysalsa.com
154.213.73.100
www.electronicraw.com
173.255.194.134
klingerlumberltd.com
109.70.148.57

IPs

IP
Domain
Country
Malicious
66.29.135.159
www.quantumboulevard.xyz
United States
malicious
109.123.121.243
www.gattosat.icu
United Kingdom
malicious
64.225.91.73
www.linbreoffice.org
United States
154.213.73.100
www.dntchunkysalsa.com
Seychelles
109.70.148.57
klingerlumberltd.com
United Kingdom

Registry

Path
Value
Malicious
\REGISTRY\A\{57ea5309-2c93-cf9e-ad02-7c7a3ec7ffe8}\Root\InventoryApplicationFile\uqo06iomkzmpz4a.|a3d608216454b4cf
ProgramId
\REGISTRY\A\{57ea5309-2c93-cf9e-ad02-7c7a3ec7ffe8}\Root\InventoryApplicationFile\uqo06iomkzmpz4a.|a3d608216454b4cf
FileId
\REGISTRY\A\{57ea5309-2c93-cf9e-ad02-7c7a3ec7ffe8}\Root\InventoryApplicationFile\uqo06iomkzmpz4a.|a3d608216454b4cf
LowerCaseLongPath
\REGISTRY\A\{57ea5309-2c93-cf9e-ad02-7c7a3ec7ffe8}\Root\InventoryApplicationFile\uqo06iomkzmpz4a.|a3d608216454b4cf
LongPathHash
\REGISTRY\A\{57ea5309-2c93-cf9e-ad02-7c7a3ec7ffe8}\Root\InventoryApplicationFile\uqo06iomkzmpz4a.|a3d608216454b4cf
Name
\REGISTRY\A\{57ea5309-2c93-cf9e-ad02-7c7a3ec7ffe8}\Root\InventoryApplicationFile\uqo06iomkzmpz4a.|a3d608216454b4cf
OriginalFileName
\REGISTRY\A\{57ea5309-2c93-cf9e-ad02-7c7a3ec7ffe8}\Root\InventoryApplicationFile\uqo06iomkzmpz4a.|a3d608216454b4cf
Publisher
\REGISTRY\A\{57ea5309-2c93-cf9e-ad02-7c7a3ec7ffe8}\Root\InventoryApplicationFile\uqo06iomkzmpz4a.|a3d608216454b4cf
Version
\REGISTRY\A\{57ea5309-2c93-cf9e-ad02-7c7a3ec7ffe8}\Root\InventoryApplicationFile\uqo06iomkzmpz4a.|a3d608216454b4cf
BinFileVersion
\REGISTRY\A\{57ea5309-2c93-cf9e-ad02-7c7a3ec7ffe8}\Root\InventoryApplicationFile\uqo06iomkzmpz4a.|a3d608216454b4cf
BinaryType
\REGISTRY\A\{57ea5309-2c93-cf9e-ad02-7c7a3ec7ffe8}\Root\InventoryApplicationFile\uqo06iomkzmpz4a.|a3d608216454b4cf
ProductName
\REGISTRY\A\{57ea5309-2c93-cf9e-ad02-7c7a3ec7ffe8}\Root\InventoryApplicationFile\uqo06iomkzmpz4a.|a3d608216454b4cf
ProductVersion
\REGISTRY\A\{57ea5309-2c93-cf9e-ad02-7c7a3ec7ffe8}\Root\InventoryApplicationFile\uqo06iomkzmpz4a.|a3d608216454b4cf
LinkDate
\REGISTRY\A\{57ea5309-2c93-cf9e-ad02-7c7a3ec7ffe8}\Root\InventoryApplicationFile\uqo06iomkzmpz4a.|a3d608216454b4cf
BinProductVersion
\REGISTRY\A\{57ea5309-2c93-cf9e-ad02-7c7a3ec7ffe8}\Root\InventoryApplicationFile\uqo06iomkzmpz4a.|a3d608216454b4cf
AppxPackageFullName
\REGISTRY\A\{57ea5309-2c93-cf9e-ad02-7c7a3ec7ffe8}\Root\InventoryApplicationFile\uqo06iomkzmpz4a.|a3d608216454b4cf
AppxPackageRelativeId
\REGISTRY\A\{57ea5309-2c93-cf9e-ad02-7c7a3ec7ffe8}\Root\InventoryApplicationFile\uqo06iomkzmpz4a.|a3d608216454b4cf
Size
\REGISTRY\A\{57ea5309-2c93-cf9e-ad02-7c7a3ec7ffe8}\Root\InventoryApplicationFile\uqo06iomkzmpz4a.|a3d608216454b4cf
Language
\REGISTRY\A\{57ea5309-2c93-cf9e-ad02-7c7a3ec7ffe8}\Root\InventoryApplicationFile\uqo06iomkzmpz4a.|a3d608216454b4cf
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
25A0000
trusted library section
page read and write
malicious
3E29000
trusted library allocation
page read and write
malicious
3770000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
2F80000
system
page execute and read and write
malicious
3330000
unclassified section
page execute and read and write
malicious
3730000
trusted library allocation
page read and write
malicious
3AF0000
unkown
page execute and read and write
malicious
1D40000
unclassified section
page execute and read and write
malicious
650000
heap
page read and write
8186000
heap
page read and write
7C5E000
stack
page read and write
FF0000
unkown
page read and write
2B46000
trusted library allocation
page read and write
335D000
heap
page read and write
2CA0000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
BC0000
trusted library allocation
page execute and read and write
3501000
heap
page read and write
33CD000
heap
page read and write
118E000
stack
page read and write
BF33BFB000
stack
page read and write
30F0000
unkown
page execute and read and write
8181000
heap
page read and write
2B993BA5000
trusted library allocation
page read and write
7E1000
heap
page read and write
3501000
heap
page read and write
3340000
heap
page read and write
FF0000
unkown
page read and write
587000
stack
page read and write
11E1C000
system
page read and write
A07000
trusted library allocation
page execute and read and write
3501000
heap
page read and write
3501000
heap
page read and write
F31000
unkown
page execute read
3501000
heap
page read and write
3501000
heap
page read and write
770000
unkown
page read and write
54CC000
unkown
page execute and read and write
F00000
unkown
page read and write
2FF0000
heap
page read and write
3501000
heap
page read and write
2B05000
trusted library allocation
page read and write
3501000
heap
page read and write
2D00000
unkown
page readonly
280000
unkown
page readonly
81C4000
heap
page read and write
26D0000
trusted library allocation
page read and write
8181000
heap
page read and write
3501000
heap
page read and write
2B3E000
trusted library allocation
page read and write
620000
heap
page read and write
BE0000
unkown
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
2B993A13000
trusted library allocation
page read and write
3860000
trusted library allocation
page execute and read and write
846F000
stack
page read and write
1FB000
unkown
page execute and read and write
33EC000
heap
page read and write
F47000
unkown
page readonly
4BE0000
trusted library allocation
page execute and read and write
8280000
trusted library allocation
page read and write
3501000
heap
page read and write
9D3000
trusted library allocation
page execute and read and write
83AC000
stack
page read and write
1198000
heap
page read and write
B6A000
stack
page read and write
3501000
heap
page read and write
2B993A21000
trusted library allocation
page read and write
968000
heap
page read and write
1390000
unkown
page readonly
76E000
stack
page read and write
BF1000
unkown
page readonly
73E000
stack
page read and write
3501000
heap
page read and write
EFC000
stack
page read and write
A60000
unkown
page readonly
8181000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
3357000
heap
page read and write
3501000
heap
page read and write
28B2000
trusted library allocation
page read and write
2DF2000
unkown
page read and write
7060000
trusted library allocation
page read and write
3501000
heap
page read and write
2EB2000
unkown
page read and write
770000
unkown
page read and write
3501000
heap
page read and write
81C1000
heap
page read and write
F60000
unkown
page readonly
2510000
heap
page read and write
3501000
heap
page read and write
8F40000
trusted library section
page read and write
2B42000
trusted library allocation
page read and write
3501000
heap
page read and write
73DD000
stack
page read and write
3501000
heap
page read and write
71FC000
heap
page read and write
F60000
unkown
page readonly
3501000
heap
page read and write
46E8000
unclassified section
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
7D9E000
stack
page read and write
2B3A000
trusted library allocation
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
377F000
heap
page read and write
3C7D000
direct allocation
page execute and read and write
83ED000
stack
page read and write
11DC2000
system
page read and write
8181000
heap
page read and write
2B993840000
heap
page read and write
3500000
heap
page read and write
3501000
heap
page read and write
790000
unkown
page read and write
3501000
heap
page read and write
CA8000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
2F48000
stack
page read and write
3501000
heap
page read and write
99F000
stack
page read and write
3501000
heap
page read and write
25D0000
trusted library section
page read and write
7C9E000
stack
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
781000
unkown
page readonly
630000
unkown
page readonly
9D4000
trusted library allocation
page read and write
3910000
trusted library allocation
page read and write
26D4000
trusted library allocation
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
960000
heap
page read and write
3501000
heap
page read and write
CA0000
heap
page read and write
1720000
unkown
page readonly
7DE9000
heap
page read and write
3501000
heap
page read and write
EEF000
stack
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
1190000
heap
page read and write
3501000
heap
page read and write
1198000
heap
page read and write
9DD000
trusted library allocation
page execute and read and write
2B991F7A000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
724E000
heap
page read and write
3F2C000
trusted library allocation
page read and write
BD0000
heap
page read and write
3501000
heap
page read and write
3930000
heap
page read and write
BF1000
unkown
page readonly
1000000
heap
page read and write
3501000
heap
page read and write
BC0000
unkown
page readonly
3501000
heap
page read and write
3501000
heap
page read and write
14B0000
heap
page read and write
4B70000
trusted library allocation
page execute and read and write
3501000
heap
page read and write
26F0000
unkown
page execute and read and write
26E4000
heap
page read and write
10F0000
unkown
page read and write
3357000
heap
page read and write
2B36000
trusted library allocation
page read and write
9FA000
trusted library allocation
page execute and read and write
3501000
heap
page read and write
2EA000
stack
page read and write
2CF0000
heap
page read and write
81B5000
heap
page read and write
3AFC000
unkown
page read and write
9F0000
trusted library allocation
page read and write
398E000
stack
page read and write
335D000
heap
page read and write
2B4C000
trusted library allocation
page read and write
8180000
heap
page read and write
390C000
unclassified section
page execute and read and write
40CC000
unkown
page execute and read and write
3501000
heap
page read and write
F3E000
unkown
page readonly
2B991E60000
heap
page read and write
3501000
heap
page read and write
4017000
trusted library allocation
page read and write
BA0000
unkown
page readonly
2B991F5A000
heap
page read and write
3501000
heap
page read and write
A02000
trusted library allocation
page read and write
A60000
unkown
page readonly
3501000
heap
page read and write
3C81000
direct allocation
page execute and read and write
2621000
trusted library allocation
page read and write
9650000
trusted library allocation
page read and write
556F000
system
page execute and read and write
968000
heap
page read and write
2B24000
trusted library allocation
page read and write
3501000
heap
page read and write
9640000
trusted library allocation
page execute and read and write
3501000
heap
page read and write
56EC000
unkown
page read and write
3501000
heap
page read and write
7DA0000
heap
page read and write
66E0000
trusted library allocation
page read and write
7A0000
heap
page read and write
882000
heap
page read and write
81A4000
heap
page read and write
33B3000
heap
page read and write
3501000
heap
page read and write
C50000
trusted library allocation
page read and write
2CA0000
heap
page read and write
BF353FE000
stack
page read and write
3419000
heap
page read and write
BD70000
trusted library allocation
page read and write
4C33000
heap
page read and write
3501000
heap
page read and write
2B991F50000
heap
page read and write
8181000
heap
page read and write
4BC0000
heap
page read and write
2B14000
trusted library allocation
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
F45000
unkown
page read and write
3501000
heap
page read and write
84AE000
stack
page read and write
3501000
heap
page read and write
C7D000
trusted library allocation
page read and write
14B7000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
F45000
unkown
page read and write
13E0000
heap
page read and write
F30000
unkown
page readonly
3AD9000
direct allocation
page execute and read and write
3B4E000
direct allocation
page execute and read and write
3501000
heap
page read and write
600000
heap
page read and write
11D02000
system
page read and write
4C20000
heap
page execute and read and write
2B3C000
trusted library allocation
page read and write
3501000
heap
page read and write
28CB000
trusted library allocation
page read and write
3501000
heap
page read and write
71F8000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
254F000
stack
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
3CF2000
direct allocation
page execute and read and write
B7E000
stack
page read and write
33DF000
heap
page read and write
3501000
heap
page read and write
7445000
heap
page read and write
335F000
heap
page read and write
1390000
unkown
page readonly
334E000
heap
page read and write
9380000
heap
page read and write
650000
heap
page read and write
4BD6000
trusted library allocation
page read and write
4ACC000
unkown
page execute and read and write
2858000
trusted library allocation
page read and write
F47000
unkown
page readonly
3E90000
trusted library allocation
page read and write
7DB0000
heap
page read and write
3501000
heap
page read and write
A20000
trusted library allocation
page read and write
2726000
trusted library allocation
page read and write
F3E000
unkown
page readonly
3501000
heap
page read and write
7DEB000
heap
page read and write
3EC000
stack
page read and write
640000
unkown
page readonly
938E000
heap
page read and write
2B34000
trusted library allocation
page read and write
4556000
unclassified section
page read and write
3501000
heap
page read and write
2B20000
trusted library allocation
page read and write
142E000
stack
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
3413000
heap
page read and write
3EDE000
trusted library allocation
page read and write
3501000
heap
page read and write
130000
unkown
page readonly
AE0000
unkown
page readonly
7223000
heap
page read and write
114C000
unkown
page read and write
2F0B000
stack
page read and write
3501000
heap
page read and write
8181000
heap
page read and write
26E0000
heap
page read and write
2B993B01000
trusted library allocation
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
42A0000
trusted library allocation
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
BF0000
trusted library allocation
page read and write
3501000
heap
page read and write
BC0000
unkown
page readonly
3501000
heap
page read and write
F47000
unkown
page readonly
3E25000
trusted library allocation
page read and write
889E000
stack
page read and write
8170000
trusted library allocation
page read and write
2B48000
trusted library allocation
page read and write
781000
unkown
page readonly
81A9000
heap
page read and write
3501000
heap
page read and write
2B4A000
trusted library allocation
page read and write
26E4000
heap
page read and write
8F23000
trusted library allocation
page read and write
33B9000
heap
page read and write
3646000
unkown
page read and write
3E1C000
unclassified section
page read and write
2370000
unkown
page readonly
270000
unkown
page readonly
11AF000
heap
page read and write
8181000
heap
page read and write
996D000
stack
page read and write
92E000
stack
page read and write
C76000
trusted library allocation
page read and write
7E3000
heap
page read and write
8510000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
3640000
heap
page read and write
9610000
trusted library allocation
page read and write
5549000
system
page execute and read and write
132000
unkown
page readonly
F30000
unkown
page readonly
13C0000
heap
page read and write
3501000
heap
page read and write
2B2E000
trusted library allocation
page read and write
8181000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
2B12000
trusted library allocation
page read and write
3501000
heap
page read and write
19BF000
stack
page read and write
F47000
unkown
page readonly
3501000
heap
page read and write
2B991F60000
heap
page read and write
3501000
heap
page read and write
33A5000
heap
page read and write
3501000
heap
page read and write
BD0000
heap
page read and write
3501000
heap
page read and write
58EF000
stack
page read and write
BF343FE000
stack
page read and write
71F4000
heap
page read and write
3501000
heap
page read and write
8181000
heap
page read and write
48A000
stack
page read and write
1D38000
direct allocation
page execute and read and write
4C00000
trusted library allocation
page read and write
3501000
heap
page read and write
699E000
stack
page read and write
2B993B00000
trusted library allocation
page read and write
3501000
heap
page read and write
2B993850000
trusted library allocation
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
10E0000
unkown
page read and write
3501000
heap
page read and write
2CA4000
heap
page read and write
754E000
stack
page read and write
3501000
heap
page read and write
2DF2000
unkown
page read and write
125C000
stack
page read and write
3501000
heap
page read and write
39A1000
heap
page read and write
4B80000
trusted library allocation
page read and write
F30000
unkown
page readonly
7430000
heap
page read and write
8F30000
trusted library allocation
page execute and read and write
3501000
heap
page read and write
84EF000
stack
page read and write
2B993A0A000
trusted library allocation
page read and write
2B993850000
trusted library allocation
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
866000
heap
page read and write
26E0000
heap
page read and write
9620000
trusted library allocation
page execute and read and write
3600000
heap
page read and write
9F6000
trusted library allocation
page execute and read and write
11FDC000
system
page read and write
7251000
heap
page read and write
3501000
heap
page read and write
8195000
heap
page read and write
2C6E000
stack
page read and write
113FD000
stack
page read and write
33E2000
heap
page read and write
F3E000
unkown
page readonly
1680000
heap
page read and write
33A1000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
2B38000
trusted library allocation
page read and write
8FA2000
trusted library allocation
page read and write
3501000
heap
page read and write
966F000
heap
page read and write
2B4E000
trusted library allocation
page read and write
8198000
heap
page read and write
3501000
heap
page read and write
2CF0000
heap
page read and write
3501000
heap
page read and write
8181000
heap
page read and write
81BB000
heap
page read and write
3501000
heap
page read and write
A0B000
trusted library allocation
page execute and read and write
4C30000
heap
page read and write
471A000
stack
page read and write
7550000
trusted library allocation
page read and write
392C000
heap
page read and write
3501000
heap
page read and write
13D0000
heap
page read and write
280000
unkown
page readonly
39B0000
direct allocation
page execute and read and write
3320000
heap
page read and write
3501000
heap
page read and write
3803000
heap
page read and write
3501000
heap
page read and write
25E0000
trusted library allocation
page read and write
8F70000
trusted library allocation
page read and write
780000
heap
page read and write
2B16000
trusted library allocation
page read and write
2930000
unclassified section
page execute and read and write
4ECE000
stack
page read and write
2B991F82000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
C6E000
trusted library allocation
page read and write
2B44000
trusted library allocation
page read and write
2B22000
trusted library allocation
page read and write
81CF000
heap
page read and write
BB0000
unkown
page readonly
BF34BFE000
stack
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
2B991F82000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
AE0000
unkown
page readonly
33B0000
heap
page read and write
33B3000
heap
page read and write
3659000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
365C000
heap
page read and write
81C0000
heap
page read and write
F30000
unkown
page readonly
3501000
heap
page read and write
132000
unkown
page execute and read and write
3501000
heap
page read and write
AF0000
unkown
page readonly
8181000
heap
page read and write
55C4000
system
page execute and read and write
33FE000
heap
page read and write
3501000
heap
page read and write
4C8D000
stack
page read and write
32D4000
heap
page read and write
9790000
trusted library allocation
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
F31000
unkown
page execute read
3501000
heap
page read and write
70D0000
trusted library section
page readonly
2B1A000
trusted library allocation
page read and write
32D4000
heap
page read and write
2B18000
trusted library allocation
page read and write
7254000
heap
page read and write
5C40000
heap
page read and write
135A000
stack
page read and write
3501000
heap
page read and write
3358000
heap
page read and write
620000
unkown
page readonly
1000000
heap
page read and write
2B991DD1000
system
page execute and read and write
B3F000
stack
page read and write
2B993760000
heap
page read and write
7560000
trusted library allocation
page execute and read and write
1CB6000
direct allocation
page execute and read and write
3501000
heap
page read and write
123C4000
system
page read and write
2B28000
trusted library allocation
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
3357000
heap
page read and write
1006000
heap
page read and write
BF35BFE000
stack
page read and write
3501000
heap
page read and write
30CC000
unkown
page read and write
C00000
heap
page execute and read and write
3501000
heap
page read and write
3501000
heap
page read and write
5500000
system
page execute and read and write
3910000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
C90000
trusted library allocation
page read and write
F00000
unkown
page read and write
8190000
heap
page read and write
4C10000
trusted library allocation
page execute and read and write
BE0000
unkown
page read and write
3357000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
F31000
unkown
page execute read
3501000
heap
page read and write
3EC000
stack
page read and write
7D6000
heap
page read and write
3501000
heap
page read and write
F20000
unkown
page readonly
2B50000
trusted library allocation
page read and write
2B32000
trusted library allocation
page read and write
33C6000
heap
page read and write
818B000
heap
page read and write
334C000
heap
page read and write
957F000
stack
page read and write
7070000
trusted library allocation
page read and write
A30000
heap
page read and write
B00000
unkown
page readonly
81AE000
heap
page read and write
2B991DCF000
system
page execute and read and write
3501000
heap
page read and write
3ADD000
direct allocation
page execute and read and write
81BA000
heap
page read and write
BE0000
trusted library allocation
page read and write
7D0000
unkown
page read and write
2B993BCE000
trusted library allocation
page read and write
F45000
unkown
page read and write
3501000
heap
page read and write
77E000
stack
page read and write
5F0000
heap
page read and write
3501000
heap
page read and write
5561000
system
page execute and read and write
334C000
heap
page read and write
2B991F7F000
heap
page read and write
2370000
unkown
page readonly
2C2F000
stack
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
3357000
heap
page read and write
F20000
unkown
page readonly
3501000
heap
page read and write
9C0000
trusted library allocation
page read and write
334E000
heap
page read and write
1B8E000
direct allocation
page execute and read and write
4D0C000
unclassified section
page execute and read and write
2B991DD3000
system
page execute and read and write
3FDC000
unclassified section
page read and write
7B0000
unkown
page readonly
3501000
heap
page read and write
3501000
heap
page read and write
7B0000
unkown
page readonly
F45000
unkown
page read and write
37B0000
trusted library allocation
page read and write
7D0000
unkown
page read and write
8F80000
trusted library allocation
page read and write
AF0000
unkown
page readonly
8192000
heap
page read and write
9580000
trusted library allocation
page read and write
1EF000
unkown
page execute and read and write
2B993A00000
trusted library allocation
page read and write
2B993A03000
trusted library allocation
page read and write
2EA000
stack
page read and write
2B26000
trusted library allocation
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
3650000
trusted library allocation
page read and write
8181000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
187F000
stack
page read and write
EFC000
stack
page read and write
1B19000
direct allocation
page execute and read and write
3501000
heap
page read and write
33E8000
heap
page read and write
2B993BC4000
trusted library allocation
page read and write
25F5000
trusted library allocation
page read and write
259E000
stack
page read and write
4DCE000
stack
page read and write
30CC000
unkown
page read and write
9E0000
trusted library allocation
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
3910000
trusted library allocation
page read and write
4A0C000
unclassified section
page read and write
9D0000
trusted library allocation
page read and write
819A000
heap
page read and write
70CB000
stack
page read and write
8EF000
stack
page read and write
2B991F6C000
heap
page read and write
4BD0000
trusted library allocation
page read and write
BBC000
stack
page read and write
2B2A000
trusted library allocation
page read and write
630000
unkown
page readonly
7AE000
heap
page read and write
3501000
heap
page read and write
8178000
heap
page read and write
7E0000
heap
page read and write
3501000
heap
page read and write
4B5F000
stack
page read and write
71E0000
heap
page read and write
3501000
heap
page read and write
2610000
heap
page read and write
556D000
system
page execute and read and write
7E0000
heap
page read and write
3501000
heap
page read and write
2B30000
trusted library allocation
page read and write
FDE000
stack
page read and write
960000
heap
page read and write
8181000
heap
page read and write
3501000
heap
page read and write
4C40000
trusted library allocation
page read and write
33F5000
heap
page read and write
3501000
heap
page read and write
1B1D000
direct allocation
page execute and read and write
3501000
heap
page read and write
4C42000
trusted library allocation
page read and write
3D02000
unclassified section
page read and write
BA0000
unkown
page readonly
260000
unkown
page readonly
32D4000
heap
page read and write
3621000
trusted library allocation
page read and write
26A1000
trusted library allocation
page read and write
DC3000
unkown
page read and write
2B1C000
trusted library allocation
page read and write
1190000
heap
page read and write
C71000
trusted library allocation
page read and write
487A000
unclassified section
page read and write
3501000
heap
page read and write
8F20000
trusted library allocation
page read and write
396A000
unkown
page read and write
3501000
heap
page read and write
342B000
heap
page read and write
2B2C000
trusted library allocation
page read and write
2B993900000
trusted library allocation
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
F31000
unkown
page execute read
790000
unkown
page read and write
57EF000
stack
page read and write
1CA1000
direct allocation
page execute and read and write
9F2000
trusted library allocation
page read and write
270000
unkown
page readonly
BD0000
trusted library allocation
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
2B993A0F000
trusted library allocation
page read and write
1CBD000
direct allocation
page execute and read and write
2CA4000
heap
page read and write
138F000
stack
page read and write
3501000
heap
page read and write
625000
heap
page read and write
1F20000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
1430000
direct allocation
page read and write
2B52000
trusted library allocation
page read and write
3353000
heap
page read and write
B6A000
stack
page read and write
9618000
trusted library allocation
page read and write
43C4000
unclassified section
page read and write
1720000
unkown
page readonly
3501000
heap
page read and write
741E000
stack
page read and write
3501000
heap
page read and write
2B10000
trusted library allocation
page read and write
4BD8000
trusted library allocation
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
33C6000
heap
page read and write
3501000
heap
page read and write
130000
unkown
page execute and read and write
1F30000
unclassified section
page execute and read and write
3501000
heap
page read and write
BB0000
unkown
page readonly
7420000
heap
page read and write
32D0000
heap
page read and write
33B0000
heap
page read and write
9ED000
trusted library allocation
page execute and read and write
70E0000
heap
page read and write
33B9000
heap
page read and write
3501000
heap
page read and write
4D8E000
stack
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
620000
unkown
page readonly
2510000
heap
page read and write
2724000
trusted library allocation
page read and write
3DC2000
unclassified section
page read and write
3501000
heap
page read and write
3501000
heap
page read and write
640000
unkown
page readonly
2B1E000
trusted library allocation
page read and write
7AA000
heap
page read and write
C4E000
stack
page read and write
34B4000
unkown
page read and write
19F0000
direct allocation
page execute and read and write
5551000
system
page execute and read and write
2B991D70000
system
page execute and read and write
25C0000
trusted library allocation
page execute and read and write
2D00000
unkown
page readonly
3501000
heap
page read and write
3408000
heap
page read and write
25F0000
trusted library allocation
page read and write
7B5E000
stack
page read and write
37D8000
unkown
page read and write
98A0000
trusted library section
page read and write
340F000
heap
page read and write
2600000
trusted library allocation
page read and write
2F0C000
unkown
page read and write
F9E000
stack
page read and write
3501000
heap
page read and write
260000
unkown
page readonly
842E000
stack
page read and write
2B993BBE000
trusted library allocation
page read and write
18BE000
stack
page read and write
F3E000
unkown
page readonly
3501000
heap
page read and write
3501000
heap
page read and write
96FD000
heap
page read and write
88DF000
stack
page read and write
3348000
heap
page read and write
33D2000
heap
page read and write
3395000
heap
page read and write
7440000
heap
page read and write
2B991F90000
heap
page read and write
430C000
unclassified section
page execute and read and write
425B000
trusted library allocation
page read and write
B00000
unkown
page readonly
There are 740 hidden memdumps, click here to show them.