IOC Report
Pilne zamowienie nr5363582 UTECH Maszyny i Urzadzenia Techniczne Jaroslaw Koenig sp. k..exe

loading gif

Files

File Path
Type
Category
Malicious
Pilne zamowienie nr5363582 UTECH Maszyny i Urzadzenia Techniczne Jaroslaw Koenig sp. k..exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\nsgB1F9.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsgB1F9.tmp\nsExec.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\0bpuok1y.lva\Chrome\Default\Cookies
SQLite 3.x database, last written using SQLite version 3036000, file counter 36, database pages 24, 1st free page 14, free pages 11, cookie 0x5, schema 4, UTF-8, version-valid-for 36
dropped
C:\Users\user\AppData\Roaming\0bpuok1y.lva\Edge Chromium\Default\Cookies
SQLite 3.x database, last written using SQLite version 3035005, file counter 7, database pages 5, cookie 0x4, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Roaming\0bpuok1y.lva\Firefox\Profiles\ol7uiqa8.default-release\cookies.sqlite
SQLite 3.x database, user version 12, last written using SQLite version 3036000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\Pacifisterne\Automatcafeer\Nedrustningspolitikken\Dilemmaers146\Glasgaibleanir\Nodebilledet\Microsoft.Practices.Composite.UnityExtensions.dll
PE32+ executable (DLL) (console) x86-64 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\Pacifisterne\Automatcafeer\Nedrustningspolitikken\Dilemmaers146\Glasgaibleanir\Nodebilledet\Reinspired.Aut
ASCII text, with very long lines (50244), with no line terminators
dropped
C:\Users\user\Pacifisterne\Automatcafeer\Seacross.Him
data
dropped
C:\Users\user\Pacifisterne\Automatcafeer\Syntaksgenkendelsernes\Temposkifterne\default.css
Unicode text, UTF-8 text
dropped
C:\Users\user\Pacifisterne\Automatcafeer\Syntaksgenkendelsernes\Temposkifterne\network-cellular-signal-none-symbolic.svg
SVG Scalable Vector Graphics image
dropped
C:\Users\user\Pacifisterne\Automatcafeer\Tubulating\application-x-executable.png
PNG image data, 16 x 16, 8-bit/color RGBA, non-interlaced
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Pilne zamowienie nr5363582 UTECH Maszyny i Urzadzenia Techniczne Jaroslaw Koenig sp. k..exe
C:\Users\user\Desktop\Pilne zamowienie nr5363582 UTECH Maszyny i Urzadzenia Techniczne Jaroslaw Koenig sp. k..exe
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x0E^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x19^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x05^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x0E^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x07^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x78^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x79^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x71^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x71^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x08^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x39^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x2E^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x2A^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x3F^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x2E^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x0D^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x22^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x27^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x2E^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x0A^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x63^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x26^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x39^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7F^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x67^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x22^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x33^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x73^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x67^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x22^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x67^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x3B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x67^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x22^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7F^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x67^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x22^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x6B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x33^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x73^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x7B^75"
malicious
C:\Windows\SysWOW64\cmd.exe
cmd.exe /c set /A "0x67^75"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
C:\Users\user\Desktop\Pilne zamowienie nr5363582 UTECH Maszyny i Urzadzenia Techniczne Jaroslaw Koenig sp. k..exe
malicious
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\Conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 121 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
64.185.227.155
http://ftp.sentientshift.com
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://api.ipify.org
unknown
http://sentientshift.com
unknown
http://creativecommons.org/licenses/by-sa/4.0/
unknown
http://nsis.sf.net/NSIS_Error
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://enlluec.tk/dkVAJHULLLAJIKvMzyyDm233.pcx
103.83.194.19
http://mozilla.org/MPL/2.0/.
unknown
https://enlluec.tk/
unknown
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ftp.sentientshift.com
unknown
malicious
api4.ipify.org
64.185.227.155
sentientshift.com
192.185.87.146
enlluec.tk
103.83.194.19
api.ipify.org
unknown

IPs

IP
Domain
Country
Malicious
103.83.194.19
enlluec.tk
United States
192.185.87.146
sentientshift.com
United States
64.185.227.155
api4.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Territorialkravets
Tantaliferous
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
FileDirectory
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
58D8000
direct allocation
page execute and read and write
malicious
3418B000
trusted library allocation
page read and write
malicious
71D000
heap
page read and write
malicious
36980000
trusted library allocation
page read and write
23D8000
remote allocation
page execute and read and write
374A5000
trusted library allocation
page read and write
27429AE0000
heap
page read and write
75E000
heap
page read and write
33F90000
trusted library allocation
page read and write
3780000
heap
page read and write
B30000
trusted library allocation
page read and write
374A8000
trusted library allocation
page read and write
374A0000
trusted library allocation
page read and write
10020000
trusted library allocation
page read and write
374A0000
trusted library allocation
page read and write
381F000
heap
page read and write
374D0000
trusted library allocation
page read and write
374A0000
trusted library allocation
page read and write
B2C000
trusted library allocation
page read and write
37710000
trusted library allocation
page read and write
36148000
trusted library allocation
page read and write
374C0000
trusted library allocation
page read and write
27429C1A000
heap
page read and write
341E4000
trusted library allocation
page read and write
409000
unkown
page write copy
363AD000
heap
page read and write
37178000
heap
page read and write
363A5000
heap
page read and write
B30000
trusted library allocation
page read and write
374C0000
trusted library allocation
page read and write
75E000
heap
page read and write
3821000
heap
page read and write
27429C47000
heap
page read and write
74C000
heap
page read and write
75E000
heap
page read and write
33EAD000
trusted library allocation
page execute and read and write
B20000
trusted library allocation
page read and write
748000
heap
page read and write
33E90000
trusted library allocation
page read and write
374B0000
trusted library allocation
page read and write
714000
heap
page read and write
75E000
heap
page read and write
27429B70000
unclassified section
page readonly
374A0000
trusted library allocation
page read and write
33E9D000
trusted library allocation
page execute and read and write
75E000
heap
page read and write
33F60000
trusted library allocation
page read and write
10003000
unkown
page readonly
2742A602000
trusted library allocation
page read and write
374C0000
trusted library allocation
page read and write
822D47E000
stack
page read and write
36990000
unkown
page read and write
5F0000
heap
page read and write
33ECB000
trusted library allocation
page execute and read and write
BA0000
trusted library allocation
page read and write
3767000
heap
page read and write
37510000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
37182000
heap
page read and write
7D0000
heap
page read and write
BA0000
trusted library allocation
page read and write
4EEF000
heap
page read and write
5220000
trusted library allocation
page read and write
7D1000
heap
page read and write
3683D000
stack
page read and write
75E000
heap
page read and write
B10000
trusted library allocation
page read and write
374E0000
heap
page read and write
27429C6E000
heap
page read and write
374A0000
trusted library allocation
page read and write
36394000
heap
page read and write
B30000
trusted library allocation
page read and write
708000
heap
page read and write
374A0000
trusted library allocation
page read and write
719000
heap
page read and write
76D8000
direct allocation
page execute and read and write
363C0000
heap
page read and write
B90000
trusted library allocation
page read and write
5F6000
heap
page read and write
B0E000
stack
page read and write
6D0000
heap
page read and write
33FE5000
trusted library allocation
page read and write
B29000
trusted library allocation
page read and write
822D37E000
stack
page read and write
708000
heap
page read and write
B20000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
363E0000
trusted library allocation
page read and write
27429C5B000
heap
page read and write
33EB2000
trusted library allocation
page read and write
374D0000
trusted library allocation
page read and write
32E20000
heap
page read and write
374A0000
unkown
page read and write
36990000
trusted library allocation
page read and write
363C2000
heap
page read and write
75E000
heap
page read and write
374C8000
trusted library allocation
page read and write
33FD1000
trusted library allocation
page read and write
375E0000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
75E000
heap
page read and write
B23000
trusted library allocation
page read and write
36990000
trusted library allocation
page read and write
36440000
heap
page read and write
1D0000
unclassified section
page readonly
36990000
trusted library allocation
page read and write
75E000
heap
page read and write
36995000
trusted library allocation
page read and write
374C0000
trusted library allocation
page read and write
760000
heap
page read and write
27429C00000
heap
page read and write
B90000
trusted library allocation
page read and write
34187000
trusted library allocation
page read and write
37700000
trusted library allocation
page read and write
384C000
heap
page read and write
376E0000
trusted library allocation
page read and write
714000
heap
page read and write
B30000
trusted library allocation
page read and write
3705E000
stack
page read and write
27429B40000
heap
page read and write
B20000
trusted library allocation
page read and write
27429C3B000
heap
page read and write
37530000
trusted library allocation
page read and write
33A6B000
stack
page read and write
383F000
heap
page read and write
75E000
heap
page read and write
714000
heap
page read and write
364A7000
trusted library allocation
page read and write
BA0000
unkown
page read and write
BA0000
trusted library allocation
page read and write
374B0000
trusted library allocation
page read and write
36990000
unkown
page read and write
2930000
heap
page read and write
3861000
heap
page read and write
374A5000
trusted library allocation
page read and write
3810000
heap
page read and write
B20000
trusted library allocation
page read and write
75E000
heap
page read and write
376F0000
trusted library allocation
page read and write
362E0000
heap
page read and write
363E0000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
3C7D000
stack
page read and write
75E000
heap
page read and write
BA0000
trusted library allocation
page read and write
363D8000
heap
page read and write
374A0000
trusted library allocation
page read and write
2430000
heap
page read and write
33F80000
trusted library allocation
page read and write
400000
unkown
page readonly
33FA0000
heap
page execute and read and write
719000
heap
page read and write
33B6E000
stack
page read and write
33F70000
trusted library allocation
page read and write
34172000
trusted library allocation
page read and write
376F0000
trusted library allocation
page read and write
75E000
heap
page read and write
719000
heap
page read and write
407000
unkown
page readonly
746000
heap
page read and write
33D5A000
stack
page read and write
75E000
heap
page read and write
374D0000
trusted library allocation
page read and write
71D000
heap
page read and write
75E000
heap
page read and write
B14000
trusted library allocation
page read and write
75E000
heap
page read and write
374A5000
trusted library allocation
page read and write
33EC5000
trusted library allocation
page execute and read and write
36990000
trusted library allocation
page read and write
B50000
trusted library allocation
page read and write
2DD8000
remote allocation
page execute and read and write
376FB000
unkown
page read and write
36386000
heap
page read and write
374C0000
trusted library allocation
page read and write
719000
heap
page read and write
376E8000
trusted library allocation
page read and write
36396000
heap
page read and write
75E000
heap
page read and write
339C0000
heap
page read and write
36990000
trusted library allocation
page read and write
330A0000
direct allocation
page read and write
75E000
heap
page read and write
33EBA000
trusted library allocation
page execute and read and write
37500000
trusted library allocation
page read and write
708000
heap
page read and write
374B5000
trusted library allocation
page read and write
374C0000
trusted library allocation
page read and write
27429C7D000
heap
page read and write
75E000
heap
page read and write
75E000
heap
page read and write
75E000
heap
page read and write
37172000
heap
page read and write
B20000
trusted library allocation
page read and write
27429C6B000
heap
page read and write
3417A000
trusted library allocation
page read and write
37192000
heap
page read and write
719000
heap
page read and write
73C000
heap
page read and write
374D0000
trusted library allocation
page read and write
374A0000
trusted library allocation
page read and write
75E000
heap
page read and write
363C2000
heap
page read and write
75E000
heap
page read and write
33FC2000
trusted library allocation
page read and write
75E000
heap
page read and write
369A0000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
36990000
trusted library allocation
page read and write
374A0000
trusted library allocation
page read and write
341D7000
trusted library allocation
page read and write
3631B000
heap
page read and write
369A0000
trusted library allocation
page read and write
2936000
heap
page read and write
B20000
trusted library allocation
page read and write
27429C13000
heap
page read and write
75E000
heap
page read and write
37530000
trusted library allocation
page read and write
43E000
unkown
page readonly
22F0000
heap
page read and write
3B7C000
stack
page read and write
B20000
trusted library allocation
page read and write
B90000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
37700000
trusted library allocation
page read and write
36990000
trusted library allocation
page read and write
75E000
heap
page read and write
75E000
heap
page read and write
B30000
trusted library section
page read and write
33BD0000
remote allocation
page read and write
719000
heap
page read and write
75E000
heap
page read and write
746000
heap
page read and write
36392000
heap
page read and write
27429C31000
heap
page read and write
36990000
trusted library allocation
page read and write
75E000
heap
page read and write
6D8000
heap
page read and write
B10000
trusted library allocation
page read and write
363F0000
heap
page read and write
75D000
heap
page read and write
36980000
trusted library allocation
page read and write
B90000
trusted library allocation
page read and write
3638B000
heap
page read and write
822CDCB000
stack
page read and write
37196000
heap
page read and write
2434000
heap
page read and write
75E000
heap
page read and write
37174000
heap
page read and write
75E000
heap
page read and write
8E0000
direct allocation
page read and write
36990000
trusted library allocation
page read and write
374C0000
trusted library allocation
page read and write
374B0000
trusted library allocation
page read and write
374C0000
trusted library allocation
page read and write
75E000
heap
page read and write
75E000
heap
page read and write
B11000
trusted library allocation
page read and write
374D0000
trusted library allocation
page read and write
75E000
heap
page read and write
363C2000
heap
page read and write
B30000
trusted library allocation
page read and write
374C0000
trusted library allocation
page read and write
374D7000
trusted library allocation
page read and write
375E0000
unkown
page read and write
B10000
trusted library allocation
page read and write
374A0000
trusted library allocation
page read and write
22AE000
stack
page read and write
36990000
unkown
page read and write
75E000
heap
page read and write
377F0000
heap
page read and write
374D0000
trusted library allocation
page read and write
376F0000
trusted library allocation
page read and write
75E000
heap
page read and write
401000
unkown
page execute read
B30000
trusted library allocation
page read and write
726000
heap
page read and write
75E000
heap
page read and write
374A0000
trusted library allocation
page read and write
708000
heap
page read and write
75E000
heap
page read and write
75E000
heap
page read and write
363E0000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
20000
unclassified section
page readonly
75E000
heap
page read and write
37F5000
heap
page read and write
374C0000
trusted library allocation
page read and write
374C0000
trusted library allocation
page read and write
363B6000
heap
page read and write
376F0000
unkown
page read and write
75E000
heap
page read and write
34200000
trusted library allocation
page read and write
369A0000
trusted library allocation
page read and write
362F9000
heap
page read and write
37C8000
heap
page read and write
BAA000
trusted library allocation
page read and write
36995000
trusted library allocation
page read and write
75E000
heap
page read and write
374A0000
trusted library allocation
page read and write
35C0000
heap
page read and write
5700000
direct allocation
page execute and read and write
71D000
heap
page read and write
75E000
heap
page read and write
2932000
heap
page read and write
331E0000
heap
page read and write
374C0000
unkown
page read and write
75E000
heap
page read and write
B10000
trusted library allocation
page read and write
374D0000
trusted library allocation
page read and write
33BD0000
remote allocation
page read and write
75E000
heap
page read and write
480000
unkown
page readonly
33FBB000
trusted library allocation
page read and write
363D2000
heap
page read and write
3716C000
heap
page read and write
75E000
heap
page read and write
75E000
heap
page read and write
714000
heap
page read and write
75E000
heap
page read and write
363F3000
heap
page read and write
75E000
heap
page read and write
708000
heap
page read and write
B20000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
363E0000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
B90000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
714000
heap
page read and write
B30000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
377EE000
stack
page read and write
369A0000
trusted library allocation
page read and write
35C5000
heap
page read and write
75E000
heap
page read and write
363D8000
heap
page read and write
369A0000
trusted library allocation
page read and write
36990000
trusted library allocation
page read and write
377AD000
stack
page read and write
98000
stack
page read and write
B10000
trusted library allocation
page read and write
708000
heap
page read and write
B10000
trusted library allocation
page read and write
374B0000
trusted library allocation
page read and write
75E000
heap
page read and write
B30000
trusted library allocation
page read and write
363A9000
heap
page read and write
7F8A0000
trusted library allocation
page execute and read and write
B21000
trusted library allocation
page read and write
714000
heap
page read and write
75E000
heap
page read and write
B32000
trusted library allocation
page read and write
75E000
heap
page read and write
37E4000
heap
page read and write
75E000
heap
page read and write
4EEF000
heap
page read and write
37530000
trusted library allocation
page read and write
714000
heap
page read and write
BA0000
trusted library allocation
page read and write
36990000
trusted library allocation
page read and write
36990000
trusted library allocation
page read and write
33F0E000
stack
page read and write
33D0F000
stack
page read and write
374D8000
trusted library allocation
page read and write
363B6000
heap
page read and write
75E000
heap
page read and write
33FDD000
trusted library allocation
page read and write
75E000
heap
page read and write
75E000
heap
page read and write
B20000
trusted library allocation
page read and write
B9A000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
75E000
heap
page read and write
33C0E000
stack
page read and write
B20000
trusted library allocation
page read and write
293D000
heap
page read and write
71D000
heap
page read and write
364A0000
trusted library allocation
page read and write
363A8000
heap
page read and write
2933000
heap
page read and write
374A0000
trusted library allocation
page read and write
10005000
unkown
page readonly
374A0000
trusted library allocation
page read and write
75E000
heap
page read and write
374C0000
trusted library allocation
page read and write
3634D000
heap
page read and write
27429C27000
heap
page read and write
B60000
trusted library allocation
page read and write
374C0000
unkown
page read and write
75E000
heap
page read and write
B30000
trusted library allocation
page read and write
75E000
heap
page read and write
B30000
trusted library allocation
page read and write
374E0000
trusted library allocation
page read and write
B90000
trusted library allocation
page read and write
75E000
heap
page read and write
75E000
heap
page read and write
719000
heap
page read and write
27429B80000
unclassified section
page readonly
719000
heap
page read and write
36396000
heap
page read and write
30000
heap
page read and write
23FF000
stack
page read and write
75E000
heap
page read and write
374A0000
unkown
page read and write
75E000
heap
page read and write
36E0000
heap
page read and write
B90000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
75E000
heap
page read and write
374A5000
trusted library allocation
page read and write
341F6000
trusted library allocation
page read and write
75E000
heap
page read and write
33FF0000
trusted library allocation
page read and write
10000000
unkown
page readonly
363E0000
trusted library allocation
page read and write
36373000
heap
page read and write
363CC000
heap
page read and write
363BE000
heap
page read and write
75E000
heap
page read and write
B10000
trusted library allocation
page execute and read and write
71D000
heap
page read and write
369A0000
trusted library allocation
page read and write
BA0000
unkown
page read and write
36990000
trusted library allocation
page read and write
3635F000
heap
page read and write
B40000
trusted library allocation
page read and write
75E000
heap
page read and write
33EC2000
trusted library allocation
page read and write
376D0000
trusted library allocation
page execute and read and write
33E80000
trusted library allocation
page read and write
BE0000
unclassified section
page readonly
33F50000
trusted library allocation
page execute and read and write
75E000
heap
page read and write
B90000
trusted library allocation
page read and write
19A000
stack
page read and write
374C0000
trusted library allocation
page read and write
B50000
trusted library allocation
page read and write
34000000
trusted library allocation
page read and write
708000
heap
page read and write
37710000
trusted library allocation
page read and write
3A80000
heap
page read and write
374A0000
trusted library allocation
page read and write
33FBE000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
36990000
unkown
page read and write
374A0000
trusted library allocation
page read and write
400000
unkown
page readonly
43E000
unkown
page readonly
71D000
heap
page read and write
34379000
trusted library allocation
page read and write
374A0000
trusted library allocation
page read and write
36990000
trusted library allocation
page read and write
36990000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
363CC000
heap
page read and write
374F0000
trusted library allocation
page read and write
33FB0000
trusted library allocation
page read and write
75E000
heap
page read and write
27429C27000
heap
page read and write
37160000
heap
page read and write
B51000
trusted library allocation
page read and write
714000
heap
page read and write
374D0000
trusted library allocation
page read and write
B40000
trusted library allocation
page read and write
374D0000
trusted library allocation
page read and write
363AA000
heap
page read and write
37FF000
heap
page read and write
A70000
trusted library allocation
page read and write
75E000
heap
page read and write
339AE000
stack
page read and write
369A0000
trusted library allocation
page read and write
27429D02000
heap
page read and write
36990000
unkown
page read and write
B10000
trusted library allocation
page read and write
75E000
heap
page read and write
75E000
heap
page read and write
37173000
heap
page read and write
27429C49000
heap
page read and write
33FD6000
trusted library allocation
page read and write
385E000
heap
page read and write
71D000
heap
page read and write
37520000
trusted library allocation
page read and write
37530000
trusted library allocation
page read and write
374C0000
trusted library allocation
page read and write
27429C60000
heap
page read and write
10059000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
27429C69000
heap
page read and write
B20000
trusted library allocation
page read and write
75E000
heap
page read and write
75E000
heap
page read and write
369A0000
trusted library allocation
page read and write
374D0000
unkown
page read and write
364B0000
heap
page execute and read and write
B20000
trusted library allocation
page read and write
3630B000
heap
page read and write
BA0000
trusted library allocation
page read and write
440000
unkown
page readonly
480000
unkown
page readonly
33EA0000
trusted library allocation
page read and write
362DE000
stack
page read and write
B30000
trusted library allocation
page read and write
374C0000
trusted library allocation
page read and write
2742A470000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
708000
heap
page read and write
27429B90000
heap
page read and write
822D57A000
stack
page read and write
330E0000
direct allocation
page read and write
33FF0000
trusted library allocation
page read and write
374B0000
trusted library allocation
page read and write
37538000
trusted library allocation
page read and write
34141000
trusted library allocation
page read and write
E00000
remote allocation
page execute and read and write
726000
heap
page read and write
36395000
heap
page read and write
BA0000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
374C0000
trusted library allocation
page read and write
75E000
heap
page read and write
2939000
heap
page read and write
374A0000
trusted library allocation
page read and write
B90000
trusted library allocation
page execute and read and write
B20000
trusted library allocation
page read and write
27429C02000
heap
page read and write
B13000
trusted library allocation
page read and write
BA0000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
71D000
heap
page read and write
B10000
trusted library allocation
page read and write
714000
heap
page read and write
37530000
trusted library allocation
page read and write
374AF000
trusted library allocation
page read and write
75E000
heap
page read and write
3693F000
stack
page read and write
384E000
heap
page read and write
397E000
stack
page read and write
27429C55000
heap
page read and write
75E000
heap
page read and write
33FCE000
trusted library allocation
page read and write
33E59000
stack
page read and write
33E94000
trusted library allocation
page read and write
37F3000
heap
page read and write
35141000
trusted library allocation
page read and write
374C0000
trusted library allocation
page read and write
429000
unkown
page read and write
36990000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
75E000
heap
page read and write
75E000
heap
page read and write
376D0000
trusted library allocation
page read and write
374A0000
trusted library allocation
page read and write
37FA000
heap
page read and write
33E93000
trusted library allocation
page execute and read and write
27429C62000
heap
page read and write
376D0000
trusted library allocation
page read and write
3717C000
heap
page read and write
75E000
heap
page read and write
75E000
heap
page read and write
33F4C000
stack
page read and write
363DC000
heap
page read and write
374A6000
trusted library allocation
page read and write
376D0000
trusted library allocation
page read and write
36990000
trusted library allocation
page read and write
378B000
heap
page read and write
37700000
trusted library allocation
page read and write
FD8000
remote allocation
page execute and read and write
293D000
heap
page read and write
374C0000
trusted library allocation
page read and write
363BE000
heap
page read and write
B10000
trusted library allocation
page read and write
726000
heap
page read and write
62D8000
direct allocation
page execute and read and write
33EB6000
trusted library allocation
page execute and read and write
32E21000
heap
page read and write
374C8000
trusted library allocation
page read and write
726000
heap
page read and write
BAF000
trusted library allocation
page read and write
B20000
trusted library allocation
page read and write
719000
heap
page read and write
376E0000
trusted library allocation
page read and write
36990000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
374C0000
unkown
page read and write
36990000
trusted library allocation
page read and write
A30000
unclassified section
page readonly
B10000
trusted library allocation
page read and write
BA0000
trusted library allocation
page read and write
600000
heap
page read and write
374C5000
trusted library allocation
page read and write
3250000
heap
page read and write
2780000
heap
page read and write
6CD8000
direct allocation
page execute and read and write
374B0000
trusted library allocation
page execute and read and write
374C0000
trusted library allocation
page read and write
3719E000
heap
page read and write
374D0000
trusted library allocation
page read and write
34030000
heap
page read and write
B30000
trusted library allocation
page read and write
75E000
heap
page read and write
374C0000
trusted library allocation
page read and write
75E000
heap
page read and write
36990000
trusted library allocation
page read and write
75E000
heap
page read and write
374D8000
trusted library allocation
page read and write
75E000
heap
page read and write
75E000
heap
page read and write
650000
direct allocation
page read and write
3823000
heap
page read and write
700000
heap
page read and write
374C0000
trusted library allocation
page read and write
363C0000
heap
page read and write
33EC7000
trusted library allocation
page execute and read and write
75E000
heap
page read and write
36990000
unkown
page read and write
B60000
trusted library allocation
page read and write
374C0000
trusted library allocation
page read and write
B60000
trusted library allocation
page read and write
BA0000
trusted library allocation
page read and write
3413F000
stack
page read and write
37710000
trusted library allocation
page read and write
3835000
heap
page read and write
B20000
trusted library allocation
page read and write
338AE000
stack
page read and write
374C0000
trusted library allocation
page read and write
3697E000
stack
page read and write
B30000
trusted library allocation
page read and write
374C0000
trusted library allocation
page read and write
376E0000
unkown
page read and write
A40000
heap
page read and write
27429C2A000
heap
page read and write
71D000
heap
page read and write
B10000
trusted library allocation
page read and write
75E000
heap
page read and write
407000
unkown
page readonly
75E000
heap
page read and write
5269000
trusted library allocation
page read and write
75E000
heap
page read and write
B30000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
36990000
trusted library allocation
page read and write
37530000
trusted library allocation
page read and write
37173000
heap
page read and write
374C0000
trusted library allocation
page read and write
35C4000
heap
page read and write
27429C20000
heap
page read and write
75E000
heap
page read and write
3760000
heap
page read and write
374C0000
trusted library allocation
page read and write
331E7000
heap
page read and write
363B1000
heap
page read and write
5F7000
heap
page read and write
B20000
trusted library allocation
page read and write
363B3000
heap
page read and write
3402C000
stack
page read and write
75E000
heap
page read and write
374A0000
trusted library allocation
page read and write
363DC000
heap
page read and write
733000
heap
page read and write
3719E000
heap
page read and write
421000
unkown
page read and write
B1E000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
726000
heap
page read and write
22F5000
heap
page read and write
75E000
heap
page read and write
75E000
heap
page read and write
376F0000
trusted library allocation
page read and write
B30000
trusted library allocation
page read and write
33EC0000
trusted library allocation
page read and write
36990000
trusted library allocation
page read and write
369A0000
trusted library allocation
page read and write
27429C40000
heap
page read and write
27429C64000
heap
page read and write
36396000
heap
page read and write
365BC000
stack
page read and write
75E000
heap
page read and write
37700000
trusted library allocation
page read and write
36990000
trusted library allocation
page read and write
33FCA000
trusted library allocation
page read and write
33BD0000
remote allocation
page read and write
B20000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
33EB0000
trusted library allocation
page read and write
376F0000
trusted library allocation
page read and write
22D0000
heap
page read and write
36990000
trusted library allocation
page read and write
37169000
heap
page read and write
19D8000
remote allocation
page execute and read and write
BA0000
unkown
page read and write
363D0000
heap
page read and write
75E000
heap
page read and write
374F0000
heap
page read and write
27429C5D000
heap
page read and write
10001000
unkown
page execute read
B30000
trusted library allocation
page read and write
37176000
heap
page read and write
401000
unkown
page execute read
33860000
trusted library allocation
page read and write
27429C67000
heap
page read and write
726000
heap
page read and write
B20000
trusted library allocation
page read and write
B27000
trusted library allocation
page read and write
43B000
unkown
page read and write
409000
unkown
page read and write
440000
unkown
page readonly
27429C6E000
heap
page read and write
B30000
trusted library allocation
page read and write
75E000
heap
page read and write
75E000
heap
page read and write
There are 704 hidden memdumps, click here to show them.