IOC Report
WSNBOfCAfh

loading gif

Files

File Path
Type
Category
Malicious
WSNBOfCAfh.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Program Files (x86)\GU_2024\AGB_D_2024.pdf (copy)
PDF document, version 1.4, 2 pages
dropped
C:\Program Files (x86)\GU_2024\AGB_E_2024.pdf (copy)
PDF document, version 1.6, 2 pages
dropped
C:\Program Files (x86)\GU_2024\AGB_F_2024.pdf (copy)
PDF document, version 1.5 (zip deflate encoded)
dropped
C:\Program Files (x86)\GU_2024\AGB_I_2024.pdf (copy)
PDF document, version 1.5 (zip deflate encoded)
dropped
C:\Program Files (x86)\GU_2024\GU.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\GU_2024\GU.ini (copy)
Generic INItialization configuration [TarifGUUser]
dropped
C:\Program Files (x86)\GU_2024\GU.mld (copy)
data
dropped
C:\Program Files (x86)\GU_2024\GUPlan.pts (copy)
data
dropped
C:\Program Files (x86)\GU_2024\Stauzuschlag.ini (copy)
Generic INItialization configuration [Zone1]
dropped
C:\Program Files (x86)\GU_2024\StauzuschlagStufe.ini (copy)
Generic INItialization configuration [Stufe01Zone01]
dropped
C:\Program Files (x86)\GU_2024\is-4FJH0.tmp
PDF document, version 1.6, 2 pages
dropped
C:\Program Files (x86)\GU_2024\is-6RMLS.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\GU_2024\is-H5DU9.tmp
Generic INItialization configuration [Zone1]
dropped
C:\Program Files (x86)\GU_2024\is-JJF75.tmp
PDF document, version 1.5 (zip deflate encoded)
dropped
C:\Program Files (x86)\GU_2024\is-JSISK.tmp
PDF document, version 1.4, 2 pages
dropped
C:\Program Files (x86)\GU_2024\is-OH7O9.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files (x86)\GU_2024\is-OMS78.tmp
PDF document, version 1.5 (zip deflate encoded)
dropped
C:\Program Files (x86)\GU_2024\is-PHHTS.tmp
Generic INItialization configuration [TarifGUUser]
dropped
C:\Program Files (x86)\GU_2024\is-R8FCJ.tmp
Generic INItialization configuration [Stufe01Zone01]
dropped
C:\Program Files (x86)\GU_2024\is-RKLVJ.tmp
data
dropped
C:\Program Files (x86)\GU_2024\is-S2QOK.tmp
data
dropped
C:\Program Files (x86)\GU_2024\unins000.dat
InnoSetup Log GU Kalkulationsgrundlage 2024 {0EDBF4D3-E651-4455-AC3F-D984152B0B89}, version 0x418, 3337 bytes, 724471\37\user, C:\Program Files (x86)\GU_2024\376\377\377
modified
C:\Program Files (x86)\GU_2024\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\GU_2024\GU 2024.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Tue Apr 16 13:03:38 2024, mtime=Tue Apr 16 13:03:39 2024, atime=Wed Feb 14 13:57:06 2024, length=19850752, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\GU_2024\Uninstall GU 2024.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Tue Apr 16 13:03:38 2024, mtime=Tue Apr 16 13:03:38 2024, atime=Tue Apr 16 13:03:20 2024, length=3137597, window=hide
dropped
C:\Users\user\AppData\Local\Temp\is-JH8JK.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
modified
C:\Users\user\settings\GU2024.ini
Generic INItialization configuration [TarifGUUser]
dropped
There are 19 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\WSNBOfCAfh.exe
"C:\Users\user\Desktop\WSNBOfCAfh.exe"
C:\Users\user\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp
"C:\Users\user~1\AppData\Local\Temp\is-U1PO5.tmp\WSNBOfCAfh.tmp" /SL5="$2042E,9552580,777216,C:\Users\user\Desktop\WSNBOfCAfh.exe"
C:\Program Files (x86)\GU_2024\GU.exe
"C:\Program Files (x86)\GU_2024\GU.exe"
C:\Windows\splwow64.exe
C:\Windows\splwow64.exe 12288

URLs

Name
IP
Malicious
http://www.aiim.org/pdfa/ns/property#
unknown
https://code.google.com/apis/console
unknown
https://jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
https://www.digital-metaphors.com/orderU
unknown
http://localhostOEmailSettings.ConnectionSettings.WebMail.Outlook365Settings.OAuth2.RedirectPort
unknown
http://www.adobe.ch
unknown
http://localhostJEmailSettings.ConnectionSettings.WebMail.GmailSettings.OAuth2.RedirectPort
unknown
http://localhost6CloudDriveSettings.DropBoxSettings.OAuth2.RedirectPort
unknown
http://www.aiim.org/pdfa/ns/id/
unknown
https://www.remobjects.com/ps
unknown
http://localhost:CloudDriveSettings.GoogleDriveSettings.OAuth2.RedirectPort
unknown
http://www.aiim.org/pdfa/ns/schema#
unknown
https://www.digital-metaphors.com
unknown
http://www.google.com/maps/SV
unknown
http://www.npes.org/pdfx/ns/id/
unknown
https://www.innosetup.com/
unknown
http://www.aiim.org/pdfa/ns/extension/
unknown
https://indy.fulgan.com/SSL/OpenSSL_add_all_ciphersOpenSSL_add_all_digestsERR_get_errorERR_peek_erro
unknown
http://localhost7CloudDriveSettings.OneDriveSettings.OAuth2.RedirectPort
unknown
http://www.color.org)/S/GTS_PDFX/Type/OutputIntent
unknown
https://www.digital-metaphors.com/supportU
unknown
There are 11 hidden URLs, click here to show them.

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0EDBF4D3-E651-4455-AC3F-D984152B0B89}_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0EDBF4D3-E651-4455-AC3F-D984152B0B89}_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0EDBF4D3-E651-4455-AC3F-D984152B0B89}_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0EDBF4D3-E651-4455-AC3F-D984152B0B89}_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0EDBF4D3-E651-4455-AC3F-D984152B0B89}_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0EDBF4D3-E651-4455-AC3F-D984152B0B89}_is1
Inno Setup: Selected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0EDBF4D3-E651-4455-AC3F-D984152B0B89}_is1
Inno Setup: Deselected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0EDBF4D3-E651-4455-AC3F-D984152B0B89}_is1
Inno Setup: Language
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0EDBF4D3-E651-4455-AC3F-D984152B0B89}_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0EDBF4D3-E651-4455-AC3F-D984152B0B89}_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0EDBF4D3-E651-4455-AC3F-D984152B0B89}_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0EDBF4D3-E651-4455-AC3F-D984152B0B89}_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0EDBF4D3-E651-4455-AC3F-D984152B0B89}_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0EDBF4D3-E651-4455-AC3F-D984152B0B89}_is1
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\{0EDBF4D3-E651-4455-AC3F-D984152B0B89}_is1
EstimatedSize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\splwow64.exe
JScriptSetScriptStateStarted
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
ABC000
heap
page read and write
96D000
heap
page read and write
A09000
heap
page read and write
B4F000
stack
page read and write
363A000
direct allocation
page read and write
970000
heap
page read and write
24F7000
direct allocation
page read and write
410B000
direct allocation
page read and write
5D2E000
stack
page read and write
6044000
direct allocation
page read and write
3BA6000
direct allocation
page read and write
19D2000
unkown
page read and write
45B5000
direct allocation
page read and write
400000
unkown
page readonly
997000
heap
page read and write
1BB1000
unkown
page readonly
6006000
direct allocation
page read and write
A7C000
heap
page read and write
1C0D000
unkown
page readonly
1C23000
unkown
page readonly
254C000
direct allocation
page read and write
940000
direct allocation
page read and write
2247000
direct allocation
page read and write
5800000
direct allocation
page read and write
1C25000
unkown
page readonly
A82000
heap
page read and write
1B83000
unkown
page readonly
4C2000
unkown
page write copy
605A000
direct allocation
page read and write
602A000
direct allocation
page read and write
603C000
direct allocation
page read and write
607A000
direct allocation
page read and write
582F000
direct allocation
page read and write
420C000
direct allocation
page read and write
6067000
direct allocation
page read and write
2800000
heap
page read and write
1BFD000
unkown
page readonly
7FCD0000
direct allocation
page read and write
5FCF000
direct allocation
page read and write
24FE000
direct allocation
page read and write
1BF0000
unkown
page readonly
401000
unkown
page execute read
5FD7000
direct allocation
page read and write
44FA000
direct allocation
page read and write
1995000
unkown
page read and write
2480000
heap
page read and write
24BB000
direct allocation
page read and write
45BC000
direct allocation
page read and write
21F6000
direct allocation
page read and write
1BF2000
unkown
page readonly
A81000
heap
page read and write
5E2F000
stack
page read and write
1C00000
unkown
page readonly
19B3000
unkown
page read and write
42D0000
trusted library section
page read and write
1B71000
unkown
page readonly
7FB50000
direct allocation
page read and write
63E000
stack
page read and write
99A000
heap
page read and write
995000
heap
page read and write
940000
direct allocation
page read and write
24C5000
direct allocation
page read and write
1C27000
unkown
page readonly
790000
heap
page read and write
21FE000
direct allocation
page read and write
4B7000
unkown
page write copy
40F3000
heap
page read and write
19D000
stack
page read and write
1BC4000
unkown
page readonly
D00000
heap
page read and write
1BA5000
unkown
page readonly
1B94000
unkown
page readonly
6C7000
unkown
page read and write
C51000
unkown
page execute read
9F1000
heap
page read and write
9AD000
heap
page read and write
2272000
direct allocation
page read and write
6022000
direct allocation
page read and write
A10000
heap
page read and write
1A0C000
unkown
page write copy
3917000
direct allocation
page read and write
41E1000
direct allocation
page read and write
41B2000
direct allocation
page read and write
3770000
direct allocation
page read and write
41B8000
direct allocation
page read and write
4510000
direct allocation
page read and write
414B000
direct allocation
page read and write
6F4000
unkown
page readonly
2564000
direct allocation
page read and write
A81000
heap
page read and write
1BBE000
unkown
page readonly
6085000
direct allocation
page read and write
987000
heap
page read and write
9B1000
heap
page read and write
1A12000
unkown
page read and write
3B46000
direct allocation
page read and write
602C000
direct allocation
page read and write
1B8F000
unkown
page readonly
3644000
direct allocation
page read and write
5FDD000
direct allocation
page read and write
1BF4000
unkown
page readonly
1C31000
unkown
page readonly
19C2000
unkown
page read and write
1B6E000
unkown
page readonly
1BAC000
unkown
page readonly
5FAF000
direct allocation
page read and write
24E9000
direct allocation
page read and write
1B98000
unkown
page readonly
796000
heap
page read and write
411A000
direct allocation
page read and write
1B68000
unkown
page readonly
5F96000
direct allocation
page read and write
3B5C000
direct allocation
page read and write
5700000
direct allocation
page read and write
1F24000
unkown
page readonly
1C52000
unkown
page readonly
603A000
direct allocation
page read and write
1BE3000
unkown
page readonly
4D0000
heap
page read and write
38F7000
direct allocation
page read and write
1BDF000
unkown
page readonly
41EE000
direct allocation
page read and write
2556000
direct allocation
page read and write
1C4E000
unkown
page readonly
608B000
direct allocation
page read and write
2281000
direct allocation
page read and write
4173000
direct allocation
page read and write
254F000
direct allocation
page read and write
411E000
direct allocation
page read and write
3AED000
direct allocation
page read and write
5F0000
heap
page read and write
24F0000
direct allocation
page read and write
24B0000
direct allocation
page read and write
5FA9000
direct allocation
page read and write
96F000
stack
page read and write
2190000
heap
page read and write
9F1000
heap
page read and write
413B000
direct allocation
page read and write
910000
heap
page read and write
1C1C000
unkown
page readonly
6D6000
unkown
page read and write
2591000
direct allocation
page read and write
9F2000
heap
page read and write
5F76000
direct allocation
page read and write
1C64000
unkown
page readonly
A04000
heap
page read and write
A3E000
heap
page read and write
3660000
heap
page read and write
2529000
direct allocation
page read and write
1C2F000
unkown
page readonly
421D000
direct allocation
page read and write
A7A000
heap
page read and write
417C000
direct allocation
page read and write
2440000
heap
page read and write
C50000
unkown
page readonly
600C000
direct allocation
page read and write
22D8000
direct allocation
page read and write
4114000
direct allocation
page read and write
6056000
direct allocation
page read and write
A8A000
heap
page read and write
6042000
direct allocation
page read and write
640000
heap
page read and write
9AE000
heap
page read and write
25C4000
direct allocation
page read and write
9ED000
heap
page read and write
5CEE000
stack
page read and write
1651000
unkown
page execute read
5FF7000
direct allocation
page read and write
6076000
direct allocation
page read and write
25AF000
direct allocation
page read and write
25A8000
direct allocation
page read and write
A87000
heap
page read and write
2520000
direct allocation
page read and write
221A000
direct allocation
page read and write
5FD5000
direct allocation
page read and write
2520000
direct allocation
page read and write
710000
heap
page read and write
3610000
direct allocation
page read and write
1BE1000
unkown
page readonly
41CB000
direct allocation
page read and write
229F000
direct allocation
page read and write
797000
heap
page read and write
4300000
heap
page read and write
99D000
heap
page read and write
1B7F000
unkown
page readonly
5F92000
direct allocation
page read and write
413E000
direct allocation
page read and write
950000
heap
page read and write
24BD000
direct allocation
page read and write
1EFD000
unkown
page readonly
3B2E000
direct allocation
page read and write
C30000
direct allocation
page execute and read and write
2539000
direct allocation
page read and write
3B08000
direct allocation
page read and write
42D0000
trusted library allocation
page read and write
AB6000
heap
page read and write
604F000
direct allocation
page read and write
24DA000
direct allocation
page read and write
5FC9000
direct allocation
page read and write
37BE000
stack
page read and write
6CE000
unkown
page read and write
41EA000
direct allocation
page read and write
257B000
direct allocation
page read and write
41BB000
direct allocation
page read and write
9A9000
heap
page read and write
22AD000
direct allocation
page read and write
394F000
direct allocation
page read and write
1C6F000
unkown
page readonly
5F72000
direct allocation
page read and write
9A4000
heap
page read and write
2213000
direct allocation
page read and write
24B8000
direct allocation
page read and write
4C0000
unkown
page read and write
A7C000
heap
page read and write
3BCA000
direct allocation
page read and write
21C4000
direct allocation
page read and write
96B000
heap
page read and write
41BF000
direct allocation
page read and write
678000
heap
page read and write
6C9000
unkown
page read and write
4122000
direct allocation
page read and write
9ED000
heap
page read and write
2E10000
trusted library allocation
page read and write
A00000
heap
page read and write
3BD8000
direct allocation
page read and write
6E0000
unkown
page readonly
3B71000
heap
page read and write
CCE000
stack
page read and write
3AFA000
direct allocation
page read and write
97A000
heap
page read and write
1C59000
unkown
page readonly
21DA000
direct allocation
page read and write
40DC000
stack
page read and write
9FD000
heap
page read and write
258A000
direct allocation
page read and write
3AA1000
direct allocation
page read and write
86F000
stack
page read and write
1993000
unkown
page read and write
1C1E000
unkown
page readonly
199B000
unkown
page read and write
D09000
heap
page read and write
21AC000
direct allocation
page read and write
AB0000
heap
page read and write
1C71000
unkown
page readonly
3631000
direct allocation
page read and write
5B9C000
stack
page read and write
19CD000
unkown
page read and write
3B37000
direct allocation
page read and write
EAA000
unkown
page execute read
6054000
direct allocation
page read and write
22BC000
direct allocation
page read and write
ABF000
heap
page read and write
98F000
heap
page read and write
1F76000
unkown
page readonly
3ABE000
direct allocation
page read and write
4C4000
unkown
page readonly
A08000
heap
page read and write
40F0000
heap
page read and write
9A7000
heap
page read and write
A7F000
heap
page read and write
38F0000
direct allocation
page read and write
930000
heap
page read and write
19A4000
unkown
page write copy
9AB000
heap
page read and write
3AD7000
direct allocation
page read and write
9A0000
heap
page read and write
2574000
direct allocation
page read and write
5E6E000
stack
page read and write
1C69000
unkown
page readonly
3B64000
direct allocation
page read and write
600F000
direct allocation
page read and write
2803000
heap
page read and write
6DE000
unkown
page readonly
5100000
heap
page read and write
3941000
direct allocation
page read and write
978000
heap
page read and write
24D3000
direct allocation
page read and write
3B01000
direct allocation
page read and write
9A7000
heap
page read and write
1A15000
unkown
page readonly
A79000
heap
page read and write
1BD9000
unkown
page readonly
4185000
direct allocation
page read and write
220C000
direct allocation
page read and write
5F6E000
stack
page read and write
75E000
stack
page read and write
21E8000
direct allocation
page read and write
97F000
heap
page read and write
1BF7000
unkown
page readonly
2222000
direct allocation
page read and write
974000
heap
page read and write
25E8000
direct allocation
page read and write
1C3F000
unkown
page readonly
1BA9000
unkown
page readonly
2240000
direct allocation
page read and write
2205000
direct allocation
page read and write
5F88000
direct allocation
page read and write
1A13000
unkown
page readonly
8E0000
heap
page read and write
603E000
direct allocation
page read and write
2231000
direct allocation
page read and write
5F80000
direct allocation
page read and write
37FE000
stack
page read and write
958000
heap
page read and write
5FC4000
direct allocation
page read and write
459B000
direct allocation
page read and write
22A6000
direct allocation
page read and write
3BD1000
direct allocation
page read and write
227A000
direct allocation
page read and write
3928000
direct allocation
page read and write
3945000
direct allocation
page read and write
25CC000
direct allocation
page read and write
22D1000
direct allocation
page read and write
4B7000
unkown
page read and write
5FF3000
direct allocation
page read and write
260A000
direct allocation
page read and write
400000
unkown
page readonly
4534000
direct allocation
page read and write
5F8A000
direct allocation
page read and write
451C000
direct allocation
page read and write
6013000
direct allocation
page read and write
3B74000
direct allocation
page read and write
3BC3000
direct allocation
page read and write
C20000
heap
page read and write
A14000
heap
page read and write
457B000
direct allocation
page read and write
6D9000
unkown
page write copy
41F2000
direct allocation
page read and write
21D2000
direct allocation
page read and write
2486000
heap
page read and write
A83000
heap
page read and write
2298000
direct allocation
page read and write
9C9000
heap
page read and write
1BED000
unkown
page readonly
2D8F000
stack
page read and write
41AC000
direct allocation
page read and write
3B1F000
direct allocation
page read and write
940000
heap
page read and write
1BF9000
unkown
page readonly
401000
unkown
page execute read
1B6A000
unkown
page readonly
419F000
direct allocation
page read and write
5EE000
stack
page read and write
601B000
direct allocation
page read and write
760000
heap
page read and write
4060000
heap
page read and write
4154000
direct allocation
page read and write
2532000
direct allocation
page read and write
25BD000
direct allocation
page read and write
1C3B000
unkown
page readonly
22B4000
direct allocation
page read and write
41FC000
direct allocation
page read and write
5F98000
direct allocation
page read and write
609F000
direct allocation
page read and write
2540000
direct allocation
page read and write
19E7000
unkown
page read and write
604D000
direct allocation
page read and write
3B3E000
direct allocation
page read and write
5FA4000
direct allocation
page read and write
AE3000
heap
page read and write
5BEE000
stack
page read and write
5F7C000
direct allocation
page read and write
1B77000
unkown
page readonly
452C000
direct allocation
page read and write
3D6F000
stack
page read and write
4230000
direct allocation
page read and write
98C000
heap
page read and write
24E1000
direct allocation
page read and write
7FE36000
direct allocation
page read and write
97F000
heap
page read and write
3E6F000
stack
page read and write
25B6000
direct allocation
page read and write
9AE000
heap
page read and write
65E0000
trusted library allocation
page read and write
41F6000
direct allocation
page read and write
6015000
direct allocation
page read and write
3921000
direct allocation
page read and write
1C29000
unkown
page readonly
41B0000
direct allocation
page read and write
9A1000
heap
page read and write
1B9D000
unkown
page readonly
222A000
direct allocation
page read and write
5FEE000
direct allocation
page read and write
98B000
heap
page read and write
2470000
heap
page read and write
2239000
direct allocation
page read and write
900000
heap
page read and write
3B27000
direct allocation
page read and write
1B7B000
unkown
page readonly
A83000
heap
page read and write
21CB000
direct allocation
page read and write
A82000
heap
page read and write
5FB5000
direct allocation
page read and write
1C5D000
unkown
page readonly
3A70000
heap
page read and write
4146000
direct allocation
page read and write
3610000
direct allocation
page read and write
9AE000
heap
page read and write
976000
heap
page read and write
3BAD000
direct allocation
page read and write
8F0000
direct allocation
page execute and read and write
5FFD000
direct allocation
page read and write
5FD9000
direct allocation
page read and write
24CC000
direct allocation
page read and write
9B000
stack
page read and write
8AE000
stack
page read and write
25D3000
direct allocation
page read and write
1C47000
unkown
page readonly
A13000
heap
page read and write
26A0000
heap
page read and write
4305000
heap
page read and write
1BE6000
unkown
page readonly
1CCD000
unkown
page readonly
41AA000
direct allocation
page read and write
4C6000
unkown
page readonly
A82000
heap
page read and write
60AE000
direct allocation
page read and write
9A1000
heap
page read and write
6034000
direct allocation
page read and write
1BBC000
unkown
page readonly
21E1000
direct allocation
page read and write
2288000
direct allocation
page read and write
1993000
unkown
page write copy
5FAB000
direct allocation
page read and write
983000
heap
page read and write
19C6000
unkown
page read and write
1C0F000
unkown
page readonly
41A6000
direct allocation
page read and write
591000
stack
page read and write
1B87000
unkown
page readonly
945000
heap
page read and write
3B6C000
direct allocation
page read and write
3B7A000
direct allocation
page read and write
419B000
direct allocation
page read and write
4102000
direct allocation
page read and write
2598000
direct allocation
page read and write
4B9000
unkown
page read and write
22CA000
direct allocation
page read and write
25E1000
direct allocation
page read and write
5FAD000
direct allocation
page read and write
A0C000
heap
page read and write
93000
stack
page read and write
C4F000
stack
page read and write
199E000
unkown
page read and write
6C7000
unkown
page write copy
A77000
heap
page read and write
25DA000
direct allocation
page read and write
3B55000
direct allocation
page read and write
5FE8000
direct allocation
page read and write
A79000
heap
page read and write
D05000
heap
page read and write
A01000
heap
page read and write
5F86000
direct allocation
page read and write
2582000
direct allocation
page read and write
255D000
direct allocation
page read and write
5FDF000
direct allocation
page read and write
5F90000
direct allocation
page read and write
99A000
heap
page read and write
18D000
stack
page read and write
3B89000
direct allocation
page read and write
987000
heap
page read and write
41C3000
direct allocation
page read and write
6D1000
unkown
page read and write
1F46000
unkown
page readonly
1BEA000
unkown
page readonly
AB6000
heap
page read and write
C61000
unkown
page execute read
3B70000
heap
page read and write
1BA0000
unkown
page readonly
A81000
heap
page read and write
3B18000
direct allocation
page read and write
21EF000
direct allocation
page read and write
995000
heap
page read and write
22C3000
direct allocation
page read and write
3656000
direct allocation
page read and write
41C7000
direct allocation
page read and write
670000
heap
page read and write
6040000
direct allocation
page read and write
8FB000
stack
page read and write
1B8B000
unkown
page readonly
There are 470 hidden memdumps, click here to show them.