IOC Report
z42MNA2024000000041-KWINTMADI-11310Y_K.exe

loading gif

Files

File Path
Type
Category
Malicious
z42MNA2024000000041-KWINTMADI-11310Y_K.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\australnegeren\indtgtskilden\Eksploderingers\Graasteneres.Sfa
ASCII text, with very long lines (58202), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\australnegeren\indtgtskilden\Incoagulability\z42MNA2024000000041-KWINTMADI-11310Y_K.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\mqerms.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lbg0zv3a.dzq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yaqdjhhs.boz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhv71F5.tmp
Extensible storage engine DataBase, version 0x620, checksum 0xb20b6b62, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\dbrmaaaxofoayfrhavodhftpbvpppan
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\australnegeren\indtgtskilden\Disproportionalt.Sve
data
dropped
C:\Users\user\AppData\Local\australnegeren\indtgtskilden\Eksploderingers\Forstrkningsbjlken192.unu
data
dropped
C:\Users\user\AppData\Local\australnegeren\indtgtskilden\Eksploderingers\Salvninger.ins
data
dropped
C:\Users\user\AppData\Local\australnegeren\indtgtskilden\Eksploderingers\retsvidenskabs.con
data
dropped
C:\Users\user\AppData\Local\australnegeren\indtgtskilden\Incoagulability\taxpayers.txt
ASCII text, with very long lines (340), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\australnegeren\indtgtskilden\Incoagulability\z42MNA2024000000041-KWINTMADI-11310Y_K.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\z42MNA2024000000041-KWINTMADI-11310Y_K.exe
"C:\Users\user\Desktop\z42MNA2024000000041-KWINTMADI-11310Y_K.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Accordionists=Get-Content 'C:\Users\user\AppData\Local\australnegeren\indtgtskilden\Eksploderingers\Graasteneres.Sfa';$zebraernes=$Accordionists.SubString(8504,3);.$zebraernes($Accordionists)"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Oplagsmssigt19% -windowstyle minimized $Viceformnds=(Get-ItemProperty -Path 'HKCU:\Enecellens\').Bidslernes;%Oplagsmssigt19% ($Viceformnds)"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\dbrmaaaxofoayfrhavodhftpbvpppan"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\nvew"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\xxkptdv"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\xxkptdv"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\xxkptdv"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Oplagsmssigt19% -windowstyle minimized $Viceformnds=(Get-ItemProperty -Path 'HKCU:\Enecellens\').Bidslernes;%Oplagsmssigt19% ($Viceformnds)"
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
learfo55ozj01.duckdns.org
malicious
http://geoplugin.net/json.gp
178.237.33.50
malicious
http://geoplugin.net/json.gpcA=
unknown
http://nuget.org/NuGet.exe
unknown
http://www.imvu.comr
unknown
https://ricohltd.top/PIoDroeALMbPB243.bins
unknown
http://geoplugin.net/json.gphA
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
http://www.nirsoft.net
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://github.com/Pester/Pester
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://ricohltd.top/
unknown
https://www.google.com
unknown
http://geoplugin.net/json.gpDA
unknown
http://geoplugin.net/json.gp)A
unknown
http://geoplugin.net/json.gpMA/
unknown
https://aka.ms/pscore6lB
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://ricohltd.top/PIoDroeALMbPB243.binoO
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
http://geoplugin.net/json.gpLv
unknown
http://www.nirsoft.net/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://ricohltd.top/PIoDroeALMbPB243.bin
172.67.191.112
http://geoplugin.net/json.gpAB
unknown
http://www.ebuddy.com
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
learfo55ozj01.duckdns.org
193.222.96.21
malicious
geoplugin.net
178.237.33.50
ricohltd.top
172.67.191.112

IPs

IP
Domain
Country
Malicious
193.222.96.21
learfo55ozj01.duckdns.org
Germany
malicious
172.67.191.112
ricohltd.top
United States
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Ecchymosed236\schmidt
plagiostomi
HKEY_CURRENT_USER\SOFTWARE\ensidige\Prothetical
fremelskningens
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Baadskatter170\Uninstall\anklet
gydes
HKEY_CURRENT_USER\Enecellens
Bidslernes
HKEY_CURRENT_USER\Environment
Oplagsmssigt19
HKEY_CURRENT_USER\SOFTWARE\alpwovnb-G3F5OR
exepath
HKEY_CURRENT_USER\SOFTWARE\alpwovnb-G3F5OR
licence
HKEY_CURRENT_USER\SOFTWARE\alpwovnb-G3F5OR
time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Startup key

Memdumps

Base Address
Regiontype
Protect
Malicious
CE05000
direct allocation
page execute and read and write
malicious
8580000
heap
page read and write
malicious
8581000
heap
page read and write
malicious
8580000
heap
page read and write
malicious
4BD1000
heap
page read and write
4BD1000
heap
page read and write
2411E000
stack
page read and write
2F90000
trusted library section
page read and write
7930000
trusted library allocation
page read and write
2838000
heap
page read and write
408000
unkown
page readonly
2E30000
direct allocation
page read and write
2D9F000
heap
page read and write
57BB000
heap
page read and write
84B0000
direct allocation
page read and write
7A1B000
stack
page read and write
4BE5000
heap
page read and write
304E000
stack
page read and write
3220000
trusted library allocation
page read and write
4BD0000
heap
page read and write
408000
unkown
page readonly
34CE000
stack
page read and write
4BD1000
heap
page read and write
76F5000
remote allocation
page execute and read and write
3430000
heap
page read and write
4E10000
heap
page execute and read and write
8540000
trusted library allocation
page read and write
50D1000
heap
page read and write
3134000
trusted library allocation
page read and write
7940000
trusted library allocation
page read and write
870C000
stack
page read and write
4BFC000
heap
page read and write
24A23000
unclassified section
page execute and read and write
2415C000
stack
page read and write
2B0C000
stack
page read and write
4BFA000
heap
page read and write
82FF000
stack
page read and write
8558000
heap
page read and write
2F80000
trusted library section
page read and write
23D1F000
stack
page read and write
2EA4000
stack
page read and write
340D000
heap
page read and write
31D0000
heap
page readonly
7920000
trusted library allocation
page read and write
7542000
heap
page read and write
7650000
heap
page execute and read and write
3040000
heap
page read and write
4BF8000
heap
page read and write
3060000
heap
page read and write
782E000
stack
page read and write
858B000
heap
page read and write
8490000
direct allocation
page read and write
295E000
stack
page read and write
2D9E000
heap
page read and write
4BE8000
heap
page read and write
2E60000
direct allocation
page read and write
2FF4000
heap
page read and write
2BD0000
heap
page read and write
4BFA000
heap
page read and write
2D78000
heap
page read and write
4BF5000
heap
page read and write
2BB0000
heap
page readonly
401000
unkown
page execute read
4BF1000
heap
page read and write
4C0F000
heap
page read and write
2FF4000
heap
page read and write
24201000
direct allocation
page execute and read and write
24A0D000
unclassified section
page execute and read and write
339E000
stack
page read and write
6FD000
stack
page read and write
243B0000
heap
page read and write
84F000
stack
page read and write
847E000
stack
page read and write
4C0F000
heap
page read and write
2BC0000
heap
page read and write
4C58000
heap
page read and write
338E000
unkown
page read and write
7960000
trusted library allocation
page read and write
56CE000
heap
page read and write
4C17000
heap
page read and write
3248000
heap
page read and write
9205000
direct allocation
page execute and read and write
31E8000
trusted library allocation
page read and write
2A3C000
stack
page read and write
24216000
direct allocation
page execute and read and write
98F000
stack
page read and write
3037000
heap
page read and write
318B000
heap
page read and write
54D0000
trusted library allocation
page read and write
7950000
trusted library allocation
page read and write
23E3E000
stack
page read and write
8560000
trusted library allocation
page read and write
30FD000
stack
page read and write
54C0000
trusted library allocation
page read and write
2E8B000
stack
page read and write
3165000
trusted library allocation
page execute and read and write
85F0000
direct allocation
page read and write
2FF4000
heap
page read and write
6F2E000
stack
page read and write
2A1F000
stack
page read and write
2FE8000
heap
page read and write
78ED000
stack
page read and write
34A8000
heap
page read and write
2EAE000
stack
page read and write
401000
unkown
page execute read
4BBF000
stack
page read and write
4BEE000
heap
page read and write
84A0000
direct allocation
page read and write
7F640000
trusted library allocation
page execute and read and write
84F0000
heap
page read and write
4FC6000
trusted library allocation
page read and write
87BE000
heap
page read and write
849D000
trusted library allocation
page read and write
50D1000
heap
page read and write
30C0000
direct allocation
page read and write
2C64000
heap
page read and write
2390E000
stack
page read and write
4BDC000
heap
page read and write
54C0000
trusted library allocation
page read and write
83C0000
trusted library allocation
page execute and read and write
4BD9000
heap
page read and write
85C0000
heap
page read and write
24659000
heap
page read and write
2FF4000
heap
page read and write
BA05000
direct allocation
page execute and read and write
348F000
unkown
page read and write
4BDC000
heap
page read and write
2280000
heap
page read and write
4DAC000
stack
page read and write
2FF4000
heap
page read and write
23CDE000
stack
page read and write
8535000
heap
page read and write
2401E000
stack
page read and write
4C04000
heap
page read and write
2E00000
direct allocation
page read and write
8A50000
trusted library allocation
page read and write
2C64000
heap
page read and write
24641000
heap
page read and write
3130000
trusted library allocation
page read and write
4C1B000
heap
page read and write
786E000
stack
page read and write
4BDC000
heap
page read and write
79A0000
trusted library allocation
page read and write
8630000
direct allocation
page read and write
50D1000
heap
page read and write
2FB0000
heap
page read and write
76F9000
heap
page read and write
57DB000
trusted library allocation
page read and write
85D6000
heap
page read and write
8A30000
trusted library allocation
page execute and read and write
2820000
heap
page read and write
3240000
heap
page read and write
84C0000
direct allocation
page read and write
8490000
trusted library allocation
page read and write
4BE0000
heap
page read and write
24200000
direct allocation
page read and write
8505000
trusted library allocation
page read and write
2FF4000
heap
page read and write
23960000
heap
page read and write
2E20000
direct allocation
page read and write
882A000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
752E000
stack
page read and write
6EEE000
stack
page read and write
50D1000
heap
page read and write
45D000
system
page execute and read and write
3180000
trusted library allocation
page read and write
32C0000
heap
page read and write
4BF1000
heap
page read and write
7990000
trusted library allocation
page read and write
4C17000
heap
page read and write
2D70000
heap
page read and write
24A8C000
unclassified section
page execute and read and write
8A80000
direct allocation
page execute and read and write
2FF4000
heap
page read and write
8588000
heap
page read and write
2C64000
heap
page read and write
50D1000
heap
page read and write
4BD9000
heap
page read and write
847E000
stack
page read and write
87B0000
heap
page read and write
4BD1000
heap
page read and write
86D0000
heap
page read and write
760000
heap
page read and write
4EF5000
remote allocation
page execute and read and write
3000000
heap
page readonly
23E90000
heap
page read and write
325F000
stack
page read and write
2FF5000
heap
page read and write
23F5E000
stack
page read and write
4BE5000
heap
page read and write
843D000
stack
page read and write
5E99000
trusted library allocation
page read and write
50D1000
heap
page read and write
2FF5000
heap
page read and write
4BE6000
heap
page read and write
8480000
direct allocation
page read and write
85C6000
heap
page read and write
24659000
heap
page read and write
4C34000
heap
page read and write
4C16000
heap
page read and write
20F0000
heap
page read and write
3150000
trusted library allocation
page read and write
2B47000
stack
page read and write
7670000
heap
page read and write
29D0000
heap
page read and write
883A000
heap
page read and write
5E79000
trusted library allocation
page read and write
2A7A000
stack
page read and write
3045000
heap
page read and write
87D0000
heap
page read and write
41B000
system
page execute and read and write
4BE5000
heap
page read and write
431000
unkown
page read and write
2E40000
direct allocation
page read and write
22D5000
heap
page read and write
4E0000
heap
page read and write
8310000
direct allocation
page read and write
4BDC000
heap
page read and write
4BDC000
heap
page read and write
214E000
stack
page read and write
7735000
heap
page read and write
4C3A000
heap
page read and write
2250000
heap
page read and write
78AE000
stack
page read and write
53E000
stack
page read and write
4BD1000
heap
page read and write
3150000
heap
page read and write
2C64000
heap
page read and write
3081000
heap
page read and write
54C0000
trusted library allocation
page read and write
45B000
unkown
page readonly
340E000
heap
page read and write
4C19000
heap
page read and write
50D1000
heap
page read and write
7040000
direct allocation
page read and write
6CF5000
remote allocation
page execute and read and write
24642000
heap
page read and write
83D0000
trusted library allocation
page read and write
2E86000
stack
page read and write
50D1000
heap
page read and write
2FF4000
heap
page read and write
84B4000
trusted library allocation
page read and write
43F000
unkown
page read and write
8650000
direct allocation
page read and write
79D0000
trusted library allocation
page read and write
329E000
stack
page read and write
302B000
heap
page read and write
2FF4000
heap
page read and write
50D1000
heap
page read and write
4BF5000
heap
page read and write
4BE0000
heap
page read and write
2820000
heap
page read and write
4BD1000
heap
page read and write
2FF4000
heap
page read and write
56A5000
heap
page read and write
3160000
heap
page read and write
2E6C000
stack
page read and write
2C64000
heap
page read and write
24629000
heap
page read and write
400000
unkown
page readonly
223E000
stack
page read and write
2FA0000
trusted library allocation
page read and write
94F000
stack
page read and write
23B7E000
stack
page read and write
2C64000
heap
page read and write
77E0000
trusted library allocation
page read and write
3300000
heap
page read and write
2C64000
heap
page read and write
4C1B000
heap
page read and write
2FF4000
heap
page read and write
4BD0000
heap
page read and write
4BE1000
heap
page read and write
4DEE000
stack
page read and write
2FF5000
heap
page read and write
24391000
heap
page read and write
4BC1000
heap
page read and write
858B000
heap
page read and write
56A0000
heap
page read and write
2FF4000
heap
page read and write
58D8000
heap
page read and write
2DDD000
stack
page read and write
80F5000
remote allocation
page execute and read and write
4C58000
heap
page read and write
4BF4000
heap
page read and write
2EA2000
stack
page read and write
4BF1000
heap
page read and write
530E000
stack
page read and write
4BD8000
heap
page read and write
2FF4000
heap
page read and write
3090000
trusted library allocation
page read and write
6013000
trusted library allocation
page read and write
5E81000
trusted library allocation
page read and write
5ED4000
trusted library allocation
page read and write
2FB8000
heap
page read and write
4BE0000
heap
page read and write
4BFE000
heap
page read and write
246BA000
heap
page read and write
588000
heap
page read and write
54C0000
trusted library allocation
page read and write
8A60000
trusted library allocation
page execute and read and write
54C0000
heap
page read and write
886C000
heap
page read and write
23E7F000
stack
page read and write
315A000
trusted library allocation
page execute and read and write
4C2D000
heap
page read and write
4BDC000
heap
page read and write
2FF0000
heap
page read and write
2C00000
heap
page read and write
4ECF000
trusted library allocation
page read and write
4BD1000
heap
page read and write
23C60000
direct allocation
page read and write
4BE5000
heap
page read and write
4BC0000
heap
page read and write
4BF1000
heap
page read and write
9170000
direct allocation
page execute and read and write
84C0000
heap
page read and write
7900000
trusted library allocation
page execute and read and write
545E000
stack
page read and write
85D6000
heap
page read and write
2FF5000
heap
page read and write
58F5000
remote allocation
page execute and read and write
22D9000
heap
page read and write
4BD1000
heap
page read and write
40A000
unkown
page read and write
8480000
heap
page read and write
4BE1000
heap
page read and write
2194000
heap
page read and write
2FF5000
heap
page read and write
4DE000
stack
page read and write
23C70000
direct allocation
page read and write
24639000
heap
page read and write
50D0000
heap
page read and write
580000
heap
page read and write
33D0000
heap
page read and write
458000
unkown
page read and write
5B5000
heap
page read and write
459000
system
page execute and read and write
2FF4000
heap
page read and write
8325000
heap
page read and write
50D1000
heap
page read and write
84F8000
heap
page read and write
2FF4000
heap
page read and write
54DE000
heap
page read and write
2EA6000
heap
page read and write
2C64000
heap
page read and write
2C64000
heap
page read and write
2FF4000
heap
page read and write
245B1000
heap
page read and write
883E000
heap
page read and write
74EE000
stack
page read and write
87A0000
trusted library allocation
page read and write
4BF4000
heap
page read and write
242A1000
heap
page read and write
6A0000
heap
page read and write
4E60000
heap
page read and write
8320000
heap
page read and write
251D000
stack
page read and write
8CE000
stack
page read and write
3A60000
remote allocation
page execute and read and write
340C000
heap
page read and write
2FF4000
heap
page read and write
4BD0000
heap
page read and write
5B9000
heap
page read and write
3ED000
stack
page read and write
3210000
trusted library allocation
page execute and read and write
24659000
heap
page read and write
44F5000
remote allocation
page execute and read and write
856F000
heap
page read and write
4C0B000
heap
page read and write
19A000
stack
page read and write
56C2000
heap
page read and write
282B000
heap
page read and write
4BE0000
heap
page read and write
50D1000
heap
page read and write
24A09000
unclassified section
page execute and read and write
241D0000
unclassified section
page execute and read and write
30E0000
direct allocation
page read and write
54D5000
heap
page read and write
4BF3000
heap
page read and write
6F6E000
stack
page read and write
23EDC000
stack
page read and write
4BE5000
heap
page read and write
2EDD000
heap
page read and write
31CE000
stack
page read and write
54C0000
trusted library allocation
page read and write
79C0000
trusted library allocation
page read and write
C405000
direct allocation
page execute and read and write
35CF000
stack
page read and write
63D000
stack
page read and write
473000
system
page execute and read and write
2C60000
heap
page read and write
4BEB000
heap
page read and write
4E55000
heap
page execute and read and write
400000
unkown
page readonly
790000
heap
page read and write
3048000
heap
page read and write
7790000
trusted library allocation
page read and write
249B0000
unclassified section
page execute and read and write
6FEF000
stack
page read and write
23FDB000
stack
page read and write
245B1000
heap
page read and write
50D1000
heap
page read and write
4BD0000
heap
page read and write
85C5000
heap
page read and write
4BDC000
heap
page read and write
239EF000
stack
page read and write
2C64000
heap
page read and write
8A70000
heap
page read and write
4BED000
heap
page read and write
680000
heap
page read and write
8690000
heap
page read and write
7970000
trusted library allocation
page read and write
34A0000
heap
page read and write
84B0000
trusted library allocation
page read and write
5576000
heap
page read and write
2BFE000
stack
page read and write
2E50000
direct allocation
page read and write
2ED0000
heap
page read and write
4C1B000
heap
page read and write
4BD1000
heap
page read and write
4C04000
heap
page read and write
86CC000
stack
page read and write
4C1B000
heap
page read and write
3180000
heap
page read and write
2431A000
heap
page read and write
2C64000
heap
page read and write
58E3000
heap
page read and write
50D1000
heap
page read and write
2BAF000
unkown
page read and write
4BD0000
heap
page read and write
90F000
stack
page read and write
86D7000
heap
page read and write
4BE1000
heap
page read and write
2FF5000
heap
page read and write
8600000
direct allocation
page read and write
23E00000
remote allocation
page read and write
4C3A000
heap
page read and write
3160000
trusted library allocation
page read and write
A587000
trusted library allocation
page read and write
84A0000
trusted library allocation
page execute and read and write
3743000
heap
page read and write
23DAC000
stack
page read and write
740000
heap
page read and write
2E10000
direct allocation
page read and write
D805000
direct allocation
page execute and read and write
242A0000
heap
page read and write
4BF3000
heap
page read and write
881B000
heap
page read and write
7729000
heap
page read and write
2FDC000
heap
page read and write
40A000
unkown
page write copy
8640000
direct allocation
page read and write
307D000
heap
page read and write
4BDE000
heap
page read and write
313D000
trusted library allocation
page execute and read and write
23F1C000
stack
page read and write
325C000
stack
page read and write
4BF5000
heap
page read and write
24A30000
unclassified section
page execute and read and write
A605000
direct allocation
page execute and read and write
73E000
unkown
page read and write
540F000
stack
page read and write
50D1000
heap
page read and write
240DD000
stack
page read and write
8610000
direct allocation
page read and write
2442A000
heap
page read and write
2FF4000
heap
page read and write
4C10000
heap
page read and write
239AD000
stack
page read and write
85C6000
heap
page read and write
3740000
heap
page read and write
881F000
heap
page read and write
2405C000
stack
page read and write
84D0000
direct allocation
page read and write
3068000
heap
page read and write
4C0E000
heap
page read and write
3133000
trusted library allocation
page execute and read and write
57E1000
trusted library allocation
page read and write
241EB000
unclassified section
page execute and read and write
7647000
trusted library allocation
page read and write
307A000
heap
page read and write
2FF4000
heap
page read and write
8660000
direct allocation
page read and write
400000
system
page execute and read and write
21EE000
stack
page read and write
3400000
heap
page read and write
5D4000
heap
page read and write
3790000
heap
page read and write
4688000
heap
page read and write
5E71000
trusted library allocation
page read and write
2C64000
heap
page read and write
243B1000
heap
page read and write
400000
system
page execute and read and write
4BFC000
heap
page read and write
3162000
trusted library allocation
page read and write
4BE7000
heap
page read and write
2C64000
heap
page read and write
50D1000
heap
page read and write
25D0000
heap
page read and write
400000
system
page execute and read and write
3149000
trusted library allocation
page read and write
3409000
heap
page read and write
50D1000
heap
page read and write
8A40000
trusted library allocation
page read and write
506F000
stack
page read and write
2E70000
direct allocation
page read and write
3207000
heap
page read and write
4BF6000
heap
page read and write
271F000
stack
page read and write
4BF7000
heap
page read and write
2B4D000
stack
page read and write
2FF5000
heap
page read and write
83A7000
stack
page read and write
2FF4000
heap
page read and write
54C0000
trusted library allocation
page read and write
435000
unkown
page read and write
8530000
trusted library allocation
page read and write
4FFF000
heap
page read and write
4C12000
heap
page read and write
23F9F000
stack
page read and write
4E69000
heap
page read and write
6FAE000
stack
page read and write
502E000
stack
page read and write
857C000
heap
page read and write
7640000
trusted library allocation
page read and write
4BF1000
heap
page read and write
8832000
heap
page read and write
25F0000
heap
page readonly
2468B000
heap
page read and write
23E00000
remote allocation
page read and write
4BF3000
heap
page read and write
79B0000
trusted library allocation
page read and write
4BF3000
heap
page read and write
2451C000
heap
page read and write
50D1000
heap
page read and write
4C23000
heap
page read and write
2FF5000
heap
page read and write
4C58000
heap
page read and write
30D0000
direct allocation
page read and write
4C1B000
heap
page read and write
255E000
stack
page read and write
4BF1000
heap
page read and write
4BF5000
heap
page read and write
2CAF000
stack
page read and write
4F5000
heap
page read and write
7050000
direct allocation
page read and write
4BD9000
heap
page read and write
340A000
heap
page read and write
244A2000
heap
page read and write
82BE000
stack
page read and write
4BB0000
heap
page read and write
51D0000
trusted library allocation
page read and write
245B0000
heap
page read and write
2FF4000
heap
page read and write
45C000
system
page execute and read and write
4BEE000
heap
page read and write
4BEE000
heap
page read and write
2C64000
heap
page read and write
4BD1000
heap
page read and write
7684000
heap
page read and write
2D6F000
stack
page read and write
2CB0000
heap
page read and write
71C0000
heap
page read and write
6019000
trusted library allocation
page read and write
30B0000
direct allocation
page read and write
4BC1000
heap
page read and write
9C05000
direct allocation
page execute and read and write
52CF000
stack
page read and write
2F10000
heap
page read and write
456000
system
page execute and read and write
4BD1000
heap
page read and write
7780000
trusted library allocation
page read and write
22D0000
heap
page read and write
558B000
heap
page read and write
2270000
heap
page read and write
50D1000
heap
page read and write
7700000
heap
page read and write
50AE000
stack
page read and write
76C9000
heap
page read and write
7694000
heap
page read and write
57D5000
heap
page read and write
2E80000
heap
page read and write
3409000
heap
page read and write
329C000
stack
page read and write
4BF1000
heap
page read and write
24629000
heap
page read and write
2C64000
heap
page read and write
24A86000
unclassified section
page execute and read and write
549F000
stack
page read and write
4BD9000
heap
page read and write
374C000
heap
page read and write
2E9F000
stack
page read and write
23E00000
remote allocation
page read and write
843E000
stack
page read and write
84E0000
direct allocation
page read and write
24642000
heap
page read and write
3140000
trusted library allocation
page read and write
50D1000
heap
page read and write
4C58000
heap
page read and write
4BF3000
heap
page read and write
4BEE000
heap
page read and write
23D6D000
stack
page read and write
2190000
heap
page read and write
4C0F000
heap
page read and write
25C0000
heap
page read and write
8670000
direct allocation
page read and write
50D1000
heap
page read and write
7980000
trusted library allocation
page read and write
798000
heap
page read and write
23C90000
direct allocation
page read and write
2419E000
stack
page read and write
6EAE000
stack
page read and write
50D1000
heap
page read and write
45B000
unkown
page readonly
50D1000
heap
page read and write
50D1000
heap
page read and write
2FF4000
heap
page read and write
2FF5000
heap
page read and write
40D000
unkown
page read and write
2FF4000
heap
page read and write
33E0000
heap
page readonly
35D0000
heap
page read and write
340B000
heap
page read and write
4C39000
heap
page read and write
4BDC000
heap
page read and write
50D1000
heap
page read and write
2842000
heap
page read and write
2409E000
stack
page read and write
24638000
heap
page read and write
62F5000
remote allocation
page execute and read and write
23C80000
direct allocation
page read and write
4E50000
heap
page execute and read and write
4C26000
heap
page read and write
305A000
heap
page read and write
281F000
stack
page read and write
4BFE000
heap
page read and write
2EA0000
heap
page read and write
94E000
stack
page read and write
851D000
heap
page read and write
3F0000
heap
page read and write
50D0000
heap
page read and write
2D9E000
heap
page read and write
3AF5000
remote allocation
page execute and read and write
50D1000
heap
page read and write
2C64000
heap
page read and write
780000
heap
page read and write
7708000
heap
page read and write
9A0000
heap
page read and write
38D000
stack
page read and write
4E71000
trusted library allocation
page read and write
8300000
direct allocation
page read and write
3200000
heap
page read and write
7910000
trusted library allocation
page read and write
2C64000
heap
page read and write
8550000
trusted library allocation
page read and write
2FF4000
heap
page read and write
7770000
trusted library allocation
page read and write
24318000
heap
page read and write
2AD0000
heap
page read and write
4BF1000
heap
page read and write
85D7000
heap
page read and write
2FF4000
heap
page read and write
78F0000
trusted library allocation
page read and write
3050000
heap
page read and write
2FF4000
heap
page read and write
42C000
unkown
page read and write
4D6F000
stack
page read and write
244A2000
heap
page read and write
8620000
direct allocation
page read and write
490000
heap
page read and write
4C1B000
heap
page read and write
98000
stack
page read and write
4F0000
heap
page read and write
4BE5000
heap
page read and write
4BD1000
heap
page read and write
2394E000
stack
page read and write
4BF3000
heap
page read and write
77D0000
trusted library allocation
page read and write
3140000
heap
page read and write
50D1000
heap
page read and write
83B0000
heap
page read and write
23BBF000
stack
page read and write
B005000
direct allocation
page execute and read and write
There are 675 hidden memdumps, click here to show them.