IOC Report
#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe

loading gif

Files

File Path
Type
Category
Malicious
#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Entreprenren.Out
ASCII text, with very long lines (61481), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\mqerms.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\WDKI0JR2\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_arcxwotz.clw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oech0po2.o0f.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhvED54.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x0155ffb7, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\frrlxvvcyajmkjprpxzqdq
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Fattighjlps\Assistentuddannelsen7\anfrsels.dra
data
dropped
C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Fattighjlps\Assistentuddannelsen7\backhatch.amf
data
dropped
C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Fingerstall\Todagesmdet\statshusmands\Genopfrisknings\cadger.bol
data
dropped
C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Nonhomiletic\Svelningen\tracheloscapular.une
data
dropped
C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Nonhomiletic\Svelningen\waterish.tat
data
dropped
C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Preenlarged\confederater.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Preenlarged\hillwort.spu
data
dropped
C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Preenlarged\navlebeskuelsernes.kmp
data
dropped
C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Sammenrends.Sla
data
dropped
C:\Windows\Fonts\tashlik.ini
ASCII text, with CRLF line terminators
dropped
C:\Windows\Resources\0809\marmoreret.ini
ASCII text, with CRLF line terminators
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe
"C:\Users\user\Desktop\#U0421#U041f#U0426 #U2116130 #U043e#U0442 12.04.2024 #U043f#U043e#U0434#U043f#U0438#U0441..exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Forstbotanikkens=Get-Content 'C:\Users\user\AppData\Local\nervier\Estampede\sipunculacean\Entreprenren.Out';$Vaabentypers=$Forstbotanikkens.SubString(61389,3);.$Vaabentypers($Forstbotanikkens)"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\frrlxvvcyajmkjprpxzqdq"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\frrlxvvcyajmkjprpxzqdq"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\itedxngwlibzmqlvhhlsguxrsq"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\snjwygrxzqtexwzhqsglqhsitfuae"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\snjwygrxzqtexwzhqsglqhsitfuae"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "mediates" /t REG_EXPAND_SZ /d "%Linieringernes% -windowstyle minimized $Localisers=(Get-ItemProperty -Path 'HKCU:\Officialvirksomhed\').pshaws;%Linieringernes% ($Localisers)"
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://geoplugin.net/json.gp
178.237.33.50
malicious
http://nuget.org/NuGet.exe
unknown
http://geoplugin.net/json.gph
unknown
http://www.imvu.comr
unknown
http://geoplugin.net/json.gpe
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://geoplugin.net/json.gpo
unknown
https://contoso.com/License
unknown
https://ricohltd.top/;
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
http://www.imvu.coma
unknown
http://www.nirsoft.net
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://github.com/Pester/Pester
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://ricohltd.top/
unknown
https://ricohltd.top/aCqwFQDQz144.bin5
unknown
https://www.google.com
unknown
https://ricohltd.top/aCqwFQDQz144.bin
104.21.60.38
http://geoplugin.net/json.gpL
unknown
https://aka.ms/pscore6lB
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://geoplugin.net/1
unknown
http://geoplugin.net/json.gpal
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
http://geoplugin.net/json.gpU
unknown
http://www.nirsoft.net/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.ebuddy.com
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
learfo55ozj01.duckdns.org
193.222.96.21
malicious
geoplugin.net
178.237.33.50
ricohltd.top
104.21.60.38

IPs

IP
Domain
Country
Malicious
193.222.96.21
learfo55ozj01.duckdns.org
Germany
malicious
104.21.60.38
ricohltd.top
United States
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Superintendenters
unsucculent
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\indentor\pintas
Byggrynets
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Spge
skyggeboksnings
HKEY_CURRENT_USER\SOFTWARE\Stenhuggeriers14
concupiscence
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\elvar
presenceless
HKEY_CURRENT_USER\SOFTWARE\Litherly
enkemandspension
HKEY_CURRENT_USER\SOFTWARE\dekanesserne\stragglingly
kennelklub
HKEY_CURRENT_USER\Officialvirksomhed
pshaws
HKEY_CURRENT_USER\Environment
Linieringernes
HKEY_CURRENT_USER\SOFTWARE\alpwovnb-G3F5OR
exepath
HKEY_CURRENT_USER\SOFTWARE\alpwovnb-G3F5OR
licence
HKEY_CURRENT_USER\SOFTWARE\alpwovnb-G3F5OR
time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
mediates
There are 3 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
93F7000
direct allocation
page execute and read and write
malicious
4A2E000
heap
page read and write
20E8B000
heap
page read and write
4A46000
heap
page read and write
8720000
trusted library allocation
page read and write
898C000
stack
page read and write
42F000
unkown
page read and write
6238000
trusted library allocation
page read and write
52AE000
heap
page read and write
707000
heap
page read and write
7310000
direct allocation
page read and write
4EBD000
heap
page read and write
203BE000
stack
page read and write
4A76000
heap
page read and write
2DEE000
stack
page read and write
4EF1000
heap
page read and write
2F50000
heap
page read and write
4D60000
direct allocation
page read and write
4A24000
heap
page read and write
762E000
stack
page read and write
4CF0000
direct allocation
page read and write
A2F000
unkown
page read and write
4EF1000
heap
page read and write
4A20000
heap
page read and write
2EA4000
heap
page read and write
7380000
direct allocation
page read and write
670000
heap
page read and write
4EFC000
heap
page read and write
4EF1000
heap
page read and write
20E59000
heap
page read and write
637C000
trusted library allocation
page read and write
3560000
heap
page read and write
20D1C000
heap
page read and write
4A11000
heap
page read and write
509E000
stack
page read and write
72B000
heap
page read and write
779A000
heap
page read and write
B30000
heap
page read and write
4E1F000
stack
page read and write
4ECB000
heap
page read and write
534D000
heap
page read and write
800000
heap
page read and write
209EB000
unclassified section
page execute and read and write
4A31000
heap
page read and write
21230000
unclassified section
page execute and read and write
3200000
heap
page read and write
4EF1000
heap
page read and write
90E000
stack
page read and write
59C8000
trusted library allocation
page read and write
20AA0000
heap
page read and write
51C9000
heap
page read and write
20480000
direct allocation
page read and write
89A8000
heap
page read and write
2EA4000
heap
page read and write
4AF0000
trusted library allocation
page read and write
C60000
heap
page readonly
4A75000
heap
page read and write
4A27000
heap
page read and write
3180000
heap
page read and write
2EA4000
heap
page read and write
4D70000
direct allocation
page read and write
4E32000
heap
page read and write
4A16000
heap
page read and write
4EF1000
heap
page read and write
2EA4000
heap
page read and write
32B2000
heap
page read and write
7960000
trusted library allocation
page read and write
323D000
trusted library allocation
page execute and read and write
4EF1000
heap
page read and write
4A52000
heap
page read and write
31F4000
heap
page read and write
3150000
heap
page read and write
26E0000
heap
page read and write
435000
unkown
page read and write
4C5D000
stack
page read and write
31F4000
heap
page read and write
5140000
heap
page execute and read and write
4A31000
heap
page read and write
7BB0000
trusted library allocation
page read and write
4A35000
heap
page read and write
2085C000
stack
page read and write
4CB0000
direct allocation
page read and write
4DF8000
heap
page read and write
7B90000
trusted library allocation
page read and write
86A0000
trusted library allocation
page execute and read and write
4ECD000
heap
page read and write
325E000
stack
page read and write
4A25000
heap
page read and write
4A5A000
heap
page read and write
31FE000
stack
page read and write
7300000
direct allocation
page read and write
2079F000
stack
page read and write
408000
unkown
page readonly
351F000
stack
page read and write
79D0000
trusted library allocation
page read and write
45C000
system
page execute and read and write
7B10000
trusted library allocation
page read and write
4A50000
heap
page read and write
4A29000
heap
page read and write
735000
heap
page read and write
4D00000
direct allocation
page read and write
3240000
heap
page read and write
31F4000
heap
page read and write
4A2A000
heap
page read and write
2120D000
unclassified section
page execute and read and write
21223000
unclassified section
page execute and read and write
5290000
trusted library allocation
page read and write
4E1E000
heap
page read and write
4A46000
heap
page read and write
4A58000
heap
page read and write
3248000
heap
page read and write
8BE0000
direct allocation
page execute and read and write
747000
heap
page read and write
714000
heap
page read and write
7980000
trusted library allocation
page read and write
20460000
direct allocation
page read and write
347F000
stack
page read and write
4B00000
trusted library allocation
page read and write
630000
heap
page read and write
8730000
trusted library allocation
page read and write
209D0000
unclassified section
page execute and read and write
4017000
remote allocation
page execute and read and write
4EF1000
heap
page read and write
20C2A000
heap
page read and write
4EF1000
heap
page read and write
740000
heap
page read and write
3288000
heap
page read and write
2EA4000
heap
page read and write
2EA5000
heap
page read and write
8CD000
stack
page read and write
21286000
unclassified section
page execute and read and write
747D000
stack
page read and write
7390000
direct allocation
page read and write
454000
unkown
page read and write
4A17000
remote allocation
page execute and read and write
329E000
heap
page read and write
4AE9000
trusted library allocation
page read and write
8CF000
stack
page read and write
5350000
heap
page read and write
2EA5000
heap
page read and write
4DF0000
heap
page read and write
4A20000
heap
page read and write
4EF1000
heap
page read and write
22AE000
stack
page read and write
4A10000
heap
page read and write
4A46000
heap
page read and write
9CB000
stack
page read and write
2F26000
heap
page read and write
3060000
heap
page read and write
4C70000
direct allocation
page read and write
52AA000
heap
page read and write
7B80000
trusted library allocation
page read and write
4C70000
trusted library allocation
page read and write
72F000
heap
page read and write
4E78000
heap
page read and write
72B0000
direct allocation
page read and write
4A4F000
heap
page read and write
674000
heap
page read and write
2051F000
stack
page read and write
20680000
heap
page read and write
526F000
stack
page read and write
2BF0000
heap
page read and write
7737000
trusted library allocation
page read and write
B50000
heap
page read and write
4A10000
heap
page read and write
4A52000
heap
page read and write
4A20000
heap
page read and write
88BC000
stack
page read and write
20E29000
heap
page read and write
89A0000
heap
page read and write
730000
heap
page read and write
4BB0000
heap
page readonly
4EF1000
heap
page read and write
20470000
direct allocation
page read and write
2B0F000
stack
page read and write
2EA4000
heap
page read and write
31BD000
stack
page read and write
4A4F000
heap
page read and write
357D000
heap
page read and write
20E59000
heap
page read and write
4A46000
heap
page read and write
4CD0000
direct allocation
page read and write
2355000
heap
page read and write
7990000
trusted library allocation
page read and write
4E28000
heap
page read and write
7370000
heap
page execute and read and write
31F4000
heap
page read and write
4A31000
heap
page read and write
2D9C000
stack
page read and write
20AA1000
heap
page read and write
4D30000
direct allocation
page read and write
40D000
unkown
page read and write
8BF0000
trusted library allocation
page read and write
2075E000
stack
page read and write
4A22000
heap
page read and write
4A64000
heap
page read and write
49F0000
heap
page read and write
72A0000
direct allocation
page read and write
2EA4000
heap
page read and write
5290000
heap
page read and write
743000
heap
page read and write
4D20000
direct allocation
page read and write
4A35000
heap
page read and write
456000
system
page execute and read and write
4C25000
heap
page read and write
4A46000
heap
page read and write
20E59000
heap
page read and write
4A33000
heap
page read and write
600000
heap
page read and write
327A000
heap
page read and write
208DD000
stack
page read and write
707000
heap
page read and write
4EF1000
heap
page read and write
780D000
heap
page read and write
400000
unkown
page readonly
2CFC000
stack
page read and write
4A29000
heap
page read and write
4A19000
heap
page read and write
98000
stack
page read and write
4A31000
heap
page read and write
408000
unkown
page readonly
7320000
direct allocation
page read and write
4A2E000
heap
page read and write
2067F000
stack
page read and write
4A19000
heap
page read and write
85B0000
trusted library allocation
page execute and read and write
4A16000
heap
page read and write
4A16000
heap
page read and write
31BB000
heap
page read and write
4A11000
heap
page read and write
2EA4000
heap
page read and write
530000
heap
page read and write
4A24000
heap
page read and write
72F0000
direct allocation
page read and write
C3E000
unkown
page read and write
401000
unkown
page execute read
2EA4000
heap
page read and write
20E42000
heap
page read and write
6EB000
heap
page read and write
20DB1000
heap
page read and write
204DE000
stack
page read and write
4A39000
heap
page read and write
77E000
unkown
page read and write
4C90000
direct allocation
page read and write
20B91000
heap
page read and write
4A2E000
heap
page read and write
70B000
heap
page read and write
324E000
stack
page read and write
2EA4000
heap
page read and write
4A77000
heap
page read and write
4A19000
heap
page read and write
7B00000
trusted library allocation
page read and write
212A0000
heap
page read and write
5261000
heap
page read and write
4EF1000
heap
page read and write
31F4000
heap
page read and write
9BE000
stack
page read and write
522E000
stack
page read and write
9AC000
stack
page read and write
4CD000
stack
page read and write
463000
unkown
page readonly
4ED0000
heap
page read and write
4A33000
heap
page read and write
729B000
stack
page read and write
31F4000
heap
page read and write
4A10000
heap
page read and write
2EA4000
heap
page read and write
4CA0000
direct allocation
page read and write
4A1C000
heap
page read and write
7ADD000
stack
page read and write
31FC000
heap
page read and write
4A26000
heap
page read and write
C50000
heap
page read and write
20BB0000
heap
page read and write
3233000
trusted library allocation
page execute and read and write
548E000
heap
page read and write
4A24000
heap
page read and write
2F29000
heap
page read and write
7C0B000
stack
page read and write
4B02000
trusted library allocation
page read and write
2EA4000
heap
page read and write
31F4000
heap
page read and write
31D0000
heap
page read and write
20600000
remote allocation
page read and write
4D40000
direct allocation
page read and write
7A9E000
stack
page read and write
4EF1000
heap
page read and write
4EBD000
heap
page read and write
31B0000
heap
page read and write
715000
heap
page read and write
4A23000
heap
page read and write
460000
unkown
page read and write
4A1C000
heap
page read and write
C70000
heap
page read and write
9DF7000
direct allocation
page execute and read and write
401000
unkown
page execute read
4A44000
heap
page read and write
4A11000
heap
page read and write
2EA5000
heap
page read and write
7970000
trusted library allocation
page read and write
2E1D000
stack
page read and write
3170000
heap
page read and write
5290000
trusted library allocation
page read and write
31F4000
heap
page read and write
4A1C000
heap
page read and write
317E000
stack
page read and write
3563000
heap
page read and write
4E7C000
heap
page read and write
20600000
remote allocation
page read and write
31F4000
heap
page read and write
400000
system
page execute and read and write
3039000
stack
page read and write
326E000
heap
page read and write
2EA4000
heap
page read and write
2EA4000
heap
page read and write
4B20000
trusted library allocation
page read and write
9350000
direct allocation
page execute and read and write
4A39000
heap
page read and write
4A31000
heap
page read and write
548B000
heap
page read and write
314F000
stack
page read and write
5290000
trusted library allocation
page read and write
4A27000
heap
page read and write
30D0000
heap
page read and write
4C66000
heap
page read and write
2EA5000
heap
page read and write
7B50000
trusted library allocation
page read and write
4A1C000
heap
page read and write
7B40000
trusted library allocation
page read and write
473000
system
page execute and read and write
20E42000
heap
page read and write
5231000
trusted library allocation
page read and write
4EAE000
stack
page read and write
2EA5000
heap
page read and write
8BC0000
heap
page read and write
4A25000
heap
page read and write
6BE000
stack
page read and write
4A24000
heap
page read and write
4B05000
trusted library allocation
page execute and read and write
31E8000
heap
page read and write
518F000
stack
page read and write
31F4000
heap
page read and write
2EB0000
heap
page read and write
4EF1000
heap
page read and write
86E5000
trusted library allocation
page read and write
7EFF0000
trusted library allocation
page execute and read and write
BF0000
heap
page read and write
4A46000
heap
page read and write
7B60000
trusted library allocation
page read and write
7350000
direct allocation
page read and write
56C6000
heap
page read and write
7BE000
stack
page read and write
431000
unkown
page read and write
705000
heap
page read and write
72D0000
direct allocation
page read and write
7630000
heap
page read and write
56B3000
heap
page read and write
4D0000
heap
page read and write
2DDC000
stack
page read and write
2DAD000
stack
page read and write
7796000
heap
page read and write
2DFE000
stack
page read and write
4A29000
heap
page read and write
26E8000
heap
page read and write
3050000
heap
page readonly
2099E000
stack
page read and write
4E86000
heap
page read and write
4A39000
heap
page read and write
31F4000
heap
page read and write
4A11000
heap
page read and write
784C000
heap
page read and write
4E86000
heap
page read and write
3180000
heap
page readonly
5BE000
stack
page read and write
5260000
heap
page read and write
4A2D000
heap
page read and write
20490000
direct allocation
page read and write
3110000
heap
page read and write
40A000
unkown
page write copy
4A39000
heap
page read and write
4A16000
heap
page read and write
3CD000
stack
page read and write
33DF000
stack
page read and write
4A1C000
heap
page read and write
9FF000
stack
page read and write
4C50000
heap
page readonly
4D10000
direct allocation
page read and write
4A31000
heap
page read and write
2F2E000
heap
page read and write
7730000
trusted library allocation
page read and write
341E000
stack
page read and write
505F000
stack
page read and write
20CA2000
heap
page read and write
20E39000
heap
page read and write
741000
heap
page read and write
50D000
stack
page read and write
4A2E000
heap
page read and write
315A000
heap
page read and write
5290000
trusted library allocation
page read and write
4CC0000
direct allocation
page read and write
4A1C000
heap
page read and write
7340000
direct allocation
page read and write
7330000
direct allocation
page read and write
2BE0000
heap
page read and write
710000
heap
page read and write
7375000
heap
page execute and read and write
3176000
heap
page read and write
4ECC000
heap
page read and write
4A31000
heap
page read and write
61D1000
trusted library allocation
page read and write
4E6E000
heap
page read and write
8710000
trusted library allocation
page read and write
4BAE000
stack
page read and write
4A21000
heap
page read and write
4A31000
heap
page read and write
3160000
trusted library section
page read and write
34AF000
stack
page read and write
31F4000
heap
page read and write
4A29000
heap
page read and write
743000
heap
page read and write
4A18000
heap
page read and write
4A27000
heap
page read and write
73B000
heap
page read and write
4EF1000
heap
page read and write
4A26000
heap
page read and write
8740000
trusted library allocation
page read and write
4B6E000
stack
page read and write
4E7C000
heap
page read and write
206DC000
stack
page read and write
7740000
heap
page execute and read and write
4A2B000
heap
page read and write
6EE000
heap
page read and write
20BB1000
heap
page read and write
5290000
trusted library allocation
page read and write
31F4000
heap
page read and write
4A25000
heap
page read and write
2EA4000
heap
page read and write
4ECD000
heap
page read and write
2EA4000
heap
page read and write
4EEE000
stack
page read and write
3F70000
remote allocation
page execute and read and write
4EF1000
heap
page read and write
50DE000
stack
page read and write
4DA0000
heap
page read and write
31F4000
heap
page read and write
226F000
stack
page read and write
4EF1000
heap
page read and write
7783000
heap
page read and write
45D000
system
page execute and read and write
2F0E000
stack
page read and write
7BC0000
trusted library allocation
page read and write
2EA0000
heap
page read and write
B8D000
stack
page read and write
51E000
stack
page read and write
4A3E000
heap
page read and write
2F2A000
heap
page read and write
4C80000
direct allocation
page read and write
9DF000
stack
page read and write
4A26000
heap
page read and write
50EF000
stack
page read and write
4EF1000
heap
page read and write
4A64000
heap
page read and write
4EF1000
heap
page read and write
31CE000
stack
page read and write
83B000
heap
page read and write
4A16000
heap
page read and write
4AE0000
trusted library allocation
page read and write
31F0000
heap
page read and write
4A31000
heap
page read and write
73D000
heap
page read and write
5326000
trusted library allocation
page read and write
780A000
heap
page read and write
463000
unkown
page readonly
2D38000
stack
page read and write
72C0000
direct allocation
page read and write
2EA4000
heap
page read and write
2EA4000
heap
page read and write
7B70000
trusted library allocation
page read and write
4ECB000
heap
page read and write
4A39000
heap
page read and write
4EF1000
heap
page read and write
4D80000
direct allocation
page read and write
31F4000
heap
page read and write
4A39000
heap
page read and write
5290000
trusted library allocation
page read and write
88FC000
stack
page read and write
4A31000
heap
page read and write
3180000
heap
page read and write
4CE0000
direct allocation
page read and write
4A28000
heap
page read and write
2063E000
stack
page read and write
207DB000
stack
page read and write
21209000
unclassified section
page execute and read and write
20E38000
heap
page read and write
41B000
system
page execute and read and write
4A11000
heap
page read and write
511E000
stack
page read and write
61F9000
trusted library allocation
page read and write
2071C000
stack
page read and write
4C80000
heap
page read and write
75EE000
stack
page read and write
31F4000
heap
page read and write
329F000
heap
page read and write
7A1E000
stack
page read and write
743000
heap
page read and write
8BD0000
trusted library allocation
page execute and read and write
4A31000
heap
page read and write
4A11000
heap
page read and write
743000
heap
page read and write
32BD000
heap
page read and write
4A1C000
heap
page read and write
400000
system
page execute and read and write
744000
heap
page read and write
4A64000
heap
page read and write
4A31000
heap
page read and write
400000
unkown
page readonly
743000
heap
page read and write
9CF000
stack
page read and write
4A1C000
heap
page read and write
8BB0000
trusted library allocation
page read and write
4A27000
heap
page read and write
4A6E000
heap
page read and write
42C000
unkown
page read and write
4A5A000
heap
page read and write
4A11000
heap
page read and write
20CA2000
heap
page read and write
4A19000
heap
page read and write
7B20000
trusted library allocation
page read and write
20DB1000
heap
page read and write
4A20000
heap
page read and write
4E55000
heap
page read and write
4A35000
heap
page read and write
4A31000
heap
page read and write
6D0000
heap
page read and write
4C60000
heap
page read and write
30A0000
heap
page read and write
85C0000
trusted library allocation
page read and write
570000
heap
page read and write
20E29000
heap
page read and write
6377000
trusted library allocation
page read and write
2350000
heap
page read and write
4EF1000
heap
page read and write
4A44000
heap
page read and write
5487000
heap
page read and write
3570000
heap
page read and write
4A3E000
heap
page read and write
4A1C000
heap
page read and write
3220000
trusted library allocation
page read and write
4A33000
heap
page read and write
4BC8000
trusted library allocation
page read and write
3234000
trusted library allocation
page read and write
4A27000
heap
page read and write
40A000
unkown
page read and write
72E000
heap
page read and write
51D1000
trusted library allocation
page read and write
4A39000
heap
page read and write
61D9000
trusted library allocation
page read and write
970000
heap
page read and write
2EA5000
heap
page read and write
2EA5000
heap
page read and write
4A31000
heap
page read and write
C40000
heap
page read and write
2EB0000
trusted library allocation
page read and write
4E6F000
stack
page read and write
4A2E000
heap
page read and write
43F000
unkown
page read and write
3280000
heap
page read and write
212B0000
heap
page read and write
52A0000
trusted library allocation
page read and write
4A3A000
heap
page read and write
72E0000
direct allocation
page read and write
8BA0000
trusted library allocation
page read and write
2EA4000
heap
page read and write
4C20000
heap
page read and write
501E000
stack
page read and write
20A16000
direct allocation
page execute and read and write
8A43000
heap
page read and write
34B0000
heap
page read and write
2320000
heap
page read and write
2F20000
heap
page read and write
20B1A000
heap
page read and write
7871000
heap
page read and write
2330000
heap
page read and write
4EF1000
heap
page read and write
8680000
heap
page read and write
20C2A000
heap
page read and write
6D8000
heap
page read and write
4C87000
heap
page read and write
2EA4000
heap
page read and write
2081E000
stack
page read and write
2EA4000
heap
page read and write
4A77000
heap
page read and write
20B18000
heap
page read and write
20EBA000
heap
page read and write
725D000
stack
page read and write
3230000
trusted library allocation
page read and write
2F58000
heap
page read and write
4C1C000
stack
page read and write
4EF1000
heap
page read and write
4A3C000
heap
page read and write
8870000
trusted library allocation
page read and write
51EF000
stack
page read and write
4A3C000
heap
page read and write
4A39000
heap
page read and write
8597000
stack
page read and write
779C000
heap
page read and write
3140000
trusted library section
page read and write
59C2000
trusted library allocation
page read and write
74BA000
stack
page read and write
4A52000
heap
page read and write
2F2D000
heap
page read and write
4A6D000
heap
page read and write
4A25000
heap
page read and write
279F000
stack
page read and write
894D000
stack
page read and write
4ECB000
heap
page read and write
4A16000
heap
page read and write
852000
heap
page read and write
5261000
heap
page read and write
20A01000
direct allocation
page execute and read and write
4AFA000
trusted library allocation
page execute and read and write
26DE000
stack
page read and write
31E0000
heap
page read and write
33AF000
unkown
page read and write
4A46000
heap
page read and write
856000
heap
page read and write
6D97000
trusted library allocation
page read and write
4A39000
heap
page read and write
4A63000
heap
page read and write
4A10000
heap
page read and write
4A33000
heap
page read and write
85D0000
trusted library allocation
page read and write
550000
heap
page read and write
4A11000
heap
page read and write
2E5E000
stack
page read and write
B2F000
stack
page read and write
400000
system
page execute and read and write
20280000
heap
page read and write
2DFC000
stack
page read and write
34D0000
heap
page read and write
7760000
heap
page read and write
20600000
remote allocation
page read and write
9C7000
stack
page read and write
55A6000
heap
page read and write
4A76000
heap
page read and write
2091E000
stack
page read and write
6363000
trusted library allocation
page read and write
4C30000
heap
page read and write
8A01000
heap
page read and write
20DB0000
heap
page read and write
2DB0000
heap
page read and write
863D000
stack
page read and write
7B30000
trusted library allocation
page read and write
4EF1000
heap
page read and write
4A1E000
heap
page read and write
459000
system
page execute and read and write
2EA5000
heap
page read and write
783A000
heap
page read and write
2EA4000
heap
page read and write
4A11000
heap
page read and write
2089F000
stack
page read and write
4A21000
heap
page read and write
70B000
heap
page read and write
4EF1000
heap
page read and write
2037E000
stack
page read and write
20A00000
direct allocation
page read and write
7A5E000
stack
page read and write
548E000
heap
page read and write
640000
heap
page read and write
2EA4000
heap
page read and write
830000
heap
page read and write
4CE000
stack
page read and write
7BA0000
trusted library allocation
page read and write
2095D000
stack
page read and write
480000
heap
page read and write
31F4000
heap
page read and write
4A31000
heap
page read and write
4EF0000
heap
page read and write
7773000
heap
page read and write
356C000
heap
page read and write
4A2E000
heap
page read and write
4A39000
heap
page read and write
4A31000
heap
page read and write
4A10000
heap
page read and write
867F000
stack
page read and write
4A25000
heap
page read and write
20E41000
heap
page read and write
55AB000
heap
page read and write
5FF000
stack
page read and write
2128C000
unclassified section
page execute and read and write
4A10000
heap
page read and write
7AF0000
trusted library allocation
page execute and read and write
745000
heap
page read and write
3040000
heap
page read and write
4EF1000
heap
page read and write
8990000
trusted library allocation
page execute and read and write
4EF1000
heap
page read and write
4EF1000
heap
page read and write
4D50000
direct allocation
page read and write
4EBD000
heap
page read and write
8690000
heap
page read and write
19A000
stack
page read and write
4A46000
heap
page read and write
85A0000
heap
page read and write
71F000
heap
page read and write
4A39000
heap
page read and write
73B000
heap
page read and write
4EF1000
heap
page read and write
211B0000
unclassified section
page execute and read and write
2CD000
stack
page read and write
310F000
stack
page read and write
556000
heap
page read and write
4A31000
heap
page read and write
4EF1000
heap
page read and write
51C0000
heap
page read and write
4A75000
heap
page read and write
7AE0000
trusted library allocation
page read and write
2F2A000
heap
page read and write
4C60000
trusted library allocation
page execute and read and write
4A8B000
heap
page read and write
There are 710 hidden memdumps, click here to show them.