IOC Report
SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Bat To Exe Converter\is-48PVO.tmp
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Program Files\Bat To Exe Converter\is-54DM0.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Program Files\Bat To Exe Converter\unins000.dat
InnoSetup Log 64-bit Bat To Exe Converter {60C29EC2-33E8-45EE-87E4-31FA3E35C539}, version 0x418, 4039 bytes, 258555\37\user\376, C:\Program Files\Bat To Exe Converter\376\
dropped
C:\Program Files\Bat To Exe Converter\unins000.exe (copy)
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Bat To Exe Converter\Bat To Exe Converter.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Apr 25 17:40:25 2024, mtime=Thu Apr 25 17:40:26 2024, atime=Tue Jul 30 08:54:40 2019, length=2105856, window=hide
dropped
C:\ProgramData\Microsoft\Windows\Start Menu\Programs\Bat To Exe Converter\Uninstall Bat To Exe Converter.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Archive, ctime=Thu Apr 25 17:40:25 2024, mtime=Thu Apr 25 17:40:25 2024, atime=Thu Apr 25 17:39:56 2024, length=1202385, window=hide
dropped
C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\is-DVABN.tmp\_isetup\_setup64.tmp
PE32+ executable (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\662566134.cmd
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\867292396.bat
very short file (no magic)
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\GoLink.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\GoRC.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\Scilexer.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\extd.chm
MS Windows HtmlHelp Data
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\??? (Japanese).lng
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\??? (Korean).lng
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\???? (Chinese Simplified).lng
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\???? (Chinese Traditional).lng
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\????? (Hebrew).lng
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\??????? (Arabic).lng
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\??????? (Russian).lng
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\???????? (Greek).lng
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\Ce tina (Czech).lng
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\Espa ol (Spanish).lng
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\Fran ais (French).lng
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\Italiano (Italian).lng
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\Magyar (Hungarian).lng
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\Nederlands (Dutch).lng
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\Portugu s Brasileiro (Portuguese Brazilian).lng
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\Slovensk (Slovak).lng
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\lng\T rk e (Turkish).lng
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Bat To Exe Converter\upx.exe
PE32 executable (console) Intel 80386 (stripped to external PDB), for MS Windows, UPX compressed
dropped
There are 24 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe
"C:\Program Files\Bat To Exe Converter\Bat_To_Exe_Converter.exe"
malicious
C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe
"C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe"
C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp
"C:\Users\user\AppData\Local\Temp\is-6FOPC.tmp\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.tmp" /SL5="$20438,4092287,121344,C:\Users\user\Desktop\SecuriteInfo.com.W32.ABRisk.NJSZ-2550.30267.8823.exe"

URLs

Name
IP
Malicious
http://www.innosetup.com/
unknown
https://upx.github.io/upx-license.htmlKonverterAltStyleGPL
unknown
http://www.godevtool.com/GolinkFrame.htm
unknown
http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/thttp://127.0.0.1:43110/17SWVnHoujG92yYGSZ
unknown
http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/Submit
unknown
http://www.jrsoftware.org/ishelp/index.php?topic=setupcmdlineSetupU
unknown
http://curl.haxx.se/docs/http-cookies.html#
unknown
https://github.com/99fkDokumenteLetzte
unknown
https://www.scintilla.org/
unknown
https://www.scintilla.org/License.txt
unknown
http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/
unknown
https://github.com/99fk
unknown
http://www.godevtool.com/GorcFrame.htmPrivateBuildprivatebuildInterner
unknown
http://www.f2ko.de/de/cmd.php
unknown
http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/D
unknown
https://upx.github.io
unknown
https://upx.github.ioEine
unknown
https://aka.ms/Vh5j3k
unknown
https://upx.github.io/upx-license.html
unknown
http://curl.haxx.se/docs/http-cookies.html
unknown
http://www.godevtool.com/GorcFrame.htm
unknown
https://aka.ms/odirm
unknown
http://www.f2ko.de/en/cmd.phpVideosJapanese
unknown
http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/q
unknown
http://www.f2ko.de/de/cmd.phpDatei
unknown
http://www.godevtool.com
unknown
http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi//b2e/downloads/v.zip
unknown
https://www.scintilla.org/ArchitekturAM/fileversionCouldn
unknown
https://upx.github.ioT
unknown
http://www.remobjects.com/ps
unknown
https://www.scintilla.org/License.txtBat
unknown
http://www.godevtool.com/GolinkFrame.htm/display
unknown
http://www.f2ko.de/en/cmd.php
unknown
http://127.0.0.1:43110/17SWVnHoujG92yYGSZvCzPgZEpGVfRF8wi/a
unknown
http://www.godevtool.comProduktversionCMD
unknown
https://www.everaldo.com/
unknown
There are 26 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFiles0000
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
RegFilesHash
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
Inno Setup: Setup Version
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
Inno Setup: App Path
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
InstallLocation
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
Inno Setup: Icon Group
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
Inno Setup: User
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
Inno Setup: Selected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
Inno Setup: Deselected Tasks
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
Inno Setup: Language
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
DisplayName
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
UninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
QuietUninstallString
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
DisplayVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
Publisher
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
URLInfoAbout
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
HelpLink
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
URLUpdateInfo
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
NoModify
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
NoRepair
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
InstallDate
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
MajorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
MinorVersion
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
VersionMajor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
VersionMinor
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\{60C29EC2-33E8-45EE-87E4-31FA3E35C539}_is1
EstimatedSize
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
140042000
unkown
page execute and read and write
malicious
2F74000
heap
page read and write
A0E000
stack
page read and write
21A5000
direct allocation
page read and write
2F39000
heap
page read and write
23B9000
direct allocation
page read and write
2F56000
heap
page read and write
2FB8000
heap
page read and write
6C8000
heap
page read and write
2F9D000
heap
page read and write
5F20000
direct allocation
page read and write
2F43000
heap
page read and write
69D000
heap
page read and write
387E000
stack
page read and write
217A000
direct allocation
page read and write
2F25000
heap
page read and write
3601000
heap
page read and write
2EEB000
heap
page read and write
2F7F000
heap
page read and write
2FC3000
heap
page read and write
3501000
heap
page read and write
2EFE000
heap
page read and write
2F1C000
heap
page read and write
3211000
heap
page read and write
1403C3000
unkown
page execute and read and write
224C000
direct allocation
page read and write
2FB8000
heap
page read and write
2FA7000
heap
page read and write
19C000
stack
page read and write
2F93000
heap
page read and write
2F56000
heap
page read and write
506000
unkown
page read and write
2FB1000
heap
page read and write
2F6A000
heap
page read and write
31FD000
heap
page read and write
714000
heap
page read and write
22C5000
heap
page read and write
2990000
trusted library allocation
page read and write
3AC4000
heap
page read and write
6A9000
heap
page read and write
6BF000
heap
page read and write
6A1000
heap
page read and write
3A50000
heap
page read and write
34A0000
direct allocation
page read and write
233A000
direct allocation
page read and write
2173000
direct allocation
page read and write
24C2000
direct allocation
page read and write
2EDB000
heap
page read and write
62C000
heap
page read and write
3211000
heap
page read and write
2EE1000
heap
page read and write
2F9D000
heap
page read and write
2F7F000
heap
page read and write
14039A000
unkown
page execute and read and write
2FB8000
heap
page read and write
7FD20000
direct allocation
page read and write
2F4D000
heap
page read and write
5E6000
heap
page read and write
2382000
direct allocation
page read and write
5F71000
heap
page read and write
22A0000
heap
page read and write
2F7B000
heap
page read and write
674000
heap
page read and write
682000
heap
page read and write
320A000
heap
page read and write
2401000
direct allocation
page read and write
5770000
trusted library allocation
page read and write
7FE2E000
direct allocation
page read and write
2FC3000
heap
page read and write
2ED5000
heap
page read and write
502000
unkown
page write copy
630000
heap
page read and write
2FB9000
heap
page read and write
3ACD000
heap
page read and write
3190000
direct allocation
page read and write
2F12000
heap
page read and write
39E0000
heap
page read and write
6C7000
heap
page read and write
2FAE000
heap
page read and write
2F08000
heap
page read and write
3190000
direct allocation
page read and write
690000
heap
page read and write
2FB8000
heap
page read and write
693000
heap
page read and write
3200000
heap
page read and write
57E000
stack
page read and write
18E000
stack
page read and write
3200000
heap
page read and write
6A0000
heap
page read and write
2EF5000
heap
page read and write
2FBB000
heap
page read and write
2EDC000
heap
page read and write
31A0000
direct allocation
page read and write
2F7F000
heap
page read and write
2372000
direct allocation
page read and write
2FA4000
heap
page read and write
2268000
direct allocation
page read and write
3540000
heap
page read and write
253F000
heap
page read and write
2FA7000
heap
page read and write
2F9A000
heap
page read and write
2FB8000
heap
page read and write
2244000
direct allocation
page read and write
2F25000
heap
page read and write
6C2000
heap
page read and write
2181000
direct allocation
page read and write
2EDC000
heap
page read and write
23B2000
direct allocation
page read and write
2F90000
heap
page read and write
22B0000
heap
page read and write
2FBB000
heap
page read and write
231E000
direct allocation
page read and write
2FB8000
heap
page read and write
2F4D000
heap
page read and write
216B000
direct allocation
page read and write
2FB1000
heap
page read and write
2F56000
heap
page read and write
7FFDFF24A000
unkown
page readonly
2300000
direct allocation
page read and write
2FBB000
heap
page read and write
965000
heap
page read and write
22E3000
direct allocation
page read and write
2F6A000
heap
page read and write
65A000
heap
page read and write
2F9D000
heap
page read and write
648000
heap
page read and write
2FAE000
heap
page read and write
2F56000
heap
page read and write
678000
heap
page read and write
3214000
heap
page read and write
3214000
heap
page read and write
2FB1000
heap
page read and write
346F000
direct allocation
page read and write
2FA7000
heap
page read and write
2197000
direct allocation
page read and write
664000
heap
page read and write
2F7B000
heap
page read and write
2F9A000
heap
page read and write
3500000
heap
page read and write
2ED5000
heap
page read and write
3211000
heap
page read and write
674000
heap
page read and write
140000000
unkown
page readonly
2FBB000
heap
page read and write
3207000
heap
page read and write
2F89000
heap
page read and write
2FA4000
heap
page read and write
23EC000
direct allocation
page read and write
3207000
heap
page read and write
8F3000
heap
page read and write
716000
heap
page read and write
5BE000
stack
page read and write
4C0000
heap
page read and write
2FB1000
heap
page read and write
2FB8000
heap
page read and write
2F90000
heap
page read and write
2F89000
heap
page read and write
2FA7000
heap
page read and write
2EE2000
heap
page read and write
2F43000
heap
page read and write
321F000
heap
page read and write
7FFDFF1C1000
unkown
page execute read
2F8F000
heap
page read and write
51F000
unkown
page readonly
2FC3000
heap
page read and write
21C3000
direct allocation
page read and write
3200000
heap
page read and write
23FA000
direct allocation
page read and write
960000
heap
page read and write
2164000
direct allocation
page read and write
5D0000
heap
page read and write
2F60000
heap
page read and write
2FB1000
heap
page read and write
2F89000
heap
page read and write
2F89000
heap
page read and write
31FD000
heap
page read and write
2363000
direct allocation
page read and write
2FA7000
heap
page read and write
34AD000
direct allocation
page read and write
2FC3000
heap
page read and write
2F9D000
heap
page read and write
383F000
stack
page read and write
239C000
direct allocation
page read and write
3207000
heap
page read and write
320A000
heap
page read and write
2ED6000
heap
page read and write
2219000
direct allocation
page read and write
321F000
heap
page read and write
2FAE000
heap
page read and write
22F1000
direct allocation
page read and write
6AC000
heap
page read and write
8BF000
stack
page read and write
2FC3000
heap
page read and write
23F3000
direct allocation
page read and write
2F90000
heap
page read and write
3211000
heap
page read and write
34B6000
direct allocation
page read and write
2F2F000
heap
page read and write
4BE000
stack
page read and write
2F90000
heap
page read and write
2307000
direct allocation
page read and write
2317000
direct allocation
page read and write
320A000
heap
page read and write
22A6000
heap
page read and write
2FBB000
heap
page read and write
2FA4000
heap
page read and write
34C8000
direct allocation
page read and write
3600000
heap
page read and write
2F7B000
heap
page read and write
93000
stack
page read and write
2FB8000
heap
page read and write
2F90000
heap
page read and write
2FC3000
heap
page read and write
2FAF000
heap
page read and write
2F7B000
heap
page read and write
320A000
heap
page read and write
2ED5000
heap
page read and write
2FB1000
heap
page read and write
2F9D000
heap
page read and write
2F39000
heap
page read and write
28D0000
heap
page read and write
2F9A000
heap
page read and write
353C000
heap
page read and write
2FC3000
heap
page read and write
2F8E000
heap
page read and write
22B3000
heap
page read and write
2110000
heap
page read and write
2211000
direct allocation
page read and write
21C4000
heap
page read and write
2F7F000
heap
page read and write
2F89000
heap
page read and write
22D0000
direct allocation
page read and write
31E2000
heap
page read and write
2F9A000
heap
page read and write
3360000
direct allocation
page read and write
2395000
direct allocation
page read and write
66D000
heap
page read and write
8FE000
heap
page read and write
31F6000
heap
page read and write
5460000
heap
page read and write
502000
unkown
page read and write
140000000
unkown
page readonly
21C0000
heap
page read and write
2188000
direct allocation
page read and write
2FB1000
heap
page read and write
349E000
direct allocation
page read and write
2F74000
heap
page read and write
2208000
direct allocation
page read and write
2F9D000
heap
page read and write
23C0000
direct allocation
page read and write
2FC3000
heap
page read and write
223D000
direct allocation
page read and write
3207000
heap
page read and write
2201000
direct allocation
page read and write
2F1C000
heap
page read and write
671000
heap
page read and write
980000
heap
page read and write
222F000
direct allocation
page read and write
31F6000
heap
page read and write
2F93000
heap
page read and write
2FA7000
heap
page read and write
3350000
unkown
page read and write
687000
heap
page read and write
6C4000
heap
page read and write
2F9D000
heap
page read and write
2F60000
heap
page read and write
321F000
heap
page read and write
1403C7000
unkown
page read and write
2FB8000
heap
page read and write
5C6000
heap
page read and write
412000
unkown
page write copy
1403C5000
unkown
page execute and write copy
31FD000
heap
page read and write
23CF000
direct allocation
page read and write
2F4D000
heap
page read and write
21CA000
direct allocation
page read and write
2F25000
heap
page read and write
2FBB000
heap
page read and write
2F9D000
heap
page read and write
2F56000
heap
page read and write
2F8E000
heap
page read and write
353E000
heap
page read and write
2F9A000
heap
page read and write
2ADE000
stack
page read and write
2FBB000
heap
page read and write
6C0000
heap
page read and write
2FAE000
heap
page read and write
2F7B000
heap
page read and write
5EC000
heap
page read and write
321F000
heap
page read and write
2342000
direct allocation
page read and write
2EDC000
heap
page read and write
2FBB000
heap
page read and write
22C9000
heap
page read and write
6BB000
heap
page read and write
6070000
heap
page read and write
401000
unkown
page execute read
2F60000
heap
page read and write
2EFE000
heap
page read and write
31EC000
heap
page read and write
2F7F000
heap
page read and write
950000
heap
page read and write
51A000
unkown
page readonly
6AE000
heap
page read and write
2F9A000
heap
page read and write
2F08000
heap
page read and write
50D000
unkown
page write copy
50D000
unkown
page read and write
8F6000
heap
page read and write
2F9D000
heap
page read and write
2FBB000
heap
page read and write
2333000
direct allocation
page read and write
2FB1000
heap
page read and write
2522000
heap
page read and write
65B000
heap
page read and write
530000
heap
page read and write
6A1000
heap
page read and write
401000
unkown
page execute read
2F89000
heap
page read and write
21FA000
direct allocation
page read and write
6B1000
heap
page read and write
50A000
unkown
page read and write
419000
unkown
page write copy
353C000
heap
page read and write
2FB1000
heap
page read and write
2F74000
heap
page read and write
1C0000
heap
page read and write
2FA4000
heap
page read and write
5C0000
heap
page read and write
3214000
heap
page read and write
7FFDFF239000
unkown
page readonly
3C4F000
stack
page read and write
2F93000
heap
page read and write
2F60000
heap
page read and write
23E4000
direct allocation
page read and write
2FAE000
heap
page read and write
714000
heap
page read and write
2FBB000
heap
page read and write
23B0000
direct allocation
page read and write
21E5000
direct allocation
page read and write
2FC3000
heap
page read and write
2FC3000
heap
page read and write
2FA4000
heap
page read and write
2F39000
heap
page read and write
5E0000
heap
page read and write
3211000
heap
page read and write
2900000
heap
page read and write
2EDA000
heap
page read and write
2F89000
heap
page read and write
2236000
direct allocation
page read and write
68F000
heap
page read and write
2FAE000
heap
page read and write
70C000
heap
page read and write
2F12000
heap
page read and write
3AC6000
heap
page read and write
21B3000
direct allocation
page read and write
2FB1000
heap
page read and write
321B000
heap
page read and write
2F90000
heap
page read and write
24BA000
heap
page read and write
60A000
heap
page read and write
237B000
direct allocation
page read and write
2F90000
heap
page read and write
2408000
direct allocation
page read and write
2F4D000
heap
page read and write
3214000
heap
page read and write
400000
unkown
page readonly
2FAE000
heap
page read and write
2F39000
heap
page read and write
321F000
heap
page read and write
430000
heap
page read and write
2220000
direct allocation
page read and write
230E000
direct allocation
page read and write
321B000
heap
page read and write
5463000
heap
page read and write
348F000
direct allocation
page read and write
2253000
direct allocation
page read and write
2FA4000
heap
page read and write
2FB1000
heap
page read and write
321F000
heap
page read and write
31FD000
heap
page read and write
22A9000
heap
page read and write
2F90000
heap
page read and write
397F000
stack
page read and write
2FA4000
heap
page read and write
2F7F000
heap
page read and write
235B000
direct allocation
page read and write
3AC0000
heap
page read and write
2FC3000
heap
page read and write
2261000
direct allocation
page read and write
34A5000
direct allocation
page read and write
2F43000
heap
page read and write
34C0000
direct allocation
page read and write
140001000
unkown
page execute and read and write
21D1000
direct allocation
page read and write
2F7B000
heap
page read and write
2EDD000
heap
page read and write
238D000
direct allocation
page read and write
693000
heap
page read and write
5C7000
heap
page read and write
697000
heap
page read and write
2F9D000
heap
page read and write
2F74000
heap
page read and write
320A000
heap
page read and write
691000
heap
page read and write
500000
unkown
page execute read
2FA7000
heap
page read and write
1401E8000
unkown
page execute and write copy
39C0000
heap
page read and write
3B40000
heap
page read and write
2F7F000
heap
page read and write
90F000
stack
page read and write
2EE2000
heap
page read and write
2F2F000
heap
page read and write
2F93000
heap
page read and write
2F9A000
heap
page read and write
69A000
heap
page read and write
2FAE000
heap
page read and write
3200000
heap
page read and write
23C8000
direct allocation
page read and write
232C000
direct allocation
page read and write
41C000
unkown
page readonly
417000
unkown
page read and write
2EDC000
heap
page read and write
2FC3000
heap
page read and write
2EDC000
heap
page read and write
2F7B000
heap
page read and write
2FA7000
heap
page read and write
2F89000
heap
page read and write
2F9A000
heap
page read and write
24B8000
heap
page read and write
2F4D000
heap
page read and write
321B000
heap
page read and write
2F12000
heap
page read and write
2FC3000
heap
page read and write
2FC3000
heap
page read and write
24C6000
direct allocation
page read and write
513000
unkown
page readonly
2F6A000
heap
page read and write
2F89000
heap
page read and write
2F1C000
heap
page read and write
23B0000
direct allocation
page read and write
2F43000
heap
page read and write
2FC3000
heap
page read and write
6A4000
heap
page read and write
2FA4000
heap
page read and write
34D8000
direct allocation
page read and write
6A7000
heap
page read and write
2FB8000
heap
page read and write
2FB1000
heap
page read and write
2F25000
heap
page read and write
21AC000
direct allocation
page read and write
2F39000
heap
page read and write
31A0000
heap
page read and write
2F4D000
heap
page read and write
2F90000
heap
page read and write
2FB1000
heap
page read and write
685000
heap
page read and write
697000
heap
page read and write
2FA4000
heap
page read and write
2F74000
heap
page read and write
24EF000
heap
page read and write
3214000
heap
page read and write
25A0000
heap
page read and write
2230000
heap
page read and write
2522000
heap
page read and write
2FC3000
heap
page read and write
23AB000
direct allocation
page read and write
920000
heap
page read and write
2F60000
heap
page read and write
2F2F000
heap
page read and write
3C50000
heap
page read and write
2FB8000
heap
page read and write
2FAE000
heap
page read and write
21BC000
direct allocation
page read and write
693000
heap
page read and write
2FAE000
heap
page read and write
3207000
heap
page read and write
2F43000
heap
page read and write
31F6000
heap
page read and write
253F000
heap
page read and write
321B000
heap
page read and write
2FBB000
heap
page read and write
321F000
heap
page read and write
2F93000
heap
page read and write
674000
heap
page read and write
3B43000
heap
page read and write
2F93000
heap
page read and write
147000
stack
page read and write
2F9D000
heap
page read and write
2FAE000
heap
page read and write
2FA7000
heap
page read and write
2F90000
heap
page read and write
31EC000
heap
page read and write
2F93000
heap
page read and write
714000
heap
page read and write
219E000
direct allocation
page read and write
7FFDFF1C0000
unkown
page readonly
7FE32000
direct allocation
page read and write
23D6000
direct allocation
page read and write
373E000
stack
page read and write
253F000
heap
page read and write
22C0000
heap
page read and write
2F74000
heap
page read and write
2FAE000
heap
page read and write
2FA4000
heap
page read and write
2F9A000
heap
page read and write
2FBB000
heap
page read and write
2F7F000
heap
page read and write
24CE000
heap
page read and write
2F6A000
heap
page read and write
190000
heap
page read and write
2FA7000
heap
page read and write
2FC3000
heap
page read and write
2F7F000
heap
page read and write
2F9A000
heap
page read and write
2F6A000
heap
page read and write
66A000
heap
page read and write
2BDE000
stack
page read and write
9B000
stack
page read and write
2FB8000
heap
page read and write
2F6A000
heap
page read and write
2ED5000
heap
page read and write
2FC3000
heap
page read and write
2FA4000
heap
page read and write
2FA7000
heap
page read and write
2F7B000
heap
page read and write
6AE000
heap
page read and write
2F6A000
heap
page read and write
3214000
heap
page read and write
2FC3000
heap
page read and write
1A0000
heap
page read and write
8F0000
heap
page read and write
321B000
heap
page read and write
640000
heap
page read and write
2F93000
heap
page read and write
3A00000
heap
page read and write
218F000
direct allocation
page read and write
23DD000
direct allocation
page read and write
214C000
direct allocation
page read and write
321B000
heap
page read and write
2FA7000
heap
page read and write
2FBB000
heap
page read and write
2F74000
heap
page read and write
424000
unkown
page readonly
321B000
heap
page read and write
67C000
heap
page read and write
556F000
stack
page read and write
2F60000
heap
page read and write
2F93000
heap
page read and write
688000
heap
page read and write
6720000
heap
page read and write
2ED0000
heap
page read and write
1403C7000
unkown
page write copy
2F56000
heap
page read and write
225A000
direct allocation
page read and write
2325000
direct allocation
page read and write
400000
unkown
page readonly
68A000
heap
page read and write
2FB8000
heap
page read and write
576E000
stack
page read and write
2FC3000
heap
page read and write
22F8000
direct allocation
page read and write
2F2F000
heap
page read and write
6A9000
heap
page read and write
2F89000
heap
page read and write
2F9A000
heap
page read and write
2F7B000
heap
page read and write
412000
unkown
page read and write
31A0000
direct allocation
page read and write
2F74000
heap
page read and write
2F60000
heap
page read and write
661000
heap
page read and write
21EC000
direct allocation
page read and write
2F93000
heap
page read and write
7FFDFF244000
unkown
page read and write
22A0000
direct allocation
page execute and read and write
2F8E000
heap
page read and write
2F85000
heap
page read and write
2FBB000
heap
page read and write
There are 570 hidden memdumps, click here to show them.