IOC Report
Evgh. rvs Armenia. 30.04.2024.exe

loading gif

Files

File Path
Type
Category
Malicious
Evgh. rvs Armenia. 30.04.2024.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Faulty\Smallhearted115\Kommuneskatten\Evgh. rvs Armenia. 30.04.2024.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\Chaptaliseringernes.Kro
ASCII text, with very long lines (60984), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\mqerms.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Faulty\Smallhearted115\Kommuneskatten\Evgh. rvs Armenia. 30.04.2024.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Deinotherium\Anstalters\Faulty\Smallhearted115\Kommuneskatten\hektowattens.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\chatrum.sag
data
dropped
C:\Users\user\AppData\Local\Temp\Deinotherium\Hypopharynx\Udbuler\Eomecon\Boligtilsynet\Insipidly.Stu
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iqnwc0p3.zna.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nv5zgcj3.4dh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhv9CF8.tmp
Extensible storage engine DataBase, version 0x620, checksum 0xb20b6b62, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\gyjlretajhvbzkpgzfenpklwvjfw
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\Documents\Illoyalitet.ini
ASCII text, with CRLF line terminators
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe
"C:\Users\user\Desktop\Evgh. rvs Armenia. 30.04.2024.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Unlovingness=Get-Content 'C:\Users\user\AppData\Local\Temp\Deinotherium\Attn104\Jiber\Superintendentens\Chaptaliseringernes.Kro';$Polymer=$Unlovingness.SubString(60937,3);.$Polymer($Unlovingness)"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\gyjlretajhvbzkpgzfenpklwvjfw"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qbovkwdcxqngjydkiqrgaxffwqwfffq"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\bvuokpowlyflmeroabeidcawfegogqpwfc"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Ufuldbaarnes% -windowstyle minimized $Nonconjecturably=(Get-ItemProperty -Path 'HKCU:\Nausea\').Wryer;%Ufuldbaarnes% ($Nonconjecturably)"
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
learfo55ozj01.duckdns.org
malicious
http://geoplugin.net/json.gp
178.237.33.50
malicious
http://geoplugin.net/json.gpd
unknown
http://nuget.org/NuGet.exe
unknown
http://www.imvu.comr
unknown
https://covid19support.top/OXdwhUAIa249.bin
172.67.220.6
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://login.li
unknown
https://contoso.com/License
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
http://www.nirsoft.net
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://github.com/Pester/Pester
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://covid19support.top/$5
unknown
https://www.google.com
unknown
http://crl.micro-
unknown
http://nsis.sf.net/NSIS_Error
unknown
https://covid19support.top/
unknown
http://crl.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://aka.ms/pscore6lBjq
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
https://covid19support.top/OXdwhUAIa249.biny
unknown
http://www.nirsoft.net/
unknown
http://www.imvu.comata
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.ebuddy.com
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
learfo55ozj02.duckdns.org
193.222.96.21
malicious
learfo55ozj01.duckdns.org
192.169.69.26
malicious
covid19support.top
172.67.220.6
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
192.169.69.26
learfo55ozj01.duckdns.org
United States
malicious
193.222.96.21
learfo55ozj02.duckdns.org
Germany
malicious
172.67.220.6
covid19support.top
United States
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Divan180
culturize
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{BD84B380-8CA2-1069-AB1D-08000948F534} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@fontext.dll,-8007
HKEY_CURRENT_USER\SOFTWARE\Betvingelse
fataliteter
HKEY_CURRENT_USER\Nausea
Wryer
HKEY_CURRENT_USER\Environment
Ufuldbaarnes
HKEY_CURRENT_USER\SOFTWARE\alpwovnb-G3F5OR
exepath
HKEY_CURRENT_USER\SOFTWARE\alpwovnb-G3F5OR
licence
HKEY_CURRENT_USER\SOFTWARE\alpwovnb-G3F5OR
time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Startup key

Memdumps

Base Address
Regiontype
Protect
Malicious
9CB6000
direct allocation
page execute and read and write
malicious
7B04000
heap
page read and write
malicious
37F0000
trusted library allocation
page read and write
3320000
heap
page read and write
7AD9000
heap
page read and write
3319000
heap
page read and write
2313E000
stack
page read and write
335B000
heap
page read and write
540000
heap
page read and write
3335000
heap
page read and write
652000
heap
page read and write
337A000
heap
page read and write
335B000
heap
page read and write
2EB4000
heap
page read and write
331E000
heap
page read and write
2EB4000
heap
page read and write
346D000
heap
page read and write
239AA000
heap
page read and write
4D48000
trusted library allocation
page read and write
7C20000
direct allocation
page read and write
333E000
heap
page read and write
22DDC000
stack
page read and write
3C60000
remote allocation
page execute and read and write
3321000
heap
page read and write
2DDE000
stack
page read and write
79D0000
trusted library allocation
page read and write
2EB4000
heap
page read and write
3320000
heap
page read and write
332E000
heap
page read and write
3368000
heap
page read and write
7B60000
heap
page read and write
459000
system
page execute and read and write
2B17000
stack
page read and write
3331000
heap
page read and write
2FBD000
heap
page read and write
5F5000
heap
page read and write
5021000
heap
page read and write
233FF000
stack
page read and write
2EB4000
heap
page read and write
4E90000
trusted library allocation
page read and write
5E9000
heap
page read and write
23EB0000
unclassified section
page execute and read and write
648000
heap
page read and write
2F40000
direct allocation
page read and write
5021000
heap
page read and write
5021000
heap
page read and write
7B0E000
heap
page read and write
237E4000
heap
page read and write
7B60000
heap
page read and write
2EB4000
heap
page read and write
32E0000
heap
page read and write
7BA0000
direct allocation
page read and write
646000
heap
page read and write
2BCE000
heap
page read and write
2BB0000
heap
page read and write
3470000
heap
page read and write
19A000
stack
page read and write
60E000
heap
page read and write
2E7F000
stack
page read and write
3470000
heap
page read and write
237F4000
heap
page read and write
7B49000
heap
page read and write
2EA8000
heap
page read and write
2E80000
heap
page read and write
473000
system
page execute and read and write
32F0000
heap
page read and write
31AC000
heap
page read and write
2EB5000
heap
page read and write
48E0000
trusted library allocation
page read and write
332E000
heap
page read and write
23F23000
unclassified section
page execute and read and write
332D000
heap
page read and write
3398000
heap
page read and write
7A40000
heap
page readonly
5360000
trusted library allocation
page read and write
4925000
trusted library allocation
page execute and read and write
2DE0000
heap
page readonly
5E5000
heap
page read and write
650000
heap
page read and write
2BA0000
heap
page read and write
4766000
remote allocation
page execute and read and write
2EB4000
heap
page read and write
7C50000
direct allocation
page read and write
2B3C000
stack
page read and write
236E000
stack
page read and write
2EB5000
heap
page read and write
A98000
heap
page read and write
83D7000
stack
page read and write
3378000
heap
page read and write
346E000
heap
page read and write
88EE000
heap
page read and write
335A000
heap
page read and write
613000
heap
page read and write
3325000
heap
page read and write
331F000
heap
page read and write
30C3000
heap
page read and write
7A60000
direct allocation
page read and write
2905000
heap
page read and write
621000
heap
page read and write
235BD000
stack
page read and write
3341000
heap
page read and write
7A00000
trusted library allocation
page read and write
8400000
trusted library allocation
page read and write
2D9F000
unkown
page read and write
3331000
heap
page read and write
7A9D000
heap
page read and write
401000
unkown
page execute read
237F4000
heap
page read and write
8590000
trusted library allocation
page read and write
2B30000
heap
page read and write
5360000
trusted library allocation
page read and write
A6B6000
direct allocation
page execute and read and write
3344000
heap
page read and write
237A4000
heap
page read and write
5F4000
heap
page read and write
332E000
heap
page read and write
7B5A000
heap
page read and write
645000
heap
page read and write
5E9000
heap
page read and write
7A78000
heap
page read and write
5A8000
heap
page read and write
2B14000
heap
page read and write
48F4000
trusted library allocation
page read and write
2BB0000
heap
page readonly
2EB5000
heap
page read and write
23711000
heap
page read and write
70D000
stack
page read and write
8AA0000
direct allocation
page execute and read and write
2229000
heap
page read and write
4E5E000
stack
page read and write
232F000
stack
page read and write
3311000
heap
page read and write
332E000
heap
page read and write
96F000
stack
page read and write
701F000
stack
page read and write
331C000
heap
page read and write
230E0000
direct allocation
page read and write
7B90000
direct allocation
page read and write
622000
heap
page read and write
7980000
trusted library allocation
page read and write
2B14000
heap
page read and write
651000
heap
page read and write
A90000
heap
page read and write
4FE1000
trusted library allocation
page read and write
61B000
heap
page read and write
5360000
trusted library allocation
page read and write
7B56000
heap
page read and write
2EB5000
heap
page read and write
2384000
heap
page read and write
3328000
heap
page read and write
2BAB000
heap
page read and write
2EB4000
heap
page read and write
2EFE000
stack
page read and write
237F2000
heap
page read and write
7B5D000
heap
page read and write
2DF0000
heap
page read and write
2EB5000
heap
page read and write
237A3000
heap
page read and write
332E000
heap
page read and write
7703000
heap
page read and write
474000
unkown
page readonly
2B14000
heap
page read and write
3311000
heap
page read and write
2EB4000
heap
page read and write
23AB0000
heap
page read and write
7BF0000
direct allocation
page read and write
331C000
heap
page read and write
521F000
stack
page read and write
3385000
heap
page read and write
2EE0000
heap
page read and write
5E9000
heap
page read and write
2CA0000
heap
page read and write
23788000
heap
page read and write
3311000
heap
page read and write
3008000
heap
page read and write
5645000
heap
page read and write
8A50000
trusted library allocation
page execute and read and write
3385000
heap
page read and write
5F1000
heap
page read and write
48F3000
trusted library allocation
page execute and read and write
7B53000
heap
page read and write
437000
unkown
page readonly
4910000
trusted library allocation
page read and write
237D3000
heap
page read and write
5A0000
heap
page read and write
28D3000
heap
page read and write
231CE000
stack
page read and write
337E000
heap
page read and write
230C0000
direct allocation
page read and write
2EB4000
heap
page read and write
3311000
heap
page read and write
7B60000
heap
page read and write
8874000
heap
page read and write
3331000
heap
page read and write
4F55000
heap
page execute and read and write
2B8E000
stack
page read and write
3331000
heap
page read and write
7B5B000
heap
page read and write
2EB4000
heap
page read and write
2F40000
heap
page read and write
3321000
heap
page read and write
67C000
heap
page read and write
5E9000
heap
page read and write
545000
heap
page read and write
214E000
stack
page read and write
23260000
remote allocation
page read and write
5CC000
heap
page read and write
2E4E000
stack
page read and write
2B10000
heap
page read and write
3310000
heap
page read and write
22E5E000
stack
page read and write
2BA0000
heap
page read and write
5136000
trusted library allocation
page read and write
66C000
heap
page read and write
400000
system
page execute and read and write
2FB0000
heap
page read and write
3385000
heap
page read and write
2E30000
heap
page read and write
77E0000
trusted library allocation
page read and write
4D9C000
stack
page read and write
237F2000
heap
page read and write
7B60000
heap
page read and write
8899000
heap
page read and write
535F000
stack
page read and write
7572000
heap
page read and write
4B0000
heap
page read and write
2EB4000
heap
page read and write
3333000
heap
page read and write
5020000
heap
page read and write
2B40000
heap
page readonly
239DA000
heap
page read and write
2EDE000
stack
page read and write
77E000
stack
page read and write
531F000
stack
page read and write
C4B6000
direct allocation
page execute and read and write
3311000
heap
page read and write
7C0000
heap
page read and write
400000
system
page execute and read and write
2B14000
heap
page read and write
7B49000
heap
page read and write
8570000
trusted library allocation
page read and write
2EB4000
heap
page read and write
4FE000
stack
page read and write
8A70000
heap
page read and write
8550000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
2301F000
stack
page read and write
48D0000
trusted library section
page read and write
3333000
heap
page read and write
8580000
trusted library allocation
page read and write
7721000
heap
page read and write
2C70000
heap
page read and write
88D2000
heap
page read and write
3331000
heap
page read and write
335B000
heap
page read and write
3335000
heap
page read and write
2B14000
heap
page read and write
7940000
trusted library allocation
page read and write
2EA0000
heap
page read and write
5021000
heap
page read and write
2BFE000
stack
page read and write
8A90000
trusted library allocation
page execute and read and write
2AFC000
stack
page read and write
2C80000
heap
page read and write
688000
heap
page read and write
7080000
direct allocation
page read and write
5546000
heap
page read and write
2EB4000
heap
page read and write
23711000
heap
page read and write
2357E000
stack
page read and write
437000
unkown
page readonly
3311000
heap
page read and write
562D000
trusted library allocation
page read and write
334B000
heap
page read and write
618D000
trusted library allocation
page read and write
3318000
heap
page read and write
334E000
heap
page read and write
2B34000
stack
page read and write
273E000
stack
page read and write
5021000
heap
page read and write
2EC0000
trusted library allocation
page read and write
540E000
heap
page read and write
92B6000
direct allocation
page execute and read and write
5D9000
heap
page read and write
3310000
heap
page read and write
3319000
heap
page read and write
3300000
heap
page read and write
22E1D000
stack
page read and write
234FE000
stack
page read and write
22FDE000
stack
page read and write
5290000
heap
page read and write
2EB4000
heap
page read and write
617000
heap
page read and write
2ADF000
unkown
page read and write
4FCE000
stack
page read and write
222C000
heap
page read and write
8560000
trusted library allocation
page read and write
4900000
trusted library allocation
page read and write
4FD0000
heap
page execute and read and write
7B01000
heap
page read and write
41B000
system
page execute and read and write
3331000
heap
page read and write
770000
heap
page read and write
2B14000
heap
page read and write
7799000
heap
page read and write
31EF000
stack
page read and write
3344000
heap
page read and write
5633000
trusted library allocation
page read and write
456000
system
page execute and read and write
7B60000
heap
page read and write
3442000
heap
page read and write
3333000
heap
page read and write
2F50000
direct allocation
page read and write
7C40000
direct allocation
page read and write
886C000
heap
page read and write
7D0000
heap
page read and write
498E000
stack
page read and write
2EB4000
heap
page read and write
407000
unkown
page readonly
23F0D000
unclassified section
page execute and read and write
788E000
stack
page read and write
4E9E000
stack
page read and write
7C90000
heap
page read and write
23788000
heap
page read and write
2F90000
direct allocation
page read and write
23630000
unclassified section
page execute and read and write
28EB000
heap
page read and write
7B49000
heap
page read and write
3339000
heap
page read and write
2ABA000
stack
page read and write
4909000
trusted library allocation
page read and write
48F0000
trusted library allocation
page read and write
7B60000
heap
page read and write
23676000
direct allocation
page execute and read and write
3331000
heap
page read and write
48FD000
trusted library allocation
page execute and read and write
77D0000
trusted library allocation
page read and write
4DDD000
stack
page read and write
3333000
heap
page read and write
2ED000
stack
page read and write
4FC7000
trusted library allocation
page read and write
5021000
heap
page read and write
4922000
trusted library allocation
page read and write
53E000
stack
page read and write
2F70000
direct allocation
page read and write
2F10000
direct allocation
page read and write
31EE000
stack
page read and write
4F50000
heap
page read and write
335A000
heap
page read and write
6188000
trusted library allocation
page read and write
45C000
system
page execute and read and write
2364B000
unclassified section
page execute and read and write
7BC0000
direct allocation
page read and write
5F4000
heap
page read and write
434000
unkown
page readonly
2B14000
heap
page read and write
619000
heap
page read and write
334B000
heap
page read and write
3398000
heap
page read and write
4CA0000
heap
page read and write
2B79000
stack
page read and write
9A57000
trusted library allocation
page read and write
31A0000
heap
page read and write
3331000
heap
page read and write
3327000
heap
page read and write
331C000
heap
page read and write
2B14000
heap
page read and write
7950000
trusted library allocation
page read and write
2EB4000
heap
page read and write
601000
heap
page read and write
6174000
trusted library allocation
page read and write
2EB4000
heap
page read and write
3354000
heap
page read and write
332B000
heap
page read and write
3550000
heap
page read and write
3440000
heap
page read and write
3325000
heap
page read and write
422000
unkown
page read and write
88BA000
heap
page read and write
23F86000
unclassified section
page execute and read and write
28DB000
heap
page read and write
7B5B000
heap
page read and write
5021000
heap
page read and write
674000
heap
page read and write
84D0000
trusted library allocation
page execute and read and write
3311000
heap
page read and write
8500000
heap
page read and write
3326000
heap
page read and write
76E7000
heap
page read and write
84BE000
stack
page read and write
232F0000
heap
page read and write
3D66000
remote allocation
page execute and read and write
2B14000
heap
page read and write
79B0000
trusted library allocation
page read and write
237A4000
heap
page read and write
282E000
stack
page read and write
5D9000
heap
page read and write
23AB1000
heap
page read and write
7CA0000
heap
page read and write
23811000
heap
page read and write
28E0000
heap
page read and write
64F000
heap
page read and write
337A000
heap
page read and write
730000
heap
page read and write
3378000
heap
page read and write
3331000
heap
page read and write
7790000
heap
page read and write
2F60000
direct allocation
page read and write
3540000
heap
page read and write
624000
heap
page read and write
2347E000
stack
page read and write
79E0000
trusted library allocation
page read and write
3590000
heap
page read and write
5F8000
heap
page read and write
342F000
stack
page read and write
424000
unkown
page read and write
2329E000
stack
page read and write
5766000
heap
page read and write
5021000
heap
page read and write
23A1A000
heap
page read and write
2B14000
heap
page read and write
78AE000
stack
page read and write
7B0E000
heap
page read and write
23260000
remote allocation
page read and write
4F8E000
stack
page read and write
2397C000
heap
page read and write
76B0000
heap
page read and write
86F000
stack
page read and write
5F4000
heap
page read and write
870C000
stack
page read and write
88FA000
heap
page read and write
3311000
heap
page read and write
5FE1000
trusted library allocation
page read and write
49CE000
stack
page read and write
7970000
trusted library allocation
page read and write
5021000
heap
page read and write
3420000
heap
page read and write
2B1C000
stack
page read and write
27ED000
stack
page read and write
2ED0000
heap
page read and write
3301000
heap
page read and write
6049000
trusted library allocation
page read and write
554D000
heap
page read and write
3333000
heap
page read and write
2A40000
heap
page read and write
23260000
remote allocation
page read and write
620000
heap
page read and write
5B66000
remote allocation
page execute and read and write
4E19000
heap
page read and write
2320F000
stack
page read and write
3398000
heap
page read and write
3310000
heap
page read and write
2B14000
heap
page read and write
8410000
trusted library allocation
page read and write
76CB000
heap
page read and write
3ED000
stack
page read and write
2BB8000
heap
page read and write
500E000
stack
page read and write
780000
heap
page read and write
27E0000
heap
page read and write
342E000
heap
page read and write
3378000
heap
page read and write
23788000
heap
page read and write
5021000
heap
page read and write
5360000
trusted library allocation
page read and write
575E000
heap
page read and write
7770000
heap
page read and write
7C30000
direct allocation
page read and write
5532000
heap
page read and write
2B14000
heap
page read and write
23AB1000
heap
page read and write
2A50000
heap
page read and write
77E000
unkown
page read and write
3378000
heap
page read and write
5021000
heap
page read and write
23661000
direct allocation
page execute and read and write
7960000
trusted library allocation
page read and write
2B90000
heap
page read and write
7D30000
heap
page read and write
237A3000
heap
page read and write
3311000
heap
page read and write
8A80000
trusted library allocation
page read and write
BAB6000
direct allocation
page execute and read and write
2EB4000
heap
page read and write
65A000
heap
page read and write
23788000
heap
page read and write
2C9C000
stack
page read and write
5021000
heap
page read and write
79F0000
trusted library allocation
page read and write
2EB5000
heap
page read and write
3311000
heap
page read and write
77B0000
trusted library allocation
page read and write
7660000
heap
page execute and read and write
5368000
heap
page read and write
2220000
heap
page read and write
7B59000
heap
page read and write
49E0000
trusted library allocation
page execute and read and write
7AF3000
heap
page read and write
3311000
heap
page read and write
346A000
heap
page read and write
3354000
heap
page read and write
2FA0000
direct allocation
page read and write
3319000
heap
page read and write
3660000
heap
page read and write
7BD0000
direct allocation
page read and write
611000
heap
page read and write
7930000
trusted library allocation
page execute and read and write
5402000
heap
page read and write
5021000
heap
page read and write
400000
system
page execute and read and write
2397C000
heap
page read and write
3310000
heap
page read and write
5D9000
heap
page read and write
83F0000
trusted library allocation
page execute and read and write
7B5D000
heap
page read and write
2FD8000
heap
page read and write
2EB5000
heap
page read and write
7C10000
direct allocation
page read and write
656000
heap
page read and write
7B5D000
heap
page read and write
4FC0000
trusted library allocation
page read and write
237A3000
heap
page read and write
332E000
heap
page read and write
6F66000
remote allocation
page execute and read and write
5D2000
heap
page read and write
23F30000
unclassified section
page execute and read and write
7690000
heap
page read and write
7714000
heap
page read and write
485F000
stack
page read and write
31A3000
heap
page read and write
3331000
heap
page read and write
3311000
heap
page read and write
2EB4000
heap
page read and write
3311000
heap
page read and write
A3F000
stack
page read and write
2EB4000
heap
page read and write
536C000
heap
page read and write
331C000
heap
page read and write
751E000
stack
page read and write
409000
unkown
page read and write
5360000
trusted library allocation
page read and write
755E000
stack
page read and write
49F0000
heap
page read and write
5021000
heap
page read and write
23811000
heap
page read and write
98000
stack
page read and write
26FC000
stack
page read and write
30C5000
heap
page read and write
3331000
heap
page read and write
5F5000
heap
page read and write
491A000
trusted library allocation
page execute and read and write
79C0000
trusted library allocation
page read and write
5D9000
heap
page read and write
331C000
heap
page read and write
2B14000
heap
page read and write
5021000
heap
page read and write
2EB4000
heap
page read and write
3325000
heap
page read and write
7B80000
direct allocation
page read and write
672000
heap
page read and write
4E80000
heap
page read and write
2EB5000
heap
page read and write
618000
heap
page read and write
78A0000
heap
page read and write
4920000
trusted library allocation
page read and write
2225000
heap
page read and write
28D9000
heap
page read and write
4F1F000
stack
page read and write
7B5C000
heap
page read and write
5FE9000
trusted library allocation
page read and write
7F210000
trusted library allocation
page execute and read and write
76F7000
heap
page read and write
3321000
heap
page read and write
32B0000
heap
page read and write
8AB0000
trusted library allocation
page read and write
333A000
heap
page read and write
409000
unkown
page write copy
335A000
heap
page read and write
331C000
heap
page read and write
2D00000
heap
page read and write
550000
heap
page read and write
5657000
heap
page read and write
6566000
remote allocation
page execute and read and write
2E20000
heap
page read and write
2BF0000
heap
page read and write
647000
heap
page read and write
23710000
heap
page read and write
333C000
heap
page read and write
3421000
heap
page read and write
2317F000
stack
page read and write
2EB4000
heap
page read and write
5021000
heap
page read and write
6009000
trusted library allocation
page read and write
3333000
heap
page read and write
337C000
heap
page read and write
432000
unkown
page read and write
3398000
heap
page read and write
5021000
heap
page read and write
5F4000
heap
page read and write
780E000
stack
page read and write
78EE000
stack
page read and write
3319000
heap
page read and write
7990000
trusted library allocation
page read and write
2EB0000
heap
page read and write
2EF0000
direct allocation
page read and write
8545000
trusted library allocation
page read and write
333A000
heap
page read and write
7BE0000
direct allocation
page read and write
335B000
heap
page read and write
2EB4000
heap
page read and write
3356000
heap
page read and write
847D000
stack
page read and write
784E000
stack
page read and write
4F9E000
stack
page read and write
68B000
heap
page read and write
23810000
heap
page read and write
331C000
heap
page read and write
83E0000
heap
page read and write
2EB4000
heap
page read and write
71F1000
heap
page read and write
222D000
heap
page read and write
2EB4000
heap
page read and write
49F7000
heap
page read and write
4868000
heap
page read and write
4DE0000
trusted library allocation
page read and write
3068000
heap
page read and write
3460000
heap
page read and write
78A5000
heap
page read and write
5F4000
heap
page read and write
235FF000
stack
page read and write
2FFC000
heap
page read and write
3321000
heap
page read and write
28DA000
heap
page read and write
7A70000
heap
page read and write
3323000
heap
page read and write
2F80000
direct allocation
page read and write
5360000
trusted library allocation
page read and write
2F28000
heap
page read and write
23903000
heap
page read and write
27D0000
heap
page read and write
67D000
stack
page read and write
2F3F000
stack
page read and write
2150000
heap
page read and write
2F20000
direct allocation
page read and write
5F4000
heap
page read and write
3311000
heap
page read and write
333C000
heap
page read and write
B0B6000
direct allocation
page execute and read and write
612000
heap
page read and write
2B14000
heap
page read and write
7711000
heap
page read and write
2C5C000
stack
page read and write
2A7C000
stack
page read and write
77C0000
trusted library allocation
page read and write
A7E000
stack
page read and write
5E5000
heap
page read and write
3321000
heap
page read and write
3311000
heap
page read and write
4940000
trusted library allocation
page read and write
230D0000
direct allocation
page read and write
2B14000
heap
page read and write
2B14000
heap
page read and write
2EB5000
heap
page read and write
502C000
heap
page read and write
792D000
stack
page read and write
2353D000
stack
page read and write
771D000
heap
page read and write
3476000
heap
page read and write
5166000
remote allocation
page execute and read and write
337C000
heap
page read and write
5E5000
heap
page read and write
331C000
heap
page read and write
7B68000
heap
page read and write
3580000
heap
page read and write
BCF000
stack
page read and write
68F000
heap
page read and write
642000
heap
page read and write
2B70000
heap
page read and write
3686000
heap
page read and write
88F6000
heap
page read and write
7AF9000
heap
page read and write
237CC000
heap
page read and write
237F4000
heap
page read and write
21AE000
stack
page read and write
3476000
heap
page read and write
2B6E000
unkown
page read and write
32A0000
trusted library section
page read and write
2F60000
heap
page read and write
3469000
heap
page read and write
3440000
heap
page read and write
45D000
system
page execute and read and write
344F000
heap
page read and write
2337C000
stack
page read and write
5021000
heap
page read and write
7C60000
direct allocation
page read and write
27F0000
heap
page read and write
5021000
heap
page read and write
8862000
heap
page read and write
5617000
trusted library allocation
page read and write
5E5000
heap
page read and write
331E000
heap
page read and write
23811000
heap
page read and write
23F8C000
unclassified section
page execute and read and write
5010000
heap
page read and write
88E5000
heap
page read and write
32B8000
heap
page read and write
7680000
trusted library allocation
page read and write
7A50000
direct allocation
page read and write
3378000
heap
page read and write
3469000
heap
page read and write
3334000
heap
page read and write
49D0000
heap
page readonly
4CA1000
heap
page read and write
91B0000
direct allocation
page execute and read and write
3358000
heap
page read and write
400000
unkown
page readonly
5021000
heap
page read and write
7BE000
stack
page read and write
2F00000
direct allocation
page read and write
5021000
heap
page read and write
3320000
heap
page read and write
7D36000
heap
page read and write
6CD000
stack
page read and write
434000
unkown
page readonly
474000
unkown
page readonly
874C000
stack
page read and write
331B000
heap
page read and write
8850000
heap
page read and write
5021000
heap
page read and write
503F000
trusted library allocation
page read and write
69E000
heap
page read and write
640000
heap
page read and write
61D000
heap
page read and write
3325000
heap
page read and write
3320000
heap
page read and write
3442000
heap
page read and write
5E9000
heap
page read and write
7B5C000
heap
page read and write
401000
unkown
page execute read
5E5000
heap
page read and write
7C00000
direct allocation
page read and write
2B2F000
stack
page read and write
233BE000
stack
page read and write
7BB0000
direct allocation
page read and write
23789000
heap
page read and write
3331000
heap
page read and write
3311000
heap
page read and write
5021000
heap
page read and write
8A60000
trusted library allocation
page read and write
407000
unkown
page readonly
4EDE000
stack
page read and write
3311000
heap
page read and write
2343B000
stack
page read and write
4CA1000
heap
page read and write
5021000
heap
page read and write
5021000
heap
page read and write
28DF000
heap
page read and write
232DF000
stack
page read and write
7AF6000
heap
page read and write
7A4B000
stack
page read and write
2380000
heap
page read and write
331E000
heap
page read and write
786E000
stack
page read and write
2F30000
direct allocation
page read and write
333E000
heap
page read and write
7D0D000
stack
page read and write
4E10000
heap
page read and write
23F09000
unclassified section
page execute and read and write
2902000
heap
page read and write
643000
heap
page read and write
5021000
heap
page read and write
79A0000
trusted library allocation
page read and write
3310000
heap
page read and write
23660000
direct allocation
page read and write
234BC000
stack
page read and write
23807000
heap
page read and write
7AEE000
heap
page read and write
3680000
heap
page read and write
3348000
heap
page read and write
3334000
heap
page read and write
5360000
trusted library allocation
page read and write
344F000
heap
page read and write
337C000
heap
page read and write
7B70000
direct allocation
page read and write
4AD0000
heap
page read and write
7B64000
heap
page read and write
32EF000
stack
page read and write
2333C000
stack
page read and write
2BDF000
stack
page read and write
334F000
heap
page read and write
2FD0000
heap
page read and write
3378000
heap
page read and write
2B14000
heap
page read and write
27A0000
heap
page read and write
3327000
heap
page read and write
5536000
heap
page read and write
84C0000
heap
page read and write
27CF000
stack
page read and write
230F0000
direct allocation
page read and write
62A000
heap
page read and write
23711000
heap
page read and write
333E000
heap
page read and write
4F50000
heap
page execute and read and write
2BD0000
heap
page read and write
239DA000
heap
page read and write
429000
unkown
page read and write
2F20000
heap
page read and write
7B5B000
heap
page read and write
3325000
heap
page read and write
8852000
heap
page read and write
400000
unkown
page readonly
7070000
direct allocation
page read and write
335B000
heap
page read and write
655000
heap
page read and write
2E00000
heap
page read and write
2EC0000
heap
page read and write
2EB4000
heap
page read and write
3335000
heap
page read and write
77A9000
heap
page read and write
There are 809 hidden memdumps, click here to show them.