IOC Report
PO Tournefortian2453525525235235623425523235.exe

loading gif

Files

File Path
Type
Category
Malicious
PO Tournefortian2453525525235235623425523235.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Sammentrykket.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\Sammentrykket.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\efterplaprernes\Shakya\memorized\Heptandrous.Arr
ASCII text, with very long lines (51991), with no line terminators
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_Sammentrykket.ex_cdfd49ac3b26af801454be8ec917eccd673abd_e2f5391c_b8644a7e-ca96-4b2b-b9fa-9dcfc50dcc2a\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2F81.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Jul 26 21:56:40 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER302E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER304E.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ig332v4d.ytz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_siybcszv.ei5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\efterplaprernes\Shakya\memorized\Biteless96.Arb16
data
dropped
C:\Users\user\AppData\Local\efterplaprernes\Shakya\memorized\Deracinated215.ban
data
dropped
C:\Users\user\AppData\Local\efterplaprernes\Shakya\memorized\Frankincensed.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\efterplaprernes\Shakya\memorized\Laminas\decasualized.nie
data
dropped
C:\Users\user\AppData\Local\efterplaprernes\Shakya\memorized\Laminas\satsbilleder.min
data
dropped
C:\Users\user\AppData\Local\efterplaprernes\Shakya\memorized\Laminas\sharins.dri
TTComp archive data, binary, 4K dictionary
dropped
C:\Users\user\AppData\Local\efterplaprernes\Shakya\memorized\Laminas\tepottes.non
data
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PO Tournefortian2453525525235235623425523235.exe
"C:\Users\user\Desktop\PO Tournefortian2453525525235235623425523235.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Typograferer=Get-Content 'C:\Users\user\AppData\Local\efterplaprernes\Shakya\memorized\Heptandrous.Arr';$Anskueliggjordes=$Typograferer.SubString(51945,3);.$Anskueliggjordes($Typograferer)"
malicious
C:\Users\user\AppData\Local\Temp\Sammentrykket.exe
"C:\Users\user\AppData\Local\Temp\Sammentrykket.exe"
malicious
C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe
"C:\Program Files\Realtek\Audio\HDA\RAVCpl64.exe" -s
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 5076 -s 1896

URLs

Name
IP
Malicious
https://villa-ventura.com/FPkXcnPDrjTal168.bin
185.90.59.130
http://pesterbdd.com/images/Pester.png4
unknown
https://github.com/Pester/Pester4
unknown
http://nuget.org/NuGet.exe
unknown
https://villa-ventura.com/
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://aka.ms/pscore6lB
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
unknown
https://contoso.com/Icon
unknown
http://inference.location.live.com11111111-1111-1111-1111-111111111111https://partnernext-inference.
unknown
http://www.quovadis.bm0
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.ibm.com/data/dtd/v11/ibmxhtml1-transitional.dtd-//W3O//DTD
unknown
https://ocsp.quovadisoffshore.com0
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.gopher.ftp://ftp.
unknown
http://www.apache.org/licenses/LICENSE-2.0.html4
unknown
https://github.com/Pester/Pester
unknown
https://villa-ventura.com/FPkXcnPDrjTal168.binwt?
unknown
There are 13 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
villa-ventura.com
185.90.59.130

IPs

IP
Domain
Country
Malicious
185.90.59.130
villa-ventura.com
Portugal

Registry

Path
Value
Malicious
\REGISTRY\A\{b30ed11d-829e-f800-0143-efae422928e1}\Root\InventoryApplicationFile\sammentrykket.ex|c4ce3ffbe04115b3
ProgramId
\REGISTRY\A\{b30ed11d-829e-f800-0143-efae422928e1}\Root\InventoryApplicationFile\sammentrykket.ex|c4ce3ffbe04115b3
FileId
\REGISTRY\A\{b30ed11d-829e-f800-0143-efae422928e1}\Root\InventoryApplicationFile\sammentrykket.ex|c4ce3ffbe04115b3
LowerCaseLongPath
\REGISTRY\A\{b30ed11d-829e-f800-0143-efae422928e1}\Root\InventoryApplicationFile\sammentrykket.ex|c4ce3ffbe04115b3
LongPathHash
\REGISTRY\A\{b30ed11d-829e-f800-0143-efae422928e1}\Root\InventoryApplicationFile\sammentrykket.ex|c4ce3ffbe04115b3
Name
\REGISTRY\A\{b30ed11d-829e-f800-0143-efae422928e1}\Root\InventoryApplicationFile\sammentrykket.ex|c4ce3ffbe04115b3
OriginalFileName
\REGISTRY\A\{b30ed11d-829e-f800-0143-efae422928e1}\Root\InventoryApplicationFile\sammentrykket.ex|c4ce3ffbe04115b3
Publisher
\REGISTRY\A\{b30ed11d-829e-f800-0143-efae422928e1}\Root\InventoryApplicationFile\sammentrykket.ex|c4ce3ffbe04115b3
Version
\REGISTRY\A\{b30ed11d-829e-f800-0143-efae422928e1}\Root\InventoryApplicationFile\sammentrykket.ex|c4ce3ffbe04115b3
BinFileVersion
\REGISTRY\A\{b30ed11d-829e-f800-0143-efae422928e1}\Root\InventoryApplicationFile\sammentrykket.ex|c4ce3ffbe04115b3
BinaryType
\REGISTRY\A\{b30ed11d-829e-f800-0143-efae422928e1}\Root\InventoryApplicationFile\sammentrykket.ex|c4ce3ffbe04115b3
ProductName
\REGISTRY\A\{b30ed11d-829e-f800-0143-efae422928e1}\Root\InventoryApplicationFile\sammentrykket.ex|c4ce3ffbe04115b3
ProductVersion
\REGISTRY\A\{b30ed11d-829e-f800-0143-efae422928e1}\Root\InventoryApplicationFile\sammentrykket.ex|c4ce3ffbe04115b3
LinkDate
\REGISTRY\A\{b30ed11d-829e-f800-0143-efae422928e1}\Root\InventoryApplicationFile\sammentrykket.ex|c4ce3ffbe04115b3
BinProductVersion
\REGISTRY\A\{b30ed11d-829e-f800-0143-efae422928e1}\Root\InventoryApplicationFile\sammentrykket.ex|c4ce3ffbe04115b3
AppxPackageFullName
\REGISTRY\A\{b30ed11d-829e-f800-0143-efae422928e1}\Root\InventoryApplicationFile\sammentrykket.ex|c4ce3ffbe04115b3
AppxPackageRelativeId
\REGISTRY\A\{b30ed11d-829e-f800-0143-efae422928e1}\Root\InventoryApplicationFile\sammentrykket.ex|c4ce3ffbe04115b3
Size
\REGISTRY\A\{b30ed11d-829e-f800-0143-efae422928e1}\Root\InventoryApplicationFile\sammentrykket.ex|c4ce3ffbe04115b3
Language
\REGISTRY\A\{b30ed11d-829e-f800-0143-efae422928e1}\Root\InventoryApplicationFile\sammentrykket.ex|c4ce3ffbe04115b3
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018800E72D32676
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
22040000
unclassified section
page execute and read and write
malicious
50C0000
unkown
page execute and read and write
malicious
360D000
remote allocation
page execute and read and write
malicious
AF9D000
direct allocation
page execute and read and write
malicious
2393000
unkown
page read and write
597F000
unkown
page execute and read and write
4B00000
heap
page read and write
8AFE000
stack
page read and write
50B0000
heap
page read and write
32B0000
trusted library allocation
page read and write
2409000
unkown
page read and write
7FE0000
trusted library allocation
page read and write
A60000
heap
page read and write
48C7000
heap
page read and write
5848000
trusted library allocation
page read and write
784E000
heap
page read and write
8FE0000
direct allocation
page execute and read and write
4C50000
heap
page read and write
7270000
direct allocation
page read and write
7C8000
unkown
page readonly
23BD000
unkown
page read and write
23CFF000
unclassified section
page execute and read and write
8A50000
heap
page read and write
71A0000
direct allocation
page read and write
48C7000
heap
page read and write
23CA000
unkown
page read and write
9B0000
unkown
page read and write
2431000
unkown
page read and write
493A000
heap
page read and write
7841000
heap
page read and write
7C2000
unkown
page read and write
4AF0000
direct allocation
page read and write
4C30000
direct allocation
page read and write
7FF0000
trusted library allocation
page read and write
300E000
stack
page read and write
23ED000
unkown
page read and write
240F000
unkown
page read and write
20210000
heap
page read and write
32C9000
trusted library allocation
page read and write
2C6F000
stack
page read and write
20A1D000
direct allocation
page execute and read and write
A20000
unkown
page read and write
492E000
heap
page read and write
3CB0000
unkown
page read and write
493A000
heap
page read and write
7260000
direct allocation
page read and write
7210000
direct allocation
page read and write
7A0E000
stack
page read and write
8C0000
unkown
page readonly
2B6F000
stack
page read and write
1E0000
heap
page read and write
3CC0000
unkown
page execute and read and write
2F2E000
stack
page read and write
4939000
heap
page read and write
A70000
unkown
page read and write
782000
unkown
page read and write
408000
unkown
page readonly
8CA000
heap
page read and write
7C5000
unkown
page readonly
4AE0000
direct allocation
page read and write
AE0000
heap
page read and write
205A0000
heap
page read and write
33E0000
trusted library allocation
page read and write
4830000
direct allocation
page read and write
50A0000
heap
page execute and read and write
637F000
unkown
page execute and read and write
240F000
unkown
page read and write
2460000
heap
page read and write
23C4000
unkown
page read and write
A30000
unkown
page read and write
48DE000
heap
page read and write
7910000
heap
page execute and read and write
33A0000
unkown
page read and write
8D70000
trusted library allocation
page read and write
50C1000
trusted library allocation
page read and write
31EF000
heap
page read and write
570000
unkown
page readonly
2447000
unkown
page read and write
2443000
unkown
page read and write
2624000
heap
page read and write
492E000
heap
page read and write
4A1F000
stack
page read and write
4890000
heap
page read and write
503E000
stack
page read and write
764E000
stack
page read and write
8BA9000
heap
page read and write
10000
heap
page read and write
8C27000
heap
page read and write
48E2000
heap
page read and write
3400000
heap
page read and write
3BA0000
unkown
page read and write
20C40000
unclassified section
page execute and read and write
A30000
unkown
page read and write
2418000
unkown
page read and write
23ED000
unkown
page read and write
5FB000
heap
page read and write
2386000
unkown
page read and write
2363000
heap
page read and write
8F9C000
stack
page read and write
2620000
heap
page read and write
7280000
direct allocation
page read and write
2F6E000
stack
page read and write
30B0000
unkown
page read and write
70280000
unkown
page readonly
242C000
unkown
page read and write
3110000
heap
page read and write
8FB0000
trusted library allocation
page read and write
2354000
heap
page read and write
666000
heap
page read and write
48C0000
heap
page read and write
2C5F000
stack
page read and write
13A000
stack
page read and write
77C0000
heap
page read and write
7C8000
unkown
page readonly
4890000
heap
page read and write
7829000
heap
page read and write
4891000
heap
page read and write
2407000
unkown
page read and write
7230000
direct allocation
page read and write
321D000
heap
page read and write
22E0000
unkown
page read and write
296F000
stack
page read and write
3212000
heap
page read and write
2B8C000
stack
page read and write
32E0000
trusted library allocation
page read and write
33C0000
trusted library allocation
page execute and read and write
612A000
trusted library allocation
page read and write
1FB70000
direct allocation
page read and write
472E000
stack
page read and write
4A9E000
stack
page read and write
8F0B000
stack
page read and write
48E2000
heap
page read and write
3180000
heap
page read and write
2059F000
stack
page read and write
33A8000
trusted library allocation
page read and write
60E9000
trusted library allocation
page read and write
4750000
heap
page read and write
8B40000
trusted library allocation
page execute and read and write
F0000
direct allocation
page read and write
7A60000
trusted library allocation
page read and write
649000
unkown
page execute read
48E2000
heap
page read and write
2396000
unkown
page read and write
48D9000
heap
page read and write
30000
heap
page read and write
200EE000
stack
page read and write
626000
unkown
page execute read
72C0000
direct allocation
page read and write
48D9000
heap
page read and write
AE5000
heap
page read and write
48E2000
heap
page read and write
2463000
heap
page read and write
7420000
heap
page read and write
50A5000
heap
page execute and read and write
31B0000
unkown
page readonly
3290000
trusted library section
page read and write
9B9D000
direct allocation
page execute and read and write
5D0000
heap
page read and write
2468000
heap
page read and write
6B0000
unkown
page readonly
23C1000
unkown
page read and write
48C7000
heap
page read and write
880000
heap
page read and write
40A000
unkown
page read and write
48A7000
heap
page read and write
A59D000
direct allocation
page execute and read and write
7220000
direct allocation
page read and write
23F2000
unkown
page read and write
1FB40000
direct allocation
page read and write
32A0000
trusted library allocation
page read and write
493A000
heap
page read and write
22B0000
unkown
page read and write
685000
heap
page read and write
8C2A000
heap
page read and write
23B5000
unkown
page read and write
8CD000
heap
page read and write
2422000
unkown
page read and write
2006D000
stack
page read and write
71B0000
direct allocation
page read and write
23DA000
unkown
page read and write
238A000
unkown
page read and write
22E0000
unkown
page read and write
23FE000
unkown
page read and write
2386000
unkown
page read and write
7FC0000
trusted library allocation
page read and write
243C000
unkown
page read and write
13A000
stack
page read and write
304E000
stack
page read and write
23AF000
unkown
page read and write
2710000
heap
page read and write
286F000
stack
page read and write
4755000
heap
page read and write
2FAD000
stack
page read and write
551000
unkown
page readonly
3CB0000
unkown
page read and write
239C000
unkown
page read and write
7FBF0000
trusted library allocation
page execute and read and write
23CD000
unkown
page read and write
20290000
remote allocation
page read and write
32E2000
trusted library allocation
page read and write
8D80000
trusted library allocation
page read and write
31AC000
heap
page read and write
690000
heap
page read and write
400000
unkown
page readonly
8FF0000
direct allocation
page execute and read and write
228FF000
unclassified section
page execute and read and write
4C20000
direct allocation
page read and write
4868000
heap
page read and write
76C6000
heap
page read and write
7F60000
trusted library allocation
page read and write
239A000
unkown
page read and write
180000
unkown
page read and write
60C9000
trusted library allocation
page read and write
32DA000
trusted library allocation
page execute and read and write
AE5000
heap
page read and write
48E2000
heap
page read and write
7900000
trusted library allocation
page read and write
2431000
unkown
page read and write
2350000
heap
page read and write
72A0000
direct allocation
page read and write
2002D000
stack
page read and write
A70000
unkown
page read and write
1F0000
unkown
page readonly
AE0000
heap
page read and write
48D2000
heap
page read and write
276F000
stack
page read and write
A60000
heap
page read and write
3265000
heap
page read and write
3205000
heap
page read and write
3AA6000
unkown
page read and write
7F80000
trusted library allocation
page read and write
2360000
heap
page read and write
7FD0000
trusted library allocation
page read and write
23E0000
unkown
page read and write
286F000
stack
page read and write
4939000
heap
page read and write
5B8000
heap
page read and write
48C7000
heap
page read and write
4FAE000
stack
page read and write
245E000
unkown
page read and write
48A7000
heap
page read and write
E1E000
stack
page read and write
48DA000
heap
page read and write
2030F000
stack
page read and write
5B8000
heap
page read and write
72B0000
direct allocation
page read and write
8D0000
unkown
page read and write
2294000
unkown
page read and write
78C0000
heap
page read and write
23E0000
unkown
page read and write
2350000
heap
page read and write
AEE000
heap
page read and write
4939000
heap
page read and write
20290000
remote allocation
page read and write
2045C000
stack
page read and write
560000
unkown
page read and write
20BC0000
direct allocation
page execute and read and write
A40000
unkown
page read and write
208F0000
direct allocation
page execute and read and write
23BF000
unkown
page read and write
23B5000
unkown
page read and write
AEE000
heap
page read and write
30B0000
unkown
page read and write
1F0000
unkown
page readonly
2440000
unkown
page read and write
2470000
unkown
page read and write
2FC0000
heap
page read and write
30000
heap
page read and write
6A6000
heap
page read and write
2360000
heap
page read and write
8B92000
heap
page read and write
1FB20000
direct allocation
page read and write
D1E000
stack
page read and write
33A0000
unkown
page read and write
400000
unkown
page readonly
492E000
heap
page read and write
3188000
heap
page read and write
2B20000
heap
page read and write
401000
unkown
page execute read
7F70000
trusted library allocation
page read and write
232FF000
unclassified section
page execute and read and write
1FFEF000
stack
page read and write
6288000
trusted library allocation
page read and write
713E000
stack
page read and write
32D0000
trusted library allocation
page read and write
4FB0000
heap
page execute and read and write
23AB000
unkown
page read and write
7888000
heap
page read and write
8D0000
unkown
page read and write
8B86000
heap
page read and write
72D0000
direct allocation
page read and write
B9F000
stack
page read and write
2427000
unkown
page read and write
70FE000
stack
page read and write
786000
unkown
page read and write
266D000
stack
page read and write
48A7000
heap
page read and write
48C0000
heap
page read and write
4939000
heap
page read and write
60000
direct allocation
page read and write
237E000
unkown
page read and write
805000
unkown
page readonly
786B000
heap
page read and write
492E000
heap
page read and write
5E8000
unkown
page execute read
48DE000
heap
page read and write
492E000
heap
page read and write
804B000
stack
page read and write
201BE000
stack
page read and write
9BE000
stack
page read and write
31EA000
heap
page read and write
20A19000
direct allocation
page execute and read and write
9B0000
unkown
page read and write
5B0000
heap
page read and write
580000
unkown
page readonly
7831000
heap
page read and write
243C000
unkown
page read and write
570000
unkown
page readonly
2B5F000
stack
page read and write
23AB000
unkown
page read and write
8000000
trusted library allocation
page read and write
23BA000
unkown
page read and write
2D70000
heap
page read and write
4840000
direct allocation
page read and write
7250000
direct allocation
page read and write
768E000
stack
page read and write
2443000
unkown
page read and write
76C2000
heap
page read and write
2017E000
stack
page read and write
401000
unkown
page execute read
23F6000
unkown
page read and write
7190000
direct allocation
page read and write
2413000
unkown
page read and write
7C5000
unkown
page readonly
2463000
heap
page read and write
23E4000
unkown
page read and write
7C8000
unkown
page readonly
48BB000
heap
page read and write
20000
unkown
page readonly
308E000
stack
page read and write
30AE000
stack
page read and write
70281000
unkown
page execute read
8C39000
heap
page read and write
B0000
direct allocation
page read and write
2FC6000
heap
page read and write
2A6F000
stack
page read and write
4C40000
direct allocation
page read and write
4939000
heap
page read and write
7F90000
trusted library allocation
page read and write
551000
unkown
page readonly
789000
unkown
page read and write
2C6F000
stack
page read and write
4C00000
direct allocation
page read and write
5EA000
unkown
page execute read
7200000
direct allocation
page read and write
32C0000
trusted library allocation
page read and write
149000
stack
page read and write
400D000
remote allocation
page execute and read and write
2427000
unkown
page read and write
B0000
direct allocation
page read and write
4E0000
unkown
page read and write
22D0000
unkown
page readonly
4B01000
heap
page read and write
8F5E000
stack
page read and write
7A70000
trusted library allocation
page execute and read and write
2BC8000
stack
page read and write
2A6F000
stack
page read and write
78A0000
heap
page read and write
239A000
unkown
page read and write
23FB000
unkown
page read and write
2294000
unkown
page read and write
7845000
heap
page read and write
202CE000
stack
page read and write
4939000
heap
page read and write
23EA000
unkown
page read and write
7F50000
trusted library allocation
page read and write
7AC000
unkown
page read and write
20290000
remote allocation
page read and write
4E0000
unkown
page read and write
AF0000
unkown
page readonly
2403000
unkown
page read and write
2447000
unkown
page read and write
7240000
direct allocation
page read and write
20000
unkown
page readonly
4754000
heap
page read and write
2418000
unkown
page read and write
48DA000
heap
page read and write
B99D000
direct allocation
page execute and read and write
89D7000
stack
page read and write
2458000
unkown
page read and write
87E000
stack
page read and write
798E000
stack
page read and write
3300000
trusted library allocation
page read and write
69E000
heap
page read and write
23CA000
unkown
page read and write
5EC000
unkown
page execute read
4939000
heap
page read and write
32B3000
trusted library allocation
page execute and read and write
48DA000
heap
page read and write
10000
heap
page read and write
E80000
unkown
page readonly
23DA000
unkown
page read and write
48C0000
heap
page read and write
1FB30000
direct allocation
page read and write
8B70000
heap
page read and write
7856000
heap
page read and write
1FFAE000
stack
page read and write
685000
heap
page read and write
492E000
heap
page read and write
206C3000
heap
page read and write
4ADF000
stack
page read and write
805000
unkown
page readonly
22B0000
unkown
page read and write
69E000
heap
page read and write
5EE000
unkown
page execute read
48C0000
heap
page read and write
48DD000
heap
page read and write
8B79000
heap
page read and write
A40000
unkown
page read and write
8C24000
heap
page read and write
3390000
heap
page readonly
266D000
stack
page read and write
400000
unkown
page readonly
611000
heap
page read and write
1FB80000
direct allocation
page read and write
266E000
stack
page read and write
7804000
heap
page read and write
23EA000
unkown
page read and write
2468000
heap
page read and write
7A6000
unkown
page read and write
7B3000
unkown
page read and write
7410000
heap
page read and write
23F2000
unkown
page read and write
296F000
stack
page read and write
32B4000
trusted library allocation
page read and write
611000
heap
page read and write
48D2000
heap
page read and write
8FD0000
trusted library allocation
page execute and read and write
23A5000
unkown
page read and write
23E4000
unkown
page read and write
20871000
heap
page read and write
7029D000
unkown
page read and write
40A000
unkown
page write copy
8CF000
heap
page read and write
2049E000
stack
page read and write
3AA6000
unkown
page read and write
1FB50000
direct allocation
page read and write
46C0000
unkown
page execute and read and write
40A000
unkown
page write copy
888000
heap
page read and write
3090000
heap
page read and write
242C000
unkown
page read and write
23BA000
unkown
page read and write
2035D000
stack
page read and write
1FB10000
direct allocation
page read and write
3280000
trusted library section
page read and write
5120000
trusted library allocation
page read and write
690000
heap
page read and write
8ECC000
stack
page read and write
149000
stack
page read and write
245E000
unkown
page read and write
239C000
unkown
page read and write
919D000
direct allocation
page execute and read and write
5D0000
heap
page read and write
2407000
unkown
page read and write
23FE000
unkown
page read and write
5F0000
unkown
page execute read
2422000
unkown
page read and write
7D00000
trusted library allocation
page read and write
8C4000
heap
page read and write
334E000
stack
page read and write
23A1000
unkown
page read and write
5F2000
unkown
page execute read
401000
unkown
page execute read
4850000
direct allocation
page read and write
49DE000
stack
page read and write
8B3F000
stack
page read and write
238A000
unkown
page read and write
23C1000
unkown
page read and write
5FB000
heap
page read and write
3AA3000
unkown
page read and write
A20000
unkown
page read and write
7290000
direct allocation
page read and write
8C0000
unkown
page readonly
C090000
trusted library allocation
page read and write
7FA0000
trusted library allocation
page read and write
23F6000
unkown
page read and write
60D1000
trusted library allocation
page read and write
48E2000
heap
page read and write
2393000
unkown
page read and write
8BF000
stack
page read and write
3AA0000
unkown
page read and write
89E0000
trusted library allocation
page execute and read and write
4F6E000
stack
page read and write
4940000
heap
page read and write
237E000
unkown
page read and write
23C4000
unkown
page read and write
77C000
unkown
page read and write
71C0000
direct allocation
page read and write
48E2000
heap
page read and write
2470000
unkown
page read and write
276F000
stack
page read and write
4939000
heap
page read and write
48A7000
heap
page read and write
408000
unkown
page readonly
1FF2E000
stack
page read and write
180D000
remote allocation
page execute and read and write
48DD000
heap
page read and write
70296000
unkown
page readonly
2354000
heap
page read and write
8B2000
heap
page read and write
32E5000
trusted library allocation
page execute and read and write
9C0000
heap
page read and write
7AA000
unkown
page read and write
2449000
unkown
page read and write
4892000
heap
page read and write
23BD000
unkown
page read and write
8C49000
heap
page read and write
3AA0000
unkown
page read and write
492E000
heap
page read and write
48DE000
heap
page read and write
239E000
unkown
page read and write
220D000
remote allocation
page execute and read and write
2BCD000
stack
page read and write
2403000
unkown
page read and write
C9F000
stack
page read and write
1FF6F000
stack
page read and write
666000
heap
page read and write
239E000
unkown
page read and write
7F10000
heap
page read and write
60000
direct allocation
page read and write
408000
unkown
page readonly
6A6000
heap
page read and write
60C1000
trusted library allocation
page read and write
48D2000
heap
page read and write
5B0000
heap
page read and write
4FFE000
stack
page read and write
19A000
stack
page read and write
3AA3000
unkown
page read and write
4754000
heap
page read and write
26AE000
stack
page read and write
20875000
heap
page read and write
580000
unkown
page readonly
89F0000
trusted library allocation
page read and write
7BF000
stack
page read and write
33D7000
heap
page read and write
4F2C000
stack
page read and write
20BBC000
direct allocation
page execute and read and write
79CF000
stack
page read and write
2449000
unkown
page read and write
6B0000
unkown
page readonly
3407000
heap
page read and write
2458000
unkown
page read and write
2396000
unkown
page read and write
71E0000
direct allocation
page read and write
23AF000
unkown
page read and write
20748000
heap
page read and write
180000
unkown
page read and write
8A40000
trusted library allocation
page read and write
325B000
heap
page read and write
AF0000
unkown
page readonly
2012F000
stack
page read and write
492E000
heap
page read and write
6D7F000
unkown
page execute and read and write
492E000
heap
page read and write
8B6000
heap
page read and write
32BD000
trusted library allocation
page execute and read and write
1FB90000
direct allocation
page read and write
8FC0000
trusted library allocation
page read and write
338E000
stack
page read and write
2363000
heap
page read and write
320F000
heap
page read and write
507E000
stack
page read and write
7A4D000
stack
page read and write
1660000
remote allocation
page execute and read and write
4860000
heap
page read and write
7FB0000
trusted library allocation
page read and write
E80000
unkown
page readonly
7BF000
stack
page read and write
8C41000
heap
page read and write
4B01000
heap
page read and write
B0000
direct allocation
page read and write
401000
unkown
page execute read
CA0000
heap
page read and write
1E5000
heap
page read and write
98000
stack
page read and write
4890000
heap
page read and write
2409000
unkown
page read and write
3BA0000
unkown
page read and write
48E2000
heap
page read and write
805000
unkown
page readonly
71F0000
direct allocation
page read and write
31B9000
heap
page read and write
33D0000
heap
page read and write
2413000
unkown
page read and write
2440000
unkown
page read and write
2B6F000
stack
page read and write
31B0000
unkown
page readonly
4A20000
heap
page read and write
23CD000
unkown
page read and write
2460000
heap
page read and write
23A5000
unkown
page read and write
8FA0000
trusted library allocation
page read and write
5217000
trusted library allocation
page read and write
22D0000
unkown
page readonly
7A4000
unkown
page read and write
4939000
heap
page read and write
23A1000
unkown
page read and write
120000
direct allocation
page execute and read and write
8C73000
heap
page read and write
21640000
unclassified section
page execute and read and write
499E000
stack
page read and write
48E2000
heap
page read and write
7029F000
unkown
page readonly
35A0000
heap
page read and write
23FB000
unkown
page read and write
C0C9000
trusted library allocation
page read and write
560000
unkown
page read and write
7C5000
unkown
page readonly
2C0D000
remote allocation
page execute and read and write
23BF000
unkown
page read and write
1FB60000
direct allocation
page read and write
339F000
stack
page read and write
There are 613 hidden memdumps, click here to show them.