IOC Report
SDWLLRJcsY.exe

loading gif

Files

File Path
Type
Category
Malicious
SDWLLRJcsY.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Conspect124.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\Conspect124.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Papyr.paa
ASCII text, with very long lines (57490), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hwwrfgsy.dtn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ufsza3e0.hd1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhv9D68.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x6eec0579, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\llsemopjpzfqlbiqwdrulxfexi
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Epochally.Puk
data
dropped
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Hypertragic\Cantilene\brkops.ind
data
dropped
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Hypertragic\Cantilene\dumrians.und
data
dropped
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Hypertragic\Ukr.txt
ASCII text, with very long lines (359), with no line terminators
dropped
C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Tribades.vir
data
dropped
C:\Windows\brandbombernes.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SDWLLRJcsY.exe
"C:\Users\user\Desktop\SDWLLRJcsY.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Headcloths=Get-Content 'C:\Users\user\AppData\Roaming\intercessionate\Favourablies117\sulfonylurea\Papyr.paa';$Antinovels=$Headcloths.SubString(57477,3);.$Antinovels($Headcloths)"
malicious
C:\Users\user\AppData\Local\Temp\Conspect124.exe
"C:\Users\user\AppData\Local\Temp\Conspect124.exe"
malicious
C:\Users\user\AppData\Local\Temp\Conspect124.exe
C:\Users\user\AppData\Local\Temp\Conspect124.exe /stext "C:\Users\user\AppData\Local\Temp\llsemopjpzfqlbiqwdrulxfexi"
malicious
C:\Users\user\AppData\Local\Temp\Conspect124.exe
C:\Users\user\AppData\Local\Temp\Conspect124.exe /stext "C:\Users\user\AppData\Local\Temp\vnfxngzclhxvohwunodvwkzvgosxx"
malicious
C:\Users\user\AppData\Local\Temp\Conspect124.exe
C:\Users\user\AppData\Local\Temp\Conspect124.exe /stext "C:\Users\user\AppData\Local\Temp\fhlpgzkezppayvsywzqpzpmegvkgywqb"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Begunstigelses% -windowstyle minimized $Hjtryksryg=(Get-ItemProperty -Path 'HKCU:\Forseglingens\').Drenching;%Begunstigelses% ($Hjtryksryg)"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Begunstigelses% -windowstyle minimized $Hjtryksryg=(Get-ItemProperty -Path 'HKCU:\Forseglingens\').Drenching;%Begunstigelses% ($Hjtryksryg)"

URLs

Name
IP
Malicious
http://geoplugin.net/json.gpd
unknown
http://geoplugin.net/json.gplH
unknown
http://nuget.org/NuGet.exe
unknown
http://www.imvu.comr
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://geoplugin.net/json.gpl
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://geoplugin.net/json.gp.
unknown
https://contoso.com/License
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://geoplugin.net/json.gp5
unknown
http://geoplugin.net/json.gpy
unknown
https://github.com/Pester/Pester
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://www.google.com
unknown
https://cmgtrading.eu/eODGqfP132.binC
unknown
https://aka.ms/pscore6lB
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
https://cmgtrading.eu/eODGqfP132.bin
185.26.107.57
http://www.nirsoft.net/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://cmgtrading.eu/eODGqfP132.bin
185.26.107.57
http://www.ebuddy.com
unknown
There are 19 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cmgtrading.eu
185.26.107.57
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
107.173.4.16
unknown
United States
malicious
185.26.107.57
cmgtrading.eu
France
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-DSGECX
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-DSGECX
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-DSGECX
time
malicious
HKEY_CURRENT_USER\Hayweed88\Uninstall\Cakiest237\heelers
Armgangen
HKEY_CURRENT_USER\brdbakken\Equableness66\Skvalderen137
inoperculate
HKEY_CURRENT_USER\seers\Uninstall\saleably
zaffers
HKEY_CURRENT_USER\Forseglingens
Drenching
HKEY_CURRENT_USER\Environment
Begunstigelses
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Startup key

Memdumps

Base Address
Regiontype
Protect
Malicious
6F38000
heap
page read and write
malicious
6F38000
heap
page read and write
malicious
6F35000
heap
page read and write
malicious
B5DE000
direct allocation
page execute and read and write
malicious
6F06000
heap
page read and write
malicious
2CF3000
trusted library allocation
page execute and read and write
6F8000
heap
page read and write
85F0000
trusted library allocation
page read and write
504000
heap
page read and write
5961000
trusted library allocation
page read and write
2357C000
heap
page read and write
51C000
heap
page read and write
21E0000
heap
page read and write
220B000
heap
page read and write
2320B000
heap
page read and write
401000
unkown
page execute read
742000
heap
page read and write
7500000
trusted library allocation
page read and write
8ACD000
stack
page read and write
8AD0000
heap
page read and write
227B000
heap
page read and write
2D20000
trusted library allocation
page read and write
36F0000
heap
page read and write
408000
unkown
page readonly
7A0000
heap
page read and write
28DE000
heap
page read and write
85E0000
trusted library allocation
page execute and read and write
7590000
trusted library allocation
page read and write
8A8E000
stack
page read and write
2D25000
trusted library allocation
page execute and read and write
8980000
direct allocation
page read and write
21F5000
heap
page read and write
74B000
heap
page read and write
731000
heap
page read and write
88C000
heap
page read and write
504000
heap
page read and write
473000
system
page execute and read and write
505000
heap
page read and write
A19000
heap
page read and write
520000
heap
page read and write
731000
heap
page read and write
720000
heap
page read and write
735000
heap
page read and write
2DC5000
heap
page execute and read and write
220B000
heap
page read and write
72C000
heap
page read and write
260A000
heap
page read and write
7F67000
stack
page read and write
6F88000
heap
page read and write
67EE000
remote allocation
page execute and read and write
52D3000
trusted library allocation
page read and write
2201000
heap
page read and write
26D1000
heap
page read and write
5309000
trusted library allocation
page read and write
22710000
heap
page read and write
45C000
unkown
page readonly
6F0000
heap
page read and write
45D000
system
page execute and read and write
22F3C000
stack
page read and write
21E0000
heap
page read and write
26D1000
heap
page read and write
220E000
heap
page read and write
7510000
trusted library allocation
page read and write
720000
heap
page read and write
7560000
trusted library allocation
page read and write
2207000
heap
page read and write
504000
heap
page read and write
21F7000
heap
page read and write
7390000
heap
page execute and read and write
500000
heap
page read and write
18F000
stack
page read and write
21E1000
heap
page read and write
883000
heap
page read and write
504000
heap
page read and write
45C000
unkown
page readonly
6F98000
heap
page read and write
2208000
heap
page read and write
21FE000
heap
page read and write
7C8000
heap
page read and write
8060000
heap
page read and write
508000
heap
page read and write
8DDE000
direct allocation
page execute and read and write
91E7000
trusted library allocation
page read and write
2219000
heap
page read and write
505000
heap
page read and write
ABDE000
direct allocation
page execute and read and write
1D4000
heap
page read and write
74B000
heap
page read and write
22BBE000
stack
page read and write
2850000
heap
page read and write
504000
heap
page read and write
21E1000
heap
page read and write
4CE000
stack
page read and write
6F3E000
heap
page read and write
710000
heap
page read and write
235CB000
heap
page read and write
50A2000
trusted library allocation
page read and write
504000
heap
page read and write
23AF9000
unclassified section
page execute and read and write
504000
heap
page read and write
220E000
heap
page read and write
400000
system
page execute and read and write
22D0E000
stack
page read and write
504000
heap
page read and write
2DD0000
heap
page read and write
731000
heap
page read and write
26D1000
heap
page read and write
21EF000
heap
page read and write
46F000
unkown
page readonly
6E80000
direct allocation
page read and write
28CC000
heap
page read and write
2610000
heap
page read and write
8386000
heap
page read and write
7F90000
heap
page read and write
5349000
trusted library allocation
page read and write
26D1000
heap
page read and write
21FE000
heap
page read and write
705F000
stack
page read and write
720000
heap
page read and write
22E50000
heap
page read and write
400000
unkown
page readonly
731000
heap
page read and write
23225000
heap
page read and write
7380000
trusted library allocation
page read and write
74B000
heap
page read and write
6F7E000
heap
page read and write
21FC000
heap
page read and write
7102000
heap
page read and write
235C0000
heap
page read and write
2BD0000
trusted library allocation
page read and write
1D4000
heap
page read and write
7212000
heap
page read and write
2CF0000
trusted library allocation
page read and write
2950000
direct allocation
page read and write
6E60000
direct allocation
page read and write
7222000
heap
page read and write
2D09000
trusted library allocation
page read and write
8940000
direct allocation
page read and write
2CFD000
trusted library allocation
page execute and read and write
1D4000
heap
page read and write
8EF000
stack
page read and write
21E1000
heap
page read and write
4A3000
unkown
page readonly
6B5F000
stack
page read and write
2DCD000
stack
page read and write
220E000
heap
page read and write
2DB0000
trusted library allocation
page read and write
9EE000
stack
page read and write
21F5000
heap
page read and write
23B13000
unclassified section
page execute and read and write
400000
unkown
page readonly
742000
heap
page read and write
21EE000
remote allocation
page execute and read and write
23B20000
unclassified section
page execute and read and write
2205000
heap
page read and write
97DE000
direct allocation
page execute and read and write
21F1000
heap
page read and write
26D1000
heap
page read and write
6B1E000
stack
page read and write
45C000
system
page execute and read and write
920000
heap
page read and write
2CD0000
trusted library section
page read and write
6F32000
heap
page read and write
6E90000
direct allocation
page read and write
2220000
heap
page read and write
6E40000
direct allocation
page read and write
23411000
heap
page read and write
40A000
unkown
page write copy
225D000
heap
page read and write
26D1000
heap
page read and write
220B000
heap
page read and write
21E5000
heap
page read and write
35DF000
stack
page read and write
225D000
heap
page read and write
504000
heap
page read and write
81F000
stack
page read and write
5969000
trusted library allocation
page read and write
23C0000
heap
page read and write
504000
heap
page read and write
6CA0000
heap
page read and write
7300000
trusted library allocation
page read and write
21E1000
heap
page read and write
26D1000
heap
page read and write
7FDB0000
trusted library allocation
page execute and read and write
1D4000
heap
page read and write
2889000
heap
page read and write
570000
heap
page read and write
4A3000
unkown
page readonly
2611000
heap
page read and write
6F28000
heap
page read and write
8A10000
heap
page read and write
40A000
unkown
page write copy
4C0000
heap
page read and write
D3DE000
direct allocation
page execute and read and write
26D1000
heap
page read and write
220E000
heap
page read and write
23BC0000
direct allocation
page read and write
29D0000
heap
page read and write
628000
heap
page read and write
28DC000
heap
page read and write
2611000
heap
page read and write
7520000
trusted library allocation
page read and write
456000
system
page execute and read and write
2201000
heap
page read and write
8100000
trusted library allocation
page read and write
6F88000
heap
page read and write
2D97000
heap
page read and write
35EE000
remote allocation
page execute and read and write
227E000
stack
page read and write
2858000
heap
page read and write
1D4000
heap
page read and write
235CB000
heap
page read and write
89B0000
direct allocation
page read and write
6F7E000
heap
page read and write
970000
trusted library allocation
page read and write
74CD000
stack
page read and write
89E0000
direct allocation
page read and write
400000
unkown
page readonly
6D80000
heap
page read and write
46F000
unkown
page readonly
7FA0000
trusted library allocation
page read and write
4A3000
unkown
page readonly
505000
heap
page read and write
2DA0000
trusted library allocation
page execute and read and write
6A1E000
stack
page read and write
2201000
heap
page read and write
6F8C000
heap
page read and write
3302000
heap
page read and write
2201000
heap
page read and write
1D4000
heap
page read and write
505000
heap
page read and write
21E8000
heap
page read and write
504000
heap
page read and write
828C000
stack
page read and write
7580000
trusted library allocation
page read and write
698000
stack
page read and write
23AF000
stack
page read and write
21F3000
heap
page read and write
3120000
heap
page read and write
307D000
stack
page read and write
2320A000
heap
page read and write
21E9000
heap
page read and write
720000
heap
page read and write
32FE000
stack
page read and write
23B76000
unclassified section
page execute and read and write
6DF000
stack
page read and write
6F8C000
heap
page read and write
22B40000
direct allocation
page read and write
29F0000
trusted library section
page read and write
839F000
heap
page read and write
26D1000
heap
page read and write
45C000
unkown
page readonly
5329000
trusted library allocation
page read and write
8070000
trusted library allocation
page execute and read and write
427000
unkown
page read and write
4A3000
unkown
page readonly
26D1000
heap
page read and write
23615000
heap
page read and write
22CBF000
stack
page read and write
23AFD000
unclassified section
page execute and read and write
2201000
heap
page read and write
401000
unkown
page execute read
6F0000
heap
page read and write
22A0000
heap
page read and write
80F0000
trusted library allocation
page read and write
6EC8000
heap
page read and write
23BC1000
direct allocation
page execute and read and write
8610000
trusted library allocation
page execute and read and write
401000
unkown
page execute read
440000
heap
page read and write
28CF000
stack
page read and write
2205000
heap
page read and write
6F3E000
heap
page read and write
C9DE000
direct allocation
page execute and read and write
504000
heap
page read and write
23180000
heap
page read and write
21CF000
stack
page read and write
5334000
trusted library allocation
page read and write
2208000
heap
page read and write
221D000
heap
page read and write
55E000
stack
page read and write
220B000
heap
page read and write
2262E000
stack
page read and write
235C0000
heap
page read and write
28DA000
heap
page read and write
82E000
stack
page read and write
504000
heap
page read and write
2484000
heap
page read and write
790000
direct allocation
page read and write
49C3000
trusted library allocation
page read and write
742000
heap
page read and write
748000
heap
page read and write
560000
heap
page read and write
801E000
stack
page read and write
480000
heap
page read and write
26D1000
heap
page read and write
408000
unkown
page readonly
9C000
stack
page read and write
17EE000
remote allocation
page execute and read and write
770000
direct allocation
page read and write
228FE000
stack
page read and write
72C000
heap
page read and write
80B5000
trusted library allocation
page read and write
40A000
unkown
page write copy
34DF000
unkown
page read and write
26D1000
heap
page read and write
504000
heap
page read and write
88C000
heap
page read and write
3430000
heap
page read and write
699C000
stack
page read and write
26D0000
heap
page read and write
23B90000
unclassified section
page execute and read and write
5BBF000
trusted library allocation
page read and write
735000
heap
page read and write
504000
heap
page read and write
2201000
heap
page read and write
620000
heap
page read and write
7330000
trusted library allocation
page read and write
400000
unkown
page readonly
231F8000
heap
page read and write
28F1000
heap
page read and write
8950000
direct allocation
page read and write
2D1A000
trusted library allocation
page execute and read and write
220B000
heap
page read and write
735000
heap
page read and write
2201000
heap
page read and write
2BD0000
trusted library allocation
page read and write
2BD0000
trusted library allocation
page read and write
2DC0000
heap
page execute and read and write
401000
unkown
page execute read
72C000
heap
page read and write
6F8B000
heap
page read and write
1D4000
heap
page read and write
2303D000
stack
page read and write
220B000
heap
page read and write
838D000
heap
page read and write
26D1000
heap
page read and write
21E5000
heap
page read and write
220E000
heap
page read and write
46F000
unkown
page readonly
235BE000
heap
page read and write
4950000
heap
page execute and read and write
401000
unkown
page execute read
435000
unkown
page read and write
21ED000
heap
page read and write
220C000
heap
page read and write
7C0000
heap
page read and write
51E000
stack
page read and write
26D1000
heap
page read and write
6DA5000
heap
page read and write
2201000
heap
page read and write
6F3B000
heap
page read and write
470000
heap
page read and write
23701000
heap
page read and write
400000
unkown
page readonly
8360000
heap
page read and write
227B000
heap
page read and write
9AE000
stack
page read and write
22E0D000
stack
page read and write
6F90000
heap
page read and write
235BB000
heap
page read and write
70E000
heap
page read and write
40A000
unkown
page read and write
52E9000
trusted library allocation
page read and write
21F5000
heap
page read and write
48FE000
stack
page read and write
7F70000
heap
page read and write
2201000
heap
page read and write
22E50000
remote allocation
page read and write
2201000
heap
page read and write
575000
heap
page read and write
22B50000
direct allocation
page read and write
22EDF000
stack
page read and write
72EC000
heap
page read and write
26D1000
heap
page read and write
32EB000
heap
page read and write
45C000
unkown
page readonly
36D0000
heap
page read and write
52BE000
trusted library allocation
page read and write
1D4000
heap
page read and write
8630000
trusted library allocation
page read and write
6F88000
heap
page read and write
21F0000
heap
page read and write
21E9000
heap
page read and write
748E000
stack
page read and write
2BEE000
remote allocation
page execute and read and write
960000
heap
page read and write
22E9E000
stack
page read and write
780000
direct allocation
page read and write
235C0000
heap
page read and write
8D20000
direct allocation
page execute and read and write
74D0000
trusted library allocation
page read and write
21F6000
heap
page read and write
6F75000
heap
page read and write
2281D000
stack
page read and write
53EE000
remote allocation
page execute and read and write
2ACF000
stack
page read and write
2201000
heap
page read and write
220E000
heap
page read and write
6F88000
heap
page read and write
74B000
heap
page read and write
2201000
heap
page read and write
236A1000
heap
page read and write
23181000
heap
page read and write
221F000
heap
page read and write
21F0000
heap
page read and write
221F000
heap
page read and write
21F8000
heap
page read and write
28D5000
heap
page read and write
21FE000
heap
page read and write
2CE0000
trusted library allocation
page read and write
7CF000
stack
page read and write
6DA0000
heap
page read and write
7550000
trusted library allocation
page read and write
8600000
trusted library allocation
page read and write
5314000
trusted library allocation
page read and write
227B000
heap
page read and write
32E0000
heap
page read and write
4A3000
unkown
page readonly
3438000
heap
page read and write
36C0000
heap
page read and write
4BE000
stack
page read and write
6F90000
heap
page read and write
21F1000
heap
page read and write
19F000
stack
page read and write
2208000
heap
page read and write
A10000
heap
page read and write
28D0000
heap
page read and write
40A000
unkown
page write copy
4A3000
unkown
page readonly
740000
direct allocation
page read and write
21FE000
heap
page read and write
2201000
heap
page read and write
21F0000
heap
page read and write
6F8000
heap
page read and write
21F4000
heap
page read and write
231F8000
heap
page read and write
805E000
stack
page read and write
2358B000
heap
page read and write
235BB000
heap
page read and write
6F88000
heap
page read and write
52FE000
trusted library allocation
page read and write
6F88000
heap
page read and write
23503000
heap
page read and write
2D40000
trusted library allocation
page read and write
2980000
direct allocation
page read and write
1D4000
heap
page read and write
22E50000
remote allocation
page read and write
29A0000
direct allocation
page read and write
220B000
heap
page read and write
21F7000
heap
page read and write
21EC000
heap
page read and write
2201000
heap
page read and write
89D0000
direct allocation
page read and write
720000
direct allocation
page read and write
235C0000
heap
page read and write
8620000
direct allocation
page execute and read and write
923000
heap
page read and write
2307E000
stack
page read and write
2D50000
heap
page read and write
69DD000
stack
page read and write
21FE000
heap
page read and write
505000
heap
page read and write
21EC000
heap
page read and write
5B0C000
trusted library allocation
page read and write
4A3000
unkown
page readonly
408000
unkown
page readonly
45C000
unkown
page readonly
722000
heap
page read and write
21F0000
heap
page read and write
4961000
trusted library allocation
page read and write
2201000
heap
page read and write
21FD000
heap
page read and write
22B70000
direct allocation
page read and write
2933000
heap
page read and write
2317F000
stack
page read and write
235BE000
heap
page read and write
19A000
stack
page read and write
50A4000
trusted library allocation
page read and write
74B000
heap
page read and write
680000
heap
page read and write
4D0000
heap
page read and write
504000
heap
page read and write
9C000
stack
page read and write
401000
unkown
page execute read
504000
heap
page read and write
21EC000
heap
page read and write
6C0000
heap
page read and write
400000
system
page execute and read and write
B8F000
stack
page read and write
55E000
stack
page read and write
23411000
heap
page read and write
83B1000
heap
page read and write
701E000
stack
page read and write
21FE000
heap
page read and write
4F0000
heap
page read and write
21FC000
heap
page read and write
408000
unkown
page readonly
2201000
heap
page read and write
26D1000
heap
page read and write
21E1000
heap
page read and write
83E3000
heap
page read and write
236D0000
heap
page read and write
28D9000
heap
page read and write
63B000
heap
page read and write
26D1000
heap
page read and write
5989000
trusted library allocation
page read and write
46F000
unkown
page readonly
89A0000
direct allocation
page read and write
231F8000
heap
page read and write
333F000
stack
page read and write
7310000
trusted library allocation
page read and write
22B60000
direct allocation
page read and write
42C000
unkown
page read and write
735000
heap
page read and write
21F5000
heap
page read and write
408000
unkown
page readonly
227B000
heap
page read and write
7340000
trusted library allocation
page read and write
72C0000
heap
page read and write
31D0000
heap
page read and write
193000
stack
page read and write
92D000
heap
page read and write
323E000
stack
page read and write
2D00000
trusted library allocation
page read and write
459000
unkown
page read and write
26D1000
heap
page read and write
220C000
heap
page read and write
26D1000
heap
page read and write
75DB000
stack
page read and write
45C000
unkown
page readonly
2BD0000
trusted library allocation
page read and write
227B000
heap
page read and write
2970000
direct allocation
page read and write
220E000
stack
page read and write
2321A000
heap
page read and write
235BB000
heap
page read and write
72C000
heap
page read and write
89C0000
direct allocation
page read and write
21FE000
heap
page read and write
6F8C000
heap
page read and write
1D4000
heap
page read and write
2208000
heap
page read and write
221D000
heap
page read and write
7320000
trusted library allocation
page read and write
42F000
unkown
page read and write
505000
heap
page read and write
504000
heap
page read and write
2D78000
trusted library allocation
page read and write
7307000
trusted library allocation
page read and write
504000
heap
page read and write
2D10000
trusted library allocation
page read and write
21F5000
heap
page read and write
735000
heap
page read and write
74E0000
trusted library allocation
page read and write
6A5F000
stack
page read and write
26D1000
heap
page read and write
731000
heap
page read and write
29CF000
stack
page read and write
7258000
heap
page read and write
21E5000
heap
page read and write
46F000
unkown
page readonly
1D4000
heap
page read and write
23B7C000
unclassified section
page execute and read and write
21EE000
heap
page read and write
408000
unkown
page readonly
2D90000
heap
page read and write
735000
heap
page read and write
8380000
heap
page read and write
2480000
heap
page read and write
30BD000
stack
page read and write
21EF000
heap
page read and write
220B000
heap
page read and write
560000
heap
page read and write
880000
heap
page read and write
30FD000
stack
page read and write
74B000
heap
page read and write
8970000
direct allocation
page read and write
41B000
system
page execute and read and write
73A0000
trusted library allocation
page read and write
82CC000
stack
page read and write
21C0000
heap
page read and write
83B9000
heap
page read and write
504000
heap
page read and write
A1A000
heap
page read and write
8C0000
heap
page read and write
9EF000
stack
page read and write
2D22000
trusted library allocation
page read and write
504000
heap
page read and write
400000
unkown
page readonly
6E50000
direct allocation
page read and write
73B0000
trusted library allocation
page execute and read and write
6F1B000
heap
page read and write
83CD000
heap
page read and write
21F0000
heap
page read and write
8391000
heap
page read and write
2357C000
heap
page read and write
287D000
heap
page read and write
505000
heap
page read and write
1D4000
heap
page read and write
19C000
stack
page read and write
21E0000
heap
page read and write
2D60000
heap
page readonly
720000
heap
page read and write
9C000
stack
page read and write
2201000
heap
page read and write
744E000
stack
page read and write
23410000
heap
page read and write
742000
heap
page read and write
2320B000
heap
page read and write
74B000
heap
page read and write
422000
unkown
page read and write
46F000
unkown
page readonly
2201000
heap
page read and write
9E000
stack
page read and write
72C000
heap
page read and write
31DF000
stack
page read and write
8990000
direct allocation
page read and write
2201000
heap
page read and write
21F4000
heap
page read and write
2BD0000
trusted library allocation
page read and write
26A0000
heap
page read and write
19A000
stack
page read and write
6EA0000
heap
page read and write
22E50000
remote allocation
page read and write
26D1000
heap
page read and write
730000
direct allocation
page read and write
177000
stack
page read and write
760000
direct allocation
page read and write
28CF000
stack
page read and write
1D4000
heap
page read and write
400000
unkown
page readonly
750000
direct allocation
page read and write
5DEE000
remote allocation
page execute and read and write
21C0000
heap
page read and write
3130000
heap
page read and write
731000
heap
page read and write
26D1000
heap
page read and write
1D4000
heap
page read and write
235CB000
heap
page read and write
2201000
heap
page read and write
6E60000
heap
page read and write
21F0000
heap
page read and write
7FB0000
trusted library allocation
page read and write
1D4000
heap
page read and write
49EE000
remote allocation
page execute and read and write
26D1000
heap
page read and write
26D1000
heap
page read and write
401000
unkown
page execute read
28D3000
heap
page read and write
40A000
unkown
page write copy
31BE000
stack
page read and write
7530000
trusted library allocation
page read and write
8110000
trusted library allocation
page read and write
8AD6000
heap
page read and write
229FF000
stack
page read and write
A16000
heap
page read and write
40A000
unkown
page write copy
21EE000
heap
page read and write
2BD0000
trusted library allocation
page read and write
731000
heap
page read and write
21E1000
heap
page read and write
740E000
stack
page read and write
8364000
heap
page read and write
22A5000
heap
page read and write
267E000
stack
page read and write
72C000
heap
page read and write
7200000
heap
page read and write
6E30000
direct allocation
page read and write
BFDE000
direct allocation
page execute and read and write
1D4000
heap
page read and write
3270000
heap
page read and write
742000
heap
page read and write
23AA0000
unclassified section
page execute and read and write
504000
heap
page read and write
504000
heap
page read and write
400000
system
page execute and read and write
2201000
heap
page read and write
505000
heap
page read and write
23BD6000
direct allocation
page execute and read and write
3306000
heap
page read and write
21FE000
heap
page read and write
504000
heap
page read and write
1D0000
heap
page read and write
A1DE000
direct allocation
page execute and read and write
23BAB000
unclassified section
page execute and read and write
6EA8000
heap
page read and write
2214000
heap
page read and write
2214000
heap
page read and write
505000
heap
page read and write
3FEE000
remote allocation
page execute and read and write
17C000
stack
page read and write
504000
heap
page read and write
31C0000
heap
page read and write
5B06000
trusted library allocation
page read and write
742000
heap
page read and write
92D000
heap
page read and write
80E0000
trusted library allocation
page read and write
6F75000
heap
page read and write
DDDE000
direct allocation
page execute and read and write
65C000
stack
page read and write
5AF3000
trusted library allocation
page read and write
2201000
heap
page read and write
7540000
trusted library allocation
page read and write
2BCF000
stack
page read and write
81C0000
trusted library allocation
page read and write
504000
heap
page read and write
4D0000
heap
page read and write
236A0000
heap
page read and write
21F1000
heap
page read and write
21E9000
heap
page read and write
720000
heap
page read and write
52DE000
trusted library allocation
page read and write
21FA000
heap
page read and write
5BE000
stack
page read and write
227B000
heap
page read and write
7F80000
trusted library allocation
page execute and read and write
A1A000
heap
page read and write
26D1000
heap
page read and write
2201000
heap
page read and write
21F7000
heap
page read and write
6F2A000
heap
page read and write
8A20000
heap
page read and write
504000
heap
page read and write
235BE000
heap
page read and write
72D0000
heap
page read and write
2DD6000
heap
page read and write
3240000
heap
page read and write
83F7000
heap
page read and write
21F0000
heap
page read and write
505000
heap
page read and write
2321A000
heap
page read and write
50AA000
trusted library allocation
page read and write
640000
heap
page read and write
459000
system
page execute and read and write
220E000
heap
page read and write
32BF000
stack
page read and write
4AB6000
trusted library allocation
page read and write
59C7000
trusted library allocation
page read and write
21CE000
stack
page read and write
23181000
heap
page read and write
21E0000
heap
page read and write
1730000
remote allocation
page execute and read and write
8960000
direct allocation
page read and write
98000
stack
page read and write
74F0000
trusted library allocation
page read and write
263E000
stack
page read and write
7570000
trusted library allocation
page read and write
930000
heap
page read and write
505000
heap
page read and write
235BE000
heap
page read and write
408000
unkown
page readonly
45C000
unkown
page readonly
2201000
heap
page read and write
493E000
stack
page read and write
21FE000
heap
page read and write
6E70000
heap
page read and write
28E1000
heap
page read and write
3720000
heap
page read and write
6F88000
heap
page read and write
317E000
unkown
page read and write
235CB000
heap
page read and write
2990000
direct allocation
page read and write
2BD0000
trusted library allocation
page read and write
2320A000
heap
page read and write
2960000
direct allocation
page read and write
46F000
unkown
page readonly
223F000
heap
page read and write
235CC000
heap
page read and write
223F000
heap
page read and write
735000
heap
page read and write
21E0000
heap
page read and write
2CF4000
trusted library allocation
page read and write
26D1000
heap
page read and write
74B000
heap
page read and write
500000
heap
page read and write
92F000
stack
page read and write
72C000
heap
page read and write
80E000
stack
page read and write
6F79000
heap
page read and write
21D8000
heap
page read and write
1D4000
heap
page read and write
742000
heap
page read and write
23B0000
heap
page read and write
6F94000
heap
page read and write
6E70000
direct allocation
page read and write
6FA0000
heap
page read and write
There are 777 hidden memdumps, click here to show them.