IOC Report
ND2WP0Fip7.exe

loading gif

Files

File Path
Type
Category
Malicious
ND2WP0Fip7.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_ND2WP0Fip7.exe_d2a040abffd2a23b2c6cb89f3e5bf8942bfe60_e07afee3_d102e0a0-8fc3-4744-91c0-fc7fc1b241aa\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\ProgramData\BGHJJDGH
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\BQJUWOYRTO.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\CBGCGDBKEGHIEBGDBFHD
ASCII text, with very long lines (1809), with CRLF line terminators
dropped
C:\ProgramData\CBKFBAECBAEGDGDHIEHI
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\CFBAKEHIEBKJJJJJKKKEGHJEBA
SQLite 3.x database, last written using SQLite version 3042000, file counter 11, database pages 7, cookie 0x3, schema 4, UTF-8, version-valid-for 11
dropped
C:\ProgramData\DVWHKMNFNN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\DVWHKMNFNN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EEGWXUHVUG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EEGWXUHVUG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\EGHCBKKKFHCGCBFIJEHDGIDGCF
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\EHJJECBKKECFIEBGCAKJ
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 1, database pages 24, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\ProgramData\HTAGVDFUIE.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\JJECAAEHCFIEBGCBGHIEGCFIII
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\ProgramData\KATAXZVCPS.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\KATAXZVCPS.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\KKEHDBAE
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\ProgramData\KZWFNRXYKI.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5BFE.tmp.dmp
Mini DuMP crash report, 14 streams, Sun Oct 13 10:12:25 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5D09.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER5D29.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\NWCXBPIUYI.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\NWTVCDUMOB.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\UMMBDNEQBN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\ProgramData\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\ProgramData\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\ProgramData\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\freebl3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\mozglue[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\msvcp140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\nss3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\softokn3[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\vcruntime140[1].dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\cookies.sqlite-shm
data
dropped
C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\fqs92o4p.default-release\places.sqlite-shm
data
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 30 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ND2WP0Fip7.exe
"C:\Users\user\Desktop\ND2WP0Fip7.exe"
malicious
C:\Users\user\Desktop\ND2WP0Fip7.exe
"C:\Users\user\Desktop\ND2WP0Fip7.exe"
malicious
C:\Users\user\Desktop\ND2WP0Fip7.exe
"C:\Users\user\Desktop\ND2WP0Fip7.exe"
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4296 -s 2240

URLs

Name
IP
Malicious
http://62.204.41.176/db293a2c1b1c70c4/mozglue.dll
62.204.41.176
malicious
http://62.204.41.176
unknown
malicious
http://62.204.41.176/db293a2c1b1c70c4/nss3.dll
62.204.41.176
malicious
http://62.204.41.176/db293a2c1b1c70c4/softokn3.dll
62.204.41.176
malicious
http://62.204.41.176/db293a2c1b1c70c4/vcruntime140.dll
62.204.41.176
malicious
http://62.204.41.176/edd20096ecef326d.php
62.204.41.176
malicious
http://62.204.41.176/db293a2c1b1c70c4/sqlite3.dll
62.204.41.176
malicious
http://62.204.41.176/db293a2c1b1c70c4/freebl3.dll
62.204.41.176
malicious
http://62.204.41.176/db293a2c1b1c70c4/msvcp140.dll
62.204.41.176
malicious
http://62.204.41.176/
62.204.41.176
malicious
http://62.204.41.176/db293a2c1b1c70c4/sqlite3.dllZ
unknown
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17WdsYWhtbmRlZHwxfDB8MHxab2hvIF
unknown
http://62.204.41.176/edd20096ecef326d.phpdo
unknown
https://duckduckgo.com/ac/?q=
unknown
http://62.204.41.176/db293a2c1b1c70c4/freebl3.dlln
unknown
http://62.204.41.176y
unknown
https://bridge.lga1.admarketplace.net/ctp?version=16.0.0&key=1696332238301000001.2&ci=1696332238417.
unknown
http://62.204.41.1766f54171d463448b0758b37eb3a28c39afbaf229aa37008209c4release
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
http://62.204.41.176/edd20096ecef326d.phpnts
unknown
http://62.204.41.176xlsxwqLmRvY3gsKi54bHN4fDV8MXwxfDB8RE9DfCVET0NVTUVOVFMlXHwqLnR4dCwqLmRvY3gsKi54bH
unknown
http://62.204.41.176edd20096ecef326d.phpition:
unknown
http://62.204.41.176JJKKF
unknown
http://62.204.41.176/edd20096ecef326d.php7eb3a28c39afbaf229aa37008209c4
unknown
http://62.204.41.176/edd20096ecef326d.phpwser
unknown
https://imp.mt48.net/static?id=7RHzfOIXjFEYsBdvIpkX4QqmfZfYfQfafZbXfpbWfpbX7ReNxR3UIG8zInwYIFIVs9eYi
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://62.204.41.176/edd20096ecef326d.php7eb3a28c39afbaf229aa37008209c4releasestorage
unknown
http://62.204.41.176/edd20096ecef326d.php)N
unknown
http://62.204.41.176/edd20096ecef326d.phpinomi
unknown
http://62.204.41.176/edd20096ecef326d.phpimple-storage.json
unknown
https://www.amazon.com/?tag=admarketus-20&ref=pd_sl_7548d4575af019e4c148ccf1a78112802e66a0816a72fc94
unknown
http://www.sqlite.org/copyright.html.
unknown
http://62.204.41.176/edd20096ecef326d.phpft
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17rosoft
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
https://mozilla.org0/
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK201621kbG1nY
unknown
https://contile-images.services.mozilla.com/0TegrVVRalreHILhR2WvtD_CFzj13HCDcLqqpvXSOuY.10862.jpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://62.204.41.176/edd20096ecef326d.php;
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Ed1aWxkV
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://bridge.lga1.ap01.net/ctp?version=16.0.0&key=1696332238301000001.1&ci=1696332238417.12791&cta
unknown
http://62.204.41.176/edd20096ecef326d.phpO
unknown
http://upx.sf.net
unknown
http://62.204.41.176/edd20096ecef326d.phpI
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17mluIFdhbGxldHxmbmpobWtoaG1rYm
unknown
http://62.204.41.176/db293a2c1b1c70c4/msvcp140.dll(
unknown
https://www.ecosia.org/newtab/
unknown
http://62.204.41.176/edd20096ecef326d.phpefox
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://62.204.41.176/edd20096ecef326d.phpition:
unknown
http://62.204.41.176/edd20096ecef326d.php.0//EN
unknown
https://contile-images.services.mozilla.com/obgoOYObjIFea_bXuT6L4LbBJ8j425AD87S1HMD3BWg.9991.jpg
unknown
http://62.204.41.176DBFHD96ecef326d.phpefox
unknown
http://62.204.41.176/edd20096ecef326d.phph
unknown
https://support.mozilla.org
unknown
http://62.204.41.176/db293a2c1b1c70c4/vcruntime140.dllQ
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://62.204.41.176/edd20096ecef326d.phpr
unknown
There are 56 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
62.204.41.176
unknown
United Kingdom
malicious

Registry

Path
Value
Malicious
\REGISTRY\A\{e3f12727-f285-0413-643c-5dd032eecc39}\Root\InventoryApplicationFile\nd2wp0fip7.exe|27b315689efd61b2
ProgramId
\REGISTRY\A\{e3f12727-f285-0413-643c-5dd032eecc39}\Root\InventoryApplicationFile\nd2wp0fip7.exe|27b315689efd61b2
FileId
\REGISTRY\A\{e3f12727-f285-0413-643c-5dd032eecc39}\Root\InventoryApplicationFile\nd2wp0fip7.exe|27b315689efd61b2
LowerCaseLongPath
\REGISTRY\A\{e3f12727-f285-0413-643c-5dd032eecc39}\Root\InventoryApplicationFile\nd2wp0fip7.exe|27b315689efd61b2
LongPathHash
\REGISTRY\A\{e3f12727-f285-0413-643c-5dd032eecc39}\Root\InventoryApplicationFile\nd2wp0fip7.exe|27b315689efd61b2
Name
\REGISTRY\A\{e3f12727-f285-0413-643c-5dd032eecc39}\Root\InventoryApplicationFile\nd2wp0fip7.exe|27b315689efd61b2
OriginalFileName
\REGISTRY\A\{e3f12727-f285-0413-643c-5dd032eecc39}\Root\InventoryApplicationFile\nd2wp0fip7.exe|27b315689efd61b2
Publisher
\REGISTRY\A\{e3f12727-f285-0413-643c-5dd032eecc39}\Root\InventoryApplicationFile\nd2wp0fip7.exe|27b315689efd61b2
Version
\REGISTRY\A\{e3f12727-f285-0413-643c-5dd032eecc39}\Root\InventoryApplicationFile\nd2wp0fip7.exe|27b315689efd61b2
BinFileVersion
\REGISTRY\A\{e3f12727-f285-0413-643c-5dd032eecc39}\Root\InventoryApplicationFile\nd2wp0fip7.exe|27b315689efd61b2
BinaryType
\REGISTRY\A\{e3f12727-f285-0413-643c-5dd032eecc39}\Root\InventoryApplicationFile\nd2wp0fip7.exe|27b315689efd61b2
ProductName
\REGISTRY\A\{e3f12727-f285-0413-643c-5dd032eecc39}\Root\InventoryApplicationFile\nd2wp0fip7.exe|27b315689efd61b2
ProductVersion
\REGISTRY\A\{e3f12727-f285-0413-643c-5dd032eecc39}\Root\InventoryApplicationFile\nd2wp0fip7.exe|27b315689efd61b2
LinkDate
\REGISTRY\A\{e3f12727-f285-0413-643c-5dd032eecc39}\Root\InventoryApplicationFile\nd2wp0fip7.exe|27b315689efd61b2
BinProductVersion
\REGISTRY\A\{e3f12727-f285-0413-643c-5dd032eecc39}\Root\InventoryApplicationFile\nd2wp0fip7.exe|27b315689efd61b2
AppxPackageFullName
\REGISTRY\A\{e3f12727-f285-0413-643c-5dd032eecc39}\Root\InventoryApplicationFile\nd2wp0fip7.exe|27b315689efd61b2
AppxPackageRelativeId
\REGISTRY\A\{e3f12727-f285-0413-643c-5dd032eecc39}\Root\InventoryApplicationFile\nd2wp0fip7.exe|27b315689efd61b2
Size
\REGISTRY\A\{e3f12727-f285-0413-643c-5dd032eecc39}\Root\InventoryApplicationFile\nd2wp0fip7.exe|27b315689efd61b2
Language
\REGISTRY\A\{e3f12727-f285-0413-643c-5dd032eecc39}\Root\InventoryApplicationFile\nd2wp0fip7.exe|27b315689efd61b2
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
D17000
heap
page read and write
malicious
F1A000
unkown
page read and write
malicious
2141F000
heap
page read and write
213F7000
heap
page read and write
1B350000
heap
page read and write
1480000
heap
page read and write
F09000
unkown
page readonly
F1A000
unkown
page write copy
1B46E000
heap
page read and write
213F7000
heap
page read and write
F68000
unkown
page read and write
D57000
heap
page read and write
64A000
remote allocation
page execute and read and write
6F871000
unkown
page execute read
E81000
unkown
page execute read
E80000
unkown
page readonly
50F000
remote allocation
page execute and read and write
213F7000
heap
page read and write
2760C000
heap
page read and write
9F5000
stack
page read and write
213EA000
heap
page read and write
21413000
heap
page read and write
DBA000
heap
page read and write
213F7000
heap
page read and write
213DB000
heap
page read and write
213F5000
heap
page read and write
213E7000
heap
page read and write
48F000
remote allocation
page execute and read and write
5A5000
remote allocation
page execute and read and write
F09000
unkown
page readonly
213F2000
heap
page read and write
213F5000
heap
page read and write
213F5000
heap
page read and write
21419000
heap
page read and write
213DB000
heap
page read and write
F6B000
unkown
page readonly
213F7000
heap
page read and write
213F7000
heap
page read and write
213F3000
heap
page read and write
9FD000
stack
page read and write
1AD9F000
stack
page read and write
213E9000
heap
page read and write
61EB4000
direct allocation
page read and write
21414000
heap
page read and write
1360000
heap
page read and write
213F7000
heap
page read and write
213EA000
heap
page read and write
4EF000
remote allocation
page execute and read and write
2761E000
heap
page read and write
213F5000
heap
page read and write
45A000
remote allocation
page execute and read and write
6C860000
unkown
page read and write
1AC5F000
stack
page read and write
213F8000
heap
page read and write
E80000
unkown
page readonly
213E7000
heap
page read and write
213EF000
heap
page read and write
213F3000
heap
page read and write
213F7000
heap
page read and write
213EF000
heap
page read and write
213F5000
heap
page read and write
114F000
stack
page read and write
61ECC000
direct allocation
page read and write
E81000
unkown
page execute read
1B04E000
stack
page read and write
213FA000
heap
page read and write
136A000
heap
page read and write
6F8FE000
unkown
page read and write
213F4000
heap
page read and write
213F7000
heap
page read and write
21406000
heap
page read and write
213F7000
heap
page read and write
C70000
heap
page read and write
6F8ED000
unkown
page readonly
6C81F000
unkown
page readonly
21413000
heap
page read and write
DC7000
heap
page read and write
133D000
stack
page read and write
1B360000
heap
page read and write
1B361000
heap
page read and write
61ED4000
direct allocation
page readonly
213EC000
heap
page read and write
6C85E000
unkown
page read and write
213F2000
heap
page read and write
1B09D000
stack
page read and write
F6B000
unkown
page readonly
213F5000
heap
page read and write
213D0000
heap
page read and write
F09000
unkown
page readonly
213E7000
heap
page read and write
213EE000
heap
page read and write
1263000
heap
page read and write
6C865000
unkown
page readonly
193F000
stack
page read and write
F1A000
unkown
page write copy
F1A000
unkown
page write copy
213EA000
heap
page read and write
21413000
heap
page read and write
E80000
unkown
page readonly
F09000
unkown
page readonly
213F2000
heap
page read and write
213F7000
heap
page read and write
21413000
heap
page read and write
1630000
heap
page read and write
213F5000
heap
page read and write
213F5000
heap
page read and write
F6B000
unkown
page readonly
DB5000
heap
page read and write
16FE000
stack
page read and write
213F5000
heap
page read and write
E81000
unkown
page execute read
4E2000
remote allocation
page execute and read and write
61ECD000
direct allocation
page readonly
492000
remote allocation
page execute and read and write
213F7000
heap
page read and write
1AA1E000
stack
page read and write
C35000
heap
page read and write
21419000
heap
page read and write
E50000
heap
page read and write
1AB5E000
stack
page read and write
213F7000
heap
page read and write
213F5000
heap
page read and write
21413000
heap
page read and write
213F5000
heap
page read and write
213EA000
heap
page read and write
1AEFF000
stack
page read and write
27616000
heap
page read and write
136E000
heap
page read and write
1B2ED000
stack
page read and write
21406000
heap
page read and write
27614000
heap
page read and write
124F000
stack
page read and write
17FF000
stack
page read and write
21406000
heap
page read and write
2761A000
heap
page read and write
213D2000
heap
page read and write
5CB000
remote allocation
page execute and read and write
21414000
heap
page read and write
213EA000
heap
page read and write
F1A000
unkown
page write copy
F6B000
unkown
page readonly
126C000
heap
page read and write
1B19C000
stack
page read and write
213F7000
heap
page read and write
213EC000
heap
page read and write
213F7000
heap
page read and write
274E2000
heap
page read and write
DC0000
heap
page read and write
F67000
unkown
page execute and read and write
DAB000
heap
page read and write
213F5000
heap
page read and write
6C681000
unkown
page execute read
51B000
remote allocation
page execute and read and write
21413000
heap
page read and write
485000
remote allocation
page execute and read and write
213DB000
heap
page read and write
8FC000
stack
page read and write
1260000
heap
page read and write
213F5000
heap
page read and write
F09000
unkown
page readonly
213F7000
heap
page read and write
DB0000
heap
page read and write
65C000
remote allocation
page execute and read and write
14E0000
heap
page read and write
21406000
heap
page read and write
213F5000
heap
page read and write
DCC000
heap
page read and write
1470000
heap
page read and write
2140B000
heap
page read and write
CBE000
stack
page read and write
213EF000
heap
page read and write
213DB000
heap
page read and write
27440000
heap
page read and write
61ED0000
direct allocation
page read and write
2141A000
heap
page read and write
E81000
unkown
page execute read
213EE000
heap
page read and write
61E01000
direct allocation
page execute read
2141A000
heap
page read and write
1B460000
trusted library allocation
page read and write
213F7000
heap
page read and write
27460000
heap
page read and write
F6B000
unkown
page readonly
21406000
heap
page read and write
E81000
unkown
page execute read
21413000
heap
page read and write
4BD000
remote allocation
page execute and read and write
6C680000
unkown
page readonly
1B1ED000
stack
page read and write
213EA000
heap
page read and write
C37000
heap
page read and write
123D000
stack
page read and write
E80000
unkown
page readonly
213F5000
heap
page read and write
213F7000
heap
page read and write
213EF000
heap
page read and write
213F7000
heap
page read and write
1AF4D000
stack
page read and write
61E00000
direct allocation
page execute and read and write
2140B000
heap
page read and write
61ED3000
direct allocation
page read and write
213F1000
heap
page read and write
E81000
unkown
page execute read
213F7000
heap
page read and write
21411000
heap
page read and write
E80000
unkown
page readonly
213DB000
heap
page read and write
213F8000
heap
page read and write
2140B000
heap
page read and write
6C85F000
unkown
page write copy
CC0000
heap
page read and write
D10000
heap
page read and write
21406000
heap
page read and write
213F5000
heap
page read and write
F6B000
unkown
page readonly
21413000
heap
page read and write
213EA000
heap
page read and write
183E000
stack
page read and write
4B1000
remote allocation
page execute and read and write
214D5000
heap
page read and write
213F5000
heap
page read and write
213F7000
heap
page read and write
21413000
heap
page read and write
E80000
unkown
page readonly
1ADFE000
stack
page read and write
1AB1F000
stack
page read and write
213F4000
heap
page read and write
21406000
heap
page read and write
5C5000
remote allocation
page execute and read and write
E4E000
stack
page read and write
213EA000
heap
page read and write
213F2000
heap
page read and write
213F7000
heap
page read and write
61EB7000
direct allocation
page readonly
213F7000
heap
page read and write
488000
remote allocation
page execute and read and write
213F1000
heap
page read and write
F1A000
unkown
page write copy
213F5000
heap
page read and write
1AC9D000
stack
page read and write
213F7000
heap
page read and write
213F7000
heap
page read and write
213F7000
heap
page read and write
F09000
unkown
page readonly
D6E000
heap
page read and write
C30000
heap
page read and write
213F7000
heap
page read and write
6F902000
unkown
page readonly
213F3000
heap
page read and write
6F870000
unkown
page readonly
There are 241 hidden memdumps, click here to show them.