IOC Report
Quotation.exe

loading gif

Files

File Path
Type
Category
Malicious
Quotation.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\springvandenes\Intransparency\Bowleres.Hed
ASCII text, with very long lines (58742), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\springvandenes\Udstiller48\Kulmuler\Generationsskifternes\Specialudvalg\Quotation.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x8bbcd9d1, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ub1lwqn2.g0l.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uuvmtcd4.uji.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\springvandenes\Dodecyl222.Lys
data
dropped
C:\Users\user\AppData\Local\Temp\springvandenes\Intransparency\Unenslave223.ges
data
dropped
C:\Users\user\AppData\Local\Temp\springvandenes\Udstiller48\Kulmuler\Generationsskifternes\Specialudvalg\Quotation.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\springvandenes\Udstiller48\Kulmuler\Generationsskifternes\Specialudvalg\familieplejer.nar
data
dropped
C:\Users\user\AppData\Local\Temp\springvandenes\Udstiller48\Kulmuler\Generationsskifternes\Specialudvalg\medtog.txt
ASCII text, with very long lines (376), with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\springvandenes\Udstiller48\Kulmuler\Generationsskifternes\Specialudvalg\wastemen.gra
data
dropped
C:\Users\user\dok.lnk
MS Windows shortcut, Item id list present, Has Relative path, Has Working directory, ctime=Sun Dec 31 23:06:32 1600, mtime=Sun Dec 31 23:06:32 1600, atime=Sun Dec 31 23:06:32 1600, length=0, window=hide
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Quotation.exe
"C:\Users\user\Desktop\Quotation.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell" -windowstyle hidden "$Betalingsdages=Get-Content 'C:\Users\user\AppData\Local\Temp\springvandenes\Intransparency\Bowleres.Hed';$Taplet=$Betalingsdages.SubString(58707,3);.$Taplet($Betalingsdages)"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
https://apwisulsel.sa.com/EnPWajJ251.bing
unknown
https://contoso.com/Icon
unknown
http://crl.ver)
unknown
https://apwisulsel.sa.com/EnPWajJ251.binb
unknown
https://aka.ms/pscore6
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://apwisulsel.sa.com/$
unknown
https://apwisulsel.sa.com/(
unknown
https://github.com/Pester/Pester
unknown
https://apwisulsel.sa.com/EnPWajJ251.binW
unknown
http://www.microsoft.coiJa
unknown
https://apwisulsel.sa.com/EnPWajJ251.bincf&
unknown
https://apwisulsel.sa.com/EnPWajJ251.bin
unknown
https://apwisulsel.sa.com/lsel.sa.com/apwisulsel.sa.com5
unknown
https://g.live.com/odclientsettings/Prod-C:
unknown
https://contoso.com/
unknown
https://g.live.com/odclientsettings/ProdV2-C:
unknown
https://nuget.org/nuget.exe
unknown
https://apwisulsel.sa.com/C
unknown
http://crl.microz;r
unknown
https://apwisulsel.sa.com/EnPWajJ251.binoE
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://apwisulsel.sa.com/
unknown
https://apwisulsel.sa.com/r4
unknown
There are 18 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
apwisulsel.sa.com
104.128.228.214

IPs

IP
Domain
Country
Malicious
104.128.228.214
apwisulsel.sa.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName

Memdumps

Base Address
Regiontype
Protect
Malicious
D38C000
direct allocation
page execute and read and write
malicious
5D2E000
remote allocation
page execute and read and write
malicious
8890000
trusted library allocation
page execute and read and write
489000
unkown
page readonly
6F08000
heap
page read and write
22135C44000
heap
page read and write
22135CB0000
trusted library allocation
page read and write
89B0000
trusted library allocation
page execute and read and write
7190000
trusted library allocation
page read and write
8030000
trusted library allocation
page read and write
8411000
trusted library allocation
page read and write
6FE5000
heap
page read and write
2213066C000
heap
page read and write
22135B70000
trusted library allocation
page read and write
4F29000
trusted library allocation
page read and write
2213063F000
heap
page read and write
9B60000
direct allocation
page read and write
7196000
trusted library allocation
page read and write
6334000
trusted library allocation
page read and write
22135BC0000
trusted library allocation
page read and write
71C000
heap
page read and write
9080000
trusted library allocation
page read and write
8D30000
trusted library allocation
page read and write
70D000
heap
page read and write
70D000
heap
page read and write
446000
unkown
page read and write
33B0000
trusted library section
page read and write
8F29000
trusted library allocation
page read and write
22135D02000
heap
page read and write
427000
unkown
page read and write
22130624000
heap
page read and write
8F10000
trusted library allocation
page execute and read and write
40A000
unkown
page write copy
B58C000
direct allocation
page execute and read and write
22810000
remote allocation
page read and write
711000
heap
page read and write
F7144FE000
stack
page read and write
721000
heap
page read and write
22135E20000
trusted library allocation
page read and write
7F00000
trusted library allocation
page read and write
6EDA000
heap
page read and write
7648000
heap
page read and write
7420000
direct allocation
page read and write
8DF0000
trusted library allocation
page read and write
27C0000
heap
page read and write
8970000
trusted library allocation
page read and write
8FD0000
trusted library allocation
page read and write
42C000
unkown
page read and write
5887000
trusted library allocation
page read and write
8D70000
trusted library allocation
page read and write
6D8000
heap
page read and write
8F00000
trusted library allocation
page execute and read and write
22135EF0000
remote allocation
page read and write
88E0000
trusted library allocation
page read and write
6EE3000
heap
page read and write
6ECD000
heap
page read and write
8990000
trusted library allocation
page read and write
22135C62000
heap
page read and write
824C000
trusted library allocation
page read and write
5180000
heap
page execute and read and write
4F30000
trusted library allocation
page read and write
6EDC000
heap
page read and write
30DB000
heap
page read and write
F714E7E000
unkown
page readonly
29B7000
heap
page read and write
32E0000
heap
page read and write
2213066E000
heap
page read and write
701000
heap
page read and write
9050000
trusted library allocation
page read and write
22100000
direct allocation
page read and write
22135C95000
heap
page read and write
9090000
trusted library allocation
page execute and read and write
8A70000
trusted library allocation
page execute and read and write
F71527E000
stack
page read and write
724000
heap
page read and write
8BA6000
heap
page read and write
71B000
heap
page read and write
4FA0000
heap
page read and write
BF8C000
direct allocation
page execute and read and write
729000
heap
page read and write
50D0000
trusted library allocation
page read and write
732000
heap
page read and write
30B6000
heap
page read and write
89C0000
trusted library allocation
page read and write
880E000
stack
page read and write
F714FFE000
stack
page read and write
502F000
stack
page read and write
8400000
trusted library allocation
page read and write
711000
heap
page read and write
9D90000
trusted library allocation
page read and write
711000
heap
page read and write
22131540000
trusted library section
page readonly
2257D000
stack
page read and write
6F08000
heap
page read and write
98000
stack
page read and write
F71407E000
unkown
page readonly
22135C4B000
heap
page read and write
9E10000
trusted library allocation
page execute and read and write
58DE000
trusted library allocation
page read and write
6191000
trusted library allocation
page read and write
70D000
heap
page read and write
BD0000
heap
page read and write
226FF000
stack
page read and write
8350000
trusted library allocation
page execute and read and write
51F5000
trusted library allocation
page read and write
8A50000
trusted library allocation
page read and write
6EF0000
heap
page read and write
71D000
heap
page read and write
F71487B000
stack
page read and write
8950000
trusted library allocation
page read and write
22135EA0000
trusted library allocation
page read and write
764C000
heap
page read and write
510000
heap
page read and write
8FAF000
trusted library allocation
page read and write
22131AC0000
trusted library allocation
page read and write
701000
heap
page read and write
8045000
trusted library allocation
page read and write
8D60000
trusted library allocation
page execute and read and write
8E30000
trusted library allocation
page execute and read and write
22810000
remote allocation
page read and write
7480000
direct allocation
page read and write
6EE9000
heap
page read and write
22135D16000
heap
page read and write
8BB8000
heap
page read and write
F7150FE000
unkown
page readonly
3880000
trusted library allocation
page read and write
770C000
heap
page read and write
8DE0000
trusted library allocation
page execute and read and write
5130000
heap
page execute and read and write
58CD000
trusted library allocation
page read and write
220D0000
direct allocation
page read and write
6EC9000
heap
page read and write
DD8C000
direct allocation
page execute and read and write
9BB0000
direct allocation
page read and write
61E9000
trusted library allocation
page read and write
888C000
stack
page read and write
22130729000
heap
page read and write
721000
heap
page read and write
6EC4000
heap
page read and write
30D0000
heap
page read and write
22135C20000
heap
page read and write
F714CFE000
unkown
page readonly
22810000
remote allocation
page read and write
61B9000
trusted library allocation
page read and write
50E0000
trusted library allocation
page read and write
22110000
direct allocation
page read and write
80A0000
trusted library allocation
page execute and read and write
227AF000
stack
page read and write
288F000
stack
page read and write
22135D13000
heap
page read and write
EFD000
stack
page read and write
275B000
stack
page read and write
730E000
stack
page read and write
8DC0000
trusted library allocation
page read and write
D37000
stack
page read and write
729000
heap
page read and write
711000
heap
page read and write
6EDE000
heap
page read and write
4B0000
heap
page read and write
F713D7E000
stack
page read and write
22130691000
heap
page read and write
9E00000
direct allocation
page execute and read and write
22135D1D000
heap
page read and write
F713F7D000
stack
page read and write
8A20000
trusted library allocation
page read and write
8FC0000
trusted library allocation
page execute and read and write
8980000
trusted library allocation
page read and write
8EA0000
trusted library allocation
page read and write
22135B50000
trusted library allocation
page read and write
224FE000
stack
page read and write
7DF0000
heap
page read and write
3410000
heap
page read and write
220F0000
direct allocation
page read and write
31C1000
heap
page read and write
271C000
stack
page read and write
71B000
heap
page read and write
733000
heap
page read and write
22130000
direct allocation
page read and write
802E000
stack
page read and write
733000
heap
page read and write
90A0000
trusted library allocation
page read and write
9D80000
trusted library allocation
page execute and read and write
221306B4000
heap
page read and write
8A60000
trusted library allocation
page execute and read and write
61ED000
trusted library allocation
page read and write
2405000
heap
page read and write
9B80000
direct allocation
page read and write
22135CE4000
heap
page read and write
30B0000
heap
page read and write
50B0000
trusted library allocation
page execute and read and write
F71427E000
unkown
page readonly
3418000
heap
page read and write
22135EF0000
remote allocation
page read and write
8D90000
trusted library allocation
page read and write
22135C50000
heap
page read and write
6D0000
heap
page read and write
31FB000
heap
page read and write
8F20000
trusted library allocation
page read and write
F7146FE000
stack
page read and write
80B0000
trusted library allocation
page read and write
9D70000
trusted library allocation
page read and write
22135C84000
heap
page read and write
70D000
heap
page read and write
4F3A000
trusted library allocation
page execute and read and write
4F10000
trusted library allocation
page read and write
8360000
trusted library allocation
page read and write
70D000
heap
page read and write
71B000
heap
page read and write
50C0000
trusted library allocation
page read and write
22135CDE000
heap
page read and write
76A3000
heap
page read and write
F713C7E000
unkown
page readonly
6C0000
heap
page read and write
506C000
stack
page read and write
221306B0000
heap
page read and write
6EB8000
heap
page read and write
8102000
heap
page read and write
221305E0000
trusted library section
page read and write
22130650000
heap
page read and write
71D000
heap
page read and write
729000
heap
page read and write
90E0000
trusted library allocation
page read and write
72CE000
stack
page read and write
88F0000
trusted library allocation
page read and write
2213061F000
heap
page read and write
F713B77000
stack
page read and write
52E6000
trusted library allocation
page read and write
22135C2B000
heap
page read and write
884E000
stack
page read and write
F714F7E000
stack
page read and write
7440000
direct allocation
page read and write
718000
heap
page read and write
F71437B000
stack
page read and write
6FE0000
heap
page read and write
6E90000
heap
page read and write
729000
heap
page read and write
2409000
heap
page read and write
22131680000
trusted library allocation
page read and write
7193000
trusted library allocation
page read and write
33D0000
heap
page read and write
8FA0000
trusted library allocation
page read and write
308E000
unkown
page read and write
718000
heap
page read and write
4F00000
trusted library allocation
page read and write
22130F02000
heap
page read and write
8EFE000
stack
page read and write
4F13000
trusted library allocation
page execute and read and write
33C7000
heap
page read and write
37F0000
heap
page read and write
715000
heap
page read and write
739000
heap
page read and write
33F0000
heap
page read and write
5191000
trusted library allocation
page read and write
422000
unkown
page read and write
42E000
unkown
page read and write
88B0000
trusted library allocation
page read and write
F7145FE000
stack
page read and write
22710000
heap
page read and write
22135B90000
trusted library allocation
page read and write
29BD000
heap
page read and write
2213068A000
heap
page read and write
7630000
heap
page read and write
83F0000
trusted library allocation
page execute and read and write
4F40000
trusted library allocation
page read and write
22135CD3000
heap
page read and write
83B6000
trusted library allocation
page read and write
22135D0A000
heap
page read and write
6EE9000
heap
page read and write
F71417B000
stack
page read and write
61F1000
trusted library allocation
page read and write
8AD0000
trusted library allocation
page read and write
6EE9000
heap
page read and write
4F60000
trusted library allocation
page read and write
4F88000
trusted library allocation
page read and write
22130570000
heap
page read and write
22135E90000
trusted library allocation
page read and write
ACF000
stack
page read and write
22135CF8000
heap
page read and write
22135B30000
trusted library allocation
page read and write
BC0000
heap
page read and write
408000
unkown
page readonly
6EC2000
heap
page read and write
31E7000
heap
page read and write
90B0000
trusted library allocation
page execute and read and write
8D50000
trusted library allocation
page read and write
8E10000
trusted library allocation
page execute and read and write
711000
heap
page read and write
8416000
trusted library allocation
page read and write
8DB0000
trusted library allocation
page read and write
8AA0000
trusted library allocation
page execute and read and write
4F1D000
trusted library allocation
page execute and read and write
9C1C000
stack
page read and write
27F0000
heap
page read and write
66E000
stack
page read and write
50AD000
stack
page read and write
8B30000
heap
page read and write
8B20000
trusted library allocation
page read and write
22135E30000
trusted library allocation
page read and write
3350000
heap
page read and write
401000
unkown
page execute read
70D000
heap
page read and write
22131440000
trusted library allocation
page read and write
3231000
heap
page read and write
F71477E000
unkown
page readonly
F71497E000
unkown
page readonly
2276E000
stack
page read and write
62E000
stack
page read and write
83D5000
trusted library allocation
page read and write
F715AFE000
stack
page read and write
71A0000
trusted library allocation
page read and write
22140000
direct allocation
page read and write
8047000
trusted library allocation
page read and write
221306FC000
heap
page read and write
83A0000
trusted library allocation
page execute and read and write
89A0000
direct allocation
page read and write
50F0000
trusted library allocation
page read and write
F71537E000
unkown
page readonly
22130E00000
heap
page read and write
221305D0000
trusted library allocation
page read and write
22135C57000
heap
page read and write
89A0000
trusted library allocation
page execute and read and write
22130F5A000
heap
page read and write
5864000
trusted library allocation
page read and write
6C4000
heap
page read and write
8F30000
trusted library allocation
page execute and read and write
7672000
heap
page read and write
5924000
trusted library allocation
page read and write
6330000
trusted library allocation
page read and write
4F45000
trusted library allocation
page execute and read and write
8A90000
heap
page read and write
83B9000
trusted library allocation
page read and write
89E0000
trusted library allocation
page execute and read and write
6EBA000
heap
page read and write
56F6000
trusted library allocation
page read and write
434000
unkown
page read and write
4F70000
heap
page readonly
3177000
heap
page read and write
2213062F000
heap
page read and write
58AA000
trusted library allocation
page read and write
718000
heap
page read and write
23AF000
stack
page read and write
6A0000
heap
page read and write
22AE000
stack
page read and write
8F80000
trusted library allocation
page read and write
89D0000
trusted library allocation
page read and write
724E000
stack
page read and write
22135BC3000
trusted library allocation
page read and write
22135D21000
heap
page read and write
22130600000
heap
page read and write
9DB0000
trusted library allocation
page read and write
8200000
trusted library allocation
page read and write
729000
heap
page read and write
F714D7E000
unkown
page readonly
6EED000
heap
page read and write
701000
heap
page read and write
81F0000
trusted library allocation
page read and write
316A000
heap
page read and write
22130E02000
heap
page read and write
22130667000
heap
page read and write
2213068F000
heap
page read and write
22150000
direct allocation
page read and write
40A000
unkown
page read and write
9DF0000
heap
page read and write
22160000
direct allocation
page read and write
6EE6000
heap
page read and write
F713E7E000
unkown
page readonly
3148000
heap
page read and write
7430000
direct allocation
page read and write
226BE000
stack
page read and write
6EAC000
heap
page read and write
70D000
heap
page read and write
9DD0000
trusted library allocation
page read and write
88A0000
trusted library allocation
page read and write
29B2000
heap
page read and write
90D0000
trusted library allocation
page execute and read and write
19A000
stack
page read and write
9070000
trusted library allocation
page read and write
F715B7E000
unkown
page readonly
8210000
heap
page execute and read and write
BE0000
heap
page read and write
28B0000
heap
page read and write
8960000
trusted library allocation
page read and write
22130613000
heap
page read and write
7FEE000
stack
page read and write
8CF000
stack
page read and write
22135AD0000
trusted library allocation
page read and write
225FD000
stack
page read and write
2400000
heap
page read and write
F71457E000
unkown
page readonly
823F000
trusted library allocation
page read and write
71B0000
trusted library allocation
page read and write
9E20000
trusted library allocation
page read and write
CFC000
stack
page read and write
9AB7000
stack
page read and write
8040000
trusted library allocation
page read and write
721000
heap
page read and write
27D0000
heap
page read and write
6ED6000
heap
page read and write
6EFC000
heap
page read and write
718000
heap
page read and write
8248000
trusted library allocation
page read and write
22135D1B000
heap
page read and write
22135B51000
trusted library allocation
page read and write
9DC0000
trusted library allocation
page execute and read and write
7644000
heap
page read and write
3140000
heap
page read and write
22135EF0000
remote allocation
page read and write
58BB000
trusted library allocation
page read and write
225BE000
stack
page read and write
278E000
stack
page read and write
22135B50000
trusted library allocation
page read and write
8AC0000
trusted library allocation
page read and write
F714B79000
stack
page read and write
8231000
trusted library allocation
page read and write
9DA0000
trusted library allocation
page read and write
7490000
direct allocation
page read and write
8A80000
trusted library allocation
page read and write
F71557E000
unkown
page readonly
320F000
heap
page read and write
6EF0000
heap
page read and write
B3C0000
direct allocation
page execute and read and write
22130702000
heap
page read and write
8090000
trusted library allocation
page execute and read and write
9B70000
direct allocation
page read and write
763C000
heap
page read and write
29B7000
heap
page read and write
8F40000
trusted library allocation
page read and write
F71547C000
stack
page read and write
6F09000
heap
page read and write
F71447E000
unkown
page readonly
33CF000
stack
page read and write
22131AA1000
trusted library allocation
page read and write
736000
heap
page read and write
8E9D000
stack
page read and write
76FC000
heap
page read and write
30C0000
heap
page read and write
6F00000
heap
page read and write
F714DFE000
stack
page read and write
8050000
trusted library allocation
page read and write
221305A0000
heap
page read and write
71D000
heap
page read and write
9CF000
stack
page read and write
8A40000
trusted library allocation
page read and write
33C0000
heap
page read and write
8A30000
trusted library allocation
page read and write
F7134BB000
stack
page read and write
9CE0000
trusted library allocation
page execute and read and write
F7149FE000
stack
page read and write
22130E15000
heap
page read and write
83B0000
trusted library allocation
page read and write
90C0000
trusted library allocation
page read and write
89F0000
trusted library allocation
page read and write
83BD000
trusted library allocation
page read and write
22135E80000
trusted library allocation
page read and write
6EAD000
heap
page read and write
7470000
direct allocation
page read and write
22130590000
heap
page read and write
83C0000
trusted library allocation
page read and write
22120000
direct allocation
page read and write
4FE000
stack
page read and write
734E000
stack
page read and write
4FA9000
heap
page read and write
22130F13000
heap
page read and write
22130F00000
heap
page read and write
701000
heap
page read and write
87CE000
stack
page read and write
C98C000
direct allocation
page execute and read and write
2263C000
stack
page read and write
F714BFE000
stack
page read and write
22135E20000
trusted library allocation
page read and write
F71467E000
unkown
page readonly
4F14000
trusted library allocation
page read and write
721000
heap
page read and write
400000
unkown
page readonly
22137000000
heap
page read and write
3130000
trusted library section
page read and write
90F0000
trusted library allocation
page execute and read and write
6ED3000
heap
page read and write
8E20000
heap
page read and write
8B1B000
stack
page read and write
2213068C000
heap
page read and write
7450000
direct allocation
page read and write
89B0000
direct allocation
page read and write
8EB0000
heap
page read and write
2253F000
stack
page read and write
6EAE000
heap
page read and write
718000
heap
page read and write
720E000
stack
page read and write
6ED3000
heap
page read and write
8250000
trusted library allocation
page read and write
9045000
trusted library allocation
page read and write
711000
heap
page read and write
8DD0000
trusted library allocation
page read and write
29B6000
heap
page read and write
8BCE000
heap
page read and write
22135B90000
trusted library allocation
page read and write
8BA9000
heap
page read and write
408000
unkown
page readonly
721000
heap
page read and write
8E00000
trusted library allocation
page read and write
8FB0000
trusted library allocation
page read and write
23C0000
heap
page read and write
8234000
trusted library allocation
page read and write
8B8C000
heap
page read and write
B4D000
stack
page read and write
22130695000
heap
page read and write
29B6000
heap
page read and write
220E0000
direct allocation
page read and write
515000
heap
page read and write
22135C00000
heap
page read and write
9060000
trusted library allocation
page read and write
4FEE000
stack
page read and write
22135AC0000
trusted library allocation
page read and write
728E000
stack
page read and write
701000
heap
page read and write
F71517E000
unkown
page readonly
6E97000
heap
page read and write
7460000
direct allocation
page read and write
6EDC000
heap
page read and write
6FD0000
heap
page readonly
8340000
trusted library allocation
page read and write
31E3000
heap
page read and write
28C8000
heap
page read and write
5135000
heap
page execute and read and write
9BA0000
direct allocation
page read and write
9110000
trusted library allocation
page execute and read and write
8F50000
trusted library allocation
page read and write
8AB0000
trusted library allocation
page read and write
6EF0000
heap
page read and write
72D000
heap
page read and write
8D40000
trusted library allocation
page read and write
22135BB2000
trusted library allocation
page read and write
8D80000
trusted library allocation
page execute and read and write
29B4000
heap
page read and write
22130713000
heap
page read and write
8DA0000
trusted library allocation
page read and write
3020000
heap
page read and write
6EB3000
heap
page read and write
5898000
trusted library allocation
page read and write
7EF0000
trusted library allocation
page read and write
701000
heap
page read and write
6EDA000
heap
page read and write
6195000
trusted library allocation
page read and write
9DE0000
trusted library allocation
page execute and read and write
449000
unkown
page readonly
711000
heap
page read and write
32CE000
unkown
page read and write
500000
heap
page read and write
8A00000
trusted library allocation
page read and write
83D0000
trusted library allocation
page read and write
8390000
trusted library allocation
page read and write
4F20000
trusted library allocation
page read and write
9057000
trusted library allocation
page read and write
BA0000
heap
page read and write
9B90000
direct allocation
page read and write
715000
heap
page read and write
22130F1A000
heap
page read and write
9C5C000
stack
page read and write
221306A1000
heap
page read and write
8F90000
trusted library allocation
page read and write
7F9A0000
trusted library allocation
page execute and read and write
8BB1000
heap
page read and write
F714A7E000
unkown
page readonly
8A10000
trusted library allocation
page execute and read and write
71E000
heap
page read and write
83E0000
trusted library allocation
page read and write
5875000
trusted library allocation
page read and write
22130F1A000
heap
page read and write
30CE000
stack
page read and write
724000
heap
page read and write
5901000
trusted library allocation
page read and write
There are 561 hidden memdumps, click here to show them.