IOC Report
invoice.exe

loading gif

Files

File Path
Type
Category
Malicious
invoice.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_caspol.exe_d8eda6a1754a151dd5173ca6db3e65435df63db_ea830a9b_04bcfbd1-2c77-4702-aba0-8ccec9d684fc\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD36E.tmp.dmp
Mini DuMP crash report, 14 streams, Fri Mar 17 14:34:35 2023, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD563.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERD593.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepository\Antimodernly\trever\Hovedinteressers\icon-ui.icns
HTML document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepository\Antimodernly\trever\Hovedinteressers\lang-1059.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepository\Ath_CoexAgent.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepository\Diskofils\Justiciaryship\vmusbmouse.cat
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepository\Inkshed\Mss32.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepository\Inkshed\NMDllHost.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepository\Stemningssvingning\Urgently.Suk
ASCII text, with very long lines (52812), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepository\Udlandsrejse153\Aeroscopic\Clanging\Uskyldsrent\SourceCodePro-ExtraLight.otf
OpenType font data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepository\Udlandsrejse153\Aeroscopic\Clanging\Uskyldsrent\cs.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\predepository\figuranternes.Han
data
dropped
C:\Users\user\AppData\Local\Temp\nstA9F8.tmp\AdvSplash.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nstA9F8.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\appcompat\Programs\Amcache.hve.LOG1
MS Windows registry file, NT/2000 or above
dropped
\Device\ConDrv
ASCII text, with CRLF, LF line terminators
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\invoice.exe
C:\Users\user\Desktop\invoice.exe
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
C:\Users\user\Desktop\invoice.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 2544

URLs

Name
IP
Malicious
http://checkip.dyndns.org/
193.122.130.0
malicious
http://checkip.dyndns.org
unknown
http://www.avast.com0/
unknown
https://doc-0k-a8-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/s4sbn26f
unknown
http://nsis.sf.net/NSIS_Error
unknown
http://checkip.dyndns.com
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://drive.google.com/
unknown
https://doc-0k-a8-docs.googleusercontent.com/docs/securesc/ha0ro937gcuc7l7deffksulhg5h7mbp1/s4sbn26f0am6hqllsu7edmokcls88pe1/1679060025000/12467729248612761337/*/1v9qH2HQVytFc1xq78jdiMix-1m6jIF0S?e=download&uuid=a6a0f6a4-7f4f-44fa-b2c7-5636188002aa
142.250.186.33

Domains

Name
IP
Malicious
checkip.dyndns.com
193.122.130.0
malicious
checkip.dyndns.org
unknown
malicious
drive.google.com
142.250.184.206
googlehosted.l.googleusercontent.com
142.250.186.33
doc-0k-a8-docs.googleusercontent.com
unknown

IPs

IP
Domain
Country
Malicious
193.122.130.0
checkip.dyndns.com
United States
malicious
142.250.184.206
drive.google.com
United States
142.250.186.33
googlehosted.l.googleusercontent.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Hose11\Carnel146\Poly\Hedonophobia
Konsekvensmager
HKEY_CURRENT_USER\SOFTWARE\InstallDir32
Path
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Uninstall\Lejekasserner
Fortrnelsens
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\caspol_RASMANCS
FileDirectory
\REGISTRY\A\{4f9e4f5a-c4b3-8ea8-57a2-18d364d06e4c}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
ProgramId
\REGISTRY\A\{4f9e4f5a-c4b3-8ea8-57a2-18d364d06e4c}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
FileId
\REGISTRY\A\{4f9e4f5a-c4b3-8ea8-57a2-18d364d06e4c}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
LowerCaseLongPath
\REGISTRY\A\{4f9e4f5a-c4b3-8ea8-57a2-18d364d06e4c}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
LongPathHash
\REGISTRY\A\{4f9e4f5a-c4b3-8ea8-57a2-18d364d06e4c}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
Name
\REGISTRY\A\{4f9e4f5a-c4b3-8ea8-57a2-18d364d06e4c}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
OriginalFileName
\REGISTRY\A\{4f9e4f5a-c4b3-8ea8-57a2-18d364d06e4c}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
Publisher
\REGISTRY\A\{4f9e4f5a-c4b3-8ea8-57a2-18d364d06e4c}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
Version
\REGISTRY\A\{4f9e4f5a-c4b3-8ea8-57a2-18d364d06e4c}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
BinFileVersion
\REGISTRY\A\{4f9e4f5a-c4b3-8ea8-57a2-18d364d06e4c}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
BinaryType
\REGISTRY\A\{4f9e4f5a-c4b3-8ea8-57a2-18d364d06e4c}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
ProductName
\REGISTRY\A\{4f9e4f5a-c4b3-8ea8-57a2-18d364d06e4c}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
ProductVersion
\REGISTRY\A\{4f9e4f5a-c4b3-8ea8-57a2-18d364d06e4c}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
LinkDate
\REGISTRY\A\{4f9e4f5a-c4b3-8ea8-57a2-18d364d06e4c}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
BinProductVersion
\REGISTRY\A\{4f9e4f5a-c4b3-8ea8-57a2-18d364d06e4c}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
AppxPackageFullName
\REGISTRY\A\{4f9e4f5a-c4b3-8ea8-57a2-18d364d06e4c}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
AppxPackageRelativeId
\REGISTRY\A\{4f9e4f5a-c4b3-8ea8-57a2-18d364d06e4c}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
Size
\REGISTRY\A\{4f9e4f5a-c4b3-8ea8-57a2-18d364d06e4c}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
Language
\REGISTRY\A\{4f9e4f5a-c4b3-8ea8-57a2-18d364d06e4c}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
IsOsComponent
\REGISTRY\A\{4f9e4f5a-c4b3-8ea8-57a2-18d364d06e4c}\Root\InventoryApplicationFile\caspol.exe|1c3df8b9b20d9142
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018C0098A0B25C6
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
There are 33 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
666B000
direct allocation
page execute and read and write
malicious
1D0000
unclassified section
page readonly
6E1E000
stack
page read and write
388A7000
trusted library allocation
page read and write
232C2AD8000
heap
page read and write
21E47600000
unkown
page read and write
658000
heap
page read and write
232C2A61000
heap
page read and write
37740000
trusted library allocation
page execute and read and write
376A0000
trusted library allocation
page read and write
37637000
stack
page read and write
39B46000
trusted library allocation
page read and write
36721000
heap
page read and write
39BB0000
trusted library allocation
page read and write
232C2A7C000
heap
page read and write
21E47702000
trusted library allocation
page read and write
21E47570000
trusted library allocation
page read and write
46A0000
direct allocation
page execute and read and write
36721000
heap
page read and write
36721000
heap
page read and write
36721000
heap
page read and write
6F1D000
heap
page read and write
232C31D1000
trusted library allocation
page read and write
2380000
heap
page read and write
6E8B000
heap
page read and write
37959000
trusted library allocation
page read and write
36721000
heap
page read and write
37780000
trusted library allocation
page read and write
3777B000
trusted library allocation
page read and write
232CC670000
trusted library allocation
page read and write
36721000
heap
page read and write
39A97000
heap
page read and write
36721000
heap
page read and write
36910000
heap
page read and write
232C3315000
heap
page read and write
232C3320000
heap
page read and write
6EA7000
heap
page read and write
36721000
heap
page read and write
36721000
heap
page read and write
371FF000
stack
page read and write
687000
heap
page read and write
36721000
heap
page read and write
8A0000
direct allocation
page read and write
435000
unkown
page read and write
232C3300000
heap
page read and write
733F000
stack
page read and write
E7A387E000
stack
page read and write
10020000
trusted library allocation
page read and write
37660000
trusted library allocation
page read and write
36721000
heap
page read and write
232C2B13000
heap
page read and write
846B000
direct allocation
page execute and read and write
39B40000
trusted library allocation
page read and write
10003000
unkown
page readonly
39B40000
trusted library allocation
page read and write
36721000
heap
page read and write
232C2A5B000
heap
page read and write
37956000
trusted library allocation
page read and write
368C0000
direct allocation
page read and write
3767D000
trusted library allocation
page execute and read and write
232CC780000
trusted library allocation
page read and write
69E000
heap
page read and write
B50000
unclassified section
page readonly
232C2B02000
heap
page read and write
232C2A22000
heap
page read and write
5E0000
heap
page read and write
6ECA000
heap
page read and write
6EFD000
heap
page read and write
36721000
heap
page read and write
36721000
heap
page read and write
6ED6000
heap
page read and write
43B000
unkown
page read and write
39BED000
stack
page read and write
706B000
direct allocation
page execute and read and write
6EBB000
heap
page read and write
232C3326000
heap
page read and write
6EC7000
heap
page read and write
6A1000
heap
page read and write
37766000
trusted library allocation
page read and write
36721000
heap
page read and write
6ED3000
heap
page read and write
B60000
heap
page read and write
373EE000
stack
page read and write
36720000
heap
page read and write
39B40000
trusted library allocation
page read and write
21E47813000
heap
page read and write
37680000
trusted library allocation
page read and write
39B40000
trusted library allocation
page read and write
232CC760000
trusted library allocation
page read and write
37780000
trusted library allocation
page read and write
343C000
stack
page read and write
232C85C0000
trusted library allocation
page read and write
36721000
heap
page read and write
36721000
heap
page read and write
6EA2000
heap
page read and write
36721000
heap
page read and write
37937000
trusted library allocation
page read and write
232C2A3F000
heap
page read and write
431000
unkown
page read and write
232CC660000
trusted library allocation
page read and write
E7A367D000
stack
page read and write
39C30000
trusted library allocation
page read and write
3753C000
stack
page read and write
10CB000
remote allocation
page execute and read and write
39C30000
trusted library allocation
page read and write
39B50000
trusted library allocation
page read and write
37750000
trusted library allocation
page read and write
232C330D000
heap
page read and write
368E0000
direct allocation
page read and write
6E97000
heap
page read and write
36721000
heap
page read and write
232CC670000
trusted library allocation
page read and write
39B50000
trusted library allocation
page read and write
36721000
heap
page read and write
39B60000
heap
page read and write
370B0000
trusted library allocation
page read and write
232C2B00000
heap
page read and write
232C2AF4000
heap
page read and write
3773E000
stack
page read and write
21E47622000
unkown
page read and write
232CC688000
trusted library allocation
page read and write
21E47624000
unkown
page read and write
232C31F0000
trusted library allocation
page read and write
36721000
heap
page read and write
39B40000
trusted library allocation
page read and write
39B40000
trusted library allocation
page read and write
39ACD000
heap
page read and write
3789E000
stack
page read and write
39B40000
trusted library allocation
page read and write
36721000
heap
page read and write
21E47740000
heap
page read and write
232C2A5B000
heap
page read and write
37760000
trusted library allocation
page read and write
36721000
heap
page read and write
5E487FE000
stack
page read and write
232C2AC9000
heap
page read and write
42CB000
remote allocation
page execute and read and write
750000
heap
page read and write
232C2A56000
heap
page read and write
21E47613000
unkown
page read and write
36721000
heap
page read and write
39B40000
trusted library allocation
page read and write
E7A3BF9000
stack
page read and write
400000
unkown
page readonly
6A8000
heap
page read and write
6DDD000
stack
page read and write
6F02000
heap
page read and write
37673000
trusted library allocation
page execute and read and write
36880000
direct allocation
page read and write
40A000
unkown
page read and write
3240000
heap
page read and write
36F8D000
stack
page read and write
36721000
heap
page read and write
6ED2000
heap
page read and write
36721000
heap
page read and write
232CC643000
trusted library allocation
page read and write
36721000
heap
page read and write
36D0E000
stack
page read and write
39B40000
trusted library allocation
page read and write
232C3319000
heap
page read and write
21E4766B000
heap
page read and write
232C331F000
heap
page read and write
39A58000
heap
page read and write
69F000
heap
page read and write
8B69000
trusted library allocation
page read and write
401000
unkown
page execute read
378A1000
trusted library allocation
page read and write
39FDE000
stack
page read and write
37780000
trusted library allocation
page read and write
6EF3000
heap
page read and write
232CC68B000
trusted library allocation
page read and write
232C2A5B000
heap
page read and write
232C3303000
heap
page read and write
36721000
heap
page read and write
39C30000
trusted library allocation
page read and write
24CB000
remote allocation
page execute and read and write
36721000
heap
page read and write
25A0000
heap
page read and write
6EAC000
heap
page read and write
36E4E000
stack
page read and write
6E30000
heap
page read and write
441000
unkown
page readonly
723E000
stack
page read and write
43F000
unkown
page read and write
21E47602000
unkown
page read and write
36721000
heap
page read and write
6D90000
heap
page read and write
36721000
heap
page read and write
232CC620000
trusted library allocation
page read and write
1ACB000
remote allocation
page execute and read and write
36721000
heap
page read and write
36736000
heap
page read and write
232CC5C0000
trusted library allocation
page read and write
39B40000
trusted library allocation
page read and write
232C27F0000
heap
page read and write
6ECD000
heap
page read and write
10059000
trusted library allocation
page read and write
232C3311000
heap
page read and write
7A6B000
direct allocation
page execute and read and write
709000
heap
page read and write
232C2A3C000
heap
page read and write
441000
unkown
page readonly
39B40000
trusted library allocation
page read and write
10005000
unkown
page readonly
388A1000
trusted library allocation
page read and write
42C000
unkown
page read and write
39B40000
trusted library allocation
page read and write
232CC710000
trusted library allocation
page read and write
232C2A56000
heap
page read and write
232CC640000
trusted library allocation
page read and write
39B40000
trusted library allocation
page read and write
39A3E000
stack
page read and write
6E3B000
heap
page read and write
232CC900000
trusted library allocation
page read and write
232CC630000
trusted library allocation
page read and write
232CC685000
trusted library allocation
page read and write
232C2A25000
heap
page read and write
21E4762A000
heap
page read and write
37690000
trusted library allocation
page read and write
19A000
stack
page read and write
F00000
remote allocation
page execute and read and write
232C2A72000
heap
page read and write
986B000
direct allocation
page execute and read and write
232C3215000
heap
page read and write
39C30000
trusted library allocation
page read and write
39C30000
trusted library allocation
page read and write
39B50000
trusted library allocation
page read and write
232C3200000
heap
page read and write
37780000
trusted library allocation
page read and write
39B40000
trusted library allocation
page read and write
6EBB000
heap
page read and write
36721000
heap
page read and write
39B40000
trusted library allocation
page read and write
232C3202000
heap
page read and write
6E8F000
heap
page read and write
21E47800000
heap
page read and write
36721000
heap
page read and write
232C45C5000
trusted library allocation
page read and write
36721000
heap
page read and write
232C2ADD000
heap
page read and write
36721000
heap
page read and write
40A000
unkown
page write copy
408000
unkown
page readonly
36721000
heap
page read and write
36721000
heap
page read and write
37780000
trusted library allocation
page read and write
486B000
direct allocation
page execute and read and write
38CB000
remote allocation
page execute and read and write
400000
unkown
page readonly
860000
direct allocation
page read and write
2BC0000
heap
page read and write
6ACB000
remote allocation
page execute and read and write
6E7C000
heap
page read and write
232C45C3000
trusted library allocation
page read and write
56CB000
remote allocation
page execute and read and write
21E47470000
heap
page read and write
6EB4000
heap
page read and write
36721000
heap
page read and write
6EEB000
heap
page read and write
408000
unkown
page readonly
21E4763B000
heap
page read and write
36E0E000
stack
page read and write
36721000
heap
page read and write
232C3322000
heap
page read and write
37945000
trusted library allocation
page read and write
376B0000
heap
page read and write
3793F000
trusted library allocation
page read and write
6EE1000
heap
page read and write
232C2A80000
heap
page read and write
232CC68E000
trusted library allocation
page read and write
98000
stack
page read and write
21E47639000
heap
page read and write
36721000
heap
page read and write
36721000
heap
page read and write
232C2AD0000
heap
page read and write
376AB000
trusted library allocation
page execute and read and write
232CC900000
trusted library allocation
page read and write
25A4000
heap
page read and write
3A0DE000
stack
page read and write
37780000
trusted library allocation
page read and write
5E4814B000
stack
page read and write
232CC910000
trusted library allocation
page read and write
8B20000
trusted library allocation
page read and write
388C9000
trusted library allocation
page read and write
232C2A27000
heap
page read and write
36721000
heap
page read and write
232C2860000
heap
page read and write
232C2A27000
heap
page read and write
232C2A72000
heap
page read and write
232C2980000
heap
page read and write
36721000
heap
page read and write
60CB000
remote allocation
page execute and read and write
232C2A69000
heap
page read and write
6D94000
heap
page read and write
36721000
heap
page read and write
39B40000
trusted library allocation
page read and write
373B0000
remote allocation
page read and write
36721000
heap
page read and write
232C2960000
unclassified section
page readonly
36721000
heap
page read and write
232C2AD8000
heap
page read and write
36721000
heap
page read and write
232CC640000
trusted library allocation
page read and write
232C2A87000
heap
page read and write
232C29D0000
trusted library allocation
page read and write
232C331C000
heap
page read and write
370FE000
stack
page read and write
6EC0000
heap
page read and write
232CC740000
trusted library allocation
page read and write
39C30000
trusted library allocation
page read and write
6EE1000
heap
page read and write
6EEB000
heap
page read and write
3734E000
stack
page read and write
36721000
heap
page read and write
39A40000
heap
page read and write
6D10000
unclassified section
page readonly
376A7000
trusted library allocation
page execute and read and write
232C3326000
heap
page read and write
36721000
heap
page read and write
23E5000
heap
page read and write
232C2AC9000
heap
page read and write
373B0000
remote allocation
page read and write
36721000
heap
page read and write
69C000
heap
page read and write
36721000
heap
page read and write
36721000
heap
page read and write
232C2970000
unclassified section
page readonly
21E47900000
heap
page read and write
6EC0000
heap
page read and write
232CC900000
trusted library allocation
page read and write
36721000
heap
page read and write
232C2A69000
heap
page read and write
39B50000
trusted library allocation
page read and write
232C2A80000
heap
page read and write
6E77000
heap
page read and write
37696000
trusted library allocation
page execute and read and write
39B40000
trusted library allocation
page read and write
723000
heap
page read and write
36721000
heap
page read and write
39B40000
trusted library allocation
page read and write
36721000
heap
page read and write
37780000
trusted library allocation
page read and write
36721000
heap
page read and write
36721000
heap
page read and write
21E47400000
heap
page read and write
232C2A76000
heap
page read and write
39C2E000
stack
page read and write
23F0000
heap
page read and write
36721000
heap
page read and write
374EE000
stack
page read and write
232C3307000
heap
page read and write
333C000
stack
page read and write
232CC670000
trusted library allocation
page read and write
36721000
heap
page read and write
401000
unkown
page execute read
39BA5000
trusted library allocation
page read and write
7340000
heap
page read and write
71FE000
stack
page read and write
36C60000
heap
page read and write
232CC750000
trusted library allocation
page read and write
37780000
trusted library allocation
page read and write
39B50000
trusted library allocation
page read and write
36721000
heap
page read and write
2ECB000
remote allocation
page execute and read and write
232C3326000
heap
page read and write
36721000
heap
page read and write
232C2AD0000
heap
page read and write
23E0000
heap
page read and write
6ED9000
heap
page read and write
6EC5000
heap
page read and write
10001000
unkown
page execute read
39C40000
trusted library allocation
page read and write
37674000
trusted library allocation
page read and write
21E47902000
heap
page read and write
21E47900000
heap
page read and write
21E47902000
heap
page read and write
232CC660000
trusted library allocation
page read and write
3673E000
heap
page read and write
21E47802000
heap
page read and write
37770000
trusted library allocation
page read and write
21E4766B000
heap
page read and write
6ECD000
heap
page read and write
70FE000
stack
page read and write
232C3311000
heap
page read and write
232C2A25000
heap
page read and write
8E6B000
direct allocation
page execute and read and write
650000
heap
page read and write
232C2A00000
heap
page read and write
526B000
direct allocation
page execute and read and write
232C2A20000
heap
page read and write
232C45C3000
trusted library allocation
page read and write
5E4887C000
stack
page read and write
36721000
heap
page read and write
232C3313000
heap
page read and write
21E47715000
trusted library allocation
page read and write
36721000
heap
page read and write
10000000
unkown
page readonly
232C41A0000
trusted library allocation
page read and write
373B0000
remote allocation
page read and write
21E47913000
heap
page read and write
39C30000
trusted library allocation
page read and write
21E47913000
heap
page read and write
232CC720000
trusted library allocation
page read and write
37780000
trusted library allocation
page read and write
232C2B0C000
heap
page read and write
6EB9000
heap
page read and write
A26B000
direct allocation
page execute and read and write
20000
unclassified section
page readonly
2BD0000
heap
page read and write
232CC710000
trusted library allocation
page read and write
39B50000
trusted library allocation
page read and write
36721000
heap
page read and write
376FE000
stack
page read and write
37790000
heap
page execute and read and write
550000
heap
page read and write
36721000
heap
page read and write
36721000
heap
page read and write
3769A000
trusted library allocation
page execute and read and write
232C2A5E000
heap
page read and write
232C2A7C000
heap
page read and write
36721000
heap
page read and write
2A10000
heap
page read and write
5E481CF000
stack
page read and write
39ED0000
heap
page execute and read and write
39B74000
trusted library allocation
page read and write
36F4F000
stack
page read and write
232C2A13000
heap
page read and write
683000
heap
page read and write
36721000
heap
page read and write
3708C000
stack
page read and write
39C30000
trusted library allocation
page read and write
6E7E000
heap
page read and write
6EFD000
heap
page read and write
37942000
trusted library allocation
page read and write
39B40000
trusted library allocation
page read and write
6D50000
heap
page read and write
4CCB000
remote allocation
page execute and read and write
3724D000
stack
page read and write
232CC910000
trusted library allocation
page read and write
5C6B000
direct allocation
page execute and read and write
39C40000
trusted library allocation
page read and write
6F0D000
heap
page read and write
232C2A2A000
heap
page read and write
555000
heap
page read and write
36721000
heap
page read and write
232CC680000
trusted library allocation
page read and write
232C2A80000
heap
page read and write
30000
heap
page read and write
232C2A3D000
heap
page read and write
36721000
heap
page read and write
6EF3000
heap
page read and write
36721000
heap
page read and write
6EBC000
heap
page read and write
232C2A7C000
heap
page read and write
21E47700000
trusted library allocation
page read and write
376A2000
trusted library allocation
page read and write
232C2A5D000
heap
page read and write
There are 447 hidden memdumps, click here to show them.