IOC Report
ORDER893474849.exe

loading gif

Files

File Path
Type
Category
Malicious
ORDER893474849.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Huaca.dew
ASCII text, with very long lines (54338), with no line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sorbate\ORDER893474849.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uxhzbllh.4ko.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w4pmdflj.yaj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nsi10C5.tmp\nsExec.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
C:\Users\user\AppData\Local\Temp\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\F..wIo..tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Indebrug.Han
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Pronominalize.nic
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sialostenosis230.iso
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sorbate\ORDER893474849.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sorbate\fodlanges.txt
ASCII text, with very long lines (319), with no line terminators
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sorbate\fodsaalerne.ima
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sorbate\nomophylax.lop
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sorbate\overfrankere.akt
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sorbate\poetizer.pon
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sorbate\snidest.epe
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sorbate\tipple.tak
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\amtstue.sub
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\bevidsthedsdannende.syn
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\brnderen.gun
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\conducing.red
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\elvinus.bkk
data
dropped
C:\Users\user\AppData\Roaming\njuxKgb.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Roaming\rmbuDux.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\zmCxFCu.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
There are 23 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\ORDER893474849.exe
"C:\Users\user\Desktop\ORDER893474849.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Jasigers=Get-Content 'C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Huaca.dew';$Realismen=$Jasigers.SubString(54269,3);.$Realismen($Jasigers)"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://72.11.156.201/ShQvl29.bin
72.11.156.201
http://www.mozilla.com/en-US/blocklist/
unknown
http://nsis.sf.net/NSIS_Error
unknown
http://crl.micro
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://aka.ms/pscore6lB
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://ocsp.thawte.com0
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
http://www.mozilla.com0
unknown
https://contoso.com/Icon
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://github.com/syohex/java-simple-mine-sweeperC:
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
onye.unicornsupplychains.com
38.255.61.163
malicious

IPs

IP
Domain
Country
Malicious
38.255.61.163
onye.unicornsupplychains.com
United States
malicious
72.11.156.201
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
MaxConnectionsPer1_0Server
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
MaxConnectionsPerServer
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum
Version

Memdumps

Base Address
Regiontype
Protect
Malicious
23A70000
heap
page read and write
malicious
9308000
direct allocation
page execute and read and write
malicious
75D6000
heap
page read and write
malicious
571000
heap
page read and write
581000
heap
page read and write
7627000
heap
page read and write
2351F000
heap
page read and write
23A78000
heap
page read and write
2353C000
heap
page read and write
3140000
heap
page read and write
7627000
heap
page read and write
2351F000
heap
page read and write
56B000
heap
page read and write
23512000
heap
page read and write
23920000
direct allocation
page read and write
2351F000
heap
page read and write
7370000
heap
page read and write
6FCE000
stack
page read and write
2353C000
heap
page read and write
408000
unkown
page readonly
581000
heap
page read and write
77DF000
heap
page read and write
934000
heap
page read and write
2351F000
heap
page read and write
23511000
heap
page read and write
7100000
direct allocation
page read and write
2351F000
heap
page read and write
56B000
heap
page read and write
23511000
heap
page read and write
7190000
direct allocation
page read and write
271A000
heap
page read and write
7627000
heap
page read and write
49F2000
trusted library allocation
page read and write
575000
heap
page read and write
7646000
heap
page read and write
55F000
heap
page read and write
23516000
heap
page read and write
A708000
direct allocation
page execute and read and write
7654000
heap
page read and write
881C000
stack
page read and write
6D4E1000
unkown
page execute read
2351F000
heap
page read and write
75E5000
heap
page read and write
7A80000
trusted library allocation
page read and write
75EE000
heap
page read and write
23511000
heap
page read and write
2351F000
heap
page read and write
2EB0000
heap
page read and write
5ED9000
trusted library allocation
page read and write
2351F000
heap
page read and write
23511000
heap
page read and write
75EE000
heap
page read and write
88A0000
heap
page read and write
23511000
heap
page read and write
23511000
heap
page read and write
23511000
heap
page read and write
760A000
heap
page read and write
2352D000
heap
page read and write
33A0000
trusted library allocation
page read and write
84C0000
trusted library allocation
page read and write
571000
heap
page read and write
23D62000
heap
page read and write
23900000
direct allocation
page read and write
4AC0000
heap
page read and write
2714000
heap
page read and write
2352E000
heap
page read and write
4EE000
stack
page read and write
33B9000
trusted library allocation
page read and write
75FC000
heap
page read and write
23A78000
heap
page read and write
23511000
heap
page read and write
571000
heap
page read and write
2352D000
heap
page read and write
75EE000
heap
page read and write
23511000
heap
page read and write
4ED1000
trusted library allocation
page read and write
2352E000
heap
page read and write
23567000
heap
page read and write
2716000
heap
page read and write
23511000
heap
page read and write
24400000
trusted library allocation
page read and write
238C0000
direct allocation
page read and write
23A73000
heap
page read and write
2351F000
heap
page read and write
3170000
heap
page read and write
2353C000
heap
page read and write
2BEC000
stack
page read and write
3050000
heap
page read and write
9240000
direct allocation
page execute and read and write
49F0000
trusted library allocation
page read and write
55F000
heap
page read and write
2351F000
heap
page read and write
75EE000
heap
page read and write
7730000
heap
page read and write
23511000
heap
page read and write
23567000
heap
page read and write
55F000
heap
page read and write
8FF000
stack
page read and write
2EE0000
heap
page read and write
337E000
unkown
page read and write
2352E000
heap
page read and write
75EE000
heap
page read and write
760A000
heap
page read and write
23511000
heap
page read and write
270F000
stack
page read and write
23511000
heap
page read and write
760A000
heap
page read and write
75EE000
heap
page read and write
2353C000
heap
page read and write
8497000
stack
page read and write
2351F000
heap
page read and write
55F000
heap
page read and write
760B000
heap
page read and write
575000
heap
page read and write
36F0000
heap
page read and write
910000
heap
page read and write
575000
heap
page read and write
75EE000
heap
page read and write
75EE000
heap
page read and write
23C67000
heap
page read and write
2DCD000
stack
page read and write
4A5000
heap
page read and write
55F000
heap
page read and write
4EC9000
heap
page read and write
2353C000
heap
page read and write
8620000
trusted library allocation
page read and write
2352D000
heap
page read and write
3C60000
remote allocation
page execute and read and write
2351F000
heap
page read and write
8610000
trusted library allocation
page execute and read and write
2351F000
heap
page read and write
317B000
heap
page read and write
238A0000
direct allocation
page read and write
773E000
heap
page read and write
2355A000
heap
page read and write
2715000
heap
page read and write
7A00000
trusted library allocation
page read and write
2351F000
heap
page read and write
7654000
heap
page read and write
2352E000
heap
page read and write
8AC0000
heap
page read and write
78A0000
trusted library allocation
page read and write
7627000
heap
page read and write
760A000
heap
page read and write
23511000
heap
page read and write
75E0000
heap
page read and write
2351F000
heap
page read and write
2351F000
heap
page read and write
23567000
heap
page read and write
75FB000
heap
page read and write
75EE000
heap
page read and write
599A000
remote allocation
page execute and read and write
23511000
heap
page read and write
23B8A000
heap
page read and write
2351F000
heap
page read and write
7619000
heap
page read and write
581000
heap
page read and write
445000
unkown
page readonly
75EE000
heap
page read and write
238B0000
direct allocation
page read and write
2351F000
heap
page read and write
3055000
heap
page read and write
23D0F000
heap
page read and write
2353C000
heap
page read and write
2352E000
heap
page read and write
49E000
stack
page read and write
8AD0000
direct allocation
page execute and read and write
543A000
trusted library allocation
page read and write
7654000
heap
page read and write
2712000
heap
page read and write
2713000
heap
page read and write
893B000
heap
page read and write
3380000
trusted library section
page read and write
2353C000
heap
page read and write
23A75000
heap
page read and write
2351F000
heap
page read and write
75FC000
heap
page read and write
796E000
stack
page read and write
23736000
heap
page read and write
760B000
heap
page read and write
7A30000
trusted library allocation
page read and write
8590000
trusted library allocation
page read and write
55F000
heap
page read and write
2353C000
heap
page read and write
71A0000
direct allocation
page read and write
581000
heap
page read and write
2351F000
heap
page read and write
56B000
heap
page read and write
77E5000
heap
page read and write
75FC000
heap
page read and write
55F000
heap
page read and write
6F8E000
stack
page read and write
2353C000
heap
page read and write
75EE000
heap
page read and write
6D4E3000
unkown
page read and write
56B000
heap
page read and write
4A98000
trusted library allocation
page read and write
6F4E000
stack
page read and write
581000
heap
page read and write
2353C000
heap
page read and write
7160000
direct allocation
page read and write
56B000
heap
page read and write
4F2E000
trusted library allocation
page read and write
2F0C000
heap
page read and write
7627000
heap
page read and write
2353C000
heap
page read and write
2F74000
heap
page read and write
238F0000
direct allocation
page read and write
704E000
stack
page read and write
7627000
heap
page read and write
5025000
trusted library allocation
page read and write
23511000
heap
page read and write
4EC0000
heap
page read and write
23511000
heap
page read and write
75E0000
heap
page read and write
4A80000
heap
page execute and read and write
2353C000
heap
page read and write
2F18000
heap
page read and write
23880000
direct allocation
page read and write
238BE000
heap
page read and write
23569000
heap
page read and write
33A3000
trusted library allocation
page execute and read and write
2353C000
heap
page read and write
2353C000
heap
page read and write
2351E000
heap
page read and write
7627000
heap
page read and write
55F000
heap
page read and write
2352D000
heap
page read and write
2351C000
heap
page read and write
7627000
heap
page read and write
4AC7000
heap
page read and write
2353C000
heap
page read and write
2712000
heap
page read and write
23511000
heap
page read and write
75E0000
heap
page read and write
575000
heap
page read and write
23511000
heap
page read and write
2FB9000
heap
page read and write
75FC000
heap
page read and write
581000
heap
page read and write
371E000
stack
page read and write
2353C000
heap
page read and write
2353C000
heap
page read and write
2353C000
heap
page read and write
75FC000
heap
page read and write
4E4F000
stack
page read and write
23C90000
heap
page read and write
23A7F000
heap
page read and write
2351F000
heap
page read and write
7627000
heap
page read and write
7622000
heap
page read and write
2353C000
heap
page read and write
7619000
heap
page read and write
2351F000
heap
page read and write
56B000
heap
page read and write
571000
heap
page read and write
2353C000
heap
page read and write
2351E000
heap
page read and write
2354A000
heap
page read and write
3130000
heap
page read and write
2351F000
heap
page read and write
2352E000
heap
page read and write
2353C000
heap
page read and write
760A000
heap
page read and write
6D4E4000
unkown
page readonly
23511000
heap
page read and write
23511000
heap
page read and write
6A0000
heap
page read and write
75EE000
heap
page read and write
571000
heap
page read and write
2351E000
heap
page read and write
75FC000
heap
page read and write
7AC0000
trusted library allocation
page execute and read and write
2353C000
heap
page read and write
238BB000
heap
page read and write
7A60000
trusted library allocation
page read and write
23511000
heap
page read and write
23559000
heap
page read and write
2352E000
heap
page read and write
55F000
heap
page read and write
79F0000
trusted library allocation
page read and write
4AB0000
trusted library allocation
page read and write
7AB0000
trusted library allocation
page read and write
23511000
heap
page read and write
2351F000
heap
page read and write
33C0000
heap
page read and write
75DB000
heap
page read and write
2351F000
heap
page read and write
23511000
heap
page read and write
580000
heap
page read and write
2353C000
heap
page read and write
2352E000
heap
page read and write
571000
heap
page read and write
422000
unkown
page read and write
23511000
heap
page read and write
2352E000
heap
page read and write
2352D000
heap
page read and write
75AE000
stack
page read and write
401000
unkown
page execute read
56B000
heap
page read and write
23511000
heap
page read and write
56B000
heap
page read and write
70F0000
direct allocation
page read and write
571000
heap
page read and write
7120000
direct allocation
page read and write
2EA0000
heap
page read and write
23880000
direct allocation
page read and write
23511000
heap
page read and write
575000
heap
page read and write
3040000
trusted library section
page read and write
40A000
unkown
page write copy
235A3000
heap
page read and write
2352D000
heap
page read and write
85A0000
trusted library allocation
page read and write
2719000
heap
page read and write
2352E000
heap
page read and write
23511000
heap
page read and write
760A000
heap
page read and write
2351F000
heap
page read and write
7627000
heap
page read and write
55F000
heap
page read and write
84A0000
heap
page read and write
2352E000
heap
page read and write
581000
heap
page read and write
79AE000
stack
page read and write
55F000
heap
page read and write
23DB1000
heap
page read and write
2352E000
heap
page read and write
575000
heap
page read and write
23A71000
heap
page read and write
774E000
heap
page read and write
581000
heap
page read and write
75EE000
heap
page read and write
2351F000
heap
page read and write
2353C000
heap
page read and write
56B000
heap
page read and write
581000
heap
page read and write
23511000
heap
page read and write
56B000
heap
page read and write
2353C000
heap
page read and write
75EE000
heap
page read and write
7628000
heap
page read and write
2352E000
heap
page read and write
2352D000
heap
page read and write
2353C000
heap
page read and write
2352D000
heap
page read and write
930000
heap
page read and write
571000
heap
page read and write
2351F000
heap
page read and write
2352E000
heap
page read and write
27F0000
direct allocation
page read and write
760A000
heap
page read and write
2352E000
heap
page read and write
23511000
heap
page read and write
75E5000
heap
page read and write
2351F000
heap
page read and write
23511000
heap
page read and write
49F5000
trusted library allocation
page execute and read and write
2713000
heap
page read and write
2351F000
heap
page read and write
55F000
heap
page read and write
571000
heap
page read and write
23EB7000
heap
page read and write
23511000
heap
page read and write
2353C000
heap
page read and write
55F000
heap
page read and write
2351F000
heap
page read and write
2353C000
heap
page read and write
8AB0000
trusted library allocation
page execute and read and write
2353C000
heap
page read and write
7637000
heap
page read and write
2352D000
heap
page read and write
85B0000
trusted library allocation
page read and write
760B000
heap
page read and write
581000
heap
page read and write
2710000
heap
page read and write
2353C000
heap
page read and write
23511000
heap
page read and write
6079000
trusted library allocation
page read and write
56B000
heap
page read and write
6D4E0000
unkown
page readonly
7880000
trusted library allocation
page read and write
2F4B000
heap
page read and write
2353C000
heap
page read and write
6C0000
heap
page read and write
2351F000
heap
page read and write
2351F000
heap
page read and write
2353C000
heap
page read and write
760B000
heap
page read and write
C508000
direct allocation
page execute and read and write
23511000
heap
page read and write
2351F000
heap
page read and write
445000
unkown
page readonly
2352E000
heap
page read and write
581000
heap
page read and write
4E8C000
stack
page read and write
78E0000
heap
page execute and read and write
571000
heap
page read and write
23559000
heap
page read and write
23511000
heap
page read and write
2351F000
heap
page read and write
56B000
heap
page read and write
400000
unkown
page readonly
75EE000
heap
page read and write
7AA0000
trusted library allocation
page read and write
2351F000
heap
page read and write
2353C000
heap
page read and write
23B64000
heap
page read and write
75FC000
heap
page read and write
571000
heap
page read and write
2351F000
heap
page read and write
2351F000
heap
page read and write
271D000
heap
page read and write
88C3000
heap
page read and write
792E000
stack
page read and write
75EE000
heap
page read and write
23511000
heap
page read and write
4A0000
heap
page read and write
55F000
heap
page read and write
7170000
direct allocation
page read and write
7870000
trusted library allocation
page read and write
2351F000
heap
page read and write
7645000
heap
page read and write
23A7C000
heap
page read and write
23E68000
heap
page read and write
23511000
heap
page read and write
7150000
direct allocation
page read and write
7637000
heap
page read and write
23880000
direct allocation
page read and write
84B0000
trusted library allocation
page read and write
79ED000
stack
page read and write
7890000
trusted library allocation
page read and write
238BB000
heap
page read and write
2352E000
heap
page read and write
260E000
stack
page read and write
71B0000
direct allocation
page read and write
3D28000
remote allocation
page execute and read and write
23511000
heap
page read and write
530000
heap
page read and write
23511000
heap
page read and write
33C8000
heap
page read and write
23A77000
heap
page read and write
2353C000
heap
page read and write
23511000
heap
page read and write
575000
heap
page read and write
75EE000
heap
page read and write
780E000
heap
page read and write
23511000
heap
page read and write
2351F000
heap
page read and write
75F9000
heap
page read and write
8715000
trusted library allocation
page read and write
2353C000
heap
page read and write
2351F000
heap
page read and write
2353C000
heap
page read and write
2353C000
heap
page read and write
2353C000
heap
page read and write
856E000
stack
page read and write
400000
unkown
page readonly
23A7C000
heap
page read and write
49EA000
trusted library allocation
page execute and read and write
23594000
heap
page read and write
5EF9000
trusted library allocation
page read and write
5F3A000
trusted library allocation
page read and write
238B0000
direct allocation
page read and write
2353C000
heap
page read and write
23511000
heap
page read and write
7A10000
trusted library allocation
page read and write
2352E000
heap
page read and write
35BF000
stack
page read and write
56B000
heap
page read and write
23511000
heap
page read and write
760A000
heap
page read and write
2351F000
heap
page read and write
4A5E000
stack
page read and write
75FC000
heap
page read and write
23E14000
heap
page read and write
23511000
heap
page read and write
23BB0000
heap
page read and write
B108000
direct allocation
page execute and read and write
575000
heap
page read and write
7627000
heap
page read and write
23730000
direct allocation
page execute and read and write
23511000
heap
page read and write
7646000
heap
page read and write
7717000
trusted library allocation
page read and write
437000
unkown
page readonly
760B000
heap
page read and write
2352D000
heap
page read and write
7F430000
trusted library allocation
page execute and read and write
571000
heap
page read and write
607F000
trusted library allocation
page read and write
23B3A000
heap
page read and write
23511000
heap
page read and write
235A3000
heap
page read and write
3040000
heap
page read and write
23511000
heap
page read and write
19A000
stack
page read and write
2351F000
heap
page read and write
8570000
heap
page read and write
2352E000
heap
page read and write
23511000
heap
page read and write
78D0000
trusted library allocation
page execute and read and write
75EE000
heap
page read and write
7050000
heap
page execute and read and write
75FC000
heap
page read and write
35C0000
heap
page read and write
2352E000
heap
page read and write
538000
heap
page read and write
4F9A000
remote allocation
page execute and read and write
33AD000
trusted library allocation
page execute and read and write
575000
heap
page read and write
23511000
heap
page read and write
2352E000
heap
page read and write
23511000
heap
page read and write
2351F000
heap
page read and write
760A000
heap
page read and write
88F9000
heap
page read and write
75FC000
heap
page read and write
271B000
heap
page read and write
85C0000
trusted library allocation
page read and write
2351F000
heap
page read and write
575000
heap
page read and write
2F72000
heap
page read and write
23511000
heap
page read and write
2353C000
heap
page read and write
581000
heap
page read and write
2351F000
heap
page read and write
2351F000
heap
page read and write
23511000
heap
page read and write
575000
heap
page read and write
2EE8000
heap
page read and write
429000
unkown
page read and write
7140000
direct allocation
page read and write
23A70000
trusted library allocation
page read and write
7110000
direct allocation
page read and write
760F000
heap
page read and write
760A000
heap
page read and write
75FC000
heap
page read and write
2352E000
heap
page read and write
75FC000
heap
page read and write
7B0C000
stack
page read and write
2716000
heap
page read and write
238B0000
direct allocation
page read and write
2352E000
heap
page read and write
23511000
heap
page read and write
23511000
heap
page read and write
23511000
heap
page read and write
3550000
heap
page read and write
75EE000
heap
page read and write
8580000
trusted library allocation
page execute and read and write
2351F000
heap
page read and write
271E000
heap
page read and write
2351F000
heap
page read and write
2353C000
heap
page read and write
2351F000
heap
page read and write
23511000
heap
page read and write
571000
heap
page read and write
23511000
heap
page read and write
450000
heap
page read and write
571000
heap
page read and write
2718000
heap
page read and write
6D4E2000
unkown
page readonly
3020000
heap
page read and write
2353C000
heap
page read and write
7A40000
trusted library allocation
page read and write
587000
heap
page read and write
23511000
heap
page read and write
71C0000
direct allocation
page read and write
3160000
heap
page read and write
2352E000
heap
page read and write
7130000
direct allocation
page read and write
23C0E000
heap
page read and write
2352E000
heap
page read and write
2353B000
heap
page read and write
2352D000
heap
page read and write
437000
unkown
page readonly
2351F000
heap
page read and write
2351E000
heap
page read and write
75EE000
heap
page read and write
34BE000
stack
page read and write
575000
heap
page read and write
23511000
heap
page read and write
75FC000
heap
page read and write
2353C000
heap
page read and write
23A7A000
heap
page read and write
23880000
direct allocation
page read and write
575000
heap
page read and write
23511000
heap
page read and write
700E000
stack
page read and write
23511000
heap
page read and write
75EE000
heap
page read and write
435000
unkown
page readonly
2351F000
heap
page read and write
2353C000
heap
page read and write
581000
heap
page read and write
56B000
heap
page read and write
401000
unkown
page execute read
7388000
heap
page read and write
7850000
trusted library allocation
page read and write
2351F000
heap
page read and write
575000
heap
page read and write
271B000
heap
page read and write
BB08000
direct allocation
page execute and read and write
2351F000
heap
page read and write
7180000
direct allocation
page read and write
2353C000
heap
page read and write
75EE000
heap
page read and write
7627000
heap
page read and write
75FC000
heap
page read and write
2351F000
heap
page read and write
23511000
heap
page read and write
2351F000
heap
page read and write
2353C000
heap
page read and write
23511000
heap
page read and write
2353C000
heap
page read and write
852D000
stack
page read and write
271E000
heap
page read and write
7860000
trusted library allocation
page read and write
2352D000
heap
page read and write
7710000
trusted library allocation
page read and write
23511000
heap
page read and write
55F000
heap
page read and write
2351F000
heap
page read and write
575000
heap
page read and write
75EE000
heap
page read and write
24400000
trusted library allocation
page read and write
4A10000
trusted library allocation
page read and write
23511000
heap
page read and write
347F000
unkown
page read and write
2351F000
heap
page read and write
23512000
heap
page read and write
5434000
trusted library allocation
page read and write
2354A000
heap
page read and write
6F0E000
stack
page read and write
27E0000
heap
page readonly
2353C000
heap
page read and write
2F6F000
heap
page read and write
571000
heap
page read and write
2353C000
heap
page read and write
2352E000
heap
page read and write
2353C000
heap
page read and write
2351F000
heap
page read and write
2352E000
heap
page read and write
2353C000
heap
page read and write
23A7B000
heap
page read and write
2353C000
heap
page read and write
2352E000
heap
page read and write
581000
heap
page read and write
23511000
heap
page read and write
2352E000
heap
page read and write
56B000
heap
page read and write
23511000
heap
page read and write
7A50000
trusted library allocation
page read and write
23511000
heap
page read and write
9B0000
heap
page read and write
590000
heap
page read and write
55F000
heap
page read and write
23CB5000
heap
page read and write
56B000
heap
page read and write
23512000
heap
page read and write
2351E000
heap
page read and write
23511000
heap
page read and write
2351F000
heap
page read and write
2352E000
heap
page read and write
571000
heap
page read and write
435000
unkown
page readonly
2353C000
heap
page read and write
761A000
heap
page read and write
7FF000
stack
page read and write
75FC000
heap
page read and write
78C0000
trusted library allocation
page read and write
2351F000
heap
page read and write
23511000
heap
page read and write
2F6D000
heap
page read and write
408000
unkown
page readonly
459A000
remote allocation
page execute and read and write
2352D000
heap
page read and write
9D08000
direct allocation
page execute and read and write
7A70000
trusted library allocation
page read and write
5ED1000
trusted library allocation
page read and write
2352D000
heap
page read and write
2352D000
heap
page read and write
575000
heap
page read and write
8AA0000
trusted library allocation
page read and write
56B000
heap
page read and write
2352D000
heap
page read and write
23516000
heap
page read and write
2351F000
heap
page read and write
56B000
heap
page read and write
2353C000
heap
page read and write
760A000
heap
page read and write
2353C000
heap
page read and write
581000
heap
page read and write
2354A000
heap
page read and write
760A000
heap
page read and write
2351F000
heap
page read and write
23C47000
heap
page read and write
2351F000
heap
page read and write
2352D000
heap
page read and write
2352E000
heap
page read and write
23511000
heap
page read and write
23910000
direct allocation
page read and write
2354A000
heap
page read and write
75EE000
heap
page read and write
87DC000
stack
page read and write
75EE000
stack
page read and write
259F000
stack
page read and write
2352D000
heap
page read and write
2352E000
heap
page read and write
7627000
heap
page read and write
55F000
heap
page read and write
2353C000
heap
page read and write
2353C000
heap
page read and write
23511000
heap
page read and write
2351F000
heap
page read and write
7055000
heap
page execute and read and write
23C03000
heap
page read and write
75EE000
heap
page read and write
23511000
heap
page read and write
75EE000
heap
page read and write
2353C000
heap
page read and write
2E39000
stack
page read and write
75EE000
heap
page read and write
510000
heap
page read and write
23511000
heap
page read and write
75FC000
heap
page read and write
6066000
trusted library allocation
page read and write
75FC000
heap
page read and write
2351F000
heap
page read and write
2353C000
heap
page read and write
760B000
heap
page read and write
3390000
trusted library allocation
page read and write
2353C000
heap
page read and write
2353C000
heap
page read and write
75E0000
heap
page read and write
23511000
heap
page read and write
23C5B000
heap
page read and write
7627000
heap
page read and write
2351F000
heap
page read and write
4A70000
trusted library allocation
page execute and read and write
23511000
heap
page read and write
75EE000
heap
page read and write
7627000
heap
page read and write
23511000
heap
page read and write
2351F000
heap
page read and write
4F0000
heap
page read and write
2355A000
heap
page read and write
571000
heap
page read and write
425000
unkown
page read and write
75FC000
heap
page read and write
761A000
heap
page read and write
30FE000
stack
page read and write
2353C000
heap
page read and write
98000
stack
page read and write
581000
heap
page read and write
2351F000
heap
page read and write
2351F000
heap
page read and write
575000
heap
page read and write
760B000
heap
page read and write
8630000
heap
page read and write
23511000
heap
page read and write
23511000
heap
page read and write
2351F000
heap
page read and write
75DB000
heap
page read and write
75EE000
heap
page read and write
75FC000
heap
page read and write
4A60000
heap
page readonly
8AE0000
trusted library allocation
page read and write
575000
heap
page read and write
271C000
heap
page read and write
9B5000
heap
page read and write
2352D000
heap
page read and write
23A72000
heap
page read and write
75EE000
heap
page read and write
75EE000
heap
page read and write
433000
unkown
page read and write
97E000
stack
page read and write
23850000
direct allocation
page read and write
23511000
heap
page read and write
7627000
heap
page read and write
709F000
stack
page read and write
2351F000
heap
page read and write
7A90000
trusted library allocation
page read and write
23511000
heap
page read and write
6C7000
heap
page read and write
2352E000
heap
page read and write
33B0000
trusted library allocation
page read and write
33A4000
trusted library allocation
page read and write
23511000
heap
page read and write
49E0000
trusted library allocation
page read and write
75EE000
heap
page read and write
2351F000
heap
page read and write
23511000
heap
page read and write
2353C000
heap
page read and write
40A000
unkown
page read and write
75EE000
heap
page read and write
581000
heap
page read and write
581000
heap
page read and write
571000
heap
page read and write
2353C000
heap
page read and write
361C000
stack
page read and write
23BE6000
heap
page read and write
23511000
heap
page read and write
7A20000
trusted library allocation
page read and write
There are 794 hidden memdumps, click here to show them.