IOC Report
PO2737478834ORDER.exe

loading gif

Files

File Path
Type
Category
Malicious
PO2737478834ORDER.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Berni72\PO2737478834ORDER.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Kejsertankens\Habitters.Hej
ASCII text, with very long lines (54181), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jsllekrm.5tn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k4d5lkwh.skb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\freebl3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\mozglue.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\msvcp140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nss3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
modified
C:\Users\user\AppData\Local\Temp\nsxE304.tmp\nsExec.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\softokn3.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\vcruntime140.dll
PE32 executable (DLL) (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Berni72\PO2737478834ORDER.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Berni72\tipple.tak
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Kejsertankens\Hurtfully.Skr
hp200 (68010) BSD
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Kejsertankens\Pronominalize.nic
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Kejsertankens\Sialostenosis230.iso
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Kejsertankens\amtstue.sub
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Kejsertankens\bevidsthedsdannende.syn
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Kejsertankens\brnderen.gun
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Kejsertankens\spalteformens\conducing.red
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sultanizes\elvinus.bkk
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sultanizes\fodlanges.txt
ASCII text, with very long lines (319), with no line terminators
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sultanizes\fodsaalerne.ima
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sultanizes\nomophylax.lop
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sultanizes\overfrankere.akt
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sultanizes\poetizer.pon
data
dropped
C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Sultanizes\snidest.epe
data
dropped
C:\Users\user\AppData\Roaming\KxpssdC.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Roaming\cifBtkd.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Roaming\ef.CnFA.tmp
JSON data
dropped
C:\Users\user\AppData\Roaming\rDrheBe.tmp
JSON data
dropped
There are 23 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\PO2737478834ORDER.exe
"C:\Users\user\Desktop\PO2737478834ORDER.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Akteret=Get-Content 'C:\Users\user\AppData\Roaming\Grydeskeen146\sdfdsf\Kejsertankens\Habitters.Hej';$Engraphy=$Akteret.SubString(54172,3);.$Engraphy($Akteret)"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" "/c set /A 1^^0"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://www.mozilla.com/en-US/blocklist/
unknown
http://nsis.sf.net/NSIS_Error
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://aka.ms/pscore6lB
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://ocsp.thawte.com0
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://crt.rootca1.amazontrust.com/rootca1.cer0?
unknown
https://contoso.com/License
unknown
http://www.mozilla.com0
unknown
https://contoso.com/Icon
unknown
http://72.11.156.201/VyNLorvhdmohGewWLK21.bin
72.11.156.201
http://crl.rootca1.amazontrust.com/rootca1.crl0
unknown
http://ocsp.rootca1.amazontrust.com0:
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://github.com/syohex/java-simple-mine-sweeperC:
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 13 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mad.pzg-peru.com
31.192.107.180
malicious

IPs

IP
Domain
Country
Malicious
31.192.107.180
mad.pzg-peru.com
Russian Federation
malicious
72.11.156.201
unknown
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
MaxConnectionsPer1_0Server
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings
MaxConnectionsPerServer
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum
Version

Memdumps

Base Address
Regiontype
Protect
Malicious
219B2000
heap
page read and write
malicious
A28F000
direct allocation
page execute and read and write
malicious
21C0C000
heap
page read and write
malicious
4F39000
heap
page read and write
malicious
21827000
heap
page read and write
4F6B000
heap
page read and write
21051000
heap
page read and write
6431000
trusted library allocation
page read and write
4F4D000
heap
page read and write
51C7000
heap
page read and write
40A000
unkown
page write copy
21051000
heap
page read and write
4F5C000
heap
page read and write
4F6B000
heap
page read and write
40A000
unkown
page read and write
218DC000
heap
page read and write
4F5C000
heap
page read and write
4F48000
heap
page read and write
4F5C000
heap
page read and write
6A4000
heap
page read and write
21051000
heap
page read and write
74EE000
stack
page read and write
4F6A000
heap
page read and write
7580000
trusted library allocation
page read and write
2176A000
heap
page read and write
7EE0000
trusted library allocation
page read and write
4F4D000
heap
page read and write
32D5000
heap
page read and write
4F6A000
heap
page read and write
4F4D000
heap
page read and write
4F6A000
heap
page read and write
4F4D000
heap
page read and write
6FE92000
unkown
page readonly
6A4000
heap
page read and write
4F3E000
heap
page read and write
4F5C000
heap
page read and write
4F6B000
heap
page read and write
6A0000
heap
page read and write
4F4D000
heap
page read and write
215C0000
direct allocation
page read and write
2117C000
heap
page read and write
69C000
heap
page read and write
3310000
heap
page read and write
4F5C000
heap
page read and write
6ED92000
unkown
page read and write
216F0000
direct allocation
page read and write
6A4000
heap
page read and write
4F6B000
heap
page read and write
690000
heap
page read and write
4F4D000
heap
page read and write
21C0000
heap
page read and write
210A7000
heap
page read and write
352E000
unkown
page read and write
7AA2000
heap
page read and write
4F6A000
heap
page read and write
4F6B000
heap
page read and write
7F0F0000
trusted library allocation
page execute and read and write
4F6A000
heap
page read and write
4F6A000
heap
page read and write
4F43000
heap
page read and write
4F6B000
heap
page read and write
4F5C000
heap
page read and write
21051000
heap
page read and write
21051000
heap
page read and write
690000
heap
page read and write
21051000
heap
page read and write
700D1000
unkown
page execute read
4F6A000
heap
page read and write
4F5C000
heap
page read and write
4F5C000
heap
page read and write
6A4000
heap
page read and write
4F6A000
heap
page read and write
215C0000
direct allocation
page read and write
4F5C000
heap
page read and write
4F6A000
heap
page read and write
4F6B000
heap
page read and write
4F5C000
heap
page read and write
4F4D000
heap
page read and write
21D19000
direct allocation
page read and write
21D14000
direct allocation
page read and write
4F6A000
heap
page read and write
2F4D000
stack
page read and write
5420000
heap
page read and write
4F4D000
heap
page read and write
75C0000
direct allocation
page read and write
4F44000
heap
page read and write
21EC4000
direct allocation
page read and write
4F78000
heap
page read and write
4F5C000
heap
page read and write
8A30000
trusted library allocation
page read and write
4F6A000
heap
page read and write
21E97000
direct allocation
page read and write
4F5C000
heap
page read and write
2057B000
stack
page read and write
21051000
heap
page read and write
435000
unkown
page readonly
21051000
heap
page read and write
4F5C000
heap
page read and write
3390000
heap
page read and write
51C0000
heap
page read and write
4E00000
heap
page read and write
4F4D000
heap
page read and write
4F5C000
heap
page read and write
4F5C000
heap
page read and write
4F5C000
heap
page read and write
8F10000
trusted library allocation
page execute and read and write
21051000
heap
page read and write
8AA5000
trusted library allocation
page read and write
4F6B000
heap
page read and write
21858000
heap
page read and write
4F5C000
heap
page read and write
4F6B000
heap
page read and write
7CE0000
trusted library allocation
page read and write
4F87000
heap
page read and write
4F6B000
heap
page read and write
4F5C000
heap
page read and write
53FF000
stack
page read and write
21051000
heap
page read and write
4F4D000
heap
page read and write
32FD000
stack
page read and write
2766000
heap
page read and write
211A7000
heap
page read and write
215F0000
heap
page read and write
275F000
stack
page read and write
4F5C000
heap
page read and write
6B8000
heap
page read and write
8D17000
heap
page read and write
4F6A000
heap
page read and write
2118B000
heap
page read and write
4F6A000
heap
page read and write
65DC000
trusted library allocation
page read and write
5160000
direct allocation
page read and write
95F000
stack
page read and write
21760000
heap
page read and write
3690000
trusted library allocation
page read and write
4F6A000
heap
page read and write
4F5C000
heap
page read and write
408000
unkown
page readonly
4F6B000
heap
page read and write
5431000
trusted library allocation
page read and write
4F5C000
heap
page read and write
356B000
heap
page read and write
4F6B000
heap
page read and write
4F4D000
heap
page read and write
21051000
heap
page read and write
4F6B000
heap
page read and write
21D53000
direct allocation
page read and write
4F6A000
heap
page read and write
4F4D000
heap
page read and write
2769000
heap
page read and write
6D6CB000
unkown
page readonly
21A0E000
heap
page read and write
4F4D000
heap
page read and write
7D30000
trusted library allocation
page read and write
21151000
heap
page read and write
4F6A000
heap
page read and write
4F6B000
heap
page read and write
4F6A000
heap
page read and write
4F87000
heap
page read and write
4F6A000
heap
page read and write
21051000
heap
page read and write
216F0000
direct allocation
page read and write
8EF0000
trusted library allocation
page read and write
7590000
heap
page execute and read and write
3481000
heap
page read and write
33F0000
heap
page read and write
21986000
heap
page read and write
4F4D000
heap
page read and write
4F4D000
heap
page read and write
215C0000
direct allocation
page read and write
21EC1000
direct allocation
page read and write
4F6B000
heap
page read and write
4F4D000
heap
page read and write
4F6A000
heap
page read and write
4F4D000
heap
page read and write
21051000
heap
page read and write
4F4D000
heap
page read and write
20720000
heap
page read and write
4F6B000
heap
page read and write
4F78000
heap
page read and write
21051000
heap
page read and write
4F5C000
heap
page read and write
21051000
heap
page read and write
2176F000
heap
page read and write
4F6A000
heap
page read and write
4F6B000
heap
page read and write
4F4D000
heap
page read and write
4F6A000
heap
page read and write
21905000
heap
page read and write
21EAA000
direct allocation
page read and write
210A7000
heap
page read and write
4F6A000
heap
page read and write
746E000
stack
page read and write
4F6A000
heap
page read and write
4F6B000
heap
page read and write
4F6B000
heap
page read and write
21959000
heap
page read and write
21051000
heap
page read and write
4ED0000
heap
page read and write
4F6B000
heap
page read and write
4F5C000
heap
page read and write
4F4D000
heap
page read and write
4F4D000
heap
page read and write
6A0000
heap
page read and write
210A7000
heap
page read and write
75D0000
direct allocation
page read and write
21151000
heap
page read and write
6A0000
heap
page read and write
21740000
direct allocation
page read and write
4F6B000
heap
page read and write
21051000
heap
page read and write
8C9E000
stack
page read and write
21D77000
direct allocation
page read and write
6A0000
heap
page read and write
4F6A000
heap
page read and write
4F96000
heap
page read and write
21F99000
direct allocation
page read and write
4F87000
heap
page read and write
6FF70000
unkown
page readonly
3570000
direct allocation
page read and write
2765000
heap
page read and write
8A0E000
stack
page read and write
4F6B000
heap
page read and write
4F5C000
heap
page read and write
21891000
heap
page read and write
4F6B000
heap
page read and write
4F6B000
heap
page read and write
21051000
heap
page read and write
7C6E000
heap
page read and write
4F5C000
heap
page read and write
4F6A000
heap
page read and write
6FE90000
unkown
page read and write
7A4E000
stack
page read and write
7D10000
trusted library allocation
page read and write
690000
heap
page read and write
4F4D000
heap
page read and write
4F6A000
heap
page read and write
445000
unkown
page readonly
4F4D000
heap
page read and write
20450000
heap
page read and write
5429000
heap
page read and write
4F5C000
heap
page read and write
4F6B000
heap
page read and write
4F6B000
heap
page read and write
21099000
heap
page read and write
4F4D000
heap
page read and write
2105E000
heap
page read and write
4F5C000
heap
page read and write
4F4D000
heap
page read and write
4F4D000
heap
page read and write
21051000
heap
page read and write
89C0000
heap
page read and write
4F4D000
heap
page read and write
8CE0000
heap
page read and write
4F45000
heap
page read and write
4F5C000
heap
page read and write
4F5B000
heap
page read and write
21051000
heap
page read and write
4F6B000
heap
page read and write
7620000
direct allocation
page read and write
7587000
trusted library allocation
page read and write
21051000
heap
page read and write
4F5C000
heap
page read and write
7820000
heap
page read and write
21051000
heap
page read and write
4F14000
heap
page read and write
202ED000
stack
page read and write
752F000
stack
page read and write
21051000
heap
page read and write
4F4D000
heap
page read and write
8D24000
heap
page read and write
401000
unkown
page execute read
4F4D000
heap
page read and write
21051000
heap
page read and write
4E50000
direct allocation
page read and write
4F4D000
heap
page read and write
4F5C000
heap
page read and write
6D594000
unkown
page readonly
20B80000
heap
page read and write
4F6B000
heap
page read and write
218F2000
heap
page read and write
4F6A000
heap
page read and write
4F4D000
heap
page read and write
21151000
heap
page read and write
4F5C000
heap
page read and write
35B0000
direct allocation
page read and write
4F6B000
heap
page read and write
4F5C000
heap
page read and write
4F5C000
heap
page read and write
22EF000
stack
page read and write
4F6A000
heap
page read and write
4F5C000
heap
page read and write
4F5C000
heap
page read and write
4F6A000
heap
page read and write
21051000
heap
page read and write
219A9000
heap
page read and write
6A4000
heap
page read and write
6A4000
heap
page read and write
21051000
heap
page read and write
4F6B000
heap
page read and write
4F4D000
heap
page read and write
4F5C000
heap
page read and write
35F0000
heap
page read and write
4F5B000
heap
page read and write
6D57F000
unkown
page readonly
4F5C000
heap
page read and write
5BE000
stack
page read and write
4F4D000
heap
page read and write
3680000
trusted library allocation
page read and write
65C9000
trusted library allocation
page read and write
21051000
heap
page read and write
4F4E000
heap
page read and write
21051000
heap
page read and write
4F87000
heap
page read and write
6FF81000
unkown
page readonly
4F5C000
heap
page read and write
8F30000
direct allocation
page execute and read and write
4F6A000
heap
page read and write
4F73000
heap
page read and write
4F4D000
heap
page read and write
7CF0000
trusted library allocation
page read and write
21151000
heap
page read and write
8F00000
trusted library allocation
page read and write
4F6B000
heap
page read and write
69C000
heap
page read and write
6A0000
heap
page read and write
21051000
heap
page read and write
215C0000
direct allocation
page read and write
8D40000
heap
page read and write
4E30000
direct allocation
page read and write
6A0000
heap
page read and write
4F6A000
heap
page read and write
4F6A000
heap
page read and write
6A0000
heap
page read and write
8F40000
trusted library allocation
page read and write
690000
heap
page read and write
4F5C000
heap
page read and write
216F0000
direct allocation
page read and write
4F6B000
heap
page read and write
4F5C000
heap
page read and write
21A5E000
heap
page read and write
334E000
stack
page read and write
4F5C000
heap
page read and write
218A0000
trusted library allocation
page read and write
8F20000
heap
page read and write
69C000
heap
page read and write
4F4D000
heap
page read and write
21051000
heap
page read and write
4F6B000
heap
page read and write
21D7C000
direct allocation
page read and write
21051000
heap
page read and write
4F5C000
heap
page read and write
4F5C000
heap
page read and write
218A0000
direct allocation
page read and write
21051000
heap
page read and write
4F4D000
heap
page read and write
6A4000
heap
page read and write
21D33000
direct allocation
page read and write
4F6B000
heap
page read and write
6A0000
heap
page read and write
69C000
heap
page read and write
4F5C000
heap
page read and write
4F5B000
heap
page read and write
6FF80000
unkown
page read and write
6A0000
heap
page read and write
4F5C000
heap
page read and write
4F5C000
heap
page read and write
4F4D000
heap
page read and write
2105F000
heap
page read and write
4F28000
trusted library allocation
page read and write
202AF000
stack
page read and write
6A0000
heap
page read and write
4F6B000
heap
page read and write
21051000
heap
page read and write
4F4D000
heap
page read and write
4F6A000
heap
page read and write
433000
unkown
page read and write
4F6B000
heap
page read and write
4F5C000
heap
page read and write
21151000
heap
page read and write
4F5C000
heap
page read and write
690000
heap
page read and write
4F4D000
heap
page read and write
4F1E000
stack
page read and write
6ED8D000
unkown
page readonly
690000
heap
page read and write
21051000
heap
page read and write
533E000
stack
page read and write
65E2000
trusted library allocation
page read and write
4F6A000
heap
page read and write
211A8000
heap
page read and write
4F6B000
heap
page read and write
4F78000
heap
page read and write
4F6A000
heap
page read and write
21051000
heap
page read and write
7B90000
heap
page read and write
4F4E000
heap
page read and write
4F4D000
heap
page read and write
4F5C000
heap
page read and write
4F5C000
heap
page read and write
4F4D000
heap
page read and write
21764000
heap
page read and write
52FC000
stack
page read and write
385F000
stack
page read and write
2767000
heap
page read and write
4F5C000
heap
page read and write
8D4E000
heap
page read and write
4F4D000
heap
page read and write
63E000
stack
page read and write
4F4D000
heap
page read and write
4F5C000
heap
page read and write
21151000
heap
page read and write
898E000
stack
page read and write
4F6A000
heap
page read and write
36A2000
trusted library allocation
page read and write
21151000
heap
page read and write
4F5C000
heap
page read and write
6FFF2000
unkown
page read and write
21051000
heap
page read and write
4F5C000
heap
page read and write
8D3C000
heap
page read and write
6A4000
heap
page read and write
6D5A0000
unkown
page readonly
4F4D000
heap
page read and write
69C000
heap
page read and write
401000
unkown
page execute read
2314000
heap
page read and write
7F20000
trusted library allocation
page execute and read and write
4F5C000
heap
page read and write
4F5C000
heap
page read and write
4F5C000
heap
page read and write
21151000
heap
page read and write
4F5C000
heap
page read and write
6A4000
heap
page read and write
4F6A000
heap
page read and write
21051000
heap
page read and write
21051000
heap
page read and write
7C53000
heap
page read and write
2767000
heap
page read and write
4F44000
heap
page read and write
4F4D000
heap
page read and write
2176E000
heap
page read and write
4F4D000
heap
page read and write
4F87000
heap
page read and write
276A000
heap
page read and write
217F4000
heap
page read and write
8D00000
heap
page read and write
4F6A000
heap
page read and write
21051000
heap
page read and write
4F4D000
heap
page read and write
4F79000
heap
page read and write
3620000
heap
page read and write
4F6B000
heap
page read and write
4F87000
heap
page read and write
69C000
heap
page read and write
36D0000
heap
page readonly
6ED71000
unkown
page execute read
21151000
heap
page read and write
700D0000
unkown
page readonly
7DFE000
stack
page read and write
4F53000
heap
page read and write
4F6A000
heap
page read and write
4F6A000
heap
page read and write
4F4D000
heap
page read and write
6D58F000
unkown
page read and write
2176B000
heap
page read and write
21AF9000
heap
page read and write
2FFE000
unkown
page read and write
4F5C000
heap
page read and write
425000
unkown
page read and write
21051000
heap
page read and write
4F4D000
heap
page read and write
69C000
heap
page read and write
4F5C000
heap
page read and write
6A4000
heap
page read and write
690000
heap
page read and write
21151000
heap
page read and write
4F6A000
heap
page read and write
4F5C000
heap
page read and write
4F87000
heap
page read and write
21F91000
direct allocation
page read and write
4F87000
heap
page read and write
4F6A000
heap
page read and write
4F5C000
heap
page read and write
4F4D000
heap
page read and write
21151000
heap
page read and write
4F5C000
heap
page read and write
4E70000
direct allocation
page read and write
690000
heap
page read and write
85F000
stack
page read and write
218AF000
heap
page read and write
3673000
trusted library allocation
page execute and read and write
4F5B000
heap
page read and write
4F6A000
heap
page read and write
4F5C000
heap
page read and write
21769000
heap
page read and write
4F6A000
heap
page read and write
437000
unkown
page readonly
21051000
heap
page read and write
4F6B000
heap
page read and write
4F5C000
heap
page read and write
4F4D000
heap
page read and write
4F49000
heap
page read and write
4F6B000
heap
page read and write
4E90000
direct allocation
page read and write
4F6B000
heap
page read and write
4F4D000
heap
page read and write
4F5C000
heap
page read and write
5170000
direct allocation
page read and write
35D0000
direct allocation
page read and write
4F5C000
heap
page read and write
4ED8000
heap
page read and write
4F87000
heap
page read and write
21051000
heap
page read and write
3960000
remote allocation
page execute and read and write
4F4D000
heap
page read and write
96B0000
direct allocation
page execute and read and write
8CDC000
stack
page read and write
4F70000
heap
page read and write
4F5C000
heap
page read and write
4CF0000
heap
page read and write
75A0000
direct allocation
page read and write
21764000
heap
page read and write
8CEA000
heap
page read and write
4F5D000
heap
page read and write
21590000
direct allocation
page read and write
21051000
heap
page read and write
21050000
heap
page read and write
21590000
direct allocation
page read and write
4F4D000
heap
page read and write
4F5C000
heap
page read and write
215E0000
direct allocation
page read and write
19A000
stack
page read and write
5C0000
heap
page read and write
4F4D000
heap
page read and write
7BB9000
heap
page read and write
4F4D000
heap
page read and write
4F4D000
heap
page read and write
7E50000
trusted library allocation
page read and write
4F40000
heap
page read and write
4F6B000
heap
page read and write
4F6A000
heap
page read and write
6D541000
unkown
page execute read
6FE89000
unkown
page readonly
690000
heap
page read and write
2036E000
stack
page read and write
8910000
trusted library allocation
page read and write
7C90000
heap
page execute and read and write
6459000
trusted library allocation
page read and write
700D4000
unkown
page readonly
21150000
heap
page read and write
4F87000
heap
page read and write
4F87000
heap
page read and write
4F6B000
heap
page read and write
215C0000
direct allocation
page read and write
7EC0000
trusted library allocation
page read and write
6D540000
unkown
page readonly
4CF5000
heap
page read and write
4F6B000
heap
page read and write
21051000
heap
page read and write
7F6B000
stack
page read and write
4FB4000
heap
page read and write
4F6A000
heap
page read and write
4F4D000
heap
page read and write
6A0000
heap
page read and write
204AD000
stack
page read and write
4F53000
heap
page read and write
89B0000
trusted library allocation
page read and write
4F5C000
heap
page read and write
21051000
heap
page read and write
21509000
heap
page read and write
690000
heap
page read and write
4F5B000
heap
page read and write
690000
heap
page read and write
4F5C000
heap
page read and write
203AE000
stack
page read and write
4F78000
heap
page read and write
4F4D000
heap
page read and write
4F59000
heap
page read and write
690000
heap
page read and write
4F48000
heap
page read and write
4F6A000
heap
page read and write
6FF90000
unkown
page readonly
345E000
heap
page read and write
4F5C000
heap
page read and write
7E40000
trusted library allocation
page execute and read and write
4F5C000
heap
page read and write
7BC9000
heap
page read and write
36F0000
heap
page read and write
7595000
heap
page execute and read and write
36A5000
trusted library allocation
page execute and read and write
4E40000
direct allocation
page read and write
4F6B000
heap
page read and write
69C000
heap
page read and write
6A0000
heap
page read and write
215C0000
direct allocation
page read and write
21D00000
direct allocation
page read and write
36A0000
trusted library allocation
page read and write
8EE0000
trusted library allocation
page execute and read and write
2176A000
heap
page read and write
4F6A000
heap
page read and write
4F4D000
heap
page read and write
53B0000
heap
page execute and read and write
2032D000
stack
page read and write
4F4D000
heap
page read and write
8A20000
trusted library allocation
page read and write
649D000
trusted library allocation
page read and write
21EA1000
direct allocation
page read and write
69C000
heap
page read and write
400000
unkown
page readonly
4F4D000
heap
page read and write
369A000
trusted library allocation
page execute and read and write
4F5C000
heap
page read and write
3580000
direct allocation
page read and write
8900000
heap
page read and write
21051000
heap
page read and write
4F6A000
heap
page read and write
4F5C000
heap
page read and write
4F5C000
heap
page read and write
3860000
heap
page read and write
4F5C000
heap
page read and write
21D22000
direct allocation
page read and write
21051000
heap
page read and write
6D6C6000
unkown
page read and write
21700000
direct allocation
page read and write
4F2F000
heap
page read and write
4F6B000
heap
page read and write
35E0000
direct allocation
page read and write
69C000
heap
page read and write
21730000
direct allocation
page read and write
4F5C000
heap
page read and write
4F5C000
heap
page read and write
4F4D000
heap
page read and write
375F000
unkown
page read and write
445000
unkown
page readonly
4F6B000
heap
page read and write
4F77000
heap
page read and write
21E00000
direct allocation
page read and write
4F6B000
heap
page read and write
4F5C000
heap
page read and write
7C2E000
heap
page read and write
6A4000
heap
page read and write
2760000
heap
page read and write
347E000
heap
page read and write
4F6B000
heap
page read and write
7D00000
trusted library allocation
page read and write
4F4D000
heap
page read and write
4F5C000
heap
page read and write
218B0000
direct allocation
page read and write
21051000
heap
page read and write
400000
unkown
page readonly
2766000
heap
page read and write
660000
heap
page read and write
6A4000
heap
page read and write
4F4D000
heap
page read and write
4F6A000
heap
page read and write
4F4D000
heap
page read and write
4F87000
heap
page read and write
21882000
heap
page read and write
276B000
heap
page read and write
21051000
heap
page read and write
21051000
heap
page read and write
3478000
heap
page read and write
4F6A000
heap
page read and write
371E000
stack
page read and write
5586000
trusted library allocation
page read and write
4F6B000
heap
page read and write
4F3E000
heap
page read and write
4F6B000
heap
page read and write
4F5C000
heap
page read and write
4F4D000
heap
page read and write
4F48000
heap
page read and write
7A8F000
stack
page read and write
4F6B000
heap
page read and write
4F4D000
heap
page read and write
4F6B000
heap
page read and write
4F4D000
heap
page read and write
21D79000
direct allocation
page read and write
3660000
trusted library allocation
page read and write
21AB8000
heap
page read and write
3640000
trusted library section
page read and write
8920000
trusted library allocation
page read and write
4F5C000
heap
page read and write
21D0000
heap
page read and write
4F6B000
heap
page read and write
2764000
heap
page read and write
5C84000
trusted library allocation
page read and write
8A10000
trusted library allocation
page read and write
2040E000
stack
page read and write
4F6B000
heap
page read and write
4E20000
heap
page readonly
325C000
stack
page read and write
4F4D000
heap
page read and write
21051000
heap
page read and write
4F5C000
heap
page read and write
3590000
direct allocation
page read and write
4F5C000
heap
page read and write
6D5A1000
unkown
page execute read
4F40000
trusted library allocation
page read and write
4E60000
direct allocation
page read and write
21151000
heap
page read and write
4F4D000
heap
page read and write
4F5C000
heap
page read and write
4F6B000
heap
page read and write
3469000
heap
page read and write
21BBF000
heap
page read and write
4F57000
heap
page read and write
218A0000
trusted library allocation
page read and write
3670000
trusted library allocation
page read and write
4F43000
heap
page read and write
2116E000
heap
page read and write
690000
heap
page read and write
21740000
direct allocation
page read and write
4F5C000
heap
page read and write
8990000
heap
page read and write
4F6B000
heap
page read and write
4F6A000
heap
page read and write
4F5C000
heap
page read and write
88F7000
stack
page read and write
6A0000
heap
page read and write
4F6A000
heap
page read and write
3298000
stack
page read and write
4F4D000
heap
page read and write
6FE70000
unkown
page readonly
7C62000
heap
page read and write
4F6A000
heap
page read and write
4F5C000
heap
page read and write
7EA0000
trusted library allocation
page read and write
4F6B000
heap
page read and write
7C39000
heap
page read and write
6FFF8000
unkown
page readonly
2073C000
heap
page read and write
4F87000
heap
page read and write
4F4D000
heap
page read and write
6439000
trusted library allocation
page read and write
21E0000
heap
page read and write
6A0000
heap
page read and write
4F6B000
heap
page read and write
4F6B000
heap
page read and write
21051000
heap
page read and write
4F5C000
heap
page read and write
4F4D000
heap
page read and write
4F4D000
heap
page read and write
4F6A000
heap
page read and write
2026E000
stack
page read and write
4F4D000
heap
page read and write
21051000
heap
page read and write
4F5C000
heap
page read and write
4F4D000
heap
page read and write
21051000
heap
page read and write
7CB0000
trusted library allocation
page read and write
6A4000
heap
page read and write
2135E000
heap
page read and write
36E0000
trusted library allocation
page execute and read and write
57E000
stack
page read and write
7C3B000
heap
page read and write
3510000
heap
page read and write
7EB0000
trusted library allocation
page read and write
20BC3000
heap
page read and write
4F6A000
heap
page read and write
21475000
heap
page read and write
4F6B000
heap
page read and write
2765000
heap
page read and write
69C000
heap
page read and write
4EB0000
direct allocation
page read and write
6A0000
heap
page read and write
4F4D000
heap
page read and write
3B3F000
remote allocation
page execute and read and write
3427000
heap
page read and write
35C0000
direct allocation
page read and write
7E3D000
stack
page read and write
21151000
heap
page read and write
6A4000
heap
page read and write
4F5C000
heap
page read and write
21FA1000
direct allocation
page read and write
4EFF000
heap
page read and write
7F00000
trusted library allocation
page read and write
530000
heap
page read and write
21151000
heap
page read and write
4F5C000
heap
page read and write
4F5C000
heap
page read and write
4F6B000
heap
page read and write
7630000
direct allocation
page read and write
4F6A000
heap
page read and write
6ED70000
unkown
page readonly
21051000
heap
page read and write
21051000
heap
page read and write
213E7000
heap
page read and write
21051000
heap
page read and write
4F4D000
heap
page read and write
B2E000
stack
page read and write
668000
heap
page read and write
69C000
heap
page read and write
21B56000
heap
page read and write
2195D000
heap
page read and write
21051000
heap
page read and write
21051000
heap
page read and write
21F00000
direct allocation
page read and write
4F5C000
heap
page read and write
453F000
remote allocation
page execute and read and write
69C000
heap
page read and write
7F10000
trusted library allocation
page read and write
4F6B000
heap
page read and write
4E80000
direct allocation
page read and write
21051000
heap
page read and write
B40000
heap
page read and write
4F6B000
heap
page read and write
690000
heap
page read and write
2105E000
heap
page read and write
3650000
trusted library section
page read and write
2765000
heap
page read and write
2176D000
heap
page read and write
4A0F000
heap
page read and write
4F4D000
heap
page read and write
4F4D000
heap
page read and write
6A4000
heap
page read and write
8D43000
heap
page read and write
4F5C000
heap
page read and write
4F6A000
heap
page read and write
21151000
heap
page read and write
422000
unkown
page read and write
4F5C000
heap
page read and write
4F5C000
heap
page read and write
21051000
heap
page read and write
4F6B000
heap
page read and write
4EA0000
direct allocation
page read and write
4F5C000
heap
page read and write
420000
unkown
page read and write
3689000
trusted library allocation
page read and write
4F6A000
heap
page read and write
4F6B000
heap
page read and write
276C000
heap
page read and write
690000
heap
page read and write
6ED93000
unkown
page readonly
7E90000
trusted library allocation
page read and write
21750000
heap
page read and write
2760000
heap
page read and write
6FFF5000
unkown
page readonly
450000
heap
page read and write
21D7F000
direct allocation
page read and write
4F4D000
heap
page read and write
4F5C000
heap
page read and write
4F6A000
heap
page read and write
4F5C000
heap
page read and write
4F5C000
heap
page read and write
6FE71000
unkown
page execute read
21051000
heap
page read and write
6A0000
heap
page read and write
21051000
heap
page read and write
4F4E000
heap
page read and write
74AE000
stack
page read and write
4F6B000
heap
page read and write
4F5C000
heap
page read and write
4F6B000
heap
page read and write
4F5C000
heap
page read and write
21C00000
direct allocation
page read and write
700D3000
unkown
page read and write
21051000
heap
page read and write
537E000
stack
page read and write
276A000
heap
page read and write
4F6A000
heap
page read and write
2044F000
stack
page read and write
33F8000
heap
page read and write
8C0C000
stack
page read and write
4F6B000
heap
page read and write
4F4D000
heap
page read and write
69C000
heap
page read and write
4FA5000
heap
page read and write
4F6B000
heap
page read and write
4F6B000
heap
page read and write
4F6A000
heap
page read and write
B45000
heap
page read and write
21051000
heap
page read and write
4F5C000
heap
page read and write
4F87000
heap
page read and write
4EC0000
direct allocation
page read and write
7D20000
trusted library allocation
page read and write
700D2000
unkown
page readonly
4F53000
heap
page read and write
69C000
heap
page read and write
4F4D000
heap
page read and write
4F4D000
heap
page read and write
4F49000
heap
page read and write
21EBF000
direct allocation
page read and write
32D0000
heap
page read and write
4F4D000
heap
page read and write
21470000
direct allocation
page execute and read and write
4F78000
heap
page read and write
6D690000
unkown
page readonly
3300000
heap
page read and write
21151000
heap
page read and write
4F6A000
heap
page read and write
4F5C000
heap
page read and write
21761000
heap
page read and write
4F6B000
heap
page read and write
21765000
heap
page read and write
435000
unkown
page readonly
4F4D000
heap
page read and write
4F6A000
heap
page read and write
4F5C000
heap
page read and write
205AC000
stack
page read and write
21763000
heap
page read and write
2762000
heap
page read and write
21051000
heap
page read and write
218A0000
trusted library allocation
page read and write
6FF71000
unkown
page execute read
69C000
heap
page read and write
4F6A000
heap
page read and write
69C000
heap
page read and write
7EF0000
trusted library allocation
page read and write
8D5C000
heap
page read and write
2105E000
heap
page read and write
21051000
heap
page read and write
6A4000
heap
page read and write
21D12000
direct allocation
page read and write
3560000
heap
page read and write
218A0000
direct allocation
page read and write
6A4000
heap
page read and write
7ED0000
trusted library allocation
page read and write
2119A000
heap
page read and write
36F8000
heap
page read and write
4F6B000
heap
page read and write
4F4D000
heap
page read and write
4F6B000
heap
page read and write
21051000
heap
page read and write
89A0000
trusted library allocation
page execute and read and write
3674000
trusted library allocation
page read and write
690000
heap
page read and write
429000
unkown
page read and write
4F4D000
heap
page read and write
548F000
trusted library allocation
page read and write
4F5C000
heap
page read and write
2310000
heap
page read and write
211A8000
heap
page read and write
75B0000
direct allocation
page read and write
4F5C000
heap
page read and write
210A7000
heap
page read and write
3484000
heap
page read and write
4F4D000
heap
page read and write
4F5C000
heap
page read and write
8D0C000
heap
page read and write
4F6A000
heap
page read and write
98000
stack
page read and write
988F000
direct allocation
page execute and read and write
4F6B000
heap
page read and write
69C000
heap
page read and write
408000
unkown
page readonly
4F5C000
heap
page read and write
4F5C000
heap
page read and write
4F6B000
heap
page read and write
21051000
heap
page read and write
7E60000
trusted library allocation
page read and write
4F87000
heap
page read and write
6A4000
heap
page read and write
4F87000
heap
page read and write
21806000
heap
page read and write
6A0000
heap
page read and write
21D1F000
direct allocation
page read and write
4F6B000
heap
page read and write
4F6B000
heap
page read and write
2109A000
heap
page read and write
4F6A000
heap
page read and write
4F6B000
heap
page read and write
4F4D000
heap
page read and write
7E70000
trusted library allocation
page read and write
21D0C000
direct allocation
page read and write
437000
unkown
page readonly
36C0000
trusted library allocation
page read and write
2760000
heap
page read and write
361C000
stack
page read and write
21051000
heap
page read and write
4F5C000
heap
page read and write
4F6A000
heap
page read and write
21051000
heap
page read and write
4F48000
heap
page read and write
4F6B000
heap
page read and write
4F6A000
heap
page read and write
21D63000
direct allocation
page read and write
4F4D000
heap
page read and write
356E000
unkown
page read and write
4F5C000
heap
page read and write
367D000
trusted library allocation
page execute and read and write
204EB000
stack
page read and write
6A0000
heap
page read and write
4F6B000
heap
page read and write
4F4D000
heap
page read and write
2FB0000
heap
page read and write
4F4D000
heap
page read and write
4F5C000
heap
page read and write
7DBE000
stack
page read and write
4F5C000
heap
page read and write
4F6B000
heap
page read and write
690000
heap
page read and write
35A0000
direct allocation
page read and write
4F6B000
heap
page read and write
21051000
heap
page read and write
4C10000
heap
page read and write
21921000
heap
page read and write
4EDE000
stack
page read and write
7D7E000
stack
page read and write
4F6B000
heap
page read and write
6FF91000
unkown
page execute read
4F6B000
heap
page read and write
7E80000
trusted library allocation
page read and write
4F4D000
heap
page read and write
4F6B000
heap
page read and write
8C4C000
stack
page read and write
4F4D000
heap
page read and write
There are 998 hidden memdumps, click here to show them.