IOC Report
antispam_connect1.exe

loading gif

Files

File Path
Type
Category
Malicious
antispam_connect1.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2zqirwgs.dat.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4dftown3.efv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5hhxmqpo.0qh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cppyhvly.hs3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jf1tngh0.0pg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oiwugu0i.1x1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\config
data
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\antispam_connect1.exe
"C:\Users\user\Desktop\antispam_connect1.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle hidden -Command "if (-Not (Test-Path \"HKCU:\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\App\")) { Set-ItemProperty -Path \"HKCU:\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\" -Name \"App\" -Value \"C:\Users\user\Desktop\antispam_connect1.exe\" }"
malicious
C:\Users\user\Desktop\antispam_connect1.exe
"C:\Users\user\Desktop\antispam_connect1.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle hidden -Command "if (-Not (Test-Path \"HKCU:\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\App\")) { Set-ItemProperty -Path \"HKCU:\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\" -Name \"App\" -Value \"C:\Users\user\Desktop\antispam_connect1.exe\" }"
malicious
C:\Users\user\Desktop\antispam_connect1.exe
"C:\Users\user\Desktop\antispam_connect1.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
powershell -WindowStyle hidden -Command "if (-Not (Test-Path \"HKCU:\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\\App\")) { Set-ItemProperty -Path \"HKCU:\\Software\\Microsoft\\Windows\\CurrentVersion\\Run\" -Name \"App\" -Value \"C:\Users\user\Desktop\antispam_connect1.exe\" }"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
https://go.mic
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://188.130.206.243
unknown
https://aka.ms/pscore6lBeq
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://93.185.159.253
unknown
http://46.8.236.61
unknown
http://93.185.159.253/
93.185.159.253
http://188.130.206.243/
188.130.206.243
https://github.com/Pester/Pester
unknown
http://91.212.166.91
unknown
http://46.8.232.106/
46.8.232.106
http://46.8.232.106
unknown
http://188.130.206.243http://46.8.232.106
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://46.8.236.61/
46.8.236.61
http://91.212.166.91http://46.8.232.106
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://91.212.166.91/
91.212.166.91
http://91.212.166.91C:
unknown
There are 15 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
109.172.88.38
unknown
Russian Federation
malicious
46.8.232.106
unknown
Russian Federation
188.130.206.243
unknown
Russian Federation
93.185.159.253
unknown
Russian Federation
91.212.166.91
unknown
United Kingdom
46.8.236.61
unknown
Russian Federation

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
App

Memdumps

Base Address
Regiontype
Protect
Malicious
C8F2000
direct allocation
page read and write
D09C000
direct allocation
page read and write
C8F8000
direct allocation
page read and write
6FFA000
stack
page read and write
46B1000
trusted library allocation
page read and write
D12A000
direct allocation
page read and write
C8CA000
direct allocation
page read and write
7B56000
heap
page read and write
4F50000
heap
page read and write
357B000
heap
page read and write
CD0000
heap
page read and write
4E2E000
stack
page read and write
4840000
trusted library allocation
page read and write
676E000
stack
page read and write
73E0000
heap
page read and write
197E000
heap
page read and write
35C0000
trusted library allocation
page read and write
C940000
direct allocation
page read and write
13F3000
unkown
page readonly
C802000
direct allocation
page read and write
6EDC000
heap
page read and write
D0A6000
direct allocation
page read and write
7E00000
trusted library allocation
page read and write
36C0000
heap
page read and write
D13A000
direct allocation
page read and write
742D000
heap
page read and write
C83A000
direct allocation
page read and write
79D2000
heap
page read and write
8C9000
trusted library allocation
page read and write
2D0FF000
stack
page read and write
706E000
stack
page read and write
3589000
heap
page read and write
71A0000
trusted library allocation
page read and write
D058000
direct allocation
page read and write
D0E4000
direct allocation
page read and write
6C00000
heap
page read and write
4F30000
heap
page execute and read and write
7170000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
48F0000
trusted library allocation
page execute and read and write
930000
heap
page read and write
C9A4000
direct allocation
page read and write
D02E000
direct allocation
page read and write
7E40000
trusted library allocation
page read and write
C3E000
heap
page read and write
6E60000
heap
page read and write
CD96000
direct allocation
page read and write
309F000
stack
page read and write
1CA0000
direct allocation
page read and write
77D0000
trusted library allocation
page read and write
CA12000
direct allocation
page read and write
7AC0000
heap
page read and write
36D4000
direct allocation
page execute and read and write
C8AC000
direct allocation
page read and write
7CEE000
stack
page read and write
894E000
stack
page read and write
CC3B000
direct allocation
page read and write
4830000
heap
page readonly
E1E000
stack
page read and write
3FF8000
direct allocation
page read and write
7463000
heap
page read and write
D098000
direct allocation
page read and write
C946000
direct allocation
page read and write
CC40000
direct allocation
page read and write
747C000
heap
page read and write
7C00000
trusted library allocation
page read and write
D080000
direct allocation
page read and write
9D0000
heap
page read and write
816000
heap
page read and write
77F0000
trusted library allocation
page read and write
2CC3D000
stack
page read and write
34B0000
heap
page read and write
C95E000
direct allocation
page read and write
77E0000
trusted library allocation
page read and write
D124000
direct allocation
page read and write
C862000
direct allocation
page read and write
6F94000
trusted library allocation
page read and write
35F2000
trusted library allocation
page read and write
CCFC000
direct allocation
page read and write
7C3D000
stack
page read and write
CC08000
direct allocation
page read and write
68FE000
stack
page read and write
CD32000
direct allocation
page read and write
65E000
stack
page read and write
34E8000
heap
page read and write
7B82000
heap
page read and write
960000
heap
page read and write
CCEE000
direct allocation
page read and write
C87000
heap
page read and write
D50000
unkown
page readonly
7B63000
heap
page read and write
1970000
heap
page read and write
C870000
direct allocation
page read and write
CFBD000
stack
page read and write
42E9000
direct allocation
page execute and read and write
7DD0000
trusted library allocation
page read and write
D008000
direct allocation
page read and write
CD89000
direct allocation
page read and write
6EFB000
stack
page read and write
DBE000
stack
page read and write
D0F6000
direct allocation
page read and write
4780000
trusted library allocation
page read and write
CA80000
direct allocation
page read and write
D032000
direct allocation
page read and write
13F1000
unkown
page read and write
7B6B000
heap
page read and write
6519000
trusted library allocation
page read and write
7B6000
heap
page read and write
2F9D000
stack
page read and write
D048000
direct allocation
page read and write
CD34000
direct allocation
page read and write
C90A000
direct allocation
page read and write
D016000
direct allocation
page read and write
42E0000
direct allocation
page execute and read and write
1890000
heap
page read and write
B3D000
stack
page read and write
CC98000
direct allocation
page read and write
D0FE000
direct allocation
page read and write
C72F000
stack
page read and write
1500000
direct allocation
page read and write
CC86000
direct allocation
page read and write
6C6000
heap
page read and write
EDF000
stack
page read and write
76DF000
stack
page read and write
CA9F000
stack
page read and write
D020000
direct allocation
page read and write
D51000
unkown
page execute read
C4A000
heap
page read and write
5F0000
heap
page read and write
C888000
direct allocation
page read and write
86E000
heap
page read and write
CC00000
direct allocation
page read and write
13F3000
unkown
page readonly
6EE7000
heap
page read and write
754B000
stack
page read and write
58B8000
trusted library allocation
page read and write
7C90000
trusted library allocation
page execute and read and write
7E60000
trusted library allocation
page read and write
960000
trusted library allocation
page read and write
74F000
stack
page read and write
341E000
stack
page read and write
D084000
direct allocation
page read and write
7C20000
trusted library allocation
page read and write
2D400000
direct allocation
page read and write
7600000
trusted library allocation
page read and write
2CD7D000
stack
page read and write
17F0000
heap
page read and write
C80E000
direct allocation
page read and write
C800000
direct allocation
page read and write
3FF0000
direct allocation
page read and write
D006000
direct allocation
page read and write
7E30000
trusted library allocation
page read and write
7B7E000
heap
page read and write
544F000
stack
page read and write
CC58000
direct allocation
page read and write
6FBE000
stack
page read and write
3DC5000
direct allocation
page execute and read and write
D190000
direct allocation
page read and write
D0C2000
direct allocation
page read and write
4750000
trusted library allocation
page read and write
168C000
stack
page read and write
48AC000
stack
page read and write
7DB0000
trusted library allocation
page read and write
CCFE000
direct allocation
page read and write
873000
heap
page read and write
CCC0000
direct allocation
page read and write
C8A0000
direct allocation
page read and write
C83E000
direct allocation
page read and write
C8A8000
direct allocation
page read and write
71C0000
trusted library allocation
page read and write
70CD000
stack
page read and write
153D000
stack
page read and write
910000
heap
page readonly
329E000
stack
page read and write
D00C000
direct allocation
page read and write
4E70000
trusted library allocation
page read and write
3640000
heap
page read and write
7100000
trusted library allocation
page read and write
D136000
direct allocation
page read and write
8BD000
trusted library allocation
page execute and read and write
7DF0000
trusted library allocation
page read and write
CCFA000
direct allocation
page read and write
7180000
heap
page read and write
3F90000
direct allocation
page execute and read and write
D180000
direct allocation
page read and write
7DC0000
trusted library allocation
page read and write
D0EE000
direct allocation
page read and write
178D000
stack
page read and write
C960000
direct allocation
page read and write
D51000
unkown
page execute read
C93A000
direct allocation
page read and write
CCA8000
direct allocation
page read and write
1CA8000
direct allocation
page read and write
D0EA000
direct allocation
page read and write
77A0000
trusted library allocation
page read and write
432C000
direct allocation
page read and write
D0BA000
direct allocation
page read and write
C8A2000
direct allocation
page read and write
CE0000
heap
page read and write
C10000
heap
page read and write
C8A6000
direct allocation
page read and write
C97D000
direct allocation
page read and write
C882000
direct allocation
page read and write
C892000
direct allocation
page read and write
D0E8000
direct allocation
page read and write
363F000
stack
page read and write
6F02000
heap
page read and write
CC4E000
direct allocation
page read and write
2CD3F000
stack
page read and write
4801000
trusted library allocation
page read and write
CC06000
direct allocation
page read and write
7130000
trusted library allocation
page read and write
7489000
heap
page read and write
C844000
direct allocation
page read and write
7B76000
heap
page read and write
CC71000
direct allocation
page read and write
4CEE000
stack
page read and write
C8BE000
direct allocation
page read and write
6ECE000
heap
page read and write
D046000
direct allocation
page read and write
8B4000
trusted library allocation
page read and write
D18E000
direct allocation
page read and write
2D440000
direct allocation
page read and write
9D5000
heap
page execute and read and write
793E000
stack
page read and write
8320000
trusted library allocation
page read and write
17B0000
heap
page read and write
72BE000
stack
page read and write
8FD000
stack
page read and write
C948000
direct allocation
page read and write
4E31000
trusted library allocation
page read and write
D034000
direct allocation
page read and write
CC6F000
direct allocation
page read and write
D64000
unkown
page readonly
15BD000
stack
page read and write
1580000
direct allocation
page read and write
119D000
unkown
page write copy
C99D000
stack
page read and write
6EC0000
heap
page read and write
2FA0000
heap
page read and write
920000
trusted library allocation
page execute and read and write
C810000
direct allocation
page read and write
1D20000
direct allocation
page read and write
C93C000
direct allocation
page read and write
7C34000
trusted library allocation
page read and write
CD30000
direct allocation
page read and write
D000000
direct allocation
page read and write
7E63000
trusted library allocation
page read and write
CDBA000
direct allocation
page read and write
6A3D000
stack
page read and write
CC04000
direct allocation
page read and write
475D000
trusted library allocation
page execute and read and write
82BE000
stack
page read and write
35D0000
trusted library allocation
page read and write
C826000
direct allocation
page read and write
482E000
stack
page read and write
8A0000
trusted library allocation
page read and write
CA6000
heap
page read and write
CD8000
heap
page read and write
C970000
direct allocation
page read and write
7B36000
heap
page read and write
C842000
direct allocation
page read and write
7BA1000
heap
page read and write
7412000
heap
page read and write
66EE000
stack
page read and write
CC12000
direct allocation
page read and write
D03B000
direct allocation
page read and write
77C0000
trusted library allocation
page read and write
4960000
direct allocation
page read and write
D51000
unkown
page execute read
35CD000
trusted library allocation
page execute and read and write
6B7E000
stack
page read and write
5511000
trusted library allocation
page read and write
CCE6000
direct allocation
page read and write
D50000
unkown
page readonly
4E6F000
stack
page read and write
E7E000
stack
page read and write
48EE000
stack
page read and write
53C000
stack
page read and write
2CEC0000
direct allocation
page read and write
3620000
heap
page readonly
30B4000
direct allocation
page execute and read and write
D002000
direct allocation
page read and write
C82E000
direct allocation
page read and write
2D2FF000
stack
page read and write
D0F2000
direct allocation
page read and write
6F80000
trusted library allocation
page read and write
C806000
direct allocation
page read and write
7160000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
3470000
heap
page read and write
CD22000
direct allocation
page read and write
47EE000
stack
page read and write
D0C0000
direct allocation
page read and write
3FFD000
direct allocation
page read and write
CD2000
heap
page read and write
CC82000
direct allocation
page read and write
CD8B000
direct allocation
page read and write
CDC8000
direct allocation
page read and write
D0D8000
direct allocation
page read and write
70ED000
stack
page read and write
C8C2000
direct allocation
page read and write
D026000
direct allocation
page read and write
C92E000
direct allocation
page read and write
13F3000
unkown
page readonly
4E92000
trusted library allocation
page read and write
C85A000
direct allocation
page read and write
4900000
direct allocation
page execute and read and write
32C6000
heap
page read and write
CC96000
direct allocation
page read and write
CD9C000
direct allocation
page read and write
8230000
heap
page read and write
C94C000
direct allocation
page read and write
C9BB000
direct allocation
page read and write
4715000
direct allocation
page execute and read and write
A78000
direct allocation
page read and write
9E8000
heap
page read and write
2F60000
heap
page read and write
D0FA000
direct allocation
page read and write
6577000
trusted library allocation
page read and write
C962000
direct allocation
page read and write
71D0000
trusted library allocation
page execute and read and write
13F3000
unkown
page readonly
6F62000
trusted library allocation
page read and write
C840000
direct allocation
page read and write
7770000
trusted library allocation
page execute and read and write
CCB2000
direct allocation
page read and write
710B000
stack
page read and write
7780000
trusted library allocation
page read and write
A3C000
stack
page read and write
ECF000
stack
page read and write
CD8D000
direct allocation
page read and write
4D2E000
stack
page read and write
3B00000
direct allocation
page execute and read and write
42C5000
direct allocation
page execute and read and write
D042000
direct allocation
page read and write
6E94000
heap
page read and write
C84C000
direct allocation
page read and write
C8C4000
direct allocation
page read and write
D010000
direct allocation
page read and write
C84E000
direct allocation
page read and write
DFC000
stack
page read and write
CF4000
heap
page read and write
73C0000
heap
page execute and read and write
6EBD000
stack
page read and write
D0D4000
direct allocation
page read and write
7E20000
trusted library allocation
page read and write
7B15000
heap
page read and write
CA16000
direct allocation
page read and write
D0A0000
direct allocation
page read and write
C977000
direct allocation
page read and write
C8BC000
direct allocation
page read and write
CCC8000
direct allocation
page read and write
90C000
stack
page read and write
CC14000
direct allocation
page read and write
C8CC000
direct allocation
page read and write
D00E000
direct allocation
page read and write
D3D000
stack
page read and write
C97B000
direct allocation
page read and write
7BB0000
heap
page read and write
CD42000
direct allocation
page read and write
7840000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
C9E6000
direct allocation
page read and write
CC26000
direct allocation
page read and write
D0AA000
direct allocation
page read and write
CC16000
direct allocation
page read and write
C804000
direct allocation
page read and write
6BBE000
stack
page read and write
CC8A000
direct allocation
page read and write
CDA6000
direct allocation
page read and write
D18C000
direct allocation
page read and write
4920000
heap
page read and write
7CD5000
trusted library allocation
page read and write
CCB6000
direct allocation
page read and write
6511000
trusted library allocation
page read and write
D0F4000
direct allocation
page read and write
C94A000
direct allocation
page read and write
C944000
direct allocation
page read and write
CC18000
direct allocation
page read and write
4860000
heap
page execute and read and write
4340000
direct allocation
page read and write
CCEC000
direct allocation
page read and write
13F1000
unkown
page read and write
7120000
trusted library allocation
page read and write
D50000
unkown
page readonly
CD86000
direct allocation
page read and write
8C0000
trusted library allocation
page read and write
34B8000
heap
page read and write
CC0C000
direct allocation
page read and write
C894000
direct allocation
page read and write
C958000
direct allocation
page read and write
D196000
direct allocation
page read and write
4848000
trusted library allocation
page read and write
7B8A000
heap
page read and write
CA00000
direct allocation
page read and write
35D9000
trusted library allocation
page read and write
D0AC000
direct allocation
page read and write
C968000
direct allocation
page read and write
2D84000
direct allocation
page execute and read and write
75E0000
trusted library allocation
page read and write
6539000
trusted library allocation
page read and write
6F70000
trusted library allocation
page read and write
7468000
heap
page read and write
C89E000
direct allocation
page read and write
40F5000
direct allocation
page execute and read and write
CCE8000
direct allocation
page read and write
D64000
unkown
page readonly
C820000
direct allocation
page read and write
693E000
stack
page read and write
CDCE000
direct allocation
page read and write
3549000
heap
page read and write
5E59000
trusted library allocation
page read and write
353D000
stack
page read and write
770D000
stack
page read and write
CC64000
direct allocation
page read and write
758E000
stack
page read and write
7BD0000
trusted library allocation
page read and write
740E000
heap
page read and write
8B0000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page execute and read and write
7BC0000
trusted library allocation
page read and write
D064000
direct allocation
page read and write
CDB6000
direct allocation
page read and write
D08A000
direct allocation
page read and write
C81C000
direct allocation
page read and write
2F90000
trusted library allocation
page read and write
3520000
heap
page read and write
8870000
trusted library allocation
page read and write
5662000
trusted library allocation
page read and write
890E000
stack
page read and write
780000
heap
page read and write
7F1000
heap
page read and write
704E000
stack
page read and write
C96C000
direct allocation
page read and write
73A0000
trusted library allocation
page read and write
C96A000
direct allocation
page read and write
13F3000
unkown
page readonly
7190000
trusted library allocation
page read and write
157D000
stack
page read and write
C9A2000
direct allocation
page read and write
D50000
unkown
page readonly
76CB000
stack
page read and write
4E78000
trusted library allocation
page read and write
CC5A000
direct allocation
page read and write
CD94000
direct allocation
page read and write
E5F000
stack
page read and write
7DA0000
heap
page read and write
4F35000
heap
page execute and read and write
CC32000
direct allocation
page read and write
D64000
unkown
page readonly
797E000
stack
page read and write
744F000
heap
page read and write
7C10000
trusted library allocation
page read and write
760E000
stack
page read and write
CC1C000
direct allocation
page read and write
E80000
heap
page read and write
D184000
direct allocation
page read and write
2D409000
direct allocation
page read and write
D0CA000
direct allocation
page read and write
687B000
stack
page read and write
CE80000
direct allocation
page read and write
4010000
direct allocation
page read and write
AB0000
heap
page read and write
C848000
direct allocation
page read and write
1800000
heap
page read and write
C936000
direct allocation
page read and write
702E000
stack
page read and write
C8A4000
direct allocation
page read and write
CCC6000
direct allocation
page read and write
CCA0000
direct allocation
page read and write
C9CA000
direct allocation
page read and write
D044000
direct allocation
page read and write
CC0A000
direct allocation
page read and write
3556000
heap
page read and write
6A7B000
stack
page read and write
7C40000
trusted library allocation
page read and write
2CE8C000
direct allocation
page read and write
C7B0000
direct allocation
page read and write
CC4A000
direct allocation
page read and write
5E97000
trusted library allocation
page read and write
D004000
direct allocation
page read and write
70F0000
trusted library allocation
page execute and read and write
6ECA000
heap
page read and write
70AE000
stack
page read and write
D05A000
direct allocation
page read and write
7B58000
heap
page read and write
9A6000
heap
page read and write
743E000
heap
page read and write
CC73000
direct allocation
page read and write
CC48000
direct allocation
page read and write
CC34000
direct allocation
page read and write
C832000
direct allocation
page read and write
B70000
heap
page read and write
8240000
trusted library allocation
page read and write
C808000
direct allocation
page read and write
C8C0000
direct allocation
page read and write
CCA6000
direct allocation
page read and write
9E0000
heap
page read and write
4940000
direct allocation
page read and write
C9CE000
direct allocation
page read and write
1598000
heap
page read and write
C952000
direct allocation
page read and write
CD0000
direct allocation
page read and write
8310000
trusted library allocation
page execute and read and write
C7D000
heap
page read and write
7800000
trusted library allocation
page read and write
C730000
direct allocation
page read and write
9D0000
heap
page execute and read and write
D51000
unkown
page execute read
8250000
trusted library allocation
page read and write
C898000
direct allocation
page read and write
4754000
trusted library allocation
page read and write
C91C000
direct allocation
page read and write
CC6D000
direct allocation
page read and write
7BD0000
trusted library allocation
page read and write
CD8F000
direct allocation
page read and write
8E5000
trusted library allocation
page execute and read and write
6F7F000
stack
page read and write
C770000
direct allocation
page read and write
4320000
direct allocation
page read and write
CC7E000
direct allocation
page read and write
35C4000
trusted library allocation
page read and write
C9BD000
direct allocation
page read and write
4F86000
trusted library allocation
page read and write
6BFE000
stack
page read and write
CCF4000
direct allocation
page read and write
C8BA000
direct allocation
page read and write
7810000
trusted library allocation
page read and write
C95A000
direct allocation
page read and write
5E31000
trusted library allocation
page read and write
744A000
heap
page read and write
88C0000
heap
page read and write
CC9C000
direct allocation
page read and write
708E000
stack
page read and write
47A0000
trusted library allocation
page read and write
C866000
direct allocation
page read and write
3630000
trusted library allocation
page execute and read and write
9A0000
heap
page read and write
540000
heap
page read and write
970000
heap
page execute and read and write
6B3E000
stack
page read and write
D01E000
direct allocation
page read and write
D122000
direct allocation
page read and write
74F1000
heap
page read and write
8B3000
trusted library allocation
page execute and read and write
D01A000
direct allocation
page read and write
68BE000
stack
page read and write
C8CE000
direct allocation
page read and write
CADE000
stack
page read and write
69BE000
stack
page read and write
82FE000
stack
page read and write
6FA0000
trusted library allocation
page read and write
CDCA000
direct allocation
page read and write
CCC2000
direct allocation
page read and write
7C7E000
stack
page read and write
D64000
unkown
page readonly
4FC0000
heap
page read and write
6EB6000
heap
page read and write
54DD000
stack
page read and write
3250000
heap
page read and write
4120000
direct allocation
page execute and read and write
5500000
heap
page execute and read and write
197A000
heap
page read and write
4760000
trusted library allocation
page read and write
948000
stack
page read and write
D50000
unkown
page readonly
6F90000
trusted library allocation
page read and write
13F1000
unkown
page read and write
CD2A000
direct allocation
page read and write
745E000
heap
page read and write
4DAE000
stack
page read and write
C84A000
direct allocation
page read and write
D0E6000
direct allocation
page read and write
37D0000
direct allocation
page execute and read and write
88B0000
trusted library allocation
page execute and read and write
6ED4000
heap
page read and write
CC84000
direct allocation
page read and write
CC20000
direct allocation
page read and write
D51000
unkown
page execute read
CC9E000
direct allocation
page read and write
D09E000
direct allocation
page read and write
760000
heap
page read and write
7110000
trusted library allocation
page read and write
CC1A000
direct allocation
page read and write
D082000
direct allocation
page read and write
2CAFF000
stack
page read and write
C9DA000
direct allocation
page read and write
2CE7F000
stack
page read and write
D128000
direct allocation
page read and write
33DF000
stack
page read and write
775D000
stack
page read and write
D056000
direct allocation
page read and write
CC10000
direct allocation
page read and write
D0B2000
direct allocation
page read and write
32C0000
heap
page read and write
7DAD000
stack
page read and write
8365000
trusted library allocation
page read and write
7D2E000
stack
page read and write
7000000
heap
page execute and read and write
C8B8000
direct allocation
page read and write
CDCC000
direct allocation
page read and write
119D000
unkown
page write copy
D0C6000
direct allocation
page read and write
4782000
trusted library allocation
page read and write
2C8FF000
stack
page read and write
56D9000
trusted library allocation
page read and write
CC2C000
direct allocation
page read and write
7790000
trusted library allocation
page read and write
6EAE000
heap
page read and write
69FE000
stack
page read and write
32A0000
heap
page read and write
4900000
trusted library allocation
page read and write
788000
heap
page read and write
30A0000
heap
page read and write
C837000
direct allocation
page read and write
C884000
direct allocation
page read and write
C9B7000
direct allocation
page read and write
6D72000
heap
page read and write
C91E000
direct allocation
page read and write
CCBA000
direct allocation
page read and write
7494000
heap
page read and write
C95C000
direct allocation
page read and write
7AA000
heap
page read and write
56B9000
trusted library allocation
page read and write
2FA9000
heap
page read and write
4324000
direct allocation
page read and write
D51000
unkown
page execute read
48E5000
direct allocation
page execute and read and write
940000
trusted library allocation
page read and write
1D50000
heap
page read and write
72FF000
stack
page read and write
35B0000
trusted library allocation
page read and write
968000
heap
page read and write
78FE000
stack
page read and write
D0FC000
direct allocation
page read and write
53CF000
stack
page read and write
8300000
heap
page read and write
367D000
stack
page read and write
56B1000
trusted library allocation
page read and write
4944000
direct allocation
page read and write
D0A8000
direct allocation
page read and write
7C80000
heap
page read and write
4C8000
stack
page read and write
4DEE000
stack
page read and write
88A0000
heap
page read and write
D18A000
direct allocation
page read and write
7E70000
trusted library allocation
page execute and read and write
C938000
direct allocation
page read and write
C88A000
direct allocation
page read and write
345F000
stack
page read and write
CDB4000
direct allocation
page read and write
34DC000
heap
page read and write
7180000
trusted library allocation
page read and write
3648000
heap
page read and write
C772000
direct allocation
page read and write
470A000
trusted library allocation
page read and write
769E000
stack
page read and write
CCF6000
direct allocation
page read and write
CCEA000
direct allocation
page read and write
A70000
direct allocation
page read and write
6E70000
heap
page read and write
D64000
unkown
page readonly
35C3000
trusted library allocation
page execute and read and write
8860000
trusted library allocation
page read and write
119D000
unkown
page write copy
35F5000
trusted library allocation
page execute and read and write
4F10000
trusted library allocation
page read and write
8E0000
trusted library allocation
page read and write
CDC6000
direct allocation
page read and write
4F0E000
stack
page read and write
48C000
stack
page read and write
C89A000
direct allocation
page read and write
2F9C000
stack
page read and write
CCD8000
direct allocation
page read and write
C98C000
direct allocation
page read and write
E3E000
stack
page read and write
C979000
direct allocation
page read and write
D50000
unkown
page readonly
C942000
direct allocation
page read and write
7D6E000
stack
page read and write
6D50000
trusted library allocation
page read and write
70E000
stack
page read and write
C92A000
direct allocation
page read and write
7B67000
heap
page read and write
D014000
direct allocation
page read and write
D096000
direct allocation
page read and write
69E000
stack
page read and write
3FB9000
direct allocation
page execute and read and write
CC2E000
direct allocation
page read and write
CCAA000
direct allocation
page read and write
8985000
trusted library allocation
page read and write
D01C000
direct allocation
page read and write
4D6E000
stack
page read and write
8850000
heap
page read and write
CC3E000
direct allocation
page read and write
6F00000
heap
page read and write
D130000
direct allocation
page read and write
948000
trusted library allocation
page read and write
672E000
stack
page read and write
733E000
stack
page read and write
571E000
trusted library allocation
page read and write
5A0000
heap
page read and write
C890000
direct allocation
page read and write
540E000
stack
page read and write
D018000
direct allocation
page read and write
4ECC000
stack
page read and write
C18000
heap
page read and write
9BE000
stack
page read and write
4909000
direct allocation
page execute and read and write
683D000
stack
page read and write
D0B6000
direct allocation
page read and write
7E50000
trusted library allocation
page read and write
CD0C000
direct allocation
page read and write
7BC7000
trusted library allocation
page read and write
CCE4000
direct allocation
page read and write
8E2000
trusted library allocation
page read and write
6D30000
heap
page execute and read and write
D0EC000
direct allocation
page read and write
6EE4000
heap
page read and write
2FD8000
stack
page read and write
3535000
heap
page read and write
3FF4000
direct allocation
page read and write
749D000
heap
page read and write
15D0000
heap
page read and write
5718000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
2D3FF000
stack
page read and write
7C90000
heap
page execute and read and write
C89C000
direct allocation
page read and write
7850000
trusted library allocation
page execute and read and write
7150000
trusted library allocation
page read and write
771E000
stack
page read and write
71B0000
trusted library allocation
page read and write
7DE0000
trusted library allocation
page read and write
C920000
direct allocation
page read and write
3566000
heap
page read and write
CD9A000
direct allocation
page read and write
4F9E000
stack
page read and write
7BC5000
trusted library allocation
page read and write
D64000
unkown
page readonly
CFFE000
stack
page read and write
D00A000
direct allocation
page read and write
2CE89000
direct allocation
page read and write
4E20000
heap
page read and write
C90C000
direct allocation
page read and write
900000
trusted library allocation
page read and write
C818000
direct allocation
page read and write
D028000
direct allocation
page read and write
6F60000
trusted library allocation
page read and write
C864000
direct allocation
page read and write
CD3E000
direct allocation
page read and write
CD24000
direct allocation
page read and write
3F95000
direct allocation
page execute and read and write
C912000
direct allocation
page read and write
1590000
heap
page read and write
7425000
heap
page read and write
D04C000
direct allocation
page read and write
C954000
direct allocation
page read and write
6C0000
heap
page read and write
CD28000
direct allocation
page read and write
CCF2000
direct allocation
page read and write
119D000
unkown
page write copy
BB0000
heap
page read and write
534E000
stack
page read and write
CD80000
direct allocation
page read and write
7005000
heap
page execute and read and write
556C000
trusted library allocation
page read and write
4CAE000
stack
page read and write
42C0000
direct allocation
page execute and read and write
7BE0000
trusted library allocation
page read and write
4769000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
48E0000
direct allocation
page execute and read and write
CCD4000
direct allocation
page read and write
D10C000
direct allocation
page read and write
D0C8000
direct allocation
page read and write
C81A000
direct allocation
page read and write
119D000
unkown
page write copy
774E000
stack
page read and write
CD92000
direct allocation
page read and write
119D000
unkown
page write copy
7E10000
trusted library allocation
page read and write
67AE000
stack
page read and write
768D000
stack
page read and write
C918000
direct allocation
page read and write
D086000
direct allocation
page read and write
C9DC000
direct allocation
page read and write
1508000
direct allocation
page read and write
2D1FF000
stack
page read and write
13F3000
unkown
page readonly
CC62000
direct allocation
page read and write
538E000
stack
page read and write
C880000
direct allocation
page read and write
9E0000
heap
page read and write
75CE000
stack
page read and write
7830000
trusted library allocation
page read and write
C812000
direct allocation
page read and write
4785000
trusted library allocation
page execute and read and write
6F3E000
stack
page read and write
3FB0000
direct allocation
page execute and read and write
E9E000
stack
page read and write
7F3000
heap
page read and write
7FD000
heap
page read and write
CC02000
direct allocation
page read and write
CCCA000
direct allocation
page read and write
6A0000
heap
page read and write
CC46000
direct allocation
page read and write
4892000
trusted library allocation
page read and write
4753000
trusted library allocation
page execute and read and write
7B7A000
heap
page read and write
C828000
direct allocation
page read and write
2C9FF000
stack
page read and write
C81E000
direct allocation
page read and write
697A000
stack
page read and write
4E7A000
trusted library allocation
page read and write
3610000
trusted library allocation
page read and write
79BE000
stack
page read and write
764A000
stack
page read and write
D012000
direct allocation
page read and write
C8AE000
direct allocation
page read and write
D066000
direct allocation
page read and write
35F0000
trusted library allocation
page read and write
CDA2000
direct allocation
page read and write
C964000
direct allocation
page read and write
36BE000
stack
page read and write
7750000
heap
page read and write
CBDF000
stack
page read and write
83B0000
heap
page read and write
737E000
stack
page read and write
2CE80000
direct allocation
page read and write
C835000
direct allocation
page read and write
There are 823 hidden memdumps, click here to show them.