IOC Report
Urgent Quotation documents One Pdf.vbs

loading gif

Files

File Path
Type
Category
Malicious
Urgent Quotation documents One Pdf.vbs
ASCII text, with very long lines (18194)
initial sample
malicious
C:\ProgramData\sihem.vbe
data
dropped
malicious
C:\Users\user\AppData\Roaming\RbxGzzRCxRnUYYz.vbs
ISO-8859 text
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_6dcd90a0cfadcd56d98897fd4ad3469a57ab5cb_00000000_f0abb7fe-856e-4399-ab31-4af1fb3076f1\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_b4b21b9272f0623778607a435112f88140f556cc_00000000_aaf32bbd-49e5-46f6-aef9-a1c3df2349d6\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6EB.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER71A.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER71B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER788.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0n2dxoqu.jva.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3xtc2uo1.fh5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c2vqsqun.fv5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yzkrjl5v.1sc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3N81UEG5J6GESUM0YPYQ.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF50f98d.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\JTFWOQESOJPQ2M217AQN.temp
data
dropped
\Device\ConDrv
Non-ISO extended-ASCII text, with very long lines (987), with CRLF line terminators, with escape sequences
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Urgent Quotation documents One Pdf.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\ProgramData\sihem.vbe"
malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Roaming\RbxGzzRCxRnUYYz.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wermgr.exe
"C:\Windows\system32\wermgr.exe" "-outproc" "0" "7488" "2720" "2688" "2716" "0" "0" "2712" "0" "0" "0" "0" "0"
C:\Windows\System32\wermgr.exe
"C:\Windows\system32\wermgr.exe" "-outproc" "0" "8132" "2728" "2856" "2692" "0" "0" "2872" "0" "0" "0" "0" "0"
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.12.205
malicious
http://144.91.79.54/2210/rk
unknown
https://api.ipify.org
unknown
https://account.dyn.com/
unknown
http://144.91.79.54/2210/BJcAJ8AorkdqBSqQYRDA.txt
unknown
http://144.91.79.54/2210/v
unknown
http://144.91.79.54/g
unknown
http://144.91.79.54/2210/file
unknown
http://144.91.79.54/
unknown
http://144.91.79.54/K
unknown
http://144.91.79.54/2210/s
unknown
http://144.91.79.54/2210/rw
unknown
http://144.91.79.54/2210/r
unknown
https://api.ipify.org/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://144.91.79.54:80/2210/file
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ipify.org
104.26.12.205
malicious
s-part-0017.t-0009.fb-t-msedge.net
13.107.253.45
default.qdr.p1.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
84.201.210.36

IPs

IP
Domain
Country
Malicious
144.91.79.54
unknown
Germany
malicious
104.26.12.205
api.ipify.org
United States
malicious
162.254.34.31
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part1
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part2
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part3
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part4
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part5
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part6
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part7
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part8
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part9
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part10
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part11
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part12
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part13
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part14
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part15
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part16
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part17
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part18
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part19
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part20
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part21
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part22
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part23
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part24
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz\donn
Part25
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz
cn
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz
i
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz
s
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz
r
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz
Path
HKEY_CURRENT_USER\SOFTWARE\RbxGzzRCxRnUYYz
v
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileDirectory
There are 39 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
D42000
remote allocation
page execute and read and write
malicious
2D24000
trusted library allocation
page read and write
malicious
2CF1000
trusted library allocation
page read and write
malicious
2D1C000
trusted library allocation
page read and write
malicious
1232E246000
heap
page read and write
1BE489E8000
heap
page read and write
1DDE480E000
heap
page read and write
1DDE477F000
heap
page read and write
1DDE684C000
heap
page read and write
2C40000
trusted library allocation
page read and write
2C50000
heap
page execute and read and write
1232E24F000
heap
page read and write
1DDE6895000
heap
page read and write
1232E252000
heap
page read and write
F39000
heap
page read and write
1232E299000
heap
page read and write
1DDE49FE000
heap
page read and write
1DDE61A9000
heap
page read and write
5290000
heap
page read and write
1DDE47AE000
heap
page read and write
1DDE480E000
heap
page read and write
1DDE6A65000
heap
page read and write
D678CFC000
stack
page read and write
1BE48A04000
heap
page read and write
12D7000
trusted library allocation
page execute and read and write
1232E241000
heap
page read and write
1DDE49FE000
heap
page read and write
1DDE6890000
heap
page read and write
5270000
heap
page read and write
1DDE67A4000
heap
page read and write
2C90000
heap
page read and write
1DDE4751000
heap
page read and write
23040FB1000
heap
page read and write
646E000
stack
page read and write
1E9DDF58000
heap
page read and write
1DDE61B0000
heap
page read and write
1DDE47E2000
heap
page read and write
40D167C000
stack
page read and write
1232E252000
heap
page read and write
1DDE47F7000
heap
page read and write
1DDE47A5000
heap
page read and write
1BE48A0F000
heap
page read and write
1232E25E000
heap
page read and write
1DDE47F7000
heap
page read and write
1232E23C000
heap
page read and write
B9F90F8000
stack
page read and write
1BE489E2000
heap
page read and write
D678DFD000
stack
page read and write
12CA000
trusted library allocation
page execute and read and write
51AD000
trusted library allocation
page read and write
1DDE47CF000
heap
page read and write
1DDE4751000
heap
page read and write
1BE4A7D0000
heap
page read and write
1DDE47ED000
heap
page read and write
1DDE47F7000
heap
page read and write
54CE000
stack
page read and write
1DDE61B0000
heap
page read and write
1BE48A0F000
heap
page read and write
1BE489AB000
heap
page read and write
1BE489F6000
heap
page read and write
1BE489DF000
heap
page read and write
23042900000
heap
page read and write
23041030000
heap
page read and write
23040F78000
heap
page read and write
1DDE61B0000
heap
page read and write
1DDE684A000
heap
page read and write
B9F97FD000
stack
page read and write
1DDE6A65000
heap
page read and write
1DDE61A9000
heap
page read and write
1DDE6891000
heap
page read and write
1BE489E6000
heap
page read and write
917BEFE000
stack
page read and write
F27000
heap
page read and write
5280000
heap
page read and write
1DDE61B0000
heap
page read and write
1DDE49FE000
heap
page read and write
1DDE61A2000
heap
page read and write
1232E020000
heap
page read and write
1DDE61A1000
heap
page read and write
1BE48A04000
heap
page read and write
1DDE61A9000
heap
page read and write
1BE489F1000
heap
page read and write
4E3E000
stack
page read and write
1BE489E6000
heap
page read and write
1DDE684C000
heap
page read and write
1DDE4811000
heap
page read and write
5810000
trusted library allocation
page read and write
1232E264000
heap
page read and write
1DDE4826000
heap
page read and write
2D2A000
trusted library allocation
page read and write
1BE489E6000
heap
page read and write
519A000
trusted library allocation
page read and write
1DDE49FE000
heap
page read and write
23040FBC000
heap
page read and write
1DDE68AA000
heap
page read and write
2304101E000
heap
page read and write
1DDE476F000
heap
page read and write
5283000
heap
page read and write
574E000
stack
page read and write
1DDE67A3000
heap
page read and write
1DDE4788000
heap
page read and write
1BE489E8000
heap
page read and write
1DDE47E2000
heap
page read and write
1DDE47F1000
heap
page read and write
31F99E000
unkown
page read and write
1BE48A0F000
heap
page read and write
1DDE6A8E000
heap
page read and write
12B0000
trusted library allocation
page read and write
23041228000
heap
page read and write
1232E24F000
heap
page read and write
1232E23C000
heap
page read and write
23040FE6000
heap
page read and write
65AE000
stack
page read and write
1DDE47F7000
heap
page read and write
1BE48BF0000
heap
page read and write
1DDE482E000
heap
page read and write
1232E221000
heap
page read and write
1232E236000
heap
page read and write
1DDE49FE000
heap
page read and write
2CE1000
trusted library allocation
page read and write
1DDE62F0000
remote allocation
page read and write
1BE48A03000
heap
page read and write
1DDE479F000
heap
page read and write
1BE48A12000
heap
page read and write
1DDE61B0000
heap
page read and write
23040F6F000
heap
page read and write
1DDE6891000
heap
page read and write
519E000
trusted library allocation
page read and write
1BE48A04000
heap
page read and write
1DDE478B000
heap
page read and write
1DDE61B0000
heap
page read and write
917BCFD000
stack
page read and write
23042D40000
heap
page read and write
1DDE479F000
heap
page read and write
1DDE47E9000
heap
page read and write
12D2000
trusted library allocation
page read and write
1DDE47F7000
heap
page read and write
1DDE47D5000
heap
page read and write
1DDE61A6000
heap
page read and write
31FE7D000
stack
page read and write
31FDFE000
stack
page read and write
2CD7000
trusted library allocation
page read and write
1DDE480F000
heap
page read and write
1DDE47CF000
heap
page read and write
1DDE67FA000
heap
page read and write
1DDE47E2000
heap
page read and write
EB8000
heap
page read and write
23041225000
heap
page read and write
1BE489E8000
heap
page read and write
1BE48A04000
heap
page read and write
B9F93FD000
stack
page read and write
1DDE6891000
heap
page read and write
2D16000
trusted library allocation
page read and write
1DDE61B0000
heap
page read and write
1BE489B1000
heap
page read and write
1DDE47EB000
heap
page read and write
6A27000
trusted library allocation
page read and write
1DDE61A9000
heap
page read and write
1DDE61B9000
heap
page read and write
1DDE6804000
heap
page read and write
1232E1C0000
heap
page read and write
EEA000
heap
page read and write
1BE489DF000
heap
page read and write
1DDE47AE000
heap
page read and write
1DDE47A5000
heap
page read and write
1BE489F0000
heap
page read and write
D678BFF000
stack
page read and write
1DDE61B0000
heap
page read and write
1BE48A12000
heap
page read and write
1DDE61B0000
heap
page read and write
1DDE47E2000
heap
page read and write
66C0000
trusted library allocation
page read and write
1DDE49F5000
heap
page read and write
1DDE47D7000
heap
page read and write
1BE489B1000
heap
page read and write
1DDE6A8E000
heap
page read and write
12A4000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
1DDE4738000
heap
page read and write
5192000
trusted library allocation
page read and write
1DDE4770000
heap
page read and write
23040FBC000
heap
page read and write
1DDE480E000
heap
page read and write
12E7000
heap
page read and write
1DDE49FE000
heap
page read and write
1BE489E6000
heap
page read and write
1DDE49F9000
heap
page read and write
D6787FE000
stack
page read and write
66AF000
stack
page read and write
1DDE47E2000
heap
page read and write
D678AFF000
stack
page read and write
560E000
stack
page read and write
1BE489E6000
heap
page read and write
1BE489E6000
heap
page read and write
6A50000
heap
page read and write
1232E220000
heap
page read and write
1DDE49FE000
heap
page read and write
1BE489DF000
heap
page read and write
1BE48A12000
heap
page read and write
917BDFE000
stack
page read and write
1DDE47D5000
heap
page read and write
1DDE49FE000
heap
page read and write
1DDE4786000
heap
page read and write
1DDE4759000
heap
page read and write
1232E21B000
heap
page read and write
E90000
heap
page read and write
1DDE47F1000
heap
page read and write
1DDE6997000
heap
page read and write
656E000
stack
page read and write
1DDE4781000
heap
page read and write
1232E170000
heap
page read and write
1DDE4786000
heap
page read and write
1BE48A04000
heap
page read and write
1BE489E4000
heap
page read and write
6A40000
trusted library allocation
page read and write
1232E21B000
heap
page read and write
F77000
heap
page read and write
1BE48A10000
heap
page read and write
1BE48A03000
heap
page read and write
D6788FE000
stack
page read and write
1BE489EA000
heap
page read and write
1DDE49F8000
heap
page read and write
12C6000
trusted library allocation
page execute and read and write
1DDE47F8000
heap
page read and write
12330170000
remote allocation
page read and write
2C60000
trusted library allocation
page read and write
1DDE6A8D000
heap
page read and write
1BE489DF000
heap
page read and write
1DDE47F7000
heap
page read and write
12C0000
trusted library allocation
page read and write
23042F93000
heap
page read and write
6A30000
trusted library allocation
page read and write
23040FBC000
heap
page read and write
917B7FE000
stack
page read and write
EB0000
heap
page read and write
3D0A000
trusted library allocation
page read and write
1BE489E6000
heap
page read and write
E00000
heap
page read and write
1DDE479F000
heap
page read and write
1DDE47FF000
heap
page read and write
1BE48A03000
heap
page read and write
642F000
stack
page read and write
1DDE47E2000
heap
page read and write
1232E299000
heap
page read and write
1DDE61B0000
heap
page read and write
1DDE6790000
heap
page read and write
1DDE49FE000
heap
page read and write
1232E219000
heap
page read and write
1DDE61A1000
heap
page read and write
F45000
heap
page read and write
1BE489DD000
heap
page read and write
12330070000
heap
page read and write
1DDE4759000
heap
page read and write
1DDE47AE000
heap
page read and write
1232E297000
heap
page read and write
1BE489F1000
heap
page read and write
1DDE697A000
heap
page read and write
1DDE61B0000
heap
page read and write
1DDE479D000
heap
page read and write
23042F90000
heap
page read and write
2CA1000
trusted library allocation
page read and write
1DDE478E000
heap
page read and write
1BE489DB000
heap
page read and write
917BAFF000
stack
page read and write
1DDE61A1000
heap
page read and write
1DDE481B000
heap
page read and write
1BE48A0F000
heap
page read and write
1DDE47CF000
heap
page read and write
5180000
trusted library allocation
page read and write
23041220000
heap
page read and write
1DDE61B0000
heap
page read and write
1DDE47D5000
heap
page read and write
1DDE49F9000
heap
page read and write
1DDE61A0000
heap
page read and write
23040F8D000
heap
page read and write
E70000
heap
page read and write
5186000
trusted library allocation
page read and write
1BE48A12000
heap
page read and write
60F0000
heap
page read and write
40D16FF000
stack
page read and write
1DDE49FE000
heap
page read and write
1DDE49FE000
heap
page read and write
1BE489F6000
heap
page read and write
1DDE474C000
heap
page read and write
917B9FE000
stack
page read and write
1DDE49FE000
heap
page read and write
1BE48A03000
heap
page read and write
1232E242000
heap
page read and write
1DDE47F7000
heap
page read and write
1DDE6893000
heap
page read and write
1E9DDF50000
heap
page read and write
31FD7B000
stack
page read and write
1BE489E8000
heap
page read and write
D6786F1000
stack
page read and write
1BE489EA000
heap
page read and write
C39000
stack
page read and write
1DDE68DE000
heap
page read and write
1DDE49FE000
heap
page read and write
1BE48A0F000
heap
page read and write
1BE489EA000
heap
page read and write
1DDE4758000
heap
page read and write
1BE489F4000
heap
page read and write
51A6000
trusted library allocation
page read and write
51A1000
trusted library allocation
page read and write
518E000
trusted library allocation
page read and write
1DDE68E7000
heap
page read and write
1DDE49F0000
heap
page read and write
1232FB90000
heap
page read and write
1BE48A12000
heap
page read and write
1DDE49FE000
heap
page read and write
1BE48A04000
heap
page read and write
12BD000
trusted library allocation
page execute and read and write
1232E246000
heap
page read and write
1DDE47F1000
heap
page read and write
1290000
trusted library allocation
page read and write
1232E252000
heap
page read and write
1DDE47F8000
heap
page read and write
DB0000
heap
page read and write
1BE489E3000
heap
page read and write
1DDE683F000
heap
page read and write
2304101C000
heap
page read and write
1BE489E6000
heap
page read and write
1DDE4759000
heap
page read and write
1BE489F1000
heap
page read and write
12DB000
trusted library allocation
page execute and read and write
23041228000
heap
page read and write
1DDE479D000
heap
page read and write
518B000
trusted library allocation
page read and write
1232E174000
heap
page read and write
1BE489F6000
heap
page read and write
5260000
heap
page execute and read and write
1BE489B1000
heap
page read and write
12A3000
trusted library allocation
page execute and read and write
1DDE481C000
heap
page read and write
1DDE6922000
heap
page read and write
1BE489EA000
heap
page read and write
1DDE49FE000
heap
page read and write
12D5000
trusted library allocation
page execute and read and write
51B2000
trusted library allocation
page read and write
23040F84000
heap
page read and write
31FF7B000
stack
page read and write
1DDE47E2000
heap
page read and write
1DDE47E2000
heap
page read and write
1DDE47E9000
heap
page read and write
3CC9000
trusted library allocation
page read and write
1DDE49F9000
heap
page read and write
1DDE49FE000
heap
page read and write
1DDE478C000
heap
page read and write
2C2C000
stack
page read and write
1DDE61A9000
heap
page read and write
1DDE482A000
heap
page read and write
1232E100000
heap
page read and write
1E9DE2F5000
heap
page read and write
1DDE4792000
heap
page read and write
1DDE61B0000
heap
page read and write
1DDE62F0000
remote allocation
page read and write
6A20000
trusted library allocation
page read and write
1BE489AD000
heap
page read and write
1E9DE120000
heap
page read and write
1DDE61B0000
heap
page read and write
23040E30000
heap
page read and write
23040FB5000
heap
page read and write
1BE489E8000
heap
page read and write
1BE488F0000
heap
page read and write
EED000
heap
page read and write
67E0000
trusted library allocation
page read and write
23040F78000
heap
page read and write
1BE48A0F000
heap
page read and write
1DDE61B0000
heap
page read and write
679E000
stack
page read and write
1232E24F000
heap
page read and write
1E9DDF10000
heap
page read and write
1DDE479D000
heap
page read and write
2AA0000
trusted library allocation
page read and write
1DDE697B000
heap
page read and write
1232E246000
heap
page read and write
1232E190000
heap
page read and write
1DDE61A9000
heap
page read and write
2D1A000
trusted library allocation
page read and write
5EEE000
stack
page read and write
40D177F000
stack
page read and write
917B6FE000
stack
page read and write
12330170000
remote allocation
page read and write
1DDE476C000
heap
page read and write
F41000
heap
page read and write
548C000
stack
page read and write
1BE48A0F000
heap
page read and write
1DDE47D7000
heap
page read and write
1DDE47D5000
heap
page read and write
1BE48BD0000
heap
page read and write
1DDE68A5000
heap
page read and write
1232E236000
heap
page read and write
1DDE4730000
heap
page read and write
3CA1000
trusted library allocation
page read and write
1DDE479D000
heap
page read and write
1232E25F000
heap
page read and write
1DDE49FE000
heap
page read and write
1BE489E1000
heap
page read and write
1DDE67C0000
heap
page read and write
23040FA7000
heap
page read and write
55CE000
stack
page read and write
1DDE479F000
heap
page read and write
23040F10000
heap
page read and write
1DDE4850000
heap
page read and write
B9F98FE000
stack
page read and write
1DDE6984000
heap
page read and write
1BE489E6000
heap
page read and write
1232E264000
heap
page read and write
D678FFE000
stack
page read and write
1232E264000
heap
page read and write
520C000
stack
page read and write
1DDE689E000
heap
page read and write
1DDE47F7000
heap
page read and write
1232E297000
heap
page read and write
1DDE68AA000
heap
page read and write
B9F96FF000
stack
page read and write
917BFFB000
stack
page read and write
12AD000
trusted library allocation
page execute and read and write
1BE48910000
heap
page read and write
31F917000
stack
page read and write
1DDE67CA000
heap
page read and write
1DDE47E2000
heap
page read and write
D39000
stack
page read and write
1DDE6891000
heap
page read and write
1DDE61B0000
heap
page read and write
1DDE477D000
heap
page read and write
1DDE47D2000
heap
page read and write
1DDE62F0000
remote allocation
page read and write
1DDE49F8000
heap
page read and write
F88000
heap
page read and write
23040FAC000
heap
page read and write
1DDE478B000
heap
page read and write
1DDE4815000
heap
page read and write
1DDE49FB000
heap
page read and write
1E9DF9F0000
heap
page read and write
1DDE482E000
heap
page read and write
1232E221000
heap
page read and write
EE8000
heap
page read and write
1DDE61B0000
heap
page read and write
1232E297000
heap
page read and write
E15000
heap
page read and write
66B0000
trusted library allocation
page read and write
1DDE6953000
heap
page read and write
1BE48A12000
heap
page read and write
12C2000
trusted library allocation
page read and write
1DDE68AA000
heap
page read and write
1DDE697A000
heap
page read and write
66C7000
trusted library allocation
page read and write
4CA8000
trusted library allocation
page read and write
67F0000
trusted library allocation
page execute and read and write
1DDE482E000
heap
page read and write
23042D41000
heap
page read and write
1DDE61A9000
heap
page read and write
23040FBC000
heap
page read and write
1DDE67AC000
heap
page read and write
1BE488E0000
heap
page read and write
1DDE49FE000
heap
page read and write
1232E299000
heap
page read and write
1DDE47F7000
heap
page read and write
1BE48A04000
heap
page read and write
D678EFD000
stack
page read and write
1DDE49FE000
heap
page read and write
1DDE61B0000
heap
page read and write
1DDE61AE000
heap
page read and write
1DDE6896000
heap
page read and write
E10000
heap
page read and write
1DDE6819000
heap
page read and write
1DDE482E000
heap
page read and write
23040F9F000
heap
page read and write
1E9DE2F0000
heap
page read and write
1DDE61B0000
heap
page read and write
570F000
stack
page read and write
1DDE47F7000
heap
page read and write
1232E3E0000
heap
page read and write
1DDE4827000
heap
page read and write
1BE489DF000
heap
page read and write
1232E3E5000
heap
page read and write
2CED000
trusted library allocation
page read and write
2C80000
trusted library allocation
page read and write
6A90000
trusted library allocation
page execute and read and write
1BE489E2000
heap
page read and write
1BE48BF5000
heap
page read and write
1E9DDF20000
heap
page read and write
1BE48A0F000
heap
page read and write
1DDE49FE000
heap
page read and write
EDC000
heap
page read and write
F7F000
heap
page read and write
1DDE47D8000
heap
page read and write
1DDE68AD000
heap
page read and write
1DDE4794000
heap
page read and write
6108000
heap
page read and write
1DDE47ED000
heap
page read and write
1DDE68AB000
heap
page read and write
1DDE49FE000
heap
page read and write
1DDE47A5000
heap
page read and write
1DDE480F000
heap
page read and write
1232E120000
heap
page read and write
1DDE4811000
heap
page read and write
1DDE4789000
heap
page read and write
1DDE47F7000
heap
page read and write
66BD000
trusted library allocation
page read and write
1DDE4830000
heap
page read and write
1BE48930000
heap
page read and write
1BE489EB000
heap
page read and write
23042D57000
heap
page read and write
12E0000
heap
page read and write
1BE48A03000
heap
page read and write
1DDE4650000
heap
page read and write
2BEE000
stack
page read and write
2C70000
trusted library allocation
page read and write
1DDE61B0000
heap
page read and write
1DDE684C000
heap
page read and write
1DDE61B0000
heap
page read and write
23040FB4000
heap
page read and write
917B35A000
stack
page read and write
1DDE479F000
heap
page read and write
1BE489E8000
heap
page read and write
1DDE477C000
heap
page read and write
23040F30000
heap
page read and write
1DDE6791000
heap
page read and write
1DDE47ED000
heap
page read and write
1DDE479D000
heap
page read and write
2AEE000
stack
page read and write
2C30000
trusted library allocation
page execute and read and write
1BE48A04000
heap
page read and write
31FFFF000
stack
page read and write
1DDE47CF000
heap
page read and write
2D18000
trusted library allocation
page read and write
1BE489DF000
heap
page read and write
1DDE47AE000
heap
page read and write
1BE48A0F000
heap
page read and write
1DDE47E9000
heap
page read and write
1BE48A0F000
heap
page read and write
1DDE480F000
heap
page read and write
2CDF000
trusted library allocation
page read and write
1BE489F0000
heap
page read and write
1DDE47F7000
heap
page read and write
1DDE49FE000
heap
page read and write
D40000
remote allocation
page execute and read and write
1DDE4800000
heap
page read and write
580D000
stack
page read and write
1DDE61B0000
heap
page read and write
ED2000
heap
page read and write
12D0000
trusted library allocation
page read and write
31FCFF000
stack
page read and write
1DDE6320000
heap
page read and write
1DDE67A4000
heap
page read and write
1DDE49FE000
heap
page read and write
1DDE47E2000
heap
page read and write
B9F94FF000
stack
page read and write
6A80000
heap
page read and write
1BE48A0F000
heap
page read and write
FEF90000
trusted library allocation
page execute and read and write
1DDE47FF000
heap
page read and write
670D000
stack
page read and write
12330170000
remote allocation
page read and write
1DDE49FE000
heap
page read and write
5819000
trusted library allocation
page read and write
1BE489A4000
heap
page read and write
1DDE68D1000
heap
page read and write
23040FA9000
heap
page read and write
23042D60000
heap
page read and write
1BE489DF000
heap
page read and write
1BE48A12000
heap
page read and write
1DDE67E7000
heap
page read and write
1DDE61B0000
heap
page read and write
1DDE47CF000
heap
page read and write
31FC7E000
stack
page read and write
1DDE61AD000
heap
page read and write
1232FCC0000
heap
page read and write
1BE48A0F000
heap
page read and write
1DDE476B000
heap
page read and write
1DDE61B0000
heap
page read and write
1DDE47A5000
heap
page read and write
1DDE61B0000
heap
page read and write
2304101D000
heap
page read and write
1BE489E6000
heap
page read and write
1BE48A0F000
heap
page read and write
23040FA7000
heap
page read and write
1232FB9B000
heap
page read and write
1DDE47AE000
heap
page read and write
1DDE68B4000
heap
page read and write
5830000
trusted library allocation
page execute and read and write
1DDE49FE000
heap
page read and write
1DDE4786000
heap
page read and write
1DDE49FE000
heap
page read and write
There are 576 hidden memdumps, click here to show them.