IOC Report
MV EAGLE EYE RFQ-92008882920-PDF.vbs

loading gif

Files

File Path
Type
Category
Malicious
MV EAGLE EYE RFQ-92008882920-PDF.vbs
ASCII text, with very long lines (18194)
initial sample
malicious
C:\ProgramData\sihem.vbe
data
dropped
malicious
C:\Users\user\AppData\Roaming\wBdjaJtUBqsSWBB.vbs
ISO-8859 text
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_b4b21b9272f0623778607a435112f88140f556cc_00000000_8105a337-0844-44e9-b495-4c29cd2622d4\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_b4b21b9272f0623778607a435112f88140f556cc_00000000_a7f992eb-ea9c-473e-a87e-68ee5b3c4047\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF081.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF0B1.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF8E3.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERF99F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1jtff3wg.ke3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cw3ks53g.vlt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tmfpd43b.jre.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ttvbys5d.i3e.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF3ddf2c.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\EEK2B5V1HE1RID687TK1.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\MPCYQ4H21G0NUEUEBN10.temp
data
dropped
\Device\ConDrv
Non-ISO extended-ASCII text, with very long lines (875), with CRLF line terminators, with escape sequences
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\MV EAGLE EYE RFQ-92008882920-PDF.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\ProgramData\sihem.vbe"
malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Roaming\wBdjaJtUBqsSWBB.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wermgr.exe
"C:\Windows\system32\wermgr.exe" "-outproc" "0" "6496" "2812" "1456" "2816" "0" "0" "2820" "0" "0" "0" "0" "0"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wermgr.exe
"C:\Windows\system32\wermgr.exe" "-outproc" "0" "1196" "1640" "2180" "2884" "0" "0" "2888" "0" "0" "0" "0" "0"
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://144.91.79.54/2210/rJ
unknown
http://144.91.79.54/2210/v5D44
unknown
http://144.91.79.54/2210/WGznFv2HOQZ7KUuJ2W9v.txt
unknown
http://144.91.79.54:80/2210/WGznFv2HOQZ7KUuJ2W9v.txt0032510063530010000000000110000000A26000EDA00000
unknown
http://144.91.79.54/2210/$
unknown
http://144.91.79.54/b
unknown
http://144.91.79.54:80/2210/file27A0000035820700001827B0600000D182070000D72720A0070000B5270000A00000
unknown
http://144.91.79.54/2210/v
unknown
http://144.91.79.54/210/rJ
unknown
http://144.91.79.54/2210/file
unknown
http://144.91.79.54/
unknown
http://144.91.79.54/e4
unknown
http://144.91.79.54/2210/filebvRlL6
unknown
http://144.91.79.54/210/r~
unknown
http://144.91.79.54/u
unknown
http://144.91.79.54:80/2210/vznFv2HOQZ7KUuJ2W9v.txt0032510063530010000000000110000000A26000EDA000009
unknown
http://144.91.79.54/2210/vs
unknown
http://144.91.79.54/IndexG
unknown
http://144.91.79.54/Z
unknown
http://144.91.79.54/z
unknown
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
s-part-0032.t-0009.t-msedge.net
13.107.246.60
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
144.91.79.54
unknown
Germany
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part1
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part2
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part3
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part4
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part5
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part6
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part7
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part8
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part9
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part10
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part11
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part12
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part13
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part14
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part15
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part16
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part17
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part18
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part19
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part20
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part21
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part22
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part23
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part24
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part25
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part26
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part27
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part28
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part29
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB\donn
Part30
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB
cn
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB
i
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB
s
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB
r
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB
Path
HKEY_CURRENT_USER\SOFTWARE\wBdjaJtUBqsSWBB
v
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
00188010E7D2DACC
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
There are 33 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1F023685000
heap
page read and write
222E137B000
heap
page read and write
222E13BC000
heap
page read and write
1A7E6A40000
heap
page read and write
222E34BE000
heap
page read and write
222E3858000
heap
page read and write
1A7E6B4B000
heap
page read and write
1A7E6AD0000
heap
page read and write
222E3462000
heap
page read and write
222E1397000
heap
page read and write
CD8000
heap
page read and write
222E3858000
heap
page read and write
222E3814000
heap
page read and write
222E3858000
heap
page read and write
222E3421000
heap
page read and write
222E34BA000
heap
page read and write
222E13D3000
heap
page read and write
1F02340C000
heap
page read and write
222E13BC000
heap
page read and write
1F023455000
heap
page read and write
1F02344A000
heap
page read and write
D97000
direct allocation
page execute and read and write
222E13C2000
heap
page read and write
222E3141000
heap
page read and write
222E33D4000
heap
page read and write
222E345C000
heap
page read and write
1F023220000
heap
page read and write
222E3880000
heap
page read and write
222E137A000
heap
page read and write
222E1378000
heap
page read and write
222E13EE000
heap
page read and write
BF0000
direct allocation
page read and write
C20000
direct allocation
page read and write
1F023390000
heap
page read and write
222E136C000
heap
page read and write
1A7E6B47000
heap
page read and write
900000
remote allocation
page execute and read and write
7A0000
heap
page read and write
1F024D70000
heap
page read and write
222E3403000
heap
page read and write
222E1688000
heap
page read and write
1F023459000
heap
page read and write
1F023449000
heap
page read and write
222E373A000
heap
page read and write
1F023448000
heap
page read and write
1A7E6B22000
heap
page read and write
222E1393000
heap
page read and write
222E133C000
heap
page read and write
1F023459000
heap
page read and write
222E13FD000
heap
page read and write
252CB11000
stack
page read and write
222E136E000
heap
page read and write
1F023459000
heap
page read and write
222E3858000
heap
page read and write
1041000
direct allocation
page execute and read and write
1A7E6B16000
heap
page read and write
222E13FD000
heap
page read and write
1F023454000
heap
page read and write
1DD03FE000
stack
page read and write
222E135F000
heap
page read and write
1A7E6BB8000
heap
page read and write
1A7E88F7000
heap
page read and write
1F02344C000
heap
page read and write
1A7E6B45000
heap
page read and write
1F023407000
heap
page read and write
1DD06FE000
stack
page read and write
222E13D3000
heap
page read and write
1F023448000
heap
page read and write
F90000
direct allocation
page execute and read and write
ACE000
stack
page read and write
1DD00FE000
stack
page read and write
E16000
direct allocation
page execute and read and write
222E13E0000
heap
page read and write
222E33C1000
heap
page read and write
222E168B000
heap
page read and write
222E13FD000
heap
page read and write
222E13FD000
heap
page read and write
3CD000
stack
page read and write
222E13A6000
heap
page read and write
222E3462000
heap
page read and write
EB3000
direct allocation
page execute and read and write
222E137A000
heap
page read and write
1A7E6E35000
heap
page read and write
1F023444000
heap
page read and write
1F023459000
heap
page read and write
1A7E8B74000
heap
page read and write
1A7E6B49000
heap
page read and write
1F02345A000
heap
page read and write
1F02344C000
heap
page read and write
222E141B000
heap
page read and write
222E137D000
heap
page read and write
222E3845000
heap
page read and write
222E1391000
heap
page read and write
222E3715000
heap
page read and write
8F0000
heap
page read and write
1A7E8590000
heap
page read and write
222E13CE000
heap
page read and write
112E000
direct allocation
page execute and read and write
222E312E000
heap
page read and write
1F02345A000
heap
page read and write
1DD08FB000
stack
page read and write
222E343E000
heap
page read and write
1A7E6B5B000
heap
page read and write
222E1391000
heap
page read and write
4FF07FE000
stack
page read and write
CD0000
heap
page read and write
222E3126000
heap
page read and write
222E135E000
heap
page read and write
222E140E000
heap
page read and write
1F023450000
heap
page read and write
1F023448000
heap
page read and write
1F02345A000
heap
page read and write
222E13FD000
heap
page read and write
1F023449000
heap
page read and write
EB9000
direct allocation
page execute and read and write
222E1397000
heap
page read and write
222E13A6000
heap
page read and write
222E137D000
heap
page read and write
1F023442000
heap
page read and write
222E1689000
heap
page read and write
125D000
direct allocation
page execute and read and write
1A7E88E0000
heap
page read and write
222E13C2000
heap
page read and write
222E138E000
heap
page read and write
928000
heap
page read and write
1A7E6B3C000
heap
page read and write
1F023444000
heap
page read and write
222E3493000
heap
page read and write
222E13D3000
heap
page read and write
4FF0108000
stack
page read and write
222E13A6000
heap
page read and write
2CD000
stack
page read and write
1F023450000
heap
page read and write
1F023445000
heap
page read and write
AE0000
heap
page read and write
222E13BC000
heap
page read and write
222E138E000
heap
page read and write
222E3462000
heap
page read and write
222E3462000
heap
page read and write
222E13D3000
heap
page read and write
1A7E6B46000
heap
page read and write
222E13E6000
heap
page read and write
222E3120000
heap
page read and write
1A7E6E38000
heap
page read and write
1F023459000
heap
page read and write
222E33D3000
heap
page read and write
680000
heap
page read and write
1DD07FE000
stack
page read and write
222E136D000
heap
page read and write
222E13D3000
heap
page read and write
1F023459000
heap
page read and write
222E138E000
heap
page read and write
222E3463000
heap
page read and write
920000
heap
page read and write
1F023450000
heap
page read and write
1F023444000
heap
page read and write
222E141C000
heap
page read and write
5BD000
stack
page read and write
1A7E6B47000
heap
page read and write
DB6000
direct allocation
page execute and read and write
1A7E6E38000
heap
page read and write
222E13BC000
heap
page read and write
252CFFF000
stack
page read and write
222E345C000
heap
page read and write
252D1FF000
stack
page read and write
222E34B1000
heap
page read and write
B1F000
stack
page read and write
1F023444000
heap
page read and write
222E13D3000
heap
page read and write
C4B000
direct allocation
page read and write
222E13A6000
heap
page read and write
13DF000
stack
page read and write
12D8000
direct allocation
page execute and read and write
222E1689000
heap
page read and write
222E33F0000
heap
page read and write
222E373B000
heap
page read and write
222E3270000
remote allocation
page read and write
222E3129000
heap
page read and write
1F023442000
heap
page read and write
1A7E6B2B000
heap
page read and write
1F023459000
heap
page read and write
222E373A000
heap
page read and write
222E3141000
heap
page read and write
222E1397000
heap
page read and write
222E3121000
heap
page read and write
222E1397000
heap
page read and write
222E137A000
heap
page read and write
AD0000
heap
page read and write
1F023459000
heap
page read and write
A8E000
stack
page read and write
222E13D3000
heap
page read and write
222E37E3000
heap
page read and write
1DCFB7A000
stack
page read and write
222E13E5000
heap
page read and write
1F02344A000
heap
page read and write
222E138E000
heap
page read and write
222E13E5000
heap
page read and write
1F023462000
heap
page read and write
1A7E8B72000
heap
page read and write
222E34B0000
heap
page read and write
1F02345A000
heap
page read and write
222E1377000
heap
page read and write
4FF0BFD000
stack
page read and write
C70000
direct allocation
page read and write
222E13BC000
heap
page read and write
222E141E000
heap
page read and write
7B0000
heap
page read and write
222E1413000
heap
page read and write
1F02344B000
heap
page read and write
222E1685000
heap
page read and write
1A7E8B70000
heap
page read and write
222E1397000
heap
page read and write
222E1280000
heap
page read and write
222E3720000
heap
page read and write
1A7E6B16000
heap
page read and write
222E13DC000
heap
page read and write
1F023400000
heap
page read and write
1F023398000
heap
page read and write
222E35E8000
heap
page read and write
222E1347000
heap
page read and write
1A7E6AFE000
heap
page read and write
1F02344F000
heap
page read and write
1F023450000
heap
page read and write
222E3727000
heap
page read and write
222E13FC000
heap
page read and write
222E13C1000
heap
page read and write
222E137D000
heap
page read and write
222E138E000
heap
page read and write
4FF09FE000
stack
page read and write
900000
heap
page read and write
C1F000
stack
page read and write
222E1400000
heap
page read and write
222E3121000
heap
page read and write
222E135A000
heap
page read and write
1F023440000
heap
page read and write
222E13EE000
heap
page read and write
1F023444000
heap
page read and write
222E3858000
heap
page read and write
222E3463000
heap
page read and write
222E136F000
heap
page read and write
222E312A000
heap
page read and write
1A7E6AFF000
heap
page read and write
222E141E000
heap
page read and write
222E387F000
heap
page read and write
1DCFFFE000
stack
page read and write
222E348A000
heap
page read and write
E10000
direct allocation
page execute and read and write
1F02344F000
heap
page read and write
222E1348000
heap
page read and write
222E13EC000
heap
page read and write
222E312A000
heap
page read and write
222E1375000
heap
page read and write
222E1320000
heap
page read and write
222E33E6000
heap
page read and write
252D4FD000
stack
page read and write
222E13BC000
heap
page read and write
615000
remote allocation
page execute and read and write
222E2DB0000
heap
page read and write
4FF06FD000
stack
page read and write
222E1680000
heap
page read and write
222E383C000
heap
page read and write
C40000
heap
page read and write
1F023462000
heap
page read and write
1A7E6B5B000
heap
page read and write
222E345E000
heap
page read and write
79E000
stack
page read and write
222E3124000
heap
page read and write
1F02344D000
heap
page read and write
222E383B000
heap
page read and write
BE0000
heap
page read and write
222E3421000
heap
page read and write
1F023440000
heap
page read and write
1F02345A000
heap
page read and write
222E3721000
heap
page read and write
1F023459000
heap
page read and write
222E3270000
remote allocation
page read and write
222E37B2000
heap
page read and write
222E137D000
heap
page read and write
222E312D000
heap
page read and write
1F02340C000
heap
page read and write
222E13D9000
heap
page read and write
1F023440000
heap
page read and write
222E1391000
heap
page read and write
222E1375000
heap
page read and write
222E33C0000
heap
page read and write
222E387F000
heap
page read and write
1A7E6B3C000
heap
page read and write
1F023320000
heap
page read and write
222E13BC000
heap
page read and write
222E1290000
heap
page read and write
222E13D8000
heap
page read and write
1DD02FE000
stack
page read and write
222E3858000
heap
page read and write
D90000
direct allocation
page execute and read and write
222E1341000
heap
page read and write
222E13E2000
heap
page read and write
222E1397000
heap
page read and write
1F023400000
heap
page read and write
222E13D3000
heap
page read and write
1A7E6E30000
heap
page read and write
222E1397000
heap
page read and write
1F023680000
heap
page read and write
1256000
direct allocation
page execute and read and write
1A7E6B5B000
heap
page read and write
222E13BC000
heap
page read and write
252D5FD000
stack
page read and write
222E13DC000
heap
page read and write
222E13A6000
heap
page read and write
222E13D8000
heap
page read and write
1F023462000
heap
page read and write
222E1348000
heap
page read and write
222E3462000
heap
page read and write
222E3141000
heap
page read and write
252D6FD000
stack
page read and write
252D2FF000
stack
page read and write
1F02345A000
heap
page read and write
1F023462000
heap
page read and write
222E141E000
heap
page read and write
222E13A6000
heap
page read and write
222E1375000
heap
page read and write
222E13A6000
heap
page read and write
1F023459000
heap
page read and write
222E373A000
heap
page read and write
1F023444000
heap
page read and write
222E136B000
heap
page read and write
222E13CF000
heap
page read and write
222E373E000
heap
page read and write
1A7E6B0E000
heap
page read and write
222E1341000
heap
page read and write
1F0233F5000
heap
page read and write
252D3FC000
stack
page read and write
222E13D3000
heap
page read and write
222E3452000
heap
page read and write
222E3781000
heap
page read and write
8EE000
stack
page read and write
222E3858000
heap
page read and write
1056000
direct allocation
page execute and read and write
222E3721000
heap
page read and write
1A7E6A20000
heap
page read and write
1F023450000
heap
page read and write
222E346C000
heap
page read and write
222E1375000
heap
page read and write
222E1397000
heap
page read and write
222E13A6000
heap
page read and write
1A7E6B84000
heap
page read and write
222E12B0000
heap
page read and write
222E386C000
heap
page read and write
1DCFEFE000
stack
page read and write
222E13A6000
heap
page read and write
222E35FA000
heap
page read and write
ECF000
stack
page read and write
222E135B000
heap
page read and write
222E1397000
heap
page read and write
1241000
direct allocation
page execute and read and write
10BD000
direct allocation
page execute and read and write
222E138E000
heap
page read and write
E52000
direct allocation
page execute and read and write
1A7E6A10000
heap
page read and write
1F023459000
heap
page read and write
1F023440000
heap
page read and write
222E141B000
heap
page read and write
10B9000
direct allocation
page execute and read and write
222E13D3000
heap
page read and write
222E141E000
heap
page read and write
1F023300000
heap
page read and write
8FD000
stack
page read and write
222E3141000
heap
page read and write
4FF0AFE000
stack
page read and write
222E3858000
heap
page read and write
222E312A000
heap
page read and write
618000
remote allocation
page execute and read and write
252CEFF000
stack
page read and write
1F02344D000
heap
page read and write
1F02344A000
heap
page read and write
222E3270000
remote allocation
page read and write
1DD05FD000
stack
page read and write
222E13DA000
heap
page read and write
222E1375000
heap
page read and write
970000
heap
page read and write
1F023459000
heap
page read and write
1A7E6B3D000
heap
page read and write
222E13E5000
heap
page read and write
1F023440000
heap
page read and write
222E13BC000
heap
page read and write
1A7E6B45000
heap
page read and write
222E1413000
heap
page read and write
105D000
direct allocation
page execute and read and write
222E13C2000
heap
page read and write
222E1348000
heap
page read and write
1F023407000
heap
page read and write
222E34CD000
heap
page read and write
222E3462000
heap
page read and write
1A7E8900000
heap
page read and write
1F0251B0000
heap
page read and write
1A7E88E1000
heap
page read and write
222E1400000
heap
page read and write
There are 386 hidden memdumps, click here to show them.