IOC Report
01_COVER_LETTER_-_FOR_E_PAYMENT.vbe

loading gif

Files

File Path
Type
Category
Malicious
01_COVER_LETTER_-_FOR_E_PAYMENT.vbe
data
initial sample
malicious
C:\Users\user\AppData\Roaming\mBUojysElnsNYdM.vbs
ISO-8859 text
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_b4b21b9272f0623778607a435112f88140f556cc_00000000_06aa6660-5866-4c52-bf3f-216c35e81dae\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_b4b21b9272f0623778607a435112f88140f556cc_00000000_1875bc6f-2351-4caa-af07-ddd8ff64dfac\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_b4b21b9272f0623778607a435112f88140f556cc_00000000_1ad3a57e-4e53-4856-86c7-07816daa8d4b\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_b4b21b9272f0623778607a435112f88140f556cc_00000000_41c328ab-7460-4040-a823-a0f0b8c30a45\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_b4b21b9272f0623778607a435112f88140f556cc_00000000_5ac8cd7c-e124-47c2-a4d4-699b7dc06196\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_b4b21b9272f0623778607a435112f88140f556cc_00000000_8ad5e66d-79a3-4c96-9658-b402b8edb290\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_b4b21b9272f0623778607a435112f88140f556cc_00000000_aa8d3bbe-ab8b-4e66-b348-b5e4a99848d3\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_b4b21b9272f0623778607a435112f88140f556cc_00000000_b738a297-2c33-445b-a6af-ab3f12057130\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_b4b21b9272f0623778607a435112f88140f556cc_00000000_f30f9f23-2252-413a-815f-f103f029fbb2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_b4b21b9272f0623778607a435112f88140f556cc_00000000_fa71f64c-a402-424a-83dc-6695f6c834b8\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER15D6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER1615.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER189E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER19F7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4B33.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4B63.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER4F6F.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER504B.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7B46.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7B67.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7D15.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER7D35.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB046.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB066.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBCE2.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERBD12.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE0D6.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE0F7.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE2A5.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE2C5.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_04nr4zew.jgq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0hh2ccgh.mns.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1foa3zv3.jhi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2hn0xigp.k0l.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bv2l0bch.gkp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ccpzu3ex.z2l.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dtsg4psr.ua4.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dvdq1ak5.y4z.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fbvaebua.azz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g0gv2kx5.dc1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gavupmrq.4qb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h5y21vrf.k25.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j4oixfh5.vem.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lhrf5m4s.2pw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lygwdskb.ogi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tcacbzdw.mwn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uld1bwk3.uyg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_w3cytwwg.es3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wrcrcuoy.0ru.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zss2thmk.bd2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF5109c9.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF516e31.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF51d603.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF523ba2.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF52a2d8.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF5309fe.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF536e27.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF53d2bd.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF54382e.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CXDDYDFRMABXQC2YVI04.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\DXUCUQ8F892RWC0EPONW.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\I86UPN4P7QD73MBINPH2.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\K07PGO2TA6OUWY4XJ1PD.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\KNVHWLQJWSZLZJ2A42BZ.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QS3QK1M1TC8F04MXKC0O.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\SOPCD0JK296ZW80O30M3.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\TU3HXJJAMTQD7V3T16G2.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\UCSBMANS2KK7YCR1LEJV.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\W8D1M7IG5DUTD8USBM35.temp
data
dropped
\Device\ConDrv
ASCII text, with very long lines (875), with CRLF line terminators, with escape sequences
dropped
There are 65 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\01_COVER_LETTER_-_FOR_E_PAYMENT.vbe"
malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Roaming\mBUojysElnsNYdM.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wermgr.exe
"C:\Windows\system32\wermgr.exe" "-outproc" "0" "5960" "2556" "2808" "2640" "0" "0" "2560" "0" "0" "0" "0" "0"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wermgr.exe
"C:\Windows\system32\wermgr.exe" "-outproc" "0" "5264" "2560" "2180" "2464" "0" "0" "2640" "0" "0" "0" "0" "0"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wermgr.exe
"C:\Windows\system32\wermgr.exe" "-outproc" "0" "2056" "2800" "2732" "2804" "0" "0" "2808" "0" "0" "0" "0" "0"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wermgr.exe
"C:\Windows\system32\wermgr.exe" "-outproc" "0" "3780" "2612" "2844" "2596" "0" "0" "2508" "0" "0" "0" "0" "0"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wermgr.exe
"C:\Windows\system32\wermgr.exe" "-outproc" "0" "5256" "2508" "2512" "2556" "0" "0" "2560" "0" "0" "0" "0" "0"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wermgr.exe
"C:\Windows\system32\wermgr.exe" "-outproc" "0" "5368" "2468" "2228" "2508" "0" "0" "2496" "0" "0" "0" "0" "0"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wermgr.exe
"C:\Windows\system32\wermgr.exe" "-outproc" "0" "6068" "2816" "2752" "2820" "0" "0" "2824" "0" "0" "0" "0" "0"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wermgr.exe
"C:\Windows\system32\wermgr.exe" "-outproc" "0" "1596" "2640" "2808" "2340" "0" "0" "2572" "0" "0" "0" "0" "0"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wermgr.exe
"C:\Windows\system32\wermgr.exe" "-outproc" "0" "4392" "2800" "2312" "2804" "0" "0" "2808" "0" "0" "0" "0" "0"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wermgr.exe
"C:\Windows\system32\wermgr.exe" "-outproc" "0" "6780" "2824" "2552" "2828" "0" "0" "2832" "0" "0" "0" "0" "0"
There are 32 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://144.91.79.54/2508/file140B807A6BN
unknown
http://144.91.79.54/2508/file53C7849C57
unknown
http://144.91.79.54/ll
unknown
http://schemas.m
unknown
http://144.91.79.54/2508/file
unknown
http://144.91.79.54/c
unknown
http://144.91.79.54/2508/v75
unknown
http://144.91.79.54/
unknown
http://144.91.79.54/2508/u9icZZB5Fm5owWojnw5Q.txt
unknown
http://144.91.79.54:80/2508/s
unknown
http://144.91.79.54/2508/v
unknown
http://144.91.79.54/2508/stem
unknown
http://144.91.79.54:80/2508/fileJb
unknown
http://144.91.79.54/2508/r
unknown
http://144.91.79.54/2508/s
unknown
There are 5 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
144.91.79.54
unknown
Germany
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment1
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment2
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment3
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment4
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment5
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment6
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment7
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment8
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment9
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment10
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment11
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment12
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment13
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment14
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment15
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment16
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment17
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment18
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment19
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment20
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment21
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment22
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment23
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment24
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment25
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment26
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment27
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment28
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment29
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM\donn
segment30
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM
cn
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM
i
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM
s
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM
r
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM
Path
HKEY_CURRENT_USER\SOFTWARE\mBUojysElnsNYdM
v
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 30 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
DB0000
remote allocation
page execute and read and write
malicious
1710000
direct allocation
page read and write
malicious
1760000
direct allocation
page execute and read and write
249A37F3000
heap
page read and write
21317A86000
heap
page read and write
249A3804000
heap
page read and write
21315A56000
heap
page read and write
249A37F3000
heap
page read and write
176A000
direct allocation
page read and write
1BB8000
direct allocation
page execute and read and write
1400000
heap
page read and write
249A37D4000
heap
page read and write
FDD000
stack
page read and write
21315AA3000
heap
page read and write
13B0000
heap
page read and write
213159D2000
heap
page read and write
249A37DE000
heap
page read and write
13F0000
heap
page read and write
249A3812000
heap
page read and write
1180000
heap
page read and write
1AE6000
direct allocation
page execute and read and write
7E5A1FE000
stack
page read and write
21318137000
heap
page read and write
7E5A2FE000
stack
page read and write
21317753000
heap
page read and write
21315A0F000
heap
page read and write
1B26000
direct allocation
page execute and read and write
249A37CF000
heap
page read and write
1767000
direct allocation
page execute and read and write
213159F1000
heap
page read and write
5D0000
heap
page read and write
7E5A7FD000
stack
page read and write
1670000
direct allocation
page read and write
213159FE000
heap
page read and write
1170000
heap
page read and write
21317753000
heap
page read and write
129E000
stack
page read and write
C2CADFF000
stack
page read and write
C2CB2FE000
stack
page read and write
12C0000
heap
page read and write
1A72000
direct allocation
page execute and read and write
249A3806000
heap
page read and write
1480000
heap
page read and write
21315955000
heap
page read and write
1D11000
direct allocation
page execute and read and write
1470000
heap
page read and write
249A37F3000
heap
page read and write
177F000
stack
page read and write
249A3808000
heap
page read and write
2131811A000
heap
page read and write
249A37DA000
heap
page read and write
21317753000
heap
page read and write
249A37E0000
heap
page read and write
249A37EB000
heap
page read and write
17FF000
stack
page read and write
21315A56000
heap
page read and write
249A3803000
heap
page read and write
249A37F3000
heap
page read and write
2131788A000
heap
page read and write
1BAF000
stack
page read and write
249A3710000
heap
page read and write
21315A94000
heap
page read and write
213159E0000
heap
page read and write
14D0000
heap
page read and write
1940000
direct allocation
page read and write
249A37DE000
heap
page read and write
21315958000
heap
page read and write
15C8000
heap
page read and write
21315A56000
heap
page read and write
1AB6000
direct allocation
page execute and read and write
1B36000
direct allocation
page execute and read and write
249A3807000
heap
page read and write
21315A51000
heap
page read and write
249A37F3000
heap
page read and write
249A37E6000
heap
page read and write
ED3000
direct allocation
page execute and read and write
21318170000
heap
page read and write
193F000
stack
page read and write
1A27000
direct allocation
page execute and read and write
21315A8D000
heap
page read and write
21317CA5000
heap
page read and write
1740000
direct allocation
page read and write
213179D6000
heap
page read and write
21315A0C000
heap
page read and write
17E0000
direct allocation
page execute and read and write
249A37DE000
heap
page read and write
21315A11000
heap
page read and write
21315A72000
heap
page read and write
1876000
direct allocation
page execute and read and write
21315A84000
heap
page read and write
213159DC000
heap
page read and write
16C0000
heap
page read and write
249A37DE000
heap
page read and write
21315A25000
heap
page read and write
1388000
heap
page read and write
21315A7E000
heap
page read and write
249A3804000
heap
page read and write
1408000
heap
page read and write
2131774C000
heap
page read and write
21315A6C000
heap
page read and write
1C7D000
direct allocation
page execute and read and write
D60000
heap
page read and write
249A3808000
heap
page read and write
1A46000
direct allocation
page execute and read and write
21315AAB000
heap
page read and write
21315A6C000
heap
page read and write
249A37DE000
heap
page read and write
21315A35000
heap
page read and write
249A37DB000
heap
page read and write
21315A74000
heap
page read and write
192A000
direct allocation
page read and write
1640000
heap
page read and write
21315959000
heap
page read and write
213159B0000
heap
page read and write
196A000
direct allocation
page read and write
7E5A4FF000
stack
page read and write
113D000
stack
page read and write
249A3680000
heap
page read and write
21317D00000
heap
page read and write
2131775B000
heap
page read and write
1650000
heap
page read and write
249A37DA000
heap
page read and write
21315A25000
heap
page read and write
2131775B000
heap
page read and write
21315960000
heap
page read and write
2131595E000
heap
page read and write
249A37F3000
heap
page read and write
21317750000
heap
page read and write
1AA0000
direct allocation
page execute and read and write
21315A8C000
heap
page read and write
21315A0C000
heap
page read and write
7E5A0F2000
stack
page read and write
249A3804000
heap
page read and write
887000
heap
page read and write
19B7000
direct allocation
page execute and read and write
249A3808000
heap
page read and write
213159C1000
heap
page read and write
21315A16000
heap
page read and write
1822000
direct allocation
page execute and read and write
2131788B000
heap
page read and write
249A37F3000
heap
page read and write
166E000
stack
page read and write
1B22000
direct allocation
page execute and read and write
21317753000
heap
page read and write
6FD000
stack
page read and write
21315A6C000
heap
page read and write
163E000
stack
page read and write
21315A56000
heap
page read and write
213180DF000
heap
page read and write
249A3803000
heap
page read and write
1460000
heap
page read and write
249A3803000
heap
page read and write
213173D0000
heap
page read and write
124D000
stack
page read and write
1B49000
direct allocation
page execute and read and write
249A3804000
heap
page read and write
21317C13000
heap
page read and write
21317753000
heap
page read and write
249A37F3000
heap
page read and write
249A380F000
heap
page read and write
1478000
heap
page read and write
13EE000
stack
page read and write
21315A6C000
heap
page read and write
249A37E9000
heap
page read and write
1960000
heap
page read and write
21315A2B000
heap
page read and write
1390000
heap
page read and write
21315A6C000
heap
page read and write
1290000
heap
page read and write
1D20000
heap
page read and write
249A37E3000
heap
page read and write
249A37F3000
heap
page read and write
249A37ED000
heap
page read and write
1AD3000
direct allocation
page execute and read and write
21317D30000
heap
page read and write
14A0000
heap
page read and write
213179D0000
heap
page read and write
5A0000
heap
page read and write
12FC000
stack
page read and write
21315A6C000
heap
page read and write
1889000
direct allocation
page execute and read and write
2131807E000
heap
page read and write
18B2000
direct allocation
page execute and read and write
249A3803000
heap
page read and write
21317753000
heap
page read and write
1CED000
direct allocation
page execute and read and write
12FC000
stack
page read and write
199D000
direct allocation
page execute and read and write
1860000
direct allocation
page execute and read and write
249A3803000
heap
page read and write
2131774C000
heap
page read and write
21315A6C000
heap
page read and write
213179D5000
heap
page read and write
21315959000
heap
page read and write
21315A15000
heap
page read and write
249A37F3000
heap
page read and write
249A3814000
heap
page read and write
12FD000
stack
page read and write
249A37D4000
heap
page read and write
249A37E4000
heap
page read and write
21317748000
heap
page read and write
249A3808000
heap
page read and write
43D000
stack
page read and write
249A3807000
heap
page read and write
249A37F3000
heap
page read and write
21315A93000
heap
page read and write
249A379C000
heap
page read and write
1A0E000
direct allocation
page execute and read and write
15C0000
heap
page read and write
21315A43000
heap
page read and write
21318170000
heap
page read and write
880000
heap
page read and write
249A3803000
heap
page read and write
21315A56000
heap
page read and write
1AC9000
direct allocation
page execute and read and write
249A37DE000
heap
page read and write
21318170000
heap
page read and write
213159B7000
heap
page read and write
21315A2C000
heap
page read and write
173F000
stack
page read and write
21315950000
heap
page read and write
21315A4C000
heap
page read and write
2131815E000
heap
page read and write
FFD000
stack
page read and write
1B2D000
direct allocation
page execute and read and write
107D000
direct allocation
page execute and read and write
249A37E7000
heap
page read and write
1A60000
direct allocation
page execute and read and write
249A37D6000
heap
page read and write
249A37EC000
heap
page read and write
249A37F3000
heap
page read and write
249A3720000
heap
page read and write
21315A10000
heap
page read and write
249A379A000
heap
page read and write
21317A65000
heap
page read and write
11D0000
heap
page read and write
1CE6000
direct allocation
page execute and read and write
249A37DE000
heap
page read and write
2131774C000
heap
page read and write
21317753000
heap
page read and write
103D000
stack
page read and write
249A37CF000
heap
page read and write
17E6000
direct allocation
page execute and read and write
249A3803000
heap
page read and write
21315A56000
heap
page read and write
249A37E4000
heap
page read and write
1A67000
direct allocation
page execute and read and write
21315A8C000
heap
page read and write
249A3670000
heap
page read and write
249A3807000
heap
page read and write
21315A84000
heap
page read and write
249A37EB000
heap
page read and write
249A3808000
heap
page read and write
21315A6C000
heap
page read and write
15FF000
stack
page read and write
11F0000
heap
page read and write
7C0000
heap
page read and write
21315A2F000
heap
page read and write
21315A25000
heap
page read and write
DB0000
direct allocation
page execute and read and write
21315A11000
heap
page read and write
1919000
direct allocation
page execute and read and write
184F000
stack
page read and write
21315A16000
heap
page read and write
249A37EC000
heap
page read and write
21317AD0000
remote allocation
page read and write
249A380C000
heap
page read and write
249A3808000
heap
page read and write
249A37B4000
heap
page read and write
10FC000
stack
page read and write
1500000
heap
page read and write
249A3803000
heap
page read and write
2131595E000
heap
page read and write
249A37DE000
heap
page read and write
2131803F000
heap
page read and write
2131803E000
heap
page read and write
249A3803000
heap
page read and write
C4F000
stack
page read and write
1A62000
direct allocation
page execute and read and write
213180C2000
heap
page read and write
21318170000
heap
page read and write
249A37DE000
heap
page read and write
213159F1000
heap
page read and write
21317C01000
heap
page read and write
2131595E000
heap
page read and write
13F0000
heap
page read and write
249A37F3000
heap
page read and write
129E000
stack
page read and write
21315A25000
heap
page read and write
1AE2000
direct allocation
page execute and read and write
149E000
stack
page read and write
1C76000
direct allocation
page execute and read and write
249A37DA000
heap
page read and write
213179D6000
heap
page read and write
249A3819000
heap
page read and write
249A37D4000
heap
page read and write
1A26000
direct allocation
page execute and read and write
21317741000
heap
page read and write
21317C43000
heap
page read and write
249A3807000
heap
page read and write
21315AAE000
heap
page read and write
249A380B000
heap
page read and write
21317747000
heap
page read and write
167F000
stack
page read and write
249A37CF000
heap
page read and write
7E5A9FD000
stack
page read and write
21317753000
heap
page read and write
249A37EC000
heap
page read and write
2131774C000
heap
page read and write
249A37DE000
heap
page read and write
C2CAEFE000
stack
page read and write
21315AA4000
heap
page read and write
21317C00000
heap
page read and write
21315A1D000
heap
page read and write
21315A8C000
heap
page read and write
1950000
direct allocation
page read and write
21315A84000
heap
page read and write
2131774A000
heap
page read and write
7E5A8FC000
stack
page read and write
21315A6C000
heap
page read and write
249A37E0000
heap
page read and write
A50000
heap
page read and write
1550000
heap
page read and write
249A3803000
heap
page read and write
249A37F3000
heap
page read and write
1867000
direct allocation
page execute and read and write
21315A50000
heap
page read and write
7E5A5FE000
stack
page read and write
D7D000
stack
page read and write
21315A4F000
heap
page read and write
249A37DB000
heap
page read and write
249A37DE000
heap
page read and write
143E000
stack
page read and write
21315AAB000
heap
page read and write
249A37E6000
heap
page read and write
21317753000
heap
page read and write
21317C12000
heap
page read and write
249A37D4000
heap
page read and write
213159CD000
heap
page read and write
249A3700000
heap
page read and write
21315A00000
heap
page read and write
21315A4F000
heap
page read and write
1430000
heap
page read and write
249A36A0000
heap
page read and write
1540000
heap
page read and write
21315A6C000
heap
page read and write
21317A25000
heap
page read and write
1886000
direct allocation
page execute and read and write
13FE000
stack
page read and write
249A3806000
heap
page read and write
21315A96000
heap
page read and write
21317753000
heap
page read and write
132A000
direct allocation
page read and write
249A3806000
heap
page read and write
1C61000
direct allocation
page execute and read and write
1A11000
direct allocation
page execute and read and write
249A37E1000
heap
page read and write
21315A2C000
heap
page read and write
12F8000
heap
page read and write
21315A56000
heap
page read and write
12A0000
heap
page read and write
21315AAE000
heap
page read and write
12C0000
heap
page read and write
FF0000
heap
page read and write
152E000
stack
page read and write
249A3807000
heap
page read and write
21317AD0000
remote allocation
page read and write
21317750000
heap
page read and write
249A37D4000
heap
page read and write
21315A56000
heap
page read and write
1A2D000
direct allocation
page execute and read and write
21315850000
heap
page read and write
21317748000
heap
page read and write
160F000
stack
page read and write
21318170000
heap
page read and write
21317753000
heap
page read and write
21317AA5000
heap
page read and write
213180FD000
heap
page read and write
7D0000
direct allocation
page read and write
21317C74000
heap
page read and write
249A3803000
heap
page read and write
21315A6C000
heap
page read and write
249A37DE000
heap
page read and write
21317753000
heap
page read and write
21315A72000
heap
page read and write
1C66000
direct allocation
page execute and read and write
162F000
stack
page read and write
C2CACF9000
stack
page read and write
21318031000
heap
page read and write
1390000
heap
page read and write
17F7000
direct allocation
page execute and read and write
1CD1000
direct allocation
page execute and read and write
21315A56000
heap
page read and write
19D6000
direct allocation
page execute and read and write
12F0000
heap
page read and write
197A000
direct allocation
page read and write
1460000
heap
page read and write
1A20000
direct allocation
page execute and read and write
21315AA3000
heap
page read and write
14B0000
heap
page read and write
194F000
stack
page read and write
1076000
direct allocation
page execute and read and write
1440000
heap
page read and write
2131595C000
heap
page read and write
249A3807000
heap
page read and write
21318141000
heap
page read and write
21315A56000
heap
page read and write
21317A06000
heap
page read and write
21318170000
heap
page read and write
21315A11000
heap
page read and write
1130000
heap
page read and write
1A36000
direct allocation
page execute and read and write
1AA1000
direct allocation
page execute and read and write
21317AD0000
remote allocation
page read and write
E72000
direct allocation
page execute and read and write
21317AA5000
heap
page read and write
21317884000
heap
page read and write
249A37D8000
heap
page read and write
17F0000
direct allocation
page execute and read and write
249A3804000
heap
page read and write
7E5AAFD000
stack
page read and write
1900000
direct allocation
page read and write
21315A43000
heap
page read and write
18E6000
direct allocation
page execute and read and write
1B43000
direct allocation
page execute and read and write
21315A56000
heap
page read and write
21317753000
heap
page read and write
21317D42000
heap
page read and write
21318170000
heap
page read and write
1300000
direct allocation
page read and write
21315A3D000
heap
page read and write
1410000
heap
page read and write
19A7000
direct allocation
page execute and read and write
77E000
stack
page read and write
213180A5000
heap
page read and write
1250000
heap
page read and write
12B0000
heap
page read and write
249A3803000
heap
page read and write
11E0000
heap
page read and write
21317753000
heap
page read and write
21317753000
heap
page read and write
249A3812000
heap
page read and write
249A3806000
heap
page read and write
249A37CF000
heap
page read and write
21315A3C000
heap
page read and write
21318170000
heap
page read and write
2131595A000
heap
page read and write
21318142000
heap
page read and write
18BF000
stack
page read and write
21317753000
heap
page read and write
19C6000
direct allocation
page execute and read and write
ED9000
direct allocation
page execute and read and write
21317753000
heap
page read and write
249A3809000
heap
page read and write
249A37B4000
heap
page read and write
128E000
stack
page read and write
21318039000
heap
page read and write
1999000
direct allocation
page execute and read and write
21318170000
heap
page read and write
21317753000
heap
page read and write
12D0000
heap
page read and write
21318170000
heap
page read and write
1061000
direct allocation
page execute and read and write
157A000
direct allocation
page read and write
249A3819000
heap
page read and write
21317887000
heap
page read and write
1B11000
direct allocation
page execute and read and write
21315A6C000
heap
page read and write
21315A0C000
heap
page read and write
249A37E7000
heap
page read and write
21315A0C000
heap
page read and write
21315A25000
heap
page read and write
21315A25000
heap
page read and write
F8D000
stack
page read and write
183F000
stack
page read and write
1C50000
heap
page read and write
1C51000
direct allocation
page execute and read and write
21315A00000
heap
page read and write
249A37F3000
heap
page read and write
249A3807000
heap
page read and write
249A3803000
heap
page read and write
249A37F3000
heap
page read and write
21315A6F000
heap
page read and write
21318170000
heap
page read and write
10FD000
stack
page read and write
541000
remote allocation
page execute and read and write
21315A35000
heap
page read and write
21315A3E000
heap
page read and write
249A37E9000
heap
page read and write
249A37EC000
heap
page read and write
14F0000
heap
page read and write
21315A1B000
heap
page read and write
249A3803000
heap
page read and write
1C6D000
direct allocation
page execute and read and write
1417000
heap
page read and write
249A3803000
heap
page read and write
18E0000
direct allocation
page execute and read and write
1380000
heap
page read and write
21317753000
heap
page read and write
21318038000
heap
page read and write
249A5510000
heap
page read and write
21317CD6000
heap
page read and write
249A380E000
heap
page read and write
21318170000
heap
page read and write
DD6000
direct allocation
page execute and read and write
1A20000
direct allocation
page execute and read and write
19A0000
direct allocation
page execute and read and write
142E000
stack
page read and write
21315A51000
heap
page read and write
1608000
heap
page read and write
21315A6C000
heap
page read and write
12B0000
heap
page read and write
249A380C000
heap
page read and write
1983000
direct allocation
page execute and read and write
21315A0E000
heap
page read and write
249A37E3000
heap
page read and write
249A3803000
heap
page read and write
21317753000
heap
page read and write
21318030000
heap
page read and write
169A000
direct allocation
page read and write
21317A65000
heap
page read and write
1558000
heap
page read and write
2131774C000
heap
page read and write
DB7000
direct allocation
page execute and read and write
21317F0E000
heap
page read and write
21317753000
heap
page read and write
21315A56000
heap
page read and write
21317C11000
heap
page read and write
1AC3000
direct allocation
page execute and read and write
1A86000
direct allocation
page execute and read and write
1786000
direct allocation
page execute and read and write
21315AAD000
heap
page read and write
151E000
stack
page read and write
1550000
direct allocation
page read and write
249A37F3000
heap
page read and write
E30000
direct allocation
page execute and read and write
21315A56000
heap
page read and write
249A3803000
heap
page read and write
249A37F3000
heap
page read and write
21317753000
heap
page read and write
21315A51000
heap
page read and write
1ABD000
direct allocation
page execute and read and write
249A3728000
heap
page read and write
213159DB000
heap
page read and write
1870000
direct allocation
page execute and read and write
249A3816000
heap
page read and write
213159EB000
heap
page read and write
C2CAFFD000
stack
page read and write
1816000
direct allocation
page execute and read and write
21318170000
heap
page read and write
1B3D000
direct allocation
page execute and read and write
249A37F3000
heap
page read and write
10FC000
stack
page read and write
21317753000
heap
page read and write
2131774C000
heap
page read and write
21315A25000
heap
page read and write
14AE000
stack
page read and write
21315A4C000
heap
page read and write
21315930000
heap
page read and write
21317746000
heap
page read and write
21317753000
heap
page read and write
249A37F3000
heap
page read and write
249A37D4000
heap
page read and write
1D2D000
direct allocation
page execute and read and write
DCD000
stack
page read and write
213159D2000
heap
page read and write
73E000
stack
page read and write
249A3803000
heap
page read and write
249A380B000
heap
page read and write
30D000
stack
page read and write
2131788A000
heap
page read and write
1D26000
direct allocation
page execute and read and write
21318057000
heap
page read and write
249A37CF000
heap
page read and write
249A37DA000
heap
page read and write
21318027000
heap
page read and write
3C0000
heap
page read and write
21315A7E000
heap
page read and write
21315A0F000
heap
page read and write
249A37CF000
heap
page read and write
249A3803000
heap
page read and write
21315A6C000
heap
page read and write
21315A7E000
heap
page read and write
21315958000
heap
page read and write
21315A56000
heap
page read and write
21317753000
heap
page read and write
21315A04000
heap
page read and write
21315A94000
heap
page read and write
1913000
direct allocation
page execute and read and write
13A0000
heap
page read and write
21318031000
heap
page read and write
249A3803000
heap
page read and write
C2CB6FB000
stack
page read and write
249A37F3000
heap
page read and write
21315A2F000
heap
page read and write
249A3808000
heap
page read and write
21315AA4000
heap
page read and write
249A3804000
heap
page read and write
213179E6000
heap
page read and write
213173F0000
heap
page read and write
249A37E3000
heap
page read and write
249A3803000
heap
page read and write
21317753000
heap
page read and write
249A3812000
heap
page read and write
21318170000
heap
page read and write
21315AAB000
heap
page read and write
21317A25000
heap
page read and write
21317746000
heap
page read and write
249A380A000
heap
page read and write
249A3807000
heap
page read and write
21318170000
heap
page read and write
249A3795000
heap
page read and write
249A37DE000
heap
page read and write
1AD9000
direct allocation
page execute and read and write
1B89000
direct allocation
page execute and read and write
249A37DE000
heap
page read and write
7E5A6FE000
stack
page read and write
213179E4000
heap
page read and write
12FC000
stack
page read and write
249A3715000
heap
page read and write
21317753000
heap
page read and write
21315A56000
heap
page read and write
19BF000
stack
page read and write
21317753000
heap
page read and write
249A37EC000
heap
page read and write
21315A4F000
heap
page read and write
1922000
direct allocation
page execute and read and write
21317753000
heap
page read and write
249A3807000
heap
page read and write
2131788D000
heap
page read and write
21315A16000
heap
page read and write
249A3807000
heap
page read and write
18FF000
stack
page read and write
21318170000
heap
page read and write
21317740000
heap
page read and write
21317887000
heap
page read and write
21317882000
heap
page read and write
E36000
direct allocation
page execute and read and write
1A26000
direct allocation
page execute and read and write
213159EE000
heap
page read and write
DBD000
stack
page read and write
1E90000
heap
page read and write
170F000
stack
page read and write
249A3807000
heap
page read and write
249A37F3000
heap
page read and write
249A3803000
heap
page read and write
1B21000
direct allocation
page execute and read and write
12FE000
stack
page read and write
12A0000
heap
page read and write
249A37CF000
heap
page read and write
21315A16000
heap
page read and write
249A3807000
heap
page read and write
249A37EB000
heap
page read and write
249A3805000
heap
page read and write
21315A6C000
heap
page read and write
1870000
direct allocation
page execute and read and write
249A3803000
heap
page read and write
249A3807000
heap
page read and write
1989000
direct allocation
page execute and read and write
FDD000
stack
page read and write
2131814B000
heap
page read and write
21317753000
heap
page read and write
249A3803000
heap
page read and write
7FA000
direct allocation
page read and write
249A37F3000
heap
page read and write
21315A3C000
heap
page read and write
21317A46000
heap
page read and write
21317880000
heap
page read and write
213159EC000
heap
page read and write
249A37F3000
heap
page read and write
249A37DE000
heap
page read and write
53D000
stack
page read and write
249A380B000
heap
page read and write
145E000
stack
page read and write
21317753000
heap
page read and write
3D0000
heap
page read and write
C2CB0FE000
stack
page read and write
1AA6000
direct allocation
page execute and read and write
249A37E4000
heap
page read and write
1600000
heap
page read and write
1B83000
direct allocation
page execute and read and write
249A37CF000
heap
page read and write
1A30000
direct allocation
page execute and read and write
249A37E4000
heap
page read and write
21315A4F000
heap
page read and write
19B0000
direct allocation
page execute and read and write
5F0000
heap
page read and write
213179D3000
heap
page read and write
249A37EC000
heap
page read and write
2131774C000
heap
page read and write
213159E1000
heap
page read and write
1AE0000
direct allocation
page execute and read and write
2131774C000
heap
page read and write
1883000
direct allocation
page execute and read and write
2131803E000
heap
page read and write
D4F000
stack
page read and write
249A37E4000
heap
page read and write
There are 687 hidden memdumps, click here to show them.