IOC Report
Deolane-Video-PDF.vbs

loading gif

Files

File Path
Type
Category
Malicious
Deolane-Video-PDF.vbs
Unicode text, UTF-8 text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\4wToa.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Temp\n0EifhO_extraido\bOamY.exe (copy)
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\n0EifhO_extraido\wsx.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Software\registry_4131f52c.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\_MEI76722\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\VCRUNTIME140_1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\_asyncio.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\_cffi_backend.cp38-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\_multiprocessing.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\_overlapped.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-console-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-datetime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-debug-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-errorhandling-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-fibers-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-file-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-file-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-file-l2-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-handle-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-interlocked-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-libraryloader-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-localization-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-memory-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-namedpipe-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-processenvironment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-processthreads-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-processthreads-l1-1-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-profile-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-rtlsupport-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-synch-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-synch-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-sysinfo-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-timezone-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-core-util-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-crt-conio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-crt-convert-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-crt-environment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-crt-filesystem-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-crt-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-crt-locale-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-crt-math-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-crt-process-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-crt-runtime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-crt-stdio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-crt-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-crt-time-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\api-ms-win-crt-utility-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\bcrypt\_bcrypt.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\certifi\cacert.pem
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\charset_normalizer\md.cp38-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\charset_normalizer\md__mypyc.cp38-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\cryptography-3.4.8.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\cryptography-3.4.8.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\cryptography-3.4.8.dist-info\LICENSE.APACHE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\cryptography-3.4.8.dist-info\LICENSE.BSD
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\cryptography-3.4.8.dist-info\LICENSE.PSF
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\cryptography-3.4.8.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\cryptography-3.4.8.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\cryptography-3.4.8.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\cryptography-3.4.8.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\cryptography\hazmat\bindings\_openssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\libcrypto-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\libffi-7.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\libssl-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\pyexpat.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\python3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\python38.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\pywin32_system32\pywintypes38.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\ucrtbase.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI76722\win32wnet.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\VCRUNTIME140.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\VCRUNTIME140_1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\_asyncio.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\_bz2.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\_cffi_backend.cp38-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\_ctypes.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\_decimal.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\_hashlib.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\_lzma.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\_multiprocessing.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\_overlapped.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\_queue.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\_socket.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\_ssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-console-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-datetime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-debug-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-errorhandling-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-fibers-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-file-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-file-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-file-l2-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-handle-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-interlocked-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-libraryloader-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-localization-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-memory-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-namedpipe-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-processenvironment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-processthreads-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-processthreads-l1-1-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-profile-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-rtlsupport-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-synch-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-synch-l1-2-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-sysinfo-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-timezone-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-core-util-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-crt-conio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-crt-convert-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-crt-environment-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-crt-filesystem-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-crt-heap-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-crt-locale-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-crt-math-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-crt-process-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-crt-runtime-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-crt-stdio-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-crt-string-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-crt-time-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\api-ms-win-crt-utility-l1-1-0.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\base_library.zip
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\bcrypt\_bcrypt.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\certifi\cacert.pem
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\charset_normalizer\md.cp38-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\charset_normalizer\md__mypyc.cp38-win_amd64.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\cryptography-3.4.8.dist-info\INSTALLER
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\cryptography-3.4.8.dist-info\LICENSE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\cryptography-3.4.8.dist-info\LICENSE.APACHE
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\cryptography-3.4.8.dist-info\LICENSE.BSD
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\cryptography-3.4.8.dist-info\LICENSE.PSF
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\cryptography-3.4.8.dist-info\METADATA
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\cryptography-3.4.8.dist-info\RECORD
CSV text
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\cryptography-3.4.8.dist-info\WHEEL
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\cryptography-3.4.8.dist-info\top_level.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\cryptography\hazmat\bindings\_openssl.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\libcrypto-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\libffi-7.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\libssl-1_1.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\pyexpat.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\python3.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\python38.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\pywin32_system32\pywintypes38.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\select.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\ucrtbase.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\unicodedata.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\_MEI79002\win32wnet.pyd
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Software\lockfile
ASCII text, with no line terminators
dropped
Chrome Cache Entry: 216
data
downloaded
Chrome Cache Entry: 217
ISO Media, MP4 Base Media v1 [ISO 14496-12:2003]
downloaded
Chrome Cache Entry: 218
data
downloaded
Chrome Cache Entry: 219
data
downloaded
There are 158 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Deolane-Video-PDF.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\wscript.exe" "C:\Users\user\Desktop\Deolane-Video-PDF.vbs" /elevated
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /tn XHdU9gx7 /tr "C:\Users\user\AppData\Local\Temp\n0EifhO_extraido\bOamY.exe" /sc once /st 05:31 /RL HIGHEST /f
malicious
C:\Users\user\AppData\Local\Temp\n0EifhO_extraido\bOamY.exe
C:\Users\user\AppData\Local\Temp\n0EifhO_extraido\bOamY.exe
malicious
C:\Users\user\AppData\Local\Temp\n0EifhO_extraido\bOamY.exe
C:\Users\user\AppData\Local\Temp\n0EifhO_extraido\bOamY.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "schtasks /query /tn "registry_4131f52c.exe""
malicious
C:\Windows\System32\schtasks.exe
schtasks /query /tn "registry_4131f52c.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "schtasks /create /tn "registry_4131f52c.exe" /tr "C:\Users\user\AppData\Roaming\Software\registry_4131f52c.exe" /sc onlogon /rl highest /f"
malicious
C:\Windows\System32\schtasks.exe
schtasks /create /tn "registry_4131f52c.exe" /tr "C:\Users\user\AppData\Roaming\Software\registry_4131f52c.exe" /sc onlogon /rl highest /f
malicious
C:\Users\user\AppData\Roaming\Software\registry_4131f52c.exe
C:\Users\user\AppData\Roaming\Software\registry_4131f52c.exe
malicious
C:\Users\user\AppData\Roaming\Software\registry_4131f52c.exe
C:\Users\user\AppData\Roaming\Software\registry_4131f52c.exe
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c "schtasks /query /tn "registry_4131f52c.exe""
malicious
C:\Windows\System32\schtasks.exe
schtasks /query /tn "registry_4131f52c.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://estudosadulto.educacao.ws/deolane.mp4
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2368 --field-trial-handle=2336,i,6872769781051074881,1021578343780495582,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=audio.mojom.AudioService --lang=en-US --service-sandbox-type=audio --mojo-platform-channel-handle=5032 --field-trial-handle=2336,i,6872769781051074881,1021578343780495582,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://almeidadoprogresso.siteoficial.ws/wsx.zip
45.89.247.53
malicious
https://almeidadoprogresso.siteoficial.ws/
unknown
malicious
https://estudosadulto.educacao.ws/deola
unknown
malicious
https://github.com/asweigart/pyperclip/issues/55
unknown
http://pontoslivelobb.servicos.ws/conta.phprg
unknown
http://repository.swisssign.com/tV
unknown
https://cloud.google.com/appuser/docs/standard/runtimes
unknown
https://github.com/mhammond/pywin32
unknown
http://pontoslivelobb.servicos.ws/conta.php
191.252.83.191
http://crl.xrampsecurity.com/XGCA.crlbelow
unknown
http://docs.python.org/library/unittest.html
unknown
https://github.com/tensorflow/datasets/blob/master/tensorflow_datasets/core/utils/resource_utils.py#
unknown
http://pontoslivelobb.servicos.ws/salva.php
unknown
http://crl.xrampsecurity.com/XGCA.crlY7
unknown
http://www.python.org/download/releases/2.3/mro/.
unknown
https://github.com/pyca/cryptography/actions?query=workflow%3ACI
unknown
http://crl.dhimyotis.com/certignarootca.crl;
unknown
http://www.cert.fnmt.es/dpcs/0J
unknown
https://tools.ietf.org/html/rfc2388#section-4.4
unknown
https://www.apache.org/licenses/LICENSE-2.0
unknown
https://estudosadulto.educacao.ws/deolane.mp4#
unknown
http://docs.python.org/3/library/subprocess#subprocess.Popen.kill
unknown
https://codecov.io/github/pyca/cryptography/coverage.svg?branch=master
unknown
http://crl.dhimyotis.com/certignarootca.crl
unknown
http://curl.haxx.se/rfc/cookie_spec.html
unknown
http://ocsp.accv.es
unknown
http://www.python.org/dev/peps/pep-0205/
unknown
http://docs.python.org/3/library/subprocess#subprocess.Popen.returncode
unknown
https://stackoverflow.com/questions/455434/how-should-i-use-formatmessage-properly-in-c
unknown
https://estudosadulto.educacao.ws/contador/contador.php
unknown
http://json.org
unknown
https://github.com/python/cpython/blob/3.9/Lib/importlib/_bootstrap_external.py#L679-L688
unknown
https://httpbin.org/get
unknown
http://httpbin.org/
unknown
http://91.92.246.171:5000/replace
unknown
https://wwww.certigna.fr/autorites/0m
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/reader
unknown
https://codecov.io/github/pyca/cryptography?branch=master
unknown
https://httpbin.org/
unknown
https://www.apache.org/licenses/
unknown
https://wwww.certigna.fr/autorites/
unknown
http://pontoslivelobb.servicos.ws/conta.phprg)
unknown
http://hg.python.org/cpython/file/603b4d593758/Lib/socket.py#l535
unknown
https://github.com/Unidata/MetPy/blob/a3424de66a44bf3a92b0dcacf4dff82ad7b86712/src/metpy/plots/wx_sy
unknown
https://cryptography.io/en/latest/installation.html
unknown
http://crl.securetrust.com/STCA.crl
unknown
http://wwwsearch.sf.net/):
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
unknown
http://www.accv.es/legislacion_c.htm
unknown
http://tools.ietf.org/html/rfc6125#section-6.4.3
unknown
https://github.com/pyca/bcrypt/__version_ex__4.2.0The
unknown
http://crl.xrampsecurity.com/XGCA.crl0
unknown
http://pontoslivelobb.servicos.ws/salva.phpp
unknown
http://www.cert.fnmt.es/dpcs/
unknown
http://www.accv.es00
unknown
https://github.com/python/cpython/blob/839d7893943782ee803536a47f1d4de160314f85/Lib/importlib/abc.py
unknown
https://github.com/pyca/cryptography/issues
unknown
https://readthedocs.org/projects/cryptography/badge/?version=latest
unknown
https://github.com/urllib3/urllib3/issues/2513#issuecomment-1152559900.
unknown
http://google.com/
unknown
http://repository.swisssign.com/76
unknown
https://mahler:8092/site-updates.py
unknown
https://urllib3.readthedocs.io/en/stable/v2-migration-guide.html
unknown
http://ocsp.accv.esx
unknown
http://crl.securetrust.com/SGCA.crl
unknown
http://.../back.jpeg
unknown
https://github.com/pyca/cryptography
unknown
https://cryptography.io/
unknown
https://urllib3.readthedocs.io/en/1.26.x/advanced-usage.html#https-proxy-error-http-proxy
unknown
http://www.python.org/
unknown
https://httpbin.org/post
unknown
https://pyperclip.readthedocs.io/en/latest/index.html#not-implemented-error
unknown
https://docs.rs/getrandom#nodejs-es-module-support
unknown
https://github.com/Ousret/charset_normalizer
unknown
https://github.com/urllib3/urllib3/issues/497
unknown
http://www.firmaprofesional.com/cps0
unknown
http://crl.securetrust.com/SGCA.crl0
unknown
http://crl.securetrust.com/STCA.crl0
unknown
http://yahoo.com/
unknown
https://estudosadulto.educacao.ws/deolane.mp4
http://www.iana.org/assignments/tls-parameters/tls-parameters.xml#tls-parameters-6
unknown
https://estudosadulto.educacao.ws/contador/contador.phpP
unknown
http://crl.thawte.com/ThawteTimestampingCA.crl0
unknown
https://w3c.github.io/html/sec-forms.html#multipart-form-data
unknown
http://www.quovadisglobal.com/cps0
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl
unknown
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1_der.crl0
unknown
https://mail.python.org/mailman/listinfo/cryptography-dev
unknown
https://requests.readthedocs.io
unknown
http://crl.securetrust.com/STCA.crlce
unknown
http://repository.swisssign.com/
unknown
http://python.org/dev/peps/pep-0263/
unknown
https://estudosadulto.educacao.ws/deolane.mp4C=N
unknown
http://crl.xrampsecurity.com/XGCA.crl
unknown
https://estudosadulto.educacao.ws/contador/contador.phpp
unknown
https://www.python.org
unknown
http://www.accv.es/legislacion_c.htm0U
unknown
http://ocsp.accv.es0
unknown
http://ocsp.thawte.com0
unknown
https://urllib3.readthedocs.io/en/1.26.x/advanced-usage.html#ssl-warnings
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
almeidadoprogresso.siteoficial.ws
45.89.247.53
malicious
estudosadulto.educacao.ws
94.156.67.32
malicious
www.google.com
172.217.18.4
pontoslivelobb.servicos.ws
191.252.83.191

IPs

IP
Domain
Country
Malicious
192.168.2.6
unknown
unknown
malicious
94.156.67.32
estudosadulto.educacao.ws
Bulgaria
malicious
45.89.247.53
almeidadoprogresso.siteoficial.ws
United Kingdom
malicious
172.217.18.4
www.google.com
United States
192.168.2.4
unknown
unknown
191.252.83.191
pontoslivelobb.servicos.ws
Brazil
239.255.255.250
unknown
Reserved

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Cached
{E88DCCE0-B7B3-11D1-A9F0-00AA0060FA31} {000214E6-0000-0000-C000-000000000046} 0xFFFF
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Discardable\PostSetup\Component Categories64\{56FFCC30-D398-11D0-B2AE-00A0C908FA49}\Enum
Implementing

Memdumps

Base Address
Regiontype
Protect
Malicious
25E7AF1D000
heap
page read and write
1E4F68BE000
heap
page read and write
1E4F61A0000
direct allocation
page read and write
258FED83000
heap
page read and write
2F615AC000
stack
page read and write
7FFDA55E9000
unkown
page readonly
18B96790000
heap
page read and write
18B96988000
heap
page read and write
258FED86000
heap
page read and write
18B9446F000
heap
page read and write
2F60DEC000
stack
page read and write
25E7C8B9000
heap
page read and write
1E4F66A5000
heap
page read and write
15670500000
heap
page read and write
23962D50000
heap
page read and write
844B9AC000
stack
page read and write
25E7C8B9000
heap
page read and write
7FF643AB0000
unkown
page readonly
25E7AF25000
heap
page read and write
7FF643AB0000
unkown
page readonly
25E7AF56000
heap
page read and write
23962D5C000
heap
page read and write
25E7C8B9000
heap
page read and write
7FFDAC066000
unkown
page readonly
14CAE213000
heap
page read and write
18B944A1000
heap
page read and write
258FED83000
heap
page read and write
25E7E970000
heap
page read and write
25E7E5B2000
heap
page read and write
25E7E954000
heap
page read and write
7FFDA3C29000
unkown
page readonly
25E7CE82000
heap
page read and write
14CAE150000
heap
page readonly
7FFDA5819000
unkown
page readonly
2892CD30000
heap
page read and write
15670550000
heap
page read and write
7FFDA5B95000
unkown
page read and write
2892CCD0000
heap
page read and write
25E7E3F4000
heap
page read and write
7FF7ADC5C000
unkown
page read and write
7FFDA5499000
unkown
page readonly
7FFDA5BB4000
unkown
page readonly
258FED8F000
heap
page read and write
14CAE220000
heap
page read and write
7FFDA557A000
unkown
page read and write
7FF643AF0000
unkown
page read and write
7FFDA5592000
unkown
page readonly
258FED83000
heap
page read and write
7FFDA54C5000
unkown
page readonly
1E4F5D0D000
heap
page read and write
1E4F6E30000
direct allocation
page read and write
25E7C8BA000
heap
page read and write
258FED86000
heap
page read and write
25E7AF2B000
heap
page read and write
258FED83000
heap
page read and write
25E7CE00000
remote allocation
page read and write
1E4F5CD1000
heap
page read and write
14CAE216000
heap
page read and write
7FFDA57FA000
unkown
page readonly
B6521FE000
stack
page read and write
18B96ECD000
heap
page read and write
1ABC06B0000
heap
page read and write
7FFDA39B2000
unkown
page readonly
258FED90000
heap
page read and write
18B96290000
direct allocation
page read and write
18B9445B000
heap
page read and write
B652AFB000
stack
page read and write
14CAE213000
heap
page read and write
18B94448000
heap
page read and write
7FFDA5490000
unkown
page readonly
258FED83000
heap
page read and write
7FFDA39AF000
unkown
page read and write
18B943D0000
heap
page read and write
14CAE221000
heap
page read and write
18B97200000
direct allocation
page read and write
25E7E8DF000
heap
page read and write
18B97660000
direct allocation
page read and write
18B972B0000
direct allocation
page read and write
18B97330000
direct allocation
page read and write
7FFDA5825000
unkown
page read and write
7FFDA3EB0000
unkown
page readonly
14CAE224000
heap
page read and write
7FF643AB1000
unkown
page execute read
7FFDA3851000
unkown
page execute read
14CAE224000
heap
page read and write
14CAE221000
heap
page read and write
25E7AEBF000
heap
page read and write
25E7E371000
heap
page read and write
25E7ED0C000
heap
page read and write
25E7DC00000
heap
page read and write
258FED83000
heap
page read and write
7FFDA3BF0000
unkown
page readonly
AAE69BE000
stack
page read and write
14CAE218000
heap
page read and write
18B97470000
direct allocation
page read and write
EB357FD000
stack
page read and write
7FFD93347000
unkown
page read and write
7FFDA3550000
unkown
page readonly
7FFDA4331000
unkown
page execute read
258FED86000
heap
page read and write
7FF643AB1000
unkown
page execute read
25E7CE30000
heap
page read and write
258FED83000
heap
page read and write
25E7AF40000
heap
page read and write
25E7E477000
heap
page read and write
258FED91000
heap
page read and write
18B96730000
direct allocation
page read and write
2892EA30000
heap
page read and write
25E7E90C000
heap
page read and write
14CAE213000
heap
page read and write
EB34F14000
stack
page read and write
1E4F68FB000
heap
page read and write
258FED83000
heap
page read and write
14CAE213000
heap
page read and write
258FED83000
heap
page read and write
25E7ED92000
heap
page read and write
25E7E3F4000
heap
page read and write
25E7E53E000
heap
page read and write
23962D81000
heap
page read and write
7FFDA4630000
unkown
page readonly
18B96A90000
direct allocation
page read and write
14CAE220000
heap
page read and write
25E7CEA6000
heap
page read and write
7FFDA386E000
unkown
page readonly
7FF7ADC11000
unkown
page execute read
1E4F6990000
direct allocation
page read and write
25E7EAFC000
heap
page read and write
25E7AE9E000
heap
page read and write
7FFDA54C0000
unkown
page readonly
18B971C0000
direct allocation
page read and write
25E7CE64000
heap
page read and write
25E7ED4F000
heap
page read and write
7FFD93469000
unkown
page read and write
25E7CE9F000
heap
page read and write
14CAE222000
heap
page read and write
14CAE215000
heap
page read and write
14CAE213000
heap
page read and write
258FED8A000
heap
page read and write
7FFD83385000
unkown
page execute read
AAE63E3000
stack
page read and write
1E4F3B27000
heap
page read and write
7FFDA5560000
unkown
page readonly
7FFD83140000
unkown
page readonly
18B96650000
direct allocation
page read and write
1E4F6838000
heap
page read and write
3A783BF000
stack
page read and write
18B9449B000
heap
page read and write
1E4F3B5B000
heap
page read and write
25E7EE20000
heap
page read and write
258FED91000
heap
page read and write
1E4F3B0F000
heap
page read and write
25E7DC07000
heap
page read and write
14CAE215000
heap
page read and write
25E7E906000
heap
page read and write
14CAE224000
heap
page read and write
2892CD5C000
heap
page read and write
25E7AE8C000
heap
page read and write
258FED93000
heap
page read and write
25E7E8CA000
heap
page read and write
14CAE224000
heap
page read and write
7FFD93352000
unkown
page readonly
7FFD83CFD000
unkown
page readonly
25E7E4FC000
heap
page read and write
18B94492000
heap
page read and write
1E4F3BB4000
heap
page read and write
258FED86000
heap
page read and write
14CAE224000
heap
page read and write
7FFDAC061000
unkown
page execute read
18B95E00000
heap
page read and write
EB356FE000
stack
page read and write
25E7EA78000
heap
page read and write
7FFDA55B1000
unkown
page execute read
1E4F3B68000
heap
page read and write
7FFD83031000
unkown
page execute read
7FFDA3FD0000
unkown
page readonly
25E7C8B4000
heap
page read and write
18B9449C000
heap
page read and write
14CAE213000
heap
page read and write
14CAE225000
heap
page read and write
7FFDA46D5000
unkown
page readonly
14CAE221000
heap
page read and write
EB35CFE000
stack
page read and write
14CAE215000
heap
page read and write
25E7EA78000
heap
page read and write
7FF643AB1000
unkown
page execute read
7FFD840F3000
unkown
page write copy
7FF7ADC11000
unkown
page execute read
B6522FE000
stack
page read and write
258FED91000
heap
page read and write
14CAE213000
heap
page read and write
14CAE213000
heap
page read and write
7FFDA46F2000
unkown
page readonly
1E4F5470000
heap
page read and write
7FFD83D19000
unkown
page readonly
7FFDA5B90000
unkown
page readonly
18B94472000
heap
page read and write
3A785AE000
stack
page read and write
1E4F6A80000
direct allocation
page read and write
25E7E8FF000
heap
page read and write
18B96C40000
direct allocation
page read and write
1E4F3B44000
heap
page read and write
1E4F5D34000
heap
page read and write
7FF643ADA000
unkown
page readonly
1E4F6510000
direct allocation
page read and write
18B9449C000
heap
page read and write
18B9444B000
heap
page read and write
18B962D0000
direct allocation
page read and write
2892CD49000
heap
page read and write
2F613BE000
stack
page read and write
844B7BF000
stack
page read and write
14CAE225000
heap
page read and write
18B966B0000
direct allocation
page read and write
258FED90000
heap
page read and write
258FED83000
heap
page read and write
7FFDA5BAE000
unkown
page readonly
2892CC60000
heap
page read and write
25E7AF23000
heap
page read and write
18B94467000
heap
page read and write
18B95E05000
heap
page read and write
25E7AE98000
heap
page read and write
7FFD831D0000
unkown
page execute read
25E7EABB000
heap
page read and write
1E4F5A90000
direct allocation
page read and write
7FFDA57F1000
unkown
page execute read
258FED83000
heap
page read and write
1E4F5F80000
heap
page read and write
25E7E636000
heap
page read and write
14CAE215000
heap
page read and write
14CAE213000
heap
page read and write
25E7EDD4000
heap
page read and write
2892CD89000
heap
page read and write
25E7EDD3000
heap
page read and write
18B96A50000
direct allocation
page read and write
25E7CEA2000
heap
page read and write
7FFD83141000
unkown
page execute read
258FED90000
heap
page read and write
258FED8A000
heap
page read and write
25E7E478000
heap
page read and write
14CAE213000
heap
page read and write
14CAE220000
heap
page read and write
1E4F3BA3000
heap
page read and write
14CAE190000
heap
page read and write
25E7AF18000
heap
page read and write
7FFDA4DA1000
unkown
page execute read
14CAFB20000
heap
page read and write
1E4F3B45000
heap
page read and write
25E7ED4E000
heap
page read and write
7FFDA55D4000
unkown
page readonly
7FFDA3880000
unkown
page readonly
25E7CE83000
heap
page read and write
23962F65000
heap
page read and write
2892CD2E000
heap
page read and write
14CAE220000
heap
page read and write
7FFD93360000
unkown
page readonly
258FED91000
heap
page read and write
14CAE216000
heap
page read and write
25E7B0D0000
heap
page read and write
18B96EE6000
heap
page read and write
258FED88000
heap
page read and write
2892EA30000
heap
page read and write
7FFDA55A0000
unkown
page readonly
18B965CD000
heap
page read and write
7FFDA5496000
unkown
page readonly
25E7EB80000
heap
page read and write
2892CF70000
heap
page read and write
EB355FE000
stack
page read and write
258FED83000
heap
page read and write
1E4F5D50000
direct allocation
page read and write
18B96FCD000
heap
page read and write
25E7AEC9000
heap
page read and write
25E7EA36000
heap
page read and write
258FED83000
heap
page read and write
18B94448000
heap
page read and write
14CAE215000
heap
page read and write
25E7E5F4000
heap
page read and write
14CAE225000
heap
page read and write
1E4F6C40000
direct allocation
page read and write
25E7E8CE000
heap
page read and write
15670810000
heap
page read and write
14CAE213000
heap
page read and write
14CAE221000
heap
page read and write
25E7CE64000
heap
page read and write
2892CD36000
heap
page read and write
14CAE220000
heap
page read and write
14CAE225000
heap
page read and write
18B967C1000
heap
page read and write
14CAE224000
heap
page read and write
1E4F5570000
direct allocation
page read and write
7FF7ADC11000
unkown
page execute read
25E7EDDA000
heap
page read and write
7FFDA3BF7000
unkown
page readonly
18B965B6000
heap
page read and write
2892EA2A000
heap
page read and write
14CAE221000
heap
page read and write
18B964D0000
heap
page read and write
7FFD8386A000
unkown
page read and write
18B96BA0000
direct allocation
page read and write
25E7AE8B000
heap
page read and write
1E4F5C51000
heap
page read and write
25E7CE00000
remote allocation
page read and write
7FFDAC145000
unkown
page readonly
18B94451000
heap
page read and write
25E7CEA7000
heap
page read and write
18B97130000
heap
page read and write
1E4F3B41000
heap
page read and write
25E7AF40000
heap
page read and write
7FFDA4636000
unkown
page readonly
1E4F3B88000
heap
page read and write
18B96610000
direct allocation
page read and write
AAE63EC000
stack
page read and write
7FFDA5547000
unkown
page readonly
7FFDAC144000
unkown
page read and write
18B966F0000
direct allocation
page read and write
25E7E8E8000
heap
page read and write
2892CD3F000
heap
page read and write
18B94448000
heap
page read and write
7FF643ADA000
unkown
page readonly
14CAE218000
heap
page read and write
18B9449B000
heap
page read and write
25E7DC10000
heap
page read and write
18B94495000
heap
page read and write
18B95CA0000
heap
page read and write
1E4F3B94000
heap
page read and write
25E7CEA2000
heap
page read and write
1E4F3B27000
heap
page read and write
18B964DD000
heap
page read and write
18B97074000
heap
page read and write
1E4F6D20000
direct allocation
page read and write
7FFD83479000
unkown
page readonly
15670805000
heap
page read and write
7FFDA38B0000
unkown
page readonly
14CAE1F0000
heap
page read and write
25E7E971000
heap
page read and write
1E4F5E80000
direct allocation
page read and write
2892EA21000
heap
page read and write
7FF643AED000
unkown
page read and write
7FF7ADC5E000
unkown
page readonly
7FFDAC122000
unkown
page readonly
1567055C000
heap
page read and write
14CAE216000
heap
page read and write
258FED91000
heap
page read and write
258FED91000
heap
page read and write
258FED83000
heap
page read and write
258FED90000
heap
page read and write
14CAE221000
heap
page read and write
258FED91000
heap
page read and write
258FED88000
heap
page read and write
258FED83000
heap
page read and write
18B96B60000
direct allocation
page read and write
14CAE224000
heap
page read and write
1E4F6956000
heap
page read and write
AAE6BAF000
stack
page read and write
25E7EDD2000
heap
page read and write
25E7EDE3000
heap
page read and write
14CAE224000
heap
page read and write
1E4F6825000
heap
page read and write
1E4F3B38000
heap
page read and write
258FED91000
heap
page read and write
14CAE224000
heap
page read and write
18B973F0000
direct allocation
page read and write
14CAE221000
heap
page read and write
1E4F3B44000
heap
page read and write
2892CD21000
heap
page read and write
18B94464000
heap
page read and write
7FFDA5826000
unkown
page readonly
2892CD5C000
heap
page read and write
7FFDAC130000
unkown
page readonly
7FFDA3BFF000
unkown
page readonly
2892CD57000
heap
page read and write
1E4F3AB0000
heap
page read and write
1E4F6B40000
direct allocation
page read and write
1E4F6DE0000
direct allocation
page read and write
25E7EDEC000
heap
page read and write
7FFDA4330000
unkown
page readonly
258FED86000
heap
page read and write
7FFD83409000
unkown
page readonly
258FED83000
heap
page read and write
1E4F3B38000
heap
page read and write
1E4F6160000
direct allocation
page read and write
1E4F3B88000
heap
page read and write
1E4F6C00000
direct allocation
page read and write
7FFD830DB000
unkown
page readonly
25E7C8BA000
heap
page read and write
14CAE221000
heap
page read and write
25E7E8DF000
heap
page read and write
25E7AF46000
heap
page read and write
258FED8B000
heap
page read and write
7FF7ADC3A000
unkown
page readonly
2892CD32000
heap
page read and write
14CAE224000
heap
page read and write
25E7EA37000
heap
page read and write
7FF643AED000
unkown
page read and write
2892EA26000
heap
page read and write
25E7AF56000
heap
page read and write
1E4F5C66000
heap
page read and write
14CAE215000
heap
page read and write
258FED83000
heap
page read and write
7FFDA5473000
unkown
page read and write
25E7DAF0000
heap
page read and write
7FFDA3974000
unkown
page readonly
25E7E780000
heap
page read and write
7FFD838C1000
unkown
page execute read
7FFD9340B000
unkown
page readonly
EB353FE000
stack
page read and write
25E7CE16000
heap
page read and write
18B96F6C000
heap
page read and write
14CAE221000
heap
page read and write
25E7CA40000
heap
page read and write
1E4F6A80000
direct allocation
page read and write
25E7AF52000
heap
page read and write
25E7ED90000
heap
page read and write
18B9446F000
heap
page read and write
14CAE213000
heap
page read and write
258FED83000
heap
page read and write
25E7C8DA000
heap
page read and write
14CAE224000
heap
page read and write
2892CD5C000
heap
page read and write
7FFD831CA000
unkown
page execute read
258FED86000
heap
page read and write
14CAE1FF000
heap
page read and write
1E4F3AC0000
heap
page read and write
18B9444B000
heap
page read and write
258FED93000
heap
page read and write
25E7E6FC000
heap
page read and write
7FFDA3FD1000
unkown
page execute read
EB35BFB000
stack
page read and write
63D5BFF000
stack
page read and write
7FFDA5531000
unkown
page execute read
1E4F5DD0000
direct allocation
page read and write
7FF643AB0000
unkown
page readonly
258FED83000
heap
page read and write
258FED8A000
heap
page read and write
1E4F5C50000
heap
page read and write
25E7C8B1000
heap
page read and write
14CAE213000
heap
page read and write
7FFD83CCE000
unkown
page readonly
258FED91000
heap
page read and write
18B94464000
heap
page read and write
25E7DC11000
heap
page read and write
7FFDAC10D000
unkown
page readonly
7FFD83CF5000
unkown
page read and write
2892EA20000
heap
page read and write
1E4F6DE0000
direct allocation
page read and write
25E7ECCB000
heap
page read and write
18B96D80000
heap
page read and write
14CAE213000
heap
page read and write
7FFD84137000
unkown
page readonly
7FF7ADC3A000
unkown
page readonly
7FFDA55F3000
unkown
page readonly
18B94467000
heap
page read and write
258FED83000
heap
page read and write
1E4F3B5B000
heap
page read and write
25E7C8D8000
heap
page read and write
14CAE222000
heap
page read and write
25E7E9B2000
heap
page read and write
25E7E73E000
heap
page read and write
25E7EBC3000
heap
page read and write
7FFDAC109000
unkown
page read and write
18B96CC0000
direct allocation
page read and write
7FFDA54C4000
unkown
page read and write
7FFD83C83000
unkown
page readonly
2892CD49000
heap
page read and write
258FED85000
heap
page read and write
2892CCD9000
heap
page read and write
7FFDA5BA1000
unkown
page execute read
18B943EE000
heap
page read and write
7FFDA4633000
unkown
page readonly
14CAE213000
heap
page read and write
258FED83000
heap
page read and write
258FED90000
heap
page read and write
25E7CE38000
heap
page read and write
18B9449B000
heap
page read and write
14CAE224000
heap
page read and write
1E4F3B5C000
heap
page read and write
12F9CFF000
stack
page read and write
25E7E478000
heap
page read and write
2892CD2F000
heap
page read and write
25E7EDED000
heap
page read and write
25E7AE60000
heap
page read and write
7FF7ADC5C000
unkown
page read and write
7FFDA5594000
unkown
page readonly
7FFD83D30000
unkown
page readonly
18B94495000
heap
page read and write
25E7E954000
heap
page read and write
844B1D6000
stack
page read and write
7FFDA3EB9000
unkown
page read and write
7FFDA581D000
unkown
page readonly
258FED86000
heap
page read and write
25E7C8D3000
heap
page read and write
7FFDA4339000
unkown
page readonly
258FED83000
heap
page read and write
14CAE221000
heap
page read and write
25E7E919000
heap
page read and write
7FFD838C0000
unkown
page readonly
14CAE221000
heap
page read and write
2892CDB1000
heap
page read and write
25E7C8C0000
heap
page read and write
25E7E8FF000
heap
page read and write
2892CD89000
heap
page read and write
25E7ED9D000
heap
page read and write
258FED86000
heap
page read and write
7FFDA5BA0000
unkown
page readonly
25E7AF2B000
heap
page read and write
1E4F3BB1000
heap
page read and write
25E7EB80000
heap
page read and write
18B9444B000
heap
page read and write
25E7E846000
heap
page read and write
25E7C8D8000
heap
page read and write
25E7E478000
heap
page read and write
7FFD932B1000
unkown
page execute read
14CAE222000
heap
page read and write
1E4F3B41000
heap
page read and write
25E7CE80000
heap
page read and write
7FFD83A45000
unkown
page execute read
14CAE220000
heap
page read and write
1E4F6B80000
direct allocation
page read and write
18B94467000
heap
page read and write
1E4F6DA0000
direct allocation
page read and write
844B1EC000
stack
page read and write
25E7EDF0000
heap
page read and write
258FED8A000
heap
page read and write
14CAE213000
heap
page read and write
1E4F5F6A000
heap
page read and write
258FED91000
heap
page read and write
258FED91000
heap
page read and write
258FED91000
heap
page read and write
14CAE224000
heap
page read and write
7FFD83387000
unkown
page readonly
25E7E942000
heap
page read and write
1E4F62A0000
direct allocation
page read and write
14CAE215000
heap
page read and write
25E7AEBE000
heap
page read and write
14CAE213000
heap
page read and write
14CAE221000
heap
page read and write
1E4F6C90000
direct allocation
page read and write
14CAE213000
heap
page read and write
7FFD831DD000
unkown
page execute read
7FFDA3850000
unkown
page readonly
25E7EC46000
heap
page read and write
14CAE213000
heap
page read and write
14CAE160000
heap
page read and write
258FED83000
heap
page read and write
1E4F3B33000
heap
page read and write
18B94437000
heap
page read and write
258FED83000
heap
page read and write
14CAE213000
heap
page read and write
258FED91000
heap
page read and write
1E4F54B0000
direct allocation
page read and write
25E7ED90000
heap
page read and write
25E7C8D8000
heap
page read and write
3A77DE3000
stack
page read and write
7FFDA46DA000
unkown
page readonly
14CAE213000
heap
page read and write
7FFDAC140000
unkown
page readonly
1E4F6C40000
direct allocation
page read and write
25E7C8C3000
heap
page read and write
18B944A8000
heap
page read and write
1E4F3B88000
heap
page read and write
25E7EDE0000
heap
page read and write
25E7CE87000
heap
page read and write
25E7E437000
heap
page read and write
25E7E8CE000
heap
page read and write
25E7B0DA000
heap
page read and write
14CAE213000
heap
page read and write
2892EA2A000
heap
page read and write
7FF7ADC4D000
unkown
page read and write
7FFD93465000
unkown
page readonly
7FFDA546E000
unkown
page readonly
25E7AF40000
heap
page read and write
25E7E436000
heap
page read and write
18B943D8000
heap
page read and write
18B973B0000
direct allocation
page read and write
25E7AE97000
heap
page read and write
3A77DEC000
stack
page read and write
7FFD93407000
unkown
page readonly
14CAE222000
heap
page read and write
25E7AEC5000
heap
page read and write
7FFD839BF000
unkown
page read and write
7FFD8370C000
unkown
page readonly
14CAE215000
heap
page read and write
25E7E947000
heap
page read and write
7FFDA5800000
unkown
page readonly
7FFD8314D000
unkown
page execute read
18B944AF000
heap
page read and write
2892CC80000
heap
page read and write
18B96490000
direct allocation
page read and write
25E7C8C0000
heap
page read and write
258FED6F000
heap
page read and write
14CAE225000
heap
page read and write
258FED91000
heap
page read and write
B6524FE000
stack
page read and write
18B97550000
direct allocation
page read and write
18B969D0000
direct allocation
page read and write
7FFD83135000
unkown
page readonly
258FED91000
heap
page read and write
25E7E370000
heap
page read and write
25E7E954000
heap
page read and write
1E4F55C5000
heap
page read and write
25E7ED0C000
heap
page read and write
18B972B0000
direct allocation
page read and write
258FED90000
heap
page read and write
1E4F668C000
heap
page read and write
25E7E9F4000
heap
page read and write
7FFD83A7D000
unkown
page execute read
25E7E846000
heap
page read and write
14CAE213000
heap
page read and write
258FED00000
heap
page read and write
7FFDA5B91000
unkown
page execute read
7FF7ADC10000
unkown
page readonly
18B96610000
direct allocation
page read and write
14CAE213000
heap
page read and write
1E4F6260000
direct allocation
page read and write
1E4F3B33000
heap
page read and write
14CAE225000
heap
page read and write
7FFDAC131000
unkown
page execute read
258FF3E0000
heap
page read and write
14CAE213000
heap
page read and write
18B97200000
direct allocation
page read and write
18B9445C000
heap
page read and write
B6529FE000
stack
page read and write
1E4F6C40000
direct allocation
page read and write
7FFD839E0000
unkown
page readonly
1E4F3B45000
heap
page read and write
7FFD83A70000
unkown
page execute read
1E4F55C0000
heap
page read and write
1E4F3B45000
heap
page read and write
7FFD839E1000
unkown
page execute read
258FED83000
heap
page read and write
7FF643AFE000
unkown
page readonly
25E7AEB9000
heap
page read and write
25E7EB3E000
heap
page read and write
25E7CE37000
heap
page read and write
7FFD83D1D000
unkown
page readonly
25E7E7C2000
heap
page read and write
EB352FE000
stack
page read and write
25E7EBC2000
heap
page read and write
18B97180000
direct allocation
page read and write
258FED86000
heap
page read and write
18B96798000
heap
page read and write
7FFDA3FD2000
unkown
page readonly
7FFD8386F000
unkown
page read and write
25E7EE24000
heap
page read and write
1E4F3B38000
heap
page read and write
25E7EDDB000
heap
page read and write
25E7E95D000
heap
page read and write
7FFD8371E000
unkown
page readonly
7FFDA5BB3000
unkown
page read and write
7FFDA38A3000
unkown
page read and write
1E4F5C51000
heap
page read and write
7FFDA55A6000
unkown
page readonly
7FFDA5561000
unkown
page execute read
2892EA23000
heap
page read and write
258FED90000
heap
page read and write
7FFDA55D3000
unkown
page read and write
7FFDA46D1000
unkown
page execute read
25E7EE23000
heap
page read and write
1E4F3B41000
heap
page read and write
18B965C9000
heap
page read and write
1E4F3B81000
heap
page read and write
25E7C8B0000
heap
page read and write
7FFDA386A000
unkown
page read and write
7FFDAC069000
unkown
page readonly
18B96BA0000
direct allocation
page read and write
25E7E3B2000
heap
page read and write
1ABC06EC000
heap
page read and write
1E4F6330000
direct allocation
page read and write
1E4F3C90000
heap
page readonly
7FFDA4343000
unkown
page readonly
258FED83000
heap
page read and write
14CAE213000
heap
page read and write
7FFD83FAC000
unkown
page readonly
7FFD83CA9000
unkown
page readonly
258FED7E000
heap
page read and write
14CAE221000
heap
page read and write
7FFD830E0000
unkown
page readonly
25E7DC02000
heap
page read and write
25E7EDF3000
heap
page read and write
2892CD89000
heap
page read and write
1E4F6450000
direct allocation
page read and write
7FFD83139000
unkown
page read and write
25E7E8CA000
heap
page read and write
25E7E8E9000
heap
page read and write
7FFDA4341000
unkown
page read and write
258FED91000
heap
page read and write
2F6179F000
stack
page read and write
7FFD83491000
unkown
page execute read
1E4F69D0000
direct allocation
page read and write
7FFD8308C000
unkown
page readonly
25E7E8FF000
heap
page read and write
258FED83000
heap
page read and write
258FED83000
heap
page read and write
25E7EC88000
heap
page read and write
7FFDA5522000
unkown
page readonly
1E4F3B38000
heap
page read and write
25E7EB3F000
heap
page read and write
7FFDA553A000
unkown
page readonly
1E4F5DD0000
direct allocation
page read and write
258FED91000
heap
page read and write
1E4F3B99000
heap
page read and write
25E7DC06000
heap
page read and write
14CAE213000
heap
page read and write
844BD8F000
stack
page read and write
25E7D9EF000
heap
page read and write
25E7E9F4000
heap
page read and write
18B96610000
direct allocation
page read and write
14CAE215000
heap
page read and write
25E7E8E5000
heap
page read and write
25E7E6BA000
heap
page read and write
2892CD28000
heap
page read and write
7FFDA46D9000
unkown
page read and write
7FFD93324000
unkown
page readonly
14CAE221000
heap
page read and write
18B96BA0000
direct allocation
page read and write
258FED86000
heap
page read and write
14CAE221000
heap
page read and write
EB358FE000
stack
page read and write
18B970E8000
heap
page read and write
14CAE224000
heap
page read and write
258FED93000
heap
page read and write
25E7E480000
heap
page read and write
1E4F3B27000
heap
page read and write
7FFD8313B000
unkown
page readonly
14CAE213000
heap
page read and write
7FFDA55A3000
unkown
page readonly
14CAE215000
heap
page read and write
7FFDA55F1000
unkown
page read and write
25E7CEA2000
heap
page read and write
7FFD84024000
unkown
page readonly
258FED91000
heap
page read and write
7FFDAC102000
unkown
page readonly
14CAE222000
heap
page read and write
7FFDA4635000
unkown
page read and write
25E7E6BA000
heap
page read and write
7FFDA4DA6000
unkown
page readonly
18B94451000
heap
page read and write
25E7E888000
heap
page read and write
258FED83000
heap
page read and write
7FFD831B9000
unkown
page execute read
7FFDA57F0000
unkown
page readonly
258FED90000
heap
page read and write
258FED86000
heap
page read and write
7FFDA5460000
unkown
page readonly
7FF7ADC4D000
unkown
page write copy
7FFD83C52000
unkown
page readonly
B6525FE000
stack
page read and write
1E4F6691000
heap
page read and write
7FFD9334C000
unkown
page readonly
18B96610000
direct allocation
page read and write
1E4F3B0F000
heap
page read and write
258FED83000
heap
page read and write
25E7ED9D000
heap
page read and write
14CAE221000
heap
page read and write
14CAE221000
heap
page read and write
1E4F6590000
heap
page read and write
1E4F3BA5000
heap
page read and write
1ABC07E0000
heap
page read and write
14CAE221000
heap
page read and write
7FF7ADC3A000
unkown
page readonly
7FFDA4DA3000
unkown
page readonly
258FED83000
heap
page read and write
25E7D03C000
heap
page read and write
1E4F68C4000
heap
page read and write
844BB9E000
stack
page read and write
7FFD83C25000
unkown
page execute read
18B97430000
direct allocation
page read and write
1E4F3B88000
heap
page read and write
258FED83000
heap
page read and write
18B9444A000
heap
page read and write
258FED83000
heap
page read and write
18B9446F000
heap
page read and write
7FFDA4DA0000
unkown
page readonly
18B94495000
heap
page read and write
25E7E942000
heap
page read and write
14CAE220000
heap
page read and write
1E4F3B88000
heap
page read and write
25E7EC88000
heap
page read and write
7FFDA35C4000
unkown
page readonly
B6528FE000
stack
page read and write
25E7EDE5000
heap
page read and write
1E4F5EC0000
direct allocation
page read and write
18B96D00000
direct allocation
page read and write
18B94451000
heap
page read and write
14CAE213000
heap
page read and write
25E7AEAE000
heap
page read and write
25E7E8E4000
heap
page read and write
7FFDA3881000
unkown
page execute read
14CAE218000
heap
page read and write
7FFD8342E000
unkown
page readonly
7FFDA5520000
unkown
page readonly
258FED90000
heap
page read and write
7FFDAC060000
unkown
page readonly
7FFDA554C000
unkown
page read and write
25E7C8B6000
heap
page read and write
7FFD932B0000
unkown
page readonly
14CAE220000
heap
page read and write
2892CCFF000
heap
page read and write
25E7AD60000
heap
page read and write
14CAE213000
heap
page read and write
7FFDA3EB5000
unkown
page readonly
258FED91000
heap
page read and write
7FFD93410000
unkown
page readonly
258FED83000
heap
page read and write
14CAE213000
heap
page read and write
7FFD8345D000
unkown
page readonly
14CAE225000
heap
page read and write
1E4F3B41000
heap
page read and write
18B96928000
heap
page read and write
25E7E9B3000
heap
page read and write
18B97370000
direct allocation
page read and write
18B95D60000
direct allocation
page read and write
18B94464000
heap
page read and write
25E7AEB8000
heap
page read and write
18B944C9000
heap
page read and write
1E4F6919000
heap
page read and write
7FFDA38A4000
unkown
page readonly
25E7AF18000
heap
page read and write
25E7EDE3000
heap
page read and write
18B94448000
heap
page read and write
258FED86000
heap
page read and write
18B96990000
direct allocation
page read and write
7FF643AB1000
unkown
page execute read
1E4F6220000
direct allocation
page read and write
7FF643AFC000
unkown
page read and write
25E7EABA000
heap
page read and write
7FFD83030000
unkown
page readonly
1E4F6E70000
direct allocation
page read and write
7FFD83CFB000
unkown
page read and write
14CAE213000
heap
page read and write
18B96F8B000
heap
page read and write
1E4F3CA0000
heap
page read and write
1E4F3B38000
heap
page read and write
7FFD93322000
unkown
page execute read
2892CD49000
heap
page read and write
258FED68000
heap
page read and write
7FFDA5491000
unkown
page execute read
25E7EC04000
heap
page read and write
18B94495000
heap
page read and write
25E7ED92000
heap
page read and write
7FFDA55BD000
unkown
page readonly
14CAE221000
heap
page read and write
1E4F5A50000
direct allocation
page read and write
7FFD83FBE000
unkown
page readonly
1E4F3BA2000
heap
page read and write
1E4F3B3A000
heap
page read and write
14CAE218000
heap
page read and write
14CAE213000
heap
page read and write
18B96BA0000
direct allocation
page read and write
18B94448000
heap
page read and write
14CAE213000
heap
page read and write
14CAE221000
heap
page read and write
2892CD40000
heap
page read and write
2892CD57000
heap
page read and write
1E4F5D40000
heap
page read and write
25E7C8BA000
heap
page read and write
25E7C8B3000
heap
page read and write
1E4F613C000
heap
page read and write
18B96BA0000
direct allocation
page read and write
18B96610000
direct allocation
page read and write
1E4F3B41000
heap
page read and write
258FED86000
heap
page read and write
14CAE213000
heap
page read and write
25E7E95A000
heap
page read and write
23962D30000
heap
page read and write
7FF7ADC5E000
unkown
page readonly
14CAE220000
heap
page read and write
25E7E5F5000
heap
page read and write
18B96D40000
direct allocation
page read and write
14CAE215000
heap
page read and write
14CAE070000
heap
page read and write
7FFD83784000
unkown
page readonly
25E7AEBF000
heap
page read and write
7FFDA389E000
unkown
page write copy
18B96BA0000
direct allocation
page read and write
25E7CA44000
heap
page read and write
7FFDA3BFC000
unkown
page read and write
14CAE215000
heap
page read and write
18B95CE0000
direct allocation
page read and write
258FED86000
heap
page read and write
7FFD83853000
unkown
page write copy
7FFDA4631000
unkown
page execute read
15670530000
heap
page read and write
258FED90000
heap
page read and write
2892CF7A000
heap
page read and write
18B94451000
heap
page read and write
14CAE215000
heap
page read and write
2F6198F000
stack
page read and write
1E4F3B27000
heap
page read and write
1E4F3B38000
heap
page read and write
7FFDA3EBA000
unkown
page readonly
1E4F6013000
heap
page read and write
2892CB80000
heap
page read and write
25E7E73E000
heap
page read and write
7FFDA3C11000
unkown
page execute read
1E4F3B8E000
heap
page read and write
258FED91000
heap
page read and write
258FED83000
heap
page read and write
18B96BA0000
direct allocation
page read and write
25E7AE9F000
heap
page read and write
258FED86000
heap
page read and write
18B9446F000
heap
page read and write
1E4F6C00000
direct allocation
page read and write
14CAE218000
heap
page read and write
14CAE213000
heap
page read and write
14CAE218000
heap
page read and write
1E4F5C10000
direct allocation
page read and write
25E7EDEC000
heap
page read and write
14CAE21C000
heap
page read and write
1E4F62E0000
direct allocation
page read and write
14CAE213000
heap
page read and write
25E7E4BA000
heap
page read and write
7FFDA388D000
unkown
page readonly
1E4F5E20000
direct allocation
page read and write
1E4F6AC0000
direct allocation
page read and write
79E9AFB000
stack
page read and write
1ABC0800000
heap
page read and write
1E4F5DD0000
direct allocation
page read and write
258FED83000
heap
page read and write
25E7E8CA000
heap
page read and write
7FFDA54C7000
unkown
page readonly
25E01260000
trusted library allocation
page read and write
258FED86000
heap
page read and write
1E4F3B8E000
heap
page read and write
7FFD831A5000
unkown
page execute read
1E4F6550000
direct allocation
page read and write
14CAE222000
heap
page read and write
25E7E90D000
heap
page read and write
18B94451000
heap
page read and write
25E7CE00000
remote allocation
page read and write
1E4F3B41000
heap
page read and write
25E7E955000
heap
page read and write
7FFDA5B96000
unkown
page readonly
18B969D0000
direct allocation
page read and write
7FFD83C27000
unkown
page readonly
25E7CE9E000
heap
page read and write
7FFDA5539000
unkown
page read and write
25E7E8DF000
heap
page read and write
18B95DA0000
direct allocation
page read and write
2892CD57000
heap
page read and write
258FED83000
heap
page read and write
14CAE1F8000
heap
page read and write
18B96B10000
direct allocation
page read and write
7FFDA57F9000
unkown
page read and write
258FED91000
heap
page read and write
7FFD933BC000
unkown
page readonly
14CAE213000
heap
page read and write
7FF7ADC3A000
unkown
page readonly
1E4F5D50000
direct allocation
page read and write
14CAE220000
heap
page read and write
25E7EE22000
heap
page read and write
25E7AEB8000
heap
page read and write
14CAE213000
heap
page read and write
2892CD49000
heap
page read and write
258FED91000
heap
page read and write
18B96450000
direct allocation
page read and write
1E4F54F0000
direct allocation
page read and write
7FFDA4DA5000
unkown
page read and write
18B96BA0000
direct allocation
page read and write
14CAE216000
heap
page read and write
18B94464000
heap
page read and write
14CAE224000
heap
page read and write
258FED86000
heap
page read and write
7FFDA3C2D000
unkown
page readonly
258FED91000
heap
page read and write
7FFDA3C35000
unkown
page read and write
1E4F3B38000
heap
page read and write
7FFD839C2000
unkown
page readonly
25E7AEB1000
heap
page read and write
63D572C000
stack
page read and write
7FFDA5B93000
unkown
page readonly
3A77DEA000
stack
page read and write
7FFD83691000
unkown
page readonly
1E4F5F91000
heap
page read and write
7FFD83036000
unkown
page readonly
25E7EDD4000
heap
page read and write
14CAE213000
heap
page read and write
25E7E8E4000
heap
page read and write
258FED83000
heap
page read and write
1E4F3B94000
heap
page read and write
23962D20000
heap
page read and write
258FED83000
heap
page read and write
258FED83000
heap
page read and write
14CAE221000
heap
page read and write
25E7C8D8000
heap
page read and write
1E4F61A0000
direct allocation
page read and write
258FED83000
heap
page read and write
7FFDA46E1000
unkown
page execute read
25E7C8DA000
heap
page read and write
258FED86000
heap
page read and write
18B96BF0000
direct allocation
page read and write
25E7E805000
heap
page read and write
25E7EAFC000
heap
page read and write
14CAE224000
heap
page read and write
25E7E93E000
heap
page read and write
18B942E0000
heap
page read and write
7FFDA5474000
unkown
page readonly
25E7EC04000
heap
page read and write
7FFDA3BF1000
unkown
page execute read
1E4F5F00000
direct allocation
page read and write
25E7AECB000
heap
page read and write
EB35AFB000
stack
page read and write
1E4F3B88000
heap
page read and write
14CAE213000
heap
page read and write
23962F20000
heap
page read and write
7FF643ADA000
unkown
page readonly
7FFD839ED000
unkown
page execute read
25E7CE98000
heap
page read and write
25E7E8E8000
heap
page read and write
25E7ED0C000
heap
page read and write
79E9BFF000
unkown
page read and write
258FED91000
heap
page read and write
25E7EDEB000
heap
page read and write
258FED91000
heap
page read and write
18B944C9000
heap
page read and write
25E7E8FF000
heap
page read and write
7FFDA46D0000
unkown
page readonly
2892CD5C000
heap
page read and write
258FED91000
heap
page read and write
2892CD36000
heap
page read and write
7FFDA35F2000
unkown
page readonly
14CAE213000
heap
page read and write
18B94462000
heap
page read and write
7FFD8345B000
unkown
page read and write
18B944BE000
heap
page read and write
14CAE220000
heap
page read and write
14CAE213000
heap
page read and write
7FFDA5535000
unkown
page readonly
7FF7ADC4D000
unkown
page write copy
18B96AD0000
direct allocation
page read and write
7FFDA54B1000
unkown
page execute read
7FFDA5590000
unkown
page readonly
258FED60000
heap
page read and write
7FFDA5540000
unkown
page readonly
1E4F6DE0000
direct allocation
page read and write
14CAE218000
heap
page read and write
12F9AFC000
stack
page read and write
7FFDA5801000
unkown
page execute read
258FED83000
heap
page read and write
14CAE225000
heap
page read and write
15670510000
heap
page read and write
18B94467000
heap
page read and write
258FED83000
heap
page read and write
25E7CEA7000
heap
page read and write
25E7E804000
heap
page read and write
7FFDA57F5000
unkown
page readonly
2892CD57000
heap
page read and write
18B97610000
direct allocation
page read and write
23962F60000
heap
page read and write
18B944B1000
heap
page read and write
1E4F3B5C000
heap
page read and write
1E4F3B3A000
heap
page read and write
18B97500000
direct allocation
page read and write
1E4F6093000
heap
page read and write
14CAE213000
heap
page read and write
14CAE215000
heap
page read and write
18B944D0000
heap
page read and write
258FED8A000
heap
page read and write
18B96C80000
direct allocation
page read and write
18B97240000
direct allocation
page read and write
14CAE221000
heap
page read and write
14CAE213000
heap
page read and write
1E4F6952000
heap
page read and write
258FED91000
heap
page read and write
14CAE220000
heap
page read and write
7FFD8410A000
unkown
page read and write
1E4F3B56000
heap
page read and write
258FED83000
heap
page read and write
14CAE224000
heap
page read and write
25E7CEA7000
heap
page read and write
25E7E6FD000
heap
page read and write
25E7C8B5000
heap
page read and write
25E7E5B2000
heap
page read and write
14CAE221000
heap
page read and write
1E4F67DB000
heap
page read and write
1E4F5DD0000
direct allocation
page read and write
258FED83000
heap
page read and write
14CAE213000
heap
page read and write
7FF7ADC10000
unkown
page readonly
18B9446F000
heap
page read and write
18B94437000
heap
page read and write
25E7ECCA000
heap
page read and write
258FED83000
heap
page read and write
7FFD83F31000
unkown
page readonly
258FED8F000
heap
page read and write
18B94451000
heap
page read and write
7FFDA3864000
unkown
page readonly
18B96575000
heap
page read and write
14CAE221000
heap
page read and write
18B9446F000
heap
page read and write
14CAE224000
heap
page read and write
25E7AE91000
heap
page read and write
25E7AF52000
heap
page read and write
1E4F5FF7000
heap
page read and write
7FF643AFE000
unkown
page readonly
25E7E942000
heap
page read and write
25E7C8B3000
heap
page read and write
258FED83000
heap
page read and write
25E7EC88000
heap
page read and write
18B9446A000
heap
page read and write
14CAE224000
heap
page read and write
7FF643AFE000
unkown
page readonly
7FFDA3C10000
unkown
page readonly
1E4F5CF9000
heap
page read and write
7FFDA389D000
unkown
page read and write
25E7E930000
heap
page read and write
18B94437000
heap
page read and write
25E7AF18000
heap
page read and write
7FFD830D7000
unkown
page readonly
258FED83000
heap
page read and write
25E7AEBB000
heap
page read and write
25E7E9F4000
heap
page read and write
14CAE213000
heap
page read and write
258FED90000
heap
page read and write
25E7AE90000
heap
page read and write
7FFDA54B0000
unkown
page readonly
7FFDA5541000
unkown
page execute read
15670800000
heap
page read and write
14CAE222000
heap
page read and write
7FFD833E3000
unkown
page readonly
14CAE221000
heap
page read and write
7FFDAC0F1000
unkown
page execute read
14CAE221000
heap
page read and write
18B975D0000
direct allocation
page read and write
25E7CEA7000
heap
page read and write
1E4F61A0000
direct allocation
page read and write
18B9444A000
heap
page read and write
7FF643AFE000
unkown
page readonly
258FED83000
heap
page read and write
18B94462000
heap
page read and write
18B95D20000
direct allocation
page read and write
1E4F5CDB000
heap
page read and write
258FED83000
heap
page read and write
18B96A10000
direct allocation
page read and write
7FFDA55E1000
unkown
page execute read
7FFD83455000
unkown
page read and write
18B94462000
heap
page read and write
25E7E889000
heap
page read and write
7FFD93361000
unkown
page execute read
14CAE220000
heap
page read and write
7FFD8410F000
unkown
page read and write
14CAE221000
heap
page read and write
7FFD93366000
unkown
page readonly
25E7E8FF000
heap
page read and write
7FFDA38B1000
unkown
page execute read
1E4F6013000
heap
page read and write
14CAE221000
heap
page read and write
7FF7ADC4D000
unkown
page read and write
258FECC0000
heap
page readonly
7FFDA3C36000
unkown
page readonly
1E4F5FD5000
heap
page read and write
25E7B0DB000
heap
page read and write
7FF643AED000
unkown
page write copy
14CAE224000
heap
page read and write
18B94495000
heap
page read and write
7FFDA55A1000
unkown
page execute read
1E4F5DD0000
direct allocation
page read and write
1E4F6DEE000
heap
page read and write
25E7E948000
heap
page read and write
25E7E942000
heap
page read and write
1E4F3B45000
heap
page read and write
7FFD9346B000
unkown
page readonly
1E4F5CF0000
heap
page read and write
7FFDAC120000
unkown
page readonly
18B944A8000
heap
page read and write
25E7C8BA000
heap
page read and write
14CAE213000
heap
page read and write
7FFDA55CE000
unkown
page write copy
25E7E678000
heap
page read and write
14CAE218000
heap
page read and write
18B974C0000
direct allocation
page read and write
1E4F6E30000
direct allocation
page read and write
2892CD00000
heap
page read and write
7FF7ADC50000
unkown
page read and write
1E4F3AE0000
heap
page read and write
2892CF7B000
heap
page read and write
1E4F5530000
direct allocation
page read and write
25E7B0D5000
heap
page read and write
14CAE216000
heap
page read and write
1ABC05D0000
heap
page read and write
EB359FC000
stack
page read and write
18B967B0000
heap
page read and write
18B94495000
heap
page read and write
18B96BA0000
direct allocation
page read and write
25E7EE14000
heap
page read and write
7FFDA5574000
unkown
page readonly
63D5AFF000
unkown
page read and write
2892CD8B000
heap
page read and write
18B97590000
direct allocation
page read and write
18B94437000
heap
page read and write
25E7EC47000
heap
page read and write
7FFD84000000
unkown
page readonly
7FFD833B2000
unkown
page readonly
25E7EA78000
heap
page read and write
14CAE221000
heap
page read and write
12F9BFF000
unkown
page read and write
1E4F5D90000
direct allocation
page read and write
1E4F6370000
direct allocation
page read and write
25E7AE9C000
heap
page read and write
1E4F6BC0000
direct allocation
page read and write
7FFDA554F000
unkown
page readonly
7FFD83984000
unkown
page readonly
1E4F5F60000
heap
page read and write
7FF643AB0000
unkown
page readonly
B6527FE000
stack
page read and write
7FFD83490000
unkown
page readonly
1E4F3B27000
heap
page read and write
14CAE213000
heap
page read and write
258FED83000
heap
page read and write
14CAE221000
heap
page read and write
14CAE213000
heap
page read and write
7FFD83A59000
unkown
page execute read
1E4F61E0000
direct allocation
page read and write
7FFDA55CD000
unkown
page read and write
7FFD83897000
unkown
page readonly
25E7AEBB000
heap
page read and write
18B944B1000
heap
page read and write
18B97127000
heap
page read and write
14CAE21C000
heap
page read and write
1ABC06E0000
heap
page read and write
7FFDA3551000
unkown
page execute read
25E7E570000
heap
page read and write
1E4F3B45000
heap
page read and write
25E7C8D3000
heap
page read and write
7FFDA3EB1000
unkown
page execute read
1E4F686C000
heap
page read and write
25E7EDED000
heap
page read and write
18B97471000
direct allocation
page read and write
1ABC06C0000
heap
page read and write
258FED86000
heap
page read and write
1E4F3BA3000
heap
page read and write
14CAE213000
heap
page read and write
7FF7ADC5E000
unkown
page readonly
258FED83000
heap
page read and write
7FF7ADC5E000
unkown
page readonly
25E7B0D8000
heap
page read and write
18B968D2000
heap
page read and write
258FED92000
heap
page read and write
7FFDA35F9000
unkown
page readonly
7FFDA5461000
unkown
page execute read
1ABC06B5000
heap
page read and write
2F60DD7000
stack
page read and write
25E7CEA2000
heap
page read and write
258FED83000
heap
page read and write
25E7AF1B000
heap
page read and write
25E7EB80000
heap
page read and write
258FED91000
heap
page read and write
25E7AF18000
heap
page read and write
18B965B0000
heap
page read and write
18B96410000
direct allocation
page read and write
7FFDA46F9000
unkown
page read and write
25E7EE17000
heap
page read and write
14CAE216000
heap
page read and write
25E7CE8F000
heap
page read and write
25E7AF47000
heap
page read and write
258FED91000
heap
page read and write
14CAE221000
heap
page read and write
14CAE213000
heap
page read and write
25E7E4FC000
heap
page read and write
25E7E8E5000
heap
page read and write
258FED83000
heap
page read and write
25E7DC20000
heap
page read and write
25E7C8D1000
heap
page read and write
7FFD83760000
unkown
page readonly
18B97430000
direct allocation
page read and write
14CAE213000
heap
page read and write
25E7AE91000
heap
page read and write
2892CD89000
heap
page read and write
1E4F5BD0000
direct allocation
page read and write
7FF643AFC000
unkown
page read and write
1E4F6B00000
direct allocation
page read and write
14CAE20E000
heap
page read and write
14CAE225000
heap
page read and write
14CAE215000
heap
page read and write
2892EA2A000
heap
page read and write
25E7AEC4000
heap
page read and write
1E4F6CD0000
direct allocation
page read and write
25E7DC1E000
heap
page read and write
7FFDA46FD000
unkown
page readonly
25E7AEBB000
heap
page read and write
1E4F6490000
direct allocation
page read and write
25E7ED90000
heap
page read and write
18B97470000
direct allocation
page read and write
258FED83000
heap
page read and write
258FED86000
heap
page read and write
7FFDAC0F0000
unkown
page readonly
2892CD36000
heap
page read and write
1E4F3B41000
heap
page read and write
25E7AF18000
heap
page read and write
7FFDA35C2000
unkown
page execute read
2892CF75000
heap
page read and write
25E7AEBF000
heap
page read and write
14CAE221000
heap
page read and write
25E7E8FC000
heap
page read and write
25E7CE7A000
heap
page read and write
2892CD8A000
heap
page read and write
25E7E636000
heap
page read and write
7FF7ADC10000
unkown
page readonly
1E4F3AC9000
heap
page read and write
25E7EAFC000
heap
page read and write
258FED91000
heap
page read and write
2892E6C0000
heap
page read and write
7FF7ADC10000
unkown
page readonly
25E7CE10000
heap
page read and write
7FFD8347D000
unkown
page readonly
18B94437000
heap
page read and write
1E4F5D50000
direct allocation
page read and write
25E7EC04000
heap
page read and write
7FFDA55B0000
unkown
page readonly
1E4F6D60000
direct allocation
page read and write
2892CD28000
heap
page read and write
7FFD840CB000
unkown
page read and write
B6520FA000
stack
page read and write
18B96BA0000
direct allocation
page read and write
25E7E484000
heap
page read and write
25E7E8FC000
heap
page read and write
14CAE219000
heap
page read and write
1E4F3B38000
heap
page read and write
25E7DC20000
heap
page read and write
25E7AF60000
heap
page read and write
7FFDA5591000
unkown
page execute read
14CAE221000
heap
page read and write
258FED86000
heap
page read and write
14CAE213000
heap
page read and write
1E4F63C0000
direct allocation
page read and write
7FFD83D31000
unkown
page execute read
7FFDA557E000
unkown
page readonly
1E4F3B5C000
heap
page read and write
25E7AE40000
heap
page read and write
25E7E8E5000
heap
page read and write
1E4F5D46000
heap
page read and write
14CAE221000
heap
page read and write
18B94464000
heap
page read and write
25E7E571000
heap
page read and write
25E7AEA2000
heap
page read and write
7FF643AED000
unkown
page write copy
25E7AF2B000
heap
page read and write
14CAE225000
heap
page read and write
7FFD8382B000
unkown
page read and write
14CAE213000
heap
page read and write
25E7EE22000
heap
page read and write
25E7CE8D000
heap
page read and write
7FF643ADA000
unkown
page readonly
14CAE215000
heap
page read and write
18B965D0000
direct allocation
page read and write
7FFDA3FD4000
unkown
page readonly
258FECD0000
heap
page read and write
7FFDA55E0000
unkown
page readonly
14CAE222000
heap
page read and write
7FFD93359000
unkown
page readonly
258FED93000
heap
page read and write
18B94470000
heap
page read and write
25E7E8CB000
heap
page read and write
25E7E7C2000
heap
page read and write
25E7EDBF000
heap
page read and write
7FFDA35EC000
unkown
page readonly
7FFDAC147000
unkown
page readonly
18B97660000
direct allocation
page read and write
1E4F64D0000
direct allocation
page read and write
25E7E846000
heap
page read and write
18B943C0000
heap
page readonly
18B96DAC000
heap
page read and write
18B972F0000
direct allocation
page read and write
1E4F5C76000
heap
page read and write
18B94467000
heap
page read and write
258FECB0000
heap
page read and write
18B94495000
heap
page read and write
7FFDA35E7000
unkown
page read and write
18B96BA0000
direct allocation
page read and write
1E4F6DA0000
direct allocation
page read and write
1E4F6720000
heap
page read and write
1E4F6A10000
direct allocation
page read and write
7FF7ADC11000
unkown
page execute read
18B944A1000
heap
page read and write
18B97430000
direct allocation
page read and write
79E9CFF000
stack
page read and write
25E7CE7E000
heap
page read and write
7FFDA5530000
unkown
page readonly
23962F70000
heap
page read and write
1E4F3B99000
heap
page read and write
7FFD83A6A000
unkown
page execute read
1E4F6410000
direct allocation
page read and write
7FFDA55A5000
unkown
page read and write
7FFDA46E0000
unkown
page readonly
There are 1372 hidden memdumps, click here to show them.

DOM / HTML

URL
Malicious
https://estudosadulto.educacao.ws/deolane.mp4