IOC Report
Order0958490.vbe

loading gif

Files

File Path
Type
Category
Malicious
Order0958490.vbe
data
initial sample
malicious
C:\Users\user\AppData\Roaming\QIbTTutRfdLJtpX.vbs
ISO-8859 text
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_6dcd90a0cfadcd56d98897fd4ad3469a57ab5cb_00000000_4b925f84-1812-45da-a3c6-375e7f851971\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\Critical_powershell.exe_b4b21b9272f0623778607a435112f88140f556cc_00000000_47adebdb-28eb-4de3-b355-e1e0bc28e990\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6846.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER6895.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER68F2.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER697F.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aogrz5d0.pee.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dsnyvsgx.0xg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_er4emgz2.2z5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ms0lth0h.t0c.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\PowerShell\PSReadLine\ConsoleHost_history.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms~RF5e5c4f.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\YGJZ6NNE49LHNRRTI3OL.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\ZSX3PS9AQ4HYCDWCPK6S.temp
data
dropped
\Device\ConDrv
Non-ISO extended-ASCII text, with very long lines (875), with CRLF line terminators, with escape sequences
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Order0958490.vbe"
malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\AppData\Roaming\QIbTTutRfdLJtpX.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wermgr.exe
"C:\Windows\system32\wermgr.exe" "-outproc" "0" "7500" "2456" "1452" "2112" "0" "0" "2152" "0" "0" "0" "0" "0"
C:\Windows\System32\wermgr.exe
"C:\Windows\system32\wermgr.exe" "-outproc" "0" "7840" "2456" "2628" "2576" "0" "0" "2588" "0" "0" "0" "0" "0"

URLs

Name
IP
Malicious
https://api.ipify.org/
104.26.12.205
malicious
http://144.91.79.54/0210/s
unknown
http://144.91.79.54/dA
unknown
http://144.91.7
unknown
http://144.91.79.54/0210/v
unknown
http://144.91.79.54:80/0210/fileBQYA4EAN
unknown
https://api.ipify.org
unknown
http://144.91.79.54/0210/oWbIacqNnTGnBvjrXZmj.txt
unknown
http://144.91.79.54/f1$A
unknown
https://account.dyn.com/
unknown
http://144.91.79.54/18A
unknown
http://144.91.79.54/0210/vAAAAA
unknown
http://144.91.79.54/
unknown
http://144.91.79.54:80/0210/vk-mH
unknown
http://144.91.79.54:80/0210/vr-TH
unknown
http://144.91.79.54/0210/oWbIacqNnTGnBvjrXZmj.txtr
unknown
https://api.ipify.org/t
unknown
http://144.91.79.54/0210/r4A
unknown
http://144.91.79.54/0210/file
unknown
http://144.91.79.54/t
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://144.91.79.54/XA
unknown
http://144.91.79.54/0210/r
unknown
There are 13 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
api.ipify.org
104.26.12.205
malicious
s-part-0023.t-0009.fb-t-msedge.net
13.107.253.51
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
144.91.79.54
unknown
Germany
malicious
104.26.12.205
api.ipify.org
United States
malicious
162.254.34.31
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment1
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment2
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment3
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment4
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment5
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment6
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment7
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment8
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment9
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment10
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment11
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment12
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment13
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment14
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment15
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment16
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment17
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment18
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment19
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment20
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment21
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment22
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment23
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment24
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment25
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX\donn
segment26
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX
cn
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX
i
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX
s
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX
r
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX
Path
HKEY_CURRENT_USER\SOFTWARE\QIbTTutRfdLJtpX
v
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileDirectory
There are 37 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2FEC000
trusted library allocation
page read and write
malicious
2FFA000
trusted library allocation
page read and write
malicious
2FC1000
trusted library allocation
page read and write
malicious
2FF4000
trusted library allocation
page read and write
malicious
F12000
remote allocation
page execute and read and write
malicious
203B579B000
heap
page read and write
1A57CF70000
remote allocation
page read and write
1A57B12A000
heap
page read and write
1A57B130000
heap
page read and write
F80000
heap
page read and write
1578F763000
heap
page read and write
1A57B136000
heap
page read and write
1A57B132000
heap
page read and write
1A57D3BD000
heap
page read and write
1A57D2D1000
heap
page read and write
203B5760000
remote allocation
page read and write
1578F752000
heap
page read and write
AA3FEFE000
stack
page read and write
1A57B0D0000
heap
page read and write
1578F75C000
heap
page read and write
1A57CE6F000
heap
page read and write
1A57B164000
heap
page read and write
1A57B153000
heap
page read and write
1578F6A0000
heap
page read and write
6198000
heap
page read and write
1A57B130000
heap
page read and write
1578F763000
heap
page read and write
1A57B187000
heap
page read and write
203B3D61000
heap
page read and write
203B3D18000
heap
page read and write
1A57CE71000
heap
page read and write
6757000
trusted library allocation
page read and write
1A57D0F1000
heap
page read and write
1A57B10A000
heap
page read and write
1A57B10A000
heap
page read and write
6B00000
heap
page read and write
1A57B159000
heap
page read and write
2EBC000
stack
page read and write
1A57D252000
heap
page read and write
1A57D1E0000
heap
page read and write
1A57B0E1000
heap
page read and write
1A57D2AA000
heap
page read and write
1A57B0E0000
heap
page read and write
2C37000
trusted library allocation
page execute and read and write
1A57CE68000
heap
page read and write
1A57B130000
heap
page read and write
3F99000
trusted library allocation
page read and write
118A000
trusted library allocation
page execute and read and write
2F30000
trusted library allocation
page read and write
1A57D149000
heap
page read and write
1A57D1E7000
heap
page read and write
1A57B13B000
heap
page read and write
1A57B170000
heap
page read and write
1A57B0FB000
heap
page read and write
1A57B0B2000
heap
page read and write
1A57D20E000
heap
page read and write
1A57D1DD000
heap
page read and write
1A57CE71000
heap
page read and write
203B3D18000
heap
page read and write
1A57CE71000
heap
page read and write
203B3D0B000
heap
page read and write
122F000
heap
page read and write
65D9000
trusted library allocation
page read and write
2C32000
trusted library allocation
page read and write
1A57B12A000
heap
page read and write
1198000
heap
page read and write
1A57CE6A000
heap
page read and write
638E000
stack
page read and write
1578F74B000
heap
page read and write
61A3000
heap
page read and write
1578F720000
heap
page read and write
1A57B187000
heap
page read and write
3BF90F9000
stack
page read and write
1A57CE71000
heap
page read and write
6AD0000
trusted library allocation
page read and write
1A57B10A000
heap
page read and write
1A57B17C000
heap
page read and write
1A57B104000
heap
page read and write
6730000
trusted library allocation
page execute and read and write
1140000
trusted library allocation
page read and write
1A57B359000
heap
page read and write
2FAF000
trusted library allocation
page read and write
1A57D103000
heap
page read and write
11C8000
heap
page read and write
1578F5D0000
heap
page read and write
54E0000
heap
page execute and read and write
682F000
stack
page read and write
1578F76A000
heap
page read and write
1A57CE71000
heap
page read and write
203B3D63000
heap
page read and write
1A57D0E6000
heap
page read and write
1578F752000
heap
page read and write
1578F752000
heap
page read and write
1A57B131000
heap
page read and write
1A57B13B000
heap
page read and write
1A57B12A000
heap
page read and write
661E000
stack
page read and write
1578F4D0000
heap
page read and write
1182000
trusted library allocation
page read and write
1A57B15B000
heap
page read and write
1A57CE65000
heap
page read and write
1A57B10A000
heap
page read and write
4FEAFE000
stack
page read and write
6AB7000
trusted library allocation
page read and write
203B3D63000
heap
page read and write
1100000
heap
page read and write
1A57B12A000
heap
page read and write
1A57D1E0000
heap
page read and write
1A57B148000
heap
page read and write
FF370000
trusted library allocation
page execute and read and write
1A57D1C1000
heap
page read and write
3F71000
trusted library allocation
page read and write
BDA000
stack
page read and write
1A57CE66000
heap
page read and write
2DC0000
trusted library allocation
page execute and read and write
1578F75C000
heap
page read and write
1150000
heap
page read and write
1A57B0EA000
heap
page read and write
1578F763000
heap
page read and write
2F43000
heap
page read and write
1A57CE71000
heap
page read and write
6870000
trusted library allocation
page read and write
1205000
heap
page read and write
1A57B0CE000
heap
page read and write
2F0D000
trusted library allocation
page read and write
203B5760000
remote allocation
page read and write
203B3D61000
heap
page read and write
1A57B149000
heap
page read and write
6110000
heap
page read and write
1A57B14C000
heap
page read and write
AA3FBE6000
stack
page read and write
1A57B10A000
heap
page read and write
AA4027F000
stack
page read and write
1A57CE71000
heap
page read and write
1A57B130000
heap
page read and write
1A57CE60000
heap
page read and write
203B4010000
heap
page read and write
1A57B0E3000
heap
page read and write
1578F675000
heap
page read and write
1A57B0E0000
heap
page read and write
1A57CE71000
heap
page read and write
1A57CE71000
heap
page read and write
1A57B10A000
heap
page read and write
2DE8000
trusted library allocation
page read and write
1A57B098000
heap
page read and write
1A57B132000
heap
page read and write
203B3CF1000
heap
page read and write
1164000
trusted library allocation
page read and write
1A57B148000
heap
page read and write
1578F754000
heap
page read and write
1A57B35A000
heap
page read and write
1A57CE71000
heap
page read and write
1A57D0C0000
heap
page read and write
1A57B169000
heap
page read and write
11BB000
heap
page read and write
1A57CE71000
heap
page read and write
1A57B13B000
heap
page read and write
1A57B130000
heap
page read and write
EF8000
stack
page read and write
203B3D90000
heap
page read and write
203B3D25000
heap
page read and write
1A57D121000
heap
page read and write
1A57CE7A000
heap
page read and write
3BF93FD000
stack
page read and write
1578F754000
heap
page read and write
1A57B104000
heap
page read and write
1A57B14C000
heap
page read and write
203B3E60000
heap
page read and write
2C35000
trusted library allocation
page execute and read and write
1A57B10A000
heap
page read and write
1A57B0AD000
heap
page read and write
1A57D149000
heap
page read and write
1A57D1C1000
heap
page read and write
AA400FC000
stack
page read and write
1A57CE71000
heap
page read and write
11C6000
heap
page read and write
6750000
trusted library allocation
page read and write
6AC0000
trusted library allocation
page read and write
1578F670000
heap
page read and write
1A57B12A000
heap
page read and write
674D000
trusted library allocation
page read and write
1A57B090000
heap
page read and write
1A57B0FB000
heap
page read and write
1A57D3B2000
heap
page read and write
1A57D172000
heap
page read and write
1A57D0D5000
heap
page read and write
1A57B0FB000
heap
page read and write
1A57B13B000
heap
page read and write
203B3CF0000
heap
page read and write
1A57B12A000
heap
page read and write
3BF97FD000
stack
page read and write
1A57CB10000
heap
page read and write
1A57B104000
heap
page read and write
1186000
trusted library allocation
page execute and read and write
1A57B0CC000
heap
page read and write
203B5780000
heap
page read and write
1578F711000
heap
page read and write
203B3D33000
heap
page read and write
1578F756000
heap
page read and write
1A57B350000
heap
page read and write
1A57CE71000
heap
page read and write
2C50000
trusted library allocation
page read and write
1A57B0CB000
heap
page read and write
1170000
trusted library allocation
page read and write
1578F752000
heap
page read and write
1269000
heap
page read and write
1A57B10A000
heap
page read and write
1A57B187000
heap
page read and write
1156000
heap
page read and write
AA3FF7F000
stack
page read and write
1578F763000
heap
page read and write
1A57CE67000
heap
page read and write
1A57B13B000
heap
page read and write
2FEA000
trusted library allocation
page read and write
1578F763000
heap
page read and write
1A57D0D4000
heap
page read and write
2FBD000
trusted library allocation
page read and write
1A57B0C0000
heap
page read and write
671E000
stack
page read and write
1A57B104000
heap
page read and write
3BF96FE000
stack
page read and write
1578F75C000
heap
page read and write
679E000
stack
page read and write
1A57B159000
heap
page read and write
4FE3FE000
stack
page read and write
65D0000
trusted library allocation
page read and write
576E000
stack
page read and write
1A57B130000
heap
page read and write
5950000
heap
page read and write
1578F75C000
heap
page read and write
1A57D283000
heap
page read and write
1578F74C000
heap
page read and write
203B3C90000
heap
page read and write
1A57D1E1000
heap
page read and write
1A57D1E7000
heap
page read and write
2FE6000
trusted library allocation
page read and write
1A57B12A000
heap
page read and write
1A57D1D5000
heap
page read and write
F90000
heap
page read and write
1A57CE71000
heap
page read and write
1578F75C000
heap
page read and write
1A57CE71000
heap
page read and write
203B3DB0000
heap
page read and write
1578F6A8000
heap
page read and write
1A57CE71000
heap
page read and write
2D9E000
stack
page read and write
1A57B17A000
heap
page read and write
1A57B0BB000
heap
page read and write
AA401FB000
stack
page read and write
2FA7000
trusted library allocation
page read and write
203B3D25000
heap
page read and write
1A57B130000
heap
page read and write
2DD0000
heap
page read and write
2FE8000
trusted library allocation
page read and write
4FE2F2000
stack
page read and write
1A57CE71000
heap
page read and write
6B10000
trusted library allocation
page execute and read and write
1A57B0FB000
heap
page read and write
4FE6FE000
stack
page read and write
1578F75C000
heap
page read and write
1A57D172000
heap
page read and write
15791370000
heap
page read and write
2F60000
heap
page execute and read and write
562C000
stack
page read and write
203B3D61000
heap
page read and write
2C3B000
trusted library allocation
page execute and read and write
1A57D3BE000
heap
page read and write
AA3FE7E000
unkown
page read and write
1578F752000
heap
page read and write
203B5D50000
heap
page read and write
123B000
heap
page read and write
1A57CE6A000
heap
page read and write
1A57D217000
heap
page read and write
203B3BB0000
heap
page read and write
58AF000
stack
page read and write
1A57B147000
heap
page read and write
2EEB000
trusted library allocation
page read and write
1A57B15B000
heap
page read and write
1578F754000
heap
page read and write
1578F76A000
heap
page read and write
1A57B358000
heap
page read and write
1180000
trusted library allocation
page read and write
FE5000
heap
page read and write
2EC0000
trusted library allocation
page read and write
1A57CE71000
heap
page read and write
1A57D395000
heap
page read and write
1A57B358000
heap
page read and write
1A57B15C000
heap
page read and write
600E000
stack
page read and write
58EE000
stack
page read and write
1578F75C000
heap
page read and write
1A57D172000
heap
page read and write
1A57B0EB000
heap
page read and write
1A57B13B000
heap
page read and write
6AB0000
trusted library allocation
page read and write
F10000
remote allocation
page execute and read and write
53C0000
heap
page read and write
1163000
trusted library allocation
page execute and read and write
2EE0000
trusted library allocation
page read and write
1A57D2AA000
heap
page read and write
1A57B16A000
heap
page read and write
1A57B130000
heap
page read and write
1A57B130000
heap
page read and write
203B3E10000
heap
page read and write
1578F763000
heap
page read and write
1160000
trusted library allocation
page read and write
1A57B12A000
heap
page read and write
FE0000
heap
page read and write
1A57CE67000
heap
page read and write
1A57D1C6000
heap
page read and write
4FE8FE000
stack
page read and write
1A57B0EC000
heap
page read and write
1578F75C000
heap
page read and write
1A57CE65000
heap
page read and write
3FDC000
trusted library allocation
page read and write
4FEBFD000
stack
page read and write
1578F620000
heap
page read and write
1A57B13B000
heap
page read and write
116D000
trusted library allocation
page execute and read and write
2EFA000
trusted library allocation
page read and write
506E000
stack
page read and write
2F20000
trusted library allocation
page read and write
2DA0000
heap
page read and write
1578F756000
heap
page read and write
1A57D1E0000
heap
page read and write
AA3FFFC000
stack
page read and write
1A57CE61000
heap
page read and write
1A57CE71000
heap
page read and write
1578F763000
heap
page read and write
1A57B153000
heap
page read and write
203B5790000
heap
page read and write
203B3D05000
heap
page read and write
1A57B13B000
heap
page read and write
1A57B0EB000
heap
page read and write
203B3D63000
heap
page read and write
1A57B0EA000
heap
page read and write
1A57B13B000
heap
page read and write
1A57B0BC000
heap
page read and write
1578F75C000
heap
page read and write
1A57B35B000
heap
page read and write
2EEE000
trusted library allocation
page read and write
57AE000
stack
page read and write
566E000
stack
page read and write
1A57B0EB000
heap
page read and write
1578F75C000
heap
page read and write
122B000
heap
page read and write
1190000
heap
page read and write
203B3D7E000
heap
page read and write
117D000
trusted library allocation
page execute and read and write
1A57CF70000
remote allocation
page read and write
1A57B105000
heap
page read and write
203B3E65000
heap
page read and write
1A57CE71000
heap
page read and write
4FE7FF000
stack
page read and write
203B3D0B000
heap
page read and write
4FE9FC000
stack
page read and write
2ED0000
trusted library allocation
page read and write
1A57D1EF000
heap
page read and write
1A57D166000
heap
page read and write
1A57CE71000
heap
page read and write
1578F752000
heap
page read and write
1A57D1DE000
heap
page read and write
127F000
heap
page read and write
1578F752000
heap
page read and write
1A57B101000
heap
page read and write
1A57B166000
heap
page read and write
203B3CEC000
heap
page read and write
1A57B14A000
heap
page read and write
648E000
stack
page read and write
203B3D05000
heap
page read and write
6880000
trusted library allocation
page execute and read and write
1A57D2AB000
heap
page read and write
1578F758000
heap
page read and write
1A57CE6F000
heap
page read and write
65CE000
stack
page read and write
1578F5B0000
heap
page read and write
1A57CE6A000
heap
page read and write
1A57B0ED000
heap
page read and write
203B3D33000
heap
page read and write
1A57B0BF000
heap
page read and write
2C30000
trusted library allocation
page read and write
1A57D12C000
heap
page read and write
1A57CE6A000
heap
page read and write
1A57B0DE000
heap
page read and write
1A57B0EF000
heap
page read and write
1A57D3BE000
heap
page read and write
1A57B0F1000
heap
page read and write
53B0000
heap
page read and write
552C000
stack
page read and write
2FB1000
trusted library allocation
page read and write
1A57B159000
heap
page read and write
6D40000
heap
page read and write
1578F76A000
heap
page read and write
1A57AF80000
heap
page read and write
1A57B14C000
heap
page read and write
1A57B101000
heap
page read and write
1578F754000
heap
page read and write
1A57B0D0000
heap
page read and write
203B4014000
heap
page read and write
1A57B106000
heap
page read and write
1A57B168000
heap
page read and write
1A57B12A000
heap
page read and write
1578F763000
heap
page read and write
1A57B161000
heap
page read and write
1A57B16A000
heap
page read and write
1A57B101000
heap
page read and write
6740000
trusted library allocation
page read and write
1A57B0E4000
heap
page read and write
1A57D1DD000
heap
page read and write
AA4007F000
stack
page read and write
1A57CE71000
heap
page read and write
1A57B10A000
heap
page read and write
1A57B145000
heap
page read and write
1A57B060000
heap
page read and write
203B3D33000
heap
page read and write
203B3D73000
heap
page read and write
203B5BD0000
heap
page read and write
4FE4FE000
stack
page read and write
2EF2000
trusted library allocation
page read and write
1A57D171000
heap
page read and write
1A57D1EE000
heap
page read and write
1A57D395000
heap
page read and write
2F71000
trusted library allocation
page read and write
64CE000
stack
page read and write
203B3CEC000
heap
page read and write
203B3CF0000
heap
page read and write
1A57B190000
heap
page read and write
1A57B13B000
heap
page read and write
1578F75C000
heap
page read and write
1A57CE71000
heap
page read and write
1A57D13E000
heap
page read and write
1A57B148000
heap
page read and write
1A57CE71000
heap
page read and write
1A57D0C1000
heap
page read and write
1A57CE71000
heap
page read and write
1A57D20B000
heap
page read and write
1A57D0D3000
heap
page read and write
203B3CEA000
heap
page read and write
1A57CF70000
remote allocation
page read and write
2C9E000
stack
page read and write
1A57D1C5000
heap
page read and write
2F40000
heap
page read and write
2EE6000
trusted library allocation
page read and write
1A57D2BE000
heap
page read and write
2F06000
trusted library allocation
page read and write
3BF94FE000
stack
page read and write
2F01000
trusted library allocation
page read and write
1A57D1C0000
heap
page read and write
203B5760000
remote allocation
page read and write
1A57B355000
heap
page read and write
3BF98FE000
stack
page read and write
1A57B14C000
heap
page read and write
1A57CE71000
heap
page read and write
1A57B15A000
heap
page read and write
2EFE000
trusted library allocation
page read and write
1A57B148000
heap
page read and write
1A57B159000
heap
page read and write
There are 447 hidden memdumps, click here to show them.