IOC Report
Document_a19_79b555791-28h97348k5477-3219g9.js

loading gif

Files

File Path
Type
Category
Malicious
Document_a19_79b555791-28h97348k5477-3219g9.js
ASCII text, with very long lines (537), with CRLF line terminators
initial sample
malicious
C:\Windows\Installer\MSI3B6A.tmp
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
:wtfbbq (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Config.Msi\3b3ac8.rbs
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\C5C8CC0A7FE31816B4641D0465402560
Certificate, Version=3
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\C5C8CC0A7FE31816B4641D0465402560
data
dropped
C:\Users\user\AppData\Local\sharepoint\360total.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Custom_update\Update_3b24da5a.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Custom_update\update_data.dat
data
dropped
C:\Windows\Installer\MSI39EE.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI3A4C.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI3A7C.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI3AAC.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Windows\Installer\MSI3AEC.tmp
data
dropped
C:\Windows\Installer\MSIAA9D.tmp
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Last Printed: Fri Dec 11 11:47:44 2009, Create Time/Date: Fri Dec 11 11:47:44 2009, Last Saved Time/Date: Fri Sep 18 15:06:51 2020, Security: 0, Code page: 1252, Revision Number: {805E70A6-23C0-4688-BBAF-6F995BB72730}, Number of Words: 10, Subject: 360 Total, Author: HuMaster LLC, Name of Creating Application: 360 Total, Template: ;1033, Comments: This installer database contains the logic and data required to install 360 Total., Title: Installation Database, Keywords: Installer, MSI, Database, Number of Pages: 200
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF0C3825C8A6AE7DC2.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF1B4ED7FDA427B494.TMP
data
dropped
C:\Windows\Temp\~DF22CBD4461B033FB8.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF3025BC11E5C97B03.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DF41332C922F5AC300.TMP
data
dropped
C:\Windows\Temp\~DF428E4FF550ED71C3.TMP
data
dropped
C:\Windows\Temp\~DF6629245EDF63459B.TMP
data
dropped
C:\Windows\Temp\~DFAB72B8B8E96537BE.TMP
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Temp\~DFB1564F1E3995B003.TMP
data
dropped
C:\Windows\Temp\~DFD248A4793ACEF6ED.TMP
data
dropped
C:\Windows\Temp\~DFE66F7BB54D4BA8DC.TMP
Composite Document File V2 Document, Cannot read section info
dropped
There are 19 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Document_a19_79b555791-28h97348k5477-3219g9.js"
malicious
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
malicious
C:\Windows\Installer\MSI3B6A.tmp
"C:\Windows\Installer\MSI3B6A.tmp" C:/Windows/System32/rundll32.exe C:\Users\user\AppData\Local\sharepoint\360total.dll, homq
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Local\sharepoint\360total.dll, homq
malicious
C:\Windows\System32\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Local\sharepoint\360total.dll, homq
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_3b24da5a.dll", homq
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_3b24da5a.dll", homq
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\AppData\Roaming\Custom_update\Update_3b24da5a.dll", homq
malicious
C:\Windows\System32\cmd.exe
/c ipconfig /all
malicious
C:\Windows\System32\ipconfig.exe
ipconfig /all
malicious
C:\Windows\System32\cmd.exe
/c systeminfo
malicious
C:\Windows\System32\systeminfo.exe
systeminfo
malicious
C:\Windows\System32\cmd.exe
/c nltest /domain_trusts
malicious
C:\Windows\System32\cmd.exe
/c nltest /domain_trusts /all_trusts
malicious
C:\Windows\System32\cmd.exe
/c net view /all /domain
malicious
C:\Windows\System32\net.exe
net view /all /domain
malicious
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 3F033F6E254CA40A6D9A0D485CFEA9D1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\nltest.exe
nltest /domain_trusts
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\nltest.exe
nltest /domain_trusts /all_trusts
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 15 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://wrankaget.site/live/
malicious
https://jarinamaers.shop/
unknown
malicious
https://grizmotras.com/live/
104.21.59.82
malicious
https://jarinamaers.shop/live/
172.67.136.103
malicious
http://cacerts.dig
unknown
http://crl3.digice7
unknown
http://45.95.11.217/ad.msiLin
unknown
http://pconf.f.360.cn/safe_update.php
unknown
ftp://ftp%2desktop.ini
unknown
https://grizmotras.com/
unknown
https://grizmotras.com/Qc-
unknown
http://45.95.11.217/ad.msi0
unknown
https://jarinamaers.shop/live/zedv5
unknown
https://jarinamaers.shop/live/onsG
unknown
https://grizmotras.com/live/ll
unknown
http://45.95.11.217/ad.msi-1780707424311028180
unknown
https://pewwhranet.com/live/
unknown
https://grizmotras.com/live/)
unknown
http://45.95.11.217/ad.msi
45.95.11.217
http://45.95.11.217/ad.msi%
unknown
http://pscan.f.360.cn/safe_update.php
unknown
http://dr.f.360.cn/scanlist
unknown
https://www.thawte.com/cps0/
unknown
http://pscan.f.360.cn/safe_update.phphttp://pconf.f.360.cn/safe_update.phphttp://sconf.f.360.cn/clie
unknown
https://jarinamaers.shop/live/7aB
unknown
https://www.thawte.com/repository0W
unknown
http://45.95.11.217/ad.msiV
unknown
https://jarinamaers.shop/W
unknown
http://sconf.f.360.cn/client_security_conf
unknown
http://dr.f.360.cn/scan
unknown
https://www.advancedinstaller.com
unknown
https://jarinamaers.shop/live/D
unknown
http://secure.globalsign
unknown
https://grizmotras.com//-cY
unknown
https://jarinamaers.shop/live/g5
unknown
https://jarinamaers.shop/live/7
unknown
https://grizmotras.com/Ep
unknown
https://grizmotras.com/live/URLS1https://pewwhranet.com/live/COMMAND4front://sysinfo.bin
unknown
There are 28 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
jarinamaers.shop
172.67.136.103
malicious
grizmotras.com
104.21.59.82
malicious
bg.microsoft.map.fastly.net
199.232.214.172
prod.globalsign.map.fastly.net
151.101.2.133

IPs

IP
Domain
Country
Malicious
104.21.59.82
grizmotras.com
United States
malicious
172.67.136.103
jarinamaers.shop
United States
malicious
45.95.11.217
unknown
Italy

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\3b3ac8.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\3b3ac8.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\Microsoft\Installer\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\C72CC84B32896524285338B4DFD2D0BB
E927531B47501D447B1AE64455F005B6
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\F5D323A437D662C4E893EB9882AD31BE
E927531B47501D447B1AE64455F005B6
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\895F9FDA48B79C541BAC8E90865A83AB
E927531B47501D447B1AE64455F005B6
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\HuMaster LLC\360 Total\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\HuMaster LLC\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Local\sharepoint\
HKEY_CURRENT_USER\SOFTWARE\HuMaster LLC\360 Total
Version
HKEY_CURRENT_USER\SOFTWARE\HuMaster LLC\360 Total
Path
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\mlang.dll,-4387
HKEY_CURRENT_USER_Classes\Local Settings\MuiCache\1e\417C44EB
@%SystemRoot%\system32\mlang.dll,-4407
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
201DC470000
direct allocation
page execute and read and write
malicious
201DAAE0000
direct allocation
page execute and read and write
malicious
187EC840000
direct allocation
page read and write
malicious
1A379500000
direct allocation
page execute and read and write
malicious
201DA900000
direct allocation
page read and write
malicious
201DC470000
direct allocation
page execute and read and write
malicious
187EC850000
direct allocation
page execute and read and write
malicious
201DC500000
direct allocation
page execute and read and write
malicious
1FFB4F00000
direct allocation
page execute and read and write
malicious
201DC470000
direct allocation
page execute and read and write
malicious
201DC470000
direct allocation
page execute and read and write
malicious
1FFB4EF0000
direct allocation
page read and write
malicious
1A3794F0000
direct allocation
page read and write
malicious
D2043F8000
stack
page read and write
malicious
148F6774000
heap
page read and write
201DC920000
remote allocation
page read and write
3ABC000
stack
page read and write
F359FF000
stack
page read and write
230DCBF0000
heap
page read and write
201DAC55000
heap
page read and write
1330000
heap
page read and write
2B161A10000
heap
page read and write
207B503D000
heap
page read and write
1B54D160000
heap
page read and write
8F3D97E000
stack
page read and write
187EC870000
heap
page read and write
2B161C80000
heap
page read and write
3140000
heap
page read and write
1FFB6930000
heap
page read and write
1B54D1F6000
heap
page read and write
1DE937E000
stack
page read and write
207B5498000
heap
page read and write
1B54D1D0000
heap
page read and write
207B2F60000
remote allocation
page read and write
207B2F60000
remote allocation
page read and write
207B4D07000
heap
page read and write
201DC920000
remote allocation
page read and write
28D757A0000
heap
page read and write
737000
unkown
page readonly
2B161ABD000
heap
page read and write
1FFB68F0000
trusted library allocation
page read and write
207B4E01000
heap
page read and write
1A379640000
direct allocation
page execute and read and write
D20437E000
stack
page read and write
207B5459000
heap
page read and write
207B2E83000
heap
page read and write
2FCE000
stack
page read and write
C2EFEFE000
stack
page read and write
F358FE000
stack
page read and write
229AA0D7000
heap
page read and write
207B2E83000
heap
page read and write
1FFB68F0000
trusted library allocation
page read and write
28D75670000
heap
page read and write
201DC510000
direct allocation
page execute and read and write
201DAA0A000
heap
page read and write
201DC4A0000
direct allocation
page execute and read and write
D20467D000
stack
page read and write
207B5459000
heap
page read and write
242C06C8000
heap
page read and write
1FFB4F35000
heap
page read and write
187EE300000
direct allocation
page execute and read and write
2B1619F0000
heap
page read and write
1FFB4F40000
heap
page read and write
207B5446000
heap
page read and write
74C000
unkown
page write copy
1800C5000
unkown
page read and write
8F3D87B000
stack
page read and write
207B53D0000
heap
page read and write
207B4CEA000
heap
page read and write
207B2E94000
heap
page read and write
6F1000
unkown
page execute read
D5920FE000
unkown
page read and write
207B508D000
heap
page read and write
379E000
stack
page read and write
201DCAB0000
direct allocation
page execute and read and write
207B542C000
heap
page read and write
207B2E0C000
heap
page read and write
207B5453000
heap
page read and write
148F6730000
heap
page read and write
1B54D223000
heap
page read and write
187EE360000
direct allocation
page execute and read and write
242C06AB000
heap
page read and write
207B544B000
heap
page read and write
1788D907000
heap
page read and write
2228C2F8000
heap
page read and write
1A37AE20000
trusted library allocation
page read and write
750000
unkown
page readonly
321DAFE000
stack
page read and write
187EE330000
heap
page read and write
8F3DA7F000
stack
page read and write
F3587B000
stack
page read and write
1B54D219000
heap
page read and write
148F6920000
heap
page read and write
207B53F5000
heap
page read and write
1B54D22F000
heap
page read and write
201DAA07000
heap
page read and write
201DA9A5000
heap
page read and write
201DA9E7000
heap
page read and write
207B54AA000
heap
page read and write
187EE240000
trusted library allocation
page read and write
28D75570000
heap
page read and write
C743CFF000
stack
page read and write
207B549C000
heap
page read and write
187EE260000
direct allocation
page execute and read and write
207B2E33000
heap
page read and write
207B5446000
heap
page read and write
DE247FF000
stack
page read and write
1B54D535000
heap
page read and write
1A379640000
trusted library allocation
page read and write
DE243EC000
stack
page read and write
207B4E01000
heap
page read and write
207B508D000
heap
page read and write
915856C000
stack
page read and write
207B2DF0000
heap
page read and write
201DA9E7000
heap
page read and write
207B2E7B000
heap
page read and write
28D756AD000
heap
page read and write
6F1000
unkown
page execute read
230DCC18000
heap
page read and write
242C06A0000
heap
page read and write
207B5460000
heap
page read and write
D2042FF000
stack
page read and write
207B2E2F000
heap
page read and write
1453000
heap
page read and write
57C40FE000
stack
page read and write
201DC4F0000
direct allocation
page execute and read and write
207B4D01000
heap
page read and write
201DAC20000
trusted library allocation
page read and write
207B2E18000
heap
page read and write
18016C000
unkown
page readonly
201DA9B8000
heap
page read and write
2B161AD6000
heap
page read and write
207B503D000
heap
page read and write
28D756C8000
heap
page read and write
1FFB4F30000
heap
page read and write
207B549E000
heap
page read and write
1B54D170000
heap
page read and write
207B5459000
heap
page read and write
2B1619E0000
heap
page read and write
1FFB4F72000
heap
page read and write
1B54D217000
heap
page read and write
1B54D1F5000
heap
page read and write
207B2E19000
heap
page read and write
6F0000
unkown
page readonly
148F6750000
heap
page read and write
207B2E7B000
heap
page read and write
207B2EE4000
heap
page read and write
201DC540000
heap
page read and write
201DC4E0000
direct allocation
page execute and read and write
3BBC000
stack
page read and write
28D756A0000
heap
page read and write
242C0920000
heap
page read and write
230DCC15000
heap
page read and write
D20477C000
stack
page read and write
201DC4E0000
direct allocation
page execute and read and write
201DC4D0000
direct allocation
page execute and read and write
28D756C5000
heap
page read and write
207B2E83000
heap
page read and write
C7439FE000
stack
page read and write
8F3D8FE000
stack
page read and write
180000000
unkown
page readonly
C2EFFFE000
stack
page read and write
321DB7F000
stack
page read and write
207B2C80000
heap
page read and write
201DC490000
direct allocation
page execute and read and write
207B2FA0000
heap
page read and write
207B2FA5000
heap
page read and write
207B544B000
heap
page read and write
230DCBE0000
heap
page read and write
207B4D00000
heap
page read and write
1A37AE20000
trusted library allocation
page read and write
91589FE000
stack
page read and write
201DC4E0000
direct allocation
page execute and read and write
750000
unkown
page readonly
17CF000
stack
page read and write
187EC6E0000
heap
page read and write
C7436FE000
stack
page read and write
207B5460000
heap
page read and write
D2044FE000
stack
page read and write
2B161ABB000
heap
page read and write
207B4D0A000
heap
page read and write
229A9F00000
heap
page read and write
D5921FF000
stack
page read and write
207B4D08000
heap
page read and write
230DCEA0000
heap
page read and write
3150000
heap
page read and write
16CF000
stack
page read and write
201DC4C0000
direct allocation
page execute and read and write
201DC470000
direct allocation
page execute and read and write
201DA918000
heap
page read and write
187EC8B0000
heap
page read and write
141B000
heap
page read and write
242C0930000
heap
page read and write
37B0000
heap
page read and write
201DA9B8000
heap
page read and write
BAC000
stack
page read and write
201DCA70000
direct allocation
page execute and read and write
207B5460000
heap
page read and write
242C06C7000
heap
page read and write
2228C5D0000
heap
page read and write
C7434F7000
stack
page read and write
180086000
unkown
page readonly
207B5463000
heap
page read and write
1B54D224000
heap
page read and write
1DE92FE000
stack
page read and write
1FFB68F0000
trusted library allocation
page read and write
207B5459000
heap
page read and write
207B2F60000
remote allocation
page read and write
207B5460000
heap
page read and write
1FFB68F0000
direct allocation
page execute and read and write
207B5463000
heap
page read and write
207B4D09000
heap
page read and write
1800C6000
unkown
page write copy
207B2E94000
heap
page read and write
148F675B000
heap
page read and write
1B54D22F000
heap
page read and write
201DC4D0000
direct allocation
page execute and read and write
201DA9B8000
heap
page read and write
180086000
unkown
page readonly
207B2E10000
heap
page read and write
1A37AF60000
heap
page read and write
207B5455000
heap
page read and write
201DA9B0000
heap
page read and write
C743BFB000
stack
page read and write
207B2E94000
heap
page read and write
201DA9B8000
heap
page read and write
201DA910000
heap
page read and write
1B54D219000
heap
page read and write
201DCAD0000
direct allocation
page execute and read and write
D20427C000
stack
page read and write
1788D860000
heap
page read and write
201DAC40000
direct allocation
page execute and read and write
207B2E94000
heap
page read and write
207B544C000
heap
page read and write
201DAC50000
heap
page read and write
74C000
unkown
page read and write
1B54D1FB000
heap
page read and write
1FFB4E90000
heap
page read and write
229AA0D0000
heap
page read and write
207B5203000
heap
page read and write
207B2F20000
heap
page read and write
2228C4C0000
heap
page read and write
201DCAB0000
direct allocation
page execute and read and write
201DCAC0000
direct allocation
page execute and read and write
D591DEC000
stack
page read and write
187EE240000
direct allocation
page execute and read and write
1B54D22A000
heap
page read and write
314E000
stack
page read and write
F3597E000
stack
page read and write
207B4E76000
heap
page read and write
C743DFC000
stack
page read and write
1B54D204000
heap
page read and write
201DCA70000
direct allocation
page execute and read and write
1800C6000
unkown
page write copy
201DA979000
heap
page read and write
8F3D9FF000
stack
page read and write
1B54D205000
heap
page read and write
2B161AB0000
heap
page read and write
BEC000
stack
page read and write
207B5000000
heap
page read and write
207B2E54000
heap
page read and write
1B54D223000
heap
page read and write
207B542C000
heap
page read and write
230DCEB0000
heap
page read and write
30AF000
stack
page read and write
1B54D205000
heap
page read and write
1FFB4F49000
heap
page read and write
1B54D219000
heap
page read and write
207B5463000
heap
page read and write
207B2E80000
heap
page read and write
C2EFF7E000
stack
page read and write
2228C2B0000
heap
page read and write
1315000
heap
page read and write
230DCDC0000
heap
page read and write
148F6940000
heap
page read and write
1A379321000
heap
page read and write
207B5459000
heap
page read and write
230DCDE0000
heap
page read and write
13BE000
stack
page read and write
321DA7D000
stack
page read and write
201DA9E7000
heap
page read and write
D2045FE000
stack
page read and write
1788DB55000
heap
page read and write
201DC4D0000
direct allocation
page execute and read and write
207B5459000
heap
page read and write
148F675D000
heap
page read and write
207B2D80000
heap
page read and write
187EE240000
trusted library allocation
page read and write
187EC8F0000
heap
page read and write
207B4D03000
heap
page read and write
201DAC20000
direct allocation
page execute and read and write
207B2EC1000
heap
page read and write
187EC875000
heap
page read and write
180001000
unkown
page execute read
3A7F000
stack
page read and write
201DA9B6000
heap
page read and write
187EE240000
trusted library allocation
page read and write
180000000
unkown
page readonly
1B54D1D8000
heap
page read and write
1B54D1F4000
heap
page read and write
1B54D530000
heap
page read and write
37A0000
heap
page read and write
201DA9B0000
heap
page read and write
207B2D60000
heap
page read and write
737000
unkown
page readonly
207B5449000
heap
page read and write
207B503C000
heap
page read and write
C7438FF000
stack
page read and write
207B5494000
heap
page read and write
187EE2E0000
direct allocation
page execute and read and write
229AA000000
heap
page read and write
187EC8B7000
heap
page read and write
1FFB4E70000
heap
page read and write
207B5463000
heap
page read and write
207B544B000
heap
page read and write
8F3DAFF000
stack
page read and write
187EE3C0000
direct allocation
page execute and read and write
3590000
heap
page read and write
201DC470000
direct allocation
page execute and read and write
1B54D1FB000
heap
page read and write
207B5463000
heap
page read and write
1B54D226000
heap
page read and write
148F6720000
heap
page read and write
1A379675000
heap
page read and write
207B4D06000
heap
page read and write
207B4E00000
heap
page read and write
242C0890000
heap
page read and write
207B544B000
heap
page read and write
207B4C00000
heap
page read and write
143A000
heap
page read and write
28D75650000
heap
page read and write
2B362FB000
stack
page read and write
207B5069000
heap
page read and write
207B5460000
heap
page read and write
201DC4D0000
direct allocation
page execute and read and write
207B5459000
heap
page read and write
207B4C01000
heap
page read and write
1DE8F9C000
stack
page read and write
207B2E1E000
heap
page read and write
DE246FE000
unkown
page read and write
D2E62FE000
stack
page read and write
148F6776000
heap
page read and write
1A3792A0000
heap
page read and write
369E000
stack
page read and write
207B2E33000
heap
page read and write
FBC000
stack
page read and write
201DAC20000
trusted library allocation
page read and write
201DA956000
heap
page read and write
1A3792F8000
heap
page read and write
207B4EEC000
heap
page read and write
207B5455000
heap
page read and write
207B2E1D000
heap
page read and write
207B5495000
heap
page read and write
201DA870000
heap
page read and write
57C3FFF000
unkown
page read and write
1FFB68F0000
trusted library allocation
page read and write
1788D870000
heap
page read and write
6F0000
unkown
page readonly
137E000
stack
page read and write
1407000
heap
page read and write
229A9FE0000
heap
page read and write
310E000
stack
page read and write
207B5497000
heap
page read and write
2B363FE000
unkown
page read and write
1B54D219000
heap
page read and write
201DCA30000
direct allocation
page execute and read and write
242C06C5000
heap
page read and write
D2046FE000
stack
page read and write
C7435FE000
stack
page read and write
207B5069000
heap
page read and write
201DC400000
trusted library allocation
page read and write
207B2E57000
heap
page read and write
F3587F000
stack
page read and write
38DD7DF000
stack
page read and write
187EE310000
direct allocation
page execute and read and write
1A3792F0000
heap
page read and write
187EE3A0000
direct allocation
page execute and read and write
1788D890000
heap
page read and write
187EE2E0000
direct allocation
page execute and read and write
207B4D01000
heap
page read and write
1FFB4D90000
heap
page read and write
207B5463000
heap
page read and write
187EE380000
direct allocation
page execute and read and write
1B54D190000
heap
page read and write
180001000
unkown
page execute read
187EE3D0000
direct allocation
page execute and read and write
207B5427000
heap
page read and write
2228C2C0000
heap
page read and write
300F000
stack
page read and write
187EC7E0000
heap
page read and write
306E000
stack
page read and write
3020000
heap
page read and write
1B54D21C000
heap
page read and write
1A3792D0000
heap
page read and write
207B5463000
heap
page read and write
1310000
heap
page read and write
207B5011000
heap
page read and write
207B2E23000
heap
page read and write
229AA3C0000
heap
page read and write
229AA3C5000
heap
page read and write
38DDA7F000
stack
page read and write
1A379670000
heap
page read and write
2B161E50000
heap
page read and write
201DA9E7000
heap
page read and write
207B546C000
heap
page read and write
1800C5000
unkown
page read and write
187EE340000
direct allocation
page execute and read and write
207B5011000
heap
page read and write
2B161AD4000
heap
page read and write
201DC400000
trusted library allocation
page read and write
207B5208000
heap
page read and write
201DAA07000
heap
page read and write
13C0000
heap
page read and write
207B5460000
heap
page read and write
187EE240000
trusted library allocation
page read and write
1788D900000
heap
page read and write
12FD000
stack
page read and write
314A000
heap
page read and write
207B5001000
heap
page read and write
201DA8A0000
heap
page read and write
201DCB00000
direct allocation
page execute and read and write
148F6A70000
heap
page read and write
91588FF000
unkown
page read and write
1B54D219000
heap
page read and write
E60000
heap
page read and write
1B54D21E000
heap
page read and write
C743AFD000
stack
page read and write
E50000
heap
page read and write
28D756AB000
heap
page read and write
1788DB50000
heap
page read and write
207B53D2000
heap
page read and write
201DA98F000
heap
page read and write
207B2E7B000
heap
page read and write
242C08B0000
heap
page read and write
C2EFE7C000
stack
page read and write
28D75930000
heap
page read and write
D20447E000
stack
page read and write
187EC7C0000
heap
page read and write
207B53F7000
heap
page read and write
1A3792B0000
heap
page read and write
397E000
stack
page read and write
2B364FF000
stack
page read and write
242C06AD000
heap
page read and write
201DC510000
direct allocation
page execute and read and write
201DA9B0000
heap
page read and write
D20457A000
stack
page read and write
207B4CFB000
heap
page read and write
1400000
heap
page read and write
2228C5D5000
heap
page read and write
207B4E01000
heap
page read and write
207B546C000
heap
page read and write
D2E627C000
stack
page read and write
2228C2F0000
heap
page read and write
D2E637E000
stack
page read and write
230DCBFB000
heap
page read and write
57C3EFB000
stack
page read and write
207B4CFC000
heap
page read and write
18016C000
unkown
page readonly
207B5459000
heap
page read and write
201DA9E7000
heap
page read and write
242C07B0000
heap
page read and write
207B4E01000
heap
page read and write
207B4D03000
heap
page read and write
1DE927E000
stack
page read and write
33C0000
heap
page read and write
1B54D1F4000
heap
page read and write
1B54D219000
heap
page read and write
321DBFE000
stack
page read and write
201DC920000
remote allocation
page read and write
201DA880000
heap
page read and write
207B5463000
heap
page read and write
207B4D05000
heap
page read and write
1A379640000
trusted library allocation
page read and write
30B0000
heap
page read and write
38DD75C000
stack
page read and write
207B2E24000
heap
page read and write
230DCBFD000
heap
page read and write
There are 467 hidden memdumps, click here to show them.