IOC Report
Pagamento Processado.js

loading gif

Files

File Path
Type
Category
Malicious
Pagamento Processado.js
ASCII text, with very long lines (5429), with no line terminators
initial sample
malicious
C:\Temp\WTRTRWFSHS.ps1
ASCII text, with very long lines (57417), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\JXCJKXCJHKJHXCJHKXCXCJHK.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\6ATIQPJI\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BLNS00AZ\kent[1].ps1
ASCII text, with very long lines (57417), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\TmpUserData\Crashpad\throttle_store.dat
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\TmpUserData\Default\Network\Cookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Temp\TmpUserData\Default\Secure Preferences
JSON data
dropped
C:\Users\user\AppData\Local\Temp\TmpUserData\Local State
JSON data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o3bwejmo.52t.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wbf4kj5l.rod.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhv37EE.tmp
Extensible storage user DataBase, version 0x620, checksum 0x2a351544, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\ufrigxexiotsicyjmedmitblhoqmmy
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Pagamento Processado.js"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\WTRTRWFSHS.ps1"
malicious
C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe
"C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe"
malicious
C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe
"C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
--user-data-dir=C:\Users\user\AppData\Local\Temp\TmpUserData --headless --remote-debugging-port=9222 --profile-directory="Default"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\ufrigxexiotsicyjmedmitblhoqmmy"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\ehwagppqwwlwtqmnwopflynbivhvfjnzk"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\pcjthi"
malicious
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\Chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --noerrdialogs --no-pre-read-main-dll --field-trial-handle=2068,i,10874666967590452469,2224900250606111256,262144 --disable-features=PaintHolding --variations-seed-version --mojo-platform-channel-handle=2616 /prefetch:3
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
--user-data-dir=C:\Users\user\AppData\Local\Temp\TmpUserData --headless --remote-debugging-port=9222 --profile-directory="Default"
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --use-angle=swiftshader-webgl --use-gl=angle --headless --mojo-platform-channel-handle=2132 --field-trial-handle=1572,i,5104455906519316198,7108619280464206914,262144 --disable-features=PaintHolding /prefetch:3
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.imvu.comr
unknown
https://duckduckgo.com/ac/?q=
unknown
https://safebrowsing.google.com/safebrowsing/clientreport/chrome-sct-auditing
unknown
https://support.google.com/chrome/answer/6098869
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://issuetracker.google.com/284462263
unknown
http://www.chambersign.org1
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
http://c.pki.goog/we2/64OUIVzpZV4.crl0
unknown
https://anglebug.com/7714
unknown
http://unisolated.invalid/
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
unknown
https://nuget.org/nuget.exe
unknown
http://anglebug.com/6248
unknown
http://developer.chrome.com/docs/extensions/how-to/distribute/install-extensions)
unknown
http://anglebug.com/6929
unknown
http://anglebug.com/5281
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://issuetracker.google.com/255411748
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://anglebug.com/7489
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://chrome.google.com/webstore
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.ico
unknown
http://c.pki.goog/r/gsr1.crl0
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://issuetracker.google.com/161903006
unknown
http://i.pki.goog/we2.crt0
unknown
https://github.com/Pester/Pester
unknown
http://176.65.144.3/dev/kent.exeP
unknown
https://drive-daily-5.corp.google.com/
unknown
http://176.65.144.3/dev/kent.ps1llcaller
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/4722
unknown
http://anglebug.com/7556
unknown
http://anglebug.com/3625E
unknown
https://chromewebstore.google.com/
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://www.google.com/accounts/servicelogin
unknown
https://drive-preprod.corp.google.com/
unknown
https://gemini.google.com/app?q=
unknown
https://gemini.google.com/app?q=searchTerms
unknown
http://anglebug.com/6692
unknown
https://issuetracker.google.com/258207403
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
https://duckduckgo.com/chrome_newtabv10
unknown
http://anglebug.com/3625
unknown
https://aefd.nelreports.net/api/report?cat=bingth
unknown
http://anglebug.com/3624
unknown
http://www.unicode.org/copyright.html
unknown
http://anglebug.com/5007
unknown
https://drive.google.com/drive/installwebapp?usp=chrome_default
unknown
https://clients2.googleusercontent.com/crx/blobs/Ad_brx23lef_cW590ESOTTAroOhZ9si0XFJIUC52j2ILHW1VLB5
unknown
http://anglebug.com/3862
unknown
https://chrome.google.com/webstoreLDDiscover
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
http://176.65.144.3/dev/kent.ps1lcaller
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://www.google.com/images/branding/product/ico/googleg_alldp.ico
unknown
http://anglebug.com/4384
unknown
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=EL
unknown
http://176.65.144.3/dev/kent.ps1S
unknown
https://www.google.com/chrome/privacy/eula_text.htmlH&elpManaged
unknown
http://anglebug.com/3970
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherUrlList
unknown
https://policies.google.com/
unknown
https://google-ohttp-relay-query.fastly-edge.com/2P
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&
unknown
https://anglebug.com/7604
unknown
http://anglebug.com/7761
unknown
http://anglebug.com/7760
unknown
https://chrome.google.com/webstore/category/extensions
unknown
https://www.ecosia.org/newtab/v10
unknown
http://anglebug.com/5901
unknown
http://www.imvu.compData
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
http://anglebug.com/7406
unknown
https://www.google.com/search
unknown
http://www.google.com/update2/response
unknown
https://anglebug.com/7161
unknown
https://aefd.nelreports.net/api/report?cat=wsb
unknown
https://anglebug.com/7162
unknown
http://anglebug.com/5906
unknown
http://anglebug.com/2517
unknown
http://anglebug.com/4937
unknown
https://support.google.com/chrome/a/?p=browser_profile_details
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50
googlehosted.l.googleusercontent.com
142.250.184.193
clients2.googleusercontent.com
unknown

IPs

IP
Domain
Country
Malicious
176.65.144.3
unknown
Germany
malicious
196.251.69.63
unknown
Seychelles
malicious
192.168.2.6
unknown
unknown
malicious
142.250.184.193
googlehosted.l.googleusercontent.com
United States
178.237.33.50
geoplugin.net
Netherlands
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-U6XQL5
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-U6XQL5
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-U6XQL5
time
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-U6XQL5
UID
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\ThirdParty
StatusCodes
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Edge\BLBeacon
state
HKEY_CURRENT_USER\SOFTWARE\Microsoft\EdgeUpdate\ClientState\{56EB18F8-B008-4CBD-B6D2-8C97FE7E9062}
dr
There are 15 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
3FC0000
unclassified section
page execute and read and write
malicious
B63000
heap
page read and write
malicious
3C59000
trusted library allocation
page read and write
malicious
B48000
heap
page read and write
malicious
3B79000
trusted library allocation
page read and write
malicious
400000
system
page execute and read and write
malicious
400000
remote allocation
page execute and read and write
malicious
7814033DC000
direct allocation
page read and write
14FC4515000
heap
page read and write
781000038000
direct allocation
page read and write
33AF000
stack
page read and write
14FC4504000
heap
page read and write
14FC44FD000
heap
page read and write
14FC4549000
heap
page read and write
14FC4543000
heap
page read and write
14FC4521000
heap
page read and write
3150000
heap
page read and write
14FC453A000
heap
page read and write
14FC4537000
heap
page read and write
781402BF2000
direct allocation
page read and write
14FC4512000
heap
page read and write
14FC4521000
heap
page read and write
78140250C000
direct allocation
page read and write
14FC453D000
heap
page read and write
313E000
heap
page read and write
14FC452C000
heap
page read and write
A0291FE000
unkown
page readonly
3155000
heap
page read and write
14FC4545000
heap
page read and write
14FC454D000
heap
page read and write
14FC4524000
heap
page read and write
A84507E000
stack
page read and write
14FC44F5000
heap
page read and write
72A400294000
trusted library allocation
page read and write
14FC452F000
heap
page read and write
14FC44FD000
heap
page read and write
14FC452C000
heap
page read and write
14FC450B000
heap
page read and write
7810000C4000
direct allocation
page read and write
14FC450B000
heap
page read and write
14FC453C000
heap
page read and write
14FC451E000
heap
page read and write
14FC4524000
heap
page read and write
14FC452F000
heap
page read and write
14FC47C5000
heap
page read and write
14FC454A000
heap
page read and write
78140252A000
direct allocation
page read and write
5270000
trusted library allocation
page read and write
30F0000
unclassified section
page execute and read and write
14FC4517000
heap
page read and write
B40000
heap
page read and write
14FC4512000
heap
page read and write
14FC4504000
heap
page read and write
14FC4524000
heap
page read and write
7814028F9000
direct allocation
page read and write
14FC44B7000
heap
page read and write
14FC4504000
heap
page read and write
14FC4535000
heap
page read and write
6B893FE000
unkown
page readonly
14FC4542000
heap
page read and write
14522FE000
stack
page read and write
332800088000
direct allocation
page read and write
14FC451F000
heap
page read and write
14FC4504000
heap
page read and write
14FC4529000
heap
page read and write
14FC4527000
heap
page read and write
14FC4515000
heap
page read and write
14FC451A000
heap
page read and write
14FC4547000
heap
page read and write
14FC4541000
heap
page read and write
781402BED000
direct allocation
page read and write
6B943FE000
unkown
page readonly
781400601000
direct allocation
page read and write
14FC4515000
heap
page read and write
14FC4535000
heap
page read and write
14FC450B000
heap
page read and write
14FC453B000
heap
page read and write
313C000
heap
page read and write
14FC454C000
heap
page read and write
14FC4524000
heap
page read and write
A02C1FE000
unkown
page readonly
781402866000
direct allocation
page read and write
14FC264B000
heap
page read and write
14FC4535000
heap
page read and write
26A29640000
heap
page read and write
781403C2C000
direct allocation
page read and write
26A2965E000
heap
page read and write
781403748000
direct allocation
page read and write
14FC4504000
heap
page read and write
26A2CD93000
heap
page read and write
78140253C000
direct allocation
page read and write
7814032D4000
direct allocation
page read and write
26A29A10000
heap
page read and write
14FC4517000
heap
page read and write
14FC4515000
heap
page read and write
14FC451E000
heap
page read and write
14FC44F5000
heap
page read and write
14FC4543000
heap
page read and write
14FC450C000
heap
page read and write
14FC4542000
heap
page read and write
14FC450F000
heap
page read and write
14FC44FD000
heap
page read and write
26A26489000
heap
page read and write
14FC451C000
heap
page read and write
14FC452E000
heap
page read and write
14FC4540000
heap
page read and write
14FC4529000
heap
page read and write
14FC453D000
heap
page read and write
49C5000
trusted library allocation
page read and write
781000128000
direct allocation
page read and write
26A26370000
trusted library allocation
page read and write
14FC4556000
heap
page read and write
14FC451B000
heap
page read and write
781402DD3000
direct allocation
page read and write
14FC2699000
heap
page read and write
14FC4790000
heap
page read and write
7814035B0000
direct allocation
page read and write
26A28D03000
heap
page read and write
14FC4527000
heap
page read and write
14FC4530000
heap
page read and write
14FC44FD000
heap
page read and write
14FC450D000
heap
page read and write
7814036D8000
direct allocation
page read and write
14FC4507000
heap
page read and write
14FC452C000
heap
page read and write
A0339FB000
stack
page read and write
14FC4804000
heap
page read and write
7FF88B050000
trusted library allocation
page read and write
26A2CDA4000
heap
page read and write
A0101FE000
unkown
page readonly
14FC4508000
heap
page read and write
D74000
heap
page read and write
14FC44FD000
heap
page read and write
14FC4504000
heap
page read and write
781000068000
direct allocation
page read and write
14FC451B000
heap
page read and write
313C000
heap
page read and write
545000
heap
page read and write
14FC4549000
heap
page read and write
18482D09000
unclassified section
page read and write
14FC451B000
heap
page read and write
78140303B000
direct allocation
page read and write
7AB80021C000
direct allocation
page read and write
14FC453D000
heap
page read and write
7FF88AF32000
trusted library allocation
page read and write
26A2CCCC000
heap
page read and write
3144000
heap
page read and write
14FC2698000
heap
page read and write
6B8C3FE000
unkown
page readonly
7810004D0000
direct allocation
page read and write
14FC453C000
heap
page read and write
14FC450C000
heap
page read and write
26A2CD91000
heap
page read and write
7814033F8000
direct allocation
page read and write
22E0000
trusted library allocation
page read and write
26A26491000
heap
page read and write
781403440000
direct allocation
page read and write
14FC4547000
heap
page read and write
14FC44FF000
heap
page read and write
BE0000
heap
page read and write
14FC4529000
heap
page read and write
5B4000
heap
page read and write
14FC4529000
heap
page read and write
14FC4504000
heap
page read and write
A0249FC000
stack
page read and write
14FC4532000
heap
page read and write
26A29A32000
heap
page read and write
478000
remote allocation
page execute and read and write
37DE000
stack
page read and write
781403700000
direct allocation
page read and write
781403CE4000
direct allocation
page read and write
A8455FB000
stack
page read and write
14FC452C000
heap
page read and write
14FC4504000
heap
page read and write
327E000
heap
page read and write
14FC44F6000
heap
page read and write
3143000
heap
page read and write
510000
heap
page read and write
14FC26C9000
heap
page read and write
14FC452B000
heap
page read and write
CFE000
stack
page read and write
14FC4529000
heap
page read and write
14FC4538000
heap
page read and write
14FC4547000
heap
page read and write
781402948000
direct allocation
page read and write
14FC454A000
heap
page read and write
241A000
trusted library allocation
page read and write
781403EC0000
direct allocation
page read and write
14FC452D000
heap
page read and write
315A000
heap
page read and write
14FC4504000
heap
page read and write
781403F4C000
direct allocation
page read and write
184F8F50000
heap
page read and write
14FC452E000
heap
page read and write
14FC4538000
heap
page read and write
14FC4515000
heap
page read and write
14FC44F5000
heap
page read and write
14FC453D000
heap
page read and write
7814037D4000
direct allocation
page read and write
14FC4536000
heap
page read and write
14FC44FD000
heap
page read and write
14FC4524000
heap
page read and write
1CD5F606000
heap
page read and write
14FC452C000
heap
page read and write
1CD614F0000
heap
page read and write
A0149FC000
stack
page read and write
14FC452C000
heap
page read and write
14FC26C7000
heap
page read and write
14FC44E7000
heap
page read and write
781403060000
direct allocation
page read and write
14FC4551000
heap
page read and write
14FC4529000
heap
page read and write
26A29DE0000
unclassified section
page read and write
14FC453A000
heap
page read and write
14FC451F000
heap
page read and write
3B3B000
heap
page read and write
7814039B4000
direct allocation
page read and write
14FC4523000
heap
page read and write
14FC451F000
heap
page read and write
1CD61501000
trusted library allocation
page read and write
14FC4519000
heap
page read and write
14FC4517000
heap
page read and write
14FC4503000
heap
page read and write
14FC454A000
heap
page read and write
7AB8002EC000
direct allocation
page read and write
1CD618CE000
trusted library allocation
page read and write
14FC451A000
heap
page read and write
26A29A04000
heap
page read and write
14FC4527000
heap
page read and write
14FC26FD000
heap
page read and write
14FC4523000
heap
page read and write
781403D50000
direct allocation
page read and write
14FC4522000
heap
page read and write
781403E2C000
direct allocation
page read and write
14FC452C000
heap
page read and write
7814032BC000
direct allocation
page read and write
14FC4537000
heap
page read and write
14FC452C000
heap
page read and write
78100011C000
direct allocation
page read and write
3130000
heap
page read and write
14FC4504000
heap
page read and write
14FC4504000
heap
page read and write
7AB80031A000
direct allocation
page read and write
14FC4504000
heap
page read and write
1CD71501000
trusted library allocation
page read and write
14FC44B0000
heap
page read and write
14523FE000
stack
page read and write
26A2CD91000
heap
page read and write
A02A1FE000
unkown
page readonly
14FC4543000
heap
page read and write
14FC44FD000
heap
page read and write
78100041C000
direct allocation
page read and write
332800078000
direct allocation
page read and write
14FC4545000
heap
page read and write
14FC4517000
heap
page read and write
26A26435000
heap
page read and write
14FC452B000
heap
page read and write
78140223C000
direct allocation
page read and write
3140000
heap
page read and write
450C00138000
trusted library allocation
page read and write
450C0018C000
trusted library allocation
page read and write
14FC450E000
heap
page read and write
781000248000
direct allocation
page read and write
14FC451B000
heap
page read and write
14FC454A000
heap
page read and write
7AB8002D0000
direct allocation
page read and write
518800278000
trusted library allocation
page read and write
72A40028C000
trusted library allocation
page read and write
14FC4560000
heap
page read and write
14FC4554000
heap
page read and write
14FC44FD000
heap
page read and write
14FC44FE000
heap
page read and write
D74000
heap
page read and write
14FC4529000
heap
page read and write
5270000
trusted library allocation
page read and write
14FC4524000
heap
page read and write
14FC452E000
heap
page read and write
14FC4532000
heap
page read and write
14FC4547000
heap
page read and write
14FC452D000
heap
page read and write
14FC44CD000
heap
page read and write
6EBD000
stack
page read and write
23CE000
trusted library allocation
page read and write
781403B11000
direct allocation
page read and write
14FC4504000
heap
page read and write
26A29A23000
heap
page read and write
1CD60F60000
heap
page execute and read and write
14FC44E7000
heap
page read and write
7AB800308000
direct allocation
page read and write
14FC450D000
heap
page read and write
6B903FE000
unkown
page readonly
5D2800044000
direct allocation
page read and write
14FC453B000
heap
page read and write
26A26414000
heap
page read and write
14FC44E7000
heap
page read and write
14FC4535000
heap
page read and write
14FC4517000
heap
page read and write
781000208000
direct allocation
page read and write
A0159FD000
stack
page read and write
14FC4504000
heap
page read and write
14FC4527000
heap
page read and write
723F000
stack
page read and write
314C000
heap
page read and write
14FC4527000
heap
page read and write
26A2D589000
heap
page read and write
14FC452B000
heap
page read and write
14525FF000
stack
page read and write
26A264A5000
heap
page read and write
781403F70000
direct allocation
page read and write
C16000
stack
page read and write
14FC4529000
heap
page read and write
14FC453B000
heap
page read and write
7D5E000
stack
page read and write
1CD79970000
heap
page read and write
26A29A06000
heap
page read and write
14FC4502000
heap
page read and write
14FC451B000
heap
page read and write
14FC44EE000
heap
page read and write
781403CBC000
direct allocation
page read and write
7810004BC000
direct allocation
page read and write
803000
trusted library allocation
page execute and read and write
14FC451E000
heap
page read and write
14FC4521000
heap
page read and write
14FC4522000
heap
page read and write
14FC44E7000
heap
page read and write
14FC453A000
heap
page read and write
6B8EBFD000
stack
page read and write
14FC44F5000
heap
page read and write
14FC4527000
heap
page read and write
14FC44FE000
heap
page read and write
14FC44E7000
heap
page read and write
7814027A4000
direct allocation
page read and write
14FC4541000
heap
page read and write
14FC4524000
heap
page read and write
14FC4529000
heap
page read and write
14FC4503000
heap
page read and write
7FF8FF4F1000
unkown
page execute read
72A400294000
trusted library allocation
page read and write
14FC453F000
heap
page read and write
14FC451A000
heap
page read and write
14FC4524000
heap
page read and write
26A2CDAC000
heap
page read and write
14FC4542000
heap
page read and write
781403E04000
direct allocation
page read and write
14FC452F000
heap
page read and write
14FC454A000
heap
page read and write
14FC44E7000
heap
page read and write
14FC4543000
heap
page read and write
A0329FD000
stack
page read and write
781402578000
direct allocation
page read and write
26A2CD81000
heap
page read and write
51880033C000
trusted library allocation
page read and write
D70000
heap
page read and write
26A2CCCC000
heap
page read and write
BC0000
heap
page read and write
14FC4543000
heap
page read and write
14FC4513000
heap
page read and write
14FC4547000
heap
page read and write
184F9059000
heap
page read and write
2EB4000
heap
page read and write
14FC44FD000
heap
page read and write
14FC4547000
heap
page read and write
A0261FE000
unkown
page readonly
7814024B4000
direct allocation
page read and write
14FC450C000
heap
page read and write
7810000DC000
direct allocation
page read and write
14FC454C000
heap
page read and write
781402C70000
direct allocation
page read and write
14FC44E7000
heap
page read and write
781402BCB000
direct allocation
page read and write
450C0009C000
trusted library allocation
page read and write
14FC44F5000
heap
page read and write
7814031CC000
direct allocation
page read and write
14FC4529000
heap
page read and write
3143000
heap
page read and write
14FC4515000
heap
page read and write
40C6000
direct allocation
page execute and read and write
7810004E8000
direct allocation
page read and write
450C000EC000
trusted library allocation
page read and write
14FC450B000
heap
page read and write
14FC4524000
heap
page read and write
14FC4546000
heap
page read and write
14FC4504000
heap
page read and write
450C00108000
trusted library allocation
page read and write
14FC4529000
heap
page read and write
3375000
trusted library allocation
page read and write
14FC4504000
heap
page read and write
14FC4523000
heap
page read and write
14FC4539000
heap
page read and write
14FC4520000
heap
page read and write
14FC450C000
heap
page read and write
3328000B4000
direct allocation
page read and write
14FC4522000
heap
page read and write
14FC453A000
heap
page read and write
14FC451B000
heap
page read and write
14FC4529000
heap
page read and write
14FC4529000
heap
page read and write
781403160000
direct allocation
page read and write
3143000
heap
page read and write
78140252C000
direct allocation
page read and write
14FC4521000
heap
page read and write
14FC450B000
heap
page read and write
14FC4521000
heap
page read and write
14FC452E000
heap
page read and write
14FC451E000
heap
page read and write
14FC4546000
heap
page read and write
14FC44E7000
heap
page read and write
14FC452C000
heap
page read and write
14FC453B000
heap
page read and write
14FC44E7000
heap
page read and write
A0221FE000
unkown
page readonly
14FC4544000
heap
page read and write
14FC4532000
heap
page read and write
781402DCC000
direct allocation
page read and write
14FC4530000
heap
page read and write
72A4002B4000
trusted library allocation
page read and write
14FC4524000
heap
page read and write
14FC4517000
heap
page read and write
14FC4515000
heap
page read and write
14FC453A000
heap
page read and write
14FC44FD000
heap
page read and write
14FC4520000
heap
page read and write
14FC4547000
heap
page read and write
7FF88AE36000
trusted library allocation
page execute and read and write
14FC44F5000
heap
page read and write
14FC451B000
heap
page read and write
781402B18000
direct allocation
page read and write
14FC44EA000
heap
page read and write
14FC4521000
heap
page read and write
14FC451B000
heap
page read and write
14FC4521000
heap
page read and write
14FC452C000
heap
page read and write
26A2CCF4000
heap
page read and write
14FC4504000
heap
page read and write
14FC4508000
heap
page read and write
14FC4527000
heap
page read and write
14FC452C000
heap
page read and write
26A26444000
heap
page read and write
14FC4517000
heap
page read and write
26A2CCA4000
heap
page read and write
14FC4517000
heap
page read and write
14FC450B000
heap
page read and write
14FC4515000
heap
page read and write
14FC452F000
heap
page read and write
14FC4550000
heap
page read and write
14FC452B000
heap
page read and write
14FC4524000
heap
page read and write
14FC4504000
heap
page read and write
14FC4518000
heap
page read and write
72A400268000
trusted library allocation
page read and write
14FC4553000
heap
page read and write
14FC450B000
heap
page read and write
781403A01000
direct allocation
page read and write
5070000
heap
page read and write
A0179FB000
stack
page read and write
33280002C000
direct allocation
page read and write
14FC4517000
heap
page read and write
C36000
heap
page read and write
10000
unkown
page readonly
2EAE000
stack
page read and write
781403838000
direct allocation
page read and write
14FC4503000
heap
page read and write
14FC452D000
heap
page read and write
14FC4543000
heap
page read and write
14FC4527000
heap
page read and write
14FC44F2000
heap
page read and write
14FC4517000
heap
page read and write
14FC4515000
heap
page read and write
14FC4547000
heap
page read and write
38DB000
stack
page read and write
14FC451E000
heap
page read and write
14FC4518000
heap
page read and write
A01F1FE000
unkown
page readonly
14FC4529000
heap
page read and write
14FC4524000
heap
page read and write
23F5000
trusted library allocation
page read and write
781000218000
direct allocation
page read and write
14FC452D000
heap
page read and write
14FC25B0000
heap
page read and write
14FC4517000
heap
page read and write
313E000
heap
page read and write
2EB4000
heap
page read and write
781403B5C000
direct allocation
page read and write
14FC452D000
heap
page read and write
14FC4547000
heap
page read and write
14FC44E7000
heap
page read and write
14FC4524000
heap
page read and write
14FC4529000
heap
page read and write
14FC4550000
heap
page read and write
14FC44F6000
heap
page read and write
14FC454F000
heap
page read and write
314D000
heap
page read and write
14FC44FE000
heap
page read and write
14FC451B000
heap
page read and write
14FC452F000
heap
page read and write
14FC44E7000
heap
page read and write
14FC44F9000
heap
page read and write
14FC4530000
heap
page read and write
14FC4527000
heap
page read and write
14FC2702000
heap
page read and write
14FC4527000
heap
page read and write
781402801000
direct allocation
page read and write
781402AFB000
direct allocation
page read and write
14FC4529000
heap
page read and write
14FC4530000
heap
page read and write
14FC452F000
heap
page read and write
2EB4000
heap
page read and write
14FC44FF000
heap
page read and write
781000404000
direct allocation
page read and write
14FC450C000
heap
page read and write
14FC4527000
heap
page read and write
14FC453B000
heap
page read and write
14FC4535000
heap
page read and write
78100052C000
direct allocation
page read and write
26A2CCCC000
heap
page read and write
26A2CCF4000
heap
page read and write
1452DFB000
stack
page read and write
781403DAC000
direct allocation
page read and write
14FC452F000
heap
page read and write
14FC4547000
heap
page read and write
14FC451B000
heap
page read and write
14FC4517000
heap
page read and write
14FC4505000
heap
page read and write
14FC44B1000
heap
page read and write
450C000E0000
trusted library allocation
page read and write
781403074000
direct allocation
page read and write
14FC4550000
heap
page read and write
5D2800028000
direct allocation
page read and write
1452BFE000
stack
page read and write
781403864000
direct allocation
page read and write
7FF8FF506000
unkown
page readonly
55F000
heap
page read and write
40B1000
direct allocation
page execute and read and write
14FC452A000
heap
page read and write
78140295C000
direct allocation
page read and write
14FC450B000
heap
page read and write
26A2CCD7000
heap
page read and write
14FC453D000
heap
page read and write
781000140000
direct allocation
page read and write
4BBF000
stack
page read and write
14FC4547000
heap
page read and write
14FC44FD000
heap
page read and write
781402334000
direct allocation
page read and write
781402DEC000
direct allocation
page read and write
7DF413DD0000
trusted library allocation
page execute and read and write
14FC4521000
heap
page read and write
14FC4539000
heap
page read and write
14FC4517000
heap
page read and write
14FC453C000
heap
page read and write
367C000
heap
page read and write
14FC4504000
heap
page read and write
14FC451A000
heap
page read and write
781402F28000
direct allocation
page read and write
14FC4504000
heap
page read and write
14FC4521000
heap
page read and write
7FF88AF01000
trusted library allocation
page read and write
14FC4519000
heap
page read and write
14FC44FD000
heap
page read and write
14FC453A000
heap
page read and write
14FC453D000
heap
page read and write
14FC4529000
heap
page read and write
14FC4504000
heap
page read and write
14FC268C000
heap
page read and write
14FC4527000
heap
page read and write
14FC4517000
heap
page read and write
14FC4547000
heap
page read and write
4E30000
heap
page read and write
3328000B8000
direct allocation
page read and write
14FC4547000
heap
page read and write
7AB80025C000
direct allocation
page read and write
14FC4538000
heap
page read and write
3328000B8000
direct allocation
page read and write
14FC44E7000
heap
page read and write
3130000
heap
page read and write
14FC4543000
heap
page read and write
14FC44F6000
heap
page read and write
4040000
unclassified section
page execute and read and write
78100047C000
direct allocation
page read and write
400000
system
page execute and read and write
781403488000
direct allocation
page read and write
26A2CD9A000
heap
page read and write
89E000
stack
page read and write
22D0000
trusted library allocation
page read and write
450C000C4000
trusted library allocation
page read and write
14FC451A000
heap
page read and write
781402B1C000
direct allocation
page read and write
78140254C000
direct allocation
page read and write
313F000
heap
page read and write
781403A4F000
direct allocation
page read and write
26A2CC98000
heap
page read and write
1CD715D0000
trusted library allocation
page read and write
14FC450C000
heap
page read and write
14FC4515000
heap
page read and write
14FC4517000
heap
page read and write
14FC451A000
heap
page read and write
14FC451C000
heap
page read and write
14FC4541000
heap
page read and write
72A40026C000
trusted library allocation
page read and write
3328000B4000
direct allocation
page read and write
26A2CD8A000
heap
page read and write
184F9075000
heap
page read and write
14FC4524000
heap
page read and write
14FC44FD000
heap
page read and write
781402FA4000
direct allocation
page read and write
5D28000D4000
direct allocation
page read and write
14FC264A000
heap
page read and write
14FC4520000
heap
page read and write
781403D60000
direct allocation
page read and write
781000438000
direct allocation
page read and write
14FC4533000
heap
page read and write
14FC4525000
heap
page read and write
14FC4509000
heap
page read and write
14FC452D000
heap
page read and write
14FC4523000
heap
page read and write
14FC44C7000
heap
page read and write
237F000
trusted library allocation
page read and write
14FC44E7000
heap
page read and write
14FC4515000
heap
page read and write
14FC4523000
heap
page read and write
450C002B0000
trusted library allocation
page read and write
781402B88000
direct allocation
page read and write
14FC4504000
heap
page read and write
14FC44E7000
heap
page read and write
14FC4524000
heap
page read and write
14FC451F000
heap
page read and write
316E000
heap
page read and write
14FC4515000
heap
page read and write
14FC4517000
heap
page read and write
781403C01000
direct allocation
page read and write
7FF8FF515000
unkown
page readonly
14FC4517000
heap
page read and write
14FC4547000
heap
page read and write
14FC450C000
heap
page read and write
781403DD0000
direct allocation
page read and write
781402F00000
direct allocation
page read and write
14FC44FD000
heap
page read and write
26A2CCCC000
heap
page read and write
14FC4521000
heap
page read and write
D75000
heap
page read and write
14FC453B000
heap
page read and write
14FC450A000
heap
page read and write
27AD000
stack
page read and write
14FC4527000
heap
page read and write
14FC452D000
heap
page read and write
26A2CC72000
heap
page read and write
14FC4542000
heap
page read and write
14FC452F000
heap
page read and write
3150000
heap
page read and write
26A2CE12000
heap
page read and write
14FC4506000
heap
page read and write
14FC452D000
heap
page read and write
14FC44F6000
heap
page read and write
14FC4557000
heap
page read and write
5D2800004000
direct allocation
page read and write
14FC4523000
heap
page read and write
14FC4520000
heap
page read and write
14FC451A000
heap
page read and write
14FC4527000
heap
page read and write
14FC4524000
heap
page read and write
14FC4504000
heap
page read and write
14FC4524000
heap
page read and write
781403578000
direct allocation
page read and write
14FC4509000
heap
page read and write
C9C000
stack
page read and write
14FC4547000
heap
page read and write
14FC4551000
heap
page read and write
781403601000
direct allocation
page read and write
14FC4527000
heap
page read and write
14FC453D000
heap
page read and write
14FC44E7000
heap
page read and write
14FC44F2000
heap
page read and write
14FC4527000
heap
page read and write
14FC4517000
heap
page read and write
14FC25FB000
heap
page read and write
14FC4529000
heap
page read and write
14FC4534000
heap
page read and write
14FC44FD000
heap
page read and write
14FC4524000
heap
page read and write
14FC4529000
heap
page read and write
14FC4504000
heap
page read and write
14FC453B000
heap
page read and write
7814039E8000
direct allocation
page read and write
14FC4547000
heap
page read and write
14FC4529000
heap
page read and write
14FC4504000
heap
page read and write
14FC453C000
heap
page read and write
14FC451E000
heap
page read and write
14FC25FA000
heap
page read and write
14FC4514000
heap
page read and write
14FC4522000
heap
page read and write
14FC4538000
heap
page read and write
14FC4524000
heap
page read and write
78100059C000
direct allocation
page read and write
14FC4529000
heap
page read and write
14FC4556000
heap
page read and write
14FC4519000
heap
page read and write
781402724000
direct allocation
page read and write
781403AD8000
direct allocation
page read and write
14FC4527000
heap
page read and write
14FC453B000
heap
page read and write
14FC4507000
heap
page read and write
781402DCF000
direct allocation
page read and write
14FC4545000
heap
page read and write
14FC4527000
heap
page read and write
1CD795C1000
heap
page read and write
14FC4520000
heap
page read and write
781402AC4000
direct allocation
page read and write
14FC4524000
heap
page read and write
14FC44E7000
heap
page read and write
781403A04000
direct allocation
page read and write
14FC4532000
heap
page read and write
800000
trusted library allocation
page read and write
14FC4518000
heap
page read and write
26A26483000
heap
page read and write
14FC4504000
heap
page read and write
14FC4524000
heap
page read and write
14FC4547000
heap
page read and write
14FC44F5000
heap
page read and write
14FC44E7000
heap
page read and write
48E000
stack
page read and write
518800304000
trusted library allocation
page read and write
3270000
heap
page read and write
7810000BC000
direct allocation
page read and write
14FC4537000
heap
page read and write
14FC4541000
heap
page read and write
7AB800212000
direct allocation
page read and write
14FC4517000
heap
page read and write
14FC4503000
heap
page read and write
14FC4529000
heap
page read and write
14FC4525000
heap
page read and write
14FC4530000
heap
page read and write
14FC4517000
heap
page read and write
14FC4523000
heap
page read and write
14FC4527000
heap
page read and write
14FC4517000
heap
page read and write
14FC4515000
heap
page read and write
332800088000
direct allocation
page read and write
14FC4520000
heap
page read and write
14FC4530000
heap
page read and write
781402A70000
direct allocation
page read and write
14FC44FD000
heap
page read and write
14FC4529000
heap
page read and write
14FC453B000
heap
page read and write
14FC4524000
heap
page read and write
781403684000
direct allocation
page read and write
14FC455B000
heap
page read and write
14FC4547000
heap
page read and write
14FC452D000
heap
page read and write
781403F44000
direct allocation
page read and write
313F000
heap
page read and write
26A264B7000
heap
page read and write
3150000
heap
page read and write
14FC4529000
heap
page read and write
14FC4524000
heap
page read and write
14FC4520000
heap
page read and write
14FC4547000
heap
page read and write
14FC4523000
heap
page read and write
14FC451A000
heap
page read and write
14FC4515000
heap
page read and write
14FC4527000
heap
page read and write
14FC451C000
heap
page read and write
14FC452A000
heap
page read and write
D50000
heap
page read and write
14FC452F000
heap
page read and write
14FC4517000
heap
page read and write
7810004A0000
direct allocation
page read and write
14FC4527000
heap
page read and write
7814025E3000
direct allocation
page read and write
3148000
heap
page read and write
14FC451F000
heap
page read and write
14FC44EA000
heap
page read and write
14FC4550000
heap
page read and write
14FC4511000
heap
page read and write
7FF8FF4F0000
unkown
page readonly
3155000
heap
page read and write
14FC44FD000
heap
page read and write
506F000
stack
page read and write
14FC4538000
heap
page read and write
781403D88000
direct allocation
page read and write
3328000D0000
direct allocation
page read and write
14FC4547000
heap
page read and write
14FC4515000
heap
page read and write
7FF88AF60000
trusted library allocation
page read and write
14FC451C000
heap
page read and write
14FC452B000
heap
page read and write
781403A2C000
direct allocation
page read and write
14FC454C000
heap
page read and write
CD9000
stack
page read and write
14FC44E7000
heap
page read and write
14FC4547000
heap
page read and write
14FC4527000
heap
page read and write
14FC4780000
heap
page read and write
14FC451D000
heap
page read and write
781402BBD000
direct allocation
page read and write
14FC4527000
heap
page read and write
781403CB4000
direct allocation
page read and write
14FC4549000
heap
page read and write
14FC4529000
heap
page read and write
184F8F60000
heap
page readonly
51E000
heap
page read and write
606000
heap
page read and write
26A2CDF8000
heap
page read and write
14FC44F9000
heap
page read and write
14FC4524000
heap
page read and write
781403D9C000
direct allocation
page read and write
14FC4512000
heap
page read and write
14FC4529000
heap
page read and write
781402BF8000
direct allocation
page read and write
14FC4529000
heap
page read and write
26A2CCCC000
heap
page read and write
14FC451C000
heap
page read and write
14FC4540000
heap
page read and write
BA4000
heap
page read and write
781000498000
direct allocation
page read and write
518800254000
trusted library allocation
page read and write
781000490000
direct allocation
page read and write
14FC4515000
heap
page read and write
14FC452B000
heap
page read and write
7814027E0000
direct allocation
page read and write
6B8B3FE000
unkown
page readonly
14FC4515000
heap
page read and write
14FC4507000
heap
page read and write
14FC4521000
heap
page read and write
14FC4525000
heap
page read and write
14527FF000
stack
page read and write
14FC4562000
heap
page read and write
14FC4515000
heap
page read and write
14FC451A000
heap
page read and write
14FC4535000
heap
page read and write
14FC4529000
heap
page read and write
14FC4524000
heap
page read and write
14FC451A000
heap
page read and write
14FC4504000
heap
page read and write
14FC4549000
heap
page read and write
14FC453B000
heap
page read and write
781403870000
direct allocation
page read and write
A01B9FC000
stack
page read and write
9DF000
stack
page read and write
14FC453C000
heap
page read and write
7814037B4000
direct allocation
page read and write
14FC4521000
heap
page read and write
14FC453F000
heap
page read and write
14FC4506000
heap
page read and write
14FC453B000
heap
page read and write
450C00255000
trusted library allocation
page read and write