IOC Report
x.exe

loading gif

Files

File Path
Type
Category
Malicious
x.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Program Files (x86)\AutoIt3\Au3Check.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\AutoIt3\Au3Info.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\AutoIt3\Au3Info_x64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\AutoIt3\Aut2Exe\Aut2exe.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\AutoIt3\Aut2Exe\Aut2exe_x64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\AutoIt3\Aut2Exe\upx.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\AutoIt3\AutoIt3Help.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\AutoIt3\AutoIt3_x64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\AutoIt3\Uninstall.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\AdobeARMHelper.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\Adobe\ARM\1.0\armsvc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\Java\Java Update\jaureg.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\Java\Java Update\jucheck.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\Java\Java Update\jusched.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\Microsoft Shared\OFFICE16\LICLUA.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\Microsoft Shared\VSTO\10.0\VSTOInstaller.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\java.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaw.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\Oracle\Java\javapath_target_749031\javaws.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleCrashHandler.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleCrashHandler64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdate.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateBroker.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateComRegisterShell64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateCore.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\Update\1.3.36.312\GoogleUpdateOnDemand.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\Update\Download\{8A69D345-D564-463C-AFF1-A69D9E530F96}\117.0.5938.134\117.0.5938.134_117.0.5938.132_chrome_updater.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Google\Update\Install\{6BB58CDD-A64E-41C8-8D92-79A516D3D118}\117.0.5938.134_117.0.5938.132_chrome_updater.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Java\jre-1.8\bin\java.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Java\jre-1.8\bin\javacpl.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Java\jre-1.8\bin\javaw.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Java\jre-1.8\bin\javaws.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Java\jre-1.8\bin\jp2launcher.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Java\jre-1.8\bin\ssvagent.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Java\jre-1.8\bin\unpack200.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\Office16\OSPPREARM.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Client\AppVDllSurrogate.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Client\AppVDllSurrogate32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Client\AppVDllSurrogate64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Client\AppVLP.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Integration\Integrator.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\ACCICONS.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\ADDINS\Microsoft Power Query for Excel Integrated\bin\Microsoft.Mashup.Container.Loader.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\AppSharingHookController.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\CLVIEW.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\CNFNOT32.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\DCF\Common.DBConnection.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\DCF\Common.DBConnection64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\DCF\DATABASECOMPARE.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\DCF\SPREADSHEETCOMPARE.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\DCF\filecompare.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\GRAPH.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\IEContentService.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\MSOHTMED.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\MSOSREC.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\MSQRY32.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\NAMECONTROLSERVER.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\OLCFG.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTE.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\ONENOTEM.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\ORGCHART.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\OcPubMgr.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\OfficeScrBroker.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\OfficeScrSanBroker.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\POWERPNT.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\PPTICO.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\PerfBoost.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\SCANPST.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\SDXHelper.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\SELFCERT.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\SETLANG.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\SkypeSrv\SKYPESERVER.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\UcMapi.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\VPREVIEW.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\WINWORD.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\WORDICON.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\Wordconv.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\XLICONS.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\lync99.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\misc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\msoadfsb.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\msoasb.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\msoev.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\Office16\officeappguardwin32.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\MSOXMLED.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\ai.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\Office16\aimgr.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX64\Microsoft Shared\OfficeSoftwareProtectionPlatform\OSPPSVC.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\DW\DW20.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Office16\FLTLDR.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Office16\MSOICONS.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Office16\MSOXMLED.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Office16\OLicenseHeartbeat.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Office16\ai.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Office16\aimgr.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesCommonX86\Microsoft Shared\Source Engine\OSE.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Office\Office16\AppSharingHookController64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesX64\Microsoft Office\Office16\MSOHTMED.EXE
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\ProgramFilesX86\Microsoft Analysis Services\AS OLEDB\140\SQLDumper.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\accicons.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\dbcicons.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\grv_icons.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\joticon.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\lyncicon.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\misc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\osmclienticon.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\outicon.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\pj11icon.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\pptico.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\pubs.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\sscicons.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\visicon.exe
PE32 executable (GUI) Intel 80386, for MS Windows
modified
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\wordicon.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-000F-0000-0000-0000000FF1CE}\xlicons.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0409-0000-0000000FF1CE}\misc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-040C-0000-0000000FF1CE}\misc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-001F-0C0A-0000-0000000FF1CE}\misc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft Office\root\vfs\Windows\Installer\{90160000-006E-0409-0000-0000000FF1CE}\misc.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\BHO\ie_to_edge_stub.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\Installer\setup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\cookie_exporter.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\elevation_service.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\identity_helper.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\msedge.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\msedge_proxy.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\msedge_pwa_launcher.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\msedgewebview2.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\notification_click_helper.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\117.0.2045.47\pwahelper.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\msedge_proxy.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Edge\Application\pwahelper.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\MicrosoftEdgeComRegisterShellARM64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\MicrosoftEdgeUpdate.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\MicrosoftEdgeUpdateBroker.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\MicrosoftEdgeUpdateComRegisterShell64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\MicrosoftEdgeUpdateCore.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\MicrosoftEdgeUpdateOnDemand.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\Temp\EUC7A5.tmp\MicrosoftEdgeUpdateSetup.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Mozilla Maintenance Service\Uninstall.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Program Files (x86)\Mozilla Maintenance Service\maintenanceservice.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Java Update Checker (64 bit).exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\ConfigSecurityPolicy.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\MpCmdRun.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\MpCopyAccelerator.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\MpDlpCmd.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\MsMpEng.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\NisSrv.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\X86\MpCmdRun.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23080.2006-0\mpextms.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23090.2008-0\ConfigSecurityPolicy.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23090.2008-0\MpCmdRun.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23090.2008-0\MpCopyAccelerator.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23090.2008-0\MpDefenderCoreService.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23090.2008-0\MpDlpCmd.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23090.2008-0\MsMpEng.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23090.2008-0\NisSrv.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23090.2008-0\X86\MpCmdRun.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows Defender\Platform\4.18.23090.2008-0\mpextms.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\3582-490\x.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\chrome.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\directx.sys
ASCII text, with CRLF line terminators
modified
malicious
C:\Windows\svchost.com
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2cbsypgj.c4c.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3gs332ou.mfc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4llzpea3.g3f.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g0vzrbmt.zgv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g4c20dzv.aed.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ivoxms4b.2oc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ixtvzzfz.52k.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ldfn2iji.zvg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o4ygcr2q.p44.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qprp5jsv.tsr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_swpw52rp.zt3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tvq4qe4z.31f.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xbh2255q.cvx.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xfc23mpl.kwl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_y05p14tz.0fh.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yk2pssit.ifk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp5023.tmp
data
modified
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7G46U5J9MCOHHB2YX6CQ.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\LHEPMEXKDNKGVL8ATG5L.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\QB8UZYK2CA73L16SLSIP.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\WU8EDVM8BJGECJW85P0I.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF3d1208.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF3d1525.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms~RF3d1738.TMP (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Java Update Checker (64 bit).lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jul 2 04:56:40 2024, mtime=Tue Jul 2 04:56:40 2024, atime=Tue Jul 2 04:56:40 2024, length=46592, window=hide
dropped
There are 185 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\x.exe
"C:\Users\user\Desktop\x.exe"
malicious
C:\Users\user\AppData\Local\Temp\3582-490\x.exe
"C:\Users\user~1\AppData\Local\Temp\3582-490\x.exe"
malicious
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user~1\AppData\Local\Temp\3582-490\x.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user~1\AppData\Local\Temp\3582-490\x.exe'
malicious
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'x.exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'x.exe'
malicious
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Java Update Checker (64 bit).exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Java Update Checker (64 bit).exe'
malicious
C:\Windows\svchost.com
"C:\Windows\svchost.com" "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Java Update Checker (64 bit).exe'
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'Java Update Checker (64 bit).exe'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
45.141.26.232
malicious
http://www.autoitscript.com/autoit3/J
unknown
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://nsis.sf.net/NSIS_ErrorError
unknown
http://www.autoitscript.com/autoit3/
unknown
https://www.autoitscript.com/autoit3/
unknown
https://github.com/Pester/Pester
unknown
http://crl.m
unknown
https://github.com/pq-crystals/kyber/commit/28413dfbf523fdde181246451c2bd77199c0f7ffDilithium2Dilith
unknown
http://crl.micro
unknown
https://aka.ms/pscore6lB
unknown
https://ion=v4.5
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://ip-api.com
unknown
http://127.0.0.1:13556/InsiderSlabBehaviorReportedBuildInsiderSlabBehaviorInsiderSlabBehaviorReporte
unknown
http://www.autoitscript.com/autoit3/8
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/pq-crystals/kyber/commit/28413dfbf523fdde181246451c2bd77199c0f7ff
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 16 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
45.141.26.232
unknown
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Classes\exefile\shell\open\command
NULL
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASMANCS
FileDirectory
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\svchost.com.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\svchost.com.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\svchost.com.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\svchost.com.ApplicationCompany
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\svchost.com.ApplicationCompany
There are 11 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
30CE000
trusted library allocation
page read and write
malicious
3001000
trusted library allocation
page read and write
malicious
DC2000
unkown
page readonly
malicious
409000
unkown
page read and write
malicious
54AC000
stack
page read and write
267E000
stack
page read and write
44B0000
trusted library allocation
page read and write
666A000
trusted library allocation
page read and write
4FE0000
trusted library allocation
page execute and read and write
1FD8000
direct allocation
page read and write
7CD0000
trusted library allocation
page execute and read and write
13001000
trusted library allocation
page read and write
1F3E000
stack
page read and write
765E000
stack
page read and write
723B000
stack
page read and write
73F0000
trusted library allocation
page read and write
85CB000
heap
page read and write
2060000
direct allocation
page read and write
7FFAACC36000
trusted library allocation
page read and write
1FF8000
direct allocation
page read and write
7380000
trusted library allocation
page read and write
8500000
trusted library allocation
page read and write
3060000
heap
page read and write
463C000
stack
page read and write
51FF000
trusted library allocation
page read and write
1FDC000
direct allocation
page read and write
203F000
stack
page read and write
1BF9E000
stack
page read and write
193000
stack
page read and write
2CC0000
heap
page read and write
45B8000
trusted library allocation
page read and write
7810000
trusted library allocation
page read and write
4E50000
trusted library allocation
page read and write
2070000
direct allocation
page read and write
855A000
heap
page read and write
7EF0000
trusted library allocation
page read and write
1FDC000
direct allocation
page read and write
6DFD000
stack
page read and write
206C000
direct allocation
page read and write
206C000
direct allocation
page read and write
87F0000
trusted library allocation
page execute and read and write
4941000
trusted library allocation
page read and write
484E000
stack
page read and write
72A0000
heap
page execute and read and write
206C000
direct allocation
page read and write
7A30000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
6AC000
heap
page read and write
88F0000
trusted library allocation
page execute and read and write
81B2000
trusted library allocation
page read and write
5370000
trusted library allocation
page execute and read and write
206C000
direct allocation
page read and write
4510000
trusted library allocation
page read and write
1FDC000
direct allocation
page read and write
7F0D000
stack
page read and write
6282000
trusted library allocation
page read and write
846E000
stack
page read and write
76EB000
heap
page read and write
565000
heap
page read and write
57F1000
trusted library allocation
page read and write
5226000
trusted library allocation
page read and write
7FFAACBA4000
trusted library allocation
page read and write
8363000
trusted library allocation
page read and write
2EF0000
heap
page read and write
7F040000
trusted library allocation
page execute and read and write
2073000
direct allocation
page read and write
4E6A000
trusted library allocation
page execute and read and write
1FE4000
direct allocation
page read and write
9C000
stack
page read and write
2DFB000
heap
page read and write
6B7E000
stack
page read and write
4505000
trusted library allocation
page execute and read and write
7EA0000
trusted library allocation
page read and write
6262000
trusted library allocation
page read and write
1FDC000
direct allocation
page read and write
80FE000
heap
page read and write
2CE0000
heap
page read and write
6527000
trusted library allocation
page read and write
500000
heap
page read and write
5D6000
heap
page read and write
6D3D000
stack
page read and write
897E000
stack
page read and write
1293000
heap
page read and write
7E2D000
trusted library allocation
page read and write
337D000
heap
page read and write
85B9000
stack
page read and write
1FDC000
direct allocation
page read and write
194000
stack
page read and write
1FDC000
direct allocation
page read and write
761E000
stack
page read and write
7C1B000
heap
page read and write
778D000
heap
page read and write
81E000
stack
page read and write
1FF8000
direct allocation
page read and write
8598000
heap
page read and write
2F90000
heap
page read and write
285E000
stack
page read and write
704AD000
unkown
page read and write
986000
heap
page read and write
7D30000
trusted library allocation
page read and write
85CD000
stack
page read and write
1FDC000
direct allocation
page read and write
564A000
trusted library allocation
page read and write
B20000
heap
page read and write
4B1D000
stack
page read and write
2068000
direct allocation
page read and write
85E000
stack
page read and write
966000
heap
page read and write
488E000
stack
page read and write
7A50000
trusted library allocation
page read and write
6DBD000
stack
page read and write
48D0000
heap
page read and write
69E0000
trusted library allocation
page read and write
52FB000
trusted library allocation
page read and write
7FFAACBAD000
trusted library allocation
page execute and read and write
8572000
heap
page read and write
1B9B0000
heap
page read and write
1FDC000
direct allocation
page read and write
2080000
heap
page read and write
8B1E000
stack
page read and write
1F0000
heap
page read and write
79A0000
trusted library allocation
page read and write
7EC0000
trusted library allocation
page read and write
7FFAACB9D000
trusted library allocation
page execute and read and write
1F0000
heap
page read and write
8E43000
trusted library allocation
page read and write
5D0000
heap
page read and write
400000
unkown
page readonly
752E000
stack
page read and write
2FA0000
heap
page read and write
1FDC000
direct allocation
page read and write
920000
heap
page read and write
7A81000
heap
page read and write
73C0000
trusted library allocation
page read and write
8A20000
trusted library allocation
page read and write
7BF2000
heap
page read and write
8810000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
1FF8000
direct allocation
page read and write
789E000
stack
page read and write
C00000
trusted library section
page read and write
6FC0000
heap
page read and write
7E4D000
stack
page read and write
2100000
direct allocation
page read and write
7110000
heap
page read and write
85A8000
heap
page read and write
1FDC000
direct allocation
page read and write
6A2000
heap
page read and write
7FB8000
heap
page read and write
5C91000
trusted library allocation
page read and write
1BB90000
heap
page execute and read and write
64E9000
trusted library allocation
page read and write
4EA3000
trusted library allocation
page read and write
7E30000
trusted library allocation
page read and write
7FFAACC66000
trusted library allocation
page execute and read and write
1B030000
trusted library allocation
page read and write
2078000
direct allocation
page read and write
2EDB000
stack
page read and write
640000
heap
page read and write
8232000
trusted library allocation
page read and write
4C1E000
stack
page read and write
4C7A000
stack
page read and write
2068000
direct allocation
page read and write
5961000
trusted library allocation
page read and write
15D0000
trusted library allocation
page read and write
B69000
stack
page read and write
799E000
stack
page read and write
5AF2000
trusted library allocation
page read and write
6C90000
heap
page read and write
73F000
stack
page read and write
756E000
stack
page read and write
7F6D000
trusted library allocation
page read and write
493E000
stack
page read and write
1FDC000
direct allocation
page read and write
4FF0000
trusted library allocation
page read and write
7E60000
trusted library allocation
page read and write
7FC8000
heap
page read and write
9ED000
stack
page read and write
4907000
heap
page read and write
6A75000
heap
page execute and read and write
8061000
heap
page read and write
8C1E000
stack
page read and write
4E4D000
trusted library allocation
page execute and read and write
1FDC000
direct allocation
page read and write
7D8E000
stack
page read and write
73B0000
trusted library allocation
page read and write
69DC000
stack
page read and write
B80000
heap
page read and write
2D98000
heap
page read and write
206C000
direct allocation
page read and write
7FFAACB80000
trusted library allocation
page read and write
4B5B000
stack
page read and write
76C0000
heap
page read and write
8780000
trusted library allocation
page read and write
547000
heap
page read and write
44EA000
trusted library allocation
page execute and read and write
794D000
stack
page read and write
49CB000
stack
page read and write
206C000
direct allocation
page read and write
5330000
trusted library allocation
page read and write
C2D000
trusted library allocation
page execute and read and write
1FDC000
direct allocation
page read and write
204E000
stack
page read and write
8071000
heap
page read and write
6CB000
heap
page read and write
7FC0000
heap
page read and write
7FCC8000
trusted library allocation
page execute and read and write
7063000
heap
page read and write
71AD000
heap
page read and write
8028000
heap
page read and write
1FDC000
direct allocation
page read and write
1FDC000
direct allocation
page read and write
2E50000
heap
page read and write
72EE000
stack
page read and write
8260000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
863F000
stack
page read and write
7FC0000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
7EE0000
trusted library allocation
page read and write
45E0000
trusted library allocation
page read and write
7C80000
heap
page execute and read and write
6137000
trusted library allocation
page read and write
6D7B000
stack
page read and write
1C3DE000
stack
page read and write
206C000
direct allocation
page read and write
1FDC000
direct allocation
page read and write
71B2000
heap
page read and write
1FDC000
direct allocation
page read and write
455E000
stack
page read and write
B2E000
stack
page read and write
7220000
trusted library allocation
page read and write
1F0000
heap
page read and write
3067000
heap
page read and write
777A000
heap
page read and write
7430000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
1FDC000
direct allocation
page read and write
1FDC000
direct allocation
page read and write
7420000
trusted library allocation
page read and write
C24000
trusted library allocation
page read and write
7FCB0000
trusted library allocation
page execute and read and write
6F3E000
stack
page read and write
7FFAACC40000
trusted library allocation
page execute and read and write
7A00000
trusted library allocation
page read and write
948000
heap
page read and write
44CD000
trusted library allocation
page execute and read and write
7FFAACD30000
trusted library allocation
page execute and read and write
30A2000
trusted library allocation
page read and write
2F18000
stack
page read and write
7E9D000
stack
page read and write
2068000
direct allocation
page read and write
1FDC000
direct allocation
page read and write
7FFAACC30000
trusted library allocation
page read and write
905E000
stack
page read and write
5AFD000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
3097000
trusted library allocation
page read and write
771E000
stack
page read and write
4E70000
trusted library allocation
page read and write
7A20000
trusted library allocation
page read and write
79B0000
trusted library allocation
page read and write
860E000
stack
page read and write
1F10000
direct allocation
page read and write
1FDC000
direct allocation
page read and write
7D1E000
stack
page read and write
58A0000
trusted library allocation
page read and write
75C1000
heap
page read and write
5616000
trusted library allocation
page read and write
26FE000
stack
page read and write
131D000
heap
page read and write
4F1E000
stack
page read and write
6664000
trusted library allocation
page read and write
1FDC000
direct allocation
page read and write
44C4000
trusted library allocation
page read and write
4E43000
trusted library allocation
page execute and read and write
807C000
heap
page read and write
734D000
stack
page read and write
6A70000
heap
page execute and read and write
2088000
direct allocation
page read and write
80E2000
heap
page read and write
530000
heap
page read and write
2068000
direct allocation
page read and write
8C92000
trusted library allocation
page read and write
7820000
trusted library allocation
page read and write
1470000
heap
page read and write
1FDC000
direct allocation
page read and write
1150000
heap
page read and write
1273000
heap
page read and write
1FD8000
direct allocation
page read and write
7FFAACD50000
trusted library allocation
page read and write
4F0000
heap
page read and write
5E38000
trusted library allocation
page read and write
5642000
trusted library allocation
page read and write
B87000
heap
page read and write
206C000
direct allocation
page read and write
418000
unkown
page readonly
6FD0000
heap
page read and write
1FDC000
direct allocation
page read and write
5319000
trusted library allocation
page read and write
2750000
heap
page read and write
1FDC000
direct allocation
page read and write
759D000
stack
page read and write
74C0000
trusted library allocation
page read and write
8530000
trusted library allocation
page execute and read and write
46CE000
stack
page read and write
8B9E000
stack
page read and write
1FF8000
direct allocation
page read and write
86FE000
stack
page read and write
8910000
trusted library allocation
page read and write
7F7A0000
trusted library allocation
page execute and read and write
6948000
trusted library allocation
page read and write
8AC1000
heap
page read and write
1CAE0000
heap
page read and write
44FA000
trusted library allocation
page execute and read and write
19D000
stack
page read and write
719A000
heap
page read and write
1FDC000
direct allocation
page read and write
206C000
direct allocation
page read and write
7980000
trusted library allocation
page execute and read and write
12BD000
heap
page read and write
863D000
stack
page read and write
7FFAACD20000
trusted library allocation
page read and write
7E50000
trusted library allocation
page read and write
890B000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
206C000
direct allocation
page read and write
60D1000
trusted library allocation
page read and write
938000
heap
page read and write
206C000
direct allocation
page read and write
725E000
stack
page read and write
ADF000
stack
page read and write
206C000
direct allocation
page read and write
8555000
heap
page read and write
7FBC000
heap
page read and write
4A96000
trusted library allocation
page read and write
2100000
heap
page read and write
2064000
direct allocation
page read and write
5E27000
trusted library allocation
page read and write
7F40000
trusted library allocation
page read and write
44F0000
trusted library allocation
page read and write
2068000
direct allocation
page read and write
309F000
trusted library allocation
page read and write
7F50000
heap
page read and write
788E000
stack
page read and write
557000
stack
page read and write
206C000
direct allocation
page read and write
7040000
heap
page read and write
662000
heap
page read and write
1FF8000
direct allocation
page read and write
1FDC000
direct allocation
page read and write
699C000
stack
page read and write
8BDC000
stack
page read and write
743B000
stack
page read and write
65F000
stack
page read and write
7C02000
heap
page read and write
7430000
trusted library allocation
page read and write
7B80000
heap
page read and write
206C000
direct allocation
page read and write
769E000
stack
page read and write
AAE000
stack
page read and write
58A2000
trusted library allocation
page read and write
73BC000
stack
page read and write
194000
stack
page read and write
795000
heap
page read and write
7460000
trusted library allocation
page read and write
7181000
heap
page read and write
1FD8000
direct allocation
page read and write
7FB0000
heap
page read and write
5310000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
7A10000
trusted library allocation
page read and write
7480000
trusted library allocation
page read and write
2FFE000
stack
page read and write
30E1000
trusted library allocation
page read and write
7990000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
206C000
direct allocation
page read and write
6279000
trusted library allocation
page read and write
1FDC000
direct allocation
page read and write
700E000
heap
page read and write
8104000
heap
page read and write
67E000
heap
page read and write
8970000
trusted library allocation
page read and write
70E1000
heap
page read and write
540000
heap
page read and write
7E0E000
stack
page read and write
74EE000
stack
page read and write
8B8D000
heap
page read and write
4DE7000
trusted library allocation
page read and write
6B7000
heap
page read and write
5A25000
trusted library allocation
page read and write
4ED0000
heap
page read and write
5304000
trusted library allocation
page read and write
4D17000
heap
page read and write
1CAE5000
heap
page read and write
737E000
stack
page read and write
80DE000
heap
page read and write
2150000
heap
page read and write
858E000
stack
page read and write
5E3F000
trusted library allocation
page read and write
1FE8000
direct allocation
page read and write
80D5000
heap
page read and write
7550000
heap
page execute and read and write
7EDE000
stack
page read and write
505D000
trusted library allocation
page read and write
856A000
heap
page read and write
1BFA6000
heap
page read and write
704AF000
unkown
page readonly
583C000
trusted library allocation
page read and write
467C000
stack
page read and write
4500000
trusted library allocation
page read and write
7840000
heap
page execute and read and write
8032000
heap
page read and write
1FDC000
direct allocation
page read and write
74A0000
trusted library allocation
page read and write
96D000
heap
page read and write
1FF8000
direct allocation
page read and write
732F000
stack
page read and write
4BDF000
stack
page read and write
1F0000
heap
page read and write
7400000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
710B000
stack
page read and write
206C000
direct allocation
page read and write
84EE000
stack
page read and write
4E75000
trusted library allocation
page execute and read and write
81C0000
trusted library allocation
page read and write
52C0000
trusted library allocation
page read and write
1FDC000
direct allocation
page read and write
5300000
trusted library allocation
page read and write
718C000
heap
page read and write
8B82000
heap
page read and write
8350000
trusted library allocation
page read and write
1C7D5000
stack
page read and write
6AFB000
stack
page read and write
8030000
heap
page read and write
7D2A000
trusted library allocation
page read and write
6C6000
heap
page read and write
4DE8000
trusted library allocation
page read and write
7FFAACCA0000
trusted library allocation
page execute and read and write
7F7B8000
trusted library allocation
page execute and read and write
78DE000
stack
page read and write
9C000
stack
page read and write
1FF8000
direct allocation
page read and write
206C000
direct allocation
page read and write
6C00000
heap
page read and write
53B4000
trusted library allocation
page read and write
1FDC000
direct allocation
page read and write
206C000
direct allocation
page read and write
7F90000
trusted library allocation
page read and write
2088000
direct allocation
page read and write
6673000
trusted library allocation
page read and write
4F0000
heap
page read and write
76B0000
heap
page read and write
698000
heap
page read and write
206C000
direct allocation
page read and write
53CE000
stack
page read and write
4D10000
heap
page read and write
6B5000
heap
page read and write
206C000
direct allocation
page read and write
7A40000
trusted library allocation
page read and write
6A5000
heap
page read and write
A0A000
heap
page read and write
2088000
direct allocation
page read and write
1111000
stack
page read and write
498D000
stack
page read and write
206C000
direct allocation
page read and write
30B8000
trusted library allocation
page read and write
1600000
heap
page execute and read and write
7F6B000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
71F0000
heap
page execute and read and write
909D000
stack
page read and write
1FDC000
direct allocation
page read and write
6DCE000
stack
page read and write
714E000
stack
page read and write
A5F000
stack
page read and write
692000
heap
page read and write
6ABD000
stack
page read and write
780E000
stack
page read and write
7470000
trusted library allocation
page read and write
7490000
trusted library allocation
page read and write
856E000
heap
page read and write
206C000
direct allocation
page read and write
509D000
stack
page read and write
803C000
heap
page read and write
4E60000
trusted library allocation
page read and write
1FDC000
direct allocation
page read and write
3358000
heap
page read and write
1FF8000
direct allocation
page read and write
5639000
trusted library allocation
page read and write
7F87000
trusted library allocation
page read and write
4E60000
heap
page read and write
73FD000
stack
page read and write
4770000
heap
page execute and read and write
7FD18000
trusted library allocation
page execute and read and write
44D9000
trusted library allocation
page read and write
1FDC000
direct allocation
page read and write
5CB9000
trusted library allocation
page read and write
220F000
stack
page read and write
6BE000
heap
page read and write
AF0000
trusted library section
page read and write
550000
heap
page read and write
8AC5000
heap
page read and write
8059000
heap
page read and write
5418000
trusted library allocation
page read and write
513D000
trusted library allocation
page read and write
7410000
trusted library allocation
page read and write
145E000
stack
page read and write
206C000
direct allocation
page read and write
2088000
direct allocation
page read and write
2050000
direct allocation
page read and write
3373000
heap
page read and write
7EB0000
trusted library allocation
page read and write
5BFB000
trusted library allocation
page read and write
45B7000
heap
page read and write
75DB000
stack
page read and write
7FFAACB84000
trusted library allocation
page read and write
1FD0000
direct allocation
page read and write
8C5E000
stack
page read and write
8AB1000
heap
page read and write
7F00000
trusted library allocation
page read and write
83D0000
trusted library allocation
page read and write
76D2000
heap
page read and write
BBD000
stack
page read and write
1FDC000
direct allocation
page read and write
1FDC000
direct allocation
page read and write
53B2000
trusted library allocation
page read and write
8240000
trusted library allocation
page read and write
44F0000
trusted library allocation
page read and write
1FE0000
direct allocation
page read and write
532A000
trusted library allocation
page execute and read and write
7DE000
stack
page read and write
206C000
direct allocation
page read and write
8064000
heap
page read and write
8983000
trusted library allocation
page read and write
87E0000
trusted library allocation
page read and write
1FDC000
direct allocation
page read and write
206C000
direct allocation
page read and write
1FE3000
direct allocation
page read and write
45D0000
trusted library allocation
page execute and read and write
34D7000
heap
page read and write
505F000
trusted library allocation
page read and write
992000
heap
page read and write
8760000
trusted library allocation
page read and write
6BBD000
stack
page read and write
4C91000
trusted library allocation
page read and write
890D000
trusted library allocation
page read and write
3320000
heap
page read and write
130E000
heap
page read and write
1FF8000
direct allocation
page read and write
7ED0000
trusted library allocation
page read and write
4F0000
heap
page read and write
2B9E000
stack
page read and write
8CB0000
trusted library allocation
page execute and read and write
7052000
heap
page read and write
458E000
stack
page read and write
7450000
trusted library allocation
page read and write
8628000
heap
page read and write
30F2000
trusted library allocation
page read and write
1BAFE000
stack
page read and write
2FD0000
heap
page read and write
206C000
direct allocation
page read and write
7FFAACB90000
trusted library allocation
page read and write
8ECE000
stack
page read and write
5C99000
trusted library allocation
page read and write
546C000
stack
page read and write
54B0000
heap
page read and write
4502000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
1FF8000
direct allocation
page read and write
8430000
trusted library allocation
page execute and read and write
306C000
trusted library allocation
page read and write
7FFAACB83000
trusted library allocation
page execute and read and write
808A000
heap
page read and write
730E000
stack
page read and write
30A6000
trusted library allocation
page read and write
8270000
trusted library allocation
page read and write
7001000
heap
page read and write
50D1000
trusted library allocation
page read and write
860000
trusted library section
page read and write
705E000
heap
page read and write
1C4DE000
stack
page read and write
1FF8000
direct allocation
page read and write
78CE000
stack
page read and write
7FFB1E0E0000
unkown
page readonly
7015000
heap
page read and write
7F80000
trusted library allocation
page read and write
1BD9F000
stack
page read and write
8AB9000
heap
page read and write
510000
heap
page read and write
920000
heap
page read and write
84CB000
stack
page read and write
3093000
trusted library allocation
page read and write
7CB0000
trusted library allocation
page read and write
1FF8000
direct allocation
page read and write
805D000
heap
page read and write
206C000
direct allocation
page read and write
3348000
heap
page read and write
5E41000
trusted library allocation
page read and write
6653000
trusted library allocation
page read and write
7BC0000
heap
page read and write
8520000
heap
page read and write
6CF000
heap
page read and write
2E4A000
heap
page read and write
4D5E000
stack
page read and write
C39000
trusted library allocation
page read and write
15F0000
trusted library allocation
page read and write
1C8DA000
stack
page read and write
540F000
stack
page read and write
75AF000
stack
page read and write
7360000
trusted library allocation
page execute and read and write
194000
stack
page read and write
8CA0000
trusted library allocation
page read and write
7FE0000
trusted library allocation
page read and write
77C0000
trusted library allocation
page execute and read and write
807A000
heap
page read and write
52E000
stack
page read and write
2D70000
heap
page read and write
1B58D000
stack
page read and write
6F7E000
stack
page read and write
1FDC000
direct allocation
page read and write
7FFB1E102000
unkown
page readonly
2FD6000
heap
page read and write
8A94000
heap
page read and write
1C2DE000
stack
page read and write
8772000
trusted library allocation
page read and write
79E0000
trusted library allocation
page read and write
4C30000
heap
page execute and read and write
1BFA0000
heap
page read and write
206C000
direct allocation
page read and write
2DBD000
heap
page read and write
2064000
direct allocation
page read and write
7EA0000
trusted library allocation
page read and write
7BFA000
heap
page read and write
8CC9000
trusted library allocation
page read and write
8FDD000
stack
page read and write
206C000
direct allocation
page read and write
73D0000
trusted library allocation
page read and write
53E000
stack
page read and write
5969000
trusted library allocation
page read and write
1FF8000
direct allocation
page read and write
7FFB1E100000
unkown
page read and write
7DCF000
stack
page read and write
83E0000
trusted library allocation
page read and write
1FDC000
direct allocation
page read and write
62A000
heap
page read and write
1FDC000
direct allocation
page read and write
4C35000
heap
page execute and read and write
9AB000
stack
page read and write
5672000
trusted library allocation
page read and write
4E90000
trusted library allocation
page read and write
5BE6000
trusted library allocation
page read and write
1FF8000
direct allocation
page read and write
1FF8000
direct allocation
page read and write
203E000
stack
page read and write
C3E000
stack
page read and write
560F000
trusted library allocation
page read and write
70490000
unkown
page readonly
8A30000
trusted library allocation
page read and write
8250000
trusted library allocation
page execute and read and write
7194000
heap
page read and write
7350000
trusted library allocation
page read and write
79B2000
trusted library allocation
page read and write
7FFAACB8D000
trusted library allocation
page execute and read and write
75E000
stack
page read and write
1291000
heap
page read and write
45F7000
heap
page read and write
1FD8000
direct allocation
page read and write
19D000
stack
page read and write
5EA3000
trusted library allocation
page read and write
8093000
heap
page read and write
44AE000
stack
page read and write
49A3000
trusted library allocation
page read and write
308F000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
1300E000
trusted library allocation
page read and write
7190000
heap
page read and write
80F2000
heap
page read and write
707000
heap
page read and write
4B9E000
stack
page read and write
7440000
trusted library allocation
page read and write
71D0000
trusted library allocation
page execute and read and write
4540000
heap
page execute and read and write
4F5F000
stack
page read and write
415000
unkown
page read and write
7230000
trusted library allocation
page read and write
3099000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
206C000
direct allocation
page read and write
4A40000
heap
page read and write
5F0000
heap
page read and write
6FA0000
heap
page execute and read and write
64E1000
trusted library allocation
page read and write
2C9F000
stack
page read and write
1FDC000
direct allocation
page read and write
7733000
heap
page read and write
530D000
trusted library allocation
page execute and read and write
7E20000
trusted library allocation
page read and write
3091000
trusted library allocation
page read and write
8ABD000
heap
page read and write
5BEE000
trusted library allocation
page read and write
8012000
heap
page read and write
6B3E000
stack
page read and write
8E30000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
1FDC000
direct allocation
page read and write
1FD8000
direct allocation
page read and write
7EE0000
heap
page read and write
1F0000
heap
page read and write
7555000
heap
page execute and read and write
2FEF000
stack
page read and write
5332000
trusted library allocation
page read and write
1F00000
direct allocation
page read and write
2074000
direct allocation
page read and write
850D000
trusted library allocation
page read and write
218F000
stack
page read and write
62E000
heap
page read and write
79D0000
trusted library allocation
page read and write
2088000
direct allocation
page read and write
30A9000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
1FDC000
direct allocation
page read and write
206C000
direct allocation
page read and write
1FDC000
direct allocation
page read and write
206C000
direct allocation
page read and write
1FDC000
direct allocation
page read and write
C10000
trusted library allocation
page read and write
44F2000
trusted library allocation
page read and write
2180000
heap
page read and write
6F6E000
stack
page read and write
409000
unkown
page read and write
51B000
stack
page read and write
790E000
stack
page read and write
8AD0000
trusted library allocation
page execute and read and write
20F0000
heap
page read and write
704AD000
unkown
page read and write
1490000
heap
page read and write
3340000
heap
page read and write
206C000
direct allocation
page read and write
7787000
heap
page read and write
8A0F000
stack
page read and write
9ED000
heap
page read and write
2440000
heap
page read and write
1FEB000
direct allocation
page read and write
206C000
direct allocation
page read and write
1FDC000
direct allocation
page read and write
7F70000
trusted library allocation
page execute and read and write
206C000
direct allocation
page read and write
5AB2000
trusted library allocation
page read and write
7FFAACB92000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
8B59000
stack
page read and write
728E000
stack
page read and write
BFB000
stack
page read and write
8020000
heap
page read and write
8566000
heap
page read and write
13011000
trusted library allocation
page read and write
55D000
stack
page read and write
863C000
heap
page read and write
2240000
heap
page read and write
C20000
trusted library allocation
page read and write
1400000
heap
page execute and read and write
7420000
trusted library allocation
page read and write
85FE000
stack
page read and write
2E57000
heap
page read and write
7C22000
heap
page read and write
2D88000
heap
page read and write
8A90000
heap
page read and write
7D20000
trusted library allocation
page read and write
704AD000
unkown
page read and write
6BA000
heap
page read and write
8440000
trusted library allocation
page read and write
736E000
stack
page read and write
295F000
stack
page read and write
1350000
heap
page read and write
5806000
trusted library allocation
page read and write
72CF000
stack
page read and write
6E0B000
stack
page read and write
855E000
heap
page read and write
5CFB000
trusted library allocation
page read and write
704AD000
unkown
page read and write
8055000
heap
page read and write
53D3000
trusted library allocation
page read and write
2068000
direct allocation
page read and write
1FF8000
direct allocation
page read and write
7E80000
trusted library allocation
page read and write
670000
heap
page read and write
1FDC000
direct allocation
page read and write
7D27000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
6E8D000
stack
page read and write
79DC000
stack
page read and write
206C000
direct allocation
page read and write
8562000
heap
page read and write
867E000
stack
page read and write
86BD000
stack
page read and write
928000
heap
page read and write
776C000
heap
page read and write
4520000
trusted library allocation
page read and write
89BE000
stack
page read and write
2088000
direct allocation
page read and write
206C000
direct allocation
page read and write
7760000
heap
page read and write
81D0000
trusted library allocation
page execute and read and write
1FF8000
direct allocation
page read and write
7067000
heap
page read and write
8E8E000
stack
page read and write
1660000
heap
page read and write
8CCF000
trusted library allocation
page read and write
7F058000
trusted library allocation
page execute and read and write
191000
stack
page read and write
7F60000
trusted library allocation
page read and write
7792000
heap
page read and write
1FF8000
direct allocation
page read and write
6FBE000
stack
page read and write
6BFA000
stack
page read and write
8053000
heap
page read and write
6E4E000
stack
page read and write
8626000
heap
page read and write
7E90000
trusted library allocation
page execute and read and write
873F000
stack
page read and write
79C0000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
DC0000
unkown
page readonly
8AF8000
heap
page read and write
71A6000
heap
page read and write
864F000
stack
page read and write
670000
heap
page read and write
206C000
direct allocation
page read and write
84AD000
stack
page read and write
1613000
trusted library allocation
page read and write
790000
heap
page read and write
57F5000
trusted library allocation
page read and write
7240000
heap
page read and write
206C000
direct allocation
page read and write
7E2B000
trusted library allocation
page read and write
470F000
stack
page read and write
C30000
trusted library allocation
page read and write
7FB4000
heap
page read and write
7FD0000
trusted library allocation
page read and write
5AEA000
trusted library allocation
page read and write
71F5000
heap
page execute and read and write
206C000
direct allocation
page read and write
5A50000
trusted library allocation
page read and write
560000
heap
page read and write
850B000
trusted library allocation
page read and write
60F9000
trusted library allocation
page read and write
73E0000
trusted library allocation
page read and write
459E000
stack
page read and write
4FDC000
stack
page read and write
34D0000
heap
page read and write
83E3000
trusted library allocation
page read and write
7148000
heap
page read and write
5E47000
trusted library allocation
page read and write
7BF7000
heap
page read and write
7970000
trusted library allocation
page read and write
1FF8000
direct allocation
page read and write
808E000
heap
page read and write
7CA0000
trusted library allocation
page execute and read and write
7C90000
trusted library allocation
page read and write
810D000
heap
page read and write
206C000
direct allocation
page read and write
44D0000
trusted library allocation
page read and write
8AF3000
heap
page read and write
4E59000
trusted library allocation
page read and write
127B000
heap
page read and write
19D000
stack
page read and write
850E000
stack
page read and write
1D1DB000
stack
page read and write
45F0000
heap
page read and write
4E72000
trusted library allocation
page read and write
8050000
heap
page read and write
7227000
trusted library allocation
page read and write
5306000
trusted library allocation
page read and write
74B0000
trusted library allocation
page read and write
4EB8000
trusted library allocation
page read and write
40A000
unkown
page read and write
1610000
trusted library allocation
page read and write
494F000
stack
page read and write
7F8A000
trusted library allocation
page read and write
1D3DE000
stack
page read and write
2CC6000
heap
page read and write
678000
heap
page read and write
8A9E000
heap
page read and write
528000
heap
page read and write
1FDC000
direct allocation
page read and write
206C000
direct allocation
page read and write
6A0000
heap
page read and write
1FDC000
direct allocation
page read and write
7370000
trusted library allocation
page read and write
73A0000
trusted library allocation
page read and write
4C80000
heap
page read and write
8B75000
heap
page read and write
71A3000
heap
page read and write
58BF000
trusted library allocation
page read and write
330E000
stack
page read and write
7817000
trusted library allocation
page read and write
1FD8000
direct allocation
page read and write
1C5DD000
stack
page read and write
6FDE000
heap
page read and write
8800000
trusted library allocation
page read and write
8A40000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
84F0000
heap
page read and write
206C000
direct allocation
page read and write
1FDC000
direct allocation
page read and write
8A0E000
stack
page read and write
67A000
heap
page read and write
8360000
trusted library allocation
page read and write
5BD5000
trusted library allocation
page read and write
5323000
trusted library allocation
page read and write
5380000
heap
page execute and read and write
1FF8000
direct allocation
page read and write
721E000
stack
page read and write
1FDC000
direct allocation
page read and write
5522000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
7400000
trusted library allocation
page read and write
26BE000
stack
page read and write
2D6E000
stack
page read and write
1B9B3000
heap
page read and write
60F1000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
1FF8000
direct allocation
page read and write
7F60000
trusted library allocation
page read and write
71C3000
heap
page read and write
15AE000
stack
page read and write
1FF8000
direct allocation
page read and write
73AD000
stack
page read and write
73F0000
trusted library allocation
page read and write
90E000
stack
page read and write
34BE000
stack
page read and write
30C2000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
791E000
stack
page read and write
890000
heap
page read and write
930000
heap
page read and write
2070000
direct allocation
page read and write
206C000
direct allocation
page read and write
4E5B000
stack
page read and write
4F0000
heap
page read and write
7390000
trusted library allocation
page read and write
65E000
stack
page read and write
7950000
trusted library allocation
page read and write
775E000
stack
page read and write
6F2E000
stack
page read and write
5E0000
heap
page read and write
1FDC000
direct allocation
page read and write
7FFB1E105000
unkown
page readonly
206C000
direct allocation
page read and write
1FF8000
direct allocation
page read and write
740000
heap
page read and write
C23000
trusted library allocation
page execute and read and write
1235000
heap
page read and write
5963000
trusted library allocation
page read and write
125C000
heap
page read and write
57ED000
trusted library allocation
page read and write
73E0000
trusted library allocation
page execute and read and write
9C000
stack
page read and write
7FFAACC3C000
trusted library allocation
page execute and read and write
1FDC000
direct allocation
page read and write
409000
unkown
page write copy
206C000
direct allocation
page read and write
7021000
heap
page read and write
81F0000
trusted library allocation
page read and write
6EAE000
stack
page read and write
4530000
heap
page readonly
206C000
direct allocation
page read and write
1BABA000
stack
page read and write
DC0000
unkown
page readonly
5320000
trusted library allocation
page read and write
9E7000
stack
page read and write
781A000
trusted library allocation
page read and write
60D9000
trusted library allocation
page read and write
12C3000
heap
page read and write
4900000
heap
page read and write
7F10000
trusted library allocation
page read and write
5335000
trusted library allocation
page execute and read and write
6F4000
heap
page read and write
4CFE000
stack
page read and write
7FD00000
trusted library allocation
page execute and read and write
1FDC000
direct allocation
page read and write
5AD2000
trusted library allocation
page read and write
90DE000
stack
page read and write
7FC4000
heap
page read and write
206C000
direct allocation
page read and write
729E000
stack
page read and write
4E30000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
5350000
trusted library allocation
page read and write
401000
unkown
page execute read
3070000
trusted library allocation
page read and write
8FE000
stack
page read and write
44F5000
trusted library allocation
page execute and read and write
415000
unkown
page write copy
8ACD000
heap
page read and write
7E90000
trusted library allocation
page read and write
57E4000
trusted library allocation
page read and write
4CBF000
stack
page read and write
2E40000
trusted library section
page read and write
4E44000
trusted library allocation
page read and write
8CC0000
trusted library allocation
page read and write
1FD4000
direct allocation
page read and write
7C3D000
heap
page read and write
8F90000
trusted library allocation
page execute and read and write
1BC9E000
stack
page read and write
2D80000
heap
page read and write
7C11000
heap
page read and write
911E000
stack
page read and write
85AE000
heap
page read and write
7410000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
73D0000
trusted library allocation
page read and write
83DD000
stack
page read and write
76F8000
heap
page read and write
8065000
heap
page read and write
54C1000
trusted library allocation
page read and write
53D5000
trusted library allocation
page read and write
59A6000
trusted library allocation
page read and write
4F9C000
stack
page read and write
5209000
trusted library allocation
page read and write
2058000
direct allocation
page read and write
520000
heap
page read and write
70491000
unkown
page execute read
1250000
heap
page read and write
7E10000
trusted library allocation
page execute and read and write
5303000
trusted library allocation
page execute and read and write
7FCC000
heap
page read and write
1FDC000
direct allocation
page read and write
38B000
stack
page read and write
7FFAACD40000
trusted library allocation
page execute and read and write
806D000
heap
page read and write
695000
heap
page read and write
5360000
heap
page readonly
7E70000
trusted library allocation
page read and write
8069000
heap
page read and write
7735000
heap
page read and write
760000
heap
page read and write
44E0000
trusted library allocation
page read and write
704A6000
unkown
page readonly
4590000
heap
page read and write
4DDE000
stack
page read and write
775A000
heap
page read and write
5BD9000
trusted library allocation
page read and write
1C9D5000
stack
page read and write
795E000
stack
page read and write
4EA0000
heap
page readonly
45A0000
trusted library allocation
page execute and read and write
207B000
direct allocation
page read and write
64C1000
trusted library allocation
page read and write
75F000
stack
page read and write
7FFAACBDC000
trusted library allocation
page execute and read and write
1FDC000
direct allocation
page read and write
8AC9000
heap
page read and write
857E000
stack
page read and write
9B000
stack
page read and write
79F0000
trusted library allocation
page read and write
8390000
trusted library allocation
page execute and read and write
4E1D000
stack
page read and write
6EEE000
stack
page read and write
4D44000
trusted library allocation
page read and write
50C0000
heap
page execute and read and write
7FFB1E0E1000
unkown
page execute read
5C91000
trusted library allocation
page read and write
45A0000
heap
page readonly
8CD0000
trusted library allocation
page read and write
71E5000
heap
page read and write
5BDD000
trusted library allocation
page read and write
7FFAACBA0000
trusted library allocation
page read and write
8900000
trusted library allocation
page read and write
7F4F000
stack
page read and write
8AB5000
heap
page read and write
81E0000
trusted library allocation
page read and write
48CE000
stack
page read and write
7FF2000
heap
page read and write
8078000
heap
page read and write
1CFE0000
heap
page read and write
1665000
heap
page read and write
1FDC000
direct allocation
page read and write
6FFE000
stack
page read and write
71CD000
stack
page read and write
7FFAACBAB000
trusted library allocation
page execute and read and write
2088000
direct allocation
page read and write
2A5F000
stack
page read and write
131B000
heap
page read and write
9B000
stack
page read and write
6273000
trusted library allocation
page read and write
5BE2000
trusted library allocation
page read and write
33B2000
heap
page read and write
6D7000
heap
page read and write
718E000
stack
page read and write
89C0000
heap
page read and write
722A000
trusted library allocation
page read and write
1FDC000
direct allocation
page read and write
44C0000
trusted library allocation
page read and write
842E000
stack
page read and write
347F000
stack
page read and write
409000
unkown
page read and write
5BEA000
trusted library allocation
page read and write
8B0000
heap
page read and write
7F2E000
stack
page read and write
6A9000
heap
page read and write
1FDC000
direct allocation
page read and write
7F50000
trusted library allocation
page read and write
8E40000
trusted library allocation
page read and write
9019000
stack
page read and write
5941000
trusted library allocation
page read and write
8790000
trusted library allocation
page read and write
AEE000
stack
page read and write
A9E000
stack
page read and write
803A000
heap
page read and write
13008000
trusted library allocation
page read and write
44C3000
trusted library allocation
page execute and read and write
620000
heap
page read and write
6C2000
heap
page read and write
1C04E000
heap
page read and write
1BE9E000
stack
page read and write
2D2E000
stack
page read and write
206C000
direct allocation
page read and write
875E000
stack
page read and write
206C000
direct allocation
page read and write
73B0000
trusted library allocation
page read and write
52A0000
heap
page read and write
40A000
unkown
page read and write
7ECB000
trusted library allocation
page read and write
1FE0000
direct allocation
page read and write
3103000
trusted library allocation
page read and write
89CE000
stack
page read and write
3020000
heap
page read and write
853B000
heap
page read and write
7FF454730000
trusted library allocation
page execute and read and write
1CAD0000
heap
page read and write
13D0000
heap
page read and write
307D000
trusted library allocation
page read and write
3C9000
stack
page read and write
206C000
direct allocation
page read and write
4CEB000
trusted library allocation
page read and write
1230000
heap
page read and write
45B0000
heap
page read and write
4D9E000
stack
page read and write
854C000
stack
page read and write
206C000
direct allocation
page read and write
1C001000
heap
page read and write
8B47000
heap
page read and write
4790000
heap
page read and write
7FFB1E0F6000
unkown
page readonly
76DA000
stack
page read and write
1FDC000
direct allocation
page read and write
2088000
direct allocation
page read and write
B60000
heap
page read and write
5390000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
5C2E000
trusted library allocation
page read and write
7049000
heap
page read and write
7BEB000
heap
page read and write
8980000
trusted library allocation
page read and write
206C000
direct allocation
page read and write
2FAE000
stack
page read and write
2E7B000
heap
page read and write
2F1D000
stack
page read and write
512B000
trusted library allocation
page read and write
5AE3000
trusted library allocation
page read and write
A6F000
stack
page read and write
1D2DE000
stack
page read and write
1FF8000
direct allocation
page read and write
There are 1157 hidden memdumps, click here to show them.