IOC Report
MicrosoftService.exe

loading gif

Files

File Path
Type
Category
Malicious
MicrosoftService.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0o2bzl5m.vov.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1lodb341.rb0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1yyzrnk4.4zs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2ig5oaov.0rq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5fazmfqr.43u.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5jiipbik.fwv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hurbfl5u.scc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iw5qpwhw.izu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ja3zh3gf.t2o.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_k03y04uj.vgq.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kb1atu2k.e1k.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mgjozxag.4j1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t1uusbpa.maf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wu11mzd1.5ow.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yjv0uqg0.5am.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ylddzywl.her.ps1
ASCII text, with no line terminators
dropped
There are 9 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\MicrosoftService.exe
"C:\Users\user\Desktop\MicrosoftService.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\MicrosoftService.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'MicrosoftService.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\Service Host: Microsoft Service.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess ' Microsoft Service.exe'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
89.213.177.81
malicious
http://wwcrosoft.com/pki/certs/MicWinPCA_2010-07-06.crt0
unknown
http://nuget.org/NuGet.exe
unknown
http://www.t.com/pk
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
http://crl.micft.cMicRosof
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://crl.micros
unknown
There are 10 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious
18.31.95.13.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
89.213.177.81
unknown
United Kingdom
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MicrosoftService_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MicrosoftService_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MicrosoftService_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MicrosoftService_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MicrosoftService_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MicrosoftService_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MicrosoftService_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MicrosoftService_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MicrosoftService_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MicrosoftService_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MicrosoftService_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MicrosoftService_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MicrosoftService_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\MicrosoftService_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
Microsoft Service
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
332000
unkown
page readonly
malicious
275A000
trusted library allocation
page read and write
malicious
2711000
trusted library allocation
page read and write
malicious
7FF848ED0000
trusted library allocation
page read and write
1E6D4565000
heap
page read and write
1B560000
heap
page read and write
C2D000
stack
page read and write
2061FF0E000
heap
page read and write
1E6D460D000
heap
page read and write
1A88D2E9000
heap
page read and write
1A89F069000
trusted library allocation
page read and write
6F1000
stack
page read and write
20607470000
heap
page execute and read and write
1271E000
trusted library allocation
page read and write
1B62A000
heap
page read and write
295041D0000
heap
page execute and read and write
7FF848E3C000
trusted library allocation
page execute and read and write
1A8A7730000
heap
page read and write
7FF849113000
trusted library allocation
page read and write
1A8A733F000
heap
page read and write
7FF848EB0000
trusted library allocation
page read and write
7FF849210000
trusted library allocation
page execute and read and write
7FF848FC0000
trusted library allocation
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
29504260000
trusted library allocation
page read and write
93C000
heap
page read and write
2951DFFF000
heap
page read and write
7FF848FA1000
trusted library allocation
page read and write
1A89F06E000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page execute and read and write
552A4FD000
stack
page read and write
1A88D2A7000
heap
page read and write
1E6EE783000
heap
page read and write
206082AB000
trusted library allocation
page read and write
29505FFE000
trusted library allocation
page read and write
7DF4ACFF0000
trusted library allocation
page execute and read and write
29506BF5000
trusted library allocation
page read and write
1A8A7246000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
20605B70000
heap
page readonly
8F3000
heap
page read and write
8CF000
heap
page read and write
1E6EE81E000
heap
page read and write
29504180000
trusted library section
page read and write
1A8A733B000
heap
page read and write
2061FF10000
heap
page read and write
1E6D44E0000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
1E6D5EA0000
trusted library allocation
page read and write
1BA9E000
stack
page read and write
20608755000
trusted library allocation
page read and write
2951E3A9000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
7FF848DED000
trusted library allocation
page execute and read and write
7FF848DFB000
trusted library allocation
page read and write
206074B0000
heap
page read and write
1E6EE4E9000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
1E6EE823000
heap
page read and write
1E6D5F50000
heap
page execute and read and write
8BC000
heap
page read and write
2061FA00000
heap
page read and write
1A8A757F000
heap
page read and write
7FF849159000
trusted library allocation
page read and write
C90F3E000
stack
page read and write
9C976FF000
stack
page read and write
1E6D6FF4000
trusted library allocation
page read and write
9C96DFE000
stack
page read and write
7FF8491DA000
trusted library allocation
page read and write
1C710000
heap
page read and write
8F0000
heap
page read and write
1A88F9E5000
trusted library allocation
page read and write
1B35E000
stack
page read and write
7FF849170000
trusted library allocation
page read and write
1A8A7330000
heap
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
7FF849220000
trusted library allocation
page read and write
1E6D6D4D000
trusted library allocation
page read and write
1A88D390000
heap
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
7FF848EE6000
trusted library allocation
page execute and read and write
552A477000
stack
page read and write
7FF848E00000
trusted library allocation
page read and write
29506AA9000
trusted library allocation
page read and write
93E000
heap
page read and write
29506D11000
trusted library allocation
page read and write
7FF84914C000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
C90EB3000
stack
page read and write
1E6D5F61000
trusted library allocation
page read and write
1E6D5E9A000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
206059C0000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
1E6D4639000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF848EA6000
trusted library allocation
page read and write
1E6D7790000
trusted library allocation
page read and write
29505B31000
trusted library allocation
page read and write
152337E000
stack
page read and write
1A88FD84000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
9C983CE000
stack
page read and write
20605A69000
heap
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
7FF849010000
trusted library allocation
page read and write
2060889D000
trusted library allocation
page read and write
1A88EBC0000
trusted library allocation
page read and write
29506DDF000
trusted library allocation
page read and write
1E6EE7F5000
heap
page read and write
7FF848DF2000
trusted library allocation
page read and write
2951E07A000
heap
page read and write
206087E5000
trusted library allocation
page read and write
9C97578000
stack
page read and write
942000
heap
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
29506C59000
trusted library allocation
page read and write
1E6D7654000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
1A8A7660000
trusted library allocation
page read and write
8B6000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
152347E000
stack
page read and write
7FF849250000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
1A89013F000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
2950795A000
trusted library allocation
page read and write
5529FDE000
stack
page read and write
1E6EE6FF000
heap
page read and write
1E6D76EA000
trusted library allocation
page read and write
1E6D4540000
heap
page read and write
1A88FEA2000
trusted library allocation
page read and write
7FF849256000
trusted library allocation
page read and write
D75000
heap
page read and write
29515BA2000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
552A27E000
stack
page read and write
29506D87000
trusted library allocation
page read and write
1E6D77CF000
trusted library allocation
page read and write
1E6D5E50000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
7FF849230000
trusted library allocation
page read and write
810000
heap
page read and write
7FF849240000
trusted library allocation
page read and write
2061FEFB000
heap
page read and write
C9177E000
stack
page read and write
7FF8490F0000
trusted library allocation
page read and write
1A8905B2000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
1AC9C000
stack
page read and write
2061FE80000
heap
page read and write
7FF849270000
trusted library allocation
page read and write
9C975FE000
stack
page read and write
7DF4ACFD0000
trusted library allocation
page execute and read and write
890000
trusted library allocation
page read and write
152448B000
stack
page read and write
7FF849030000
trusted library allocation
page read and write
152438F000
stack
page read and write
1A88D2E6000
heap
page read and write
2951E3C9000
heap
page read and write
9C9707E000
stack
page read and write
15234F7000
stack
page read and write
7FF848EB6000
trusted library allocation
page read and write
206176C1000
trusted library allocation
page read and write
1E6EE83C000
heap
page read and write
C924CE000
stack
page read and write
1E6EE6B0000
heap
page execute and read and write
552B50C000
stack
page read and write
7FF849200000
trusted library allocation
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
7FF848DF0000
trusted library allocation
page read and write
20609015000
trusted library allocation
page read and write
1A88F9F5000
trusted library allocation
page read and write
1A8A728F000
heap
page read and write
1A8A7300000
heap
page execute and read and write
2061FB67000
heap
page execute and read and write
7FF849070000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
29504290000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
C9234D000
stack
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
7FF848E1D000
trusted library allocation
page execute and read and write
1E6D7208000
trusted library allocation
page read and write
29506D4A000
trusted library allocation
page read and write
15236B7000
stack
page read and write
2061791E000
trusted library allocation
page read and write
1BF9A000
stack
page read and write
20607B8D000
trusted library allocation
page read and write
20608969000
trusted library allocation
page read and write
1E6D45B0000
heap
page read and write
7FF848E24000
trusted library allocation
page read and write
1A88D410000
heap
page read and write
20608F2D000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page execute and read and write
7FF8491F0000
trusted library allocation
page read and write
1E6EE7CD000
heap
page read and write
295073C2000
trusted library allocation
page read and write
1A88FF91000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
20605B20000
trusted library section
page read and write
7FF84916C000
trusted library allocation
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
1E6EE900000
trusted library allocation
page read and write
1B5EF000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
1A8A74A5000
heap
page read and write
2061FE38000
heap
page read and write
9C971FA000
stack
page read and write
1E6EE4FA000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
206094A1000
trusted library allocation
page read and write
1A8A75A0000
heap
page read and write
1A890026000
trusted library allocation
page read and write
7FF848FD8000
trusted library allocation
page read and write
1E6D45B8000
heap
page read and write
1A89EDA1000
trusted library allocation
page read and write
1A8A725E000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
1B110000
heap
page read and write
20605A28000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
1C098000
stack
page read and write
880000
trusted library allocation
page read and write
7FF84915C000
trusted library allocation
page read and write
2951E287000
heap
page read and write
1A8A6D8F000
heap
page read and write
1C70C000
stack
page read and write
7FF848FA0000
trusted library allocation
page execute and read and write
1E6D7329000
trusted library allocation
page read and write
1CA0E000
stack
page read and write
206086C5000
trusted library allocation
page read and write
552A8BE000
stack
page read and write
1E6EE505000
heap
page read and write
1E6D45EC000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
206078E9000
trusted library allocation
page read and write
29506584000
trusted library allocation
page read and write
2951E100000
trusted library allocation
page read and write
1B150000
heap
page execute and read and write
7FF848FAA000
trusted library allocation
page read and write
1E6EE5C0000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page read and write
2061FED5000
heap
page read and write
552A637000
stack
page read and write
1E6D7D69000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
1E6D7D44000
trusted library allocation
page read and write
8B0000
heap
page read and write
20608F54000
trusted library allocation
page read and write
552A6BB000
stack
page read and write
1B55E000
stack
page read and write
C90FFF000
stack
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
206089CA000
trusted library allocation
page read and write
7FF848E9C000
trusted library allocation
page execute and read and write
7FF849100000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF848EA0000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
1E6D5E90000
heap
page read and write
1E6D6F65000
trusted library allocation
page read and write
552A5BE000
stack
page read and write
1A88D360000
heap
page read and write
20605AA8000
heap
page read and write
1A88FB63000
trusted library allocation
page read and write
1A88FDB0000
trusted library allocation
page read and write
1E6EE7E7000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
29515E1F000
trusted library allocation
page read and write
1E6EE717000
heap
page read and write
9C9737D000
stack
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
552A739000
stack
page read and write
7FF849188000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
1E6E6269000
trusted library allocation
page read and write
29505D5A000
trusted library allocation
page read and write
15237B9000
stack
page read and write
1A8A757B000
heap
page read and write
7DF49B270000
trusted library allocation
page execute and read and write
12711000
trusted library allocation
page read and write
1A89EDB1000
trusted library allocation
page read and write
1A8A721F000
heap
page read and write
1BD9C000
stack
page read and write
29505B20000
heap
page read and write
20605B40000
trusted library allocation
page read and write
1E6D618A000
trusted library allocation
page read and write
15238BE000
stack
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
2951E0A0000
heap
page execute and read and write
552A7BF000
stack
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
1B093000
heap
page read and write
1E6D5E95000
heap
page read and write
552B30F000
stack
page read and write
7FF849050000
trusted library allocation
page read and write
1A88D2E4000
heap
page read and write
1A8A7410000
heap
page execute and read and write
29503FE1000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page execute and read and write
7FF849200000
trusted library allocation
page read and write
1E6D7020000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
206083ED000
trusted library allocation
page read and write
1E6EE54E000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
C913F9000
stack
page read and write
29515B51000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
29506BC9000
trusted library allocation
page read and write
7FF848F80000
trusted library allocation
page read and write
1E6D713A000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
9C97477000
stack
page read and write
7DF49B260000
trusted library allocation
page execute and read and write
920000
heap
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
29515E39000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
29515E27000
trusted library allocation
page read and write
7FF849210000
trusted library allocation
page read and write
1E6D4633000
heap
page read and write
7FF8490D0000
trusted library allocation
page read and write
7FF849240000
trusted library allocation
page read and write
1A88D150000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
1A8A7248000
heap
page read and write
7FF849240000
trusted library allocation
page read and write
1A89F1D6000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
9C9727E000
stack
page read and write
206176F1000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page read and write
1C60A000
stack
page read and write
7FF848FA0000
trusted library allocation
page read and write
152458C000
stack
page read and write
12718000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
15239BC000
stack
page read and write
29515B61000
trusted library allocation
page read and write
B25000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
9C970FF000
stack
page read and write
1E6D78B7000
trusted library allocation
page read and write
7FF848FD4000
trusted library allocation
page read and write
206058C0000
heap
page read and write
9C9777B000
stack
page read and write
1E6D4500000
heap
page read and write
B20000
heap
page read and write
7FF849246000
trusted library allocation
page read and write
1E6EE4FC000
heap
page read and write
1524509000
stack
page read and write
7FF8491D0000
trusted library allocation
page read and write
1A8905F1000
trusted library allocation
page read and write
29503F20000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
29507935000
trusted library allocation
page read and write
C915F7000
stack
page read and write
AAE000
stack
page read and write
7FF849010000
trusted library allocation
page read and write
29506AA5000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
1E6E6259000
trusted library allocation
page read and write
152363E000
stack
page read and write
1A88ED81000
trusted library allocation
page read and write
15235F9000
stack
page read and write
1E6EE820000
heap
page read and write
9C9767E000
stack
page read and write
1A89050C000
trusted library allocation
page read and write
1E6D4635000
heap
page read and write
206086F0000
trusted library allocation
page read and write
2951E160000
heap
page execute and read and write
1E6D5E80000
trusted library allocation
page read and write
2951DFF5000
heap
page read and write
1E6D7D89000
trusted library allocation
page read and write
1E6D6F07000
trusted library allocation
page read and write
1A88D3F0000
trusted library allocation
page read and write
206073C0000
trusted library allocation
page read and write
1E6D45EF000
heap
page read and write
29503F80000
heap
page read and write
1A8906D9000
trusted library allocation
page read and write
1E6E5FD1000
trusted library allocation
page read and write
152460C000
stack
page read and write
1A890087000
trusted library allocation
page read and write
29507955000
trusted library allocation
page read and write
26F0000
heap
page read and write
1A88FE3F000
trusted library allocation
page read and write
1E6D5E70000
heap
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
7FF848F9A000
trusted library allocation
page read and write
206059A0000
heap
page read and write
552A3FE000
stack
page read and write
1E6EE542000
heap
page read and write
29506E40000
trusted library allocation
page read and write
1E6EE817000
heap
page read and write
7FF849160000
trusted library allocation
page read and write
2061FB90000
heap
page read and write
9C972F7000
stack
page read and write
C9137F000
stack
page read and write
552B58E000
stack
page read and write
1A88D268000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
1E6D6CD8000
trusted library allocation
page read and write
98E000
heap
page read and write
7FF849179000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
1E6D6F09000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
7FF848FDA000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
7FF848E0B000
trusted library allocation
page read and write
1A8A755D000
heap
page read and write
2061FAA7000
heap
page read and write
1E6D7D8E000
trusted library allocation
page read and write
2951E640000
heap
page read and write
9C974FA000
stack
page read and write
7FF8491F0000
trusted library allocation
page read and write
7FF849134000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
7FF848DE2000
trusted library allocation
page read and write
1E6D6F91000
trusted library allocation
page read and write
7FF848F92000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
7FF849140000
trusted library allocation
page read and write
20605A5F000
heap
page read and write
1A88EC45000
heap
page read and write
29506B98000
trusted library allocation
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
893000
trusted library allocation
page read and write
1A89F087000
trusted library allocation
page read and write
7FF849162000
trusted library allocation
page read and write
20607390000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page execute and read and write
1E6D5E60000
heap
page readonly
2951DFBF000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
1E6E5F81000
trusted library allocation
page read and write
20605B60000
trusted library allocation
page read and write
552A579000
stack
page read and write
1A88D2A9000
heap
page read and write
1A88F987000
trusted library allocation
page read and write
1A89EDF0000
trusted library allocation
page read and write
20608736000
trusted library allocation
page read and write
1A8A7596000
heap
page read and write
1A88FB65000
trusted library allocation
page read and write
7FF849133000
trusted library allocation
page read and write
29503FA8000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
7FF849144000
trusted library allocation
page read and write
1A88ED70000
heap
page execute and read and write
1A740000
trusted library allocation
page read and write
206179AF000
trusted library allocation
page read and write
2061FEB4000
heap
page read and write
1A890BB0000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
206076C1000
trusted library allocation
page read and write
206082C1000
trusted library allocation
page read and write
1A88D2A3000
heap
page read and write
1A88EC80000
trusted library allocation
page read and write
2951E3BB000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
1E6E5F91000
trusted library allocation
page read and write
1A88D415000
heap
page read and write
7FF8491EA000
trusted library allocation
page read and write
20605A65000
heap
page read and write
1A88D270000
heap
page read and write
7FF849142000
trusted library allocation
page read and write
8DA000
heap
page read and write
7FF499BE0000
trusted library allocation
page execute and read and write
7FF849004000
trusted library allocation
page read and write
152357D000
stack
page read and write
25D0000
heap
page read and write
7FF8491E0000
trusted library allocation
page read and write
860000
trusted library allocation
page read and write
152327E000
stack
page read and write
7FF849080000
trusted library allocation
page read and write
7FF849152000
trusted library allocation
page read and write
152460E000
stack
page read and write
7FF8490E0000
trusted library allocation
page read and write
20605A5D000
heap
page read and write
7FF848E96000
trusted library allocation
page read and write
1A88D260000
heap
page read and write
C923C7000
stack
page read and write
C922CE000
stack
page read and write
1A88EBD0000
heap
page read and write
1A890B8B000
trusted library allocation
page read and write
2951DB33000
heap
page read and write
1BB9D000
stack
page read and write
1E6D5ED0000
trusted library allocation
page read and write
20617732000
trusted library allocation
page read and write
1E6D7083000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
9C981CC000
stack
page read and write
2951E166000
heap
page execute and read and write
7FF8490B0000
trusted library allocation
page read and write
7FF848E04000
trusted library allocation
page read and write
7FF849220000
trusted library allocation
page execute and read and write
7FF848FD1000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
29504295000
heap
page read and write
1B99E000
stack
page read and write
7FF8491FC000
trusted library allocation
page read and write
C914F9000
stack
page read and write
7FF849040000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
1C50A000
stack
page read and write
7FF849168000
trusted library allocation
page read and write
1A8A71E0000
heap
page read and write
552A37A000
stack
page read and write
1E6EE577000
heap
page read and write
29506EFA000
trusted library allocation
page read and write
330000
unkown
page readonly
7FF8490F0000
trusted library allocation
page read and write
20605A20000
heap
page read and write
1A88D400000
heap
page readonly
1A89F076000
trusted library allocation
page read and write
2060865D000
trusted library allocation
page read and write
152393F000
stack
page read and write
9AD000
heap
page read and write
7FF84920C000
trusted library allocation
page read and write
29507910000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
9C9834C000
stack
page read and write
2061FDC0000
heap
page read and write
7FF849190000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page read and write
7DF4ACFE0000
trusted library allocation
page execute and read and write
7FF848FE2000
trusted library allocation
page read and write
C9187E000
stack
page read and write
20605BE0000
heap
page read and write
1E6D642F000
trusted library allocation
page read and write
5529F53000
stack
page read and write
7FF848EC6000
trusted library allocation
page execute and read and write
C91678000
stack
page read and write
2951E382000
heap
page read and write
29504220000
trusted library allocation
page read and write
1A8A7307000
heap
page execute and read and write
7FF84925D000
trusted library allocation
page read and write
1A88FE13000
trusted library allocation
page read and write
1523738000
stack
page read and write
1AA9C000
heap
page read and write
1B090000
heap
page read and write
1A890BAB000
trusted library allocation
page read and write
1E6D6D45000
trusted library allocation
page read and write
29504026000
heap
page read and write
7FF849250000
trusted library allocation
page read and write
1A8A74CC000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
1A8A75A9000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
20605A63000
heap
page read and write
2061FAF6000
heap
page read and write
7FF848FD2000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
206094C6000
trusted library allocation
page read and write
7FF848E1B000
trusted library allocation
page read and write
1A88EFAA000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
7FF849002000
trusted library allocation
page read and write
1E6EE497000
heap
page execute and read and write
2951DFB9000
heap
page read and write
7FF849210000
trusted library allocation
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
20605A7D000
heap
page read and write
7DF4ABCC0000
trusted library allocation
page execute and read and write
7FF848F92000
trusted library allocation
page read and write
9C9717E000
stack
page read and write
7FF848FB1000
trusted library allocation
page read and write
1E6E624F000
trusted library allocation
page read and write
1A8A7344000
heap
page read and write
1E6D45F5000
heap
page read and write
7FF849230000
trusted library allocation
page read and write
26DE000
stack
page read and write
206179C9000
trusted library allocation
page read and write
29503FFD000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
20605BE5000
heap
page read and write
29503F10000
heap
page read and write
295041E0000
heap
page read and write
7FF849180000
trusted library allocation
page read and write
7FF849123000
trusted library allocation
page read and write
7FF84918C000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
7FF849250000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
206179B9000
trusted library allocation
page read and write
20605A00000
heap
page read and write
295041E5000
heap
page read and write
7FF848FC8000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page read and write
1B45E000
stack
page read and write
1A8A7456000
heap
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
2951E3BE000
heap
page read and write
9C982C9000
stack
page read and write
7FF8490D0000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
1E6EE712000
heap
page read and write
2951DF80000
heap
page read and write
7FF848DE3000
trusted library allocation
page execute and read and write
7FF848E3B000
trusted library allocation
page read and write
29507483000
trusted library allocation
page read and write
2951DFF3000
heap
page read and write
C9244C000
stack
page read and write
7FF849130000
trusted library allocation
page read and write
C90FBE000
stack
page read and write
1E6D726F000
trusted library allocation
page read and write
29503FE9000
heap
page read and write
7FF848EA6000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
7FF848DE0000
trusted library allocation
page read and write
2951E317000
heap
page read and write
2950739C000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
552A2FE000
stack
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
20605B30000
trusted library section
page read and write
295041B0000
trusted library allocation
page read and write
7FF849154000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
1A890A42000
trusted library allocation
page read and write
7FF848DF4000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
29503F40000
heap
page read and write
1A88D2BD000
heap
page read and write
7FF849174000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
7FF849180000
trusted library allocation
page read and write
C9127E000
stack
page read and write
1A88D230000
heap
page read and write
20607747000
trusted library allocation
page read and write
1522FC3000
stack
page read and write
1BC9D000
stack
page read and write
7FF848F91000
trusted library allocation
page read and write
552B489000
stack
page read and write
206085B3000
trusted library allocation
page read and write
2061FB60000
heap
page execute and read and write
C924CB000
stack
page read and write
7FF848DF0000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
1E6EE4A0000
heap
page read and write
2061FEF3000
heap
page read and write
1E6D4590000
trusted library allocation
page read and write
7FF849200000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
7FF848FE8000
trusted library allocation
page read and write
20608A85000
trusted library allocation
page read and write
1A88D29D000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
1E6E624A000
trusted library allocation
page read and write
2951E270000
heap
page read and write
7FF8492A0000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
206082B9000
trusted library allocation
page read and write
1E6D5FE7000
trusted library allocation
page read and write
7FF8491EC000
trusted library allocation
page read and write
1E6D69B5000
trusted library allocation
page read and write
1B5E2000
heap
page read and write
9C9814E000
stack
page read and write
7F0000
heap
page read and write
1A8A72C3000
heap
page read and write
2061FA46000
heap
page read and write
7FF849270000
trusted library allocation
page read and write
206074A0000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
15232FE000
stack
page read and write
29506AA1000
trusted library allocation
page read and write
1E6D45F7000
heap
page read and write
29515B40000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
1A8A7599000
heap
page read and write
1A890143000
trusted library allocation
page read and write
C912F9000
stack
page read and write
9C9824E000
stack
page read and write
29515E1B000
trusted library allocation
page read and write
2951E3AE000
heap
page read and write
1E6EE715000
heap
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
7FF849148000
trusted library allocation
page read and write
7DF486180000
trusted library allocation
page execute and read and write
152440C000
stack
page read and write
7FF849220000
trusted library allocation
page read and write
1A88F24E000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
91C000
heap
page read and write
29504170000
trusted library section
page read and write
206076B0000
heap
page read and write
1A8A71EB000
heap
page read and write
1A88D2AB000
heap
page read and write
7FF849240000
trusted library allocation
page read and write
7FF8491F0000
trusted library allocation
page read and write
1E6D723B000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
1A890B65000
trusted library allocation
page read and write
7FF848FC2000
trusted library allocation
page read and write
29515E21000
trusted library allocation
page read and write
1E6D4400000
heap
page read and write
2061FA86000
heap
page read and write
7FF849260000
trusted library allocation
page read and write
1E6EE490000
heap
page execute and read and write
C916FF000
stack
page read and write
1A88FAF4000
trusted library allocation
page read and write
20605A6B000
heap
page read and write
C91577000
stack
page read and write
29503FDD000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
29515B31000
trusted library allocation
page read and write
7FF848DE4000
trusted library allocation
page read and write
29505BB6000
trusted library allocation
page read and write
7FF849139000
trusted library allocation
page read and write
1C40E000
stack
page read and write
2700000
heap
page execute and read and write
7FF849236000
trusted library allocation
page read and write
2950691B000
trusted library allocation
page read and write
2774000
trusted library allocation
page read and write
2951E3B2000
heap
page read and write
1E6D45C2000
heap
page read and write
7FF848E90000
trusted library allocation
page read and write
29503FE5000
heap
page read and write
1A88D27E000
heap
page read and write
9A2000
heap
page read and write
3F0000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
7FF849149000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page read and write
1B25A000
stack
page read and write
7FF848F82000
trusted library allocation
page read and write
1A88D3D0000
trusted library allocation
page read and write
1B634000
heap
page read and write
2061FA44000
heap
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
989000
heap
page read and write
29504190000
trusted library allocation
page read and write
7FF84924D000
trusted library allocation
page read and write
20608663000
trusted library allocation
page read and write
206074B5000
heap
page read and write
1A88FF58000
trusted library allocation
page read and write
552B38C000
stack
page read and write
7FF849008000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
1E6D6B5E000
trusted library allocation
page read and write
7FF849220000
trusted library allocation
page execute and read and write
7FF849020000
trusted library allocation
page read and write
C9147D000
stack
page read and write
20605B80000
trusted library allocation
page read and write
C918FC000
stack
page read and write
206082C9000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
95F000
heap
page read and write
29506A9C000
trusted library allocation
page read and write
1E6D70BE000
trusted library allocation
page read and write
7D0000
heap
page read and write
1E6EE594000
heap
page read and write
1A88EDFE000
trusted library allocation
page read and write
552A93B000
stack
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
20608112000
trusted library allocation
page read and write
1A89ED81000
trusted library allocation
page read and write
C917FE000
stack
page read and write
206176E1000
trusted library allocation
page read and write
295072B6000
trusted library allocation
page read and write
2061FDB0000
heap
page read and write
1E6D6B6C000
trusted library allocation
page read and write
1A8A7440000
heap
page read and write
1A8A71E9000
heap
page read and write
1E6E5F61000
trusted library allocation
page read and write
1A88F7D3000
trusted library allocation
page read and write
1BE95000
stack
page read and write
1E6EE9B0000
heap
page read and write
206094E6000
trusted library allocation
page read and write
D70000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
330000
unkown
page readonly
12722000
trusted library allocation
page read and write
29506A31000
trusted library allocation
page read and write
7FF849158000
trusted library allocation
page read and write
20607610000
heap
page execute and read and write
1A8A757D000
heap
page read and write
7FF8491E0000
trusted library allocation
page read and write
7FF848FC4000
trusted library allocation
page read and write
7FF848DF4000
trusted library allocation
page read and write
206094EB000
trusted library allocation
page read and write
29515E29000
trusted library allocation
page read and write
1E6D469F000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
29504024000
heap
page read and write
1A88EC40000
heap
page read and write
20608781000
trusted library allocation
page read and write
552B40E000
stack
page read and write
7DF486170000
trusted library allocation
page execute and read and write
206074CC000
heap
page read and write
1A8A7467000
heap
page read and write
1A890618000
trusted library allocation
page read and write
7FF848E22000
trusted library allocation
page read and write
1E6D4560000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
7FF849270000
trusted library allocation
page read and write
29503FA0000
heap
page read and write
9C973F9000
stack
page read and write
7FF849280000
trusted library allocation
page read and write
1E6E6251000
trusted library allocation
page read and write
20605AA4000
heap
page read and write
1E6D77F6000
trusted library allocation
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
7FF848E02000
trusted library allocation
page read and write
7FF849153000
trusted library allocation
page read and write
15233FA000
stack
page read and write
20608E48000
trusted library allocation
page read and write
7FF849290000
trusted library allocation
page read and write
552A83E000
stack
page read and write
295068AE000
trusted library allocation
page read and write
7FF848FA2000
trusted library allocation
page read and write
152383E000
stack
page read and write
7FF849213000
trusted library allocation
page read and write
7FF848FBA000
trusted library allocation
page read and write
1A8A71F1000
heap
page read and write
2951E190000
heap
page read and write
1E6EDF61000
heap
page read and write
1E6EE6E0000
heap
page read and write
2951E277000
heap
page read and write
1E6EE71F000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
9C96DB3000
stack
page read and write
7DF4ABCD0000
trusted library allocation
page execute and read and write
1A8A72BA000
heap
page read and write
7FF849210000
trusted library allocation
page read and write
2061FEBF000
heap
page read and write
29504029000
heap
page read and write
29506A98000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
7FF848E1B000
trusted library allocation
page execute and read and write
7FF8491A0000
trusted library allocation
page read and write
206179AB000
trusted library allocation
page read and write
1C3CE000
stack
page read and write
1A8A750F000
heap
page read and write
7FF848FE4000
trusted library allocation
page read and write
7FF8491B0000
trusted library allocation
page read and write
295041C0000
heap
page readonly
2951DFDF000
heap
page read and write
There are 854 hidden memdumps, click here to show them.