IOC Report
x.exe

loading gif

Files

File Path
Type
Category
Malicious
x.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\java update (64 bit).exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4kgxjo2a.h14.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4n4xj43d.tvs.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5tw3tlwy.vmf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5zyvb5j4.wjv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_b3auqxqp.ypd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bbtrwh01.qp1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cuvpbk5g.23y.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dyyekuld.bsr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gsdh0jlc.iqk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pp3di0oj.b4a.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_prmtbr1l.c3e.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qqsjttzh.ysf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_x35coq0l.cfe.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xydc1ujy.3zv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ylb4k0jh.0kv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yshen41j.gbz.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\java update (64 bit).lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jul 16 03:24:48 2024, mtime=Tue Jul 16 03:24:48 2024, atime=Tue Jul 16 03:24:48 2024, length=44544, window=hide
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\x.exe
"C:\Users\user\Desktop\x.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\x.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'x.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\java update (64 bit).exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'java update (64 bit).exe'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
89.213.177.100
malicious
http://www.microsoft.cots/MicrosoftP
unknown
http://nuget.org/NuGet.exe
unknown
http://www.microsoft.co(
unknown
http://crl.m
unknown
http://crl.m.
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
http://crl.micft.cMicRosof
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://crl.v
unknown
https://github.com/Pester/Pester
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 12 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
ip-api.com
208.95.112.1
malicious

IPs

IP
Domain
Country
Malicious
208.95.112.1
ip-api.com
United States
malicious
89.213.177.100
unknown
United Kingdom
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\x_RASMANCS
FileDirectory
There are 4 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
27F1000
trusted library allocation
page read and write
malicious
283A000
trusted library allocation
page read and write
malicious
502000
unkown
page readonly
malicious
240755D2000
heap
page read and write
36CEB3E000
stack
page read and write
E60000
heap
page read and write
1AE34F10000
trusted library section
page read and write
1AE34FE0000
heap
page execute and read and write
218137CD000
heap
page read and write
2CD4D068000
trusted library allocation
page read and write
7FFD34728000
trusted library allocation
page read and write
2CD4D048000
trusted library allocation
page read and write
2182DC41000
heap
page read and write
36CE7F7000
stack
page read and write
77B5E7E000
stack
page read and write
2CD637DA000
heap
page read and write
7FFD34560000
trusted library allocation
page read and write
7FFD348CC000
trusted library allocation
page read and write
1AE34CB0000
heap
page read and write
EC5FE7E000
stack
page read and write
1AE367F1000
heap
page read and write
218171E2000
trusted library allocation
page read and write
EC61047000
stack
page read and write
21815277000
heap
page read and write
2CD63796000
heap
page read and write
36CEC3E000
stack
page read and write
7FFD349A0000
trusted library allocation
page read and write
218151C0000
trusted library allocation
page read and write
7FFD347F0000
trusted library allocation
page read and write
2CD5B271000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
218166B4000
trusted library allocation
page read and write
77B5F7F000
stack
page read and write
7FFD347A0000
trusted library allocation
page read and write
21813817000
heap
page read and write
1AE37E93000
trusted library allocation
page read and write
77B59FE000
stack
page read and write
24001E25000
trusted library allocation
page read and write
240103CE000
trusted library allocation
page read and write
77B5CF9000
stack
page read and write
77B6BCD000
stack
page read and write
1AE35045000
heap
page read and write
7FFD3456D000
trusted library allocation
page execute and read and write
2182DC6D000
heap
page read and write
7FFD34873000
trusted library allocation
page read and write
21815230000
trusted library allocation
page read and write
7FFD34701000
trusted library allocation
page read and write
2CD63B05000
heap
page read and write
218137D5000
heap
page read and write
A63000
heap
page read and write
77B5873000
stack
page read and write
218137D3000
heap
page read and write
1AE35040000
heap
page read and write
2CD63AF3000
heap
page read and write
7FFD34750000
trusted library allocation
page read and write
7FFD34680000
trusted library allocation
page execute and read and write
7FFD34810000
trusted library allocation
page read and write
7FFD346F1000
trusted library allocation
page read and write
7FFD34996000
trusted library allocation
page read and write
7FFD347C0000
trusted library allocation
page read and write
7FFD347D0000
trusted library allocation
page read and write
2CD49883000
heap
page read and write
7FFD347D0000
trusted library allocation
page read and write
218253E1000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
240757F0000
heap
page read and write
1AE34D69000
heap
page read and write
77B5DFA000
stack
page read and write
7FFD3456B000
trusted library allocation
page read and write
7FFD34560000
trusted library allocation
page read and write
7FFD34730000
trusted library allocation
page execute and read and write
24073780000
trusted library allocation
page read and write
2CD5B549000
trusted library allocation
page read and write
2CD4C48F000
trusted library allocation
page read and write
2CD638C2000
heap
page read and write
1AE34D20000
heap
page read and write
2CD637ED000
heap
page read and write
7FFD34810000
trusted library allocation
page read and write
2182DC3C000
heap
page read and write
1AE4EFC4000
heap
page read and write
2CD49A95000
heap
page read and write
21817202000
trusted library allocation
page read and write
EC0000
heap
page read and write
21813B55000
heap
page read and write
7FFD34980000
trusted library allocation
page read and write
240756D0000
heap
page execute and read and write
7FFD34744000
trusted library allocation
page read and write
127F1000
trusted library allocation
page read and write
1B1BA000
stack
page read and write
7FFD34626000
trusted library allocation
page execute and read and write
1B73A000
heap
page read and write
7FFD34770000
trusted library allocation
page read and write
240012D8000
trusted library allocation
page read and write
1AE4F129000
heap
page read and write
7FFD348B4000
trusted library allocation
page read and write
7FFD34890000
trusted library allocation
page read and write
1AE4F0FD000
heap
page read and write
2182D868000
heap
page read and write
7FFD34770000
trusted library allocation
page read and write
1C176000
stack
page read and write
1AE34F60000
heap
page readonly
7FFD346E2000
trusted library allocation
page read and write
240756D6000
heap
page execute and read and write
7FFD34554000
trusted library allocation
page read and write
7FFD346F2000
trusted library allocation
page read and write
21813B20000
heap
page read and write
36CE3EE000
stack
page read and write
7FFD348D0000
trusted library allocation
page read and write
7FFD34860000
trusted library allocation
page read and write
7FFD34544000
trusted library allocation
page read and write
500000
unkown
page readonly
7FFD34580000
trusted library allocation
page read and write
77B597E000
stack
page read and write
7FFD348B4000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page read and write
2CD4C1A5000
trusted library allocation
page read and write
2CD4C582000
trusted library allocation
page read and write
2182D874000
heap
page read and write
2182D8F9000
heap
page read and write
A3941DF000
stack
page read and write
1AE388AC000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
2CD638B0000
heap
page read and write
1AE46DBA000
trusted library allocation
page read and write
21815180000
trusted library allocation
page read and write
24001007000
trusted library allocation
page read and write
7FFD34700000
trusted library allocation
page execute and read and write
2182D940000
heap
page read and write
21815460000
trusted library allocation
page read and write
24075822000
heap
page read and write
218137CB000
heap
page read and write
7FFD349A6000
trusted library allocation
page read and write
240012A3000
trusted library allocation
page read and write
7FFD348AC000
trusted library allocation
page read and write
240758E9000
heap
page read and write
2182D876000
heap
page read and write
7FFD34748000
trusted library allocation
page read and write
2CD639C0000
heap
page read and write
240011D7000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page read and write
7FFD348D0000
trusted library allocation
page read and write
7FFD34730000
trusted library allocation
page execute and read and write
1AE388F6000
trusted library allocation
page read and write
21825452000
trusted library allocation
page read and write
7FFD34870000
trusted library allocation
page read and write
2CD49820000
heap
page read and write
1AE4F141000
heap
page read and write
7FFD34720000
trusted library allocation
page read and write
1B719000
heap
page read and write
7FFD3494C000
trusted library allocation
page read and write
2CD4B241000
trusted library allocation
page read and write
7FFD34554000
trusted library allocation
page read and write
7FFD34722000
trusted library allocation
page read and write
36CF68F000
stack
page read and write
7FFD34990000
trusted library allocation
page read and write
7FFD34893000
trusted library allocation
page read and write
7FFD348CA000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
24074FB0000
trusted library allocation
page read and write
24073530000
heap
page read and write
2182DCA4000
heap
page read and write
A39419E000
stack
page read and write
24075866000
heap
page read and write
2CD63990000
heap
page execute and read and write
EC60FCE000
stack
page read and write
2CD4C54A000
trusted library allocation
page read and write
36CF88D000
stack
page read and write
7FFD348A4000
trusted library allocation
page read and write
24075964000
heap
page read and write
2CD63B12000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
7FFD347F0000
trusted library allocation
page read and write
7FFD34953000
trusted library allocation
page read and write
7FFD34562000
trusted library allocation
page read and write
BF0000
heap
page read and write
7FFD3460C000
trusted library allocation
page execute and read and write
2CD49960000
trusted library allocation
page read and write
7FFD3461C000
trusted library allocation
page execute and read and write
77B55EE000
stack
page read and write
2CD63246000
heap
page read and write
24010021000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
A394113000
stack
page read and write
7FFD34700000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
2CD4CB38000
trusted library allocation
page read and write
EC5FF79000
stack
page read and write
1AD7D000
stack
page read and write
21816151000
trusted library allocation
page read and write
7FFD34720000
trusted library allocation
page execute and read and write
1C180000
heap
page read and write
AB0000
heap
page read and write
A394AFB000
stack
page read and write
2CD4C5C6000
trusted library allocation
page read and write
2CD498C4000
heap
page read and write
7FFD34821000
trusted library allocation
page read and write
24010031000
trusted library allocation
page read and write
1C07A000
stack
page read and write
7FFD34553000
trusted library allocation
page execute and read and write
7FFD348F0000
trusted library allocation
page read and write
7FFD346E0000
trusted library allocation
page read and write
24073560000
heap
page read and write
2CD63762000
heap
page read and write
7FFD348BC000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
7FFD349E0000
trusted library allocation
page read and write
A3955CE000
stack
page read and write
2CD5B261000
trusted library allocation
page read and write
5E0000
heap
page read and write
2CD4C1B2000
trusted library allocation
page read and write
7FFD34685000
trusted library allocation
page execute and read and write
7DF418A50000
trusted library allocation
page execute and read and write
2407359F000
heap
page read and write
7FFD34970000
trusted library allocation
page execute and read and write
24001309000
trusted library allocation
page read and write
7FFD3457B000
trusted library allocation
page read and write
24074FF0000
trusted library allocation
page read and write
7FFD34970000
trusted library allocation
page read and write
1C83A000
stack
page read and write
1AE34CE0000
heap
page read and write
7FFD348A8000
trusted library allocation
page read and write
2CD639FC000
heap
page read and write
7FFD34616000
trusted library allocation
page read and write
7FFD349B7000
trusted library allocation
page read and write
7DF43F640000
trusted library allocation
page execute and read and write
7FFD34830000
trusted library allocation
page read and write
590000
heap
page read and write
2182D817000
heap
page execute and read and write
2CD4CAAF000
trusted library allocation
page read and write
A5D000
heap
page read and write
24001E00000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
21813814000
heap
page read and write
24001781000
trusted library allocation
page read and write
7FFD34742000
trusted library allocation
page read and write
2CD5B539000
trusted library allocation
page read and write
7FFD34810000
trusted library allocation
page read and write
21825411000
trusted library allocation
page read and write
7FFD34800000
trusted library allocation
page read and write
1AE4F0EC000
heap
page read and write
2407597A000
heap
page read and write
1AE34D65000
heap
page read and write
218151F0000
trusted library allocation
page read and write
7FFD34720000
trusted library allocation
page execute and read and write
EC603FE000
stack
page read and write
7FFD34940000
trusted library allocation
page read and write
218256CF000
trusted library allocation
page read and write
7FFD34870000
trusted library allocation
page read and write
1B290000
heap
page execute and read and write
A39447E000
stack
page read and write
1AE37DD7000
trusted library allocation
page read and write
77B6ACE000
stack
page read and write
1AE3784B000
trusted library allocation
page read and write
7FFD34562000
trusted library allocation
page read and write
36CE6F9000
stack
page read and write
24075040000
heap
page execute and read and write
1AE4F07A000
heap
page read and write
7FFD3457D000
trusted library allocation
page execute and read and write
7FFD349D0000
trusted library allocation
page read and write
2CD4C517000
trusted library allocation
page read and write
7FFD3471A000
trusted library allocation
page read and write
7FFD348D0000
trusted library allocation
page read and write
77B5C77000
stack
page read and write
2CD4C2FF000
trusted library allocation
page read and write
2CD49995000
heap
page read and write
36CE9B9000
stack
page read and write
7FFD348B0000
trusted library allocation
page read and write
EC5FFFE000
stack
page read and write
21815260000
heap
page read and write
7FFD34560000
trusted library allocation
page read and write
7FFD34540000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
24000BFF000
trusted library allocation
page read and write
7FFD34760000
trusted library allocation
page read and write
24075676000
heap
page read and write
EC5FBFE000
stack
page read and write
7FFD34850000
trusted library allocation
page read and write
24000D73000
trusted library allocation
page read and write
2CD639CE000
heap
page read and write
2CD637A7000
heap
page read and write
2182D83F000
heap
page read and write
EA0000
heap
page execute and read and write
1B6A0000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD348CC000
trusted library allocation
page read and write
A394677000
stack
page read and write
24000001000
trusted library allocation
page read and write
1AE34FA0000
trusted library allocation
page read and write
1AE46B41000
trusted library allocation
page read and write
2182DC00000
heap
page read and write
24075137000
heap
page read and write
2CD4D023000
trusted library allocation
page read and write
1AE36AC0000
heap
page read and write
1AE36AD1000
trusted library allocation
page read and write
24000CCF000
trusted library allocation
page read and write
1B9DE000
stack
page read and write
7FFD34870000
trusted library allocation
page read and write
24010072000
trusted library allocation
page read and write
7FFD34930000
trusted library allocation
page read and write
240735E9000
heap
page read and write
1C63A000
stack
page read and write
1AE4F00B000
heap
page read and write
240756A0000
heap
page execute and read and write
7FFD34550000
trusted library allocation
page read and write
2407596D000
heap
page read and write
7FFD34760000
trusted library allocation
page read and write
2182DD81000
heap
page read and write
21813790000
heap
page read and write
240758E1000
heap
page read and write
24075700000
heap
page read and write
24074F50000
trusted library allocation
page read and write
1AE37AFF000
trusted library allocation
page read and write
1AB70000
heap
page read and write
7FFD34711000
trusted library allocation
page read and write
240012D4000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
21813750000
heap
page read and write
2CD638CE000
heap
page read and write
7FFD347B0000
trusted library allocation
page read and write
7FFD34990000
trusted library allocation
page read and write
7FFD34610000
trusted library allocation
page execute and read and write
1AE3860A000
trusted library allocation
page read and write
A395649000
stack
page read and write
2CD4C606000
trusted library allocation
page read and write
7DF4E7910000
trusted library allocation
page execute and read and write
1AE4EFCC000
heap
page read and write
240758AB000
heap
page read and write
24000FA1000
trusted library allocation
page read and write
7FFD34890000
trusted library allocation
page read and write
2181637D000
trusted library allocation
page read and write
2CD49940000
trusted library section
page read and write
1AE4F0A7000
heap
page read and write
7FFD34800000
trusted library allocation
page read and write
1BF75000
stack
page read and write
36CF78E000
stack
page read and write
7DF4E0630000
trusted library allocation
page execute and read and write
1AE4EFF2000
heap
page read and write
1AE38252000
trusted library allocation
page read and write
24000C07000
trusted library allocation
page read and write
7FFD34760000
trusted library allocation
page read and write
EC601F6000
stack
page read and write
1AE34DA9000
heap
page read and write
9F6000
heap
page read and write
7FFD348B0000
trusted library allocation
page read and write
7FFD34950000
trusted library allocation
page read and write
1C21E000
stack
page read and write
7FFD34860000
trusted library allocation
page read and write
2CD63B0B000
heap
page read and write
77B5B77000
stack
page read and write
7FFD3456D000
trusted library allocation
page execute and read and write
7FFD347E0000
trusted library allocation
page read and write
7FFD34750000
trusted library allocation
page execute and read and write
7FFD348E0000
trusted library allocation
page read and write
1AE37BBF000
trusted library allocation
page read and write
7FFD3457B000
trusted library allocation
page execute and read and write
1AE3835E000
trusted library allocation
page read and write
7FFD349AD000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
218151A0000
trusted library allocation
page read and write
7FFD346FA000
trusted library allocation
page read and write
21813B15000
heap
page read and write
7FFD34950000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page read and write
2182D7E0000
heap
page execute and read and write
77B5EFE000
stack
page read and write
7FFD348A9000
trusted library allocation
page read and write
1AE36993000
heap
page read and write
A39574C000
stack
page read and write
2181615A000
trusted library allocation
page read and write
7FFD34791000
trusted library allocation
page read and write
2CD4C57D000
trusted library allocation
page read and write
218153E1000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
7FFD34940000
trusted library allocation
page read and write
24000D0D000
trusted library allocation
page read and write
240758D4000
heap
page read and write
240737A0000
heap
page read and write
7FFD34660000
trusted library allocation
page execute and read and write
1AE46AF1000
trusted library allocation
page read and write
21815609000
trusted library allocation
page read and write
7FFD34724000
trusted library allocation
page read and write
218256CB000
trusted library allocation
page read and write
EC602F8000
stack
page read and write
7FFD347E4000
trusted library allocation
page read and write
2CD4989D000
heap
page read and write
7FFD347D0000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
36CF70D000
stack
page read and write
2CD499C0000
trusted library allocation
page read and write
21813B10000
heap
page read and write
7FFD34860000
trusted library allocation
page read and write
EC6037F000
stack
page read and write
77B6C4E000
stack
page read and write
2182D820000
heap
page read and write
77B5AFE000
stack
page read and write
EC60F4E000
stack
page read and write
7FFD347E0000
trusted library allocation
page read and write
240758C2000
heap
page read and write
7FFD348B0000
trusted library allocation
page read and write
2CD638BC000
heap
page read and write
24001210000
trusted library allocation
page read and write
24075A60000
heap
page read and write
2CD49950000
trusted library section
page read and write
7DF43F630000
trusted library allocation
page execute and read and write
7FFD34990000
trusted library allocation
page execute and read and write
218165B6000
trusted library allocation
page read and write
2CD496E0000
heap
page read and write
7FFD34710000
trusted library allocation
page execute and read and write
24001160000
trusted library allocation
page read and write
7FFD3471A000
trusted library allocation
page read and write
240010BE000
trusted library allocation
page read and write
1AE36950000
heap
page read and write
1AE34CC0000
heap
page read and write
2CD49A00000
heap
page read and write
2CD63707000
heap
page execute and read and write
1AE36B57000
trusted library allocation
page read and write
7FFD347F0000
trusted library allocation
page read and write
7FFD34552000
trusted library allocation
page read and write
7FFD3459C000
trusted library allocation
page execute and read and write
218153D0000
heap
page execute and read and write
7FFD34570000
trusted library allocation
page read and write
77B5D79000
stack
page read and write
9FC000
heap
page read and write
1AE37E0B000
trusted library allocation
page read and write
EC5000
heap
page read and write
2182DC97000
heap
page read and write
1AE36955000
heap
page read and write
24000BF9000
trusted library allocation
page read and write
1AE34D7D000
heap
page read and write
7FFD347E0000
trusted library allocation
page read and write
24073510000
heap
page read and write
2CD63BE0000
trusted library allocation
page read and write
7FFD348B9000
trusted library allocation
page read and write
7FFD34670000
trusted library allocation
page execute and read and write
7FFD34960000
trusted library allocation
page read and write
7FFD3456D000
trusted library allocation
page execute and read and write
EC5FB33000
stack
page read and write
240737A5000
heap
page read and write
7FFD3455D000
trusted library allocation
page execute and read and write
24073770000
trusted library section
page read and write
7FFD34732000
trusted library allocation
page read and write
2CD497C0000
heap
page read and write
EC610CC000
stack
page read and write
2CD4C1AA000
trusted library allocation
page read and write
2181649D000
trusted library allocation
page read and write
2CD4D06D000
trusted library allocation
page read and write
24075125000
heap
page read and write
1AE34EF0000
heap
page read and write
7FFD348F0000
trusted library allocation
page read and write
2182DDAA000
heap
page read and write
2CD49A10000
trusted library allocation
page read and write
1AE3841F000
trusted library allocation
page read and write
A394579000
stack
page read and write
21813770000
heap
page read and write
7FFD34820000
trusted library allocation
page read and write
A3947F7000
stack
page read and write
2CD4BFC6000
trusted library allocation
page read and write
7FFD348A2000
trusted library allocation
page read and write
E40000
trusted library allocation
page read and write
7FFD34646000
trusted library allocation
page execute and read and write
7FFD34606000
trusted library allocation
page read and write
2CD63B1D000
heap
page read and write
E63000
heap
page read and write
7FFD347B0000
trusted library allocation
page read and write
218151B0000
heap
page readonly
2CD5B531000
trusted library allocation
page read and write
2CD63AFA000
heap
page read and write
500000
unkown
page readonly
7FFD347F0000
trusted library allocation
page read and write
7FFD349D0000
trusted library allocation
page read and write
7FFD34880000
trusted library allocation
page read and write
7FFD34710000
trusted library allocation
page execute and read and write
218256D9000
trusted library allocation
page read and write
24075580000
heap
page read and write
2CD63710000
heap
page read and write
7FFD345BC000
trusted library allocation
page execute and read and write
7FFD34770000
trusted library allocation
page read and write
21813B50000
heap
page read and write
218256E9000
trusted library allocation
page read and write
2401030A000
trusted library allocation
page read and write
2CD4B2C7000
trusted library allocation
page read and write
7FFD34742000
trusted library allocation
page read and write
7FFD348B0000
trusted library allocation
page read and write
12802000
trusted library allocation
page read and write
7FFD345F0000
trusted library allocation
page read and write
1AE4EFB0000
heap
page read and write
7FFD348D0000
trusted library allocation
page read and write
7FFD348E0000
trusted library allocation
page read and write
A394A7E000
stack
page read and write
1AE36A15000
heap
page read and write
24001945000
trusted library allocation
page read and write
7FFD34744000
trusted library allocation
page read and write
7FFD34670000
trusted library allocation
page execute and read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
2CD63760000
heap
page read and write
218171BD000
trusted library allocation
page read and write
1AE37CE1000
trusted library allocation
page read and write
A3956CD000
stack
page read and write
1B6FD000
heap
page read and write
21816C48000
trusted library allocation
page read and write
127F8000
trusted library allocation
page read and write
7FFD34770000
trusted library allocation
page read and write
1AE4EFA6000
heap
page execute and read and write
7FFD34890000
trusted library allocation
page read and write
2407597C000
heap
page read and write
21816683000
trusted library allocation
page read and write
240102EB000
trusted library allocation
page read and write
36CE2E3000
stack
page read and write
1AE4EFA0000
heap
page execute and read and write
E43000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
24001A0C000
trusted library allocation
page read and write
1AE4F1B0000
trusted library allocation
page read and write
7FFD34850000
trusted library allocation
page read and write
2182DDB7000
heap
page read and write
2CD4C1B6000
trusted library allocation
page read and write
EC6047C000
stack
page read and write
7FFD34550000
trusted library allocation
page read and write
36CE8F7000
stack
page read and write
1AE4F034000
heap
page read and write
77B5FFB000
stack
page read and write
2CD4B70E000
trusted library allocation
page read and write
7DF4E7900000
trusted library allocation
page execute and read and write
2CD499B0000
heap
page execute and read and write
1B740000
heap
page read and write
2CD63700000
heap
page execute and read and write
7FFD347A0000
trusted library allocation
page read and write
7FFD34646000
trusted library allocation
page execute and read and write
1C840000
heap
page read and write
24073500000
heap
page read and write
7FFD3495C000
trusted library allocation
page read and write
7FFD348C0000
trusted library allocation
page read and write
2CD497E0000
heap
page read and write
2182DD9F000
heap
page read and write
7FFD3457B000
trusted library allocation
page read and write
2CD4C009000
trusted library allocation
page read and write
BF5000
heap
page read and write
240735A1000
heap
page read and write
1AE37B31000
trusted library allocation
page read and write
7FFD34636000
trusted library allocation
page execute and read and write
2CD499A0000
heap
page readonly
7FFD34574000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page read and write
1AE37522000
trusted library allocation
page read and write
21825401000
trusted library allocation
page read and write
1AE34F50000
trusted library allocation
page read and write
7FFD34550000
trusted library allocation
page read and write
2400133C000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page read and write
240735A5000
heap
page read and write
7FFD34543000
trusted library allocation
page execute and read and write
7FFD34563000
trusted library allocation
page execute and read and write
7FFD34720000
trusted library allocation
page execute and read and write
36CE87D000
stack
page read and write
7FFD34980000
trusted library allocation
page execute and read and write
7DF4E0640000
trusted library allocation
page execute and read and write
7FFD34570000
trusted library allocation
page read and write
7FFD34750000
trusted library allocation
page execute and read and write
7FFD34790000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
2182DC59000
heap
page read and write
2182DC65000
heap
page read and write
218137EB000
heap
page read and write
7FFD34730000
trusted library allocation
page execute and read and write
27E0000
heap
page read and write
24001121000
trusted library allocation
page read and write
2CD4C362000
trusted library allocation
page read and write
1AE4F133000
heap
page read and write
7FFD34564000
trusted library allocation
page read and write
1AE4EEA0000
heap
page read and write
7FFD3455D000
trusted library allocation
page execute and read and write
218163E6000
trusted library allocation
page read and write
240735E4000
heap
page read and write
AB3000
heap
page read and write
240757E8000
heap
page read and write
1AE34F30000
trusted library allocation
page read and write
7FFD34980000
trusted library allocation
page read and write
24074F60000
heap
page read and write
36CF90E000
stack
page read and write
218256D7000
trusted library allocation
page read and write
7FFD34880000
trusted library allocation
page read and write
7FFD348B8000
trusted library allocation
page read and write
1AE36CF8000
trusted library allocation
page read and write
24075A00000
trusted library allocation
page read and write
2182D8BF000
heap
page read and write
EC6114E000
stack
page read and write
7FFD34740000
trusted library allocation
page execute and read and write
1BBDD000
stack
page read and write
2CD5B241000
trusted library allocation
page read and write
A394879000
stack
page read and write
1AE37B8D000
trusted library allocation
page read and write
7FFD348C5000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page read and write
21816377000
trusted library allocation
page read and write
1AE46E21000
trusted library allocation
page read and write
7FFD347D0000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
7FFD34700000
trusted library allocation
page execute and read and write
A3944FF000
stack
page read and write
7FFD34893000
trusted library allocation
page read and write
7DF4E7920000
trusted library allocation
page execute and read and write
1AE37AD4000
trusted library allocation
page read and write
240757E4000
heap
page read and write
7FFD348B9000
trusted library allocation
page read and write
7FFD34560000
trusted library allocation
page read and write
7FFD34760000
trusted library allocation
page read and write
24010001000
trusted library allocation
page read and write
1AE4EFC8000
heap
page read and write
24001DDA000
trusted library allocation
page read and write
2CD49840000
heap
page read and write
7FFD34560000
trusted library allocation
page read and write
1AE38819000
trusted library allocation
page read and write
276F000
stack
page read and write
21817207000
trusted library allocation
page read and write
7FFD345F6000
trusted library allocation
page read and write
240102FA000
trusted library allocation
page read and write
A39554C000
stack
page read and write
1AE4F0A9000
heap
page read and write
7FFD346F0000
trusted library allocation
page read and write
2CD63B1A000
heap
page read and write
A3945FF000
stack
page read and write
2182DA40000
trusted library allocation
page read and write
240102F2000
trusted library allocation
page read and write
EC6057B000
stack
page read and write
1B49E000
stack
page read and write
7FFD348C8000
trusted library allocation
page read and write
7FFD34711000
trusted library allocation
page read and write
127FE000
trusted library allocation
page read and write
240004CD000
trusted library allocation
page read and write
7FFD347C0000
trusted library allocation
page read and write
36CEBBF000
stack
page read and write
1AE4EFC0000
heap
page read and write
1AE34F20000
trusted library section
page read and write
A3949FE000
stack
page read and write
7FFD3461C000
trusted library allocation
page execute and read and write
A32000
heap
page read and write
218166E7000
trusted library allocation
page read and write
240758C0000
heap
page read and write
24000229000
trusted library allocation
page read and write
7FFD34880000
trusted library allocation
page read and write
7FFD348A0000
trusted library allocation
page read and write
7FFD34702000
trusted library allocation
page read and write
1AE34DA5000
heap
page read and write
7FFD34850000
trusted library allocation
page read and write
21813740000
heap
page read and write
7FFD3460C000
trusted library allocation
page execute and read and write
77B5A79000
stack
page read and write
36CE93F000
stack
page read and write
7FFD345AC000
trusted library allocation
page execute and read and write
240757EC000
heap
page read and write
7FFD34680000
trusted library allocation
page execute and read and write
2CD49A40000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
2CD637D1000
heap
page read and write
21815170000
trusted library section
page read and write
2182DC61000
heap
page read and write
1AE4F04D000
heap
page read and write
36CEABC000
stack
page read and write
EC5FBBE000
stack
page read and write
218158AD000
trusted library allocation
page read and write
1AE369EB000
heap
page read and write
1AE4F360000
heap
page read and write
7FFD348E0000
trusted library allocation
page read and write
240735BD000
heap
page read and write
7FFD34810000
trusted library allocation
page read and write
7FFD349BD000
trusted library allocation
page read and write
7DF418A60000
trusted library allocation
page execute and read and write
7FFD34748000
trusted library allocation
page read and write
1AE34D5D000
heap
page read and write
2182DC10000
heap
page read and write
2CD4C9C9000
trusted library allocation
page read and write
9F0000
heap
page read and write
1AE34D5F000
heap
page read and write
5C0000
heap
page read and write
2182DC71000
heap
page read and write
21815FE6000
trusted library allocation
page read and write
2CD5B2B2000
trusted library allocation
page read and write
24001E20000
trusted library allocation
page read and write
2CD63712000
heap
page read and write
77B69CE000
stack
page read and write
7FFD347A3000
trusted library allocation
page read and write
2CD4C41A000
trusted library allocation
page read and write
7FFD34860000
trusted library allocation
page read and write
7FFD3455B000
trusted library allocation
page read and write
1BADE000
stack
page read and write
2CD639E0000
heap
page read and write
1AE36A90000
heap
page execute and read and write
7FFD34616000
trusted library allocation
page read and write
A3946FD000
stack
page read and write
7FFD348A0000
trusted library allocation
page read and write
24010243000
trusted library allocation
page read and write
7FFD348B2000
trusted library allocation
page read and write
21816412000
trusted library allocation
page read and write
1A820000
trusted library allocation
page read and write
24073652000
heap
page read and write
7FFD34553000
trusted library allocation
page execute and read and write
1AE36984000
heap
page read and write
7FFD3470A000
trusted library allocation
page read and write
7FFD34894000
trusted library allocation
page read and write
1AE36F9D000
trusted library allocation
page read and write
2182DC69000
heap
page read and write
EC604FE000
stack
page read and write
1AE388D1000
trusted library allocation
page read and write
21813812000
heap
page read and write
7FFD34950000
trusted library allocation
page read and write
218137A2000
heap
page read and write
EC60079000
stack
page read and write
240013C1000
trusted library allocation
page read and write
EC5FEFE000
stack
page read and write
21816B63000
trusted library allocation
page read and write
2CD5B52F000
trusted library allocation
page read and write
1AE369BF000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
EC6114C000
stack
page read and write
240735E6000
heap
page read and write
7FFD34734000
trusted library allocation
page read and write
1C1DE000
stack
page read and write
21816500000
trusted library allocation
page read and write
240735A7000
heap
page read and write
2CD49887000
heap
page read and write
36CE67F000
stack
page read and write
A3957CE000
stack
page read and write
7FFD346F0000
trusted library allocation
page read and write
2CD49980000
trusted library allocation
page read and write
2400188D000
trusted library allocation
page read and write
7FFD34710000
trusted library allocation
page execute and read and write
36CF809000
stack
page read and write
7FFD347B0000
trusted library allocation
page read and write
1AE34FF0000
trusted library allocation
page read and write
24075120000
heap
page read and write
7FFD348C0000
trusted library allocation
page read and write
240755A9000
heap
page read and write
77B58FE000
stack
page read and write
77B6B49000
stack
page read and write
7FFD34563000
trusted library allocation
page execute and read and write
1AE369BD000
heap
page read and write
1AE46AD1000
trusted library allocation
page read and write
1AE34D28000
heap
page read and write
240758DD000
heap
page read and write
2407359C000
heap
page read and write
7FFD34600000
trusted library allocation
page read and write
2CD498C8000
heap
page read and write
24001827000
trusted library allocation
page read and write
77B5BFD000
stack
page read and write
1B723000
heap
page read and write
24010011000
trusted library allocation
page read and write
7FFD34960000
trusted library allocation
page execute and read and write
7FFD34542000
trusted library allocation
page read and write
2182D810000
heap
page execute and read and write
240102F0000
trusted library allocation
page read and write
36CE77F000
stack
page read and write
7FFD34840000
trusted library allocation
page read and write
2CD4CB97000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
7FFD34606000
trusted library allocation
page read and write
2CD63B0D000
heap
page read and write
A3954CE000
stack
page read and write
A3948F8000
stack
page read and write
7FFD349C0000
trusted library allocation
page read and write
24075632000
heap
page read and write
1B75A000
heap
page read and write
24074F70000
heap
page readonly
24000A52000
trusted library allocation
page read and write
36CEA38000
stack
page read and write
7FFD34610000
trusted library allocation
page read and write
7FFD34850000
trusted library allocation
page read and write
7FFD345FC000
trusted library allocation
page execute and read and write
24073740000
heap
page read and write
1C73C000
stack
page read and write
EC600FD000
stack
page read and write
7FFD34740000
trusted library allocation
page read and write
1AE388F1000
trusted library allocation
page read and write
A39497E000
stack
page read and write
7FFD34870000
trusted library allocation
page read and write
1AE37D1E000
trusted library allocation
page read and write
24075943000
heap
page read and write
1AE37D76000
trusted library allocation
page read and write
1AE4EFB4000
heap
page read and write
1AE37CA8000
trusted library allocation
page read and write
36CECBB000
stack
page read and write
7FFD34883000
trusted library allocation
page read and write
1AE46DD8000
trusted library allocation
page read and write
7FFD34564000
trusted library allocation
page read and write
7FFD34636000
trusted library allocation
page execute and read and write
7FF48DA10000
trusted library allocation
page execute and read and write
2CD49990000
heap
page read and write
7FFD34970000
trusted library allocation
page read and write
2CD63ACF000
heap
page read and write
2182DD06000
heap
page read and write
2CD4BC93000
trusted library allocation
page read and write
2CD49889000
heap
page read and write
2400194E000
trusted library allocation
page read and write
1AE46DBE000
trusted library allocation
page read and write
218167A2000
trusted library allocation
page read and write
A394779000
stack
page read and write
2CD4B46A000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page read and write
1B39E000
stack
page read and write
7FFD34800000
trusted library allocation
page read and write
1AE37BF2000
trusted library allocation
page read and write
1AE38337000
trusted library allocation
page read and write
1AE37A6D000
trusted library allocation
page read and write
1B59E000
stack
page read and write
EC6027A000
stack
page read and write
1BCDD000
stack
page read and write
8F1000
stack
page read and write
1AE4F11D000
heap
page read and write
240757F8000
heap
page read and write
2CD4CAD5000
trusted library allocation
page read and write
1B69C000
stack
page read and write
240755A5000
heap
page read and write
7FFD347C0000
trusted library allocation
page read and write
21816C6F000
trusted library allocation
page read and write
1AE36977000
heap
page read and write
24001866000
trusted library allocation
page read and write
1AE36960000
heap
page read and write
24001033000
trusted library allocation
page read and write
7FFD345AC000
trusted library allocation
page execute and read and write
2CD5B52B000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page read and write
2CD4C1AE000
trusted library allocation
page read and write
7FFD348C2000
trusted library allocation
page read and write
7FFD34610000
trusted library allocation
page read and write
E30000
trusted library allocation
page read and write
7FFD34570000
trusted library allocation
page read and write
7FFD34899000
trusted library allocation
page read and write
2CD49A90000
heap
page read and write
36CE36E000
stack
page read and write
1AE376D4000
trusted library allocation
page read and write
2CD4BE50000
trusted library allocation
page read and write
1AE4EFB8000
heap
page read and write
2182D830000
heap
page read and write
7FFD348C8000
trusted library allocation
page read and write
5A0000
heap
page read and write
21813B40000
trusted library section
page read and write
2CD63D50000
heap
page read and write
1C240000
heap
page read and write
2CD63ABB000
heap
page read and write
21816C09000
trusted library allocation
page read and write
77B6A4C000
stack
page read and write
240757E0000
heap
page read and write
1AE34D63000
heap
page read and write
2CD4C4E7000
trusted library allocation
page read and write
1AE4EFBC000
heap
page read and write
A1B000
heap
page read and write
7FFD34750000
trusted library allocation
page read and write
7FFD34600000
trusted library allocation
page read and write
24000D7C000
trusted library allocation
page read and write
7FFD3454D000
trusted library allocation
page execute and read and write
2182DCE7000
heap
page read and write
21816D30000
trusted library allocation
page read and write
CFD000
stack
page read and write
2CD4987D000
heap
page read and write
24073760000
trusted library section
page read and write
1AE37C31000
trusted library allocation
page read and write
21815E32000
trusted library allocation
page read and write
2CD638B5000
heap
page read and write
EC60179000
stack
page read and write
1AE46B01000
trusted library allocation
page read and write
2182D8E2000
heap
page read and write
7FFD34570000
trusted library allocation
page read and write
7FFD34738000
trusted library allocation
page read and write
7FFD345BC000
trusted library allocation
page execute and read and write
7FFD34950000
trusted library allocation
page read and write
A30000
heap
page read and write
1AE46DC8000
trusted library allocation
page read and write
2400007B000
trusted library allocation
page read and write
There are 859 hidden memdumps, click here to show them.