IOC Report
x.exe

loading gif

Files

File Path
Type
Category
Malicious
x.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\java Update Checker (64 bit).exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1ueo4ffq.vn4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2jpil5ea.rx2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3jww55mt.40y.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4jtzfcb1.gns.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4q2cf3tq.c4o.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bbysypb1.rq5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dwd4phg5.oa0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hnwlydii.k40.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_knzj5j05.vrt.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_po5w1lqy.ovr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_puncpt5y.knu.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q54gqb1g.vnc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_r1tvd2sx.gv1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tdtco2fd.nva.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_u3doyls5.mqk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wisemfew.4m4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\java Update Checker (64 bit).lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Tue Jul 16 03:27:56 2024, mtime=Tue Jul 16 03:27:56 2024, atime=Tue Jul 16 03:27:56 2024, length=43008, window=hide
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\x.exe
"C:\Users\user\Desktop\x.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\x.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'x.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\ProgramData\java Update Checker (64 bit).exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'java Update Checker (64 bit).exe'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
89.213.177.93
malicious
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://ources.t
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://aka.ms/pscore68
unknown
https://ion=v4.5N
unknown
http://www.apache.o
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://crl.micros
unknown
There are 7 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
89.213.177.93
unknown
United Kingdom
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
A2000
unkown
page readonly
malicious
2371000
trusted library allocation
page read and write
malicious
26FCA084000
trusted library allocation
page read and write
7FF84915C000
trusted library allocation
page read and write
7FF849210000
trusted library allocation
page execute and read and write
923000
heap
page read and write
BBC43CE000
stack
page read and write
26FC8E80000
trusted library allocation
page read and write
19F4F409000
trusted library allocation
page read and write
26FC942D000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page read and write
8E11313000
stack
page read and write
1B915860000
heap
page read and write
19F5048F000
trusted library allocation
page read and write
7FF849159000
trusted library allocation
page read and write
26FC77D0000
heap
page read and write
304DABE000
stack
page read and write
1B916876000
trusted library allocation
page read and write
2610746F000
trusted library allocation
page read and write
2431000
trusted library allocation
page read and write
8E119F9000
stack
page read and write
7FF848E96000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
7FF848E02000
trusted library allocation
page read and write
7FF849220000
trusted library allocation
page execute and read and write
19F4F120000
heap
page execute and read and write
19F676E0000
heap
page read and write
26105050000
trusted library allocation
page read and write
2611F056000
heap
page read and write
26FCA8B5000
trusted library allocation
page read and write
660000
heap
page read and write
7FF849188000
trusted library allocation
page read and write
8E11779000
stack
page read and write
1B917103000
trusted library allocation
page read and write
26104D0B000
heap
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
E429A79000
stack
page read and write
26FCA021000
trusted library allocation
page read and write
26FC8F50000
heap
page read and write
19F4F1E1000
trusted library allocation
page read and write
1BD0C000
stack
page read and write
1B913CE0000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
26FD9253000
trusted library allocation
page read and write
1B92DFB4000
heap
page read and write
26104C20000
heap
page read and write
7DF491370000
trusted library allocation
page execute and read and write
1AD3D000
stack
page read and write
1B9140C0000
heap
page read and write
1B925BD7000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
E429D79000
stack
page read and write
2611EFD8000
heap
page read and write
304D7F9000
stack
page read and write
7FF849250000
trusted library allocation
page read and write
19F4D6D9000
heap
page read and write
BBC4447000
stack
page read and write
E42AB47000
stack
page read and write
19F50FE6000
trusted library allocation
page read and write
2610790E000
trusted library allocation
page read and write
640000
heap
page read and write
19F5F211000
trusted library allocation
page read and write
1B925B03000
trusted library allocation
page read and write
8E113DE000
stack
page read and write
26116B5B000
trusted library allocation
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
E429CF7000
stack
page read and write
2611EDE0000
heap
page read and write
2611EC4F000
heap
page read and write
26FE1771000
heap
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
7FF849150000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
1D288000
heap
page read and write
19F67718000
heap
page read and write
1D282000
heap
page read and write
26FC8E40000
trusted library allocation
page read and write
304D1F3000
stack
page read and write
1B1CE000
heap
page read and write
304D6F9000
stack
page read and write
7FF849100000
trusted library allocation
page read and write
7FF848DF2000
trusted library allocation
page read and write
7FF848EA6000
trusted library allocation
page read and write
304D9B8000
stack
page read and write
304E68D000
stack
page read and write
8E11CFB000
stack
page read and write
7FF8491F0000
trusted library allocation
page read and write
1B9156E0000
trusted library allocation
page read and write
2611F120000
heap
page read and write
1B92DFA8000
heap
page read and write
26FC9B69000
trusted library allocation
page read and write
19F4EF80000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
19F504F1000
trusted library allocation
page read and write
7FF848FA5000
trusted library allocation
page read and write
26FC9BC7000
trusted library allocation
page read and write
1B1FD000
heap
page read and write
261081C5000
trusted library allocation
page read and write
26FC9CE1000
trusted library allocation
page read and write
26FC77D5000
heap
page read and write
26FD8FCD000
trusted library allocation
page read and write
19F67633000
heap
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
7FF849179000
trusted library allocation
page read and write
1B92DFA4000
heap
page read and write
19F4F1D0000
heap
page read and write
26116B64000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
19F4D680000
heap
page readonly
7FF848E1B000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
1B915871000
trusted library allocation
page read and write
26FC7410000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
261168DD000
trusted library allocation
page read and write
E429F7E000
stack
page read and write
26FC756F000
heap
page read and write
7FF849139000
trusted library allocation
page read and write
7FF849120000
trusted library allocation
page read and write
19F6764D000
heap
page read and write
7FF8491EC000
trusted library allocation
page read and write
E429E7E000
stack
page read and write
26FC7601000
heap
page read and write
1B92DD80000
trusted library allocation
page read and write
E4299FE000
stack
page read and write
2610823A000
trusted library allocation
page read and write
19F50A4C000
trusted library allocation
page read and write
19F676F6000
heap
page read and write
1B92E06E000
heap
page read and write
7FF848DF0000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
8E1274C000
stack
page read and write
19F4F127000
heap
page execute and read and write
7FF84920C000
trusted library allocation
page read and write
1B913D5B000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
496000
heap
page read and write
26108697000
trusted library allocation
page read and write
26116A76000
trusted library allocation
page read and write
1C50D000
stack
page read and write
7FF849220000
trusted library allocation
page read and write
19F67916000
heap
page read and write
BBC454E000
stack
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
7FF848DFB000
trusted library allocation
page read and write
8E117FE000
stack
page read and write
2611EDC0000
heap
page read and write
8E11B7E000
stack
page read and write
8E126CE000
stack
page read and write
7FF848FE4000
trusted library allocation
page read and write
26104D1A000
heap
page read and write
7FF849220000
trusted library allocation
page execute and read and write
19F50346000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page execute and read and write
304D5F9000
stack
page read and write
19F503FA000
trusted library allocation
page read and write
19F67854000
heap
page read and write
26FC74F0000
heap
page read and write
7FF848EA0000
trusted library allocation
page read and write
26FC7530000
heap
page read and write
26FD924B000
trusted library allocation
page read and write
19F67659000
heap
page read and write
1A8FC000
stack
page read and write
19F50A0D000
trusted library allocation
page read and write
2611EED0000
heap
page execute and read and write
1B9168D3000
trusted library allocation
page read and write
1B9158F5000
trusted library allocation
page read and write
8E12849000
stack
page read and write
7FF848DE0000
trusted library allocation
page read and write
BBC32FF000
stack
page read and write
7FF8490C0000
trusted library allocation
page read and write
19F67967000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
26104D2C000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
E429EFE000
stack
page read and write
26FD9265000
trusted library allocation
page read and write
19F4F160000
heap
page execute and read and write
6A5000
heap
page read and write
7FF848DF4000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
1B9165EB000
trusted library allocation
page read and write
7FF848E9C000
trusted library allocation
page execute and read and write
26106700000
trusted library allocation
page read and write
19F6798B000
heap
page read and write
19F4FDCD000
trusted library allocation
page read and write
304DC3C000
stack
page read and write
1B92DE45000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
1B916C3B000
trusted library allocation
page read and write
19F5038B000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
2611EF4C000
heap
page read and write
1B916998000
trusted library allocation
page read and write
261075E6000
trusted library allocation
page read and write
26FD8F61000
trusted library allocation
page read and write
1BF0C000
stack
page read and write
26FE18A9000
heap
page read and write
BBC3479000
stack
page read and write
1B915720000
trusted library allocation
page read and write
2611EFDA000
heap
page read and write
7FF8491F0000
trusted library allocation
page read and write
E429C79000
stack
page read and write
7FF849040000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
26116B56000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
1B13E000
stack
page read and write
7FF848EB0000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
1B913D5F000
heap
page read and write
2447000
trusted library allocation
page read and write
1BB8D000
stack
page read and write
BBC34FD000
stack
page read and write
26108677000
trusted library allocation
page read and write
1B916933000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
26FE18EB000
heap
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
1B1A5000
heap
page read and write
19F4D650000
trusted library allocation
page read and write
1B916FF7000
trusted library allocation
page read and write
BBC434C000
stack
page read and write
26FC7571000
heap
page read and write
7FF848FA0000
trusted library allocation
page read and write
261080DE000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
472000
heap
page read and write
1B92DEC0000
heap
page read and write
26107477000
trusted library allocation
page read and write
1BF10000
heap
page read and write
7FF8492A0000
trusted library allocation
page read and write
BBC3578000
stack
page read and write
2611ECF3000
heap
page read and write
26FCAD42000
trusted library allocation
page read and write
7FF849200000
trusted library allocation
page read and write
7FF849210000
trusted library allocation
page read and write
304D57E000
stack
page read and write
7FF849240000
trusted library allocation
page read and write
7FF849200000
trusted library allocation
page read and write
2610793A000
trusted library allocation
page read and write
304D939000
stack
page read and write
7FF848FD1000
trusted library allocation
page read and write
7FF849133000
trusted library allocation
page read and write
E42ABCC000
stack
page read and write
E429DF9000
stack
page read and write
1B925891000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
7FF848E2D000
trusted library allocation
page execute and read and write
7FF849002000
trusted library allocation
page read and write
304E707000
stack
page read and write
1B92E136000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
1B03F000
stack
page read and write
7FF849148000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
8E11A7E000
stack
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
26104CD8000
heap
page read and write
7FF848FC2000
trusted library allocation
page read and write
26104D10000
heap
page read and write
19F67830000
heap
page read and write
45C000
heap
page read and write
7FF848DE2000
trusted library allocation
page read and write
1B18D000
heap
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
2610869C000
trusted library allocation
page read and write
261074D9000
trusted library allocation
page read and write
19F6768B000
heap
page read and write
7DF4E6AB0000
trusted library allocation
page execute and read and write
7FF848E04000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
26116891000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
26FCA78E000
trusted library allocation
page read and write
7FF848F82000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
8E3000
trusted library allocation
page read and write
1B917695000
trusted library allocation
page read and write
BBC377F000
stack
page read and write
1B915730000
heap
page execute and read and write
7DF4E6AA0000
trusted library allocation
page execute and read and write
8E1167E000
stack
page read and write
26105075000
heap
page read and write
26107FF8000
trusted library allocation
page read and write
7FF849250000
trusted library allocation
page execute and read and write
19F6790F000
heap
page read and write
620000
heap
page read and write
52E000
heap
page read and write
26104D57000
heap
page read and write
1B925B61000
trusted library allocation
page read and write
2611EF1A000
heap
page read and write
1B204000
heap
page read and write
1B9168A2000
trusted library allocation
page read and write
19F502A4000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
7FF849240000
trusted library allocation
page read and write
26FE1700000
heap
page execute and read and write
7FF849140000
trusted library allocation
page read and write
1D392000
heap
page read and write
26106A99000
trusted library allocation
page read and write
26107C3B000
trusted library allocation
page read and write
7FF8491E0000
trusted library allocation
page read and write
7FF848FAA000
trusted library allocation
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
7FF849130000
trusted library allocation
page read and write
19F6765B000
heap
page read and write
7FF849160000
trusted library allocation
page read and write
26FE14F0000
heap
page execute and read and write
304D77D000
stack
page read and write
26105060000
heap
page readonly
26FCA7F4000
trusted library allocation
page read and write
1B916A1D000
trusted library allocation
page read and write
1B913CC0000
heap
page read and write
8D0000
trusted library allocation
page read and write
7FF84918C000
trusted library allocation
page read and write
7FF848DED000
trusted library allocation
page execute and read and write
7DF43F880000
trusted library allocation
page execute and read and write
8E118FD000
stack
page read and write
26FE18C0000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
26106871000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
26FCAD8C000
trusted library allocation
page read and write
7DF4A9690000
trusted library allocation
page execute and read and write
7FF848FB0000
trusted library allocation
page execute and read and write
7FF849050000
trusted library allocation
page read and write
19F4D630000
trusted library section
page read and write
7FF8490A0000
trusted library allocation
page read and write
1B655000
stack
page read and write
1B925B73000
trusted library allocation
page read and write
26FC7510000
heap
page read and write
1B917675000
trusted library allocation
page read and write
1B92DFB8000
heap
page read and write
26106860000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
1B925880000
trusted library allocation
page read and write
19F4F170000
trusted library allocation
page read and write
1C5F0000
heap
page read and write
4C1000
heap
page read and write
7FF849270000
trusted library allocation
page read and write
19F4D930000
heap
page read and write
26FE1586000
heap
page read and write
26FC9B61000
trusted library allocation
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
7FF849270000
trusted library allocation
page read and write
2611EF86000
heap
page read and write
7FF849090000
trusted library allocation
page read and write
26FE1A70000
heap
page read and write
BBC2EA3000
stack
page read and write
19F50213000
trusted library allocation
page read and write
2260000
heap
page execute and read and write
7FF8490B0000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page execute and read and write
7FF849120000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
7FF849149000
trusted library allocation
page read and write
1B9140B0000
trusted library section
page read and write
7FF848ED6000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF849280000
trusted library allocation
page read and write
1B915770000
trusted library allocation
page read and write
7FF8491A0000
trusted library allocation
page read and write
26104D16000
heap
page read and write
19F4D5B0000
heap
page read and write
26FE1550000
heap
page read and write
7FF849260000
trusted library allocation
page read and write
2611EF7E000
heap
page read and write
1B925C47000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
E429B79000
stack
page read and write
930000
heap
page read and write
1B916477000
trusted library allocation
page read and write
7FF849158000
trusted library allocation
page read and write
23DB000
trusted library allocation
page read and write
7FF849190000
trusted library allocation
page read and write
7FF84922C000
trusted library allocation
page read and write
26107880000
trusted library allocation
page read and write
7FF848EB6000
trusted library allocation
page read and write
7FF849240000
trusted library allocation
page read and write
7FF406730000
trusted library allocation
page execute and read and write
7FF848E00000
trusted library allocation
page read and write
19F50967000
trusted library allocation
page read and write
8E11BFE000
stack
page read and write
26108109000
trusted library allocation
page read and write
26FC9F66000
trusted library allocation
page read and write
26FE1600000
heap
page read and write
1B92DD50000
heap
page execute and read and write
1B915710000
heap
page readonly
1D380000
heap
page read and write
2611F130000
trusted library allocation
page read and write
26FE185F000
heap
page read and write
1B92DFA0000
heap
page read and write
1B915A99000
trusted library allocation
page read and write
261066C0000
trusted library allocation
page read and write
8E11977000
stack
page read and write
7FF849070000
trusted library allocation
page read and write
7FF848DF4000
trusted library allocation
page read and write
19F4D6D3000
heap
page read and write
2611ED0E000
heap
page read and write
26FCA325000
trusted library allocation
page read and write
19F4F050000
heap
page read and write
1B92E0E7000
heap
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
2611EF00000
heap
page read and write
26107469000
trusted library allocation
page read and write
7DF491380000
trusted library allocation
page execute and read and write
BBC33FF000
stack
page read and write
12378000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
7FF849220000
trusted library allocation
page read and write
7FF849154000
trusted library allocation
page read and write
19F4D640000
trusted library section
page read and write
7FF848FF0000
trusted library allocation
page read and write
26107A55000
trusted library allocation
page read and write
19F4FE7B000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
1B92DDC3000
heap
page read and write
19F5F4D3000
trusted library allocation
page read and write
BBC367A000
stack
page read and write
26FCA7CD000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
26FC9FF5000
trusted library allocation
page read and write
19F4D6DB000
heap
page read and write
19F671EC000
heap
page read and write
26FC7605000
heap
page read and write
1B92E11B000
heap
page read and write
E429AFF000
stack
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
1B45E000
stack
page read and write
1B916C37000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF8491F0000
trusted library allocation
page read and write
19F4D935000
heap
page read and write
7FF848EA6000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
19F50B34000
trusted library allocation
page read and write
1B925B63000
trusted library allocation
page read and write
1B195000
heap
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
E42ACCE000
stack
page read and write
19F4FC33000
trusted library allocation
page read and write
19F4D6ED000
heap
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
430000
heap
page read and write
26FCAD87000
trusted library allocation
page read and write
19F5F24D000
trusted library allocation
page read and write
7FF848FC2000
trusted library allocation
page read and write
1B92E109000
heap
page read and write
1B92DFBC000
heap
page read and write
304D67E000
stack
page read and write
26FE14F7000
heap
page execute and read and write
1A3A0000
trusted library allocation
page read and write
7FF849160000
trusted library allocation
page read and write
261068F7000
trusted library allocation
page read and write
1B913D23000
heap
page read and write
304E60E000
stack
page read and write
1B9140A0000
trusted library section
page read and write
1B916907000
trusted library allocation
page read and write
2611ECCD000
heap
page read and write
1B915850000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
1B92E085000
heap
page read and write
19F5F4CB000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
19F5F4D5000
trusted library allocation
page read and write
1B91690B000
trusted library allocation
page read and write
830000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
1B92DFB0000
heap
page read and write
19F4FDD9000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
304D47E000
stack
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
26106865000
heap
page read and write
26106730000
heap
page execute and read and write
7FF849070000
trusted library allocation
page read and write
12381000
trusted library allocation
page read and write
7FF849010000
trusted library allocation
page read and write
8E11C7F000
stack
page read and write
7FF849200000
trusted library allocation
page read and write
26FE1720000
heap
page read and write
1B925B59000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
BBC37FE000
stack
page read and write
1B925B55000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
304DB3C000
stack
page read and write
1B92D873000
heap
page read and write
E4298FE000
stack
page read and write
26104D54000
heap
page read and write
1B92DDA0000
heap
page read and write
26104CE2000
heap
page read and write
7FF848FD8000
trusted library allocation
page read and write
1B916B7E000
trusted library allocation
page read and write
26104D1E000
heap
page read and write
7FF849004000
trusted library allocation
page read and write
1B916A89000
trusted library allocation
page read and write
A0000
unkown
page readonly
19F5F4E5000
trusted library allocation
page read and write
E42997E000
stack
page read and write
7FF849210000
trusted library allocation
page read and write
26FC8E00000
heap
page read and write
BBC2F2D000
stack
page read and write
7FF849236000
trusted library allocation
page read and write
26106757000
heap
page read and write
7FF848E20000
trusted library allocation
page read and write
7FF849113000
trusted library allocation
page read and write
26FC8FE8000
trusted library allocation
page read and write
1B9170DC000
trusted library allocation
page read and write
7FF849123000
trusted library allocation
page read and write
1B92DFAC000
heap
page read and write
7FF848E1D000
trusted library allocation
page execute and read and write
26116871000
trusted library allocation
page read and write
19F4D690000
heap
page read and write
1B9171C4000
trusted library allocation
page read and write
7FF849008000
trusted library allocation
page read and write
1B92DE07000
heap
page read and write
7FF848F80000
trusted library allocation
page read and write
26FC9F92000
trusted library allocation
page read and write
23BF000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
19F4D610000
heap
page read and write
26FD9255000
trusted library allocation
page read and write
26FE0F60000
trusted library allocation
page read and write
1AE3E000
stack
page read and write
1B913D18000
heap
page read and write
1AF3E000
stack
page read and write
BBC36F9000
stack
page read and write
19F6794A000
heap
page read and write
8E11877000
stack
page read and write
7FF849010000
trusted library allocation
page read and write
1B9140C5000
heap
page read and write
1BBCE000
stack
page read and write
304E80C000
stack
page read and write
7FF84914C000
trusted library allocation
page read and write
19F4F055000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
8E11AF8000
stack
page read and write
E429873000
stack
page read and write
26FCA26A000
trusted library allocation
page read and write
8E127CE000
stack
page read and write
BBC2FEF000
stack
page read and write
8E1139D000
stack
page read and write
2611EF50000
heap
page read and write
261078AC000
trusted library allocation
page read and write
7FF849240000
trusted library allocation
page read and write
494000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
7FF849130000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page read and write
7FF849142000
trusted library allocation
page read and write
26105070000
heap
page read and write
2611EF54000
heap
page read and write
8E0000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
2611EF48000
heap
page read and write
2456000
trusted library allocation
page read and write
1B914080000
heap
page read and write
BBC35F6000
stack
page read and write
19F6764B000
heap
page read and write
7FF848FA2000
trusted library allocation
page read and write
7FF848E5C000
trusted library allocation
page execute and read and write
2611F076000
heap
page read and write
1BC0E000
stack
page read and write
7FF84923D000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
1B913D6F000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
19F4F6AE000
trusted library allocation
page read and write
1B20F000
heap
page read and write
7FF849230000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
1B980000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
26FE1829000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
19F50A73000
trusted library allocation
page read and write
26FE1500000
heap
page read and write
1B1D0000
heap
page read and write
19F4D6CC000
heap
page read and write
261072C3000
trusted library allocation
page read and write
7FF8491B0000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
1B915865000
heap
page read and write
26104C30000
heap
page read and write
4C6000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
7FF849290000
trusted library allocation
page read and write
26FE14E0000
trusted library allocation
page read and write
2610799D000
trusted library allocation
page read and write
7FF848FE2000
trusted library allocation
page read and write
26116CDE000
trusted library allocation
page read and write
1D280000
heap
page read and write
26107845000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page read and write
7FF848FB1000
trusted library allocation
page read and write
26FC760E000
heap
page read and write
1B92DD90000
heap
page execute and read and write
456000
heap
page read and write
236F000
stack
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
1B92DE59000
heap
page read and write
19F6794E000
heap
page read and write
19F501E7000
trusted library allocation
page read and write
7FF848FE0000
trusted library allocation
page read and write
26116B74000
trusted library allocation
page read and write
7FF8491E3000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
7FF848DF2000
trusted library allocation
page read and write
19F678D1000
heap
page read and write
7FF848FE8000
trusted library allocation
page read and write
7FF849134000
trusted library allocation
page read and write
19F67630000
heap
page read and write
7FF849182000
trusted library allocation
page read and write
19F4D716000
heap
page read and write
304D4FE000
stack
page read and write
26FCA6E8000
trusted library allocation
page read and write
7FF84916C000
trusted library allocation
page read and write
26FC8E60000
trusted library allocation
page read and write
1B1BC000
heap
page read and write
1B913D4E000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
26107B21000
trusted library allocation
page read and write
E42AC4C000
stack
page read and write
1B1C4000
heap
page read and write
26FC8F61000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page execute and read and write
BBC2FAE000
stack
page read and write
8E116FF000
stack
page read and write
26FD9246000
trusted library allocation
page read and write
7FF848F91000
trusted library allocation
page read and write
26FD924D000
trusted library allocation
page read and write
26106740000
heap
page read and write
19F5F1E1000
trusted library allocation
page read and write
261168A1000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
1B9258DC000
trusted library allocation
page read and write
E42AA4D000
stack
page read and write
7FF8491E0000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
7FF849250000
trusted library allocation
page read and write
26106717000
heap
page execute and read and write
26FD8F91000
trusted library allocation
page read and write
19F67711000
heap
page read and write
6A0000
heap
page read and write
26107813000
trusted library allocation
page read and write
2611EC20000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
1B9258A1000
trusted library allocation
page read and write
1B917650000
trusted library allocation
page read and write
26FC756D000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
2611EC5E000
heap
page read and write
2611F07F000
heap
page read and write
1B140000
heap
page read and write
1B92DDE6000
heap
page read and write
19F5F4C6000
trusted library allocation
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
7FF849070000
trusted library allocation
page read and write
7FF848E4C000
trusted library allocation
page execute and read and write
26106D3D000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
26FC99B4000
trusted library allocation
page read and write
7FF848F9A000
trusted library allocation
page read and write
7FF848E0B000
trusted library allocation
page read and write
26FD8F81000
trusted library allocation
page read and write
7FF849162000
trusted library allocation
page read and write
1B92DDE4000
heap
page read and write
26108167000
trusted library allocation
page read and write
7FF848E7C000
trusted library allocation
page execute and read and write
26FE0FD3000
heap
page read and write
A0000
unkown
page readonly
23F2000
trusted library allocation
page read and write
26FE15C1000
heap
page read and write
19F67667000
heap
page read and write
7FF849276000
trusted library allocation
page read and write
1B181000
heap
page read and write
2611F08A000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
2611EF58000
heap
page read and write
7FF848FC4000
trusted library allocation
page read and write
19F5100B000
trusted library allocation
page read and write
920000
heap
page read and write
1B913D57000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
19F4F268000
trusted library allocation
page read and write
1B916B1D000
trusted library allocation
page read and write
7FF849230000
trusted library allocation
page read and write
304E78C000
stack
page read and write
E42AACE000
stack
page read and write
7FF848E30000
trusted library allocation
page read and write
8B0000
trusted library allocation
page read and write
BBC3379000
stack
page read and write
19F4D5D0000
heap
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
26FE182D000
heap
page read and write
241D000
trusted library allocation
page read and write
19F5F201000
trusted library allocation
page read and write
19F50307000
trusted library allocation
page read and write
26108104000
trusted library allocation
page read and write
1E1000
stack
page read and write
304DBBE000
stack
page read and write
7FF849020000
trusted library allocation
page read and write
7FF849076000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
9F0000
heap
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
26FC7543000
heap
page read and write
1B913D96000
heap
page read and write
7FF848FD4000
trusted library allocation
page read and write
1B913D10000
heap
page read and write
26FCA173000
trusted library allocation
page read and write
7FF848E14000
trusted library allocation
page read and write
23F0000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
1B75A000
stack
page read and write
2445000
trusted library allocation
page read and write
900000
heap
page execute and read and write
26107B82000
trusted library allocation
page read and write
1B1DC000
heap
page read and write
26FC8E70000
heap
page readonly
19F4D4D0000
heap
page read and write
1B915700000
trusted library allocation
page read and write
7FF849153000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
7FF848FD2000
trusted library allocation
page read and write
1B91769A000
trusted library allocation
page read and write
26FC758D000
heap
page read and write
26FC7577000
heap
page read and write
E42A9CE000
stack
page read and write
BBC42CE000
stack
page read and write
304D8B6000
stack
page read and write
26104C50000
heap
page read and write
7FF848DE3000
trusted library allocation
page execute and read and write
7FF8490C0000
trusted library allocation
page read and write
26106710000
heap
page execute and read and write
7FF8490A0000
trusted library allocation
page read and write
19F503C1000
trusted library allocation
page read and write
7FF849246000
trusted library allocation
page read and write
1B854000
stack
page read and write
7FF849210000
trusted library allocation
page read and write
19F4FF5F000
trusted library allocation
page read and write
BBC38FB000
stack
page read and write
19F67750000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
26FCA208000
trusted library allocation
page read and write
1B92DD96000
heap
page execute and read and write
7FF848FDA000
trusted library allocation
page read and write
7FF8490F0000
trusted library allocation
page read and write
7FF848E3B000
trusted library allocation
page read and write
7FF849260000
trusted library allocation
page read and write
7FF848E3C000
trusted library allocation
page execute and read and write
19F51006000
trusted library allocation
page read and write
BBC387E000
stack
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
26FE0F90000
trusted library allocation
page read and write
19F50278000
trusted library allocation
page read and write
19F4FDE9000
trusted library allocation
page read and write
7FF848E22000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
26FCA13A000
trusted library allocation
page read and write
7FF849168000
trusted library allocation
page read and write
7FF84921A000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
19F5F4CD000
trusted library allocation
page read and write
26FC9B93000
trusted library allocation
page read and write
E429BFD000
stack
page read and write
7DF491390000
trusted library allocation
page execute and read and write
304D83E000
stack
page read and write
19F505AB000
trusted library allocation
page read and write
8E128CC000
stack
page read and write
26FC9189000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
19F4D6A2000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
7FF849144000
trusted library allocation
page read and write
1C30E000
stack
page read and write
1B92DFE2000
heap
page read and write
19F50438000
trusted library allocation
page read and write
450000
heap
page read and write
19F67867000
heap
page read and write
7DF4A96A0000
trusted library allocation
page execute and read and write
9F5000
heap
page read and write
1B913CB0000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
26FC8E95000
heap
page read and write
8E1294E000
stack
page read and write
1B915D3D000
trusted library allocation
page read and write
7FF8490B0000
trusted library allocation
page read and write
19F4D920000
trusted library allocation
page read and write
7FF848DE4000
trusted library allocation
page read and write
19F4D698000
heap
page read and write
26FE1887000
heap
page read and write
26FE1620000
heap
page read and write
7FF848EE6000
trusted library allocation
page execute and read and write
1B925871000
trusted library allocation
page read and write
7FF848DF0000
trusted library allocation
page read and write
7FF848EC6000
trusted library allocation
page execute and read and write
7FF848FBA000
trusted library allocation
page read and write
1B92E290000
heap
page read and write
BBC44CC000
stack
page read and write
7FF848FC0000
trusted library allocation
page read and write
26FC7539000
heap
page read and write
1B192000
heap
page read and write
261074D7000
trusted library allocation
page read and write
BBC327E000
stack
page read and write
26FC75B4000
heap
page read and write
7FF849174000
trusted library allocation
page read and write
1BE0A000
stack
page read and write
1B9162C2000
trusted library allocation
page read and write
E429FFB000
stack
page read and write
7FF848FF0000
trusted library allocation
page read and write
19F50FC1000
trusted library allocation
page read and write
7FF849180000
trusted library allocation
page read and write
E4295EF000
stack
page read and write
492000
heap
page read and write
304E80E000
stack
page read and write
1B916A50000
trusted library allocation
page read and write
19F67B10000
heap
page read and write
7DF43F870000
trusted library allocation
page execute and read and write
26104CD0000
heap
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
19F4D71A000
heap
page read and write
2611EF44000
heap
page read and write
26FC8F00000
heap
page execute and read and write
7FF8490E0000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
2402000
trusted library allocation
page read and write
12371000
trusted library allocation
page read and write
26FC7579000
heap
page read and write
26FE18B6000
heap
page read and write
26FE180C000
heap
page read and write
26104C90000
heap
page read and write
7FF849270000
trusted library allocation
page read and write
26FC8E90000
heap
page read and write
7FF848E02000
trusted library allocation
page read and write
7FF8491DA000
trusted library allocation
page read and write
26FCAD67000
trusted library allocation
page read and write
7FF848E40000
trusted library allocation
page read and write
26104D18000
heap
page read and write
304DA3E000
stack
page read and write
1B913D51000
heap
page read and write
19F4D670000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
26FE182F000
heap
page read and write
26108652000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
7FF8491D0000
trusted library allocation
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
19F4F100000
heap
page execute and read and write
26105030000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
7FF849150000
trusted library allocation
page read and write
1B33E000
stack
page read and write
7FF848FC8000
trusted library allocation
page read and write
26FE174B000
heap
page read and write
There are 864 hidden memdumps, click here to show them.