IOC Report
dat5E54.dll.exe

loading gif

Files

File Path
Type
Category
Malicious
dat5E54.dll.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\0404016.ps1
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\232462603231.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\24255015403505.ps1
ASCII text, with no line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\3065065663.txt
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_2vpni1xy.uzt.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c54ubspo.fui.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cj2uls5z.y5q.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_f3srqcml.4ec.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fuvxt1au.qgw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i0ahh5rr.t1x.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kfqhyc0k.tac.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_voywrvb5.few.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wcyg1rry.dur.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wr5gjj14.l4z.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xkr3xl5b.k2v.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zck2uart.i3j.psm1
ASCII text, with no line terminators
dropped
There are 8 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\dat5E54.dll.dll,go
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\dat5E54.dll.dll",#1
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-ExecutionPolicy RemoteSigned -Scope Process -Force -Confirm:$false;$PSDefaultParameterValues = @{'Out-File:Encoding' = 'utf8'}; " C:\Users\user\AppData\Local\Temp\0404016.ps1" | Out-File -encoding UTF8 "C:\Users\user\AppData\Local\Temp\3065065663.txt"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-ExecutionPolicy RemoteSigned -Scope Process -Force -Confirm:$false;$PSDefaultParameterValues = @{'Out-File:Encoding' = 'utf8'}; " C:\Users\user\AppData\Local\Temp\0404016.ps1" | Out-File -encoding UTF8 "C:\Users\user\AppData\Local\Temp\3065065663.txt"
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\dat5E54.dll.dll",go
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Set-ExecutionPolicy RemoteSigned -Scope Process -Force -Confirm:$false;$PSDefaultParameterValues = @{'Out-File:Encoding' = 'utf8'}; " C:\Users\user\AppData\Local\Temp\24255015403505.ps1" | Out-File -encoding UTF8 "C:\Users\user\AppData\Local\Temp\232462603231.txt"
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\dat5E54.dll.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\dat5E54.dll.dll",#1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
http://schemas.microsoft.cop
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://crl.m
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
https://aka.ms/winsvr-2022-pshelpX
unknown
https://.AppV.
unknown
http://crl.micft.cMicRosof
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://crl.v
unknown
https://github.com/Pester/Pester
unknown
There are 11 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
178.156.131.83
unknown
Romania
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
7FFDA350D000
unkown
page readonly
1BBE5330000
heap
page read and write
1833E1B1000
trusted library allocation
page read and write
1834678C000
heap
page read and write
2360808C000
heap
page read and write
236080D4000
heap
page read and write
12B52A72000
trusted library allocation
page read and write
7FFD34A42000
trusted library allocation
page read and write
7FFD34830000
trusted library allocation
page read and write
15A74940000
heap
page read and write
1832C6E5000
heap
page read and write
15E4279000
stack
page read and write
23608064000
heap
page read and write
18346735000
heap
page read and write
7FFDA3502000
unkown
page read and write
236080B9000
heap
page read and write
7FFD34792000
trusted library allocation
page read and write
7FFD34860000
trusted library allocation
page read and write
2360806A000
heap
page read and write
23D1878B000
heap
page read and write
7DF47EE30000
trusted library allocation
page execute and read and write
2DA78FE000
stack
page read and write
236080E2000
heap
page read and write
1832C360000
heap
page read and write
7FFD34666000
trusted library allocation
page read and write
183467A0000
heap
page read and write
7FFD347A0000
trusted library allocation
page read and write
15A76420000
trusted library allocation
page read and write
7FFD34918000
trusted library allocation
page read and write
15A74A74000
heap
page read and write
1832EAB3000
trusted library allocation
page read and write
7FFD34784000
trusted library allocation
page read and write
23D187B1000
heap
page read and write
1832E66E000
trusted library allocation
page read and write
1832E65D000
trusted library allocation
page read and write
23607F80000
heap
page read and write
7FFD34761000
trusted library allocation
page read and write
7FFD345B2000
trusted library allocation
page read and write
12B5B13B000
heap
page read and write
15A76A20000
heap
page execute and read and write
2DA7AFF000
stack
page read and write
7FFD34A10000
trusted library allocation
page read and write
236080E7000
heap
page read and write
15A00DAE000
trusted library allocation
page read and write
2DA8B89000
stack
page read and write
7FFD347C0000
trusted library allocation
page read and write
7FFD34905000
trusted library allocation
page read and write
7FFD349FF000
trusted library allocation
page read and write
23608069000
heap
page read and write
12B43333000
trusted library allocation
page read and write
7FFD34A10000
trusted library allocation
page read and write
1833E471000
trusted library allocation
page read and write
7FFD347C0000
trusted library allocation
page read and write
7FFD34870000
trusted library allocation
page read and write
23D18756000
heap
page read and write
2360804E000
heap
page read and write
12B40F50000
trusted library allocation
page read and write
7FFD34902000
trusted library allocation
page read and write
12B40F70000
trusted library allocation
page read and write
7FFD348F4000
trusted library allocation
page read and write
1832C3A0000
heap
page read and write
15A00750000
trusted library allocation
page read and write
236080C0000
heap
page read and write
236080D2000
heap
page read and write
12B430B5000
trusted library allocation
page read and write
7FFD34794000
trusted library allocation
page read and write
23608043000
heap
page read and write
12B5B0FF000
heap
page read and write
2360809C000
heap
page read and write
236080EC000
heap
page read and write
15A0007E000
trusted library allocation
page read and write
23608087000
heap
page read and write
15A76CC3000
heap
page read and write
12B4398A000
trusted library allocation
page read and write
7FFD348E3000
trusted library allocation
page read and write
E18FE3000
stack
page read and write
236080EC000
heap
page read and write
1832C448000
heap
page read and write
1833E3BC000
trusted library allocation
page read and write
7FFD34A0D000
trusted library allocation
page read and write
7FFD34850000
trusted library allocation
page read and write
2DA7A79000
stack
page read and write
2DA7CBE000
stack
page read and write
7FFD34990000
trusted library allocation
page read and write
236080E7000
heap
page read and write
236080EC000
heap
page read and write
7FFD348A0000
trusted library allocation
page read and write
23D187AC000
heap
page read and write
E196B7000
stack
page read and write
E19A3C000
stack
page read and write
23608043000
heap
page read and write
7FFD34696000
trusted library allocation
page execute and read and write
15E3DFE000
stack
page read and write
7FFD347C0000
trusted library allocation
page read and write
7FFD34670000
trusted library allocation
page execute and read and write
12B40FC0000
trusted library allocation
page read and write
7FFD347E0000
trusted library allocation
page read and write
1832E181000
trusted library allocation
page read and write
12B42EE6000
trusted library allocation
page read and write
7FFD3490A000
trusted library allocation
page read and write
15A010E4000
trusted library allocation
page read and write
15A76CA7000
heap
page read and write
12B5AF29000
heap
page read and write
15A76360000
trusted library allocation
page read and write
23D1878F000
heap
page read and write
15A010E9000
trusted library allocation
page read and write
15A74BA5000
heap
page read and write
7FFDA341C000
unkown
page readonly
15A10031000
trusted library allocation
page read and write
7FFDA341C000
unkown
page readonly
15A00228000
trusted library allocation
page read and write
236080EE000
heap
page read and write
23608065000
heap
page read and write
23608089000
heap
page read and write
7FFD349B0000
trusted library allocation
page read and write
23608064000
heap
page read and write
236080BC000
heap
page read and write
1832C409000
heap
page read and write
23D187B1000
heap
page read and write
15A74A15000
heap
page read and write
1832F1FE000
trusted library allocation
page read and write
7FFD3475A000
trusted library allocation
page read and write
12B44629000
trusted library allocation
page read and write
7FFD34660000
trusted library allocation
page execute and read and write
15E44F7000
stack
page read and write
7FFD34850000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
1833E477000
trusted library allocation
page read and write
236080B0000
heap
page read and write
7FFD34660000
trusted library allocation
page read and write
23D18768000
heap
page read and write
7FFD345AD000
trusted library allocation
page execute and read and write
7FFD345C0000
trusted library allocation
page read and write
1832C3E0000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
7FFD34650000
trusted library allocation
page read and write
7FFD34686000
trusted library allocation
page execute and read and write
12B429F0000
heap
page read and write
12B40F80000
heap
page readonly
23D18750000
heap
page read and write
12B40E42000
heap
page read and write
7FFD34760000
trusted library allocation
page execute and read and write
23D187AE000
heap
page read and write
12B5B0F3000
heap
page read and write
1832F7A5000
trusted library allocation
page read and write
7FFD34900000
trusted library allocation
page read and write
7FFD3491C000
trusted library allocation
page read and write
1AC5DAE0000
heap
page read and write
7FFD34A06000
trusted library allocation
page read and write
12B5AEF7000
heap
page execute and read and write
7FFD347E0000
trusted library allocation
page read and write
1AC5F4F0000
heap
page read and write
81802FF000
stack
page read and write
236080EC000
heap
page read and write
7FFD345A3000
trusted library allocation
page execute and read and write
1832C48F000
heap
page read and write
23608037000
heap
page read and write
1BBE56C5000
heap
page read and write
7FFDA350D000
unkown
page readonly
23D1878B000
heap
page read and write
7FFD34810000
trusted library allocation
page read and write
7FFD348D0000
trusted library allocation
page read and write
12B40E10000
heap
page read and write
18346717000
heap
page read and write
7FFD34993000
trusted library allocation
page read and write
15E3DB3000
stack
page read and write
7FFD349E0000
trusted library allocation
page read and write
7FFD3465C000
trusted library allocation
page execute and read and write
7FFD34880000
trusted library allocation
page read and write
7FFD34780000
trusted library allocation
page execute and read and write
15A00D6C000
trusted library allocation
page read and write
1832FCE1000
trusted library allocation
page read and write
7FFD34A30000
trusted library allocation
page read and write
15A01B5E000
trusted library allocation
page read and write
E198BE000
stack
page read and write
12B42828000
heap
page read and write
1832C45E000
heap
page read and write
23608055000
heap
page read and write
23608105000
heap
page read and write
236080EC000
heap
page read and write
23D16CF0000
heap
page read and write
15E457C000
stack
page read and write
15A76D66000
heap
page read and write
12B43CBE000
trusted library allocation
page read and write
7FFD34742000
trusted library allocation
page read and write
7FFD349B0000
trusted library allocation
page read and write
7FFD34920000
trusted library allocation
page read and write
15A749EE000
heap
page read and write
7FFD349F0000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page execute and read and write
1832DFBF000
heap
page read and write
15A76C85000
heap
page read and write
23D16C10000
heap
page read and write
236080AD000
heap
page read and write
23608064000
heap
page read and write
15E47FF000
stack
page read and write
23608078000
heap
page read and write
23608100000
heap
page read and write
7FFD347B0000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
7FFD34900000
trusted library allocation
page read and write
23608043000
heap
page read and write
15E42FF000
stack
page read and write
2DA787F000
stack
page read and write
1832F268000
trusted library allocation
page read and write
1832EF2D000
trusted library allocation
page read and write
12B43B2F000
trusted library allocation
page read and write
1832E170000
heap
page execute and read and write
15A76CE8000
heap
page read and write
12B5B14B000
heap
page read and write
12B5ADF4000
heap
page read and write
15A00866000
trusted library allocation
page read and write
12B5B081000
heap
page read and write
23608105000
heap
page read and write
23608010000
heap
page read and write
1832C630000
heap
page execute and read and write
7FFD348AF000
trusted library allocation
page read and write
1832C492000
heap
page read and write
1832C5E0000
heap
page readonly
7FFD345BB000
trusted library allocation
page read and write
7FFD349C6000
trusted library allocation
page read and write
12B5B107000
heap
page read and write
236080EE000
heap
page read and write
1AC5F955000
heap
page read and write
12B44560000
trusted library allocation
page read and write
7DF460030000
trusted library allocation
page execute and read and write
15A10021000
trusted library allocation
page read and write
E197B9000
stack
page read and write
15A00932000
trusted library allocation
page read and write
236080AD000
heap
page read and write
15A763B0000
trusted library allocation
page read and write
1BBE3700000
heap
page read and write
E199BF000
stack
page read and write
7FFD34A06000
trusted library allocation
page read and write
236080EC000
heap
page read and write
15A749CD000
heap
page read and write
7FFD349D0000
trusted library allocation
page execute and read and write
15E417F000
stack
page read and write
12B42A01000
trusted library allocation
page read and write
23608064000
heap
page read and write
7FFD345A3000
trusted library allocation
page execute and read and write
15E437E000
stack
page read and write
7FFD34650000
trusted library allocation
page read and write
7FFDA3502000
unkown
page read and write
1832F48E000
trusted library allocation
page read and write
1832E8B3000
trusted library allocation
page read and write
12B40E71000
heap
page read and write
F7E354F000
stack
page read and write
12B40E77000
heap
page read and write
7FFD34A20000
trusted library allocation
page read and write
7FFD34910000
trusted library allocation
page read and write
1AC5DB50000
heap
page read and write
236080EC000
heap
page read and write
15E45F8000
stack
page read and write
236080E0000
heap
page read and write
12B429F5000
heap
page read and write
7FFD347F0000
trusted library allocation
page read and write
15E43FE000
stack
page read and write
7FFD34810000
trusted library allocation
page read and write
15A76395000
heap
page read and write
23608089000
heap
page read and write
12B44625000
trusted library allocation
page read and write
1BBE5698000
heap
page read and write
15E40FE000
stack
page read and write
2360807C000
heap
page read and write
23D16D10000
heap
page read and write
2DA79FE000
stack
page read and write
1833E479000
trusted library allocation
page read and write
236080E2000
heap
page read and write
15A74960000
heap
page read and write
236080AD000
heap
page read and write
23608064000
heap
page read and write
15A10001000
trusted library allocation
page read and write
15A76C57000
heap
page read and write
15A76C9E000
heap
page read and write
E194F9000
stack
page read and write
183469F0000
heap
page read and write
7FFD345A2000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page read and write
23D18751000
heap
page read and write
1832C650000
trusted library allocation
page read and write
12B43AC1000
trusted library allocation
page read and write
7FFD348F9000
trusted library allocation
page read and write
15A76A65000
heap
page read and write
1AC5F984000
heap
page read and write
15A004ED000
trusted library allocation
page read and write
2DA7DB9000
stack
page read and write
183467BF000
heap
page read and write
7FFD34850000
trusted library allocation
page read and write
E1947F000
stack
page read and write
15E52CE000
stack
page read and write
183467A9000
heap
page read and write
1832F10A000
trusted library allocation
page read and write
7FFD34A32000
trusted library allocation
page read and write
15A76B62000
heap
page read and write
12B42C29000
trusted library allocation
page read and write
15A004E5000
trusted library allocation
page read and write
2360804D000
heap
page read and write
1833E1F2000
trusted library allocation
page read and write
23D188C0000
heap
page read and write
15A01628000
trusted library allocation
page read and write
236080FD000
heap
page read and write
236080EC000
heap
page read and write
7FFD348F4000
trusted library allocation
page read and write
236080C3000
heap
page read and write
7FFDA3380000
unkown
page readonly
7FFD345B4000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page read and write
1833E452000
trusted library allocation
page read and write
12B41050000
heap
page read and write
7FFD34A37000
trusted library allocation
page read and write
15A764E0000
heap
page execute and read and write
15A749DC000
heap
page read and write
236080BF000
heap
page read and write
12B40E8F000
heap
page read and write
7FFD34820000
trusted library allocation
page read and write
7FFD34800000
trusted library allocation
page read and write
1832C44A000
heap
page read and write
15A749DA000
heap
page read and write
23608083000
heap
page read and write
23D16F90000
heap
page read and write
E193F9000
stack
page read and write
7FFD347F0000
trusted library allocation
page read and write
15A00001000
trusted library allocation
page read and write
7FFD34770000
trusted library allocation
page execute and read and write
7FFD348D3000
trusted library allocation
page read and write
15A76C8B000
heap
page read and write
12B52CF7000
trusted library allocation
page read and write
7FFD34870000
trusted library allocation
page read and write
7FFD346C0000
trusted library allocation
page execute and read and write
7FFD34A40000
trusted library allocation
page read and write
7FFD348B0000
trusted library allocation
page read and write
7FFD34740000
trusted library allocation
page read and write
1BBE3B80000
heap
page read and write
1832C400000
heap
page read and write
15A76500000
heap
page read and write
7FFD34752000
trusted library allocation
page read and write
15A00864000
trusted library allocation
page read and write
1BBE5680000
heap
page read and write
7FFD34830000
trusted library allocation
page read and write
1832C4F4000
heap
page read and write
7FFDA341C000
unkown
page readonly
1BBE3B85000
heap
page read and write
12B5AEF0000
heap
page execute and read and write
7FFD348B0000
trusted library allocation
page read and write
2360805B000
heap
page read and write
15E41FE000
stack
page read and write
183467C2000
heap
page read and write
12B52CEB000
trusted library allocation
page read and write
236080EE000
heap
page read and write
7FFD348F0000
trusted library allocation
page read and write
7FFD346C0000
trusted library allocation
page execute and read and write
7FFD34660000
trusted library allocation
page execute and read and write
23608105000
heap
page read and write
12B43A58000
trusted library allocation
page read and write
1832C5F0000
trusted library allocation
page read and write
1AC5DAB0000
heap
page read and write
12B52A21000
trusted library allocation
page read and write
12B43D13000
trusted library allocation
page read and write
15E524E000
stack
page read and write
1AC5F99A000
heap
page read and write
7FFDA3381000
unkown
page execute read
236080EC000
heap
page read and write
236080EC000
heap
page read and write
2DA7C79000
stack
page read and write
1832C637000
heap
page execute and read and write
E1993C000
stack
page read and write
1BBE56DE000
heap
page read and write
12B52CEF000
trusted library allocation
page read and write
1AC5DEB0000
heap
page read and write
23608064000
heap
page read and write
12B5B000000
heap
page read and write
2DA8A8E000
stack
page read and write
1AC5DAC0000
heap
page read and write
7FFD3476A000
trusted library allocation
page read and write
7FFD347F0000
trusted library allocation
page read and write
12B5B112000
heap
page read and write
15A74930000
heap
page read and write
7FFD34910000
trusted library allocation
page read and write
7FFD348F9000
trusted library allocation
page read and write
7FFD34A00000
trusted library allocation
page read and write
7FFD34790000
trusted library allocation
page execute and read and write
1833E46B000
trusted library allocation
page read and write
1832C489000
heap
page read and write
7FFD349C0000
trusted library allocation
page read and write
2DA7E3A000
stack
page read and write
7FFD349F0000
trusted library allocation
page read and write
12B41000000
heap
page execute and read and write
236080E9000
heap
page read and write
7FFD346C5000
trusted library allocation
page execute and read and write
1832C444000
heap
page read and write
12B5B142000
heap
page read and write
7FFD349E0000
trusted library allocation
page read and write
236080EC000
heap
page read and write
7FFD345B3000
trusted library allocation
page execute and read and write
15A74BA0000
heap
page read and write
7FFD347D0000
trusted library allocation
page read and write
7FFD34782000
trusted library allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
7FFD34751000
trusted library allocation
page read and write
1832C330000
heap
page read and write
15A76D14000
heap
page read and write
7FFD34A35000
trusted library allocation
page read and write
15A0107F000
trusted library allocation
page read and write
12B40EB9000
heap
page read and write
236080E2000
heap
page read and write
F7E34C6000
stack
page read and write
15A102F1000
trusted library allocation
page read and write
1833E46F000
trusted library allocation
page read and write
1832C340000
heap
page read and write
2360801D000
heap
page read and write
12B5AE00000
heap
page read and write
7FFD3499A000
trusted library allocation
page read and write
23D18785000
heap
page read and write
7FFD34910000
trusted library allocation
page read and write
7DF47EE40000
trusted library allocation
page execute and read and write
7FFD349E0000
trusted library allocation
page execute and read and write
23608089000
heap
page read and write
12B5AD80000
heap
page read and write
12B5AE33000
heap
page read and write
15A76F30000
heap
page read and write
7FFD345A4000
trusted library allocation
page read and write
23608059000
heap
page read and write
15A76C48000
heap
page read and write
E1963F000
stack
page read and write
23608053000
heap
page read and write
2360805E000
heap
page read and write
1834653D000
heap
page read and write
7FFDA350D000
unkown
page readonly
7FFD34840000
trusted library allocation
page read and write
E1927E000
stack
page read and write
1832DFA5000
heap
page read and write
7FFD34904000
trusted library allocation
page read and write
12B5AD4F000
heap
page read and write
12B40E30000
heap
page read and write
7FFDA3502000
unkown
page read and write
15A010C1000
trusted library allocation
page read and write
2DA7EBF000
stack
page read and write
183467EB000
heap
page read and write
12B43AE8000
trusted library allocation
page read and write
12B437AD000
trusted library allocation
page read and write
7FFD348D3000
trusted library allocation
page read and write
183464C0000
heap
page read and write
1834681F000
heap
page read and write
7FFD34A00000
trusted library allocation
page read and write
15A01058000
trusted library allocation
page read and write
7FFD34890000
trusted library allocation
page read and write
12B40F90000
trusted library allocation
page read and write
1833E181000
trusted library allocation
page read and write
15A76A63000
heap
page read and write
7FFD34656000
trusted library allocation
page read and write
15A76B02000
heap
page read and write
236080A4000
heap
page read and write
7FFD34912000
trusted library allocation
page read and write
7FFD349F7000
trusted library allocation
page read and write
1BBE37E0000
heap
page read and write
23D187B1000
heap
page read and write
1832FDA6000
trusted library allocation
page read and write
1832DFA0000
heap
page read and write
1832C6E0000
heap
page read and write
12B40DD0000
heap
page read and write
2DA75D3000
stack
page read and write
7FFD34751000
trusted library allocation
page read and write
15A76390000
heap
page read and write
15A74A1A000
heap
page read and write
15A76C6E000
heap
page read and write
E195F9000
stack
page read and write
7FFD345A0000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
7FFD3490C000
trusted library allocation
page read and write
1832C5D0000
trusted library allocation
page read and write
1832C412000
heap
page read and write
7FFD34A02000
trusted library allocation
page read and write
7FFD345BB000
trusted library allocation
page read and write
23608019000
heap
page read and write
1834650D000
heap
page read and write
7FFD345AD000
trusted library allocation
page execute and read and write
12B52CF9000
trusted library allocation
page read and write
23609A80000
heap
page read and write
2360810B000
heap
page read and write
7FFD348C0000
trusted library allocation
page read and write
23607FC0000
heap
page read and write
12B4402A000
trusted library allocation
page read and write
7FFD348A2000
trusted library allocation
page read and write
7FFD349AA000
trusted library allocation
page read and write
7FFD347D0000
trusted library allocation
page read and write
1BBE3890000
heap
page read and write
23608043000
heap
page read and write
15A76B57000
heap
page read and write
7FFD34909000
trusted library allocation
page read and write
81800FC000
stack
page read and write
15A01361000
trusted library allocation
page read and write
7FFD345C0000
trusted library allocation
page read and write
23608056000
heap
page read and write
7FFD349BC000
trusted library allocation
page read and write
7FFD34860000
trusted library allocation
page read and write
236080EE000
heap
page read and write
12B5B270000
heap
page read and write
1832FAF2000
trusted library allocation
page read and write
1832C640000
heap
page read and write
1AC5F99D000
heap
page read and write
23D18786000
heap
page read and write
12B5B139000
heap
page read and write
E1937E000
stack
page read and write
7FFD3499C000
trusted library allocation
page read and write
7FFD34770000
trusted library allocation
page execute and read and write
18346787000
heap
page read and write
23608064000
heap
page read and write
1832C43E000
heap
page read and write
236080A9000
heap
page read and write
7FFD34782000
trusted library allocation
page read and write
7FFD34750000
trusted library allocation
page read and write
4FE0E7F000
stack
page read and write
7FFD349C0000
trusted library allocation
page read and write
15A76380000
trusted library allocation
page read and write
7FFD347A0000
trusted library allocation
page execute and read and write
15A76AB1000
heap
page read and write
7FFD34890000
trusted library allocation
page read and write
7FFD348D0000
trusted library allocation
page read and write
23608105000
heap
page read and write
2DA8B0E000
stack
page read and write
1BBE3800000
heap
page read and write
15A0112F000
trusted library allocation
page read and write
12B52A31000
trusted library allocation
page read and write
15A102EC000
trusted library allocation
page read and write
12B40E7F000
heap
page read and write
236080F4000
heap
page read and write
7FFD34860000
trusted library allocation
page read and write
E192FE000
stack
page read and write
15E4479000
stack
page read and write
2DA7BFD000
stack
page read and write
12B43A7E000
trusted library allocation
page read and write
7FFD345BD000
trusted library allocation
page execute and read and write
7FFD34830000
trusted library allocation
page read and write
18259B6000
stack
page read and write
2360809F000
heap
page read and write
1AC5F940000
heap
page read and write
15A76ABA000
heap
page read and write
7FFD348C0000
trusted library allocation
page read and write
7FFD347D0000
trusted library allocation
page read and write
23608092000
heap
page read and write
12B40DB0000
heap
page read and write
1832C680000
trusted library allocation
page read and write
7FFD34770000
trusted library allocation
page execute and read and write
7FFD34920000
trusted library allocation
page read and write
2DA7FBC000
stack
page read and write
2DA7D37000
stack
page read and write
12B5B04C000
heap
page read and write
7FFD345B0000
trusted library allocation
page read and write
15A76B54000
heap
page read and write
7FFD3490C000
trusted library allocation
page read and write
12B40E6F000
heap
page read and write
7FFDA3381000
unkown
page execute read
12B52A01000
trusted library allocation
page read and write
7FFD3466C000
trusted library allocation
page execute and read and write
7FFD347E0000
trusted library allocation
page read and write
15A74B70000
heap
page read and write
12B42EEE000
trusted library allocation
page read and write
1832E0F0000
trusted library allocation
page read and write
23607EA0000
heap
page read and write
23D18768000
heap
page read and write
2DA797F000
stack
page read and write
15A76A30000
heap
page read and write
81801FE000
stack
page read and write
236080E2000
heap
page read and write
1832DF70000
heap
page execute and read and write
1833E1B4000
trusted library allocation
page read and write
12B5B016000
heap
page read and write
15A763E0000
trusted library allocation
page read and write
12B5B0F1000
heap
page read and write
12B40F20000
heap
page read and write
15A00F8B000
trusted library allocation
page read and write
15A749D2000
heap
page read and write
2DA803E000
stack
page read and write
15A76E30000
trusted library allocation
page read and write
1AC5DB58000
heap
page read and write
12B52CF1000
trusted library allocation
page read and write
E1983F000
stack
page read and write
15E407E000
stack
page read and write
12B430BE000
trusted library allocation
page read and write
1BBE3898000
heap
page read and write
7FFD347A0000
trusted library allocation
page read and write
12B5AF32000
heap
page read and write
7FFD34908000
trusted library allocation
page read and write
15A76C30000
heap
page read and write
7FFDA3381000
unkown
page execute read
7FFD34890000
trusted library allocation
page read and write
1833E1A1000
trusted library allocation
page read and write
12B41075000
heap
page read and write
1832E3A8000
trusted library allocation
page read and write
1AC5F97F000
heap
page read and write
15A01C28000
trusted library allocation
page read and write
1BBE56B0000
heap
page read and write
7DF4E7090000
trusted library allocation
page execute and read and write
23D16F95000
heap
page read and write
2DA7B7B000
stack
page read and write
7FFD348D0000
trusted library allocation
page read and write
1833E365000
trusted library allocation
page read and write
7FFD34880000
trusted library allocation
page read and write
7DF4E70A0000
trusted library allocation
page execute and read and write
23608064000
heap
page read and write
15A74990000
heap
page read and write
1833E37D000
trusted library allocation
page read and write
12B40EBE000
heap
page read and write
7FFD34800000
trusted library allocation
page read and write
12B42EDE000
trusted library allocation
page read and write
23608064000
heap
page read and write
12B5B097000
heap
page read and write
15E487C000
stack
page read and write
15A004DD000
trusted library allocation
page read and write
12B41070000
heap
page read and write
15A76B50000
heap
page read and write
E1A48D000
stack
page read and write
1834650F000
heap
page read and write
183466C0000
heap
page read and write
7FFD345A4000
trusted library allocation
page read and write
7DF460040000
trusted library allocation
page execute and read and write
7FFD345FC000
trusted library allocation
page execute and read and write
7FFD3465C000
trusted library allocation
page execute and read and write
2DA80BC000
stack
page read and write
15A10013000
trusted library allocation
page read and write
7FFD34686000
trusted library allocation
page execute and read and write
12B42A87000
trusted library allocation
page read and write
15E46FE000
stack
page read and write
15A76A27000
heap
page execute and read and write
23608064000
heap
page read and write
236080EE000
heap
page read and write
12B5AD40000
heap
page read and write
7FFDA3380000
unkown
page readonly
1832FDAA000
trusted library allocation
page read and write
183465E0000
heap
page read and write
18346594000
heap
page read and write
1832F241000
trusted library allocation
page read and write
15E467F000
stack
page read and write
23D16D60000
heap
page read and write
E1957D000
stack
page read and write
4FE0BE6000
stack
page read and write
7FFD348C0000
trusted library allocation
page read and write
12B40CD0000
heap
page read and write
1832F2AF000
trusted library allocation
page read and write
E19738000
stack
page read and write
15A76510000
heap
page read and write
7FFD3475A000
trusted library allocation
page read and write
1834656B000
heap
page read and write
7FFD345CB000
trusted library allocation
page read and write
23608066000
heap
page read and write
12B5AEC0000
trusted library allocation
page read and write
12B5ADE6000
heap
page read and write
7FFD34820000
trusted library allocation
page read and write
23D16D68000
heap
page read and write
15A763A0000
heap
page readonly
23607FC0000
heap
page read and write
7FFD34A10000
trusted library allocation
page read and write
12B41010000
trusted library allocation
page read and write
2360806D000
heap
page read and write
15A769D0000
heap
page execute and read and write
236080EC000
heap
page read and write
7FFD34810000
trusted library allocation
page read and write
15A0130F000
trusted library allocation
page read and write
7FFDA3380000
unkown
page readonly
15E477C000
stack
page read and write
1833E31B000
trusted library allocation
page read and write
1832E207000
trusted library allocation
page read and write
7DF4E70B0000
trusted library allocation
page execute and read and write
1832C440000
heap
page read and write
12B44374000
trusted library allocation
page read and write
12B5AF2E000
heap
page read and write
18346811000
heap
page read and write
7FFD348A0000
trusted library allocation
page read and write
236080F0000
heap
page read and write
236080C8000
heap
page read and write
15A76D4C000
heap
page read and write
15A76A75000
heap
page read and write
12B40EB7000
heap
page read and write
23608061000
heap
page read and write
7FFD349D0000
trusted library allocation
page read and write
7FFD348B0000
trusted library allocation
page read and write
7FFD348E0000
trusted library allocation
page read and write
1832F1D8000
trusted library allocation
page read and write
2DA7F3E000
stack
page read and write
7FFD34656000
trusted library allocation
page read and write
183466E3000
heap
page read and write
12B5AE70000
heap
page execute and read and write
12B5B12D000
heap
page read and write
15A102FA000
trusted library allocation
page read and write
183467E7000
heap
page read and write
15A01C24000
trusted library allocation
page read and write
15A10073000
trusted library allocation
page read and write
23608028000
heap
page read and write
15A01971000
trusted library allocation
page read and write
236080CF000
heap
page read and write
7FFD34870000
trusted library allocation
page read and write
7FFD345B0000
trusted library allocation
page read and write
1832FA5A000
trusted library allocation
page read and write
7FFD346D0000
trusted library allocation
page execute and read and write
7FFD34800000
trusted library allocation
page read and write
7FFD34880000
trusted library allocation
page read and write
7FFD34908000
trusted library allocation
page read and write
7FFD349A0000
trusted library allocation
page read and write
1825C7F000
stack
page read and write
23D187B1000
heap
page read and write
15A0052E000
trusted library allocation
page read and write
236098E0000
heap
page read and write
183466CA000
heap
page read and write
E1A40E000
stack
page read and write
12B5AF20000
heap
page read and write
1832E666000
trusted library allocation
page read and write
1AC5DEB5000
heap
page read and write
7FFD34755000
trusted library allocation
page read and write
236080EC000
heap
page read and write
There are 700 hidden memdumps, click here to show them.