IOC Report
mU3Ob2XcCt.exe

loading gif

Files

File Path
Type
Category
Malicious
mU3Ob2XcCt.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\_Files_\DVWHKMNFNN.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\DVWHKMNFNN.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\HTAGVDFUIE.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\LTKMYBSEYZ.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\NWTVCDUMOB.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\YPSIACHYXW.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1mvdsc4l.gss.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_aaaz4ces.mtg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c5ljgi1z.5fi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ekkgpxbg.yeb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_h2jrhzku.1jo.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jzu1gptt.12s.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lpdbn1rn.kra.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mclxjvfo.iue.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ptaszgq1.0h0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ve33hvrb.xqi.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wi253m0n.y1v.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yx3tmf5u.1uy.psm1
ASCII text, with no line terminators
dropped
There are 11 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\mU3Ob2XcCt.dll,Main
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\mU3Ob2XcCt.dll",#1
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profiles
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profiles
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe C:\Users\user\Desktop\mU3Ob2XcCt.dll,Save
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\mU3Ob2XcCt.dll",Main
malicious
C:\Windows\System32\rundll32.exe
rundll32.exe "C:\Users\user\Desktop\mU3Ob2XcCt.dll",Save
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profiles
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal
malicious
C:\Windows\System32\loaddll64.exe
loaddll64.exe "C:\Users\user\Desktop\mU3Ob2XcCt.dll"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd.exe /C rundll32.exe "C:\Users\user\Desktop\mU3Ob2XcCt.dll",#1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 10 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://185.215.113.217/CoreOPT/index.php
185.215.113.217
malicious
http://185.215.113.217/CoreOPT/index.php?wal=1
185.215.113.217
malicious
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://go.microsoft.co
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://185.215.113.217/OQa
unknown
https://contoso.com/License
unknown
http://185.215.113.217/CoreOPT/index.php?wal=1er
unknown
https://contoso.com/Icon
unknown
https://aka.ms/winsvr-2022-pshelpX
unknown
http://185.215.113.217/CoreOPT/index.php?wal=1/Q
unknown
https://github.com/Pester/Pester
unknown
http://185.215.113.217/CoreOPT/index.php$L
unknown
http://185.215.113.217/CoreOPT/index.php?wal=1t
unknown
http://185.215.113.217/CoreOPT/index.php?wal=1ocal
unknown
http://185.215.113.217/CoreOPT/index.php7
unknown
http://185.215.113.217/CoreOPT/index.php?wal=1E
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://185.215.113.217/$
unknown
https://aka.ms/pscore68
unknown
http://185.215.113.217/CoreOPT/index.phpXLW
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://185.215.113.217/CoreOPT/index.php?wal=1?~
unknown
There are 18 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.217
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
B6D7D24000
stack
page read and write
CA697D000
stack
page read and write
1EB5A8D0000
trusted library allocation
page read and write
7FFD9B27C000
trusted library allocation
page execute and read and write
287B873000
stack
page read and write
275E99A1000
trusted library allocation
page read and write
26775560000
heap
page read and write
7649477000
stack
page read and write
2075CE95000
heap
page read and write
7FFD9B430000
trusted library allocation
page read and write
7FFD9B500000
trusted library allocation
page read and write
275F2150000
heap
page read and write
2075CCB0000
heap
page read and write
275F1B39000
heap
page read and write
275DAFAE000
trusted library allocation
page read and write
275F1EB0000
heap
page read and write
275F1DFB000
heap
page read and write
7FFD9B2D6000
trusted library allocation
page execute and read and write
CA654E000
stack
page read and write
7FFD9B402000
trusted library allocation
page read and write
275DAAB3000
trusted library allocation
page read and write
F39153E000
stack
page read and write
251F77F7000
heap
page read and write
205337E0000
heap
page read and write
275F1DD4000
heap
page read and write
19A2CA20000
trusted library allocation
page read and write
7FFD9B66D000
trusted library allocation
page read and write
F3913BE000
stack
page read and write
20745B56000
trusted library allocation
page read and write
7FFD9B230000
trusted library allocation
page read and write
2CAEA230000
heap
page execute and read and write
275D9970000
heap
page read and write
7FFD9B540000
trusted library allocation
page read and write
1D3EAD2F000
heap
page read and write
20746659000
trusted library allocation
page read and write
B6D81FF000
stack
page read and write
1EB5A700000
heap
page read and write
275D7B88000
heap
page read and write
7FFD9B400000
trusted library allocation
page execute and read and write
7FFD9B450000
trusted library allocation
page read and write
7FFD9B2AC000
trusted library allocation
page execute and read and write
7FFD9B480000
trusted library allocation
page read and write
26093170000
heap
page read and write
275F1ADE000
heap
page read and write
20754B21000
trusted library allocation
page read and write
7FFD9B390000
trusted library allocation
page read and write
275F1DBE000
heap
page read and write
7FFD9B544000
trusted library allocation
page read and write
2075CB44000
heap
page read and write
7FFD9B4C0000
trusted library allocation
page read and write
7FFD9B610000
trusted library allocation
page read and write
7FFD9B1F2000
trusted library allocation
page read and write
2CA814F7000
trusted library allocation
page read and write
7DF40E720000
trusted library allocation
page execute and read and write
20742CF0000
heap
page read and write
1EB5A990000
trusted library allocation
page read and write
7FFD9B588000
trusted library allocation
page read and write
2075CCC2000
heap
page read and write
93052FF000
stack
page read and write
2CAE9A90000
trusted library allocation
page read and write
F3917BB000
stack
page read and write
2CA81056000
trusted library allocation
page read and write
7FFD9B4B0000
trusted library allocation
page read and write
275D99FF000
trusted library allocation
page read and write
F3912FE000
stack
page read and write
7FFD9B3C2000
trusted library allocation
page read and write
2CA807FD000
trusted library allocation
page read and write
251F7925000
heap
page read and write
275F1C70000
heap
page execute and read and write
7FFD9B3DA000
trusted library allocation
page read and write
2CAE80CA000
heap
page read and write
A46E0FE000
stack
page read and write
275F1A90000
heap
page read and write
1EB5C5A0000
trusted library allocation
page read and write
1EB5A9C5000
heap
page read and write
7FFD9B1FD000
trusted library allocation
page execute and read and write
9304DFE000
stack
page read and write
1EB5A82C000
heap
page read and write
2CAEA040000
heap
page execute and read and write
2CA8149C000
trusted library allocation
page read and write
F3910FE000
stack
page read and write
FDC07AE000
stack
page read and write
275E99B1000
trusted library allocation
page read and write
207429B0000
heap
page read and write
7FFD9B58C000
trusted library allocation
page read and write
275D7B5D000
heap
page read and write
CAD477F000
stack
page read and write
2BCD8550000
heap
page read and write
251F9264000
heap
page read and write
7FFD9B340000
trusted library allocation
page execute and read and write
B6D7D1D000
stack
page read and write
F390DFE000
unkown
page read and write
76497FB000
stack
page read and write
2CAEA104000
heap
page read and write
7FFD9B580000
trusted library allocation
page read and write
26092D10000
heap
page read and write
2CA814E0000
trusted library allocation
page read and write
7FFD9B553000
trusted library allocation
page read and write
275F1EC2000
heap
page read and write
2CA81C22000
trusted library allocation
page read and write
7FFD9B400000
trusted library allocation
page read and write
251F93D0000
heap
page read and write
930497E000
stack
page read and write
7FFD9B574000
trusted library allocation
page read and write
20742AEF000
heap
page read and write
275DAC94000
trusted library allocation
page read and write
26775528000
heap
page read and write
A46E47D000
stack
page read and write
7FFD9B500000
trusted library allocation
page read and write
20754CE7000
trusted library allocation
page read and write
7FFD9B540000
trusted library allocation
page read and write
1C667138000
heap
page read and write
205337C0000
heap
page read and write
1EB5A7A8000
heap
page read and write
7FFD9B5E0000
trusted library allocation
page read and write
2CAE9E50000
trusted library allocation
page read and write
1D3EACE0000
heap
page read and write
2BCD85D0000
heap
page read and write
1D3EACE8000
heap
page read and write
F3915BE000
stack
page read and write
2BCD838D000
heap
page read and write
275F1E3C000
heap
page read and write
81F617F000
stack
page read and write
2CAEA260000
heap
page read and write
19A2B07A000
heap
page read and write
7FFD9B22B000
trusted library allocation
page read and write
9304974000
stack
page read and write
7FFD9B550000
trusted library allocation
page read and write
275DA903000
trusted library allocation
page read and write
275DA739000
trusted library allocation
page read and write
7FFD9B5C0000
trusted library allocation
page read and write
A46DB33000
stack
page read and write
7FFD9B450000
trusted library allocation
page read and write
275DA9FE000
trusted library allocation
page read and write
7FFD9B650000
trusted library allocation
page execute and read and write
1D3EC790000
heap
page read and write
7FFD9B22D000
trusted library allocation
page execute and read and write
1C668F30000
trusted library allocation
page read and write
7DF492C30000
trusted library allocation
page execute and read and write
7FFD9B60A000
trusted library allocation
page read and write
2CAEA38F000
heap
page read and write
1D3EC960000
heap
page read and write
2CAEA560000
trusted library allocation
page read and write
CA65CF000
stack
page read and write
26093175000
heap
page read and write
7FFD9B24C000
trusted library allocation
page execute and read and write
1D3EACF7000
heap
page read and write
2CA81C1E000
trusted library allocation
page read and write
1D3EACF4000
heap
page read and write
20744B01000
trusted library allocation
page read and write
2CA8181E000
trusted library allocation
page read and write
1C668A40000
trusted library allocation
page read and write
251F77F7000
heap
page read and write
251F926F000
heap
page read and write
1C666FE0000
heap
page read and write
7FFD9B5A0000
trusted library allocation
page read and write
2BCD9F10000
heap
page read and write
2CAE9FB0000
trusted library allocation
page read and write
287BDBE000
stack
page read and write
2CAEA44E000
heap
page read and write
7FFD9B210000
trusted library allocation
page read and write
26093150000
heap
page read and write
20754DFC000
trusted library allocation
page read and write
275E9C7C000
trusted library allocation
page read and write
7FFD9B2C0000
trusted library allocation
page read and write
2CAE9EA3000
heap
page read and write
7FFD9B4D0000
trusted library allocation
page read and write
20742C30000
trusted library allocation
page read and write
19A2CAB0000
heap
page read and write
2677556C000
heap
page read and write
7FFD9B41C000
trusted library allocation
page read and write
7FFD9B3B2000
trusted library allocation
page read and write
275F1DB0000
heap
page read and write
7FFD9B1F4000
trusted library allocation
page read and write
7FFD9B5A9000
trusted library allocation
page read and write
7FFD9B61C000
trusted library allocation
page read and write
7FFD9B5B0000
trusted library allocation
page read and write
CA687F000
stack
page read and write
2075CC87000
heap
page execute and read and write
275E9C74000
trusted library allocation
page read and write
20746722000
trusted library allocation
page read and write
2CA814B6000
trusted library allocation
page read and write
7FFD9B3D0000
trusted library allocation
page execute and read and write
7FFD9B660000
trusted library allocation
page read and write
19A2CA20000
trusted library allocation
page read and write
20754D3F000
trusted library allocation
page read and write
7FFD9B579000
trusted library allocation
page read and write
2CAEA4AE000
heap
page read and write
20744920000
heap
page read and write
7FFD9B5D0000
trusted library allocation
page read and write
2CAE80DE000
heap
page read and write
19A2AFE8000
heap
page read and write
7FFD9B530000
trusted library allocation
page read and write
2CAE9AC0000
heap
page read and write
7FFD9B523000
trusted library allocation
page read and write
2CAE810B000
heap
page read and write
26775690000
heap
page read and write
1D3EAC90000
heap
page read and write
19A2B0A1000
heap
page read and write
CAD46FF000
stack
page read and write
275F1EA6000
heap
page read and write
7FFD9B570000
trusted library allocation
page read and write
251F7823000
heap
page read and write
D0742FC000
stack
page read and write
7FFD9B3B0000
trusted library allocation
page execute and read and write
2CA90074000
trusted library allocation
page read and write
287C03C000
stack
page read and write
2CAEA14A000
heap
page read and write
287BE3B000
stack
page read and write
2CAE809F000
heap
page read and write
251F782D000
heap
page read and write
7FFD9B3CA000
trusted library allocation
page read and write
19A2B0BA000
heap
page read and write
2CA902ED000
trusted library allocation
page read and write
2CA818D5000
trusted library allocation
page read and write
251F77D8000
heap
page read and write
20744939000
heap
page read and write
7FFD9B430000
trusted library allocation
page read and write
1EB5A853000
heap
page read and write
19A2AFB0000
heap
page read and write
7FFD9B560000
trusted library allocation
page read and write
1D3EAD2A000
heap
page read and write
287B8FE000
unkown
page read and write
7FFD9B630000
trusted library allocation
page read and write
7FFD9B5C9000
trusted library allocation
page read and write
19A2CE20000
trusted library allocation
page read and write
275D7B49000
heap
page read and write
7FFD9B213000
trusted library allocation
page execute and read and write
7FFD9B23B000
trusted library allocation
page read and write
20745255000
trusted library allocation
page read and write
7FFD9B6B0000
trusted library allocation
page execute and read and write
1C668A70000
heap
page read and write
7FFD9B470000
trusted library allocation
page read and write
275D9470000
heap
page read and write
7FFD9B543000
trusted library allocation
page read and write
2BCD8398000
heap
page read and write
1D3EAF85000
heap
page read and write
275F1B5B000
heap
page read and write
81F627D000
stack
page read and write
2075CB46000
heap
page read and write
1EB5A9C0000
heap
page read and write
287C13B000
stack
page read and write
287B97F000
stack
page read and write
1EB5A930000
heap
page read and write
275D7B45000
heap
page read and write
2CAEA4C0000
heap
page read and write
275D7AA5000
heap
page read and write
7FFD9B564000
trusted library allocation
page read and write
2CA902F2000
trusted library allocation
page read and write
2075CE69000
heap
page read and write
275D94E0000
trusted library allocation
page read and write
2CA81B58000
trusted library allocation
page read and write
7FFD9B5B0000
trusted library allocation
page read and write
287C0BE000
stack
page read and write
20533A10000
heap
page read and write
20744B87000
trusted library allocation
page read and write
DED04FF000
stack
page read and write
7FFD9B4D0000
trusted library allocation
page read and write
275DB4D9000
trusted library allocation
page read and write
7FFD9B630000
trusted library allocation
page read and write
81F62FE000
stack
page read and write
7FFD9B5A0000
trusted library allocation
page read and write
7FFD9B610000
trusted library allocation
page read and write
275E99F4000
trusted library allocation
page read and write
1C667130000
heap
page read and write
20742C50000
trusted library allocation
page read and write
275DAA22000
trusted library allocation
page read and write
26775525000
heap
page read and write
275D94A0000
trusted library allocation
page read and write
251F76E0000
heap
page read and write
2CAEA423000
heap
page read and write
1C6670E0000
heap
page read and write
267754E0000
heap
page read and write
7FFD9B410000
trusted library allocation
page execute and read and write
A46E4FF000
stack
page read and write
1EB5A8D0000
trusted library allocation
page read and write
287BD3E000
stack
page read and write
2CA816B0000
trusted library allocation
page read and write
7FFD9B57C000
trusted library allocation
page read and write
7FFD9B480000
trusted library allocation
page read and write
7FFD9B4C0000
trusted library allocation
page read and write
F391538000
stack
page read and write
207463D6000
trusted library allocation
page read and write
2CA8150D000
trusted library allocation
page read and write
2075CCCD000
heap
page read and write
20742CF5000
heap
page read and write
287BEB8000
stack
page read and write
2CAE9AB0000
trusted library allocation
page read and write
81F637B000
stack
page read and write
2074638C000
trusted library allocation
page read and write
275D7AB0000
heap
page read and write
2CAEA4E1000
heap
page read and write
2CAE8250000
heap
page read and write
D0743FF000
stack
page read and write
F3916BE000
stack
page read and write
2CAE8070000
heap
page read and write
DED01BC000
stack
page read and write
2CAEA4CF000
heap
page read and write
275F1B4B000
heap
page read and write
275F1C77000
heap
page execute and read and write
7FFD9B4B0000
trusted library allocation
page read and write
275F1ECB000
heap
page read and write
FDC0AFE000
unkown
page read and write
1EB5A8D0000
trusted library allocation
page read and write
20744AF0000
heap
page execute and read and write
2CAEA050000
heap
page read and write
1C6671AF000
heap
page read and write
1D3EAD05000
heap
page read and write
7FFD9B4D0000
trusted library allocation
page read and write
20742BB0000
heap
page read and write
19A2AFE0000
heap
page read and write
7FFD9B620000
trusted library allocation
page execute and read and write
287CB0E000
stack
page read and write
275F1E5F000
heap
page read and write
20754CFF000
trusted library allocation
page read and write
2075CD90000
heap
page read and write
1EB5A770000
heap
page read and write
7FFD9B430000
trusted library allocation
page read and write
7FFD9B490000
trusted library allocation
page read and write
7FFD9B4E0000
trusted library allocation
page read and write
F39220C000
stack
page read and write
251F9260000
heap
page read and write
7FFD9B2CC000
trusted library allocation
page execute and read and write
1C668EB0000
trusted library allocation
page read and write
7FFD9B3F0000
trusted library allocation
page execute and read and write
2075CB06000
heap
page read and write
2CA80087000
trusted library allocation
page read and write
287B9FE000
stack
page read and write
19A2CFA0000
heap
page read and write
7FFD9B558000
trusted library allocation
page read and write
7FFD9B676000
trusted library allocation
page read and write
1C668F30000
trusted library allocation
page read and write
7DF492C40000
trusted library allocation
page execute and read and write
7FFD9B2D6000
trusted library allocation
page read and write
275F1ADC000
heap
page read and write
20744A70000
heap
page read and write
26775510000
heap
page read and write
7FFD9B670000
trusted library allocation
page read and write
2CAE9E90000
heap
page read and write
7FFD9B230000
trusted library allocation
page read and write
7FFD9B3D1000
trusted library allocation
page read and write
F39163E000
stack
page read and write
7FFD9B510000
trusted library allocation
page read and write
287BF3E000
stack
page read and write
2075CE9C000
heap
page read and write
275D7B84000
heap
page read and write
7FFD9B210000
trusted library allocation
page read and write
1D3EAF80000
heap
page read and write
2CAE80C2000
heap
page read and write
FDC0BFD000
stack
page read and write
7FFD9B310000
trusted library allocation
page execute and read and write
287CB8E000
stack
page read and write
2075CB00000
heap
page read and write
20754B4C000
trusted library allocation
page read and write
7FFD9B410000
trusted library allocation
page read and write
20742B39000
heap
page read and write
20742A90000
heap
page read and write
2CA8188E000
trusted library allocation
page read and write
251F77F7000
heap
page read and write
76495FE000
stack
page read and write
7FFD9B550000
trusted library allocation
page read and write
7FFD9B5B0000
trusted library allocation
page read and write
7FFD9B330000
trusted library allocation
page execute and read and write
19A2B175000
heap
page read and write
7FFD9B212000
trusted library allocation
page read and write
275DB5A2000
trusted library allocation
page read and write
2CAE8080000
heap
page read and write
7FFD9B580000
trusted library allocation
page read and write
251F93C0000
heap
page read and write
7FFD9B5E3000
trusted library allocation
page read and write
20754DD4000
trusted library allocation
page read and write
275F1C60000
trusted library allocation
page read and write
275D9981000
trusted library allocation
page read and write
20742BF0000
heap
page read and write
2CA90001000
trusted library allocation
page read and write
B6D7D2E000
stack
page read and write
7FFD9B5C0000
trusted library allocation
page execute and read and write
7FFD9B578000
trusted library allocation
page read and write
275F1EE9000
heap
page read and write
7FFD9B500000
trusted library allocation
page read and write
2074631C000
trusted library allocation
page read and write
7FFD9B590000
trusted library allocation
page read and write
2075CEE2000
heap
page read and write
2CA80229000
trusted library allocation
page read and write
7FFD9B21D000
trusted library allocation
page execute and read and write
275D94C0000
trusted library allocation
page read and write
287BB7E000
stack
page read and write
2CA902F4000
trusted library allocation
page read and write
7FFD9B2DC000
trusted library allocation
page execute and read and write
7FFD9B460000
trusted library allocation
page read and write
7FFD9B600000
trusted library allocation
page read and write
20742AFA000
heap
page read and write
19A2CA20000
trusted library allocation
page read and write
20742AB0000
heap
page read and write
7FFD9B2A6000
trusted library allocation
page read and write
2074671E000
trusted library allocation
page read and write
7FFD9B440000
trusted library allocation
page read and write
275DB206000
trusted library allocation
page read and write
7FFD9B21D000
trusted library allocation
page execute and read and write
275D9F56000
trusted library allocation
page read and write
275DACE5000
trusted library allocation
page read and write
20742C60000
heap
page readonly
7FFD9B410000
trusted library allocation
page read and write
2CAEA356000
heap
page read and write
26777070000
heap
page read and write
A46E37E000
stack
page read and write
1EB5A8D0000
trusted library allocation
page read and write
20754DF2000
trusted library allocation
page read and write
7FFD9B640000
trusted library allocation
page execute and read and write
A46DBBF000
unkown
page read and write
7FFD9B4A0000
trusted library allocation
page read and write
1C668F30000
trusted library allocation
page read and write
287BA7E000
stack
page read and write
A46E1F7000
stack
page read and write
2CA81541000
trusted library allocation
page read and write
CA68FB000
stack
page read and write
7FFD9B1F0000
trusted library allocation
page read and write
7FFD9B569000
trusted library allocation
page read and write
20744A40000
heap
page execute and read and write
7FFD9B4F0000
trusted library allocation
page read and write
7FFD9B450000
trusted library allocation
page read and write
1C6671EB000
heap
page read and write
275F1E93000
heap
page read and write
A46E178000
stack
page read and write
26775536000
heap
page read and write
F39127E000
stack
page read and write
D0744FF000
stack
page read and write
7FFD9B4E0000
trusted library allocation
page read and write
A46DFFE000
stack
page read and write
A46DBFE000
stack
page read and write
1EB5A720000
heap
page read and write
275E9C6D000
trusted library allocation
page read and write
76496FD000
stack
page read and write
1C668A40000
trusted library allocation
page read and write
A46E3FF000
stack
page read and write
7DF498E90000
trusted library allocation
page execute and read and write
1EB5A990000
trusted library allocation
page read and write
7FFD9B680000
trusted library allocation
page read and write
275F1CA0000
heap
page read and write
2CAE9E10000
heap
page readonly
7FFD9B570000
trusted library allocation
page read and write
20744AA0000
trusted library allocation
page read and write
2075CEB5000
heap
page read and write
7FFD9B2D0000
trusted library allocation
page read and write
2CAEA47E000
heap
page read and write
2CAEA4AC000
heap
page read and write
7FFD9B520000
trusted library allocation
page read and write
2CAE8075000
heap
page read and write
2BCD8340000
heap
page read and write
93051FE000
stack
page read and write
7FFD9B620000
trusted library allocation
page read and write
7FFD9B460000
trusted library allocation
page read and write
19A2CE20000
trusted library allocation
page read and write
7FFD9B520000
trusted library allocation
page read and write
275D9555000
heap
page read and write
287BDB7000
stack
page read and write
275D9550000
heap
page read and write
205337B0000
heap
page read and write
19A2CA20000
trusted library allocation
page read and write
26777230000
heap
page read and write
275D7AA0000
heap
page read and write
7FFD9B223000
trusted library allocation
page execute and read and write
B6D85FF000
stack
page read and write
2CAEA142000
heap
page read and write
275F1984000
heap
page read and write
F39107E000
stack
page read and write
7FFD9B666000
trusted library allocation
page read and write
9304CFE000
unkown
page read and write
275DA9D8000
trusted library allocation
page read and write
275D7B00000
heap
page read and write
B6D84FE000
stack
page read and write
7FFD9B640000
trusted library allocation
page read and write
A46DF7A000
stack
page read and write
251F782D000
heap
page read and write
2CAEA49C000
heap
page read and write
7DF40E730000
trusted library allocation
page execute and read and write
1EB5A8D0000
trusted library allocation
page read and write
7DF498E80000
trusted library allocation
page execute and read and write
7FFD9B5A0000
trusted library allocation
page read and write
20742B10000
heap
page read and write
2CA902FC000
trusted library allocation
page read and write
CA64C8000
stack
page read and write
20742AFE000
heap
page read and write
26777080000
heap
page read and write
930496D000
stack
page read and write
20745F05000
trusted library allocation
page read and write
7FFD9B3A1000
trusted library allocation
page read and write
2CA814A0000
trusted library allocation
page read and write
7FFD9B680000
trusted library allocation
page read and write
DED047F000
stack
page read and write
2CAEA200000
heap
page execute and read and write
2CAEA240000
heap
page read and write
20533800000
heap
page read and write
7FFD9B4C0000
trusted library allocation
page read and write
7FFD9B420000
trusted library allocation
page read and write
7FFD9B549000
trusted library allocation
page read and write
2075CC20000
heap
page read and write
251F9268000
heap
page read and write
2CA814CA000
trusted library allocation
page read and write
7FFD9B520000
trusted library allocation
page read and write
19A2CA20000
trusted library allocation
page read and write
20754B74000
trusted library allocation
page read and write
2CAEA0BD000
heap
page read and write
7FFD9B6B0000
trusted library allocation
page read and write
F39218E000
stack
page read and write
2CAE8060000
heap
page read and write
275F1E4C000
heap
page read and write
7FFD9B222000
trusted library allocation
page read and write
7DF492C50000
trusted library allocation
page execute and read and write
FDC10FE000
stack
page read and write
F391439000
stack
page read and write
7FFD9B590000
trusted library allocation
page read and write
275F1C10000
heap
page execute and read and write
275D7A70000
heap
page read and write
7FFD9B660000
trusted library allocation
page read and write
7FFD9B62C000
trusted library allocation
page read and write
275F1E07000
heap
page read and write
2CAEA404000
heap
page read and write
2075CB39000
heap
page read and write
7FFD9B4E0000
trusted library allocation
page read and write
2CAE80CC000
heap
page read and write
251F7820000
heap
page read and write
7FFD9B55C000
trusted library allocation
page read and write
2075CD94000
heap
page read and write
275DA909000
trusted library allocation
page read and write
20754B01000
trusted library allocation
page read and write
7FFD9B480000
trusted library allocation
page read and write
2CAEA670000
heap
page read and write
7FFD9B570000
trusted library allocation
page read and write
1EB5A620000
heap
page read and write
2075CB7A000
heap
page read and write
2CAE8106000
heap
page read and write
CA6A7E000
stack
page read and write
A46E07F000
stack
page read and write
275F1AA6000
heap
page read and write
2CAE80CE000
heap
page read and write
2CA81488000
trusted library allocation
page read and write
251F9263000
heap
page read and write
F3911FE000
stack
page read and write
7FFD9B420000
trusted library allocation
page read and write
7FFD9B5F0000
trusted library allocation
page read and write
19A2B170000
heap
page read and write
2CAE80C8000
heap
page read and write
7FFD9B2C6000
trusted library allocation
page read and write
2075CB6D000
heap
page read and write
1C6671CA000
heap
page read and write
FDC079D000
stack
page read and write
7FFD9B3B0000
trusted library allocation
page read and write
2BCD8380000
heap
page read and write
2BCD8350000
heap
page read and write
1C667125000
heap
page read and write
7FFD9B3E0000
trusted library allocation
page execute and read and write
20746368000
trusted library allocation
page read and write
275D9BA8000
trusted library allocation
page read and write
26775400000
heap
page read and write
287CC0E000
stack
page read and write
2677555C000
heap
page read and write
2CA8186A000
trusted library allocation
page read and write
7FFD9B470000
trusted library allocation
page read and write
7FFD9B460000
trusted library allocation
page read and write
287BFBE000
stack
page read and write
19A2AED0000
heap
page read and write
251F926A000
heap
page read and write
275D98D0000
trusted library allocation
page read and write
251F7920000
heap
page read and write
1D3EAB90000
heap
page read and write
A46E27D000
stack
page read and write
7FFD9B3C0000
trusted library allocation
page read and write
2CAEA097000
heap
page read and write
275F1D80000
heap
page read and write
20533808000
heap
page read and write
7FFD9B67D000
trusted library allocation
page read and write
19A2CE20000
trusted library allocation
page read and write
2074492B000
heap
page read and write
1EB5A778000
heap
page read and write
2CAEA3E2000
heap
page read and write
CA69FE000
stack
page read and write
275F1B85000
heap
page read and write
26092DB8000
heap
page read and write
7FFD9B220000
trusted library allocation
page read and write
20745C3F000
trusted library allocation
page read and write
1D3EC780000
heap
page read and write
A46DEFE000
stack
page read and write
26092D40000
heap
page read and write
2CA814E3000
trusted library allocation
page read and write
F390D73000
stack
page read and write
7FFD9B590000
trusted library allocation
page read and write
7FFD9B640000
trusted library allocation
page read and write
20535230000
heap
page read and write
275DB256000
trusted library allocation
page read and write
76494FE000
stack
page read and write
764977F000
stack
page read and write
20754DED000
trusted library allocation
page read and write
A46DE7F000
stack
page read and write
7FFD9B4A0000
trusted library allocation
page read and write
2CA814B4000
trusted library allocation
page read and write
1C6671F5000
heap
page read and write
275F1EBD000
heap
page read and write
7FFD9B560000
trusted library allocation
page read and write
FDC07A4000
stack
page read and write
19A2B0E0000
heap
page read and write
7FFD9B3AA000
trusted library allocation
page read and write
20742C70000
trusted library allocation
page read and write
7FFD9B6A0000
trusted library allocation
page read and write
7FFD9B5E0000
trusted library allocation
page read and write
7FFD9B3D2000
trusted library allocation
page read and write
7FFD9B5A5000
trusted library allocation
page read and write
2075CEC3000
heap
page read and write
2CA90031000
trusted library allocation
page read and write
7FFD9B690000
trusted library allocation
page read and write
275D7A80000
heap
page read and write
20754DF4000
trusted library allocation
page read and write
7FFD9B610000
trusted library allocation
page read and write
2CAEA4A6000
heap
page read and write
26775610000
heap
page read and write
B6D80FE000
unkown
page read and write
7FFD9B440000
trusted library allocation
page read and write
7FFD9B630000
trusted library allocation
page read and write
764967D000
stack
page read and write
F39117A000
stack
page read and write
764957E000
stack
page read and write
7FFD9B4A0000
trusted library allocation
page read and write
FDC0FFE000
stack
page read and write
7FFD9B510000
trusted library allocation
page read and write
FDC0CFE000
stack
page read and write
7FFD9B3C0000
trusted library allocation
page execute and read and write
275D955A000
heap
page read and write
20742AF4000
heap
page read and write
7FFD9B4F0000
trusted library allocation
page read and write
2CAEA237000
heap
page execute and read and write
7FFD9B490000
trusted library allocation
page read and write
2CAEA4DB000
heap
page read and write
1C6670C0000
heap
page read and write
2CA814F9000
trusted library allocation
page read and write
1C668A40000
trusted library allocation
page read and write
7FFD9B510000
trusted library allocation
page read and write
275F1CB2000
heap
page read and write
20744810000
trusted library allocation
page read and write
20742CC0000
heap
page read and write
1C667120000
heap
page read and write
7FFD9B240000
trusted library allocation
page read and write
7FFD9B200000
trusted library allocation
page read and write
7FFD9B470000
trusted library allocation
page read and write
287BC7E000
stack
page read and write
275F1C80000
heap
page read and write
26775536000
heap
page read and write
2075CC90000
heap
page read and write
2075CCD2000
heap
page read and write
26775536000
heap
page read and write
7FFD9B540000
trusted library allocation
page read and write
7FFD9B3E0000
trusted library allocation
page execute and read and write
A46EF4E000
stack
page read and write
275DB198000
trusted library allocation
page read and write
20533A15000
heap
page read and write
275E9981000
trusted library allocation
page read and write
2CA80001000
trusted library allocation
page read and write
20742CC5000
heap
page read and write
20754B31000
trusted library allocation
page read and write
26092DB0000
heap
page read and write
7FFD9B572000
trusted library allocation
page read and write
26775695000
heap
page read and write
CAD467C000
stack
page read and write
251F77E9000
heap
page read and write
7FFD9B4B0000
trusted library allocation
page read and write
1D3EAC70000
heap
page read and write
7FFD9B2F6000
trusted library allocation
page execute and read and write
2075CBC8000
heap
page read and write
2CAEA08D000
heap
page read and write
7FFD9B530000
trusted library allocation
page read and write
275F1AB0000
heap
page read and write
20754B35000
trusted library allocation
page read and write
1D3EAD05000
heap
page read and write
275F1E2D000
heap
page read and write
251F77D0000
heap
page read and write
26092D20000
heap
page read and write
7FFD9B440000
trusted library allocation
page read and write
1EB5A806000
heap
page read and write
19A2CFDC000
heap
page read and write
2075CCE5000
heap
page read and write
1EB5C5A0000
trusted library allocation
page read and write
251F78D0000
heap
page read and write
275F1CC1000
heap
page read and write
20745E97000
trusted library allocation
page read and write
2CAE80BE000
heap
page read and write
207458E1000
trusted library allocation
page read and write
F39173E000
stack
page read and write
81F60FE000
stack
page read and write
275D7B3D000
heap
page read and write
2CAE9AC5000
heap
page read and write
7FFD9B420000
trusted library allocation
page read and write
7FFD9B224000
trusted library allocation
page read and write
20742AF8000
heap
page read and write
2CA814CC000
trusted library allocation
page read and write
275F1EC6000
heap
page read and write
2CAEA340000
heap
page read and write
287BAF9000
stack
page read and write
7FFD9B600000
trusted library allocation
page read and write
81F5D76000
stack
page read and write
20744D28000
trusted library allocation
page read and write
7FFD9B3C1000
trusted library allocation
page read and write
275E9C72000
trusted library allocation
page read and write
7FFD9B2A0000
trusted library allocation
page read and write
81F5DFD000
stack
page read and write
7FFD9B3E0000
trusted library allocation
page execute and read and write
81F607E000
stack
page read and write
2CAE9ACA000
heap
page read and write
7FFD9B490000
trusted library allocation
page read and write
2677556D000
heap
page read and write
7FFD9B50F000
trusted library allocation
page read and write
2CAEA3CA000
heap
page read and write
7FFD9B650000
trusted library allocation
page read and write
275F1EDB000
heap
page read and write
2CAE8270000
heap
page read and write
81F61FB000
stack
page read and write
2CA90021000
trusted library allocation
page read and write
20746075000
trusted library allocation
page read and write
2075CE2C000
heap
page read and write
275DB59E000
trusted library allocation
page read and write
2CAE9A50000
heap
page read and write
7FFD9B580000
trusted library allocation
page read and write
7FFD9B3F2000
trusted library allocation
page read and write
7FFD9B650000
trusted library allocation
page read and write
2CA80C5E000
trusted library allocation
page read and write
1C668EB0000
trusted library allocation
page read and write
26775519000
heap
page read and write
7FFD9B220000
trusted library allocation
page read and write
275F1B13000
heap
page read and write
A46E2FE000
stack
page read and write
2BCD8550000
heap
page read and write
275D94D0000
heap
page readonly
1C668EB0000
trusted library allocation
page read and write
2075CEDB000
heap
page read and write
2075CB08000
heap
page read and write
7FFD9B660000
trusted library allocation
page read and write
275F1DB6000
heap
page read and write
1EB5A8D0000
trusted library allocation
page read and write
1D3EAD05000
heap
page read and write
275D9530000
heap
page execute and read and write
7FFD9B26C000
trusted library allocation
page execute and read and write
7FFD9B5F0000
trusted library allocation
page read and write
275DAA6C000
trusted library allocation
page read and write
7FFD9B620000
trusted library allocation
page read and write
275DAE93000
trusted library allocation
page read and write
275DAA45000
trusted library allocation
page read and write
251F78F0000
heap
page read and write
A46E57C000
stack
page read and write
2075CC80000
heap
page execute and read and write
7FFD9B4F0000
trusted library allocation
page read and write
7FFD9B3F0000
trusted library allocation
page read and write
7FFD9B670000
trusted library allocation
page read and write
9304EFD000
stack
page read and write
19A2CA20000
trusted library allocation
page read and write
81F63FB000
stack
page read and write
2075CEBD000
heap
page read and write
7FFD9B582000
trusted library allocation
page read and write
F391376000
stack
page read and write
287BBFE000
stack
page read and write
20754D5A000
trusted library allocation
page read and write
251F9266000
heap
page read and write
7FFD9B214000
trusted library allocation
page read and write
2CAEA42E000
heap
page read and write
7FFD9B20B000
trusted library allocation
page read and write
7FFD9B680000
trusted library allocation
page read and write
2CAEA0FA000
heap
page read and write
F3914B9000
stack
page read and write
7FFD9B306000
trusted library allocation
page execute and read and write
20754C9E000
trusted library allocation
page read and write
251F77E6000
heap
page read and write
1C668F30000
trusted library allocation
page read and write
275F1AD0000
heap
page read and write
275DB1E4000
trusted library allocation
page read and write
7FFD9B1F3000
trusted library allocation
page execute and read and write
19A2CE20000
trusted library allocation
page read and write
287BCF9000
stack
page read and write
7FFD9B61A000
trusted library allocation
page read and write
There are 765 hidden memdumps, click here to show them.