IOC Report
iLPxdpxQ3e.exe

loading gif

Files

File Path
Type
Category
Malicious
iLPxdpxQ3e.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\DisconnectCheats
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_03ekwddp.vsc.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_50kqlwzt.ok3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cb2lysg2.ffk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_clhvavz4.fpy.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ctjmfczu.0id.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ehpi01am.1wk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_enoiwdcl.qdk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fr24e1yt.z52.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gfqb5ezt.lf3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jdufll5a.j1n.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_n0fdp5bm.aph.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_na3ejatq.utg.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ovkrls1c.aip.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_t5j5efbn.nlu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xn5zdfwq.4hw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yl5jx5nd.veh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\DisconnectCheats.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Thu Oct 31 18:04:57 2024, mtime=Thu Oct 31 18:04:57 2024, atime=Thu Oct 31 18:04:57 2024, length=305664, window=hide
dropped
There are 10 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\iLPxdpxQ3e.exe
"C:\Users\user\Desktop\iLPxdpxQ3e.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\Desktop\iLPxdpxQ3e.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'iLPxdpxQ3e.exe'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionPath 'C:\Users\user\AppData\Local\DisconnectCheats'
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ExecutionPolicy Bypass Add-MpPreference -ExclusionProcess 'DisconnectCheats'
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
dane1c-58098.portmap.host
malicious
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
http://crl.mic
unknown
https://contoso.com/Icon
unknown
http://crl.micft.cMicRosof
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://crl.micros
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dane1c-58098.portmap.host
193.161.193.99
malicious

IPs

IP
Domain
Country
Malicious
193.161.193.99
dane1c-58098.portmap.host
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
72000
unkown
page readonly
malicious
21D8E7E4000
trusted library allocation
page read and write
24A52DB7000
heap
page execute and read and write
20A566C7000
heap
page read and write
2A54C3F000
stack
page read and write
1EA2947C000
trusted library allocation
page read and write
7FFD9BA46000
trusted library allocation
page read and write
53E9EF9000
stack
page read and write
23B7000
trusted library allocation
page read and write
93996C9000
stack
page read and write
4FAC08C000
stack
page read and write
20A568B4000
heap
page read and write
1EA265DD000
heap
page read and write
1AFC6000
heap
page read and write
20A3FF1E000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page read and write
21DA49C0000
heap
page read and write
1EA28290000
heap
page execute and read and write
53EA278000
stack
page read and write
24A52EE0000
heap
page read and write
1EA38312000
trusted library allocation
page read and write
4FABF0D000
stack
page read and write
21DA51FD000
heap
page read and write
7FFD9BC00000
trusted library allocation
page read and write
7FFD9BDFD000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
21DA5490000
heap
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
20A3F50A000
trusted library allocation
page read and write
21D8C850000
heap
page readonly
2A5588E000
stack
page read and write
7FFD9BC00000
trusted library allocation
page read and write
20A3F8C4000
trusted library allocation
page read and write
24A38E24000
heap
page read and write
24A528AE000
heap
page read and write
20A56815000
heap
page read and write
21D9CCB0000
trusted library allocation
page read and write
9398A7E000
stack
page read and write
1EA38590000
trusted library allocation
page read and write
20A565A0000
heap
page read and write
21D8C9C1000
trusted library allocation
page read and write
20A3DF80000
trusted library allocation
page read and write
470000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9BD00000
trusted library allocation
page read and write
20A56668000
heap
page read and write
7DF413430000
trusted library allocation
page execute and read and write
21DA4E71000
heap
page read and write
7FFD9BE25000
trusted library allocation
page read and write
20A56927000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
7FFD9BC20000
trusted library allocation
page read and write
1BE0E000
stack
page read and write
24A4ABAA000
trusted library allocation
page read and write
20A3C790000
heap
page read and write
1EA29B33000
trusted library allocation
page read and write
21DA51C0000
heap
page read and write
7FFD9BD90000
trusted library allocation
page read and write
20A3EEB5000
trusted library allocation
page read and write
21D8C7F0000
heap
page read and write
21D8CE8D000
trusted library allocation
page read and write
7FFD9BB30000
trusted library allocation
page read and write
7FFD9BD05000
trusted library allocation
page read and write
24A38FF0000
heap
page read and write
53EA07D000
stack
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
20A3ED3D000
trusted library allocation
page read and write
7FFD9BC00000
trusted library allocation
page read and write
20A3C7A5000
heap
page read and write
7FFD9BDD0000
trusted library allocation
page read and write
1B24E000
stack
page read and write
7FFD9B972000
trusted library allocation
page read and write
4FAB33E000
stack
page read and write
20A565BA000
heap
page read and write
7FFD9BC70000
trusted library allocation
page read and write
53EA47E000
stack
page read and write
24A38DEC000
heap
page read and write
450000
heap
page read and write
1AE1E000
stack
page read and write
1EA4086D000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FFD9BDB0000
trusted library allocation
page read and write
20A4E430000
trusted library allocation
page read and write
9398877000
stack
page read and write
24A3B96C000
trusted library allocation
page read and write
7FFD9BA56000
trusted library allocation
page execute and read and write
24A53142000
heap
page read and write
21D8DC1A000
trusted library allocation
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
24A52E9D000
heap
page read and write
7FFD9BCA2000
trusted library allocation
page read and write
1EA28EA3000
trusted library allocation
page read and write
7FFD9BDD0000
trusted library allocation
page execute and read and write
24A3BABD000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
1EA409B0000
trusted library allocation
page read and write
24A52DC0000
heap
page read and write
21D8C9B0000
heap
page execute and read and write
7FFD9BC90000
trusted library allocation
page read and write
1EA281AB000
heap
page read and write
7FFD9BA4C000
trusted library allocation
page execute and read and write
20A56931000
heap
page read and write
7FFD9BD20000
trusted library allocation
page read and write
24A38E90000
heap
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
7FFD9BCD8000
trusted library allocation
page read and write
7FFD9BCC9000
trusted library allocation
page read and write
9398B7C000
stack
page read and write
2A54DBB000
stack
page read and write
7FFD9BDA0000
trusted library allocation
page read and write
7FFD9BB52000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
20A567A0000
heap
page read and write
1EA29210000
trusted library allocation
page read and write
20A3F3E9000
trusted library allocation
page read and write
1B900000
heap
page read and write
7FFD9BCB4000
trusted library allocation
page read and write
53E9FF7000
stack
page read and write
20A3C6F0000
heap
page read and write
1EA40750000
heap
page execute and read and write
23A7000
trusted library allocation
page read and write
53E9D7E000
stack
page read and write
21D8AE89000
heap
page read and write
7FFD9BB90000
trusted library allocation
page execute and read and write
7FFD9BB4A000
trusted library allocation
page read and write
7DF4DCCC0000
trusted library allocation
page execute and read and write
24A38CA0000
heap
page read and write
24A38EE0000
heap
page read and write
1EA29667000
trusted library allocation
page read and write
775000
heap
page read and write
24A3C6C6000
trusted library allocation
page read and write
7FFD9BB30000
trusted library allocation
page execute and read and write
20A3FF43000
trusted library allocation
page read and write
7FFD9B974000
trusted library allocation
page read and write
21D9C9D0000
trusted library allocation
page read and write
24A38DEE000
heap
page read and write
1BD0B000
stack
page read and write
20A3E36A000
trusted library allocation
page read and write
7FFD9BDF0000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
7FFD9BD10000
trusted library allocation
page read and write
24A38DE0000
heap
page read and write
7FFD9BC70000
trusted library allocation
page read and write
1EA27F20000
trusted library allocation
page read and write
21D8C890000
heap
page read and write
7FFD9BB72000
trusted library allocation
page read and write
24A3C1F5000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
7FFD9BD08000
trusted library allocation
page read and write
20A3F356000
trusted library allocation
page read and write
1EA408F5000
heap
page read and write
7FFD9B9BD000
trusted library allocation
page execute and read and write
1EA4078E000
heap
page read and write
2351000
trusted library allocation
page read and write
4FAB2BD000
stack
page read and write
20A3C6B1000
heap
page read and write
8E0000
trusted library allocation
page read and write
20A5691E000
heap
page read and write
7FFD9BA56000
trusted library allocation
page read and write
7FFD9BB41000
trusted library allocation
page read and write
20A3E000000
heap
page execute and read and write
20A3C5B0000
heap
page read and write
20A5614F000
heap
page read and write
1EA29208000
trusted library allocation
page read and write
7FFD9BDA0000
trusted library allocation
page execute and read and write
1EA2920C000
trusted library allocation
page read and write
1EA264A0000
heap
page read and write
7FFD9BA46000
trusted library allocation
page read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
20A566C0000
heap
page read and write
7FFD9BCF8000
trusted library allocation
page read and write
24A3C134000
trusted library allocation
page read and write
2A5580C000
stack
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
21D8AE70000
trusted library section
page read and write
7FFD9B9A3000
trusted library allocation
page execute and read and write
7FFD9BC10000
trusted library allocation
page read and write
1EA2A0C6000
trusted library allocation
page read and write
2A547FA000
stack
page read and write
7FFD9BC90000
trusted library allocation
page read and write
21D8AE00000
heap
page read and write
1EA40780000
heap
page read and write
4FAAAF3000
stack
page read and write
53EAF4C000
stack
page read and write
21D8DBAF000
trusted library allocation
page read and write
24A38E26000
heap
page read and write
7FFD9B9EC000
trusted library allocation
page execute and read and write
93987F8000
stack
page read and write
7FFD9BCDC000
trusted library allocation
page read and write
2A54BB9000
stack
page read and write
7FFD9B992000
trusted library allocation
page read and write
21DA51EC000
heap
page read and write
880000
heap
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
20A3F0DE000
trusted library allocation
page read and write
7FFD9BA2C000
trusted library allocation
page execute and read and write
7FFD9BC20000
trusted library allocation
page read and write
21DA50D0000
heap
page read and write
20A3E135000
heap
page read and write
24A3A7A0000
trusted library allocation
page read and write
20A3C750000
trusted library allocation
page read and write
1EA28328000
trusted library allocation
page read and write
7FFD9BA56000
trusted library allocation
page read and write
965000
heap
page read and write
53EA176000
stack
page read and write
4FAC009000
stack
page read and write
24A38F50000
heap
page readonly
7FFD9BCB0000
trusted library allocation
page read and write
7FFD9BB58000
trusted library allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
24A53127000
heap
page read and write
24A4AB90000
trusted library allocation
page read and write
7FFD9BAC5000
trusted library allocation
page execute and read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page execute and read and write
20A3C613000
heap
page read and write
7FFD9BDC0000
trusted library allocation
page read and write
20A568E4000
heap
page read and write
53EB0CC000
stack
page read and write
21D8AE25000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
569000
heap
page read and write
24A4AB8B000
trusted library allocation
page read and write
7FFD9BDB0000
trusted library allocation
page read and write
24A38FF5000
heap
page read and write
21DA4E75000
heap
page read and write
24A3B83D000
trusted library allocation
page read and write
24A52E94000
heap
page read and write
21D8D9F8000
trusted library allocation
page read and write
2A55A0E000
stack
page read and write
21D8D965000
trusted library allocation
page read and write
21DA4FF8000
heap
page read and write
21D8C810000
trusted library section
page read and write
53EB14C000
stack
page read and write
24A530D9000
heap
page read and write
1EA265D9000
heap
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
24A38DFE000
heap
page read and write
24A3BB50000
trusted library allocation
page read and write
1EA27ED0000
trusted library allocation
page read and write
93997CE000
stack
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
7FFD9BDE0000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page execute and read and write
1EA27F00000
heap
page readonly
20A567DE000
heap
page read and write
21D8C895000
heap
page read and write
939964E000
stack
page read and write
4FAAE7E000
stack
page read and write
24A5314B000
heap
page read and write
20A3F0E4000
trusted library allocation
page read and write
21D8DADD000
trusted library allocation
page read and write
21D8E7C4000
trusted library allocation
page read and write
20A3F202000
trusted library allocation
page read and write
2A54CBE000
stack
page read and write
1EA29A27000
trusted library allocation
page read and write
939867E000
stack
page read and write
1EA382A1000
trusted library allocation
page read and write
21DA4E47000
heap
page read and write
21D8AEE0000
heap
page read and write
1EA26590000
heap
page read and write
20A568B7000
heap
page read and write
7FFD9BD20000
trusted library allocation
page read and write
21D8DD8D000
trusted library allocation
page read and write
24A52EC0000
heap
page read and write
24A3A8A1000
trusted library allocation
page read and write
7FFD9BCE9000
trusted library allocation
page read and write
1EA28CF2000
trusted library allocation
page read and write
7FFD9BCF9000
trusted library allocation
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
7FFD9BCC0000
trusted library allocation
page read and write
1EA28200000
heap
page read and write
24A4A8D1000
trusted library allocation
page read and write
24A3B8DB000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page execute and read and write
2A548F7000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
7FFD9BDE0000
trusted library allocation
page read and write
7FFD9BD90000
trusted library allocation
page read and write
1B34E000
stack
page read and write
20A3FF68000
trusted library allocation
page read and write
20A3F0B4000
trusted library allocation
page read and write
24A3AAC8000
trusted library allocation
page read and write
21D8DAEC000
trusted library allocation
page read and write
7FFD9BA90000
trusted library allocation
page execute and read and write
7FFD9B993000
trusted library allocation
page execute and read and write
24A3B61A000
trusted library allocation
page read and write
20A3EB93000
trusted library allocation
page read and write
24A38DDD000
heap
page read and write
51B000
heap
page read and write
7FFD9BB21000
trusted library allocation
page read and write
1EA284C8000
trusted library allocation
page read and write
24A3B86F000
trusted library allocation
page read and write
53EA2FE000
stack
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
21D8AEDD000
heap
page read and write
21D8C820000
trusted library allocation
page read and write
4FABE8F000
stack
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
7FFD9BB84000
trusted library allocation
page read and write
20A4E141000
trusted library allocation
page read and write
20A566CE000
heap
page read and write
53EAFC9000
stack
page read and write
20A566A0000
heap
page read and write
20A567D9000
heap
page read and write
20A3F147000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
7FFD9B993000
trusted library allocation
page execute and read and write
20A3C4B0000
heap
page read and write
56D000
heap
page read and write
7FFD9BD10000
trusted library allocation
page read and write
20A5668A000
heap
page read and write
7FFD9BD80000
trusted library allocation
page read and write
24A3B940000
trusted library allocation
page read and write
20A3E1C5000
trusted library allocation
page read and write
7FFD9BDF0000
trusted library allocation
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
4E5000
heap
page read and write
7FFD9BB32000
trusted library allocation
page read and write
913000
heap
page read and write
8C0000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
960000
heap
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
20A569C0000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
24A3AD6D000
trusted library allocation
page read and write
1EA29219000
trusted library allocation
page read and write
20A4E51D000
trusted library allocation
page read and write
21D8AEC3000
heap
page read and write
1EA408BE000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
21DA521C000
heap
page read and write
12361000
trusted library allocation
page read and write
20A565FC000
heap
page read and write
1EA26720000
heap
page read and write
4FAB13F000
stack
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
21D8AE80000
heap
page read and write
1EA2A0CB000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
24A38DC4000
heap
page read and write
20A566D3000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
21D8C880000
heap
page read and write
7FFD9BE00000
trusted library allocation
page read and write
20A3EFCC000
trusted library allocation
page read and write
24A38DA0000
heap
page read and write
7FFD9BD10000
trusted library allocation
page read and write
24A53310000
heap
page read and write
7FFD9BD63000
trusted library allocation
page read and write
1EA382C1000
trusted library allocation
page read and write
2A5487E000
stack
page read and write
21D8E145000
trusted library allocation
page read and write
1A380000
trusted library allocation
page read and write
24A3A7D0000
trusted library allocation
page read and write
21D8AEBF000
heap
page read and write
24A52E15000
heap
page read and write
939847C000
stack
page read and write
1EA40897000
heap
page read and write
7FFD9BD02000
trusted library allocation
page read and write
1EA2818F000
heap
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
939877E000
stack
page read and write
53E9E7E000
stack
page read and write
1EA294F2000
trusted library allocation
page read and write
20A3C7A0000
heap
page read and write
7FFD9B9BB000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
24A52E21000
heap
page read and write
21D8AE93000
heap
page read and write
20A3FF63000
trusted library allocation
page read and write
53EA4FC000
stack
page read and write
93989FF000
stack
page read and write
7FFD9BDF6000
trusted library allocation
page read and write
7FFD9BDE0000
trusted library allocation
page read and write
770000
heap
page read and write
20A3F1D6000
trusted library allocation
page read and write
20A5681D000
heap
page read and write
24A5311E000
heap
page read and write
7FFD9BD9A000
trusted library allocation
page read and write
1EA2919C000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page execute and read and write
7FFD9BB30000
trusted library allocation
page read and write
21D8DBA4000
trusted library allocation
page read and write
20A4E42E000
trusted library allocation
page read and write
7DF40B700000
trusted library allocation
page execute and read and write
939974C000
stack
page read and write
1EA26682000
heap
page read and write
24A38F20000
trusted library allocation
page read and write
2A5497E000
stack
page read and write
20A56948000
heap
page read and write
20A3E130000
heap
page read and write
7FFD9B9CC000
trusted library allocation
page execute and read and write
1EA2921D000
trusted library allocation
page read and write
7FFD9B9B4000
trusted library allocation
page read and write
7FFD9BC90000
trusted library allocation
page read and write
24A3B837000
trusted library allocation
page read and write
24A38FB0000
heap
page read and write
53EB14E000
stack
page read and write
7FFD9BA5C000
trusted library allocation
page execute and read and write
7FFD9BE20000
trusted library allocation
page read and write
512000
heap
page read and write
20A3C760000
heap
page readonly
7FFD9BB82000
trusted library allocation
page read and write
1EA29335000
trusted library allocation
page read and write
24A3C028000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
7FFD9BDE0000
trusted library allocation
page read and write
24A3BA84000
trusted library allocation
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
12358000
trusted library allocation
page read and write
20A4E161000
trusted library allocation
page read and write
20A4E171000
trusted library allocation
page read and write
21D8D98D000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
24A3C10D000
trusted library allocation
page read and write
7FFD9BDB0000
trusted library allocation
page execute and read and write
4FAB43E000
stack
page read and write
440000
heap
page read and write
20A568E0000
heap
page read and write
21D8AEBD000
heap
page read and write
7FFD9BA4C000
trusted library allocation
page execute and read and write
21D8D413000
trusted library allocation
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
7FFD9BBE0000
trusted library allocation
page read and write
20A56883000
heap
page read and write
21D8D95F000
trusted library allocation
page read and write
1EA2954A000
trusted library allocation
page read and write
4FAAB7D000
stack
page read and write
2340000
heap
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
53EA1F9000
stack
page read and write
7FFD9BE06000
trusted library allocation
page read and write
1EA4083B000
heap
page read and write
20A565C3000
heap
page read and write
1B44E000
stack
page read and write
1EA266E0000
heap
page read and write
7FFD9BB82000
trusted library allocation
page read and write
7FFD9BA76000
trusted library allocation
page execute and read and write
21DA51CB000
heap
page read and write
7FFD9B9BB000
trusted library allocation
page read and write
24A3B2F1000
trusted library allocation
page read and write
7FFD9B9FC000
trusted library allocation
page execute and read and write
20A3ED3F000
trusted library allocation
page read and write
7FFD9BC30000
trusted library allocation
page read and write
7FFD9BBD2000
trusted library allocation
page read and write
1EA29301000
trusted library allocation
page read and write
1EA28171000
heap
page read and write
20A3C619000
heap
page read and write
20A3C615000
heap
page read and write
7FFD9BC30000
trusted library allocation
page read and write
24A3B879000
trusted library allocation
page read and write
1EA265F1000
heap
page read and write
7FFD9BC50000
trusted library allocation
page read and write
7FFD9BC10000
trusted library allocation
page read and write
1EA2661D000
heap
page read and write
2A5477E000
stack
page read and write
24A52E4F000
heap
page read and write
2A54A3E000
stack
page read and write
7FFD9BC40000
trusted library allocation
page read and write
24A3A880000
heap
page execute and read and write
24A52E90000
heap
page read and write
24A3A890000
heap
page read and write
1EA27EF0000
trusted library allocation
page read and write
7FFD9BB80000
trusted library allocation
page read and write
1EA3858B000
trusted library allocation
page read and write
2A55909000
stack
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BCF9000
trusted library allocation
page read and write
1EA26710000
trusted library section
page read and write
24A52D90000
trusted library allocation
page read and write
1EA27F10000
heap
page read and write
7DF419D40000
trusted library allocation
page execute and read and write
1B6AA000
stack
page read and write
1EA3859A000
trusted library allocation
page read and write
939897B000
stack
page read and write
20A3C730000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
24A38F40000
trusted library allocation
page read and write
7FFD9B97D000
trusted library allocation
page execute and read and write
4E2000
heap
page read and write
20A3F96A000
trusted library allocation
page read and write
70000
unkown
page readonly
4FAC10C000
stack
page read and write
8F3000
trusted library allocation
page read and write
53EAECE000
stack
page read and write
21D8DC72000
trusted library allocation
page read and write
20A565C5000
heap
page read and write
1EA280C0000
heap
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
24A38F60000
trusted library allocation
page read and write
7FFD9BC20000
trusted library allocation
page read and write
21DA4FCA000
heap
page read and write
21D9CA32000
trusted library allocation
page read and write
21D8E312000
trusted library allocation
page read and write
21D8AF06000
heap
page read and write
24A3BBB0000
trusted library allocation
page read and write
1EA293C5000
trusted library allocation
page read and write
7FFD9BB78000
trusted library allocation
page read and write
24A4A912000
trusted library allocation
page read and write
53E9DFE000
stack
page read and write
7FFD9BDC0000
trusted library allocation
page read and write
20A4E438000
trusted library allocation
page read and write
1EA2661A000
heap
page read and write
939954E000
stack
page read and write
1AFEA000
heap
page read and write
1AF50000
heap
page read and write
24A5307C000
heap
page read and write
7FFD9BB50000
trusted library allocation
page execute and read and write
1EA408EA000
heap
page read and write
1EA2A081000
trusted library allocation
page read and write
7FFD9BA86000
trusted library allocation
page execute and read and write
1EA280C5000
heap
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
9398AFE000
stack
page read and write
7FFD9BA5C000
trusted library allocation
page execute and read and write
7FFD9BDB0000
trusted library allocation
page read and write
7FFD9BE10000
trusted library allocation
page read and write
1EA28227000
heap
page execute and read and write
7FFD9BD9A000
trusted library allocation
page read and write
1F4000
stack
page read and write
7FFD9BCA0000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
1EA266B0000
heap
page read and write
7FFD9BB5A000
trusted library allocation
page read and write
24A3C6CC000
trusted library allocation
page read and write
53E99FF000
stack
page read and write
21D8DCD3000
trusted library allocation
page read and write
20A56A80000
heap
page read and write
21DA52F0000
trusted library allocation
page read and write
53EA37E000
stack
page read and write
20A3F9D0000
trusted library allocation
page read and write
7FFD9BD00000
trusted library allocation
page read and write
20A3F9A9000
trusted library allocation
page read and write
7FFD9BDED000
trusted library allocation
page read and write
7FFD9B994000
trusted library allocation
page read and write
7FFD9BCA3000
trusted library allocation
page read and write
7FFD9BD9C000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
21D8AF59000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1B14E000
stack
page read and write
7FFD9B98B000
trusted library allocation
page read and write
7DF40B710000
trusted library allocation
page execute and read and write
7FFD9BBC0000
trusted library allocation
page read and write
21D8AE30000
heap
page read and write
20A568F7000
heap
page read and write
24A52E17000
heap
page read and write
A3E000
stack
page read and write
7FFD9BD20000
trusted library allocation
page read and write
7FFD9B9A2000
trusted library allocation
page read and write
93981DE000
stack
page read and write
12351000
trusted library allocation
page read and write
93986F6000
stack
page read and write
20A568F5000
heap
page read and write
4FAB3BE000
stack
page read and write
93985F9000
stack
page read and write
7FFD9B99D000
trusted library allocation
page execute and read and write
7FFD9BD02000
trusted library allocation
page read and write
7FFD9BBA0000
trusted library allocation
page read and write
4FAB239000
stack
page read and write
20A4E448000
trusted library allocation
page read and write
24A52EAD000
heap
page read and write
1EA2901D000
trusted library allocation
page read and write
7FFD9BD9C000
trusted library allocation
page read and write
7FFD9BD30000
trusted library allocation
page read and write
1B7A4000
stack
page read and write
21D8CBE9000
trusted library allocation
page read and write
24A4A8C1000
trusted library allocation
page read and write
21DA4EAB000
heap
page read and write
7FFD9BDFF000
trusted library allocation
page read and write
7FFD9BCE4000
trusted library allocation
page read and write
1EA29215000
trusted library allocation
page read and write
20A56825000
heap
page read and write
4A6000
heap
page read and write
7FFD9BD0C000
trusted library allocation
page read and write
1EA408A0000
heap
page read and write
1EA2922A000
trusted library allocation
page read and write
20A3E100000
heap
page execute and read and write
7FFD9BDE6000
trusted library allocation
page read and write
4FAB0F7000
stack
page read and write
7FFD9BC13000
trusted library allocation
page read and write
1EA26690000
heap
page read and write
7FFD9BBB0000
trusted library allocation
page read and write
BC000
unkown
page readonly
1EA29361000
trusted library allocation
page read and write
93988FA000
stack
page read and write
7FFD9BB88000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
4FAABFE000
stack
page read and write
24A38DE4000
heap
page read and write
20A3E60E000
trusted library allocation
page read and write
7DF4DCCB0000
trusted library allocation
page execute and read and write
20A3C770000
trusted library allocation
page read and write
20A567E5000
heap
page read and write
7FFD9BC80000
trusted library allocation
page read and write
939857F000
stack
page read and write
1EA40670000
heap
page read and write
7FFD9B9A3000
trusted library allocation
page execute and read and write
4FAC18E000
stack
page read and write
24A52FC0000
heap
page read and write
7FF475720000
trusted library allocation
page execute and read and write
70000
unkown
page readonly
123A3000
trusted library allocation
page read and write
21DA51FF000
heap
page read and write
1EA281D0000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
7FFD9BB88000
trusted library allocation
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
24A52E28000
heap
page read and write
9398193000
stack
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
7FFD9BB42000
trusted library allocation
page read and write
7FFD9BC60000
trusted library allocation
page read and write
7FFD9BC40000
trusted library allocation
page read and write
2A5467E000
stack
page read and write
7FFD9B9AB000
trusted library allocation
page read and write
4FAAF7E000
stack
page read and write
1EA280A0000
trusted library allocation
page read and write
7FFD9BCC3000
trusted library allocation
page read and write
7FFD9B9EC000
trusted library allocation
page execute and read and write
7FFD9BDC0000
trusted library allocation
page read and write
7FFD9BDF0000
trusted library allocation
page read and write
24A53032000
heap
page read and write
7FFD9BD13000
trusted library allocation
page read and write
20A565EA000
heap
page read and write
53EA3FE000
stack
page read and write
940000
heap
page execute and read and write
24A38FB5000
heap
page read and write
7FFD9BA26000
trusted library allocation
page read and write
7FFD9BCD3000
trusted library allocation
page read and write
20A3ED47000
trusted library allocation
page read and write
20A3C60D000
heap
page read and write
21DA51B1000
heap
page read and write
21D8AEC7000
heap
page read and write
7FFD9BB40000
trusted library allocation
page execute and read and write
7FFD9BC00000
trusted library allocation
page read and write
2320000
heap
page execute and read and write
7FFD9BB51000
trusted library allocation
page read and write
21D8ADF0000
heap
page read and write
20A3F234000
trusted library allocation
page read and write
21D9CCAB000
trusted library allocation
page read and write
7FFD9BE01000
trusted library allocation
page read and write
24A3BC6B000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
21D8E79F000
trusted library allocation
page read and write
24A53138000
heap
page read and write
24A53150000
heap
page read and write
20A56922000
heap
page read and write
24A5305A000
heap
page read and write
21D9CCB8000
trusted library allocation
page read and write
2A54AB9000
stack
page read and write
24A38D80000
heap
page read and write
7FFD9BD80000
trusted library allocation
page read and write
24A3B4A6000
trusted library allocation
page read and write
7FFD9B9FC000
trusted library allocation
page execute and read and write
7FFD9BC50000
trusted library allocation
page read and write
21D9CD32000
trusted library allocation
page read and write
24A38DE8000
heap
page read and write
7FFD9BC80000
trusted library allocation
page read and write
20A3C60F000
heap
page read and write
1EA408C8000
heap
page read and write
7FFD9BDAC000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
21D9C9C1000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page execute and read and write
20A3C5D0000
heap
page read and write
2A54B38000
stack
page read and write
7FFD9BD70000
trusted library allocation
page read and write
23AD000
trusted library allocation
page read and write
1EA29B0C000
trusted library allocation
page read and write
7FFD9B9A2000
trusted library allocation
page read and write
9B0000
heap
page read and write
1EA29204000
trusted library allocation
page read and write
21D8C840000
trusted library allocation
page read and write
1EA2820D000
heap
page read and write
21D8E22A000
trusted library allocation
page read and write
7FFD9BCB0000
trusted library allocation
page read and write
2A543C3000
stack
page read and write
21D8C89A000
heap
page read and write
4FAAEF9000
stack
page read and write
4FAB4BB000
stack
page read and write
1EA292D8000
trusted library allocation
page read and write
4AC000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9BC90000
trusted library allocation
page read and write
7FFD9BDA0000
trusted library allocation
page read and write
20A3F173000
trusted library allocation
page read and write
1EA281E9000
heap
page read and write
20A3E007000
heap
page execute and read and write
4FABF8E000
stack
page read and write
7FFD9BC60000
trusted library allocation
page read and write
2A5578E000
stack
page read and write
24A3A926000
trusted library allocation
page read and write
21D8AE20000
heap
page read and write
7FFD9BCE0000
trusted library allocation
page read and write
1EA38592000
trusted library allocation
page read and write
93995CC000
stack
page read and write
20A3E141000
trusted library allocation
page read and write
24A52DCC000
heap
page read and write
24A3C681000
trusted library allocation
page read and write
7FFD9BE10000
trusted library allocation
page read and write
4CA000
heap
page read and write
1EA28EB1000
trusted library allocation
page read and write
21D8DA5B000
trusted library allocation
page read and write
20A56937000
heap
page read and write
20A3C5F4000
heap
page read and write
1EA265DF000
heap
page read and write
1AD1D000
stack
page read and write
21D8AF04000
heap
page read and write
21D8AEC1000
heap
page read and write
20A3C655000
heap
page read and write
1EA40980000
heap
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
20A3F41A000
trusted library allocation
page read and write
24A38DE2000
heap
page read and write
1EA29BF4000
trusted library allocation
page read and write
1EA295AB000
trusted library allocation
page read and write
7FFD9BCF2000
trusted library allocation
page read and write
7FFD9BB51000
trusted library allocation
page read and write
586000
heap
page read and write
21D8DD51000
trusted library allocation
page read and write
20A4E1B0000
trusted library allocation
page read and write
20A3C5D8000
heap
page read and write
21DA50A0000
heap
page execute and read and write
24A53100000
heap
page read and write
7FFD9BDF7000
trusted library allocation
page read and write
2A549F7000
stack
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
20A3F4CA000
trusted library allocation
page read and write
21D8DA87000
trusted library allocation
page read and write
24A3C6A7000
trusted library allocation
page read and write
7FFD9B9A4000
trusted library allocation
page read and write
2A54D3E000
stack
page read and write
4A0000
heap
page read and write
7DF4DCCD0000
trusted library allocation
page execute and read and write
20A3F31D000
trusted library allocation
page read and write
7FFD9BBF0000
trusted library allocation
page read and write
7FFD9BB70000
trusted library allocation
page read and write
7FFD9BE20000
trusted library allocation
page read and write
1EA385AA000
trusted library allocation
page read and write
7FFD9BB42000
trusted library allocation
page read and write
1EA26700000
trusted library section
page read and write
21D8D9CC000
trusted library allocation
page read and write
1EA382D1000
trusted library allocation
page read and write
1A350000
trusted library allocation
page read and write
7FFD9BCF0000
trusted library allocation
page read and write
7FFD9BD90000
trusted library allocation
page read and write
21DA4E10000
heap
page read and write
1EA28120000
heap
page read and write
21DA4F10000
heap
page execute and read and write
4FAAFF7000
stack
page read and write
21D9CC08000
trusted library allocation
page read and write
24A38EA0000
heap
page read and write
7FFD9BDC6000
trusted library allocation
page read and write
21D9C9F1000
trusted library allocation
page read and write
1EA27F50000
trusted library allocation
page read and write
24A3B49C000
trusted library allocation
page read and write
7FFD9BC70000
trusted library allocation
page read and write
21DA4FC6000
heap
page read and write
20A3E070000
heap
page execute and read and write
1EA38598000
trusted library allocation
page read and write
7FFD9BBD0000
trusted library allocation
page read and write
7DF413440000
trusted library allocation
page execute and read and write
7FFD9BCD0000
trusted library allocation
page read and write
21D8CA35000
trusted library allocation
page read and write
7FFD9BCC4000
trusted library allocation
page read and write
24A4AB9A000
trusted library allocation
page read and write
1AFDE000
heap
page read and write
21D9CCC9000
trusted library allocation
page read and write
7FFD9BB90000
trusted library allocation
page read and write
1EA2A0A6000
trusted library allocation
page read and write
93984FE000
stack
page read and write
7FFD9BC80000
trusted library allocation
page read and write
2A546FE000
stack
page read and write
24A3B9CF000
trusted library allocation
page read and write
53EA0F9000
stack
page read and write
1EA26725000
heap
page read and write
1EA281A0000
heap
page read and write
1EA28126000
heap
page read and write
4FAB1B8000
stack
page read and write
7FFD9BCFC000
trusted library allocation
page read and write
20A4E429000
trusted library allocation
page read and write
7FFD9BC50000
trusted library allocation
page read and write
23BD000
trusted library allocation
page read and write
24A3B8AF000
trusted library allocation
page read and write
24A5300C000
heap
page read and write
7FFD9BBC0000
trusted library allocation
page read and write
1EA28220000
heap
page execute and read and write
20A5680D000
heap
page read and write
7FFD9BD60000
trusted library allocation
page read and write
7FFD9B973000
trusted library allocation
page execute and read and write
7FFD9B9AD000
trusted library allocation
page execute and read and write
7FFD9BE00000
trusted library allocation
page read and write
20A3C590000
heap
page read and write
24A38E29000
heap
page read and write
7FFD9BCF4000
trusted library allocation
page read and write
1EA26598000
heap
page read and write
20A3F44D000
trusted library allocation
page read and write
7FFD9BD30000
trusted library allocation
page read and write
20A56819000
heap
page read and write
53E9C73000
stack
page read and write
4FAB07D000
stack
page read and write
7FFD9BB84000
trusted library allocation
page read and write
7FFD9BB74000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
21D8D993000
trusted library allocation
page read and write
21D9C9E1000
trusted library allocation
page read and write
20A5684A000
heap
page read and write
1EA282A1000
trusted library allocation
page read and write
7FFD9BC70000
trusted library allocation
page read and write
2A5598C000
stack
page read and write
7FFD9BAC0000
trusted library allocation
page execute and read and write
24A3C0CE000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
7FFD9BD0A000
trusted library allocation
page read and write
1EA2876D000
trusted library allocation
page read and write
24A52FE6000
heap
page read and write
24A52DB0000
heap
page execute and read and write
7FFD9BCD3000
trusted library allocation
page read and write
7FFD9B994000
trusted library allocation
page read and write
7FFD9BB54000
trusted library allocation
page read and write
7DF419D50000
trusted library allocation
page execute and read and write
7FFD9BCC0000
trusted library allocation
page read and write
24A3B611000
trusted library allocation
page read and write
24A4AB92000
trusted library allocation
page read and write
7FFD9BB5A000
trusted library allocation
page read and write
20A3FA91000
trusted library allocation
page read and write
24A3A860000
heap
page execute and read and write
7FFD9BD08000
trusted library allocation
page read and write
1A8DD000
stack
page read and write
53E9CFE000
stack
page read and write
24A53129000
heap
page read and write
21D8C860000
trusted library allocation
page read and write
7FFD9BB2A000
trusted library allocation
page read and write
7FFD9BB10000
trusted library allocation
page read and write
21D8D73D000
trusted library allocation
page read and write
1B8DE000
stack
page read and write
20A4E36F000
trusted library allocation
page read and write
21DA4F16000
heap
page execute and read and write
21DA4FC0000
heap
page read and write
1EA265D1000
heap
page read and write
24A4A8A1000
trusted library allocation
page read and write
20A3C62D000
heap
page read and write
7FFD9BDD0000
trusted library allocation
page read and write
7FFD9BCF4000
trusted library allocation
page read and write
7FFD9BCD0000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page execute and read and write
7FFD9BA20000
trusted library allocation
page read and write
53E9F7F000
stack
page read and write
21DA4FD3000
heap
page read and write
7FFD9BC60000
trusted library allocation
page read and write
53EB04C000
stack
page read and write
20A5661D000
heap
page read and write
1EA27F97000
heap
page read and write
7FFD9BD0C000
trusted library allocation
page read and write
1EA408CA000
heap
page read and write
8F0000
trusted library allocation
page read and write
7FFD9BD00000
trusted library allocation
page read and write
21D8C8D0000
trusted library allocation
page read and write
21D8E251000
trusted library allocation
page read and write
230E000
stack
page read and write
517000
heap
page read and write
21D8E7E9000
trusted library allocation
page read and write
20A3C5E2000
heap
page read and write
910000
heap
page read and write
20A3F267000
trusted library allocation
page read and write
7FFD9BB60000
trusted library allocation
page execute and read and write
There are 861 hidden memdumps, click here to show them.