IOC Report
12Jh49DCAj.exe

loading gif

Files

File Path
Type
Category
Malicious
12Jh49DCAj.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\obuuzbczoxdo\jjlazghkkuth.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\Temp\ovabrjmyzhdo.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eivlhemw.dcb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jrepo3wb.v1p.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tzt5kz4g.cir.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wiecjbmf.q0f.psm1
ASCII text, with no line terminators
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Windows\Temp\__PSScriptPolicyTest_0htk1wp1.uea.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_0xe1xeou.vfv.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_2a3dexgp.bsj.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_ixvurond.xkj.psm1
ASCII text, with no line terminators
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\12Jh49DCAj.exe
"C:\Users\user\Desktop\12Jh49DCAj.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe delete "ODTUTVYC"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe create "ODTUTVYC" binpath= "C:\ProgramData\obuuzbczoxdo\jjlazghkkuth.exe" start= "auto"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop eventlog
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe start "ODTUTVYC"
malicious
C:\ProgramData\obuuzbczoxdo\jjlazghkkuth.exe
C:\ProgramData\obuuzbczoxdo\jjlazghkkuth.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
malicious
C:\Windows\explorer.exe
explorer.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
There are 29 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://crl.cloudflare.com/origin_ca.crl0
unknown
http://ocsp.cloudflare.com/origin_ca
unknown
http://crl.cloudflare.com/origin_ca.crlC
unknown
http://ocsp.cloudflare.com/origin_ca0
unknown
http://crl.cloudflare.com/origin_ca.crl
unknown

Domains

Name
IP
Malicious
xmr-eu1.nanopool.org
51.15.65.182
malicious

IPs

IP
Domain
Country
Malicious
54.37.232.103
unknown
France
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
DontOfferThroughWUAU

Memdumps

Base Address
Regiontype
Protect
Malicious
100C000
heap
page read and write
malicious
F50000
heap
page read and write
malicious
F90000
heap
page read and write
malicious
F75000
heap
page read and write
malicious
20AEA0D5000
heap
page read and write
11E80000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
165CCF40000
heap
page read and write
CAF8FF000
stack
page read and write
1DD0000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
9B3887F000
stack
page read and write
1DD0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
23898BD0000
heap
page read and write
140009000
unkown
page read and write
2F730A39000
heap
page read and write
1DB0000
trusted library allocation
page read and write
20AEA0D0000
heap
page read and write
1C43C768000
heap
page read and write
11E80000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
1FE187B0000
unkown
page read and write
1D10000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
D1DD7F000
stack
page read and write
1DD0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
1A9DEFE0000
heap
page read and write
CC3EEFF000
stack
page read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
259B32A0000
heap
page read and write
7FF759BF0000
unkown
page readonly
11E80000
trusted library allocation
page read and write
1DA0000
direct allocation
page execute and read and write
F30000
heap
page read and write
1DB0000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
27ECF420000
heap
page read and write
11E80000
trusted library allocation
page read and write
259B2F99000
heap
page read and write
1D10000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DC1000
direct allocation
page execute and read and write
F87E2FF000
stack
page read and write
11E80000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
209695B0000
heap
page read and write
11E80000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
27ECF320000
heap
page read and write
23898800000
heap
page read and write
11E80000
trusted library allocation
page read and write
1C43CA30000
heap
page read and write
1992000
heap
page read and write
140001000
unkown
page execute read
11E80000
trusted library allocation
page read and write
1F58CA02000
heap
page read and write
1CD0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
7FF6C5320000
unkown
page readonly
209695D0000
unkown
page read and write
27ECF5A0000
heap
page read and write
1DD0000
trusted library allocation
page read and write
1A9E000
stack
page read and write
11E80000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
3B16A7D000
stack
page read and write
1DD0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
19DB000
heap
page read and write
21EBAFC0000
heap
page read and write
1DB0000
trusted library allocation
page read and write
1F4539E0000
heap
page read and write
1DB0000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
199A000
heap
page read and write
165CCED0000
heap
page read and write
1F4539E5000
heap
page read and write
1D10000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
18D78510000
heap
page read and write
1DB0000
trusted library allocation
page read and write
7FF6C55A4000
unkown
page readonly
21EBAF20000
heap
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
27ECF400000
heap
page read and write
6F3B0FE000
stack
page read and write
1A0E000
heap
page read and write
1F58C8C0000
heap
page read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
22A824E0000
heap
page read and write
11E80000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
7FF6C5320000
unkown
page readonly
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
7FF759BF9000
unkown
page readonly
22A82560000
heap
page read and write
189E000
stack
page read and write
1F58CA00000
heap
page read and write
14000A000
unkown
page readonly
DA3A96D000
stack
page read and write
1DB0000
trusted library allocation
page read and write
1F58D202000
trusted library allocation
page read and write
1CD0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
2AE497F5000
heap
page read and write
1D90000
direct allocation
page execute and read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1960000
heap
page read and write
1DD0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
19E5000
heap
page read and write
11E80000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
7FF759BFB000
unkown
page read and write
D1D91D000
stack
page read and write
1DB0000
trusted library allocation
page read and write
FA2000
heap
page read and write
1DD0000
trusted library allocation
page read and write
2AE495A8000
heap
page read and write
7FF6C5329000
unkown
page readonly
7FF759BFB000
unkown
page write copy
1DB0000
trusted library allocation
page read and write
20AE9E00000
heap
page read and write
1DB0000
trusted library allocation
page read and write
1CD0000
direct allocation
page execute and read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
6F3B1FF000
stack
page read and write
1DD0000
trusted library allocation
page read and write
21EBAEF0000
heap
page read and write
1A9DF029000
heap
page read and write
1DB0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
20969810000
heap
page read and write
1DD0000
trusted library allocation
page read and write
2AE49580000
heap
page read and write
1DB0000
trusted library allocation
page read and write
1A9DEFF0000
heap
page read and write
1D10000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
23288FF000
stack
page read and write
1DB0000
trusted library allocation
page read and write
7FF6C532C000
unkown
page write copy
1DD0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1285000
heap
page read and write
1D10000
trusted library allocation
page read and write
3B16AFF000
stack
page read and write
1D10000
trusted library allocation
page read and write
19DD000
heap
page read and write
1DB1000
direct allocation
page execute and read and write
27ECF5A5000
heap
page read and write
1DD0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
1DA0000
direct allocation
page execute and read and write
1F58CA13000
heap
page read and write
127E000
stack
page read and write
2D4A3CF000
stack
page read and write
1DD0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
23898830000
heap
page read and write
140007000
unkown
page readonly
1DD0000
trusted library allocation
page read and write
1982000
heap
page read and write
183F8B90000
heap
page read and write
E4D8FE000
unkown
page readonly
259B31A0000
heap
page read and write
11E80000
trusted library allocation
page read and write
92F9C7F000
stack
page read and write
7FF6C532B000
unkown
page read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1F4535B0000
heap
page read and write
1DB0000
trusted library allocation
page read and write
145B62C0000
heap
page read and write
259B3180000
heap
page read and write
1F58CA3F000
heap
page read and write
2F730950000
heap
page read and write
7FF759BF1000
unkown
page execute read
1DD0000
trusted library allocation
page read and write
19E3000
heap
page read and write
1C43CA35000
heap
page read and write
165CCEB0000
heap
page read and write
11E80000
trusted library allocation
page read and write
419F8FF000
stack
page read and write
1DB0000
trusted library allocation
page read and write
209695D0000
unkown
page read and write
20969820000
unkown
page read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
CC3EE7D000
stack
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
1A9DF300000
heap
page read and write
1DB0000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
2800000
direct allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
2D4A34D000
stack
page read and write
238988D0000
heap
page read and write
42ABF7F000
stack
page read and write
1D10000
trusted library allocation
page read and write
22A82510000
heap
page read and write
1DB0000
trusted library allocation
page read and write
1E00000
direct allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
7FF759BF1000
unkown
page execute read
1DB0000
trusted library allocation
page read and write
3C00000
direct allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
18D78310000
heap
page read and write
165CCDD0000
heap
page read and write
1C43C760000
heap
page read and write
1DD0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
179B000
stack
page read and write
11E80000
trusted library allocation
page read and write
41355FF000
stack
page read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
1FE18340000
heap
page read and write
1DB0000
trusted library allocation
page read and write
1C9F000
stack
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
E4DFFD000
stack
page read and write
1DD0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
3B16B7F000
stack
page read and write
11E80000
trusted library allocation
page read and write
2AE49560000
heap
page read and write
2AE49480000
heap
page read and write
1DD0000
trusted library allocation
page read and write
145B5FC0000
heap
page read and write
1280000
heap
page read and write
19DF000
heap
page read and write
22A828C5000
heap
page read and write
1A9DF305000
heap
page read and write
259B32A5000
heap
page read and write
1DB0000
trusted library allocation
page read and write
21EBAF10000
heap
page read and write
1F453590000
heap
page read and write
1DD0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
18D78328000
heap
page read and write
11E80000
trusted library allocation
page read and write
183F8F20000
heap
page read and write
11E80000
trusted library allocation
page read and write
21EBAF40000
heap
page read and write
1DB0000
trusted library allocation
page read and write
1C43C6A0000
heap
page read and write
5A00000
direct allocation
page read and write
1F58CB02000
heap
page read and write
FC5000
heap
page read and write
19FF000
heap
page read and write
6400000
direct allocation
page read and write
1DB0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
B9B000
stack
page read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
7FF6C532B000
unkown
page write copy
2F730D30000
heap
page read and write
11E80000
trusted library allocation
page read and write
165CCCC8000
heap
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
197A000
heap
page read and write
1DB0000
trusted library allocation
page read and write
92F995D000
stack
page read and write
1DB0000
trusted library allocation
page read and write
92F99DF000
stack
page read and write
112E000
stack
page read and write
11E80000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
259B2F90000
heap
page read and write
EE0000
direct allocation
page execute read
209694D0000
heap
page read and write
1DB0000
trusted library allocation
page read and write
22A824F0000
heap
page read and write
1A9DF1F0000
heap
page read and write
1D10000
trusted library allocation
page read and write
145B5FB0000
heap
page read and write
171E000
stack
page read and write
1DB0000
trusted library allocation
page read and write
2D4A67F000
stack
page read and write
23898810000
heap
page read and write
11E80000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
7FF759E74000
unkown
page readonly
D1DC7E000
stack
page read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
FA0000
heap
page read and write
1DB0000
trusted library allocation
page read and write
1FE187A5000
heap
page read and write
F87E27F000
stack
page read and write
20969815000
heap
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
238988D8000
heap
page read and write
1C43C680000
heap
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
19E1000
heap
page read and write
419F87F000
stack
page read and write
1DB0000
trusted library allocation
page read and write
E4D7FD000
stack
page read and write
183F8F25000
heap
page read and write
1D10000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
27ECF460000
heap
page read and write
1F58C9A0000
heap
page read and write
1DD0000
trusted library allocation
page read and write
183F8C59000
heap
page read and write
11E80000
trusted library allocation
page read and write
20AE9D20000
heap
page read and write
1DB0000
trusted library allocation
page read and write
3200000
direct allocation
page read and write
11E80000
trusted library allocation
page read and write
191F000
stack
page read and write
7FF6C55A2000
unkown
page read and write
1B9E000
stack
page read and write
7FF6C5321000
unkown
page execute read
11E80000
trusted library allocation
page read and write
2F730B30000
heap
page read and write
1D10000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
1FE18350000
heap
page read and write
11E80000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
7FF759BF0000
unkown
page readonly
1DB0000
trusted library allocation
page read and write
1920000
heap
page read and write
877AC7F000
stack
page read and write
11E80000
trusted library allocation
page read and write
20AE9E20000
heap
page read and write
BB0000
heap
page read and write
22A82568000
heap
page read and write
11E80000
trusted library allocation
page read and write
1CD0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1FE187A0000
heap
page read and write
1DB0000
trusted library allocation
page read and write
9F8F27D000
stack
page read and write
41354FD000
stack
page read and write
1DB0000
trusted library allocation
page read and write
CAF5CC000
stack
page read and write
2F730A30000
heap
page read and write
1DB0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
198A000
heap
page read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
165CCF45000
heap
page read and write
1D10000
trusted library allocation
page read and write
145B5FF0000
heap
page read and write
11E80000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
1D8F000
stack
page read and write
11E80000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
18D785A5000
heap
page read and write
1DD0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
F10000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
183F8BA0000
heap
page read and write
1DD0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1A9DF020000
heap
page read and write
21EBAF15000
heap
page read and write
11E80000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
4600000
direct allocation
page read and write
7FF6C55A4000
unkown
page readonly
7FF759E74000
unkown
page readonly
1DB0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
20AE9EF0000
heap
page read and write
1F58C9D0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
2F730B50000
heap
page read and write
1DB0000
trusted library allocation
page read and write
20AE9EF7000
heap
page read and write
419F59C000
stack
page read and write
1F58CA45000
heap
page read and write
1DD0000
trusted library allocation
page read and write
232887D000
stack
page read and write
1D10000
trusted library allocation
page read and write
145B5FF8000
heap
page read and write
1DB0000
trusted library allocation
page read and write
42ABE7E000
stack
page read and write
1DD0000
trusted library allocation
page read and write
145B61C0000
heap
page read and write
1F453644000
heap
page read and write
1DB0000
trusted library allocation
page read and write
877A93C000
stack
page read and write
1DB0000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
7FF6C5321000
unkown
page execute read
1DB0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
1FE18400000
heap
page read and write
2AE495A0000
heap
page read and write
1DD0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1F453630000
heap
page read and write
5000000
direct allocation
page read and write
27ECF468000
heap
page read and write
9B385BF000
stack
page read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
3BBC17C000
stack
page read and write
E4E0FE000
unkown
page readonly
7FF6C5329000
unkown
page readonly
11E00000
direct allocation
page read and write
11E80000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
1CD0000
trusted library allocation
page read and write
18D784F0000
heap
page read and write
1D10000
trusted library allocation
page read and write
F87DFDD000
stack
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
1F58C8A0000
heap
page read and write
1C43C5A0000
heap
page read and write
1D10000
trusted library allocation
page read and write
1D90000
direct allocation
page execute and read and write
183F8F30000
unkown
page read and write
11E80000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
1F453639000
heap
page read and write
19D9000
heap
page read and write
CAF87E000
stack
page read and write
41354EE000
stack
page read and write
1DB0000
trusted library allocation
page read and write
DA3AC7F000
stack
page read and write
1CD0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
BC0000
heap
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
183F8C50000
heap
page read and write
259B30A0000
heap
page read and write
11E80000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
232897F000
stack
page read and write
11E80000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
1F58CA2B000
heap
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
42ABB5D000
stack
page read and write
1DB0000
trusted library allocation
page read and write
2F730D35000
heap
page read and write
F39000
heap
page read and write
21EBAFC8000
heap
page read and write
165CE8A0000
heap
page read and write
1D10000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
23898BD5000
heap
page read and write
19F7000
heap
page read and write
11E80000
trusted library allocation
page read and write
7FF759BF9000
unkown
page readonly
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
181F000
stack
page read and write
1DB0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
140000000
unkown
page read and write
11E80000
trusted library allocation
page read and write
1D10000
trusted library allocation
page read and write
22A828C0000
heap
page read and write
1DD0000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
9B3853D000
stack
page read and write
1DB0000
trusted library allocation
page read and write
F10000
heap
page readonly
11E80000
trusted library allocation
page read and write
1DB0000
trusted library allocation
page read and write
FC9000
heap
page read and write
20969630000
heap
page read and write
6F3B0ED000
stack
page read and write
1DB0000
trusted library allocation
page read and write
1DD0000
trusted library allocation
page read and write
11E80000
trusted library allocation
page read and write
2AE497F0000
heap
page read and write
165CCCC0000
heap
page read and write
E4D47B000
stack
page read and write
BE0000
heap
page read and write
CC3EF7F000
stack
page read and write
18D78320000
heap
page read and write
18D785A0000
heap
page read and write
145B62C5000
heap
page read and write
11E80000
trusted library allocation
page read and write
1F453580000
heap
page read and write
1DB0000
trusted library allocation
page read and write
There are 610 hidden memdumps, click here to show them.