IOC Report
iwtYgAXvKB.exe

loading gif

Files

File Path
Type
Category
Malicious
iwtYgAXvKB.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Program Files (x86)\Common Files\Services\LhMoEdVbIY.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\MhsFZJQzCIAWwGKKZKgtHJpnVmmJDKNszUpodVapiywc\conhost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\LhMoEdVbIY.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Microsoft\EdgeCore\LhMoEdVbIY.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files\Windows Mail\LhMoEdVbIY.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\smss.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Recovery\winlogon.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\6qUMg8BuEM.bat
DOS batch file, ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\LOU1YTO9ROLERK7.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\UYOTATHKKW9YY9G.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\LhMoEdVbIY.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\Links\sppsvc.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\Speech_OneCore\Engines\SR\en-GB-N\LhMoEdVbIY.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\containerprovider\WD8Tyzwe3aBcLS.vbe
data
dropped
malicious
C:\containerprovider\bridgeComponentreview.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Program Files (x86)\Common Files\Services\8995e9fee2d9e2
ASCII text, with very long lines (349), with no line terminators
dropped
C:\Program Files (x86)\MhsFZJQzCIAWwGKKZKgtHJpnVmmJDKNszUpodVapiywc\088424020bedd6
ASCII text, with very long lines (920), with no line terminators
dropped
C:\Program Files (x86)\Microsoft.NET\Primary Interop Assemblies\8995e9fee2d9e2
ASCII text, with no line terminators
dropped
C:\Program Files (x86)\Microsoft\EdgeCore\8995e9fee2d9e2
ASCII text, with very long lines (476), with no line terminators
dropped
C:\Program Files\Windows Mail\8995e9fee2d9e2
ASCII text, with very long lines (762), with no line terminators
dropped
C:\Recovery\69ddcba757bf72
ASCII text, with very long lines (856), with no line terminators
dropped
C:\Recovery\cc11b995f2a76d
ASCII text, with very long lines (519), with no line terminators
dropped
C:\Users\user\8995e9fee2d9e2
ASCII text, with very long lines (710), with no line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\bridgeComponentreview.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\WtSaPxMAJl
ASCII text, with no line terminators
dropped
C:\Users\user\Links\0a1fd5f707cd16
ASCII text, with very long lines (469), with no line terminators
dropped
C:\Windows\Speech_OneCore\Engines\SR\en-GB-N\8995e9fee2d9e2
ASCII text, with very long lines (532), with no line terminators
dropped
C:\containerprovider\HWCHX7UinH.bat
ASCII text, with no line terminators
dropped
There are 19 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\iwtYgAXvKB.exe
"C:\Users\user\Desktop\iwtYgAXvKB.exe"
malicious
C:\Windows\SysWOW64\wscript.exe
"C:\Windows\System32\WScript.exe" "C:\containerprovider\WD8Tyzwe3aBcLS.vbe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\containerprovider\bridgeComponentreview.exe
"C:\containerprovider\bridgeComponentreview.exe"
malicious
C:\Program Files (x86)\Microsoft\EdgeCore\LhMoEdVbIY.exe
"C:\Program Files (x86)\microsoft\EdgeCore\LhMoEdVbIY.exe"
malicious
C:\Program Files (x86)\Microsoft\EdgeCore\LhMoEdVbIY.exe
"C:\Program Files (x86)\microsoft\EdgeCore\LhMoEdVbIY.exe"
malicious
C:\Windows\SysWOW64\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\containerprovider\HWCHX7UinH.bat" "

URLs

Name
IP
Malicious
http://951499cm.nyashtech.top/PollGeoDbwordpressTemporary/722944f89091ce5d9b1c5fbdfd00568555f67a8aa3
unknown
malicious
http://951499cm.nyashtech.top/PollGeoDbwordpressTemporary/722944f89091ce5d9b1c5fbdfd00568555f67a8aa399d5400d05a2a7b07fcbcd263346663ea3568b
80.211.144.156
malicious
http://951499cm.nyashtech.top/sqlcentralUploads.php
80.211.144.156
malicious
http://951499cm.nyashtech.top
unknown
malicious
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown

Domains

Name
IP
Malicious
951499cm.nyashtech.top
80.211.144.156
malicious

IPs

IP
Domain
Country
Malicious
80.211.144.156
951499cm.nyashtech.top
Italy
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
EnableLUA
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
PromptOnSecureDesktop
malicious
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
LangID
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\WScript.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\bridgeComponentreview_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0
CheckSetting
HKEY_CURRENT_USER\SOFTWARE\5339817287ab33b8ae7096b4a58afd52d3dbb863
654adb41c0ea67eeac07a6845e5165cf3ae8c54c
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.FriendlyAppName
HKEY_CURRENT_USER_Classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache
C:\Windows\System32\cmd.exe.ApplicationCompany
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\LhMoEdVbIY_RASMANCS
FileDirectory
There are 27 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1297B000
trusted library allocation
page read and write
malicious
2CEF000
trusted library allocation
page read and write
malicious
2401000
trusted library allocation
page read and write
malicious
12481000
trusted library allocation
page read and write
malicious
294E000
trusted library allocation
page read and write
malicious
2481000
trusted library allocation
page read and write
malicious
2C31000
trusted library allocation
page read and write
malicious
2FE3000
stack
page read and write
1BF25000
heap
page read and write
5550000
heap
page read and write
A14000
heap
page read and write
12CFB000
trusted library allocation
page read and write
340E000
stack
page read and write
A10000
heap
page read and write
2FFA000
stack
page read and write
7FF848D43000
trusted library allocation
page read and write
1BD8E000
stack
page read and write
23F0000
heap
page execute and read and write
541A000
trusted library allocation
page read and write
9B0000
heap
page read and write
E3C000
heap
page read and write
3260000
heap
page read and write
2DD3000
heap
page read and write
1BD96000
heap
page read and write
1B44E000
stack
page read and write
860000
trusted library allocation
page read and write
1AFFE000
stack
page read and write
7A1000
unkown
page execute read
1ACBF000
stack
page read and write
124CB000
trusted library allocation
page read and write
12DFD000
trusted library allocation
page read and write
130FE000
trusted library allocation
page read and write
2DED000
heap
page read and write
1C160000
heap
page read and write
12EA3000
trusted library allocation
page read and write
125C7000
trusted library allocation
page read and write
7FF848F13000
trusted library allocation
page read and write
7E4B000
stack
page read and write
7FF848F1C000
trusted library allocation
page read and write
530D000
stack
page read and write
1B71E000
stack
page read and write
580000
heap
page read and write
1BDD1000
heap
page read and write
2CCC000
trusted library allocation
page read and write
1BE01000
heap
page read and write
12614000
trusted library allocation
page read and write
321E000
stack
page read and write
1C35F000
stack
page read and write
2DE7000
heap
page read and write
7A8E000
stack
page read and write
2FC6000
stack
page read and write
7FF848D62000
trusted library allocation
page read and write
2FD0000
stack
page read and write
353A000
heap
page read and write
3583000
heap
page read and write
130BE000
trusted library allocation
page read and write
7FF848E16000
trusted library allocation
page read and write
3385000
heap
page read and write
5430000
heap
page read and write
358C000
heap
page read and write
12E94000
trusted library allocation
page read and write
77BA000
heap
page read and write
7FF848F50000
trusted library allocation
page execute and read and write
130DC000
trusted library allocation
page read and write
34F8000
heap
page read and write
12CF3000
trusted library allocation
page read and write
2CFB000
stack
page read and write
3501000
heap
page read and write
1BDEA000
heap
page read and write
DD6000
heap
page read and write
51CF000
stack
page read and write
FA5000
heap
page read and write
1B57B000
heap
page read and write
24DB000
trusted library allocation
page read and write
7FF848F72000
trusted library allocation
page read and write
28AC000
trusted library allocation
page read and write
12D4E000
trusted library allocation
page read and write
77B5000
heap
page read and write
125C2000
trusted library allocation
page read and write
12D85000
trusted library allocation
page read and write
31C0000
heap
page read and write
1BC5D000
stack
page read and write
5401000
trusted library allocation
page read and write
3504000
heap
page read and write
125A7000
trusted library allocation
page read and write
244A000
trusted library allocation
page read and write
2AF0000
heap
page read and write
3340000
heap
page readonly
628000
heap
page read and write
3582000
heap
page read and write
ED0000
trusted library allocation
page read and write
132D5000
trusted library allocation
page read and write
88E000
stack
page read and write
1263F000
trusted library allocation
page read and write
132D9000
trusted library allocation
page read and write
3549000
heap
page read and write
7FF848E20000
trusted library allocation
page execute and read and write
7FF848F60000
trusted library allocation
page execute and read and write
2DC8000
heap
page read and write
1BF6E000
heap
page read and write
7FF848F40000
trusted library allocation
page read and write
1266F000
trusted library allocation
page read and write
2527000
trusted library allocation
page read and write
7FF848E26000
trusted library allocation
page read and write
7FF848FA0000
trusted library allocation
page read and write
3532000
heap
page read and write
12A0C000
trusted library allocation
page read and write
128CC000
trusted library allocation
page read and write
2980000
heap
page read and write
2DD3000
heap
page read and write
2832000
trusted library allocation
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
2CB4000
trusted library allocation
page read and write
2540000
trusted library allocation
page read and write
12A2F000
trusted library allocation
page read and write
291B000
stack
page read and write
12D7A000
trusted library allocation
page read and write
3980000
heap
page read and write
2D3E000
stack
page read and write
1BEB3000
heap
page read and write
1268B000
trusted library allocation
page read and write
328A000
heap
page read and write
2DDE000
heap
page read and write
1BC5E000
stack
page read and write
125CB000
trusted library allocation
page read and write
1BC8E000
stack
page read and write
7E4000
unkown
page read and write
12681000
trusted library allocation
page read and write
132DE000
trusted library allocation
page read and write
3558000
heap
page read and write
7FF848F23000
trusted library allocation
page read and write
2830000
trusted library allocation
page read and write
12643000
trusted library allocation
page read and write
7FF848F5C000
trusted library allocation
page read and write
1AEE0000
heap
page execute and read and write
12AAA000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
3515000
heap
page read and write
352C000
heap
page read and write
7FF848D33000
trusted library allocation
page execute and read and write
1B58B000
heap
page read and write
7FF848ED3000
trusted library allocation
page read and write
13242000
trusted library allocation
page read and write
7FF848F20000
trusted library allocation
page read and write
7FF848D9B000
trusted library allocation
page execute and read and write
9BE000
stack
page read and write
7FF848D70000
trusted library allocation
page read and write
12648000
trusted library allocation
page read and write
2485000
trusted library allocation
page read and write
5454000
heap
page read and write
2DFD000
heap
page read and write
13247000
trusted library allocation
page read and write
7FF848E20000
trusted library allocation
page read and write
2E09000
heap
page read and write
6AF000
heap
page read and write
2E11000
heap
page read and write
544E000
stack
page read and write
2E26000
heap
page read and write
3549000
heap
page read and write
2E11000
heap
page read and write
672000
heap
page read and write
7D3000
unkown
page readonly
5DB000
heap
page read and write
DDC000
heap
page read and write
24BC000
trusted library allocation
page read and write
3280000
heap
page read and write
34FB000
heap
page read and write
12AA4000
trusted library allocation
page read and write
26AC000
trusted library allocation
page read and write
640000
heap
page read and write
7FF848EFC000
trusted library allocation
page read and write
12A47000
trusted library allocation
page read and write
1AEF0000
heap
page read and write
2290000
trusted library section
page read and write
352D000
heap
page read and write
24B0000
trusted library allocation
page read and write
13251000
trusted library allocation
page read and write
12E9E000
trusted library allocation
page read and write
70B000
heap
page read and write
1BE5D000
stack
page read and write
7FF848F10000
trusted library allocation
page read and write
2E26000
heap
page read and write
7FF848D8D000
trusted library allocation
page execute and read and write
2DD2000
heap
page read and write
1BDBA000
heap
page read and write
12E4A000
trusted library allocation
page read and write
3582000
heap
page read and write
2EF6000
stack
page read and write
36BE000
stack
page read and write
7FF848DF0000
trusted library allocation
page execute and read and write
12D4A000
trusted library allocation
page read and write
2DC2000
heap
page read and write
12D71000
trusted library allocation
page read and write
12665000
trusted library allocation
page read and write
2456000
trusted library allocation
page read and write
53DE000
stack
page read and write
1BE28000
heap
page read and write
7D3000
unkown
page readonly
2D88000
heap
page read and write
1BB5E000
stack
page read and write
890000
heap
page read and write
1BE9E000
heap
page read and write
2DC4000
heap
page read and write
685000
heap
page read and write
3565000
heap
page read and write
7FF848F80000
trusted library allocation
page execute and read and write
130FB000
trusted library allocation
page read and write
2DC3000
heap
page read and write
7FF848D3D000
trusted library allocation
page execute and read and write
7FF848F50000
trusted library allocation
page read and write
7FF848D60000
trusted library allocation
page read and write
2DDF000
heap
page read and write
12E8A000
trusted library allocation
page read and write
2487000
trusted library allocation
page read and write
7FF848EF0000
trusted library allocation
page read and write
125D0000
trusted library allocation
page read and write
3583000
heap
page read and write
1BF67000
heap
page read and write
7FF848F0C000
trusted library allocation
page read and write
1B95E000
stack
page read and write
8B0000
heap
page read and write
13260000
trusted library allocation
page read and write
1AE44000
stack
page read and write
6FB3000
heap
page read and write
344E000
stack
page read and write
2859000
trusted library allocation
page read and write
1B2F5000
stack
page read and write
840000
trusted library allocation
page read and write
7FF848F58000
trusted library allocation
page read and write
34F1000
heap
page read and write
156000
unkown
page readonly
10AF000
stack
page read and write
1253F000
trusted library allocation
page read and write
1BF55000
stack
page read and write
2DA0000
heap
page read and write
1254E000
trusted library allocation
page read and write
7FF848F1B000
trusted library allocation
page read and write
7FF848F00000
trusted library allocation
page read and write
802000
unkown
page write copy
25C6000
trusted library allocation
page read and write
5660000
heap
page read and write
12D7F000
trusted library allocation
page read and write
7FF848D63000
trusted library allocation
page execute and read and write
2CDB000
trusted library allocation
page read and write
1B9A1000
heap
page read and write
3380000
heap
page read and write
3544000
heap
page read and write
5A3C000
stack
page read and write
6FBB000
heap
page read and write
970000
heap
page read and write
1BEE4000
heap
page read and write
2DCD000
heap
page read and write
24A7000
trusted library allocation
page read and write
12D98000
trusted library allocation
page read and write
12563000
trusted library allocation
page read and write
3583000
heap
page read and write
2ACE000
stack
page read and write
1220000
heap
page read and write
7FF848F1A000
trusted library allocation
page read and write
124C8000
trusted library allocation
page read and write
34FA000
heap
page read and write
12521000
trusted library allocation
page read and write
DD0000
heap
page read and write
1C05E000
stack
page read and write
554F000
stack
page read and write
1325A000
trusted library allocation
page read and write
27F6000
trusted library allocation
page read and write
2CD9000
trusted library allocation
page read and write
7FF848D30000
trusted library allocation
page read and write
12547000
trusted library allocation
page read and write
358C000
heap
page read and write
5C9000
heap
page read and write
1291B000
trusted library allocation
page read and write
2E26000
heap
page read and write
1BE0D000
heap
page read and write
58FF000
stack
page read and write
1B990000
heap
page read and write
130E7000
trusted library allocation
page read and write
6B1000
heap
page read and write
7FF848D74000
trusted library allocation
page read and write
2DCE000
heap
page read and write
7FF848EF4000
trusted library allocation
page read and write
29D0000
heap
page read and write
1B64E000
stack
page read and write
13265000
trusted library allocation
page read and write
2DCC000
heap
page read and write
27B8000
trusted library allocation
page read and write
32000
unkown
page readonly
7FF848D50000
trusted library allocation
page read and write
7FF848EDC000
trusted library allocation
page read and write
2FCC000
stack
page read and write
5550000
heap
page read and write
2D80000
heap
page read and write
2C83000
trusted library allocation
page read and write
2DEE000
heap
page read and write
12A15000
trusted library allocation
page read and write
1C17A000
heap
page read and write
132BE000
trusted library allocation
page read and write
12A28000
trusted library allocation
page read and write
7FF848E1C000
trusted library allocation
page execute and read and write
1BDF9000
heap
page read and write
4B90000
heap
page read and write
33CE000
stack
page read and write
540E000
stack
page read and write
990000
heap
page read and write
2DC5000
heap
page read and write
12C96000
trusted library allocation
page read and write
1BD5E000
stack
page read and write
7FF848F40000
trusted library allocation
page execute and read and write
7FF848F20000
trusted library allocation
page read and write
3350000
heap
page read and write
7FF848D80000
trusted library allocation
page read and write
5E5000
heap
page read and write
12D2F000
trusted library allocation
page read and write
7FF848FB0000
trusted library allocation
page execute and read and write
1C197000
heap
page read and write
2DFD000
heap
page read and write
3544000
heap
page read and write
1BE3E000
heap
page read and write
1BEF8000
heap
page read and write
7FF848D34000
trusted library allocation
page read and write
7FF848D94000
trusted library allocation
page read and write
12D54000
trusted library allocation
page read and write
2DD0000
heap
page read and write
12D48000
trusted library allocation
page read and write
1B54E000
stack
page read and write
25E8000
trusted library allocation
page read and write
7FF848D5B000
trusted library allocation
page execute and read and write
12E99000
trusted library allocation
page read and write
12660000
trusted library allocation
page read and write
1B91F000
stack
page read and write
1B3F5000
stack
page read and write
9AC000
heap
page read and write
2E09000
heap
page read and write
1A430000
trusted library allocation
page read and write
E12000
heap
page read and write
3524000
heap
page read and write
7FF848D32000
trusted library allocation
page read and write
1BECF000
heap
page read and write
12617000
trusted library allocation
page read and write
7FF848E90000
trusted library allocation
page execute and read and write
2DBE000
heap
page read and write
1BD78000
heap
page read and write
12CF8000
trusted library allocation
page read and write
2DE1000
heap
page read and write
7FF848D90000
trusted library allocation
page read and write
659000
heap
page read and write
34F7000
heap
page read and write
7FF848F60000
trusted library allocation
page read and write
1BD91000
heap
page read and write
1A4B0000
trusted library allocation
page read and write
1BB8D000
stack
page read and write
FA0000
heap
page read and write
3555000
heap
page read and write
1B5AF000
heap
page read and write
E66000
heap
page read and write
352D000
heap
page read and write
1261B000
trusted library allocation
page read and write
1BF2F000
heap
page read and write
7DE000
unkown
page read and write
7FF848F1E000
trusted library allocation
page read and write
8E0000
trusted library allocation
page read and write
7FF848F26000
trusted library allocation
page read and write
24D9000
trusted library allocation
page read and write
7FF848DCC000
trusted library allocation
page execute and read and write
128C7000
trusted library allocation
page read and write
12403000
trusted library allocation
page read and write
12DF3000
trusted library allocation
page read and write
152000
unkown
page readonly
2FD7000
stack
page read and write
A1D000
heap
page read and write
3536000
heap
page read and write
57FE000
stack
page read and write
1A87D000
stack
page read and write
12D2D000
trusted library allocation
page read and write
12DB2000
trusted library allocation
page read and write
1BA1B000
stack
page read and write
12D8D000
trusted library allocation
page read and write
350F000
heap
page read and write
12A34000
trusted library allocation
page read and write
34B0000
heap
page read and write
1B98E000
stack
page read and write
1BDFB000
heap
page read and write
1B345000
stack
page read and write
7FF848F30000
trusted library allocation
page read and write
3525000
heap
page read and write
12D5C000
trusted library allocation
page read and write
2E09000
heap
page read and write
1BE9B000
heap
page read and write
12D9D000
trusted library allocation
page read and write
900000
trusted library allocation
page read and write
1BE95000
heap
page read and write
2CD0000
trusted library allocation
page read and write
2DBD000
heap
page read and write
5FB000
heap
page read and write
960000
heap
page execute and read and write
12C59000
trusted library allocation
page read and write
880000
trusted library allocation
page read and write
7FF848D8D000
trusted library allocation
page execute and read and write
12567000
trusted library allocation
page read and write
12AB8000
trusted library allocation
page read and write
1BE80000
heap
page read and write
358C000
heap
page read and write
1B5C2000
heap
page read and write
1324C000
trusted library allocation
page read and write
7FF848E16000
trusted library allocation
page execute and read and write
34FA000
heap
page read and write
7FF848DBC000
trusted library allocation
page execute and read and write
12466000
trusted library allocation
page read and write
1BFC6000
heap
page read and write
2E09000
heap
page read and write
7FF848EE0000
trusted library allocation
page read and write
1BD86000
heap
page read and write
3581000
heap
page read and write
1B490000
heap
page read and write
7D0E000
stack
page read and write
2483000
trusted library allocation
page read and write
12C33000
trusted library allocation
page read and write
352B000
heap
page read and write
352B000
heap
page read and write
3501000
heap
page read and write
34E6000
heap
page read and write
1261C000
trusted library allocation
page read and write
2911000
trusted library allocation
page read and write
1BE46000
heap
page read and write
2DD1000
heap
page read and write
12D3B000
trusted library allocation
page read and write
3528000
heap
page read and write
34ED000
heap
page read and write
1BFAE000
heap
page read and write
1B14E000
stack
page read and write
7FF848F26000
trusted library allocation
page read and write
2DE7000
heap
page read and write
224E000
stack
page read and write
7FF848D4C000
trusted library allocation
page read and write
12A58000
trusted library allocation
page read and write
2DD0000
heap
page read and write
34FA000
heap
page read and write
7FF848D72000
trusted library allocation
page read and write
12558000
trusted library allocation
page read and write
7FF848F35000
trusted library allocation
page read and write
1BD5D000
stack
page read and write
E3A000
heap
page read and write
1B0FE000
stack
page read and write
124C3000
trusted library allocation
page read and write
5520000
heap
page read and write
1225000
heap
page read and write
6FB0000
trusted library allocation
page read and write
7FF848DE6000
trusted library allocation
page read and write
1C18B000
heap
page read and write
12DBB000
trusted library allocation
page read and write
3565000
heap
page read and write
12970000
trusted library allocation
page read and write
1B58F000
heap
page read and write
1BD60000
heap
page read and write
1B9C8000
heap
page read and write
585000
heap
page read and write
3517000
heap
page read and write
12585000
trusted library allocation
page read and write
12549000
trusted library allocation
page read and write
24AA000
trusted library allocation
page read and write
7FF848D8C000
trusted library allocation
page execute and read and write
1AA0C000
stack
page read and write
1BF8B000
stack
page read and write
34F0000
heap
page read and write
1AE60000
heap
page read and write
5C0000
heap
page read and write
2DA8000
heap
page read and write
1318D000
trusted library allocation
page read and write
1BE31000
heap
page read and write
1252F000
trusted library allocation
page read and write
12E8E000
trusted library allocation
page read and write
34F5000
heap
page read and write
1265C000
trusted library allocation
page read and write
1BD6D000
heap
page read and write
7A1000
unkown
page execute read
5FD000
heap
page read and write
12401000
trusted library allocation
page read and write
24D2000
trusted library allocation
page read and write
31BE000
stack
page read and write
5F0000
heap
page read and write
2280000
heap
page read and write
12EBB000
trusted library allocation
page read and write
12D31000
trusted library allocation
page read and write
1B562000
heap
page read and write
2E11000
heap
page read and write
132E7000
trusted library allocation
page read and write
30000
unkown
page readonly
7FF848D9D000
trusted library allocation
page execute and read and write
2FBC000
stack
page read and write
12DD6000
trusted library allocation
page read and write
3509000
heap
page read and write
2D08000
trusted library allocation
page read and write
1BE4E000
heap
page read and write
7FF848D84000
trusted library allocation
page read and write
30000
unkown
page readonly
5850000
trusted library allocation
page read and write
E3F000
heap
page read and write
7CCF000
stack
page read and write
2FE9000
stack
page read and write
7FF848ED0000
trusted library allocation
page read and write
2DD1000
heap
page read and write
7FF848E46000
trusted library allocation
page execute and read and write
12D94000
trusted library allocation
page read and write
2545000
trusted library allocation
page read and write
2DCE000
heap
page read and write
7FF848D7D000
trusted library allocation
page execute and read and write
1256C000
trusted library allocation
page read and write
5D0000
heap
page read and write
358C000
heap
page read and write
536000
stack
page read and write
37BE000
stack
page read and write
24B9000
trusted library allocation
page read and write
12429000
trusted library allocation
page read and write
2270000
heap
page execute and read and write
7FF848F30000
trusted library allocation
page read and write
7FF848E30000
trusted library allocation
page execute and read and write
7FF848D73000
trusted library allocation
page read and write
7FF848D8B000
trusted library allocation
page execute and read and write
12544000
trusted library allocation
page read and write
1B0AC000
stack
page read and write
1B594000
stack
page read and write
83F000
stack
page read and write
12E77000
trusted library allocation
page read and write
326E000
stack
page read and write
12DEF000
trusted library allocation
page read and write
7FF848D6D000
trusted library allocation
page execute and read and write
13256000
trusted library allocation
page read and write
12A9F000
trusted library allocation
page read and write
1BFE2000
heap
page read and write
7FF848F31000
trusted library allocation
page read and write
125E2000
trusted library allocation
page read and write
2E11000
heap
page read and write
2DFD000
heap
page read and write
12580000
trusted library allocation
page read and write
7FF848D64000
trusted library allocation
page read and write
12C31000
trusted library allocation
page read and write
12DF8000
trusted library allocation
page read and write
7A0000
unkown
page readonly
1E0000
heap
page read and write
3502000
heap
page read and write
7FF4064D0000
trusted library allocation
page execute and read and write
1255F000
trusted library allocation
page read and write
2370000
heap
page read and write
12D66000
trusted library allocation
page read and write
12A1F000
trusted library allocation
page read and write
1BFD6000
heap
page read and write
11AF000
stack
page read and write
2DA1000
heap
page read and write
132E2000
trusted library allocation
page read and write
77BD000
heap
page read and write
8B0000
heap
page read and write
2E26000
heap
page read and write
2DA8000
heap
page read and write
7FF848D73000
trusted library allocation
page execute and read and write
7FF848EDA000
trusted library allocation
page read and write
7FF848F10000
trusted library allocation
page read and write
7B8E000
stack
page read and write
2EE0000
heap
page read and write
3553000
heap
page read and write
1B88E000
stack
page read and write
3515000
heap
page read and write
7FF848D54000
trusted library allocation
page read and write
1BF60000
heap
page read and write
7BCE000
stack
page read and write
12DAC000
trusted library allocation
page read and write
12A11000
trusted library allocation
page read and write
4F6000
stack
page read and write
3511000
heap
page read and write
50CF000
stack
page read and write
7FF848F20000
trusted library allocation
page read and write
3583000
heap
page read and write
34C0000
heap
page read and write
77B8000
heap
page read and write
1B5A5000
heap
page read and write
12A1A000
trusted library allocation
page read and write
2DC3000
heap
page read and write
593B000
stack
page read and write
7A0000
unkown
page readonly
5664000
heap
page read and write
8B4000
heap
page read and write
2DE9000
heap
page read and write
34E6000
heap
page read and write
1B04F000
stack
page read and write
3528000
heap
page read and write
1B24E000
stack
page read and write
1291F000
trusted library allocation
page read and write
24AD000
trusted library allocation
page read and write
802000
unkown
page readonly
5450000
heap
page read and write
2CB8000
trusted library allocation
page read and write
7FF848F2B000
trusted library allocation
page read and write
3515000
heap
page read and write
1288D000
trusted library allocation
page read and write
2C87000
trusted library allocation
page read and write
2250000
trusted library section
page read and write
3583000
heap
page read and write
2760000
trusted library allocation
page read and write
34FA000
heap
page read and write
3551000
heap
page read and write
2DDE000
heap
page read and write
2C20000
heap
page execute and read and write
7FF848D83000
trusted library allocation
page read and write
2DC8000
heap
page read and write
12D75000
trusted library allocation
page read and write
801000
unkown
page read and write
21FF000
stack
page read and write
803000
unkown
page readonly
77B1000
heap
page read and write
7FF848E80000
trusted library allocation
page execute and read and write
7FF848E50000
trusted library allocation
page execute and read and write
29CE000
stack
page read and write
E0F000
heap
page read and write
12674000
trusted library allocation
page read and write
1266A000
trusted library allocation
page read and write
2DC2000
heap
page read and write
30BE000
stack
page read and write
12525000
trusted library allocation
page read and write
2EE5000
heap
page read and write
7FF848F40000
trusted library allocation
page read and write
7FF848F50000
trusted library allocation
page read and write
34F8000
heap
page read and write
2604000
trusted library allocation
page read and write
12DDC000
trusted library allocation
page read and write
1B610000
trusted library allocation
page read and write
12AB0000
trusted library allocation
page read and write
28E3000
trusted library allocation
page read and write
12D42000
trusted library allocation
page read and write
7FF848E10000
trusted library allocation
page read and write
7FF848DE0000
trusted library allocation
page read and write
125BA000
trusted library allocation
page read and write
34C8000
heap
page read and write
131A1000
trusted library allocation
page read and write
358C000
heap
page read and write
1BF11000
heap
page read and write
34EB000
heap
page read and write
7F4C000
stack
page read and write
12E45000
trusted library allocation
page read and write
1B1FE000
stack
page read and write
7FF848D4D000
trusted library allocation
page execute and read and write
1AC60000
trusted library allocation
page read and write
1BE72000
heap
page read and write
9A5000
heap
page read and write
132D0000
trusted library allocation
page read and write
1BF7D000
heap
page read and write
1257D000
trusted library allocation
page read and write
1B81E000
stack
page read and write
64C000
heap
page read and write
9A0000
heap
page read and write
3988000
heap
page read and write
1BDAD000
heap
page read and write
1C556000
stack
page read and write
2DEF000
heap
page read and write
2FF2000
stack
page read and write
12A23000
trusted library allocation
page read and write
590000
heap
page read and write
1D0000
heap
page read and write
125E5000
trusted library allocation
page read and write
1323E000
trusted library allocation
page read and write
12E72000
trusted library allocation
page read and write
1B500000
heap
page read and write
12E6D000
trusted library allocation
page read and write
125BD000
trusted library allocation
page read and write
1B5D0000
heap
page execute and read and write
EF0000
trusted library allocation
page read and write
7FF848E2C000
trusted library allocation
page execute and read and write
626000
heap
page read and write
3516000
heap
page read and write
CF6000
stack
page read and write
2CCE000
trusted library allocation
page read and write
2DCB000
heap
page read and write
1C45E000
stack
page read and write
1C4FB000
stack
page read and write
7DE000
unkown
page write copy
34FA000
heap
page read and write
682000
heap
page read and write
2719000
trusted library allocation
page read and write
7FF848F90000
trusted library allocation
page read and write
24D3000
trusted library allocation
page read and write
1BE87000
heap
page read and write
1258B000
trusted library allocation
page read and write
1BF8A000
heap
page read and write
1BEAB000
heap
page read and write
7FF848E56000
trusted library allocation
page execute and read and write
1B4FE000
stack
page read and write
1BD7F000
heap
page read and write
1250B000
trusted library allocation
page read and write
4B30000
heap
page read and write
2240000
trusted library section
page read and write
1BFB8000
heap
page read and write
7E0F000
stack
page read and write
12538000
trusted library allocation
page read and write
2DFD000
heap
page read and write
24B3000
trusted library allocation
page read and write
1C15E000
stack
page read and write
6AD000
heap
page read and write
3582000
heap
page read and write
2DC7000
heap
page read and write
12EB2000
trusted library allocation
page read and write
7FF848DEC000
trusted library allocation
page execute and read and write
6B9000
heap
page read and write
2DCC000
heap
page read and write
1BA5E000
stack
page read and write
2DE2000
heap
page read and write
247E000
stack
page read and write
7FF848F00000
trusted library allocation
page read and write
1BF04000
heap
page read and write
12A6B000
trusted library allocation
page read and write
960000
heap
page read and write
7FF848D5D000
trusted library allocation
page execute and read and write
560000
heap
page read and write
2280000
trusted library section
page read and write
There are 702 hidden memdumps, click here to show them.