IOC Report
Google Chrome.exe

loading gif

Files

File Path
Type
Category
Malicious
Google Chrome.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\Chrome.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\System32\drivers\etc\hosts
ASCII text, with CRLF line terminators
dropped
malicious
C:\Windows\Temp\aeqsvaygefnl.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4zxdcnwi.moc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jfxs03mz.kfp.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rn3dbb1m.1rr.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uqaczy1o.pcr.psm1
ASCII text, with no line terminators
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Windows\Temp\__PSScriptPolicyTest_mai2naou.ec1.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_rggid11q.cw1.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_wbyexdko.2cv.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_wmzffi0d.10r.ps1
ASCII text, with no line terminators
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Google Chrome.exe
"C:\Users\user\Desktop\Google Chrome.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop UsoSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop WaaSMedicSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop wuauserv
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop bits
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop dosvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe delete "Chrome"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe create "Chrome" binpath= "C:\ProgramData\Chrome.exe" start= "auto"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop eventlog
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe start "Chrome"
malicious
C:\ProgramData\Chrome.exe
C:\ProgramData\Chrome.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop UsoSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop WaaSMedicSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop wuauserv
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop bits
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop dosvc
malicious
C:\Windows\System32\svchost.exe
svchost.exe
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe
There are 33 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://pastebin.com/raw/FBXiGyZ9
172.67.19.24
https://www.kaspersky.ru/downloads/free-virus-removal-tool
unknown
https://pastebin.com/raw/FBXiGyZ9--cinit-stealth-targets=Taskmgr.exe
unknown
https://www.drweb.ru/
unknown
https://172.94.1q
unknown
https://xmrig.com/docs/algorithms
unknown

Domains

Name
IP
Malicious
pastebin.com
172.67.19.24
malicious
pool.hashvault.pro
45.76.89.70

IPs

IP
Domain
Country
Malicious
172.67.19.24
pastebin.com
United States
malicious
45.76.89.70
pool.hashvault.pro
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
DontOfferThroughWUAU

Memdumps

Base Address
Regiontype
Protect
Malicious
140001000
unkown
page execute and read and write
malicious
1FE9D080000
heap
page read and write
malicious
14078B000
unkown
page execute and read and write
431D0FE000
stack
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FE9DD40000
trusted library allocation
page read and write
232CD8E0000
heap
page read and write
1FE9D090000
heap
page read and write
1C78A5B0000
heap
page read and write
59A9B7F000
stack
page read and write
1FE9D8B8000
heap
page read and write
1C78A875000
heap
page read and write
22A782A0000
heap
page read and write
1FE9D879000
heap
page read and write
22A782A5000
heap
page read and write
1BEC1AE5000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9D865000
heap
page read and write
BFA207D000
stack
page read and write
7FF7EA96C000
unkown
page readonly
1FE9D865000
heap
page read and write
83D0C7E000
stack
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1447BD10000
heap
page read and write
20382015000
heap
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FE9DD40000
trusted library allocation
page read and write
18182B00000
heap
page read and write
1FE9D86C000
heap
page read and write
1FE9D879000
heap
page read and write
1FE9D7B0000
trusted library allocation
page read and write
272CD130000
heap
page read and write
140503000
unkown
page execute and read and write
1447BD30000
heap
page read and write
7FF7EA46E000
unkown
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9D8C8000
heap
page read and write
1A551950000
heap
page read and write
24A07080000
heap
page read and write
1FE9D0DF000
heap
page read and write
C62437F000
stack
page read and write
1FE9DD40000
trusted library allocation
page read and write
1404DC000
unkown
page execute and read and write
1C8270C0000
heap
page read and write
24A07090000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9D02A000
heap
page read and write
1C312B90000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9D7D0000
trusted library allocation
page read and write
7FF7EA46F000
unkown
page write copy
BB2CDBE000
stack
page read and write
1447C170000
heap
page read and write
1FE9CF90000
heap
page read and write
9F9458E000
stack
page read and write
1FE9D86F000
heap
page read and write
1FE9D7B0000
trusted library allocation
page read and write
22A781F0000
heap
page read and write
24A070F5000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9D86D000
heap
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FE9D113000
heap
page read and write
763237F000
stack
page read and write
20382020000
unkown
page read and write
2A184805000
heap
page read and write
1FE9D86F000
heap
page read and write
AFA0EE000
stack
page read and write
1FE9D7D0000
trusted library allocation
page read and write
7FF7EA46E000
unkown
page write copy
7FF7EA461000
unkown
page execute read
26E85870000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FE9D7D0000
trusted library allocation
page read and write
140500000
unkown
page execute and read and write
1FE9D7D0000
trusted library allocation
page read and write
C520FFE000
stack
page read and write
1FF30402000
heap
page read and write
272CD260000
heap
page read and write
1FE9D880000
heap
page read and write
22A78010000
heap
page read and write
194FBCE0000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FE9DD40000
trusted library allocation
page read and write
1F505FE000
stack
page read and write
1FE9FC00000
heap
page read and write
1FE9D853000
heap
page read and write
1FE9D869000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
2A1847E0000
heap
page read and write
1C78A540000
heap
page read and write
242238F0000
heap
page read and write
D7ED7E000
stack
page read and write
7FF7EA460000
unkown
page readonly
C520EFD000
stack
page read and write
1FE9D000000
heap
page read and write
242238E0000
heap
page read and write
AFA1FF000
stack
page read and write
1FE4D610000
unkown
page read and write
1FE9D7D0000
trusted library allocation
page read and write
272CD150000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
1C78A870000
heap
page read and write
24223C70000
unkown
page read and write
1FE9D876000
heap
page read and write
26E85830000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9D876000
heap
page read and write
14000A000
unkown
page readonly
593B71D000
stack
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9DD40000
trusted library allocation
page read and write
22BD0830000
heap
page read and write
1FE9CFB0000
direct allocation
page execute read
1F4FCFD000
stack
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FE9D872000
heap
page read and write
BB2D0FF000
stack
page read and write
7631F1C000
stack
page read and write
7FF61FA49000
unkown
page readonly
1FE9DD40000
trusted library allocation
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9D881000
heap
page read and write
1FE9D7B0000
trusted library allocation
page read and write
140007000
unkown
page readonly
2A184860000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FE9D05D000
heap
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9D88E000
heap
page read and write
1F4F70B000
stack
page read and write
1FE9DD40000
trusted library allocation
page read and write
11E097E000
stack
page read and write
7FF61FA47000
unkown
page read and write
26E85BF5000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FFFF608000
heap
page read and write
1FFFF810000
heap
page read and write
C62417F000
stack
page read and write
1FE9D86F000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9D86D000
heap
page read and write
242239A0000
heap
page read and write
1D4B463F000
heap
page read and write
1BEC1840000
heap
page read and write
1FE9D7B0000
trusted library allocation
page read and write
2A1846E0000
heap
page read and write
1C78A5B9000
heap
page read and write
1FE9D02F000
heap
page read and write
24223910000
unkown
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9D800000
heap
page read and write
9F9448C000
stack
page read and write
7FF61FA4C000
unkown
page readonly
232CD770000
heap
page read and write
232CD850000
heap
page read and write
194FBCE8000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9DE00000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1D4B4560000
heap
page read and write
1FE9E800000
heap
page read and write
1FFFF7D0000
heap
page read and write
7FF61FA4C000
unkown
page readonly
1FE9DD40000
trusted library allocation
page read and write
232CF290000
heap
page read and write
C62447F000
stack
page read and write
1FE9D7B0000
trusted library allocation
page read and write
232CD910000
heap
page read and write
1FE9D866000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9D7D0000
trusted library allocation
page read and write
22A78018000
heap
page read and write
1F500FE000
unkown
page readonly
1FE9D86D000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9D84E000
heap
page read and write
C41C1FF000
stack
page read and write
7FF7EA46B000
unkown
page readonly
1FE9D7D0000
trusted library allocation
page read and write
1FE9D7B0000
trusted library allocation
page read and write
194FC005000
heap
page read and write
812A17E000
stack
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1D4B4600000
heap
page read and write
1FE9D7B0000
direct allocation
page execute and read and write
24223C60000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
1D4B462B000
heap
page read and write
7FF7EA46B000
unkown
page readonly
1FE9D7B0000
trusted library allocation
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1A5519A8000
heap
page read and write
1FE9D84D000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9DD40000
trusted library allocation
page read and write
140000000
unkown
page read and write
1FE9D7C0000
direct allocation
page execute and read and write
C62477F000
stack
page read and write
6DE0B7E000
stack
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9D86D000
heap
page read and write
7FF61F541000
unkown
page execute read
1FE9D7D0000
trusted library allocation
page read and write
BFA227F000
stack
page read and write
18182B08000
heap
page read and write
A3D0C7F000
stack
page read and write
1FE9D760000
heap
page read and write
1FE9D84C000
heap
page read and write
194FBDF0000
heap
page read and write
1FE9D863000
heap
page read and write
1F4FDFE000
unkown
page readonly
4D77A7F000
stack
page read and write
AFA0FE000
stack
page read and write
1D4B4E02000
trusted library allocation
page read and write
10C93D000
stack
page read and write
1FEA1A00000
heap
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1D4B460B000
heap
page read and write
C62487E000
stack
page read and write
1FE9D869000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9D7D0000
trusted library allocation
page read and write
593BA7F000
stack
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FE9D7B0000
trusted library allocation
page read and write
431D1FE000
stack
page read and write
22BD0710000
heap
page read and write
232CD870000
heap
page read and write
1C827315000
heap
page read and write
1FE4D600000
unkown
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FE9D872000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9D7D0000
trusted library allocation
page read and write
194FBED0000
heap
page read and write
1FE9D760000
trusted library allocation
page read and write
1FE9DD40000
trusted library allocation
page read and write
140009000
unkown
page read and write
1FE9D84C000
heap
page read and write
1FEA1000000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9D8F0000
heap
page read and write
1FE9D8F8000
heap
page read and write
24A070B0000
heap
page read and write
1FE9CF60000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9D86D000
heap
page read and write
59A9A7C000
stack
page read and write
1C78A5B6000
heap
page read and write
272CD155000
heap
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FE9D86C000
heap
page read and write
1BEC17A0000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9DD40000
trusted library allocation
page read and write
593BB7E000
stack
page read and write
1D4B4540000
heap
page read and write
1FEA0600000
heap
page read and write
140000000
unkown
page read and write
7FF61FA49000
unkown
page readonly
1FE9D7B0000
trusted library allocation
page read and write
1FE9D85B000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9D866000
heap
page read and write
2A1847C0000
heap
page read and write
22A78210000
heap
page read and write
1FE9D0F3000
heap
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1447BD00000
heap
page read and write
1D4B4570000
heap
page read and write
1FE4D920000
unkown
page read and write
BFA21FE000
unkown
page readonly
1FE9D7D0000
trusted library allocation
page read and write
1FE9D7B0000
trusted library allocation
page read and write
10CC7F000
stack
page read and write
7FF61F54E000
unkown
page read and write
1FE4D6D0000
heap
page read and write
140840000
unkown
page execute and read and write
1C78A560000
heap
page read and write
7FF61F540000
unkown
page readonly
1D4B45A0000
trusted library allocation
page read and write
1C827130000
heap
page read and write
C41BDBD000
stack
page read and write
C623F7D000
stack
page read and write
1FE9DD40000
trusted library allocation
page read and write
FE53B3D000
stack
page read and write
1FE9D06A000
heap
page read and write
2A184868000
heap
page read and write
1FE9D879000
heap
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FE9D102000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1BEC1780000
heap
page read and write
1FE9D0FC000
heap
page read and write
1FE9D8C0000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9DD40000
trusted library allocation
page read and write
10CD7E000
stack
page read and write
1FE9D7D0000
trusted library allocation
page read and write
20381C60000
heap
page read and write
C623D7E000
stack
page read and write
1FE9D85B000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
1C312B65000
heap
page read and write
7FF61F54E000
unkown
page write copy
1C827138000
heap
page read and write
A3D0B7F000
stack
page read and write
7FF61F54B000
unkown
page readonly
1FE9D7D0000
trusted library allocation
page read and write
1FE4D910000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1A551C55000
heap
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FE9DD40000
trusted library allocation
page read and write
140001000
unkown
page execute read
7FF7EA461000
unkown
page execute read
1FE9D7D0000
trusted library allocation
page read and write
1FE9D102000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
6DE0C7E000
stack
page read and write
1BEC1830000
heap
page read and write
1FE4D915000
heap
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FE9D7B0000
trusted library allocation
page read and write
812A07E000
stack
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1447BDD0000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
22A78110000
heap
page read and write
22BD0730000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE4D500000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
22BD0528000
heap
page read and write
1FFFF600000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
232CD918000
heap
page read and write
2A184800000
heap
page read and write
24223C65000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9DD40000
trusted library allocation
page read and write
59A9AFF000
stack
page read and write
24223920000
unkown
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FE9DD40000
trusted library allocation
page read and write
272CD160000
heap
page read and write
1FE9D85E000
heap
page read and write
C41C0FF000
stack
page read and write
4D7787D000
stack
page read and write
7FF61F540000
unkown
page readonly
1FEA2E00000
heap
page read and write
1FE9D09D000
heap
page read and write
1FE9CF80000
heap
page read and write
D7EC7D000
stack
page read and write
1447BDD8000
heap
page read and write
1D4B4602000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
26E85BF0000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9D879000
heap
page read and write
1FE9D8CF000
heap
page read and write
1A551C50000
heap
page read and write
1BEC16A0000
heap
page read and write
1FE9D7B0000
trusted library allocation
page read and write
A3D0A7D000
stack
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9D881000
heap
page read and write
272CD050000
heap
page read and write
9F9450E000
stack
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FE9D7D0000
trusted library allocation
page read and write
C62467E000
stack
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9D843000
heap
page read and write
C520EEE000
stack
page read and write
7FF61F541000
unkown
page execute read
1BEC1838000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
7FF61F54B000
unkown
page readonly
1FE9DD40000
trusted library allocation
page read and write
C623E7E000
stack
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FE9DD40000
trusted library allocation
page read and write
83D0B7E000
stack
page read and write
1FE4D6D9000
heap
page read and write
1FE9D88C000
heap
page read and write
1C8270E0000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
18182CF0000
heap
page read and write
1FE9D866000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
24223910000
unkown
page read and write
20381C50000
heap
page read and write
1FFFF5D0000
heap
page read and write
BFA217E000
stack
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9D760000
trusted library allocation
page read and write
11E087F000
stack
page read and write
83D0A7D000
stack
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FEA3800000
heap
page read and write
1FE9D7B0000
trusted library allocation
page read and write
18182E15000
heap
page read and write
24A07158000
heap
page read and write
C623C7B000
stack
page read and write
1FE9D094000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9F200000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
7FF7EA969000
unkown
page readonly
1FE9DD40000
trusted library allocation
page read and write
1FE9D843000
heap
page read and write
24223910000
unkown
page read and write
18182CD0000
heap
page read and write
20381C80000
heap
page read and write
1FE9D8A6000
heap
page read and write
20382010000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
194FC000000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9D86D000
heap
page read and write
1447C175000
heap
page read and write
140847000
unkown
page read and write
24A070F0000
heap
page read and write
1FEA2400000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9DD40000
trusted library allocation
page read and write
6DE0A7C000
stack
page read and write
1C312B60000
heap
page read and write
1C312BB8000
heap
page read and write
1F506FE000
unkown
page readonly
1C312B70000
heap
page read and write
1FE9D86B000
heap
page read and write
22BD0630000
heap
page read and write
1F4FFFE000
stack
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9D013000
heap
page read and write
22BD0835000
heap
page read and write
232CD8E5000
heap
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1C827310000
heap
page read and write
1A5519A0000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1C312BB0000
heap
page read and write
1FF30423000
heap
page read and write
1FE9D86F000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
26E85800000
heap
page read and write
7FF7EA96C000
unkown
page readonly
1FE4D5E0000
heap
page read and write
7FF7EA460000
unkown
page readonly
1FE9D7D0000
trusted library allocation
page read and write
1D4B4702000
heap
page read and write
1D4B4613000
heap
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1C826FE0000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
4D7797E000
stack
page read and write
431CD8D000
stack
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9D0F8000
heap
page read and write
1C78A460000
heap
page read and write
1A551970000
heap
page read and write
11E051D000
stack
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9D879000
heap
page read and write
1D4B4628000
heap
page read and write
14080D000
unkown
page execute and read and write
1FE9CFE0000
trusted library allocation
page read and write
1FE9D86D000
heap
page read and write
763227F000
stack
page read and write
1FE9CFE0000
heap
page readonly
1FE9D879000
heap
page read and write
24A07150000
heap
page read and write
C62427F000
stack
page read and write
C62407C000
stack
page read and write
7FF61F7D0000
unkown
page write copy
1FFFF5E0000
heap
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FE9D770000
direct allocation
page execute and read and write
1FE9D760000
trusted library allocation
page read and write
1FE9DD40000
trusted library allocation
page read and write
1A551940000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
6DE0CFE000
unkown
page readonly
18182AF0000
heap
page read and write
7FF7EA969000
unkown
page readonly
1FE9DD40000
trusted library allocation
page read and write
272CD168000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9D86F000
heap
page read and write
1FE9D8D7000
heap
page read and write
C62457F000
stack
page read and write
22BD0520000
heap
page read and write
1FE9D86B000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1C312B50000
heap
page read and write
1FE9D7D0000
trusted library allocation
page read and write
1BEC1AE0000
heap
page read and write
1FE9D86D000
heap
page read and write
1FFFF815000
heap
page read and write
1FE9D879000
heap
page read and write
194FBEF0000
heap
page read and write
1FF30423000
heap
page read and write
18182E10000
heap
page read and write
1FE9D861000
heap
page read and write
26E85810000
heap
page read and write
D7EE7E000
stack
page read and write
7FF7EA967000
unkown
page read and write
1FE9D7B0000
trusted library allocation
page read and write
8129D2D000
stack
page read and write
1FE9D879000
heap
page read and write
1FE9D06A000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
C62497F000
stack
page read and write
1FE9D7B0000
trusted library allocation
page read and write
1FE9D7D0000
trusted library allocation
page read and write
26E85878000
heap
page read and write
1FE9DD40000
trusted library allocation
page read and write
1FE9D7B0000
trusted library allocation
page read and write
BB2CCBC000
stack
page read and write
There are 537 hidden memdumps, click here to show them.