IOC Report
prog.exe

loading gif

Files

File Path
Type
Category
Malicious
prog.exe
PE32+ executable (GUI) x86-64, for MS Windows
initial sample
malicious
C:\ProgramData\win32\svhost.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Windows\Temp\pnhtlztmuvjx.sys
PE32+ executable (native) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_0clplbcd.mp2.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_120ozldt.xt5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qkqt4yur.xc1.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wev4shdz.3ic.ps1
ASCII text, with no line terminators
dropped
C:\Windows\System32\config\systemprofile\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Windows\Temp\__PSScriptPolicyTest_53ji52ho.qwi.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_agef4gqi.jsx.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_ptcbpiqz.4kc.ps1
ASCII text, with no line terminators
dropped
C:\Windows\Temp\__PSScriptPolicyTest_pzo521gx.ly2.psm1
ASCII text, with no line terminators
dropped
There are 3 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\prog.exe
"C:\Users\user\Desktop\prog.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop UsoSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop WaaSMedicSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop wuauserv
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop bits
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop dosvc
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe delete "appdata"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe create "appdata" binpath= "C:\ProgramData\win32\svhost.exe" start= "auto"
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop eventlog
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe start "appdata"
malicious
C:\ProgramData\win32\svhost.exe
C:\ProgramData\win32\svhost.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramData) -ExclusionExtension '.exe' -Force
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop UsoSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop WaaSMedicSvc
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop wuauserv
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop bits
malicious
C:\Windows\System32\sc.exe
C:\Windows\system32\sc.exe stop dosvc
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -hibernate-timeout-dc 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-ac 0
malicious
C:\Windows\System32\powercfg.exe
C:\Windows\system32\powercfg.exe /x -standby-timeout-dc 0
malicious
C:\Windows\System32\svchost.exe
svchost.exe
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wusa.exe
wusa /uninstall /kb:890830 /quiet /norestart
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 49 hidden processes, click here to show them.

URLs

Name
IP
Malicious
https://172.94.1q
unknown
https://xmrig.com/docs/algorithms
unknown

Domains

Name
IP
Malicious
pool.hashvault.pro
95.179.241.203

IPs

IP
Domain
Country
Malicious
95.179.241.203
pool.hashvault.pro
Netherlands

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Policies\Microsoft\MRT
DontOfferThroughWUAU

Memdumps

Base Address
Regiontype
Protect
Malicious
140001000
unkown
page execute and read and write
malicious
1B35F6D0000
heap
page read and write
7FF6F1FB0000
unkown
page readonly
1631B4D0000
trusted library allocation
page read and write
BC1A07F000
stack
page read and write
1631AE5E000
heap
page read and write
2A8A4E70000
heap
page read and write
2A8A5043000
heap
page read and write
1631B6C5000
heap
page read and write
1631B4B0000
trusted library allocation
page read and write
7FF6F1FBB000
unkown
page readonly
1631B4D0000
trusted library allocation
page read and write
2A8A503A000
heap
page read and write
163ADEA4000
heap
page read and write
1631B460000
trusted library allocation
page read and write
21398B60000
heap
page read and write
237523E0000
heap
page read and write
107C56B0000
heap
page read and write
1631B4B0000
trusted library allocation
page read and write
C6AC8FE000
unkown
page readonly
C6AC9FE000
stack
page read and write
248803A5000
heap
page read and write
1631AD60000
heap
page read and write
1631B600000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
2207FA50000
heap
page read and write
1631AEEE000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
17CA59F9000
heap
page read and write
1B35F3A0000
heap
page read and write
1FFBD570000
heap
page read and write
F6F010E000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
1B4BAB95000
heap
page read and write
1631B4B0000
trusted library allocation
page read and write
140000000
unkown
page read and write
739237F000
stack
page read and write
42A507F000
stack
page read and write
7FF6F1FBF000
unkown
page write copy
7FF6F2240000
unkown
page readonly
1631B4D0000
trusted library allocation
page read and write
4E216FF000
stack
page read and write
2A865C88000
heap
page read and write
2F5BDB25000
heap
page read and write
BC1A17E000
stack
page read and write
2A865E75000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
163ADE57000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
C6AC7FC000
stack
page read and write
BC19D4D000
stack
page read and write
1918B195000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
198FD240000
heap
page read and write
1631AF02000
heap
page read and write
38F677E000
stack
page read and write
2207FDA0000
heap
page read and write
107C5880000
heap
page read and write
2BDAAFF000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4B0000
trusted library allocation
page read and write
1631AF13000
heap
page read and write
1631B4B0000
trusted library allocation
page read and write
1631B800000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4B0000
trusted library allocation
page read and write
176CDC0F000
heap
page read and write
17CA59F0000
heap
page read and write
1BE3E8C0000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
21398850000
heap
page read and write
107C56B7000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
2F5BF320000
heap
page read and write
1D873910000
unkown
page read and write
2F5BD740000
heap
page read and write
420B87D000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
188079F000
stack
page read and write
282DA5A8000
heap
page read and write
1D8737F5000
heap
page read and write
1631AEC1000
heap
page read and write
1631AEFF000
heap
page read and write
282DA8B0000
heap
page read and write
1963CDB0000
heap
page read and write
24880040000
heap
page read and write
163ADE47000
heap
page read and write
1631AF02000
heap
page read and write
237523E8000
heap
page read and write
1F4ABE70000
heap
page read and write
1D8737F0000
heap
page read and write
196E9B20000
heap
page read and write
859C54F000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
640197E000
stack
page read and write
22037400000
heap
page read and write
3635CFF000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
1631AED3000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
C1B999D000
stack
page read and write
1631B4B0000
trusted library allocation
page read and write
1C92FD000
stack
page read and write
2A865AC0000
heap
page read and write
17CA5AF0000
heap
page read and write
198FD550000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B460000
heap
page read and write
1BE3E619000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
23B29EB0000
heap
page read and write
1629CA10000
heap
page read and write
7FF7E3580000
unkown
page readonly
1631B4D0000
trusted library allocation
page read and write
38F667C000
stack
page read and write
163ADE02000
heap
page read and write
1631B460000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4B0000
trusted library allocation
page read and write
7BF90FF000
stack
page read and write
1918B190000
heap
page read and write
1631AECA000
heap
page read and write
7FF6F223B000
unkown
page read and write
1631B4B0000
trusted library allocation
page read and write
F6F00FD000
stack
page read and write
17CA5BF0000
heap
page read and write
140503000
unkown
page execute and read and write
1631B4D0000
trusted library allocation
page read and write
91DE37F000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4B0000
trusted library allocation
page read and write
2AE7B888000
heap
page read and write
3635DFF000
stack
page read and write
1631B6D6000
heap
page read and write
140500000
unkown
page execute and read and write
1631B6AC000
heap
page read and write
23B29EE0000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4B0000
trusted library allocation
page read and write
1631B4B0000
trusted library allocation
page read and write
1631B6A4000
heap
page read and write
ABEF6FE000
stack
page read and write
2207FDB0000
unkown
page read and write
248803B0000
unkown
page read and write
1631B4D0000
trusted library allocation
page read and write
1918AF28000
heap
page read and write
21398830000
heap
page read and write
2A865BA0000
heap
page read and write
7FF7E32FE000
unkown
page read and write
17CA5D05000
heap
page read and write
1631B4B0000
trusted library allocation
page read and write
140847000
unkown
page read and write
1631ADB0000
heap
page readonly
C1B9CFE000
stack
page read and write
2F5BD750000
heap
page read and write
1631AC60000
heap
page read and write
D5EA7FD000
stack
page read and write
1631AD80000
direct allocation
page execute read
1631B4D0000
trusted library allocation
page read and write
FBBE7DE000
stack
page read and write
1BE3E510000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
7FF7E32F0000
unkown
page readonly
1631B4B0000
trusted library allocation
page read and write
7FF6F1FBE000
unkown
page write copy
31D527E000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B684000
heap
page read and write
1631AE13000
heap
page read and write
1CC886D8000
heap
page read and write
2AE7B6C0000
heap
page read and write
1631B4B0000
trusted library allocation
page read and write
1631ADB0000
trusted library allocation
page read and write
282DA530000
heap
page read and write
1F4AC065000
heap
page read and write
1631AE97000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
2F5BD7B8000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631AE6B000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631C200000
heap
page read and write
1631EA00000
heap
page read and write
1FD67270000
heap
page read and write
4E212FD000
stack
page read and write
31D517F000
stack
page read and write
1631AF02000
heap
page read and write
17CA5BD0000
heap
page read and write
1631AEFA000
heap
page read and write
25A22C10000
heap
page read and write
1631AEB8000
heap
page read and write
1631AE92000
heap
page read and write
17CA5D00000
heap
page read and write
1963CB60000
heap
page read and write
1631AE9A000
heap
page read and write
640187E000
stack
page read and write
1918B110000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
2F5BD7B0000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B69C000
heap
page read and write
2DEBC7E000
stack
page read and write
7FF7E32FB000
unkown
page readonly
282DA520000
heap
page read and write
1B35F6D5000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4B0000
direct allocation
page execute and read and write
1631B4D0000
trusted library allocation
page read and write
248800D9000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4B0000
trusted library allocation
page read and write
1CC889A5000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
25A22B50000
heap
page read and write
1404DC000
unkown
page execute and read and write
1631B4D0000
trusted library allocation
page read and write
1B4BA8B0000
heap
page read and write
A11147F000
stack
page read and write
1963CBC0000
heap
page read and write
23B29EE8000
heap
page read and write
23B29E80000
heap
page read and write
1631B643000
heap
page read and write
14080D000
unkown
page execute and read and write
176CDC08000
heap
page read and write
1F4ABE78000
heap
page read and write
1631B6FF000
heap
page read and write
23B29EC0000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4B0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
163ADF02000
heap
page read and write
1B35F310000
heap
page read and write
1631AEC7000
heap
page read and write
163ADE02000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
23B29E90000
heap
page read and write
1C967E000
unkown
page readonly
640155D000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B6FF000
heap
page read and write
1631B4C0000
direct allocation
page execute and read and write
2A8A5102000
heap
page read and write
7FF7E32F1000
unkown
page execute read
1FFBD650000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
C6ABD2B000
stack
page read and write
2A865BC0000
heap
page read and write
4E215FE000
stack
page read and write
282DA8B5000
heap
page read and write
140840000
unkown
page execute and read and write
1631B4B0000
trusted library allocation
page read and write
95D377F000
stack
page read and write
2A865C80000
heap
page read and write
F6F04FE000
stack
page read and write
91DE2FF000
stack
page read and write
1BE3E530000
heap
page read and write
1631B4B0000
trusted library allocation
page read and write
1CC886D0000
heap
page read and write
D0D67FE000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1FD67210000
heap
page read and write
C6AC3FE000
unkown
page readonly
1631B4D0000
trusted library allocation
page read and write
1FD67130000
heap
page read and write
22037430000
heap
page read and write
1631AEAF000
heap
page read and write
1631B6B4000
heap
page read and write
1FD67278000
heap
page read and write
1631B460000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
163ADE4B000
heap
page read and write
1629CD55000
heap
page read and write
7BF907F000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
21398810000
heap
page read and write
49084FF000
stack
page read and write
1B4BA990000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
21398B65000
heap
page read and write
1631AEFB000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
4BE307D000
stack
page read and write
2A8A502B000
heap
page read and write
1631CC00000
heap
page read and write
1F4ABE50000
heap
page read and write
1B4BAB90000
heap
page read and write
1FD67230000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1B4BA9B0000
heap
page read and write
31D507D000
stack
page read and write
7FF7E32FB000
unkown
page readonly
859C4CD000
stack
page read and write
1918AF00000
heap
page read and write
1631B4B0000
trusted library allocation
page read and write
282DA550000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631AE9E000
heap
page read and write
1631B4B0000
trusted library allocation
page read and write
1963CA80000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
2AE7B7C0000
heap
page read and write
22037810000
heap
page read and write
1CC88610000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
2207FB30000
heap
page read and write
739247F000
stack
page read and write
1631AE96000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631AED3000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
16321200000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
7FF6F1FBE000
unkown
page read and write
4E211FE000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4B0000
trusted library allocation
page read and write
7FF6F223D000
unkown
page readonly
1631AEFB000
heap
page read and write
1F4AC060000
heap
page read and write
22037410000
heap
page read and write
198FD320000
heap
page read and write
7FF6F1FB1000
unkown
page execute read
1631B4D0000
trusted library allocation
page read and write
95D37FF000
stack
page read and write
2207FB80000
heap
page read and write
1631B4B0000
trusted library allocation
page read and write
1631B4B0000
trusted library allocation
page read and write
282DA5A0000
heap
page read and write
1D873640000
heap
page read and write
1FD674B5000
heap
page read and write
2A8A4F70000
heap
page read and write
196E98B0000
heap
page read and write
2BDA6BD000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
739227D000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
1631AE00000
heap
page read and write
7FF6F1FBB000
unkown
page readonly
237527A5000
heap
page read and write
163ADE02000
heap
page read and write
2AE7B7D0000
heap
page read and write
1631B4B0000
trusted library allocation
page read and write
1FFBD960000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
220374C0000
heap
page read and write
2AE7B880000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
237524F0000
heap
page read and write
2F5BDB20000
heap
page read and write
1CC889A0000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
2BDA7BF000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
1D873720000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1963CBC8000
heap
page read and write
1C96FF000
stack
page read and write
7FF6F2240000
unkown
page readonly
1631B4D0000
trusted library allocation
page read and write
1631AEFD000
heap
page read and write
1631B4B0000
trusted library allocation
page read and write
140000000
unkown
page read and write
2AE7B7C5000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B460000
trusted library allocation
page read and write
490819D000
stack
page read and write
196E97B0000
heap
page read and write
1631AE9A000
heap
page read and write
1631AF02000
heap
page read and write
198FD358000
heap
page read and write
1631D600000
heap
page read and write
14078B000
unkown
page execute and read and write
220374D4000
heap
page read and write
1B4BA9E8000
heap
page read and write
1629CD50000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
176CDE65000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
ABEF3CF000
stack
page read and write
107C58C0000
heap
page read and write
1631B6F7000
heap
page read and write
1631B4B0000
trusted library allocation
page read and write
1631B4B0000
trusted library allocation
page read and write
1BE3E430000
heap
page read and write
25A22BC0000
heap
page read and write
176CDC00000
heap
page read and write
1631B4B0000
trusted library allocation
page read and write
163ADE02000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
4E20DDB000
stack
page read and write
4AC1B7F000
stack
page read and write
4AC1A7C000
stack
page read and write
7FF7E32F1000
unkown
page execute read
248803A0000
heap
page read and write
198FD350000
heap
page read and write
1C93FE000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
1918AF2F000
heap
page read and write
FBBE75C000
stack
page read and write
2207FB50000
unkown
page read and write
1631AED3000
heap
page read and write
1631AE92000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631AED4000
heap
page read and write
7FF7E3580000
unkown
page readonly
1631B4B0000
trusted library allocation
page read and write
859C5CF000
stack
page read and write
237525F0000
heap
page read and write
4E217FE000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
25A22B30000
heap
page read and write
7FF6F1FB0000
unkown
page readonly
1631AEFD000
heap
page read and write
D0D66FE000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
1631AED6000
heap
page read and write
1631B4B0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1918B0F0000
heap
page read and write
7FF6F223D000
unkown
page readonly
91DE27D000
stack
page read and write
2AE7B7A0000
heap
page read and write
1631B4B0000
trusted library allocation
page read and write
140006000
unkown
page readonly
1631B4D0000
trusted library allocation
page read and write
163ADE02000
heap
page read and write
95D36FD000
stack
page read and write
1631E000000
heap
page read and write
7FF7E357D000
unkown
page readonly
1631B4D0000
trusted library allocation
page read and write
1FFBD700000
heap
page read and write
107C58B5000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631AED3000
heap
page read and write
25A22C19000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631FE00000
heap
page read and write
4E214FF000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
107C56A0000
heap
page read and write
1629CA50000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
4E210FE000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
16320800000
heap
page read and write
1631AF02000
heap
page read and write
188071D000
stack
page read and write
1631B4B0000
trusted library allocation
page read and write
1631B684000
heap
page read and write
220374C9000
heap
page read and write
1631B4B0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1B4BA9E0000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4B0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4B0000
trusted library allocation
page read and write
1631B4B0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1629CA58000
heap
page read and write
1FD674B0000
heap
page read and write
1631ADB0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1B35F3A8000
heap
page read and write
2F5BD770000
heap
page read and write
176CDD00000
heap
page read and write
A11127D000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
1629CA00000
heap
page read and write
2A8A5013000
heap
page read and write
23B29EB5000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
163ADEA4000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1CC88640000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
D0D63FD000
stack
page read and write
1F4ABD50000
heap
page read and write
1B35F2F0000
heap
page read and write
1880A7F000
stack
page read and write
1FFBD670000
heap
page read and write
2A8A5000000
heap
page read and write
1631AEFF000
heap
page read and write
1631B4B0000
trusted library allocation
page read and write
1631B4B0000
trusted library allocation
page read and write
1631AEFF000
heap
page read and write
198FD555000
heap
page read and write
7FF7E32FE000
unkown
page write copy
1631AEEB000
heap
page read and write
1629CA30000
heap
page read and write
4E21AFF000
stack
page read and write
A11137F000
stack
page read and write
1631AEFB000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631AE6B000
heap
page read and write
1631AED3000
heap
page read and write
2DEBB7F000
stack
page read and write
7FF7E32F0000
unkown
page readonly
107C58B0000
heap
page read and write
1631B470000
direct allocation
page execute and read and write
4E219FE000
stack
page read and write
1631B4B0000
trusted library allocation
page read and write
1631AF02000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
420B97F000
stack
page read and write
1631B4B0000
trusted library allocation
page read and write
1631B4B0000
trusted library allocation
page read and write
1631AEFF000
heap
page read and write
4E213FC000
stack
page read and write
1631AC80000
heap
page read and write
1631F400000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1CC88620000
heap
page read and write
196E9950000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631AED3000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1BE3E8C5000
heap
page read and write
22037815000
heap
page read and write
42A50FF000
stack
page read and write
237527A0000
heap
page read and write
1631B4B0000
trusted library allocation
page read and write
1631AE7F000
heap
page read and write
25A22BC5000
heap
page read and write
36359CD000
stack
page read and write
248800D0000
heap
page read and write
4E218FF000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
7BF8DAD000
stack
page read and write
2A8A5002000
heap
page read and write
1631B4B0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1F4ABE30000
heap
page read and write
24880030000
heap
page read and write
196E9B25000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631AE97000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1D873810000
heap
page read and write
237525D0000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
2A865E70000
heap
page read and write
140001000
unkown
page execute read
176CDE60000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
198FD450000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
C6AC2FD000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
FBBEA7F000
stack
page read and write
D5EAA7F000
stack
page read and write
1631AF02000
heap
page read and write
42A4DCD000
stack
page read and write
D5EAAFF000
stack
page read and write
49081AD000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
2DEBA7D000
stack
page read and write
7FF7E357D000
unkown
page readonly
140008000
unkown
page read and write
1631B4D0000
trusted library allocation
page read and write
1918AF20000
heap
page read and write
1631AE2F000
heap
page read and write
1631AE81000
heap
page read and write
1BE3E610000
heap
page read and write
1631AED5000
heap
page read and write
1631B4B0000
trusted library allocation
page read and write
2207FB50000
unkown
page read and write
1631B4D0000
trusted library allocation
page read and write
176CDB20000
heap
page read and write
7FF6F1FB1000
unkown
page execute read
1631B4D0000
trusted library allocation
page read and write
ABEF2CD000
stack
page read and write
2A8A4E90000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
C6ACAFE000
unkown
page readonly
176CDD20000
heap
page read and write
1631B4B0000
trusted library allocation
page read and write
420B8FF000
stack
page read and write
1B35F2E0000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
196E9959000
heap
page read and write
196E9890000
heap
page read and write
C59B88D000
stack
page read and write
1631B4D0000
trusted library allocation
page read and write
21398858000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
2A8A4FA0000
trusted library allocation
page read and write
1FFBD965000
heap
page read and write
1631B4D0000
trusted library allocation
page read and write
2207FDA5000
heap
page read and write
140009000
unkown
page readonly
1963CB80000
heap
page read and write
2A8A5802000
trusted library allocation
page read and write
1631B4D0000
trusted library allocation
page read and write
1631AED5000
heap
page read and write
25A22A50000
heap
page read and write
1963CDB5000
heap
page read and write
1FFBD708000
heap
page read and write
21398800000
heap
page read and write
There are 623 hidden memdumps, click here to show them.