IOC Report
file.exe

loading gif

Files

File Path
Type
Category
Malicious
file.exe
PE32+ executable (console) x86-64 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_file.exe_1c947923c97269e597942e7aece28a80f0f0d23f_edd3b515_41559515-5a2b-4554-8fce-fd8cbc9dc473\Report.wer
Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nexus.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sat Dec 7 08:10:35 2019, mtime=Thu Oct 31 19:08:41 2024, atime=Sat Dec 7 08:10:35 2019, length=2759232, window=hide
dropped
malicious
C:\ProgramData\Microsoft\Windows\WER\Temp\WER13B0.tmp.dmp
Mini DuMP crash report, 16 streams, Thu Oct 31 20:08:42 2024, 0x1205a4 type
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER16ED.tmp.WERInternalMetadata.xml
XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
dropped
C:\ProgramData\Microsoft\Windows\WER\Temp\WER173C.tmp.xml
XML 1.0 document, ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_04yxs52c.woi.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4fjm5qhp.cyo.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_4stnc4pu.iwx.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_monl2q3j.jvp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_uvuvjwne.55f.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_wbxkkdip.byd.ps1
ASCII text, with no line terminators
dropped
C:\Windows\appcompat\Programs\Amcache.hve
MS Windows registry file, NT/2000 or above
dropped
There are 4 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\file.exe
"C:\Users\user\Desktop\file.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\file.exe" -Force
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command "$ws = New-Object -ComObject WScript.Shell; $s = $ws.CreateShortcut('C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Nexus.lnk'); $s.TargetPath = 'C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe'; $s.Save()"
malicious
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WerFault.exe
C:\Windows\system32\WerFault.exe -u -p 1600 -s 1060
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
malicious
https://go.micro
unknown
malicious
https://github.com/Pester/Pester
unknown
malicious
http://nuget.org/NuGet.exe
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://oneget.orgX
unknown
http://upx.sf.net
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://oneget.org
unknown
There are 5 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
18.31.95.13.in-addr.arpa
unknown

IPs

IP
Domain
Country
Malicious
185.196.10.218
unknown
Switzerland

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System
EnableLUA
malicious
\REGISTRY\A\{c7023f3d-207d-5ce6-270b-8d0070dae59d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProgramId
malicious
\REGISTRY\A\{c7023f3d-207d-5ce6-270b-8d0070dae59d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
FileId
malicious
\REGISTRY\A\{c7023f3d-207d-5ce6-270b-8d0070dae59d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LowerCaseLongPath
malicious
\REGISTRY\A\{c7023f3d-207d-5ce6-270b-8d0070dae59d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LongPathHash
malicious
\REGISTRY\A\{c7023f3d-207d-5ce6-270b-8d0070dae59d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Name
malicious
\REGISTRY\A\{c7023f3d-207d-5ce6-270b-8d0070dae59d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
OriginalFileName
malicious
\REGISTRY\A\{c7023f3d-207d-5ce6-270b-8d0070dae59d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Publisher
malicious
\REGISTRY\A\{c7023f3d-207d-5ce6-270b-8d0070dae59d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Version
malicious
\REGISTRY\A\{c7023f3d-207d-5ce6-270b-8d0070dae59d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinFileVersion
malicious
\REGISTRY\A\{c7023f3d-207d-5ce6-270b-8d0070dae59d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinaryType
malicious
\REGISTRY\A\{c7023f3d-207d-5ce6-270b-8d0070dae59d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProductName
malicious
\REGISTRY\A\{c7023f3d-207d-5ce6-270b-8d0070dae59d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
ProductVersion
malicious
\REGISTRY\A\{c7023f3d-207d-5ce6-270b-8d0070dae59d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
LinkDate
malicious
\REGISTRY\A\{c7023f3d-207d-5ce6-270b-8d0070dae59d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
BinProductVersion
malicious
\REGISTRY\A\{c7023f3d-207d-5ce6-270b-8d0070dae59d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
AppxPackageFullName
malicious
\REGISTRY\A\{c7023f3d-207d-5ce6-270b-8d0070dae59d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
AppxPackageRelativeId
malicious
\REGISTRY\A\{c7023f3d-207d-5ce6-270b-8d0070dae59d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Size
malicious
\REGISTRY\A\{c7023f3d-207d-5ce6-270b-8d0070dae59d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Language
malicious
\REGISTRY\A\{c7023f3d-207d-5ce6-270b-8d0070dae59d}\Root\InventoryApplicationFile\file.exe|5c6ea74fda3dfec0
Usn
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Notifications\Settings\Windows.SystemToast.SecurityAndMaintenance
Enabled
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceTicket
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
DeviceId
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Token\{67082621-8D18-4333-9C64-10DE93676363}
ApplicationFlags
HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Immersive\production\Property
0018000DDABBE6B3
There are 15 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
22781CC8000
trusted library allocation
page read and write
malicious
28C6F6C0000
heap
page read and write
7FFD34534000
trusted library allocation
page read and write
7FFD34570000
trusted library allocation
page read and write
28C57175000
heap
page read and write
9F9C7FD000
stack
page read and write
C000004000
direct allocation
page read and write
C000044000
direct allocation
page read and write
C000031000
direct allocation
page read and write
2279A172000
heap
page read and write
17EE1210000
direct allocation
page read and write
9F9D84F000
stack
page read and write
C0000BC000
direct allocation
page read and write
22793569000
trusted library allocation
page read and write
7FFD34626000
trusted library allocation
page read and write
17E9BFB0000
direct allocation
page read and write
2279A730000
heap
page read and write
7FFD34572000
trusted library allocation
page read and write
C0000A6000
direct allocation
page read and write
28C58DA5000
trusted library allocation
page read and write
2279A160000
heap
page read and write
28779FF000
stack
page read and write
8E858FE000
stack
page read and write
C000006000
direct allocation
page read and write
7FFD347D0000
trusted library allocation
page read and write
C000194000
direct allocation
page read and write
C00005C000
direct allocation
page read and write
C00000E000
direct allocation
page read and write
7FFD34729000
trusted library allocation
page read and write
C00004D000
direct allocation
page read and write
28C58B79000
trusted library allocation
page read and write
C00008A000
direct allocation
page read and write
22781930000
heap
page read and write
7FFD345E6000
trusted library allocation
page read and write
C0000B2000
direct allocation
page read and write
28C6F4C0000
heap
page read and write
9F9C77E000
stack
page read and write
49DC3FF000
stack
page read and write
C000073000
direct allocation
page read and write
28C6F6B0000
heap
page execute and read and write
28C6F981000
heap
page read and write
C000188000
direct allocation
page read and write
9F9C3EE000
stack
page read and write
C000078000
direct allocation
page read and write
227FF190000
unkown
page readonly
7FFD34533000
trusted library allocation
page execute and read and write
227FF5E0000
heap
page read and write
9F9CBFE000
stack
page read and write
28C58AF2000
trusted library allocation
page read and write
8E852FF000
stack
page read and write
C000180000
direct allocation
page read and write
8E84DFE000
stack
page read and write
7FFD3458D000
trusted library allocation
page execute and read and write
C0000BE000
direct allocation
page read and write
C0000D0000
direct allocation
page read and write
1EF70403000
heap
page read and write
7FFD34594000
trusted library allocation
page read and write
7FFD34714000
trusted library allocation
page read and write
1EF71D00000
direct allocation
page read and write
28C556C0000
trusted library allocation
page read and write
C0001A3000
direct allocation
page read and write
7FFD34540000
trusted library allocation
page read and write
28C55503000
heap
page read and write
227819CC000
trusted library allocation
page read and write
28C55770000
trusted library allocation
page read and write
227FF2C1000
heap
page read and write
7FFD34717000
trusted library allocation
page read and write
1EF71CC0000
direct allocation
page read and write
C00004B000
direct allocation
page read and write
28C554FB000
heap
page read and write
C000028000
direct allocation
page read and write
C0001A9000
direct allocation
page read and write
7FFD345EC000
trusted library allocation
page execute and read and write
7FFD34656000
trusted library allocation
page execute and read and write
227FF450000
heap
page read and write
1EF70350000
heap
page read and write
22799970000
trusted library allocation
page read and write
C000184000
direct allocation
page read and write
C000076000
direct allocation
page read and write
22792F49000
trusted library allocation
page read and write
9F9CA79000
stack
page read and write
C000080000
direct allocation
page read and write
C000092000
direct allocation
page read and write
227FF2EC000
heap
page read and write
7FFD34800000
trusted library allocation
page read and write
1EF703F4000
heap
page read and write
28C590F0000
trusted library allocation
page read and write
9F9CC7F000
stack
page read and write
8E853FE000
stack
page read and write
28C6F9AF000
heap
page read and write
28C55680000
heap
page read and write
C00006E000
direct allocation
page read and write
C00001C000
direct allocation
page read and write
1EF703D8000
heap
page read and write
C000111000
direct allocation
page read and write
7FFD34890000
trusted library allocation
page read and write
C00005E000
direct allocation
page read and write
C000082000
direct allocation
page read and write
1EF71CCB000
direct allocation
page read and write
17E9BFB8000
direct allocation
page read and write
7FFD34790000
trusted library allocation
page read and write
7FFD34650000
trusted library allocation
page execute and read and write
C000086000
direct allocation
page read and write
22791941000
trusted library allocation
page read and write
28C590EC000
trusted library allocation
page read and write
7FFD3462C000
trusted library allocation
page execute and read and write
28C55450000
heap
page read and write
22781941000
trusted library allocation
page read and write
7FFD34850000
trusted library allocation
page read and write
2877BFF000
stack
page read and write
7FFD34740000
trusted library allocation
page read and write
C00000C000
direct allocation
page read and write
C000096000
direct allocation
page read and write
C0000A2000
direct allocation
page read and write
C000016000
direct allocation
page read and write
7FFD346D0000
trusted library allocation
page read and write
28C6F6B6000
heap
page execute and read and write
7FFD34630000
trusted library allocation
page execute and read and write
28C55733000
trusted library allocation
page read and write
1EF71D17000
direct allocation
page read and write
17E9BFBC000
direct allocation
page read and write
28C6F6E0000
heap
page read and write
9F9C8FE000
stack
page read and write
7FFD34770000
trusted library allocation
page read and write
1EF703FB000
heap
page read and write
28C55730000
trusted library allocation
page read and write
28C6F4FE000
heap
page read and write
7FFD34720000
trusted library allocation
page read and write
9F9C6FE000
stack
page read and write
400000
remote allocation
page execute and read and write
28C557D0000
heap
page execute and read and write
62D000
remote allocation
page execute and read and write
1EF703FE000
heap
page read and write
28C6F96D000
heap
page read and write
7FFD346EA000
trusted library allocation
page read and write
227FF192000
unkown
page readonly
1EF71F30000
heap
page read and write
7FFD34770000
trusted library allocation
page read and write
17EE12B0000
direct allocation
page read and write
C00019C000
direct allocation
page read and write
28C557F0000
heap
page read and write
1EF70403000
heap
page read and write
8E857FE000
stack
page read and write
28C576F2000
trusted library allocation
page read and write
28C556E0000
trusted library allocation
page read and write
7FFD34730000
trusted library allocation
page read and write
7FFD34574000
trusted library allocation
page read and write
C000012000
direct allocation
page read and write
17E9BE70000
heap
page read and write
28C6753B000
trusted library allocation
page read and write
C00002A000
direct allocation
page read and write
9F9CB7A000
stack
page read and write
C000010000
direct allocation
page read and write
227FF250000
heap
page read and write
28C674C1000
trusted library allocation
page read and write
7FFD34720000
trusted library allocation
page execute and read and write
7FFD345E0000
trusted library allocation
page read and write
C000018000
direct allocation
page read and write
1EF703FD000
heap
page read and write
C0000BA000
direct allocation
page read and write
227FF220000
heap
page read and write
7FFD34860000
trusted library allocation
page read and write
7FFD34760000
trusted library allocation
page execute and read and write
C0001A7000
direct allocation
page read and write
7FFD345CC000
trusted library allocation
page execute and read and write
C00002C000
direct allocation
page read and write
28C555A1000
heap
page read and write
C000104000
direct allocation
page read and write
28C58D4A000
trusted library allocation
page read and write
C00000A000
direct allocation
page read and write
7FFD34690000
trusted library allocation
page execute and read and write
28C55440000
heap
page read and write
17E9BE45000
heap
page read and write
9F9C97D000
stack
page read and write
28C554E4000
heap
page read and write
28C6F55D000
heap
page read and write
227FF4C5000
heap
page read and write
9F9C3A3000
stack
page read and write
7FFD3459B000
trusted library allocation
page execute and read and write
17E9BE40000
heap
page read and write
7FFD34880000
trusted library allocation
page read and write
9F9CAF7000
stack
page read and write
1EF703D0000
heap
page read and write
C000002000
direct allocation
page read and write
227FF2EA000
heap
page read and write
9F9C67E000
stack
page read and write
7FFD34580000
trusted library allocation
page read and write
28C570D0000
heap
page read and write
695000
remote allocation
page execute and read and write
C000056000
direct allocation
page read and write
7FFD34582000
trusted library allocation
page read and write
17EE1233000
direct allocation
page read and write
8E854FE000
stack
page read and write
9F9CD7E000
stack
page read and write
227FF2F3000
heap
page read and write
1EF70270000
heap
page read and write
28C6F98F000
heap
page read and write
C000084000
direct allocation
page read and write
C00008C000
direct allocation
page read and write
22792C9E000
trusted library allocation
page read and write
22792B58000
trusted library allocation
page read and write
C00018A000
direct allocation
page read and write
17E9BE50000
heap
page read and write
227817F0000
trusted library allocation
page read and write
C00010D000
direct allocation
page read and write
8E850FC000
stack
page read and write
17E9BF70000
heap
page read and write
17EE1270000
direct allocation
page read and write
7FFD347E0000
trusted library allocation
page read and write
28C674CF000
trusted library allocation
page read and write
7FFD34587000
trusted library allocation
page read and write
2279A240000
trusted library section
page read and write
C000090000
direct allocation
page read and write
699000
remote allocation
page execute and read and write
C000049000
direct allocation
page read and write
7FFD34616000
trusted library allocation
page execute and read and write
28C6F514000
heap
page read and write
9F9D7CE000
stack
page read and write
C0000B8000
direct allocation
page read and write
17E9BFBA000
direct allocation
page read and write
C000038000
direct allocation
page read and write
7FFD34620000
trusted library allocation
page read and write
17EE1230000
direct allocation
page read and write
1EF703E7000
heap
page read and write
7FFD346E1000
trusted library allocation
page read and write
28C554B0000
heap
page read and write
28C6F9A3000
heap
page read and write
C00003F000
direct allocation
page read and write
7FFD34740000
trusted library allocation
page read and write
7FFD34750000
trusted library allocation
page read and write
1EF70403000
heap
page read and write
28C55546000
heap
page read and write
7DF4A8350000
trusted library allocation
page execute and read and write
7FFD34590000
trusted library allocation
page read and write
7FFD3475D000
trusted library allocation
page read and write
7FFD3459D000
trusted library allocation
page execute and read and write
28C55470000
heap
page read and write
1EF70370000
heap
page read and write
C0000A0000
direct allocation
page read and write
C00008E000
direct allocation
page read and write
49DB7FC000
stack
page read and write
28C67671000
trusted library allocation
page read and write
28C6F98C000
heap
page read and write
C0000AE000
direct allocation
page read and write
7FFD34573000
trusted library allocation
page execute and read and write
C00001E000
direct allocation
page read and write
C0000D2000
direct allocation
page read and write
C0000E2000
direct allocation
page read and write
22781982000
trusted library allocation
page read and write
7FFD34730000
trusted library allocation
page read and write
227FF230000
heap
page read and write
22781803000
trusted library allocation
page read and write
28C57170000
heap
page read and write
17E9BE78000
heap
page read and write
22793969000
trusted library allocation
page read and write
22791947000
trusted library allocation
page read and write
C000052000
direct allocation
page read and write
28C6F960000
heap
page read and write
22792949000
trusted library allocation
page read and write
7FFD347B0000
trusted library allocation
page read and write
2279A147000
heap
page read and write
22781800000
trusted library allocation
page read and write
9F9CDFB000
stack
page read and write
28C58D1F000
trusted library allocation
page read and write
28777FA000
stack
page read and write
49DBDFF000
stack
page read and write
C000098000
direct allocation
page read and write
C0000D7000
direct allocation
page read and write
C000106000
direct allocation
page read and write
28C57130000
heap
page execute and read and write
28C55509000
heap
page read and write
1EF703FF000
heap
page read and write
8E84FFF000
stack
page read and write
7FFD3457D000
trusted library allocation
page execute and read and write
28C55542000
heap
page read and write
7FFD34810000
trusted library allocation
page read and write
28C554FF000
heap
page read and write
8E84EFE000
stack
page read and write
227817D0000
trusted library allocation
page read and write
227FF367000
heap
page read and write
7FFD34780000
trusted library allocation
page read and write
17E9BFA0000
heap
page readonly
28C6F4FC000
heap
page read and write
28C5717A000
heap
page read and write
227FF196000
unkown
page readonly
C0000DB000
direct allocation
page read and write
C00010F000
direct allocation
page read and write
17E9BE7E000
heap
page read and write
17E9BD60000
heap
page read and write
7FFD34712000
trusted library allocation
page read and write
49DC1FE000
stack
page read and write
7FFD34830000
trusted library allocation
page read and write
227FF2BF000
heap
page read and write
C000094000
direct allocation
page read and write
C000023000
direct allocation
page read and write
22791951000
trusted library allocation
page read and write
7FFD34870000
trusted library allocation
page read and write
28C6F5B5000
heap
page read and write
6DF000
remote allocation
page execute and read and write
9F9C9F7000
stack
page read and write
28C6F9DE000
heap
page read and write
8E84CF3000
stack
page read and write
C0000B6000
direct allocation
page read and write
28C5551B000
heap
page read and write
28C6F950000
heap
page read and write
7FFD346F0000
trusted library allocation
page execute and read and write
7FFD3454B000
trusted library allocation
page read and write
C000014000
direct allocation
page read and write
227FF4C0000
heap
page read and write
28C557F5000
heap
page read and write
7FFD34750000
trusted library allocation
page read and write
28C6752F000
trusted library allocation
page read and write
1EF706A0000
heap
page read and write
227818D0000
heap
page execute and read and write
28C5754A000
trusted library allocation
page read and write
C000190000
direct allocation
page read and write
C0000B4000
direct allocation
page read and write
2279A110000
heap
page read and write
28C556F0000
heap
page readonly
49DBFFE000
stack
page read and write
C00007C000
direct allocation
page read and write
7FFD34820000
trusted library allocation
page read and write
C000058000
direct allocation
page read and write
7FFD3453D000
trusted library allocation
page execute and read and write
28C6F98A000
heap
page read and write
7FFD347C0000
trusted library allocation
page read and write
C00003D000
direct allocation
page read and write
1EF703A0000
heap
page read and write
C00010A000
direct allocation
page read and write
C0000D9000
direct allocation
page read and write
28C574C1000
trusted library allocation
page read and write
227FF2AC000
heap
page read and write
2279A230000
heap
page execute and read and write
C00018E000
direct allocation
page read and write
227FF280000
heap
page read and write
7FFD34532000
trusted library allocation
page read and write
28C56FA9000
heap
page read and write
227FF5E5000
heap
page read and write
7FFD3474E000
trusted library allocation
page read and write
28C58B7B000
trusted library allocation
page read and write
227FF28C000
heap
page read and write
22794369000
trusted library allocation
page read and write
17E9BFB4000
direct allocation
page read and write
22781991000
trusted library allocation
page read and write
7FFD34700000
trusted library allocation
page execute and read and write
28C6F97D000
heap
page read and write
C00019E000
direct allocation
page read and write
28C59027000
trusted library allocation
page read and write
7FFD34840000
trusted library allocation
page read and write
7FFD3458B000
trusted library allocation
page read and write
C0000C6000
direct allocation
page read and write
C00004F000
direct allocation
page read and write
7FFD34780000
trusted library allocation
page read and write
7FFD345F0000
trusted library allocation
page execute and read and write
7FFD34776000
trusted library allocation
page read and write
28C580F2000
trusted library allocation
page read and write
7FFD34710000
trusted library allocation
page read and write
C00001A000
direct allocation
page read and write
7FFD347A0000
trusted library allocation
page read and write
7FFD347F0000
trusted library allocation
page read and write
7FFD34760000
trusted library allocation
page read and write
9F9C87E000
stack
page read and write
There are 352 hidden memdumps, click here to show them.