IOC Report
BNXCXCJSD.jse

loading gif

Files

File Path
Type
Category
Malicious
BNXCXCJSD.jse
C source, ASCII text, with CRLF line terminators
initial sample
malicious
C:\Temp\dddddd.ps1
ASCII text, with very long lines (65494), with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\x.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\x.exe.log
CSV text
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\1nl3hc[1].ps1
ASCII text, with very long lines (65494), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_40mec3sk.4kn.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_tbifcua2.v3p.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\Documents\NOVA\Captured.png
PNG image data, 1280 x 1024, 8-bit/color RGBA, non-interlaced
dropped

Processes

Path
Cmdline
Malicious
C:\Windows\System32\wscript.exe
C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\BNXCXCJSD.jse"
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy RemoteSigned -File "C:\Temp\dddddd.ps1"
malicious
C:\Users\user\AppData\Local\Temp\x.exe
"C:\Users\user\AppData\Local\Temp\x.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://sectigo.com/CPS0
unknown
https://reallyfreegeoip.org/xml/8.46.123.189
104.21.16.1
http://ocsp.sectigo.com0
unknown
http://pesterbdd.com/images/Pester.png
unknown
https://api.telegram.org/bot
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://www.microsoft.co
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://files.catbox.moe/1nl3hc.ps1C
unknown
http://checkip.dyndns.org
unknown
https://files.catbox.moe/
unknown
https://files.catbox.moe/1nl3hc.ps1
108.181.20.35
https://github.com/Pester/Pester
unknown
http://checkip.dyndns.org/B&
unknown
https://files.catbox.moe;
unknown
https://files.catbox.moe/1nl3hc.ps1u
unknown
http://checkip.dyndns.org/
132.226.247.73
http://checkip.dyndns.org/:&
unknown
https://files.catbox.moe/1nl3hc.ps1q
unknown
http://checkip.dyndns.org/q
unknown
https://contoso.com/
unknown
https://files.catbox.moe/:
unknown
https://nuget.org/nuget.exe
unknown
https://oneget.orgX
unknown
https://aka.ms/pscore68
unknown
https://files.catbox.moe
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://files.catbox.moe/1nl3hc.ps1l
unknown
https://api.telegram.org/bot-/sendDocument?chat_id=
unknown
https://files.catbox.moe/1nl3hc.ps1:CreateObject
unknown
https://oneget.org
unknown
https://reallyfreegeoip.org/xml/
unknown
There are 26 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
webmail.justbumpersplus.com
50.87.249.44
malicious
files.catbox.moe
108.181.20.35
reallyfreegeoip.org
104.21.16.1
checkip.dyndns.com
132.226.247.73
checkip.dyndns.org
unknown

IPs

IP
Domain
Country
Malicious
50.87.249.44
webmail.justbumpersplus.com
United States
malicious
104.21.16.1
reallyfreegeoip.org
United States
108.181.20.35
files.catbox.moe
Canada
132.226.247.73
checkip.dyndns.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows Script\Settings\Telemetry\wscript.exe
JScriptSetScriptStateStarted
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS
FileDirectory
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
4046000
trusted library allocation
page read and write
malicious
680E000
stack
page read and write
35ACBDE000
stack
page read and write
18CD5FBC000
heap
page read and write
18CD3F02000
heap
page read and write
3193000
trusted library allocation
page read and write
7FFD34224000
trusted library allocation
page read and write
1C85F600000
trusted library allocation
page read and write
18CD5F91000
heap
page read and write
145E000
stack
page read and write
31B4000
trusted library allocation
page read and write
1C8625A1000
trusted library allocation
page read and write
1C85F3CE000
heap
page read and write
26C0000
heap
page read and write
9F0000
heap
page read and write
1C861248000
trusted library allocation
page read and write
18CD67B6000
heap
page read and write
35ADF4E000
stack
page read and write
18CD5D20000
heap
page read and write
18CD5F8B000
heap
page read and write
62EF000
stack
page read and write
1C861F9E000
trusted library allocation
page read and write
1C87933B000
heap
page read and write
1C87122F000
trusted library allocation
page read and write
35AD47B000
stack
page read and write
740E000
stack
page read and write
12C4000
trusted library allocation
page read and write
1C85F650000
heap
page execute and read and write
18CD5FBA000
heap
page read and write
4D0E000
stack
page read and write
8C10000
heap
page read and write
4151000
trusted library allocation
page read and write
18CD3F2F000
heap
page read and write
2800000
heap
page execute and read and write
57F6000
trusted library allocation
page read and write
18CD5F7D000
heap
page read and write
1130000
heap
page read and write
1C8714AA000
trusted library allocation
page read and write
5A4E000
stack
page read and write
7FFD34440000
trusted library allocation
page read and write
18CD3F02000
heap
page read and write
18CD5D3E000
heap
page read and write
7FFD3422D000
trusted library allocation
page execute and read and write
18CD5FE8000
heap
page read and write
18CD3F69000
heap
page read and write
281F000
trusted library allocation
page read and write
13AE000
heap
page read and write
18CD3EE8000
heap
page read and write
7FFD34420000
trusted library allocation
page read and write
8C1C000
heap
page read and write
BED000
heap
page read and write
3151000
trusted library allocation
page read and write
18CD3EE2000
heap
page read and write
18CD60D0000
heap
page read and write
7140000
trusted library allocation
page execute and read and write
72FE000
stack
page read and write
18CD3DA0000
heap
page read and write
7FFD344B0000
trusted library allocation
page read and write
18CD3F04000
heap
page read and write
490E000
stack
page read and write
63ED000
stack
page read and write
7FFD34402000
trusted library allocation
page read and write
18CD3ED4000
heap
page read and write
155E000
stack
page read and write
6588000
heap
page read and write
18CD5FE8000
heap
page read and write
18CD67A2000
heap
page read and write
7FFD343DA000
trusted library allocation
page read and write
1C8794CC000
heap
page read and write
37048FE000
stack
page read and write
18CD5D44000
heap
page read and write
18CD5F73000
heap
page read and write
18CD3E9F000
heap
page read and write
BB0000
trusted library allocation
page read and write
12E0000
trusted library allocation
page read and write
13A8000
heap
page read and write
2819000
trusted library allocation
page read and write
18CD5D38000
heap
page read and write
55CD000
stack
page read and write
7FFD34430000
trusted library allocation
page read and write
7FFD344D0000
trusted library allocation
page read and write
1190000
heap
page read and write
3206000
trusted library allocation
page read and write
18CD40FA000
heap
page read and write
18CD6060000
heap
page read and write
7FFD34340000
trusted library allocation
page execute and read and write
1C85F620000
trusted library allocation
page read and write
1359000
heap
page read and write
25DE000
stack
page read and write
7FFD34450000
trusted library allocation
page read and write
3811000
trusted library allocation
page read and write
1C8611C1000
trusted library allocation
page read and write
7FFD342D0000
trusted library allocation
page read and write
1C85F46C000
heap
page read and write
1C862FC0000
trusted library allocation
page read and write
2811000
trusted library allocation
page read and write
1C8624F7000
trusted library allocation
page read and write
18CD5FBC000
heap
page read and write
9E7000
trusted library allocation
page execute and read and write
25E8000
trusted library allocation
page read and write
18CD5F67000
heap
page read and write
18CD6002000
heap
page read and write
7300000
trusted library allocation
page read and write
18CD6002000
heap
page read and write
452000
unkown
page readonly
18CD5F90000
heap
page read and write
18CD5F3C000
heap
page read and write
18CD5FE8000
heap
page read and write
18CD5F73000
heap
page read and write
1797000
heap
page read and write
7FFD34223000
trusted library allocation
page execute and read and write
4E8E000
stack
page read and write
18CD5D4C000
heap
page read and write
71C0000
heap
page read and write
DBE000
stack
page read and write
18CD5FBA000
heap
page read and write
18CD6002000
heap
page read and write
50C000
stack
page read and write
7FFD34490000
trusted library allocation
page read and write
35AD37F000
stack
page read and write
18CD5D22000
heap
page read and write
18CD3F29000
heap
page read and write
1C87954A000
heap
page read and write
18CD5F8B000
heap
page read and write
7FFD34550000
trusted library allocation
page read and write
18CD5F49000
heap
page read and write
18CD5EA0000
remote allocation
page read and write
18CD3F2F000
heap
page read and write
18CD3F69000
heap
page read and write
18CD5FE8000
heap
page read and write
7FFD344E0000
trusted library allocation
page read and write
18CD3F04000
heap
page read and write
18CD6002000
heap
page read and write
57F0000
trusted library allocation
page read and write
1320000
heap
page read and write
3704BFF000
stack
page read and write
2F00000
trusted library allocation
page read and write
3704FFE000
stack
page read and write
2EF3000
heap
page read and write
1C85F370000
heap
page read and write
18CD5F87000
heap
page read and write
8C00000
heap
page read and write
3189000
trusted library allocation
page read and write
18CD3ED0000
heap
page read and write
1C85F640000
trusted library allocation
page read and write
35AD278000
stack
page read and write
37047FE000
stack
page read and write
7DF4269A0000
trusted library allocation
page execute and read and write
DC0000
heap
page read and write
71BB000
stack
page read and write
35ACEFE000
stack
page read and write
18CD5E70000
heap
page read and write
1C879373000
heap
page read and write
12C0000
trusted library allocation
page read and write
1C85F3B4000
heap
page read and write
1C862D3F000
trusted library allocation
page read and write
7FFD34540000
trusted library allocation
page read and write
BCB000
heap
page read and write
18CD5EA0000
remote allocation
page read and write
1C879287000
heap
page execute and read and write
3010000
trusted library allocation
page read and write
5C0000
heap
page read and write
666D000
stack
page read and write
35ACB1E000
stack
page read and write
281B000
trusted library allocation
page read and write
4CCE000
stack
page read and write
18CD5F85000
heap
page read and write
159C000
stack
page read and write
2F2B000
trusted library allocation
page read and write
18CD3E70000
heap
page read and write
1C862CB8000
trusted library allocation
page read and write
18CD3F31000
heap
page read and write
18CD3EEF000
heap
page read and write
18CD5D2E000
heap
page read and write
7FFD342D6000
trusted library allocation
page read and write
18CD40F9000
heap
page read and write
883E000
stack
page read and write
3704EFA000
stack
page read and write
1310000
trusted library allocation
page read and write
35ACFFF000
stack
page read and write
2EBB000
trusted library allocation
page read and write
4D80000
heap
page execute and read and write
1C85F378000
heap
page read and write
1C85F2F0000
heap
page read and write
18CD5D37000
heap
page read and write
18CD3F29000
heap
page read and write
18CD3EF0000
heap
page read and write
7FFD344F0000
trusted library allocation
page read and write
18CD3EA0000
heap
page read and write
1C8711C1000
trusted library allocation
page read and write
1C879541000
heap
page read and write
18CD5FBC000
heap
page read and write
18CD3EEB000
heap
page read and write
18CD5D44000
heap
page read and write
18CD3ED9000
heap
page read and write
6D2A000
stack
page read and write
1C85F3F6000
heap
page read and write
18CD6290000
heap
page read and write
18CD40FB000
heap
page read and write
18CD3ED0000
heap
page read and write
81D9000
trusted library allocation
page read and write
18CD5D4B000
heap
page read and write
7FFD34306000
trusted library allocation
page execute and read and write
9EB000
trusted library allocation
page execute and read and write
12CD000
trusted library allocation
page execute and read and write
1C8794A0000
heap
page execute and read and write
18CD5F67000
heap
page read and write
1C879290000
heap
page read and write
3020000
trusted library allocation
page execute and read and write
1C879280000
heap
page execute and read and write
7160000
trusted library allocation
page read and write
5ACE000
stack
page read and write
18CD3F29000
heap
page read and write
7FFD343D1000
trusted library allocation
page read and write
65A2000
heap
page read and write
18CD3EC3000
heap
page read and write
18CD5D3F000
heap
page read and write
18CD5FE2000
heap
page read and write
18CD5D21000
heap
page read and write
2EDD000
trusted library allocation
page read and write
7FFD344C0000
trusted library allocation
page read and write
1C85F660000
heap
page read and write
7FFD343F0000
trusted library allocation
page execute and read and write
18CD5D44000
heap
page read and write
35ACB9E000
stack
page read and write
18CD5FE8000
heap
page read and write
18CD5D23000
heap
page read and write
18CD5FE2000
heap
page read and write
2EBE000
trusted library allocation
page read and write
18CD40F5000
heap
page read and write
132B000
heap
page read and write
5B10000
trusted library allocation
page read and write
1780000
trusted library allocation
page read and write
71D0000
trusted library allocation
page read and write
18CD3EEB000
heap
page read and write
2F20000
trusted library allocation
page read and write
5E4000
trusted library allocation
page read and write
12B0000
trusted library allocation
page read and write
57CE000
stack
page read and write
400000
remote allocation
page execute and read and write
1C862CE4000
trusted library allocation
page read and write
12C3000
trusted library allocation
page execute and read and write
7FFD34222000
trusted library allocation
page read and write
BCE000
heap
page read and write
35ACA93000
stack
page read and write
3202000
trusted library allocation
page read and write
570000
heap
page read and write
12F7000
trusted library allocation
page execute and read and write
81D6000
trusted library allocation
page read and write
18CD3F04000
heap
page read and write
2ECE000
trusted library allocation
page read and write
18CD5D4B000
heap
page read and write
1C8711D0000
trusted library allocation
page read and write
35ACE7E000
stack
page read and write
6990000
trusted library allocation
page read and write
35AD2F7000
stack
page read and write
7FFD34500000
trusted library allocation
page read and write
2EF0000
heap
page read and write
1C86159A000
trusted library allocation
page read and write
18CD5F88000
heap
page read and write
642E000
stack
page read and write
3704DFE000
stack
page read and write
BC0000
heap
page read and write
18CD5F62000
heap
page read and write
12F5000
trusted library allocation
page execute and read and write
1C8627E3000
trusted library allocation
page read and write
1C860CB0000
trusted library allocation
page read and write
18CD6050000
heap
page read and write
1C87952D000
heap
page read and write
1C85F630000
heap
page readonly
18CD3F04000
heap
page read and write
71F5000
heap
page read and write
4C8E000
stack
page read and write
450000
unkown
page readonly
580000
heap
page read and write
1C85F3FC000
heap
page read and write
2F58000
trusted library allocation
page read and write
35AD3FE000
stack
page read and write
18CD5F00000
heap
page read and write
18CD3EC7000
heap
page read and write
BA0000
trusted library allocation
page execute and read and write
873E000
stack
page read and write
1C85F41E000
heap
page read and write
18CD5F8B000
heap
page read and write
1196000
heap
page read and write
35AD0FD000
stack
page read and write
31C4000
trusted library allocation
page read and write
1C862D04000
trusted library allocation
page read and write
2F40000
heap
page read and write
18CD3F2F000
heap
page read and write
3704AFF000
stack
page read and write
61EE000
stack
page read and write
31BD000
trusted library allocation
page read and write
18CD5E75000
heap
page read and write
1C85F2D0000
heap
page read and write
1363000
heap
page read and write
1C879525000
heap
page read and write
652F000
stack
page read and write
BEB000
heap
page read and write
C29000
heap
page read and write
37053FF000
stack
page read and write
41FF000
trusted library allocation
page read and write
12EA000
trusted library allocation
page execute and read and write
18CD6002000
heap
page read and write
2EAF000
stack
page read and write
694D000
stack
page read and write
6670000
trusted library allocation
page execute and read and write
18CD3EB5000
heap
page read and write
35AD07E000
stack
page read and write
18CD3F29000
heap
page read and write
18CD3ED9000
heap
page read and write
12DD000
trusted library allocation
page execute and read and write
71F0000
heap
page read and write
1C8792E6000
heap
page read and write
18CD40F0000
heap
page read and write
5B0D000
stack
page read and write
18CD3F29000
heap
page read and write
3030000
trusted library allocation
page read and write
C02000
heap
page read and write
26BE000
stack
page read and write
35AD4FE000
stack
page read and write
1C8613F2000
trusted library allocation
page read and write
1C87123B000
trusted library allocation
page read and write
3040000
heap
page execute and read and write
31E9000
trusted library allocation
page read and write
18CD3EE1000
heap
page read and write
18CD3F02000
heap
page read and write
3197000
trusted library allocation
page read and write
18CD3F29000
heap
page read and write
31AD000
trusted library allocation
page read and write
18CD5D35000
heap
page read and write
18CD5F73000
heap
page read and write
5614000
trusted library allocation
page read and write
18CD5FBA000
heap
page read and write
2ED1000
trusted library allocation
page read and write
31CD000
trusted library allocation
page read and write
18CD5D35000
heap
page read and write
81DE000
trusted library allocation
page read and write
18CD5F49000
heap
page read and write
57D0000
trusted library allocation
page execute and read and write
6CEE000
stack
page read and write
1416000
heap
page read and write
18CD3ED9000
heap
page read and write
1790000
heap
page read and write
1760000
trusted library allocation
page execute and read and write
2EB0000
trusted library allocation
page read and write
B3E000
stack
page read and write
1C85F330000
heap
page read and write
71E0000
heap
page read and write
18CD5D2E000
heap
page read and write
DE0000
trusted library allocation
page read and write
12D0000
trusted library allocation
page read and write
12F0000
trusted library allocation
page read and write
35ACF7C000
stack
page read and write
1C85F3AE000
heap
page read and write
1C85F382000
heap
page read and write
7FFD34520000
trusted library allocation
page read and write
5D0000
trusted library allocation
page read and write
6F2C000
stack
page read and write
6530000
heap
page read and write
684C000
stack
page read and write
6579000
heap
page read and write
18CD6002000
heap
page read and write
DF0000
heap
page read and write
37052FB000
stack
page read and write
6BEE000
stack
page read and write
18CD5FBA000
heap
page read and write
27CF000
stack
page read and write
B7E000
stack
page read and write
7130000
heap
page read and write
10F7000
stack
page read and write
1C85F3B8000
heap
page read and write
7FFD34230000
trusted library allocation
page read and write
37046F2000
stack
page read and write
18CD3DD0000
heap
page read and write
524C000
stack
page read and write
18CD5FBC000
heap
page read and write
1C860E75000
heap
page read and write
1C8794C0000
heap
page read and write
9F5000
heap
page read and write
314F000
stack
page read and write
7FFD343E0000
trusted library allocation
page execute and read and write
7FFD342DC000
trusted library allocation
page execute and read and write
18CD5EA0000
remote allocation
page read and write
7FFD34460000
trusted library allocation
page read and write
35AD179000
stack
page read and write
12E2000
trusted library allocation
page read and write
1770000
trusted library allocation
page read and write
7410000
heap
page read and write
18CD5F30000
heap
page read and write
1C879800000
heap
page read and write
18CD5FBC000
heap
page read and write
37050FD000
stack
page read and write
702D000
stack
page read and write
18CD5F62000
heap
page read and write
3704CFF000
stack
page read and write
18CD5D4F000
heap
page read and write
561A000
trusted library allocation
page read and write
18CD66A0000
heap
page read and write
18CD5F81000
heap
page read and write
1C85F1F0000
heap
page read and write
18CD5D44000
heap
page read and write
BF5000
heap
page read and write
66D0000
heap
page read and write
5B20000
trusted library allocation
page read and write
12F2000
trusted library allocation
page read and write
13EC000
heap
page read and write
18CD5F20000
heap
page read and write
18CD3F02000
heap
page read and write
1C879342000
heap
page read and write
1C85F665000
heap
page read and write
12E6000
trusted library allocation
page execute and read and write
7FFD34530000
trusted library allocation
page read and write
5A8D000
stack
page read and write
5E0000
trusted library allocation
page read and write
1C86159E000
trusted library allocation
page read and write
1C8793C0000
heap
page read and write
5E3000
trusted library allocation
page execute and read and write
18CD3EF4000
heap
page read and write
18CD3F2C000
heap
page read and write
7FFD34480000
trusted library allocation
page read and write
3184000
trusted library allocation
page read and write
D8A000
stack
page read and write
35AD57B000
stack
page read and write
18CD59D0000
heap
page read and write
18CD5F93000
heap
page read and write
5800000
heap
page execute and read and write
1C8792EC000
heap
page read and write
1100000
heap
page read and write
18CD5D44000
heap
page read and write
15A7000
heap
page read and write
7FFD34410000
trusted library allocation
page execute and read and write
7FFD344A0000
trusted library allocation
page read and write
18CD5F47000
heap
page read and write
18CD5D2F000
heap
page read and write
18CD3F43000
heap
page read and write
5616000
trusted library allocation
page read and write
18CD3F69000
heap
page read and write
7FFD342E0000
trusted library allocation
page execute and read and write
7D00000
trusted library allocation
page read and write
5F4000
trusted library allocation
page read and write
BE8000
heap
page read and write
1C860E70000
heap
page read and write
7FFD343C0000
trusted library allocation
page read and write
18CD3F36000
heap
page read and write
7FFD3423B000
trusted library allocation
page read and write
DF0000
heap
page read and write
322C000
trusted library allocation
page read and write
18CD5F67000
heap
page read and write
730D000
stack
page read and write
18CD3DB0000
heap
page read and write
5F0000
trusted library allocation
page read and write
15A0000
heap
page read and write
5803000
heap
page execute and read and write
18CD3EB1000
heap
page read and write
5B30000
heap
page execute and read and write
1740000
heap
page read and write
560D000
stack
page read and write
7FFD34510000
trusted library allocation
page read and write
7FFD34470000
trusted library allocation
page read and write
18CD40FC000
heap
page read and write
1C87951B000
heap
page read and write
18CD5FBA000
heap
page read and write
5ED000
trusted library allocation
page execute and read and write
18CD3F3E000
heap
page read and write
7120000
heap
page read and write
18CD67A1000
heap
page read and write
1366000
heap
page read and write
18CD5D38000
heap
page read and write
18CD5FE8000
heap
page read and write
6D6C000
stack
page read and write
18CD62A0000
trusted library allocation
page read and write
18CD5F81000
heap
page read and write
18CD5F81000
heap
page read and write
18CD5F62000
heap
page read and write
1C860E00000
heap
page read and write
A3E000
stack
page read and write
8F9000
stack
page read and write
2ED6000
trusted library allocation
page read and write
35AD1F7000
stack
page read and write
1C879502000
heap
page read and write
12FB000
trusted library allocation
page execute and read and write
There are 473 hidden memdumps, click here to show them.