IOC Report
wIaKimJFke.exe

loading gif

Files

File Path
Type
Category
Malicious
wIaKimJFke.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\3D003UC5\cred64[1].dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\ZVZFKMB9\clip64[1].dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\00c07260dc\explorgu.exe
PE32 executable (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
malicious
C:\Users\user\AppData\Roaming\006700e5a2ab05\clip64.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\006700e5a2ab05\cred64.dll
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\00c07260dc\explorgu.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
C:\Users\user\AppData\Local\Temp\_Files_\AIXACVYBSB.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\AIXACVYBSB.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\DTBZGIOOSO.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\KATAXZVCPS.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\NHPKIZUUSG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\VLZDGUKUTZ.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\XZXHAVGRAG.docx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\_Files_\XZXHAVGRAG.xlsx
ASCII text, with very long lines (1024), with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_3xnwzpq5.2iu.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_cipsawgy.e15.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_renydpxy.mj4.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_vmy1tnrq.lsz.psm1
ASCII text, with no line terminators
dropped
C:\Windows\Tasks\explorgu.job
data
dropped
There are 12 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\wIaKimJFke.exe
"C:\Users\user\Desktop\wIaKimJFke.exe"
malicious
C:\Users\user\AppData\Local\Temp\00c07260dc\explorgu.exe
C:\Users\user\AppData\Local\Temp\00c07260dc\explorgu.exe
malicious
C:\Users\user\AppData\Local\Temp\00c07260dc\explorgu.exe
C:\Users\user\AppData\Local\Temp\00c07260dc\explorgu.exe
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
malicious
C:\Windows\System32\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\006700e5a2ab05\cred64.dll, Main
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profiles
malicious
C:\Windows\SysWOW64\rundll32.exe
"C:\Windows\System32\rundll32.exe" C:\Users\user\AppData\Roaming\006700e5a2ab05\clip64.dll, Main
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell -Command Compress-Archive -Path 'C:\Users\user\AppData\Local\Temp\_Files_\' -DestinationPath 'C:\Users\user\AppData\Local\Temp\246122658369_Desktop.zip' -CompressionLevel Optimal
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
http://185.215.113.32/yandex/Plugins/clip64.dll
185.215.113.32
malicious
http://185.215.113.32/yandex/index.php
185.215.113.32
malicious
http://185.215.113.32/yandex/Plugins/cred64.dll
185.215.113.32
malicious
http://185.215.113.32/yandex/index.php?wal=1
185.215.113.32
malicious
http://nuget.org/NuGet.exe
unknown
https://aka.ms/winsvr-2022-pshelp
unknown
https://go.microsoft.co
unknown
http://185.215.113.32/yandex/index.php%
unknown
http://schemas.xmlsoap.org/soap/encoding/
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://185.215.113.32/yandex/index.phpg
unknown
http://185.215.113.32/yandex/index.phpa
unknown
https://contoso.com/License
unknown
http://185.215.113.32/yandex/index.php2ab05
unknown
https://contoso.com/Icon
unknown
http://185.215.113.32/yandex/index.phprsion
unknown
https://aka.ms/winsvr-2022-pshelpX
unknown
http://185.215.113.32/yandex/index.phpVl
unknown
http://185.215.113.32/yandex/index.phpK
unknown
http://185.215.113.32/yandex/Plugins/clip64.dll1
unknown
http://185.215.113.32/yandex/index.php:10
unknown
https://github.com/Pester/Pester
unknown
http://185.215.113.32/yandex/Plugins/clip64.dll&
unknown
http://185.215.113.32/yandex/index.phpWindows
unknown
http://185.215.113.32/ws
unknown
http://185.215.113.32/yandex/index.php?wal=1tesf
unknown
http://185.215.113.32/yandex/index.php?wal=1r
unknown
http://schemas.xmlsoap.org/wsdl/
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
http://185.215.113.32/
unknown
http://185.215.113.32/yandex/index.phpa2ab05
unknown
http://185.215.113.32/yandex/index.phpn
unknown
http://185.215.113.32/yandex/index.phpp
unknown
http://185.215.113.32/yandex/index.phpa0
unknown
https://aka.ms/pscore68
unknown
http://185.215.113.32/yandex/index.php?wal=1&
unknown
http://185.215.113.32/yandex/index.phpu
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://185.215.113.32/yandex/Plugins/cred64.dll2
unknown
http://185.215.113.32/yandex/index.phpx
unknown
There are 32 hidden URLs, click here to show them.

IPs

IP
Domain
Country
Malicious
185.215.113.32
unknown
Portugal
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
4CC0000
direct allocation
page read and write
malicious
2A1000
unkown
page execute and read and write
malicious
6E221000
unkown
page execute read
malicious
4E1000
unkown
page execute and read and write
malicious
4CC0000
direct allocation
page read and write
malicious
2A1000
unkown
page execute and read and write
malicious
4C90000
direct allocation
page read and write
malicious
DA4000
heap
page read and write
F20000
heap
page read and write
4E70000
direct allocation
page execute and read and write
4821000
heap
page read and write
4E60000
direct allocation
page execute and read and write
28334A44000
heap
page read and write
4811000
heap
page read and write
4821000
heap
page read and write
6CF000
unkown
page execute and read and write
7FFD9B5E0000
trusted library allocation
page read and write
53EE000
stack
page read and write
4821000
heap
page read and write
E84000
heap
page read and write
5A1000
unkown
page execute and read and write
E84000
heap
page read and write
4E40000
direct allocation
page execute and read and write
546000
unkown
page read and write
37DF000
stack
page read and write
5D70000
heap
page read and write
992000
unkown
page execute and write copy
6C10000
heap
page read and write
4DE0000
direct allocation
page execute and read and write
200453B0000
heap
page read and write
626E000
stack
page read and write
4821000
heap
page read and write
10D3000
heap
page read and write
305F000
stack
page read and write
7FFD9B860000
trusted library allocation
page read and write
340F000
stack
page read and write
E84000
heap
page read and write
FB1000
heap
page read and write
E84000
heap
page read and write
2005F480000
heap
page execute and read and write
4821000
heap
page read and write
200480F1000
trusted library allocation
page read and write
4821000
heap
page read and write
CA97DFE000
stack
page read and write
7FFD9B970000
trusted library allocation
page read and write
473E000
stack
page read and write
4CB0000
direct allocation
page read and write
28334A0B000
heap
page read and write
283365B2000
heap
page read and write
7FFD9B8A0000
trusted library allocation
page read and write
3B8F000
stack
page read and write
5A1000
unkown
page execute and read and write
6E23B000
unkown
page read and write
35BE000
stack
page read and write
2004886F000
trusted library allocation
page read and write
4CB0000
direct allocation
page read and write
471E000
stack
page read and write
4F44000
heap
page read and write
4811000
heap
page read and write
3BFE000
stack
page read and write
7DA000
unkown
page execute and read and write
4E20000
direct allocation
page execute and read and write
470E000
stack
page read and write
2005F8B0000
trusted library allocation
page read and write
4E50000
direct allocation
page execute and read and write
5B1000
unkown
page execute and write copy
2B4B000
stack
page read and write
2A30000
heap
page read and write
849C000
stack
page read and write
546000
unkown
page write copy
F44000
heap
page read and write
2A40000
direct allocation
page read and write
7FFD9B880000
trusted library allocation
page read and write
548000
unkown
page execute and read and write
E84000
heap
page read and write
330E000
stack
page read and write
7FFD9B950000
trusted library allocation
page read and write
20057602000
trusted library allocation
page read and write
7FFD9BA40000
trusted library allocation
page read and write
1060000
direct allocation
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
341F000
stack
page read and write
4821000
heap
page read and write
7DF43D6B0000
trusted library allocation
page execute and read and write
4811000
heap
page read and write
E2A000
heap
page read and write
4811000
heap
page read and write
E84000
heap
page read and write
36FE000
stack
page read and write
48F000
unkown
page execute and read and write
4821000
heap
page read and write
60EC000
stack
page read and write
2C30000
heap
page read and write
7FFD9B7C2000
trusted library allocation
page read and write
2005F453000
heap
page read and write
3719D7F000
stack
page read and write
200488E3000
trusted library allocation
page read and write
4831000
heap
page read and write
7FFD9B5F0000
trusted library allocation
page read and write
434E000
stack
page read and write
3E0F000
stack
page read and write
3719753000
stack
page read and write
20048B77000
trusted library allocation
page read and write
752000
unkown
page execute and write copy
50B0000
heap
page read and write
307B000
stack
page read and write
306000
unkown
page write copy
50C0000
heap
page read and write
7FFD9B960000
trusted library allocation
page read and write
2A50000
heap
page read and write
2F40000
heap
page read and write
E84000
heap
page read and write
F85000
heap
page read and write
4811000
heap
page read and write
332A000
heap
page read and write
C16DEF4000
stack
page read and write
4811000
heap
page read and write
DA4000
heap
page read and write
98F000
unkown
page execute and read and write
3FBE000
stack
page read and write
4920000
trusted library allocation
page read and write
3200000
heap
page read and write
DA4000
heap
page read and write
45DE000
stack
page read and write
29F09000000
trusted library allocation
page read and write
7F1000
unkown
page execute and write copy
2005F382000
heap
page read and write
E84000
heap
page read and write
200487FF000
trusted library allocation
page read and write
36BF000
stack
page read and write
4811000
heap
page read and write
1060000
direct allocation
page read and write
20048883000
trusted library allocation
page read and write
2005F6D2000
heap
page read and write
2B7F000
stack
page read and write
4DCF000
stack
page read and write
29F08E49000
heap
page read and write
E84000
heap
page read and write
4821000
heap
page read and write
306000
unkown
page write copy
DA4000
heap
page read and write
4811000
heap
page read and write
28334DA5000
heap
page read and write
5B0000
unkown
page execute and read and write
4821000
heap
page read and write
41DF000
stack
page read and write
4821000
heap
page read and write
61ED000
stack
page read and write
7FFD9B948000
trusted library allocation
page read and write
2A40000
direct allocation
page read and write
6C1E000
heap
page read and write
371A1BE000
stack
page read and write
1077000
heap
page read and write
397E000
stack
page read and write
F44000
heap
page read and write
371AC8E000
stack
page read and write
4E30000
direct allocation
page execute and read and write
2E1E000
stack
page read and write
283366E0000
heap
page read and write
20048816000
trusted library allocation
page read and write
1060000
direct allocation
page read and write
E84000
heap
page read and write
2A40000
direct allocation
page read and write
2005F75D000
heap
page read and write
F30000
direct allocation
page read and write
7FFD9B6C6000
trusted library allocation
page execute and read and write
7FFD9B700000
trusted library allocation
page execute and read and write
DA4000
heap
page read and write
4821000
heap
page read and write
2004560C000
heap
page read and write
F44000
heap
page read and write
301000
unkown
page execute and read and write
20057331000
trusted library allocation
page read and write
FBB000
heap
page read and write
CA97CFF000
stack
page read and write
2E4E000
stack
page read and write
2005F69E000
heap
page read and write
F44000
heap
page read and write
4821000
heap
page read and write
2005F5B0000
heap
page read and write
7F0000
unkown
page execute and read and write
480F000
stack
page read and write
20048859000
trusted library allocation
page read and write
4811000
heap
page read and write
4811000
heap
page read and write
2DFF000
stack
page read and write
283365B0000
heap
page read and write
20057384000
trusted library allocation
page read and write
28334A2E000
heap
page read and write
433F000
stack
page read and write
4DFF000
stack
page read and write
2004836C000
trusted library allocation
page read and write
2E8F000
stack
page read and write
F30000
direct allocation
page read and write
DA4000
heap
page read and write
391F000
stack
page read and write
4821000
heap
page read and write
ED0000
heap
page read and write
E84000
heap
page read and write
7FFD9B913000
trusted library allocation
page read and write
F30000
direct allocation
page read and write
E84000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
28334A2E000
heap
page read and write
E50000
heap
page read and write
7FFD9B8B0000
trusted library allocation
page read and write
7FFD9B600000
trusted library allocation
page read and write
28334DA0000
heap
page read and write
7FFD9B791000
trusted library allocation
page read and write
E84000
heap
page read and write
283365B6000
heap
page read and write
29F08D50000
heap
page read and write
5B0000
unkown
page execute and read and write
28334A48000
heap
page read and write
7FFD9B7B0000
trusted library allocation
page execute and read and write
C16DEFE000
stack
page read and write
4821000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
2A0000
unkown
page readonly
4E30000
direct allocation
page execute and read and write
D3A000
stack
page read and write
4E00000
direct allocation
page execute and read and write
4821000
heap
page read and write
2DC0000
heap
page read and write
F44000
heap
page read and write
2F7E000
stack
page read and write
E84000
heap
page read and write
DA4000
heap
page read and write
510E000
stack
page read and write
29F09080000
heap
page read and write
7FFD9BA80000
trusted library allocation
page execute and read and write
E84000
heap
page read and write
4821000
heap
page read and write
46DF000
stack
page read and write
423E000
stack
page read and write
458F000
stack
page read and write
E84000
heap
page read and write
518D000
stack
page read and write
4E00000
direct allocation
page execute and read and write
308000
unkown
page execute and read and write
449E000
stack
page read and write
F40000
heap
page read and write
100E000
stack
page read and write
4811000
heap
page read and write
4811000
heap
page read and write
7FFD9B930000
trusted library allocation
page read and write
3120000
heap
page read and write
2005F771000
heap
page read and write
6E220000
unkown
page readonly
4821000
heap
page read and write
7FFD9B820000
trusted library allocation
page read and write
750000
unkown
page execute and write copy
30BE000
stack
page read and write
2F1F000
stack
page read and write
4E0000
unkown
page read and write
4E30000
direct allocation
page execute and read and write
359E000
stack
page read and write
542F000
stack
page read and write
4811000
heap
page read and write
F44000
heap
page read and write
FA9000
heap
page read and write
10F5000
heap
page read and write
4CF0000
direct allocation
page read and write
2005F6EA000
heap
page read and write
7FFD9B840000
trusted library allocation
page read and write
20048F33000
trusted library allocation
page read and write
20057604000
trusted library allocation
page read and write
4811000
heap
page read and write
29F0A8E0000
heap
page read and write
2A50000
direct allocation
page read and write
52FF000
stack
page read and write
283365A0000
heap
page read and write
C16E1FF000
stack
page read and write
110F000
stack
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
114D000
stack
page read and write
52BE000
stack
page read and write
7FFD9BA70000
trusted library allocation
page read and write
3F7F000
stack
page read and write
4FAB000
stack
page read and write
10A8000
heap
page read and write
28334A3C000
heap
page read and write
7FFD9B5E3000
trusted library allocation
page execute and read and write
40BF000
stack
page read and write
1060000
direct allocation
page read and write
4EC0000
direct allocation
page execute and read and write
20045678000
heap
page read and write
65EF000
stack
page read and write
37FF000
stack
page read and write
4EB0000
direct allocation
page execute and read and write
4821000
heap
page read and write
F44000
heap
page read and write
822C000
stack
page read and write
7FFD9B5FB000
trusted library allocation
page read and write
81EE000
stack
page read and write
2A40000
direct allocation
page read and write
74F000
unkown
page execute and read and write
F44000
heap
page read and write
CA97EFB000
stack
page read and write
F30000
direct allocation
page read and write
4E90000
direct allocation
page execute and read and write
F8E000
heap
page read and write
E84000
heap
page read and write
F30000
heap
page read and write
566E000
stack
page read and write
2BC0000
heap
page read and write
5A4D000
stack
page read and write
E84000
heap
page read and write
62A0000
heap
page read and write
751000
unkown
page execute and read and write
20045670000
heap
page read and write
4811000
heap
page read and write
DA4000
heap
page read and write
3215000
heap
page read and write
2005F74F000
heap
page read and write
307F000
stack
page read and write
521F000
stack
page read and write
336E000
heap
page read and write
85A0000
heap
page read and write
200471F3000
heap
page read and write
4821000
heap
page read and write
29F09085000
heap
page read and write
2005F77C000
heap
page read and write
1060000
direct allocation
page read and write
1050000
heap
page read and write
2CDE000
stack
page read and write
F30000
direct allocation
page read and write
4821000
heap
page read and write
3E4E000
stack
page read and write
20057341000
trusted library allocation
page read and write
E84000
heap
page read and write
45CE000
stack
page read and write
2005F3BC000
heap
page read and write
4821000
heap
page read and write
E84000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
E84000
heap
page read and write
551E000
stack
page read and write
2BA0000
direct allocation
page read and write
4811000
heap
page read and write
5B0000
unkown
page execute and write copy
E84000
heap
page read and write
28334A06000
heap
page read and write
1060000
direct allocation
page read and write
29F08E93000
heap
page read and write
E84000
heap
page read and write
3CCF000
stack
page read and write
F44000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
7FFD9B990000
trusted library allocation
page read and write
29F0AE32000
heap
page read and write
FB2000
heap
page read and write
4820000
heap
page read and write
29F0AE20000
heap
page read and write
FA9000
heap
page read and write
4E40000
direct allocation
page execute and read and write
4821000
heap
page read and write
2005F744000
heap
page read and write
4E80000
direct allocation
page execute and read and write
4E00000
direct allocation
page execute and read and write
4821000
heap
page read and write
7FFD9B696000
trusted library allocation
page read and write
20047A65000
trusted library allocation
page read and write
4ED0000
direct allocation
page execute and read and write
524E000
stack
page read and write
2BCD000
heap
page read and write
2005F7AF000
heap
page read and write
2004889A000
trusted library allocation
page read and write
2DCF000
stack
page read and write
48F000
unkown
page execute and read and write
E84000
heap
page read and write
3D3E000
stack
page read and write
371AC0E000
stack
page read and write
1060000
direct allocation
page read and write
4821000
heap
page read and write
CFD000
stack
page read and write
63AF000
stack
page read and write
2004889C000
trusted library allocation
page read and write
2B9B000
stack
page read and write
283349C0000
heap
page read and write
4821000
heap
page read and write
2F4A000
heap
page read and write
29F08DB8000
heap
page read and write
7FFD9B9D3000
trusted library allocation
page read and write
539E000
stack
page read and write
4CCC000
stack
page read and write
5A0C000
stack
page read and write
41CF000
stack
page read and write
4E30000
direct allocation
page execute and read and write
4DF0000
direct allocation
page execute and read and write
301000
unkown
page execute and read and write
2A0000
unkown
page read and write
F30000
direct allocation
page read and write
4821000
heap
page read and write
E84000
heap
page read and write
62A5000
heap
page read and write
2D10000
heap
page read and write
29F09000000
trusted library allocation
page read and write
2A40000
direct allocation
page read and write
4811000
heap
page read and write
E84000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
2005F6BB000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
7FFD9B69C000
trusted library allocation
page execute and read and write
36CE000
stack
page read and write
4E30000
direct allocation
page execute and read and write
7FFD9B94C000
trusted library allocation
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
115E000
stack
page read and write
308000
unkown
page execute and read and write
DA4000
heap
page read and write
20048B2B000
trusted library allocation
page read and write
4940000
trusted library allocation
page read and write
2005F724000
heap
page read and write
20045490000
heap
page read and write
4E10000
heap
page read and write
3719DF9000
stack
page read and write
20047311000
trusted library allocation
page read and write
F30000
direct allocation
page read and write
4D20000
direct allocation
page read and write
7FFD9B8E0000
trusted library allocation
page read and write
E84000
heap
page read and write
371A13C000
stack
page read and write
4E40000
direct allocation
page execute and read and write
DA0000
heap
page read and write
7FFD9B79A000
trusted library allocation
page read and write
CA9807B000
stack
page read and write
7FFD9BA20000
trusted library allocation
page read and write
3A4F000
stack
page read and write
30BB000
stack
page read and write
3F4F000
stack
page read and write
32FF000
stack
page read and write
381E000
stack
page read and write
4821000
heap
page read and write
3719CFE000
stack
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
F30000
direct allocation
page read and write
200488B0000
trusted library allocation
page read and write
2005F690000
heap
page read and write
2A2E000
stack
page read and write
3D0E000
stack
page read and write
7FFD9B5ED000
trusted library allocation
page execute and read and write
4E90000
direct allocation
page execute and read and write
4821000
heap
page read and write
7FFD9BA10000
trusted library allocation
page execute and read and write
2005F6C5000
heap
page read and write
DA4000
heap
page read and write
2A1000
unkown
page execute and write copy
541000
unkown
page execute and read and write
4811000
heap
page read and write
DA4000
heap
page read and write
20046EA5000
heap
page read and write
125F000
stack
page read and write
DA4000
heap
page read and write
200454B0000
heap
page read and write
20048857000
trusted library allocation
page read and write
2A40000
direct allocation
page read and write
306000
unkown
page read and write
2C9F000
stack
page read and write
4CFE000
stack
page read and write
4821000
heap
page read and write
283365B3000
heap
page read and write
2005F437000
heap
page read and write
F8E000
heap
page read and write
37197DE000
unkown
page read and write
380E000
stack
page read and write
2005F7A1000
heap
page read and write
536E000
stack
page read and write
298C000
stack
page read and write
371A03E000
stack
page read and write
20046EA0000
heap
page read and write
20048B9A000
trusted library allocation
page read and write
3719AFE000
stack
page read and write
4821000
heap
page read and write
3B9F000
stack
page read and write
20045530000
trusted library allocation
page read and write
4E30000
direct allocation
page execute and read and write
4821000
heap
page read and write
4E40000
direct allocation
page execute and read and write
1060000
direct allocation
page read and write
20046EAA000
heap
page read and write
3ABE000
stack
page read and write
431F000
stack
page read and write
31BF000
stack
page read and write
308E000
stack
page read and write
4821000
heap
page read and write
283349F7000
heap
page read and write
4811000
heap
page read and write
20045608000
heap
page read and write
46FF000
stack
page read and write
F30000
direct allocation
page read and write
F30000
direct allocation
page read and write
2A40000
direct allocation
page read and write
F30000
direct allocation
page read and write
85B5000
heap
page read and write
333E000
stack
page read and write
4821000
heap
page read and write
2005F310000
trusted library allocation
page read and write
4821000
heap
page read and write
20045575000
heap
page read and write
4821000
heap
page read and write
E84000
heap
page read and write
358E000
stack
page read and write
2E3E000
stack
page read and write
2004559F000
heap
page read and write
2A0000
unkown
page readonly
3719B7E000
stack
page read and write
4841000
heap
page read and write
200455C7000
heap
page read and write
7FFD9B980000
trusted library allocation
page read and write
354F000
stack
page read and write
32DF000
stack
page read and write
459F000
stack
page read and write
2A40000
direct allocation
page read and write
F44000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
29F0A860000
trusted library allocation
page read and write
2BA0000
direct allocation
page read and write
2DDF000
stack
page read and write
4CFE000
stack
page read and write
514F000
stack
page read and write
CA97C77000
stack
page read and write
4821000
heap
page read and write
20048E6E000
trusted library allocation
page read and write
3719BF9000
stack
page read and write
4811000
heap
page read and write
7FFD9B63C000
trusted library allocation
page execute and read and write
2A50000
direct allocation
page read and write
4821000
heap
page read and write
408F000
stack
page read and write
E84000
heap
page read and write
283349B0000
heap
page read and write
283349F0000
heap
page read and write
CA97E7F000
stack
page read and write
357F000
stack
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4E60000
direct allocation
page execute and read and write
4821000
heap
page read and write
F30000
direct allocation
page read and write
4821000
heap
page read and write
2F0F000
stack
page read and write
40DE000
stack
page read and write
56D000
unkown
page execute and read and write
4840000
heap
page read and write
7FFD9B934000
trusted library allocation
page read and write
DA4000
heap
page read and write
51CC000
stack
page read and write
345E000
stack
page read and write
64AF000
stack
page read and write
2004893F000
trusted library allocation
page read and write
318F000
stack
page read and write
4E30000
direct allocation
page execute and read and write
2E0F000
stack
page read and write
20046E50000
trusted library allocation
page read and write
518E000
stack
page read and write
64EE000
stack
page read and write
C16E0FE000
stack
page read and write
2005F560000
heap
page execute and read and write
4E40000
direct allocation
page execute and read and write
3719C7E000
stack
page read and write
F88000
heap
page read and write
29F08E72000
heap
page read and write
3CDF000
stack
page read and write
3719EB7000
stack
page read and write
4821000
heap
page read and write
DA4000
heap
page read and write
3A9E000
stack
page read and write
32CF000
stack
page read and write
2004882A000
trusted library allocation
page read and write
4821000
heap
page read and write
F85000
heap
page read and write
7FFD9B690000
trusted library allocation
page read and write
29F0A860000
trusted library allocation
page read and write
29CC000
stack
page read and write
28334A42000
heap
page read and write
45FE000
stack
page read and write
DA4000
heap
page read and write
4E20000
direct allocation
page execute and read and write
F44000
heap
page read and write
31CE000
stack
page read and write
29F0A860000
trusted library allocation
page read and write
395E000
stack
page read and write
20048BAE000
trusted library allocation
page read and write
2004886D000
trusted library allocation
page read and write
20047538000
trusted library allocation
page read and write
3F9E000
stack
page read and write
4E10000
direct allocation
page execute and read and write
4811000
heap
page read and write
4821000
heap
page read and write
E84000
heap
page read and write
E2E000
heap
page read and write
58AE000
stack
page read and write
2005F380000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
20047300000
heap
page execute and read and write
E20000
heap
page read and write
7FFD9B940000
trusted library allocation
page read and write
CA97D7D000
stack
page read and write
E84000
heap
page read and write
347E000
stack
page read and write
7DF43D6D0000
trusted library allocation
page execute and read and write
28334A17000
heap
page read and write
20047D03000
trusted library allocation
page read and write
4821000
heap
page read and write
2F3F000
stack
page read and write
4821000
heap
page read and write
7F0000
unkown
page execute and write copy
DA4000
heap
page read and write
20048F37000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
447F000
stack
page read and write
F72000
heap
page read and write
3A8E000
stack
page read and write
31DE000
stack
page read and write
DA4000
heap
page read and write
E80000
heap
page read and write
20045580000
heap
page read and write
F9B000
heap
page read and write
7AD000
unkown
page execute and read and write
4E00000
direct allocation
page execute and read and write
4821000
heap
page read and write
7FFD9B939000
trusted library allocation
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
DA4000
heap
page read and write
7FFD9B999000
trusted library allocation
page read and write
622E000
stack
page read and write
E80000
heap
page read and write
D50000
heap
page read and write
2A40000
direct allocation
page read and write
56D000
unkown
page execute and read and write
29F08D80000
heap
page read and write
4821000
heap
page read and write
309E000
stack
page read and write
7FFD9B7A0000
trusted library allocation
page execute and read and write
4821000
heap
page read and write
4821000
heap
page read and write
28334A48000
heap
page read and write
4BF0000
heap
page read and write
991000
unkown
page execute and read and write
E84000
heap
page read and write
20046E90000
heap
page read and write
DA4000
heap
page read and write
445F000
stack
page read and write
2A40000
direct allocation
page read and write
4821000
heap
page read and write
3BDE000
stack
page read and write
444F000
stack
page read and write
4811000
heap
page read and write
4E50000
direct allocation
page execute and read and write
200455CB000
heap
page read and write
D80000
heap
page read and write
20045560000
heap
page readonly
53AE000
stack
page read and write
20045550000
trusted library allocation
page read and write
DA4000
heap
page read and write
1060000
direct allocation
page read and write
752000
unkown
page execute and write copy
7FFD9B5E2000
trusted library allocation
page read and write
371A23B000
stack
page read and write
9EC000
stack
page read and write
2A40000
direct allocation
page read and write
3A5F000
stack
page read and write
2A3E000
stack
page read and write
4821000
heap
page read and write
751000
unkown
page execute and read and write
E84000
heap
page read and write
2BBE000
stack
page read and write
4E60000
direct allocation
page execute and read and write
F92000
heap
page read and write
2B5F000
stack
page read and write
F75000
heap
page read and write
4D20000
direct allocation
page read and write
E84000
heap
page read and write
E84000
heap
page read and write
2005F46B000
heap
page read and write
283365B8000
heap
page read and write
DA4000
heap
page read and write
65F0000
heap
page read and write
4EE0000
direct allocation
page execute and read and write
369F000
stack
page read and write
4E00000
direct allocation
page execute and read and write
7FFD9BA30000
trusted library allocation
page read and write
29F08D60000
heap
page read and write
40CE000
stack
page read and write
4E00000
direct allocation
page execute and read and write
4E10000
direct allocation
page execute and read and write
420E000
stack
page read and write
28334A48000
heap
page read and write
4811000
heap
page read and write
20048843000
trusted library allocation
page read and write
DA4000
heap
page read and write
4C8C000
stack
page read and write
C16DEED000
stack
page read and write
4E1000
unkown
page execute and write copy
F9B000
heap
page read and write
4821000
heap
page read and write
390F000
stack
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
74F000
unkown
page execute and read and write
2005F698000
heap
page read and write
4821000
heap
page read and write
393F000
stack
page read and write
4821000
heap
page read and write
4EB0000
direct allocation
page execute and read and write
2A0000
unkown
page read and write
4E10000
direct allocation
page execute and read and write
F30000
direct allocation
page read and write
46CF000
stack
page read and write
4821000
heap
page read and write
7FFD9B8F0000
trusted library allocation
page read and write
4F40000
heap
page read and write
3E3F000
stack
page read and write
2A77000
heap
page read and write
2F5E000
stack
page read and write
FA4000
heap
page read and write
3719E3E000
stack
page read and write
4910000
trusted library allocation
page read and write
4821000
heap
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
4821000
heap
page read and write
4EA0000
direct allocation
page execute and read and write
368F000
stack
page read and write
4811000
heap
page read and write
283365BA000
heap
page read and write
4821000
heap
page read and write
4811000
heap
page read and write
4811000
heap
page read and write
3CFF000
stack
page read and write
4F29000
stack
page read and write
20047396000
trusted library allocation
page read and write
283349FA000
heap
page read and write
3280000
heap
page read and write
6E234000
unkown
page readonly
2A40000
direct allocation
page read and write
3389000
heap
page read and write
421E000
stack
page read and write
4821000
heap
page read and write
D90000
heap
page read and write
3F5F000
stack
page read and write
355F000
stack
page read and write
2CFE000
stack
page read and write
4820000
heap
page read and write
2F4E000
stack
page read and write
371A0BE000
stack
page read and write
4811000
heap
page read and write
4DFF000
stack
page read and write
4811000
heap
page read and write
7FFD9B800000
trusted library allocation
page read and write
200455DF000
heap
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
E84000
heap
page read and write
28334A17000
heap
page read and write
4E00000
direct allocation
page execute and read and write
4821000
heap
page read and write
57AE000
stack
page read and write
80EE000
stack
page read and write
4821000
heap
page read and write
E84000
heap
page read and write
5B0000
unkown
page execute and write copy
4E90000
direct allocation
page execute and read and write
DA4000
heap
page read and write
5B4D000
stack
page read and write
CA980FB000
stack
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
435E000
stack
page read and write
DA4000
heap
page read and write
2CBF000
stack
page read and write
4821000
heap
page read and write
D3D000
stack
page read and write
E84000
heap
page read and write
DA4000
heap
page read and write
F17000
heap
page read and write
3BCE000
stack
page read and write
4E80000
direct allocation
page execute and read and write
7DF43D6C0000
trusted library allocation
page execute and read and write
4E70000
direct allocation
page execute and read and write
41FF000
stack
page read and write
3E7E000
stack
page read and write
2B0F000
stack
page read and write
F22000
heap
page read and write
E84000
heap
page read and write
4821000
heap
page read and write
6E23D000
unkown
page readonly
832C000
stack
page read and write
31D0000
heap
page read and write
4821000
heap
page read and write
F30000
direct allocation
page read and write
4E30000
direct allocation
page execute and read and write
29F0A860000
trusted library allocation
page read and write
29F09000000
trusted library allocation
page read and write
4821000
heap
page read and write
7FB0000
heap
page read and write
1106000
heap
page read and write
20045570000
heap
page read and write
29F08E60000
heap
page read and write
7FFD9B7F0000
trusted library allocation
page read and write
409F000
stack
page read and write
29F09000000
trusted library allocation
page read and write
2BA0000
direct allocation
page read and write
1060000
direct allocation
page read and write
E84000
heap
page read and write
990000
unkown
page execute and write copy
28334A2E000
heap
page read and write
4810000
heap
page read and write
7FFD9B870000
trusted library allocation
page read and write
6C20000
heap
page read and write
DA4000
heap
page read and write
4821000
heap
page read and write
319F000
stack
page read and write
4E40000
direct allocation
page execute and read and write
2A57000
heap
page read and write
20048813000
trusted library allocation
page read and write
45BF000
stack
page read and write
E84000
heap
page read and write
4821000
heap
page read and write
E84000
heap
page read and write
20048B07000
trusted library allocation
page read and write
7FFD9BA50000
trusted library allocation
page read and write
4821000
heap
page read and write
4811000
heap
page read and write
4E20000
direct allocation
page execute and read and write
430F000
stack
page read and write
1060000
direct allocation
page read and write
28334BC0000
heap
page read and write
520E000
stack
page read and write
2005F487000
heap
page execute and read and write
3E5E000
stack
page read and write
104E000
stack
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
E84000
heap
page read and write
2A70000
heap
page read and write
F44000
heap
page read and write
4DD0000
direct allocation
page execute and read and write
3719A7E000
stack
page read and write
59A000
unkown
page execute and read and write
DA4000
heap
page read and write
2E0E000
stack
page read and write
576E000
stack
page read and write
111F000
stack
page read and write
590D000
stack
page read and write
37CF000
stack
page read and write
4821000
heap
page read and write
7FFD9B8C0000
trusted library allocation
page read and write
FA4000
heap
page read and write
7FFD9B890000
trusted library allocation
page read and write
394E000
stack
page read and write
4821000
heap
page read and write
DFE000
stack
page read and write
20048840000
trusted library allocation
page read and write
4CB0000
direct allocation
page read and write
4821000
heap
page read and write
DA4000
heap
page read and write
2B8E000
stack
page read and write
F86000
heap
page read and write
4841000
heap
page read and write
EDA000
heap
page read and write
549E000
stack
page read and write
2005760C000
trusted library allocation
page read and write
2A50000
direct allocation
page read and write
504B000
stack
page read and write
7FFD9B7E0000
trusted library allocation
page read and write
CA97FFE000
stack
page read and write
124E000
stack
page read and write
EDE000
heap
page read and write
2BC7000
heap
page read and write
36DE000
stack
page read and write
483F000
stack
page read and write
C16DFFD000
unkown
page read and write
20048BEB000
trusted library allocation
page read and write
29F08DB0000
heap
page read and write
7FFD9B8D0000
trusted library allocation
page read and write
481F000
stack
page read and write
2005F3F9000
heap
page read and write
437E000
stack
page read and write
2A1000
unkown
page execute and write copy
383E000
stack
page read and write
200455BE000
heap
page read and write
200575FD000
trusted library allocation
page read and write
CA97F7D000
stack
page read and write
4841000
heap
page read and write
DA4000
heap
page read and write
4811000
heap
page read and write
1060000
direct allocation
page read and write
4821000
heap
page read and write
511E000
stack
page read and write
7FB4000
heap
page read and write
20057311000
trusted library allocation
page read and write
7FFD9B850000
trusted library allocation
page read and write
44BE000
stack
page read and write
4E70000
direct allocation
page execute and read and write
2005F41B000
heap
page read and write
3210000
heap
page read and write
2005F753000
heap
page read and write
E84000
heap
page read and write
200455CD000
heap
page read and write
DA4000
heap
page read and write
4821000
heap
page read and write
DA4000
heap
page read and write
4E50000
direct allocation
page execute and read and write
3719F39000
stack
page read and write
3BBF000
stack
page read and write
2005F920000
heap
page read and write
4821000
heap
page read and write
2CCF000
stack
page read and write
1060000
direct allocation
page read and write
59A000
unkown
page execute and read and write
E84000
heap
page read and write
4811000
heap
page read and write
448E000
stack
page read and write
C16E4FF000
stack
page read and write
C3B000
stack
page read and write
DA4000
heap
page read and write
29F09000000
trusted library allocation
page read and write
2A40000
direct allocation
page read and write
750000
unkown
page execute and write copy
E84000
heap
page read and write
7FFD9B810000
trusted library allocation
page read and write
DA4000
heap
page read and write
4821000
heap
page read and write
2D8E000
stack
page read and write
7FFD9B910000
trusted library allocation
page read and write
7E1000
unkown
page execute and read and write
1060000
direct allocation
page read and write
508C000
stack
page read and write
3719FB7000
stack
page read and write
1070000
heap
page read and write
4E0000
unkown
page readonly
FB1000
heap
page read and write
3A7F000
stack
page read and write
306000
unkown
page read and write
DA4000
heap
page read and write
304F000
stack
page read and write
DA4000
heap
page read and write
28334A0A000
heap
page read and write
4811000
heap
page read and write
331E000
stack
page read and write
200454F0000
heap
page read and write
5B1000
unkown
page execute and write copy
F88000
heap
page read and write
4EC0000
direct allocation
page execute and read and write
4821000
heap
page read and write
3F8E000
stack
page read and write
DA4000
heap
page read and write
4821000
heap
page read and write
FB1000
heap
page read and write
4E80000
direct allocation
page execute and read and write
4821000
heap
page read and write
E84000
heap
page read and write
7FFD9B830000
trusted library allocation
page read and write
3E1F000
stack
page read and write
4821000
heap
page read and write
2A40000
direct allocation
page read and write
7FFD9B5E4000
trusted library allocation
page read and write
2004557E000
heap
page read and write
4821000
heap
page read and write
343F000
stack
page read and write
D90000
heap
page read and write
4811000
heap
page read and write
40FE000
stack
page read and write
859C000
stack
page read and write
4821000
heap
page read and write
4821000
heap
page read and write
29F09000000
trusted library allocation
page read and write
4E40000
direct allocation
page execute and read and write
C3C000
stack
page read and write
3320000
heap
page read and write
3D1E000
stack
page read and write
20048886000
trusted library allocation
page read and write
4811000
heap
page read and write
28334A17000
heap
page read and write
561F000
stack
page read and write
31FE000
stack
page read and write
7FFD9B7D0000
trusted library allocation
page execute and read and write
344E000
stack
page read and write
4841000
heap
page read and write
There are 978 hidden memdumps, click here to show them.