IOC Report
SecuriteInfo.com.Generic.JS.Malicord.D.02514950.1665.6783.exe

loading gif

Files

File Path
Type
Category
Malicious
SecuriteInfo.com.Generic.JS.Malicord.D.02514950.1665.6783.exe
PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
initial sample
malicious
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\NikkiCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 5, cookie 0x3, schema 4, UTF-8, version-valid-for 4
dropped
malicious
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\passwords.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
malicious
C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\webdata.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
malicious
C:\Users\user\AppData\Local\Temp\2eFAGdfgANPOg197YHkhBxawy9z\Setup.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Setup.exe
PE32+ executable (GUI) x86-64, for MS Windows
modified
malicious
C:\Users\user\AppData\Local\D3DSCache\db988e3888af6e51\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.idx
data
dropped
C:\Users\user\AppData\Local\D3DSCache\db988e3888af6e51\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.lock
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\D3DSCache\db988e3888af6e51\F4EB2D6C-ED2B-4BDD-AD9D-F913287E6768.val
Matlab v4 mat-file (little endian) (, numeric, rows 0, columns 16, imaginary
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\NikkiCookies
SQLite 3.x database, last written using SQLite version 3042000, file counter 7, database pages 5, cookie 0x5, schema 4, UTF-8, version-valid-for 7
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\passwords.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 25, cookie 0xe, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\webdata.db
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 8, database pages 89, cookie 0x36, schema 4, UTF-8, version-valid-for 8
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\075aadb5-2846-420f-98d8-32c9141ac90f.tmp.node
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\2eFAGdfgANPOg197YHkhBxawy9z\Autofills.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\2eFAGdfgANPOg197YHkhBxawy9z\Cards.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\2eFAGdfgANPOg197YHkhBxawy9z\LICENSE.electron.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\2eFAGdfgANPOg197YHkhBxawy9z\LICENSES.chromium.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\2eFAGdfgANPOg197YHkhBxawy9z\Passwords.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\2eFAGdfgANPOg197YHkhBxawy9z\chrome_100_percent.pak
data
dropped
C:\Users\user\AppData\Local\Temp\2eFAGdfgANPOg197YHkhBxawy9z\chrome_200_percent.pak
data
dropped
C:\Users\user\AppData\Local\Temp\2eFAGdfgANPOg197YHkhBxawy9z\d3dcompiler_47.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\2eFAGdfgANPOg197YHkhBxawy9z\ffmpeg.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\2eFAGdfgANPOg197YHkhBxawy9z\icudtl.dat
data
dropped
C:\Users\user\AppData\Local\Temp\2eFAGdfgANPOg197YHkhBxawy9z\libEGL.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\2eFAGdfgANPOg197YHkhBxawy9z\libGLESv2.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\2eFAGdfgANPOg197YHkhBxawy9z\nikki3\cookies.zip
Zip archive data, at least v2.0 to extract, compression method=deflate
dropped
C:\Users\user\AppData\Local\Temp\2eFAGdfgANPOg197YHkhBxawy9z\resources.pak
data
dropped
C:\Users\user\AppData\Local\Temp\899eff3c-e123-418b-b66d-58d51de99fbd.tmp.node
PE32+ executable (DLL) (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_405d0jzt.c4t.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qq4fd3rd.zwv.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ugikb3f4.qbm.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xkydwzyv.wk5.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\importantfiles.zip
Zip archive data (empty)
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\LICENSE.electron.txt
ASCII text
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\LICENSES.chromium.html
HTML document, ASCII text
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\Setup.exe
PE32+ executable (GUI) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\chrome_100_percent.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\chrome_200_percent.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\d3dcompiler_47.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\ffmpeg.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\icudtl.dat
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\libEGL.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\libGLESv2.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\af.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\am.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\ar.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\bg.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\bn.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\ca.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\cs.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\da.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\de.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\el.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\en-GB.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\en-US.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\es-419.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\es.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\et.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\fa.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\fi.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\fil.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\fr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\gu.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\he.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\hi.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\hr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\hu.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\id.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\it.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\ja.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\kn.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\ko.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\lt.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\lv.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\ml.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\mr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\ms.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\nb.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\nl.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\pl.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\pt-BR.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\pt-PT.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\ro.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\ru.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\sk.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\sl.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\sr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\sv.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\sw.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\ta.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\te.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\th.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\tr.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\uk.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\ur.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\vi.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\zh-CN.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\locales\zh-TW.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\resources.pak
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\resources\app.asar
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\resources\elevate.exe
PE32 executable (console) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\snapshot_blob.bin
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\v8_context_snapshot.bin
data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\vk_swiftshader.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\vk_swiftshader_icd.json
JSON data
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\7z-out\vulkan-1.dll
PE32+ executable (DLL) (console) x86-64, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\System.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\app-64.7z
7-zip archive data, version 0.4
dropped
C:\Users\user\AppData\Local\Temp\nskDB69.tmp\nsis7z.dll
PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
dropped
C:\Users\user\AppData\Roaming\Setup\Local State (copy)
JSON data
dropped
C:\Users\user\AppData\Roaming\Setup\be055b1c-ea7d-4abc-a9df-531e96c639f5.tmp
JSON data
dropped
There are 102 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\SecuriteInfo.com.Generic.JS.Malicord.D.02514950.1665.6783.exe
"C:\Users\user\Desktop\SecuriteInfo.com.Generic.JS.Malicord.D.02514950.1665.6783.exe"
malicious
C:\Users\user\AppData\Local\Temp\2eFAGdfgANPOg197YHkhBxawy9z\Setup.exe
C:\Users\user\AppData\Local\Temp\2eFAGdfgANPOg197YHkhBxawy9z\Setup.exe
malicious
C:\Users\user\AppData\Local\Temp\2eFAGdfgANPOg197YHkhBxawy9z\Setup.exe
"C:\Users\user\AppData\Local\Temp\2eFAGdfgANPOg197YHkhBxawy9z\Setup.exe" --type=gpu-process --user-data-dir="C:\Users\user\AppData\Roaming\Setup" --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1636 --field-trial-handle=1840,i,8366561825725198397,2739281923714538764,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
malicious
C:\Users\user\AppData\Local\Temp\2eFAGdfgANPOg197YHkhBxawy9z\Setup.exe
"C:\Users\user\AppData\Local\Temp\2eFAGdfgANPOg197YHkhBxawy9z\Setup.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-GB --service-sandbox-type=none --user-data-dir="C:\Users\user\AppData\Roaming\Setup" --mojo-platform-channel-handle=2076 --field-trial-handle=1840,i,8366561825725198397,2739281923714538764,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:8
malicious
C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Setup.exe
"C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Setup.exe"
malicious
C:\Users\user\AppData\Local\Temp\2eFAGdfgANPOg197YHkhBxawy9z\Setup.exe
"C:\Users\user\AppData\Local\Temp\2eFAGdfgANPOg197YHkhBxawy9z\Setup.exe" --type=gpu-process --disable-gpu-sandbox --use-gl=disabled --gpu-vendor-id=5140 --gpu-device-id=140 --gpu-sub-system-id=0 --gpu-revision=0 --gpu-driver-version=10.0.19041.546 --user-data-dir="C:\Users\user\AppData\Roaming\Setup" --gpu-preferences=UAAAAAAAAADoAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAACQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=2480 --field-trial-handle=1840,i,8366561825725198397,2739281923714538764,131072 --disable-features=SpareRendererForSitePerProcess,WinRetrieveSuggestionsOnlyOnDemand /prefetch:2
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "tasklist"
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,133,249,150,31,215,133,122,74,160,83,200,231,85,194,93,57,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,220,99,52,70,203,13,214,237,172,78,180,7,135,132,222,56,192,222,60,122,2,71,120,79,2,110,200,30,117,75,45,64,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,84,96,129,36,148,225,154,120,74,75,125,156,249,147,149,248,25,11,154,223,250,69,31,112,70,8,1,93,107,120,136,224,48,0,0,0,6,45,27,130,158,227,72,112,46,16,20,247,121,185,158,95,106,75,104,237,172,49,168,214,157,137,66,208,86,220,45,252,169,85,86,184,103,83,137,130,133,35,244,129,44,127,163,72,64,0,0,0,35,18,109,136,80,52,198,238,200,236,226,120,27,146,160,174,71,84,66,203,39,169,215,160,227,44,242,154,161,64,187,142,165,157,66,1,229,116,228,177,236,99,223,240,230,79,21,58,53,251,1,129,235,77,36,48,152,174,95,142,72,93,217,72), $null, 'CurrentUser')"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\tasklist.exe
tasklist
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,133,249,150,31,215,133,122,74,160,83,200,231,85,194,93,57,16,0,0,0,28,0,0,0,71,0,111,0,111,0,103,0,108,0,101,0,32,0,67,0,104,0,114,0,111,0,109,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,220,99,52,70,203,13,214,237,172,78,180,7,135,132,222,56,192,222,60,122,2,71,120,79,2,110,200,30,117,75,45,64,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,84,96,129,36,148,225,154,120,74,75,125,156,249,147,149,248,25,11,154,223,250,69,31,112,70,8,1,93,107,120,136,224,48,0,0,0,6,45,27,130,158,227,72,112,46,16,20,247,121,185,158,95,106,75,104,237,172,49,168,214,157,137,66,208,86,220,45,252,169,85,86,184,103,83,137,130,133,35,244,129,44,127,163,72,64,0,0,0,35,18,109,136,80,52,198,238,200,236,226,120,27,146,160,174,71,84,66,203,39,169,215,160,227,44,242,154,161,64,187,142,165,157,66,1,229,116,228,177,236,99,223,240,230,79,21,58,53,251,1,129,235,77,36,48,152,174,95,142,72,93,217,72), $null, 'CurrentUser')
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,133,249,150,31,215,133,122,74,160,83,200,231,85,194,93,57,16,0,0,0,30,0,0,0,77,0,105,0,99,0,114,0,111,0,115,0,111,0,102,0,116,0,32,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,14,53,24,103,59,147,206,28,42,108,2,171,66,248,59,252,178,162,35,232,127,115,109,155,94,76,82,107,203,163,4,197,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,102,39,139,236,68,70,39,152,67,111,123,34,177,197,103,181,124,213,190,112,13,193,185,90,191,194,52,69,126,126,90,70,48,0,0,0,78,43,108,139,184,233,18,30,79,160,62,90,54,145,175,184,1,206,218,146,139,219,218,40,3,209,83,56,71,210,79,189,120,174,46,157,101,81,201,76,77,181,151,119,46,253,183,146,64,0,0,0,25,132,83,220,77,72,234,147,112,233,192,145,190,240,42,192,38,154,220,71,203,164,145,111,115,55,19,193,38,168,21,189,120,226,128,178,203,174,136,16,121,184,133,15,28,247,227,66,0,254,38,112,15,247,17,81,12,63,142,85,32,243,79,251), $null, 'CurrentUser')"
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
powershell.exe Add-Type -AssemblyName System.Security; [System.Security.Cryptography.ProtectedData]::Unprotect([byte[]]@(1,0,0,0,208,140,157,223,1,21,209,17,140,122,0,192,79,194,151,235,1,0,0,0,133,249,150,31,215,133,122,74,160,83,200,231,85,194,93,57,16,0,0,0,30,0,0,0,77,0,105,0,99,0,114,0,111,0,115,0,111,0,102,0,116,0,32,0,69,0,100,0,103,0,101,0,0,0,16,102,0,0,0,1,0,0,32,0,0,0,14,53,24,103,59,147,206,28,42,108,2,171,66,248,59,252,178,162,35,232,127,115,109,155,94,76,82,107,203,163,4,197,0,0,0,0,14,128,0,0,0,2,0,0,32,0,0,0,102,39,139,236,68,70,39,152,67,111,123,34,177,197,103,181,124,213,190,112,13,193,185,90,191,194,52,69,126,126,90,70,48,0,0,0,78,43,108,139,184,233,18,30,79,160,62,90,54,145,175,184,1,206,218,146,139,219,218,40,3,209,83,56,71,210,79,189,120,174,46,157,101,81,201,76,77,181,151,119,46,253,183,146,64,0,0,0,25,132,83,220,77,72,234,147,112,233,192,145,190,240,42,192,38,154,220,71,203,164,145,111,115,55,19,193,38,168,21,189,120,226,128,178,203,174,136,16,121,184,133,15,28,247,227,66,0,254,38,112,15,247,17,81,12,63,142,85,32,243,79,251), $null, 'CurrentUser')
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /d /s /c "start /B cmd /c mshta "javascript:new ActiveXObject('WScript.Shell').Popup('An error occurred while downloading files. Please try again later.', 0, 'Error', 16);close()""
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\cmd.exe
cmd /c mshta "javascript:new ActiveXObject('WScript.Shell').Popup('An error occurred while downloading files. Please try again later.', 0, 'Error', 16);close()"
C:\Windows\System32\mshta.exe
mshta "javascript:new ActiveXObject('WScript.Shell').Popup('An error occurred while downloading files. Please try again later.', 0, 'Error', 16);close()"
There are 12 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://anglebug.com/4674
unknown
https://support.google.com/chrome/answer/6098869
unknown
https://doh.familyshield.opendns.com/dns-query
unknown
http://anglebug.com/4633
unknown
https://anglebug.com/7382
unknown
https://public.dns.iij.jp/
unknown
http://crbug.com/550292
unknown
http://crbug.com/883276
unknown
https://photos.google.com/settings?referrer=CHROME_NTP
unknown
https://anglebug.com/7714
unknown
https://doh.cox.net/dns-query
unknown
https://anglebug.com/5536
unknown
https://bugs.fuchsia.dev/p/fuchsia/issues/detail?id=107106
unknown
https://dns11.quad9.net/dns-query
unknown
http://crbug.com/1165751
unknown
https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalGreylistUrl
unknown
https://crbug.com/705865
unknown
http://crbug.com/110263
unknown
https://nuget.org/nuget.exe
unknown
https://www.nic.cz/odvr/CZ.NIC
unknown
http://anglebug.com/6248
unknown
http://anglebug.com/6929
unknown
https://www.google.com/chrome/privacy/eula_text.htmlG
unknown
http://anglebug.com/5281
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://public.dns.iij.jp/IIJ
unknown
https://nextdns.io/privacy
unknown
https://anglebug.com/7246
unknown
https://anglebug.com/7369
unknown
https://anglebug.com/7489
unknown
https://crbug.com/593024
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://crbug.com/1137851
unknown
https://contoso.com/Icon
unknown
https://developers.google.com/speed/public-dns/privacyGoogle
unknown
https://dns11.quad9.net/dns-querydns11.quad9.net9.9.9.11149.112.112.112620:fe::112620:fe::fe:11Pd4
unknown
https://dns64.dns.google/dns-query
unknown
https://doh.opendns.com/dns-query
unknown
https://issuetracker.google.com/161903006
unknown
http://anglebug.com/2152skipVSConstantRegisterZeroIn
unknown
https://crbug.com/1300575
unknown
https://crbug.com/710443
unknown
https://github.com/Pester/Pester
unknown
https://crbug.com/1042393
unknown
https://crbug.com/1060012
unknown
http://anglebug.com/3078
unknown
http://anglebug.com/7553
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherExternalSitelistUrl
unknown
http://anglebug.com/5375
unknown
http://anglebug.com/3246allowClearForRobustResourceInitSome
unknown
http://anglebug.com/5371
unknown
http://anglebug.com/3997
unknown
http://anglebug.com/4722
unknown
http://crbug.com/642605
unknown
https://chrome-devtools-frontend.appspot.com/%s%s/%s/NetworkResourceLoaderstreamWriteInspectableWebC
unknown
https://public.dns.iij.jp/dns-query
unknown
http://anglebug.com/1452
unknown
http://anglebug.com/7556
unknown
https://chrome.google.com/webstore?hl=frRaccourci
unknown
https://chrome.google.com/webstore?hl=swUmeondoa
unknown
https://chrome.google.com/webstore?hl=zh-CN
unknown
https://alekberg.net/privacy
unknown
https://crbug.com/650547callClearTwiceUsing
unknown
http://anglebug.com/6692
unknown
https://www.google.com/chrome/privacy/eula_text.htmlInasimamiwa
unknown
http://anglebug.com/3502
unknown
http://anglebug.com/3623
unknown
http://anglebug.com/3625
unknown
http://anglebug.com/3624
unknown
https://chromium.dns.nextdns.io
unknown
http://anglebug.com/5007
unknown
http://crbug.com/1181068
unknown
http://anglebug.com/2894
unknown
http://anglebug.com/3862
unknown
https://dns.google/dns-query
unknown
http://anglebug.com/4836
unknown
https://issuetracker.google.com/issues/166475273
unknown
https://passwords.google.comCompte
unknown
http://int3.de/
unknown
https://developers.cloudflare.com/1.1.1.1/privacy/public-dns-resolver/Cloudflare
unknown
http://anglebug.com/4384
unknown
http://anglebug.com/7036Frontend
unknown
https://chrome-devtools-frontend.appspot.com/
unknown
https://anglebug.com/7246enableCaptureLimitsSet
unknown
http://anglebug.com/3970
unknown
http://anglebug.com/4267
unknown
https://chromeenterprise.google/policies/#BrowserSwitcherUrlList
unknown
https://policies.google.com/
unknown
http://crbug.com/1181193
unknown
http://anglebug.com/482
unknown
http://anglebug.com/3045
unknown
https://anglebug.com/7604
unknown
https://odvr.nic.cz/doh
unknown
https://chrome.google.com/webstore/category/extensions
unknown
http://crbug.com/308366
unknown
http://anglebug.com/5901
unknown
http://anglebug.com/3965
unknown
http://anglebug.com/6439
unknown
There are 90 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
chrome.cloudflare-dns.com
162.159.61.3
discord.com
162.159.137.232
api.gofile.io
151.80.29.83

IPs

IP
Domain
Country
Malicious
162.159.61.3
chrome.cloudflare-dns.com
United States
162.159.137.232
discord.com
United States
151.80.29.83
api.gofile.io
Italy
198.50.129.180
unknown
Canada

Memdumps

Base Address
Regiontype
Protect
Malicious
7FF846C22000
trusted library allocation
page read and write
21E71C35000
heap
page read and write
14281C29000
trusted library allocation
page read and write
205FB135000
heap
page read and write
7FF705049000
unkown
page readonly
7FF846DA0000
trusted library allocation
page read and write
888000
heap
page read and write
7FF6FFEDB000
unkown
page execute read
1962E354000
heap
page read and write
7FF846AFC000
trusted library allocation
page execute and read and write
14283838000
trusted library allocation
page read and write
14281B94000
heap
page read and write
248DB4E000
stack
page read and write
1E0B99F1000
trusted library allocation
page read and write
1E0D02E3000
heap
page read and write
7FF7008DB000
unkown
page execute read
2B68EEE0000
heap
page read and write
248CC7E000
stack
page read and write
3460000
heap
page read and write
1E0B7BE4000
heap
page read and write
7FF846C60000
trusted library allocation
page read and write
248CD79000
stack
page read and write
7FF846C70000
trusted library allocation
page read and write
1E0D02B6000
heap
page read and write
7FF7012DB000
unkown
page execute read
7FF846C11000
trusted library allocation
page read and write
1E0D03D0000
heap
page read and write
14291E9B000
trusted library allocation
page read and write
3520000
heap
page read and write
7FF846D80000
trusted library allocation
page read and write
14282F45000
trusted library allocation
page read and write
7FF846D00000
trusted library allocation
page read and write
2861000
heap
page read and write
2B61000
heap
page read and write
7FF846DB9000
trusted library allocation
page read and write
7FF703ADB000
unkown
page execute read
1E0B964B000
trusted library allocation
page read and write
408000
unkown
page readonly
3761000
heap
page read and write
2B68F1A0000
heap
page read and write
7FF705052000
unkown
page readonly
38AA17E000
stack
page read and write
7FF846CB0000
trusted library allocation
page read and write
1962E5F0000
heap
page read and write
1E0B7DDE000
trusted library allocation
page read and write
205FAE10000
heap
page read and write
33A516B000
stack
page read and write
38A9CFE000
stack
page read and write
1429A14E000
heap
page read and write
7FF6FEADB000
unkown
page execute read
32E0000
heap
page read and write
248CFFE000
stack
page read and write
1429A030000
heap
page execute and read and write
1E0B966C000
trusted library allocation
page read and write
14280264000
heap
page read and write
1E0B7BE0000
heap
page read and write
21E71F84000
heap
page read and write
205FAF5B000
heap
page read and write
2E61000
heap
page read and write
7FF846C90000
trusted library allocation
page read and write
38A9703000
stack
page read and write
20D0B864000
heap
page read and write
7FF846CD0000
trusted library allocation
page read and write
14299BA4000
heap
page read and write
7FF846C40000
trusted library allocation
page read and write
1E0B7AD0000
trusted library allocation
page read and write
248C7AD000
stack
page read and write
145DE1B6000
heap
page read and write
1E0B6265000
heap
page read and write
7FF846A5B000
trusted library allocation
page read and write
7FF846D20000
trusted library allocation
page read and write
1E0B621E000
heap
page read and write
1429A090000
heap
page read and write
7FF7030DB000
unkown
page execute read
1429A13D000
heap
page read and write
142834EA000
trusted library allocation
page read and write
1E0B61C4000
heap
page read and write
1962E34C000
heap
page read and write
38A9EFA000
stack
page read and write
31E1000
heap
page read and write
3361000
heap
page read and write
145DE1DB000
heap
page read and write
809000
heap
page read and write
7FF6FD240000
unkown
page readonly
3060000
heap
page read and write
7FF704EDB000
unkown
page execute read
2C61000
heap
page read and write
7FF6FD6DB000
unkown
page execute read
248CAFE000
stack
page read and write
7FF846DB5000
trusted library allocation
page read and write
248C7EE000
stack
page read and write
14291D55000
trusted library allocation
page read and write
7FF6FD241000
unkown
page execute read
7FF846D90000
trusted library allocation
page read and write
38AABCE000
stack
page read and write
1E0B7CE0000
heap
page execute and read and write
1429A18B000
heap
page read and write
14281A80000
trusted library allocation
page read and write
2B68EFC9000
heap
page read and write
35E798B000
stack
page read and write
7FF846B10000
trusted library allocation
page read and write
7FF846BE0000
trusted library allocation
page read and write
7FF846B60000
trusted library allocation
page execute and read and write
1429A376000
heap
page read and write
7FF7026DB000
unkown
page execute read
14280150000
heap
page read and write
1E0D0236000
heap
page read and write
7FF846D30000
trusted library allocation
page read and write
7FF6FF4DB000
unkown
page execute read
20D0B734000
heap
page read and write
2B60000
heap
page read and write
1962E34D000
heap
page read and write
1E0D03F5000
heap
page read and write
1E0B7D16000
heap
page execute and read and write
145DE1D1000
heap
page read and write
14280110000
heap
page read and write
1429A370000
heap
page read and write
2EE1000
heap
page read and write
1429A093000
heap
page read and write
21E71DE0000
heap
page read and write
7DF4F1610000
trusted library allocation
page execute and read and write
7FF846D40000
trusted library allocation
page read and write
1E0B7C23000
trusted library allocation
page read and write
1429A38E000
heap
page read and write
7FF7008DB000
unkown
page execute read
205FB136000
heap
page read and write
145DE1AB000
heap
page read and write
1962E35C000
heap
page read and write
A2060FB000
stack
page read and write
33E1000
heap
page read and write
14281A60000
trusted library allocation
page read and write
38A9DF9000
stack
page read and write
7FF846C00000
trusted library allocation
page execute and read and write
F3BEFBC000
stack
page read and write
14281AA0000
heap
page read and write
7FF704EDB000
unkown
page execute read
145DE394000
heap
page read and write
35E7DFF000
stack
page read and write
2DE0000
heap
page read and write
1429A373000
heap
page read and write
7FF846A62000
trusted library allocation
page read and write
7FF846DD0000
trusted library allocation
page read and write
2F60000
heap
page read and write
14283834000
trusted library allocation
page read and write
20D0B71B000
heap
page read and write
7FF846CC0000
trusted library allocation
page read and write
1962E338000
heap
page read and write
800000
heap
page read and write
33A51EF000
stack
page read and write
21E71C37000
heap
page read and write
1E0B7F92000
trusted library allocation
page read and write
7FF846C50000
trusted library allocation
page execute and read and write
1962E34C000
heap
page read and write
1E0D040C000
heap
page read and write
7FF846D60000
trusted library allocation
page read and write
21E71E00000
heap
page read and write
248CA7E000
stack
page read and write
6EAC27E000
stack
page read and write
3220000
heap
page read and write
7FF846C20000
trusted library allocation
page execute and read and write
7FF846C00000
trusted library allocation
page read and write
14281B20000
trusted library allocation
page read and write
A2062FF000
stack
page read and write
7FF846AF6000
trusted library allocation
page read and write
14281B96000
heap
page read and write
7FF6FEADB000
unkown
page execute read
2B68F195000
heap
page read and write
7FF846AF0000
trusted library allocation
page read and write
1E0B6269000
heap
page read and write
1962E300000
heap
page read and write
145DE1B7000
heap
page read and write
2CE0000
heap
page read and write
7FF7012DB000
unkown
page execute read
7FF846D90000
trusted library allocation
page read and write
1962E325000
heap
page read and write
802000
heap
page read and write
145DE1D3000
heap
page read and write
7FF846CE0000
trusted library allocation
page read and write
1E0B623C000
heap
page read and write
1428017C000
heap
page read and write
35A1000
heap
page read and write
1429A253000
heap
page read and write
6EAC37F000
stack
page read and write
2B68F190000
heap
page read and write
1E0B622A000
heap
page read and write
7FF6FD241000
unkown
page execute read
35E1000
heap
page read and write
145DE0C0000
heap
page read and write
1429A037000
heap
page execute and read and write
3020000
heap
page read and write
145DE1CC000
heap
page read and write
2C60000
heap
page read and write
7FF846D70000
trusted library allocation
page read and write
7FF846CE0000
trusted library allocation
page read and write
1E0B61A0000
heap
page read and write
7FF846C50000
trusted library allocation
page read and write
7FF846C30000
trusted library allocation
page execute and read and write
1962E353000
heap
page read and write
7FF846D80000
trusted library allocation
page read and write
33A557E000
stack
page read and write
142827D2000
trusted library allocation
page read and write
38A9A7F000
stack
page read and write
1E0B96A6000
trusted library allocation
page read and write
7FF846CB0000
trusted library allocation
page read and write
38A978E000
stack
page read and write
2B68EFA0000
heap
page read and write
7FF6FE0DB000
unkown
page execute read
1962E34F000
heap
page read and write
1E0D0720000
heap
page read and write
7FF846D30000
trusted library allocation
page read and write
1429A330000
heap
page read and write
3621000
heap
page read and write
142835D8000
trusted library allocation
page read and write
1E0B7D10000
heap
page execute and read and write
38A9AFE000
stack
page read and write
205FB134000
heap
page read and write
1E0B7D50000
heap
page execute and read and write
30E0000
heap
page read and write
1429A15E000
heap
page read and write
14283463000
trusted library allocation
page read and write
1962E33F000
heap
page read and write
1428013A000
heap
page read and write
1E0B992B000
trusted library allocation
page read and write
1E0D03C0000
heap
page read and write
3260000
heap
page read and write
7FF705062000
unkown
page readonly
1962E327000
heap
page read and write
2CA0000
heap
page read and write
34E1000
heap
page read and write
27E1000
heap
page read and write
1E0D01C0000
heap
page read and write
1962E32B000
heap
page read and write
2B68F194000
heap
page read and write
36E1000
heap
page read and write
7FF846D20000
trusted library allocation
page read and write
3461000
heap
page read and write
7FF846DA0000
trusted library allocation
page read and write
7FF846DC0000
trusted library allocation
page read and write
7FF846CF0000
trusted library allocation
page read and write
20D0B860000
heap
page read and write
14281B23000
trusted library allocation
page read and write
2A20000
heap
page read and write
14281BA1000
trusted library allocation
page read and write
205FB130000
heap
page read and write
2AE1000
heap
page read and write
1962E35C000
heap
page read and write
1429A378000
heap
page read and write
1E0C805B000
trusted library allocation
page read and write
7FF846A64000
trusted library allocation
page read and write
14281AE0000
heap
page execute and read and write
1962E35C000
heap
page read and write
205FAF7B000
heap
page read and write
2BE0000
heap
page read and write
7FF846D40000
trusted library allocation
page read and write
1E0B7B70000
heap
page read and write
2B68EE00000
heap
page read and write
6EAC2FF000
stack
page read and write
1E0B9620000
trusted library allocation
page read and write
1962E34C000
heap
page read and write
7FF705062000
unkown
page readonly
2A61000
heap
page read and write
7FF6FE0DB000
unkown
page execute read
1E0D0400000
heap
page read and write
35E7CFF000
unkown
page read and write
248D17B000
stack
page read and write
50B000
unkown
page readonly
33A0000
heap
page read and write
1E0B61E0000
heap
page read and write
29E0000
heap
page read and write
1962E260000
heap
page read and write
145DE1D5000
heap
page read and write
7FF846B1C000
trusted library allocation
page execute and read and write
145DE1A5000
heap
page read and write
205FB140000
heap
page read and write
142832B0000
trusted library allocation
page read and write
1429A3B5000
heap
page read and write
1962E34F000
heap
page read and write
38A97CE000
stack
page read and write
7FF846C90000
trusted library allocation
page read and write
21E71C1B000
heap
page read and write
145DE1DB000
heap
page read and write
6EABE9B000
stack
page read and write
33A55FF000
stack
page read and write
38AA1FC000
stack
page read and write
14280230000
heap
page read and write
7FF846CC0000
trusted library allocation
page read and write
7FF846B46000
trusted library allocation
page execute and read and write
7FF846C42000
trusted library allocation
page read and write
27EF000
heap
page read and write
7FF846C60000
trusted library allocation
page read and write
34A0000
heap
page read and write
7FF703ADB000
unkown
page execute read
14281A90000
heap
page readonly
248D0FE000
stack
page read and write
1429A383000
heap
page read and write
7FF846A70000
trusted library allocation
page read and write
3662000
heap
page read and write
248CB7D000
stack
page read and write
145DE390000
heap
page read and write
2B68EFAE000
heap
page read and write
7FF846D70000
trusted library allocation
page read and write
7FF846BFA000
trusted library allocation
page read and write
7FF846B80000
trusted library allocation
page execute and read and write
3360000
heap
page read and write
2FE0000
heap
page read and write
2960000
heap
page read and write
14280260000
heap
page read and write
21E71BE0000
heap
page read and write
248CDF7000
stack
page read and write
7FF846D60000
trusted library allocation
page read and write
248CEFD000
stack
page read and write
7FF846D00000
trusted library allocation
page read and write
7FF6FD6DB000
unkown
page execute read
1429A381000
heap
page read and write
145DE1CC000
heap
page read and write
2DA0000
heap
page read and write
20D0B600000
heap
page read and write
1E0B9103000
trusted library allocation
page read and write
7FF701CDB000
unkown
page execute read
2B68EFAC000
heap
page read and write
142801B8000
heap
page read and write
3561000
heap
page read and write
145DE1CC000
heap
page read and write
7FF846D99000
trusted library allocation
page read and write
145DE1A6000
heap
page read and write
7FF846C80000
trusted library allocation
page read and write
1E0B946C000
trusted library allocation
page read and write
35E2000
heap
page read and write
38A9F77000
stack
page read and write
7FF846BF1000
trusted library allocation
page read and write
22FE79B000
stack
page read and write
7FF846CA0000
trusted library allocation
page read and write
33A547F000
stack
page read and write
1E0B7B00000
heap
page readonly
1E0B7BE6000
heap
page read and write
1962E34C000
heap
page read and write
1429A010000
heap
page execute and read and write
248CCFE000
stack
page read and write
1962E240000
heap
page read and write
14291BAF000
trusted library allocation
page read and write
7FF7030DB000
unkown
page execute read
7FF846CD0000
trusted library allocation
page read and write
40A000
unkown
page write copy
1E0B7B10000
trusted library allocation
page read and write
2B68EFC5000
heap
page read and write
7FF846D50000
trusted library allocation
page read and write
7FF846B20000
trusted library allocation
page execute and read and write
3420000
heap
page read and write
7FF6FFEDB000
unkown
page execute read
38AA0FE000
stack
page read and write
14291BA1000
trusted library allocation
page read and write
2B68F196000
heap
page read and write
14280170000
heap
page read and write
1962E35A000
heap
page read and write
33E0000
heap
page read and write
248C723000
stack
page read and write
1E0D0233000
heap
page read and write
20D0B736000
heap
page read and write
1E0D01E5000
heap
page read and write
1E0D0402000
heap
page read and write
7FF846C80000
trusted library allocation
page read and write
1E0B62CD000
heap
page read and write
2D60000
heap
page read and write
1E0C7DD2000
trusted library allocation
page read and write
205FAEF0000
heap
page read and write
205FAF10000
heap
page read and write
1E0B7AF0000
trusted library allocation
page read and write
7FF6FF4DB000
unkown
page execute read
1962E34F000
heap
page read and write
20D0B890000
heap
page read and write
38A9B7E000
stack
page read and write
14281A20000
heap
page read and write
1429A34B000
heap
page read and write
7FF846A44000
trusted library allocation
page read and write
28E1000
heap
page read and write
205FAF50000
heap
page read and write
1962E337000
heap
page read and write
7FF846B26000
trusted library allocation
page execute and read and write
7FF846C10000
trusted library allocation
page execute and read and write
1962E34F000
heap
page read and write
1962E5F4000
heap
page read and write
1429A393000
heap
page read and write
22FEAFF000
unkown
page read and write
7FF846D50000
trusted library allocation
page read and write
1962E34C000
heap
page read and write
1429A250000
heap
page read and write
145DE1CC000
heap
page read and write
20D0B870000
heap
page read and write
1429A0CF000
heap
page read and write
1428021C000
heap
page read and write
14291C12000
trusted library allocation
page read and write
38A9BFD000
stack
page read and write
1E0B6222000
heap
page read and write
7FF6FD241000
unkown
page execute read
7FF846A42000
trusted library allocation
page read and write
21E71E20000
heap
page read and write
7FF6FD6DB000
unkown
page execute read
1E0C7F14000
trusted library allocation
page read and write
1962E325000
heap
page read and write
7FF6FD240000
unkown
page readonly
A2061FF000
unkown
page read and write
6EABF9E000
stack
page read and write
7FF846DB0000
trusted library allocation
page read and write
14280176000
heap
page read and write
7FF846CF0000
trusted library allocation
page read and write
142832A6000
trusted library allocation
page read and write
14280030000
heap
page read and write
7FF846A7B000
trusted library allocation
page read and write
142801BE000
heap
page read and write
1E0B7D61000
trusted library allocation
page read and write
38A9E76000
stack
page read and write
1E0B946A000
trusted library allocation
page read and write
145DE1CD000
heap
page read and write
1962E351000
heap
page read and write
2FE1000
heap
page read and write
3560000
heap
page read and write
205FB160000
heap
page read and write
14280190000
heap
page read and write
1E0C7D71000
trusted library allocation
page read and write
1429A5C0000
heap
page read and write
6EABF1E000
stack
page read and write
7FF846A50000
trusted library allocation
page read and write
7FF701CDB000
unkown
page execute read
1962E35A000
heap
page read and write
248CBFE000
stack
page read and write
34E0000
heap
page read and write
38A9C7E000
stack
page read and write
1E0C7D61000
trusted library allocation
page read and write
7FF846D95000
trusted library allocation
page read and write
2D61000
heap
page read and write
29E1000
heap
page read and write
14280130000
heap
page read and write
7FF6FEADB000
unkown
page execute read
7FF846DB0000
trusted library allocation
page read and write
32E1000
heap
page read and write
7FF705052000
unkown
page readonly
1E0B61C0000
heap
page read and write
14280172000
heap
page read and write
145DE1A5000
heap
page read and write
31E0000
heap
page read and write
38AA07F000
stack
page read and write
7FF846C30000
trusted library allocation
page execute and read and write
F3BF2FF000
unkown
page read and write
1E0D02E0000
heap
page read and write
1E0B6180000
heap
page read and write
7FF846D10000
trusted library allocation
page read and write
7FF846CA0000
trusted library allocation
page read and write
38A9D7E000
stack
page read and write
1428348E000
trusted library allocation
page read and write
22FEBFF000
stack
page read and write
145DE180000
heap
page read and write
205FAF76000
heap
page read and write
21E71BD0000
heap
page read and write
14281B90000
heap
page read and write
1962E160000
heap
page read and write
14282D5E000
trusted library allocation
page read and write
3320000
heap
page read and write
3160000
heap
page read and write
20D0B710000
heap
page read and write
7FF6FD240000
unkown
page readonly
7FF7044DB000
unkown
page execute read
1E0B8992000
trusted library allocation
page read and write
7FF846C1A000
trusted library allocation
page read and write
7FF846A6D000
trusted library allocation
page execute and read and write
1E0D0260000
heap
page read and write
3120000
heap
page read and write
33A54FE000
stack
page read and write
1E0B99F5000
trusted library allocation
page read and write
21E71C10000
heap
page read and write
248CE78000
stack
page read and write
7FF846A63000
trusted library allocation
page execute and read and write
7FF705049000
unkown
page readonly
1428376F000
trusted library allocation
page read and write
248CF7E000
stack
page read and write
7FF846A4D000
trusted library allocation
page execute and read and write
2B68F1C0000
heap
page read and write
21E71F80000
heap
page read and write
1E0B7A90000
heap
page read and write
2BA0000
heap
page read and write
7FF6FE0DB000
unkown
page execute read
14281AB0000
trusted library allocation
page read and write
20D0B810000
heap
page read and write
30E1000
heap
page read and write
401000
unkown
page execute read
F3BF3FF000
stack
page read and write
1E0B60A0000
heap
page read and write
1429A37E000
heap
page read and write
400000
unkown
page readonly
7FF7026DB000
unkown
page execute read
7FF846C70000
trusted library allocation
page read and write
1962E340000
heap
page read and write
1E0B61E8000
heap
page read and write
145DDFE0000
heap
page read and write
2B68EF00000
heap
page read and write
20D0B6E0000
heap
page read and write
7FF846D10000
trusted library allocation
page read and write
7FF846B00000
trusted library allocation
page execute and read and write
7FF846A43000
trusted library allocation
page execute and read and write
1E0CFD6F000
heap
page read and write
1E0B7C20000
trusted library allocation
page read and write
7FF7044DB000
unkown
page execute read
14281DD2000
trusted library allocation
page read and write
145DE0E0000
heap
page read and write
1E0B61FF000
heap
page read and write
1E0B621C000
heap
page read and write
7FF846B16000
trusted library allocation
page read and write
38A9FFE000
stack
page read and write
There are 497 hidden memdumps, click here to show them.