IOC Report
MKBOY.ps1

loading gif

Files

File Path
Type
Category
Malicious
MKBOY.ps1
ASCII text, with very long lines (65458), with CRLF line terminators
initial sample
malicious
C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Temp\RUNPEE.dll
PE32 executable (DLL) (console) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\ProgramData\Microsoft\Network\Downloader\edb.chk
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\edb.log
data
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.db
Extensible storage engine DataBase, version 0x620, checksum 0xfd41dfbc, page size 16384, Windows version 10.0
dropped
C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm
data
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\JXCJKXCJHKJHXCJHKXCXCJHK.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\QI6Y9C7H\json[1].json
JSON data
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_j04rlqnn.1hw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_rbsijdtq.lbz.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDesusertions\1EGCU2523226VZY8MLZ9.temp
data
dropped
C:\Users\user\AppData\Roaming\Microsoft\Windows\Recent\CustomDesusertions\d93f411851d7c929.customDesusertions-ms (copy)
data
dropped
C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmp
JSON data
dropped
There are 5 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\MKBOY.ps1"
malicious
C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe
"C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe"
malicious
C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe
"C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe"
malicious
C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe
"C:\Users\user\AppData\Local\Temp\JXCJKXCJHKJHXCJHKXCXCJHK.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\notepad.exe
"C:\Windows\System32\notepad.exe" "C:\Users\user\Desktop\MKBOY.ps1"
C:\Windows\System32\svchost.exe
C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS

URLs

Name
IP
Malicious
http://nuget.org/NuGet.exe
unknown
http://geoplugin.net/json.gpWN
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
http://crl.micro7T
unknown
https://contoso.com/License
unknown
http://176.65.144.3
unknown
http://geoplugin.net/k
unknown
https://contoso.com/Icon
unknown
http://176.65.144.3/dev/muk.exeP
unknown
http://crl.ver)
unknown
http://176.65.144.3/dev/muk.exe
176.65.144.3
http://geoplugin.net/json.gp9
unknown
https://github.com/Pester/Pester
unknown
http://geoplugin.net/json.gpSystem32
unknown
http://geoplugin.net/json.gplm
unknown
http://geoplugin.net/json.gp
178.237.33.50
https://aka.ms/pscore6lBAr
unknown
http://geoplugin.net/
unknown
https://g.live.com/odclientsettings/Prod-C:
unknown
http://geoplugin.net/json.gp/C
unknown
https://contoso.com/
unknown
https://g.live.com/odclientsettings/ProdV2-C:
unknown
https://nuget.org/nuget.exe
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
There are 15 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
geoplugin.net
178.237.33.50

IPs

IP
Domain
Country
Malicious
198.23.227.212
unknown
United States
malicious
176.65.144.3
unknown
Germany
178.237.33.50
geoplugin.net
Netherlands
127.0.0.1
unknown
unknown

Registry

Path
Value
Malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-DJTZHJ
exepath
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-DJTZHJ
licence
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-DJTZHJ
time
malicious
HKEY_CURRENT_USER\SOFTWARE\Rmc-DJTZHJ
UID
malicious
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWindowsOnlyEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fPasteOriginalEOL
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fReverse
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fWrapAround
HKEY_CURRENT_USER\SOFTWARE\Microsoft\Notepad
fMatchCase
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\JXCJKXCJHKJHXCJHKXCXCJHK_RASMANCS
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\BITS
PerfMMFileName
There are 15 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
12D8000
heap
page read and write
malicious
400000
remote allocation
page execute and read and write
malicious
76EF000
stack
page read and write
282A4E3F000
heap
page read and write
77DE000
stack
page read and write
282A4E4A000
heap
page read and write
282A4E43000
heap
page read and write
23A0000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E4A000
heap
page read and write
12D0000
heap
page read and write
282A4E3D000
heap
page read and write
7E2E000
stack
page read and write
28EB5430000
trusted library allocation
page read and write
35C0000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3D000
heap
page read and write
74BE000
stack
page read and write
28EB5662000
heap
page read and write
7DA0000
trusted library allocation
page read and write
282A4E43000
heap
page read and write
2380000
trusted library allocation
page execute and read and write
282A4E3D000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3D000
heap
page read and write
F68297E000
unkown
page readonly
282A4E3D000
heap
page read and write
282A4E3D000
heap
page read and write
28EB0F80000
trusted library allocation
page read and write
28EB5410000
trusted library allocation
page read and write
282A4E3F000
heap
page read and write
4DB0000
trusted library allocation
page read and write
282A4E4A000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E4A000
heap
page read and write
529C000
stack
page read and write
282A4E3F000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3F000
heap
page read and write
282A6850000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E3D000
heap
page read and write
7CF0000
trusted library allocation
page read and write
282A4E43000
heap
page read and write
535E000
stack
page read and write
282A4DDE000
heap
page read and write
7CBD000
stack
page read and write
282A4E4A000
heap
page read and write
282A4E43000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3D000
heap
page read and write
28EB5560000
trusted library allocation
page read and write
282A4E3D000
heap
page read and write
28EB5412000
trusted library allocation
page read and write
282A4E4A000
heap
page read and write
28EB0092000
heap
page read and write
282A4E43000
heap
page read and write
282A4E4A000
heap
page read and write
F68267E000
stack
page readonly
30B9000
stack
page read and write
282A4E3D000
heap
page read and write
7AD9000
heap
page read and write
282A4E4A000
heap
page read and write
7AB6000
heap
page read and write
282A4E43000
heap
page read and write
282A4E4A000
heap
page read and write
4B6E000
stack
page read and write
282A4E43000
heap
page read and write
3240000
heap
page read and write
8870000
trusted library allocation
page execute and read and write
282A4E43000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E43000
heap
page read and write
7D80000
trusted library allocation
page read and write
282A4E4A000
heap
page read and write
282A4E3F000
heap
page read and write
8883000
heap
page read and write
282A4E43000
heap
page read and write
718E000
stack
page read and write
282A86B0000
trusted library allocation
page read and write
282A4E4A000
heap
page read and write
282A4E3D000
heap
page read and write
282A4DA8000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3F000
heap
page read and write
12B5000
heap
page read and write
282A4E43000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E4A000
heap
page read and write
8860000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3D000
heap
page read and write
22F0000
trusted library allocation
page read and write
7D90000
trusted library allocation
page read and write
282A4E3F000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3D000
heap
page read and write
80C000
heap
page read and write
2390000
trusted library allocation
page read and write
282A4E3D000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3F000
heap
page read and write
5401000
trusted library allocation
page read and write
282A4E3D000
heap
page read and write
770000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E4A000
heap
page read and write
28EB53F0000
trusted library allocation
page read and write
53ED000
stack
page read and write
E9C000
stack
page read and write
282A4E43000
heap
page read and write
1362000
heap
page read and write
4558000
trusted library allocation
page read and write
785E000
stack
page read and write
282A4E3D000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E43000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E4A000
heap
page read and write
9EE000
stack
page read and write
169F000
stack
page read and write
1351000
heap
page read and write
7CC0000
trusted library allocation
page read and write
7D30000
trusted library allocation
page read and write
282A4E3F000
heap
page read and write
282A4E43000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E3F000
heap
page read and write
881D000
stack
page read and write
282A4E3F000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3D000
heap
page read and write
4DE2000
trusted library allocation
page read and write
282A4E3D000
heap
page read and write
282A4E43000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E3D000
heap
page read and write
4E80000
heap
page read and write
282A4E3D000
heap
page read and write
28EB095A000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E4A000
heap
page read and write
7BFE000
stack
page read and write
6401000
trusted library allocation
page read and write
28EB0A90000
trusted library allocation
page read and write
2FAF000
stack
page read and write
7ACE000
heap
page read and write
5851000
trusted library allocation
page read and write
282A4E43000
heap
page read and write
282A4E43000
heap
page read and write
282A4E4A000
heap
page read and write
328E000
stack
page read and write
282A4E3F000
heap
page read and write
1311000
heap
page read and write
28EB0128000
heap
page read and write
282A4E3F000
heap
page read and write
282A4DD9000
heap
page read and write
28EB0102000
heap
page read and write
F682879000
stack
page read and write
28EB0013000
heap
page read and write
282A4E43000
heap
page read and write
83A000
heap
page read and write
282A4E3F000
heap
page read and write
28EB0000000
heap
page read and write
307B000
stack
page read and write
282A4E43000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E4A000
heap
page read and write
4E50000
heap
page readonly
282A4E4A000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E3D000
heap
page read and write
71A4000
trusted library allocation
page read and write
7A20000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E43000
heap
page read and write
481000
remote allocation
page execute and read and write
76EB000
stack
page read and write
78DE000
stack
page read and write
87D0000
trusted library allocation
page read and write
282A4E3D000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E4A000
heap
page read and write
3551000
trusted library allocation
page read and write
282A4E43000
heap
page read and write
28EB5443000
trusted library allocation
page read and write
9AF000
stack
page read and write
28EB008B000
heap
page read and write
28EB0902000
heap
page read and write
282A4E4A000
heap
page read and write
805000
heap
page read and write
28EB5454000
trusted library allocation
page read and write
75AF000
stack
page read and write
4BC0000
heap
page execute and read and write
282A4E43000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E4A000
heap
page read and write
77A000
heap
page read and write
F683D7E000
unkown
page readonly
282A4E43000
heap
page read and write
282A4E43000
heap
page read and write
282A4E4A000
heap
page read and write
F68437E000
unkown
page readonly
789E000
stack
page read and write
282A4E4A000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3D000
heap
page read and write
28EB00FE000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3D000
heap
page read and write
753A000
stack
page read and write
28EB5AB0000
trusted library allocation
page read and write
7DEE000
stack
page read and write
28EB091A000
heap
page read and write
282A4E3F000
heap
page read and write
F681CFB000
stack
page read and write
282A4E43000
heap
page read and write
282A4E4A000
heap
page read and write
2510000
trusted library allocation
page read and write
282A4E4A000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E43000
heap
page read and write
282A4E44000
heap
page read and write
28EB6000000
heap
page read and write
282A4E43000
heap
page read and write
282A4E4A000
heap
page read and write
282A4DD6000
heap
page read and write
28EAFF30000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3F000
heap
page read and write
230A000
trusted library allocation
page execute and read and write
282A4E3F000
heap
page read and write
3555000
trusted library allocation
page read and write
282A4E4A000
heap
page read and write
75EE000
stack
page read and write
28EB0113000
heap
page read and write
282A4E3F000
heap
page read and write
28EB5540000
trusted library allocation
page read and write
28EB13A0000
trusted library allocation
page read and write
7CD0000
trusted library allocation
page execute and read and write
282A4E43000
heap
page read and write
F68237E000
unkown
page readonly
282A4E3D000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E43000
heap
page read and write
4DC9000
trusted library allocation
page read and write
F68257E000
unkown
page readonly
282A4E4A000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3F000
heap
page read and write
35CE000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E43000
heap
page read and write
4E60000
trusted library allocation
page read and write
282A4E4A000
heap
page read and write
282A4E4A000
heap
page read and write
53F0000
heap
page execute and read and write
282A4E4A000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E43000
heap
page read and write
28EB5500000
trusted library allocation
page read and write
282A4E3F000
heap
page read and write
28EB00FE000
heap
page read and write
7AFB000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3F000
heap
page read and write
1357000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3D000
heap
page read and write
282A4DD9000
heap
page read and write
22E3000
trusted library allocation
page execute and read and write
282A4E43000
heap
page read and write
282A4E3F000
heap
page read and write
22E4000
trusted library allocation
page read and write
282A4E3F000
heap
page read and write
3130000
heap
page read and write
F683C7B000
stack
page read and write
282A4E43000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E4A000
heap
page read and write
885E000
stack
page read and write
282A4E3F000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E43000
heap
page read and write
28EB0815000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3F000
heap
page read and write
F682277000
stack
page read and write
282A4E3F000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3F000
heap
page read and write
3210000
heap
page read and write
282A4E3F000
heap
page read and write
75B0000
heap
page read and write
282A4E4A000
heap
page read and write
472000
remote allocation
page execute and read and write
282A4E3D000
heap
page read and write
28EB07E0000
trusted library allocation
page read and write
282A4E4A000
heap
page read and write
282A4E3D000
heap
page read and write
28EB5700000
heap
page read and write
28EB5600000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E3F000
heap
page read and write
28EB5655000
heap
page read and write
282A4E4A000
heap
page read and write
28EB002B000
heap
page read and write
3D55000
trusted library allocation
page read and write
282A4E43000
heap
page read and write
232000
unkown
page readonly
33A7000
heap
page read and write
282A66CC000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3F000
heap
page read and write
3456000
heap
page read and write
282A4E43000
heap
page read and write
28EB55B0000
remote allocation
page read and write
282A4E3D000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E43000
heap
page read and write
2520000
trusted library allocation
page read and write
4DAE000
stack
page read and write
282A4E3F000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3D000
heap
page read and write
28EB0076000
heap
page read and write
2300000
trusted library allocation
page read and write
282A4E3F000
heap
page read and write
282A4E4A000
heap
page read and write
AF0000
heap
page read and write
28EB0913000
heap
page read and write
351E000
stack
page read and write
28EB00BC000
heap
page read and write
28EB55B0000
remote allocation
page read and write
615000
heap
page read and write
3D59000
trusted library allocation
page read and write
340F000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E43000
heap
page read and write
282A4E4A000
heap
page read and write
28EB54E0000
trusted library allocation
page read and write
4BAE000
stack
page read and write
282A4E4A000
heap
page read and write
1250000
heap
page read and write
282A4C00000
heap
page read and write
3D9000
stack
page read and write
282A4E4A000
heap
page read and write
282A4CE0000
heap
page read and write
7D20000
trusted library allocation
page read and write
282A4E3D000
heap
page read and write
2DC000
stack
page read and write
2516000
trusted library allocation
page read and write
28EB0071000
heap
page read and write
7A5000
heap
page read and write
28EB5500000
trusted library allocation
page read and write
282A4E43000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E43000
heap
page read and write
610000
heap
page read and write
7194000
trusted library allocation
page read and write
282A4E4A000
heap
page read and write
282A4E4A000
heap
page read and write
806E000
stack
page read and write
282A4E3F000
heap
page read and write
12B0000
heap
page read and write
7D00000
trusted library allocation
page read and write
28EB5440000
trusted library allocation
page read and write
71C5000
trusted library allocation
page read and write
282A4E3F000
heap
page read and write
75A0000
heap
page execute and read and write
7AA6000
heap
page read and write
282A4E3F000
heap
page read and write
28EB07F0000
trusted library allocation
page read and write
282A4E4A000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E43000
heap
page read and write
24AF000
stack
page read and write
746F000
stack
page read and write
334E000
stack
page read and write
255B000
trusted library allocation
page read and write
282A4D20000
heap
page read and write
7A78000
heap
page read and write
282A4E43000
heap
page read and write
8CFC000
stack
page read and write
35C6000
heap
page read and write
282A4E43000
heap
page read and write
28EB5440000
trusted library allocation
page read and write
282A4E3D000
heap
page read and write
7D60000
trusted library allocation
page read and write
282A4E3D000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3F000
heap
page read and write
650000
heap
page read and write
282A4E3D000
heap
page read and write
3AAF000
stack
page read and write
282A4E3D000
heap
page read and write
7B69000
trusted library allocation
page read and write
282A4E3D000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E43000
heap
page read and write
531E000
stack
page read and write
282A4E43000
heap
page read and write
4F17000
heap
page read and write
1366000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3F000
heap
page read and write
74AD000
stack
page read and write
74FD000
stack
page read and write
282A4E3D000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E43000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E4A000
heap
page read and write
14A0000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3D000
heap
page read and write
28EB5630000
heap
page read and write
80E0000
heap
page read and write
282A4E3F000
heap
page read and write
7911000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3F000
heap
page read and write
231B000
trusted library allocation
page execute and read and write
282A4E4A000
heap
page read and write
230000
unkown
page readonly
3245000
heap
page read and write
28EB0117000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3F000
heap
page read and write
3DB9000
trusted library allocation
page read and write
282A4E4A000
heap
page read and write
28EB568B000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3F000
heap
page read and write
30EF000
stack
page read and write
4BB8000
unkown
page readonly
282A4DD0000
heap
page read and write
282A4E43000
heap
page read and write
282A4E4A000
heap
page read and write
28EB007B000
heap
page read and write
4A6E000
stack
page read and write
7B70000
trusted library allocation
page read and write
282A6853000
heap
page read and write
7AC0000
heap
page read and write
22D0000
trusted library allocation
page read and write
282A4E43000
heap
page read and write
4DE5000
trusted library allocation
page execute and read and write
7A9F000
heap
page read and write
4DC0000
trusted library allocation
page read and write
282A4E4A000
heap
page read and write
28EB000B000
heap
page read and write
4E00000
trusted library allocation
page read and write
16DD000
stack
page read and write
282A4E43000
heap
page read and write
32CD000
stack
page read and write
282A4E4A000
heap
page read and write
35B0000
trusted library allocation
page read and write
282A4E43000
heap
page read and write
282A4E43000
heap
page read and write
B10000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E43000
heap
page read and write
7D40000
trusted library allocation
page read and write
282A4E3F000
heap
page read and write
28EB5410000
trusted library allocation
page read and write
282A4E43000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E3F000
heap
page read and write
6429000
trusted library allocation
page read and write
2310000
trusted library allocation
page read and write
282A4E4A000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3D000
heap
page read and write
7C3E000
stack
page read and write
282A4E4A000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E3F000
heap
page read and write
28EB56DA000
heap
page read and write
282A4E43000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E43000
heap
page read and write
282A4E4A000
heap
page read and write
5555000
trusted library allocation
page read and write
282A4E3D000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3F000
heap
page read and write
7A62000
heap
page read and write
282A4E4A000
heap
page read and write
4DBD000
trusted library allocation
page execute and read and write
28EB009D000
heap
page read and write
7BB0000
heap
page execute and read and write
28EB5643000
heap
page read and write
2330000
trusted library allocation
page read and write
282A4E43000
heap
page read and write
F9C000
stack
page read and write
282A4E3F000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E43000
heap
page read and write
282A4E43000
heap
page read and write
8AE000
stack
page read and write
759D000
stack
page read and write
282A4E3D000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3F000
heap
page read and write
7A46000
heap
page read and write
708E000
stack
page read and write
282A4E43000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3F000
heap
page read and write
282A67C0000
heap
page read and write
282A4E43000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3F000
heap
page read and write
282A66C5000
heap
page read and write
7ADF000
heap
page read and write
28EB55B0000
remote allocation
page read and write
25D5000
trusted library allocation
page read and write
7AF4000
heap
page read and write
282A4E4A000
heap
page read and write
344F000
heap
page read and write
282A4E4A000
heap
page read and write
28EB54F0000
trusted library allocation
page read and write
282A4E43000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E4A000
heap
page read and write
47C000
remote allocation
page execute and read and write
7A00000
trusted library allocation
page read and write
282A4E3F000
heap
page read and write
28EB07C1000
trusted library allocation
page read and write
282A4E43000
heap
page read and write
4EF0000
trusted library allocation
page read and write
28EB56D2000
heap
page read and write
282A4E43000
heap
page read and write
282A4E43000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E3D000
heap
page read and write
F682C7B000
stack
page read and write
8AB5000
trusted library allocation
page read and write
2551000
trusted library allocation
page read and write
282A4E4A000
heap
page read and write
282A4E4A000
heap
page read and write
28EB5550000
trusted library allocation
page read and write
282A4E3D000
heap
page read and write
282A4E3F000
heap
page read and write
4DB3000
trusted library allocation
page execute and read and write
282A4E3F000
heap
page read and write
282A4E4A000
heap
page read and write
F6820FE000
stack
page read and write
134C000
heap
page read and write
282A4E35000
heap
page read and write
28EB0106000
heap
page read and write
743B000
stack
page read and write
282A4E3F000
heap
page read and write
16E0000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E4A000
heap
page read and write
255F000
trusted library allocation
page read and write
282A4E3D000
heap
page read and write
282A4E3D000
heap
page read and write
25B6000
trusted library allocation
page read and write
28EB0802000
heap
page read and write
87C0000
trusted library allocation
page read and write
28EB5650000
heap
page read and write
28EB54E0000
trusted library allocation
page read and write
4F10000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E3D000
heap
page read and write
28EB091A000
heap
page read and write
28EB56F9000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E43000
heap
page read and write
282A4E43000
heap
page read and write
330E000
stack
page read and write
282A4E43000
heap
page read and write
7D10000
trusted library allocation
page read and write
282A4E43000
heap
page read and write
124E000
stack
page read and write
282A4E3F000
heap
page read and write
282A4E43000
heap
page read and write
282A4E4A000
heap
page read and write
7B51000
trusted library allocation
page read and write
28EB56C7000
heap
page read and write
282A4E4A000
heap
page read and write
71B6000
trusted library allocation
page read and write
282A4E4A000
heap
page read and write
7945000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E43000
heap
page read and write
28EB5AB0000
trusted library allocation
page read and write
282A4E4A000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E43000
heap
page read and write
4EDE000
stack
page read and write
282A4E3D000
heap
page read and write
282A66A0000
trusted library allocation
page read and write
282A4DA0000
heap
page read and write
282A66C0000
heap
page read and write
28EAFE50000
heap
page read and write
4BB2000
unkown
page execute and read and write
9BD967E000
stack
page read and write
282A4E3D000
heap
page read and write
730000
heap
page read and write
24ED000
stack
page read and write
7D50000
trusted library allocation
page read and write
7C7E000
stack
page read and write
282A4E43000
heap
page read and write
4E68000
trusted library allocation
page read and write
282A4E4A000
heap
page read and write
2307000
trusted library allocation
page execute and read and write
28EB565B000
heap
page read and write
282A4E43000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3F000
heap
page read and write
28EB5510000
trusted library allocation
page read and write
282A4DDD000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3F000
heap
page read and write
4BB0000
unkown
page readonly
77E000
heap
page read and write
4E90000
heap
page read and write
282A4E3F000
heap
page read and write
779E000
stack
page read and write
282A4E4A000
heap
page read and write
14B0000
heap
page read and write
282A4E3F000
heap
page read and write
28EB0D40000
trusted library allocation
page read and write
7B30000
trusted library allocation
page read and write
282A4E3D000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E4A000
heap
page read and write
28EB5400000
trusted library allocation
page read and write
282A4E4A000
heap
page read and write
28EB005D000
heap
page read and write
282A4E43000
heap
page read and write
7F2E000
stack
page read and write
28EB5623000
heap
page read and write
F6842FE000
stack
page read and write
8CBC000
stack
page read and write
282A4E43000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3D000
heap
page read and write
8780000
trusted library allocation
page execute and read and write
282A4E43000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3F000
heap
page read and write
28EB0041000
heap
page read and write
52DE000
stack
page read and write
282A4E43000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E43000
heap
page read and write
772E000
stack
page read and write
282A4E3D000
heap
page read and write
7A8F000
heap
page read and write
282A4E4A000
heap
page read and write
475000
remote allocation
page execute and read and write
282A4E43000
heap
page read and write
282A4E3D000
heap
page read and write
781E000
stack
page read and write
282A4E3F000
heap
page read and write
8890000
heap
page read and write
2394000
trusted library allocation
page read and write
282A4E43000
heap
page read and write
5463000
trusted library allocation
page read and write
282A4E43000
heap
page read and write
7B40000
trusted library allocation
page read and write
28EB0102000
heap
page read and write
28EB56F3000
heap
page read and write
282A4E43000
heap
page read and write
282A4E4A000
heap
page read and write
22ED000
trusted library allocation
page execute and read and write
28EB0078000
heap
page read and write
F682D7E000
unkown
page readonly
7AC8000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E43000
heap
page read and write
28EB0800000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3F000
heap
page read and write
132F000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3D000
heap
page read and write
4E4E000
stack
page read and write
28EB0900000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3D000
heap
page read and write
5D2D000
trusted library allocation
page read and write
282A4E4A000
heap
page read and write
3380000
heap
page read and write
28EB5450000
trusted library allocation
page read and write
747E000
stack
page read and write
282A4E4A000
heap
page read and write
282A4E43000
heap
page read and write
2540000
heap
page execute and read and write
7CE0000
trusted library allocation
page read and write
736D000
stack
page read and write
8880000
heap
page read and write
282A4E43000
heap
page read and write
28EB005F000
heap
page read and write
282A4E3D000
heap
page read and write
9BD93B9000
stack
page read and write
28EB0904000
heap
page read and write
75A5000
heap
page execute and read and write
282A4E3F000
heap
page read and write
282A4E3D000
heap
page read and write
81E0000
heap
page read and write
25BF000
trusted library allocation
page read and write
4DE0000
trusted library allocation
page read and write
3451000
heap
page read and write
282A8EB0000
heap
page read and write
704D000
stack
page read and write
282A4E43000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E3D000
heap
page read and write
5ED2000
trusted library allocation
page read and write
71B9000
trusted library allocation
page read and write
282A4E44000
heap
page read and write
282A4E4A000
heap
page read and write
28EB5411000
trusted library allocation
page read and write
282A4E3D000
heap
page read and write
282A4E3F000
heap
page read and write
646A000
trusted library allocation
page read and write
282A4E3F000
heap
page read and write
282A4E3F000
heap
page read and write
F68247E000
stack
page read and write
282A4E4A000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E3F000
heap
page read and write
28EB5500000
trusted library allocation
page read and write
237E000
stack
page read and write
282A4E3D000
heap
page read and write
3403000
heap
page read and write
2317000
trusted library allocation
page execute and read and write
28EB59F0000
trusted library allocation
page read and write
282A4E3F000
heap
page read and write
282A4E4A000
heap
page read and write
232000
unkown
page execute and read and write
282A4E43000
heap
page read and write
7AD1000
heap
page read and write
28EAFE30000
heap
page read and write
28EB56E8000
heap
page read and write
282A4E3F000
heap
page read and write
355E000
stack
page read and write
282A4E4A000
heap
page read and write
25CC000
trusted library allocation
page read and write
282A4E4A000
heap
page read and write
39AE000
stack
page read and write
282A4E3F000
heap
page read and write
34C0000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E43000
heap
page read and write
282A4E44000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3D000
heap
page read and write
33A0000
heap
page read and write
282A4E3F000
heap
page read and write
7B6000
heap
page read and write
4EE0000
trusted library allocation
page execute and read and write
7D70000
trusted library allocation
page read and write
282A4E3F000
heap
page read and write
282A4E4A000
heap
page read and write
1200000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E43000
heap
page read and write
1700000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3D000
heap
page read and write
46EE000
stack
page read and write
359E000
stack
page read and write
282A4E3D000
heap
page read and write
28EB00B5000
heap
page read and write
2500000
trusted library allocation
page read and write
22E0000
trusted library allocation
page read and write
282A4E3F000
heap
page read and write
4BB4000
unkown
page readonly
282A4E43000
heap
page read and write
7F6E000
stack
page read and write
28EAFF60000
trusted library allocation
page read and write
282A4E3D000
heap
page read and write
282A4E4A000
heap
page read and write
4DB4000
trusted library allocation
page read and write
28EB570B000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3F000
heap
page read and write
28EB5560000
trusted library allocation
page read and write
282A4E3D000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E43000
heap
page read and write
282A4E43000
heap
page read and write
28EB5713000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E43000
heap
page read and write
282A4E4A000
heap
page read and write
760000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3D000
heap
page read and write
2FEE000
stack
page read and write
7A66000
heap
page read and write
282A4E4A000
heap
page read and write
7B60000
trusted library allocation
page read and write
7AAA000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3D000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E43000
heap
page read and write
28EB5702000
heap
page read and write
AEF000
stack
page read and write
282A4E4A000
heap
page read and write
282A4E4A000
heap
page read and write
282A4E3D000
heap
page read and write
7AED000
heap
page read and write
282A4E43000
heap
page read and write
282A4E3F000
heap
page read and write
282A4E3F000
heap
page read and write
85F000
heap
page read and write
28EB5570000
trusted library allocation
page read and write
There are 878 hidden memdumps, click here to show them.